Computing term
POPULARITY
Categories
On the 489th episode of Piecing It Together, we continue our FilmQuest Film Festival 2025 coverage as Hana Kazim joins me to talk about Hacked: A Double Entendre of Rage Fueled Karma. We also talk about Hana's own short film Yathoom making this a double dose episode. Puzzle pieces for Hacked include Hackers, The Beekeeper and John Wick.As always, SPOILER ALERT for Hacked: A Double Entrende of Rage Fueled Karma and Yathoom and all of the movies we discuss!Check out FilmQuest at https://www.filmquestfest.comAnd also check out FilmQuest on Instagram @filmquestHacked: A Double Entendre Of Rage Fueled KarmaWritten by Shane BradyDirected by Shane BradyStarring Chandler Riggs, Richard Riehle Katelyn NaconYathoomWritten by Hana KazimDirected by Hana KazimStarring Khawla Abdusalam, Hiba Judeh, Abdulrahman Al MadaniHana Kazim is a filmmaker and the director of Yathoom, as well as the creator of Wiswas, a Middle Eastern horror film development company.Check out his website at https://wiswas.com/And also check out Hana on Instagram @hanakazimMy latest David Rosen album MISSING PIECES: 2018-2024 is a compilation album that fills in the gaps in unreleased music made during the sessions for 2018's A Different Kind Of Dream, 2020's David Rosen, 2022's MORE CONTENT and 2025's upcoming And Other Unexplained Phenomena. Find it on Bandcamp, Apple Music, Spotify and everywhere else you can find music.You can also find more about all of my music on my website https://www.bydavidrosen.comMy latest music video is “Shaking" which you can watch at https://www.youtube.com/watch?v=wzm8s4nuqlAThe song at the end of the episode is "Back Into The Dark" from my album Head Like Fire. The music video for "Back Into The Dark" from visual artist Bea Landers was an Official Selection of the 2017 FilmQuest Film Festival.Make sure to “Like” Piecing It Together on Facebook at http://www.facebook.com/PiecingPodAnd “Follow” us on Twitter @PiecingPodAnd Join the Conversation in our Facebook Group, Piecing It Together – A Movie Discussion Group.And check out https://www.piecingpod.com for more about our show!And if you want to SUPPORT THE SHOW, you can now sign up for our Patreon at https://www.patreon.com/bydavidrosenYou can also support the show by checking out our Dashery store to buy shirts and more featuring Piecing It Together logos, movie designs, and artwork...
Hacker After Dark 11-12-25 by 1010 XL Jax Sports Radio
Patch Tuesday. Google sues a “phishing-as-a-service” network linked to global SMS scams, and launches “private ai compute.” Hyundai notifies vehicle owners of a data breach. Amazon launches a bug bounty program for its AI models. The Rhadamanthys infostealer operation has been disrupted. An initial access broker is set to plead guilty in U.S. federal court. Our guest is Bob Maley, CSO from Black Kite, discussing a new AI assessment framework. “Bitcoin Queen's” $7.3 billion crypto laundering empire collapses. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Industry Voices segment, we are joined by Bob Maley, CSO from Black Kite, discussing a new AI assessment framework. You can hear Bob's full conversation here. Selected Reading Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday (Infosecurity Magazine) Chipmaker Patch Tuesday: Over 60 Vulnerabilities Patched by Intel (SecurityWeek) ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Rockwell, Aveva, Schneider (SecurityWeek) Adobe Patches 29 Vulnerabilities (SecurityWeek) High-Severity Vulnerabilities Patched by Ivanti and Zoom (SecurityWeek) Google launches a lawsuit targeting text message scammers (NPR) Private AI Compute: our next step in building private and helpful AI (Google) Hyundai confirms security breach after hackers access sensitive data (CBT News) Amazon rolls out AI bug bounty program (CyberScoop) Rhadamanthys infostealer disrupted as cybercriminals lose server access (Bleeping Computer) Russian hacker admits helping Yanluowang ransomware infect companies (Bitdefender) $7.3B crypto laundering: ‘Bitcoin Queen' sentenced to 11 Years in UK (Security Affairs) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
From the BBC World Service: Australia is increasingly vulnerable to "high-impact sabotage" from hackers backed by China, according to Australian intelligence official Mike Burgess. He told business leaders in Melbourne that there had been multiple attempts to hack into transportation, telecommunications, water, and energy networks. Plus, a multibillion-dollar natural gas platform off the coast of Senegal promised to bring economic prosperity, but fishermen there say the development has caused disruption and unemployment.
From the BBC World Service: Australia is increasingly vulnerable to "high-impact sabotage" from hackers backed by China, according to Australian intelligence official Mike Burgess. He told business leaders in Melbourne that there had been multiple attempts to hack into transportation, telecommunications, water, and energy networks. Plus, a multibillion-dollar natural gas platform off the coast of Senegal promised to bring economic prosperity, but fishermen there say the development has caused disruption and unemployment.
Brian and Justin have a home! And Jesse is there too! Get an extra episode every week only at https://www.patreon.com/greatnight!
Hacker After Dark 11-11-25 by 1010 XL Jax Sports Radio
Bridget, Caitlin, and Hilda continue their spooky season coverage and discuss "Bride" by Ali Hazelwood. Okay, so it's not really scary, but it has vampyres, werewolves, and the forced marriage trope will get your pulse racing. Plus, did someone say knotting? Join our Patreon for exclusive behind-the-scenes content and let's be friends!Instagram > @Booktokmademe_podTikTok > @BooktokMadeMe
Brian and Justin have a home! And Jesse is there too! Get an extra episode every week only at https://www.patreon.com/greatnight!
El jefe de los servicios de inteligencia de Australia advierte que los piratas informáticos respaldados por el gobierno chino están atacando cada vez más las infraestructuras críticas del país, incluidos aeropuertos, redes energéticas y sistemas de telecomunicaciones. Escucha el resumen de noticias de este miércoles 12 de noviembre de 2025.
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
This is a recap of the top 10 posts on Hacker News on November 11, 2025. This podcast was generated by wondercraft.ai (00:30): The 'Toy Story' You RememberOriginal post: https://news.ycombinator.com/item?id=45883788&utm_source=wondercraft_ai(01:50): FFmpeg to Google: Fund us or stop sending bugsOriginal post: https://news.ycombinator.com/item?id=45891016&utm_source=wondercraft_ai(03:11): iPhone PocketOriginal post: https://news.ycombinator.com/item?id=45885813&utm_source=wondercraft_ai(04:32): Warren Buffett's final shareholder letter [pdf]Original post: https://news.ycombinator.com/item?id=45882837&utm_source=wondercraft_ai(05:53): Collaboration sucksOriginal post: https://news.ycombinator.com/item?id=45892394&utm_source=wondercraft_ai(07:14): I hate screenshots of textOriginal post: https://news.ycombinator.com/item?id=45883124&utm_source=wondercraft_ai(08:35): SoftBank sells its entire stake in NvidiaOriginal post: https://news.ycombinator.com/item?id=45884937&utm_source=wondercraft_ai(09:55): Firefox expands fingerprint protectionsOriginal post: https://news.ycombinator.com/item?id=45888891&utm_source=wondercraft_ai(11:16): X5.1 solar flare, G4 geomagnetic storm watchOriginal post: https://news.ycombinator.com/item?id=45893004&utm_source=wondercraft_ai(12:37): iPod SocksOriginal post: https://news.ycombinator.com/item?id=45889602&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
Refin It Up gets hacked this week; but in a good way as we welcome Bin Hamin to the show. As one of the most underrated minds in wrestling Bin talks about creating storylines with Vince Russo, while learning from greats like Rip Rogers and Al Snow at OVW. Bin has been a household name up and down the roads across all of independent wrestling in the North East and beyond. As a business man Bin knows what it takes to get over in business as well as in pro wrestling. As one of the last great heels in the business Bin goes in to detail on how he can and has riled up the crowd to turn on him. All this and so much more this week on Refin It Up Refin It Up Social MediaTwitter, YOUTUBE, and IG @refinitupWebsitehttps://linktr.ee/refinitupBrian Hebner Social MediaTwitter/IG @babyhebnerJimmy Korderas Social MediaTwitter: @jimmykorderasIG: @realjimmykorderasDaniel Spencer Social Media Twitter/IG: @DanielSpencerArtwork by JD Hoop @JDHoop702Music by Downstait and AJ McKay We are extremely happy to announce our new partnership with PSL City TicketsFollow them on all social media platformsWe will have free sporting event tickets with tailgating before, and more giveaways. Visit pslcity.net to get the best tickets in your city!! Ready to level up your confidence in the bedroom? Head to rugiet.com and use our promo code REFIN for 15% off your first order.
Bobby shared the celebrity divorce he was surprised by because it involves one person that he knows. Amy gets offended by the response to her lead story. Bobby is blown away by a woman who makes a ton of money a day being a hand model. Morgan shared how she went head-to-head with a hacker! Bobby hears from a caller who addresses something he said on the show recently that he now regrets. Amy accidentally revealed another car accident she withheld from our knowledge that might have been a reason her boyfriend didn't drive his new car.See omnystudio.com/listener for privacy information.
Ever wondered what happens to your online accounts when you're gone?
Hacker After Dark 11-10-25 by 1010 XL Jax Sports Radio
This is a recap of the top 10 posts on Hacker News on November 10, 2025. This podcast was generated by wondercraft.ai (00:30): XSLT RIPOriginal post: https://news.ycombinator.com/item?id=45873434&utm_source=wondercraft_ai(01:50): Unexpected things that are peopleOriginal post: https://news.ycombinator.com/item?id=45877257&utm_source=wondercraft_ai(03:10): Work after work: Notes from an unemployed new grad watching the job market breakOriginal post: https://news.ycombinator.com/item?id=45870863&utm_source=wondercraft_ai(04:31): Time to start de-ApplingOriginal post: https://news.ycombinator.com/item?id=45876598&utm_source=wondercraft_ai(05:51): LLMs are steroids for your Dunning-KrugerOriginal post: https://news.ycombinator.com/item?id=45876744&utm_source=wondercraft_ai(07:11): Redmond, WA, turns off Flock Safety cameras after ICE arrestsOriginal post: https://news.ycombinator.com/item?id=45879101&utm_source=wondercraft_ai(08:32): The lazy Git UI you didn't know you needOriginal post: https://news.ycombinator.com/item?id=45878578&utm_source=wondercraft_ai(09:52): How cops can get your private online dataOriginal post: https://news.ycombinator.com/item?id=45877206&utm_source=wondercraft_ai(11:12): Vibe Code Warning – A personal casestudyOriginal post: https://news.ycombinator.com/item?id=45874987&utm_source=wondercraft_ai(12:33): Sued by NintendoOriginal post: https://news.ycombinator.com/item?id=45870675&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
Language Hacker Joins us to talk about the new decks. I mean the new cards, in the old decks. We talk about what we think of the new cards, the new meta, and what are our hopes for the first balance patch.
In the #MikeJonesMinuteCon, we'll talk about playing DOOM in space and how Snooki is going ghost hunting!See omnystudio.com/listener for privacy information.
If you like what you hear, please subscribe, leave us a review and tell a friend!
Attention car owners: Thieves have a new high-tech way to steal your ride, no lockpick required. Learn more about your ad choices. Visit megaphone.fm/adchoices
This is a recap of the top 10 posts on Hacker News on November 09, 2025. This podcast was generated by wondercraft.ai (00:30): I Am Mark ZuckerbergOriginal post: https://news.ycombinator.com/item?id=45863360&utm_source=wondercraft_ai(01:52): AI isn't replacing jobs. AI spending isOriginal post: https://news.ycombinator.com/item?id=45866243&utm_source=wondercraft_ai(03:15): Marble FountainOriginal post: https://news.ycombinator.com/item?id=45866697&utm_source=wondercraft_ai(04:38): Montana becomes first state to enshrine 'right to compute' into lawOriginal post: https://news.ycombinator.com/item?id=45865289&utm_source=wondercraft_ai(06:01): Tabloid: The Clickbait Headline Programming LanguageOriginal post: https://news.ycombinator.com/item?id=45862470&utm_source=wondercraft_ai(07:24): Samsung Family Hub for 2025 Update Elevates the Smart Home EcosystemOriginal post: https://news.ycombinator.com/item?id=45866165&utm_source=wondercraft_ai(08:46): Work after work: Notes from an unemployed new grad watching the job market breakOriginal post: https://news.ycombinator.com/item?id=45870863&utm_source=wondercraft_ai(10:09): Boring Company fined nearly $500K after it dumped drilling fluids into manholesOriginal post: https://news.ycombinator.com/item?id=45862674&utm_source=wondercraft_ai(11:32): The Manuscripts of Edsger W. DijkstraOriginal post: https://news.ycombinator.com/item?id=45866224&utm_source=wondercraft_ai(12:55): Judge denies request to exempt Flock footage from Public Records ActOriginal post: https://news.ycombinator.com/item?id=45861829&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
This is a recap of the top 10 posts on Hacker News on November 08, 2025. This podcast was generated by wondercraft.ai (00:30): I Want You to Understand ChicagoOriginal post: https://news.ycombinator.com/item?id=45859402&utm_source=wondercraft_ai(01:52): Valdi – A cross-platform UI framework that delivers native performanceOriginal post: https://news.ycombinator.com/item?id=45852854&utm_source=wondercraft_ai(03:14): Ticker: Don't die of heart diseaseOriginal post: https://news.ycombinator.com/item?id=45857053&utm_source=wondercraft_ai(04:36): Study identifies weaknesses in how AI systems are evaluatedOriginal post: https://news.ycombinator.com/item?id=45856804&utm_source=wondercraft_ai(05:59): Apple's "notarisation" – blocking software freedom of developers and usersOriginal post: https://news.ycombinator.com/item?id=45854441&utm_source=wondercraft_ai(07:21): My friends and I accidentally faked the Ryzen 7 9700X3D leaksOriginal post: https://news.ycombinator.com/item?id=45855933&utm_source=wondercraft_ai(08:43): Marko – A declarative, HTML‑based languageOriginal post: https://news.ycombinator.com/item?id=45858905&utm_source=wondercraft_ai(10:06): IP blocking the UK is not enough to comply with the Online Safety ActOriginal post: https://news.ycombinator.com/item?id=45860654&utm_source=wondercraft_ai(11:28): Mullvad: Shutting down our search proxy LetaOriginal post: https://news.ycombinator.com/item?id=45852974&utm_source=wondercraft_ai(12:50): Sam Altman's pants are on fireOriginal post: https://news.ycombinator.com/item?id=45853292&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
Hacker After Dark 11-7-25 by 1010 XL Jax Sports Radio
Unveiling the Double-Edged Sword of AI in Cybersecurity with Brian Black In this episode of Cybersecurity Today, host Jim Love interviews Brian Black, the head of security engineering at Deep Instinct and a former black hat hacker. Brian shares his journey into hacking from a young age, his transition to ethical hacking, and his experiences working with major companies. The discussion delves into the effectiveness of cybersecurity defenses against modern AI-driven attacks, the importance of understanding organizational data, and the challenges of maintaining robust security in the age of AI. Brian emphasizes the need for preemptive security measures and shares insights on the evolving threats posed by AI as well as the need for continuous education and adaptation in the cybersecurity field. 00:00 Introduction and Sponsor Message 00:21 Meet Brian Black: From Black Hat to Good Guy 00:55 Brian's Early Hacking Days 02:46 Transition to Ethical Hacking 04:11 Life in the Hacking Community 08:54 Advice for Aspiring Hackers and Parents 11:05 Corporate Career and Red Teaming 13:12 The Importance of Basics in Cybersecurity 21:41 Multifactor Authentication: The Good and the Bad 24:19 Challenges in Vendor Security Testing 27:41 Weaknesses in Cyber Defense 28:22 AI Speed vs Human Speed 28:37 AI in Cybersecurity Attacks 30:08 Dark AI Tools and Their Capabilities 32:54 AI Agents and Offensive Strategies 35:43 Challenges in Cybersecurity Defense 41:48 The Role of Red Teaming 42:46 Hiring the Right Red Team 46:59 Burnout in Cybersecurity 48:17 AI as a Double-Edged Sword 52:43 Deep Instinct's Approach to Security 53:58 Conclusion and Final Thoughts
This is a recap of the top 10 posts on Hacker News on November 07, 2025. This podcast was generated by wondercraft.ai (00:30): Leaving Meta and PyTorchOriginal post: https://news.ycombinator.com/item?id=45843948&utm_source=wondercraft_ai(01:50): Meta projected 10% of 2024 revenue came from scamsOriginal post: https://news.ycombinator.com/item?id=45845772&utm_source=wondercraft_ai(03:11): A Fond FarewellOriginal post: https://news.ycombinator.com/item?id=45843146&utm_source=wondercraft_ai(04:32): YouTube Removes Windows 11 Bypass Tutorials, Claims 'Risk of Physical Harm'Original post: https://news.ycombinator.com/item?id=45850963&utm_source=wondercraft_ai(05:53): Rockstar employee shares account of the company's union-busting effortsOriginal post: https://news.ycombinator.com/item?id=45849281&utm_source=wondercraft_ai(07:14): Denmark's government aims to ban access to social media for children under 15Original post: https://news.ycombinator.com/item?id=45848083&utm_source=wondercraft_ai(08:35): Vodafone Germany is killing the open internet – one peering connection at a timeOriginal post: https://news.ycombinator.com/item?id=45848484&utm_source=wondercraft_ai(09:55): Why I love OCaml (2023)Original post: https://news.ycombinator.com/item?id=45846517&utm_source=wondercraft_ai(11:16): Apple is crossing a Steve Jobs red lineOriginal post: https://news.ycombinator.com/item?id=45850430&utm_source=wondercraft_ai(12:37): VLC's Jean-Baptiste Kempf Receives the European SFS Award 2025Original post: https://news.ycombinator.com/item?id=45850751&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
The CBO was hacked by a suspected foreign actor. Experts worry Trump's budget cuts weaken U.S. cyber defenses. Regulation shapes expectations. ClickFix evolves on macOS. Notorious cybercrime groups form a new “federated alliance.” Congressional leaders look to counter China's influence in 6G networks. An EdTech firm pays $5.1 million to settle data breach claims. Nevada did not pay the ransom. Our guest is CEO and Co-Founder Ben Nunez from Evercoast, winner of the 8th Annual DataTribe Challenge. The FBI tries to uncover the archivist. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Evercoast, winner of the 8th Annual DataTribe Challenge, is redefining Training Data for Embodied AI with enriched 4D spatial data from real-world environments to better train robots. CEO and Co-Founder Ben Nunez joins Dave Bittner to discuss their win and what's next for the company. Selected Reading Congressional Budget Office believed to be hacked by foreign actor (The Washington Post) Trump budget cuts, agency gutting, leave Americans and economy at greater risk of being hacked, experts warn (CNBC) The quiet revolution: How regulation is forcing cybersecurity accountability (CyberScoop) ClickFix Attacks Against macOS Users Evolving (SecurityWeek) “I Paid Twice” Phishing Campaign Targets Booking.com (Infosecurity Magazine) Scattered Spider, LAPSUS$, and ShinyHunters form extortion alliance (SC Media) Congressional leaders want an executive branch strategy on China 6G, tech supply chain (CyberScoop) Ed tech company fined $5.1 million for poor data security practices leading to hack (The Record) Nevada government declined to pay ransom, says cyberattack traced to breach in May (The Record) FBI Tries to Unmask Owner of Infamous Archive.is Site (404 Media) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Hacker After Dark 11-6-25 by 1010 XL Jax Sports Radio
The crew enter into Thorne's old lab and learn how to use extremely advanced technology.
A round-up of the main headlines in Sweden on November 7th 2025. You can hear more reports on our homepage www.radiosweden.se, or in the app Sveriges Radio. Presenter/Producer: Kris Boswell.
Pour sécuriser votre système informatique avec Neverhack ➡️ https://link.influxcrew.com/neverhack-LEGENDMerci à Arthur Bataille d'être venu sur Legend.Arthur, spécialiste en cybersécurité, est le fondateur de Neverhack, une entreprise dédiée à la protection des systèmes informatiques. Il collabore avec des ministères, l'armée, des entreprises et des particuliers afin d'assurer la sécurité et la confidentialité de leurs données.Collaboration commerciale Retrouvez la boutique LEGEND ➡️: https://shop.legend-group.fr/Retrouvez l'interview complète sur YouTube ➡️ https://youtu.be/y9aFZTNFvJQPour toutes demandes de partenariats : legend@influxcrew.comRetrouvez-nous sur tous les réseaux LEGEND !Facebook : https://www.facebook.com/legendmediafrInstagram : https://www.instagram.com/legendmedia/TikTok : https://www.tiktok.com/@legendTwitter : https://twitter.com/legendmediafrSnapchat : https://t.snapchat.com/CgEvsbWV Hébergé par Acast. Visitez acast.com/privacy pour plus d'informations.
A federal agency that supplies budget and economic information to Congress has suffered a cybersecurity incident, reportedly at the hands of a suspected foreign party. A spokesperson for the Congressional Budget Office (CBO) acknowledged the incident Thursday after The Washington Post reported that the office was hacked, with the attackers potentially accessing communications between lawmakers and researchers at the agency. CBO spokeswoman Caitlin Emma said: “The Congressional Budget Office has identified the security incident, has taken immediate action to contain it, and has implemented additional monitoring and new security controls to further protect the agency's systems going forward.” Congress established the office in 1974 to serve as a nonpartisan research organization for the legislative branch. Republicans took aim at the CBO this year when it assessed that a GOP tax and spending policy bill would add trillions to the national debt, prompting conservatives to criticize its conclusions. It's not unprecedented for unauthorized parties to obtain access to sensitive information from congressional offices. Hackers who broke into the Library of Congress last year were able to read email correspondence with offices on Capitol Hill. And a breach of a health insurance marketplace two years ago exposed the data of House staffers. The Trump administration's ongoing decimation of the Consumer Financial Protection Bureau has rendered the agency's overall information security program ineffective, a federal watchdog revealed Monday. In an audit of CFPB's cybersecurity program, the Federal Reserve's Office of Inspector General found that the agency is no longer keeping up with its authorizations to operate many systems, and is “using risk acceptance memorandums without a documented analysis of cybersecurity risks.” As a result of those floundering protocols, the Fed OIG said the CFPB's overall information security program has declined to level-2 maturity (defined) in fiscal 2025, down from level-4 (managed and measurable), and overall is not effective. Backsliding on these security measures can be at least partially attributed to a loss of contractor support for continuous security monitoring and testing, per the audit, as well as the mass exodus under the Trump administration of CFPB staff. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on Apple Podcasts, Soundcloud, Spotify and YouTube.
This is a recap of the top 10 posts on Hacker News on November 06, 2025. This podcast was generated by wondercraft.ai (00:30): End of Japanese communityOriginal post: https://news.ycombinator.com/item?id=45830770&utm_source=wondercraft_ai(01:50): FBI tries to unmask owner of archive.isOriginal post: https://news.ycombinator.com/item?id=45836826&utm_source=wondercraft_ai(03:11): Ratatui – App ShowcaseOriginal post: https://news.ycombinator.com/item?id=45830829&utm_source=wondercraft_ai(04:32): Kimi K2 Thinking, a SOTA open-source trillion-parameter reasoning modelOriginal post: https://news.ycombinator.com/item?id=45836070&utm_source=wondercraft_ai(05:53): ICC ditches Microsoft 365 for openDeskOriginal post: https://news.ycombinator.com/item?id=45837342&utm_source=wondercraft_ai(07:14): You should write an agentOriginal post: https://news.ycombinator.com/item?id=45840088&utm_source=wondercraft_ai(08:35): Two billion email addresses were exposedOriginal post: https://news.ycombinator.com/item?id=45839901&utm_source=wondercraft_ai(09:56): I may have found a way to spot U.S. at-sea strikes before they're announcedOriginal post: https://news.ycombinator.com/item?id=45831541&utm_source=wondercraft_ai(11:17): What the hell have you builtOriginal post: https://news.ycombinator.com/item?id=45832803&utm_source=wondercraft_ai(12:38): IKEA launches new smart home range with 21 Matter-compatible productsOriginal post: https://news.ycombinator.com/item?id=45834980&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
Hackers use Windows Hyper-V to evade EDR detection Critical Cisco UCCX flaw lets attackers run commands as root The Louvre's video security password was reportedly Louvre Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero-trust endpoint protection platform, ThreatLocker fills the gaps traditional solutions leave behind, giving your business stronger security and control. Don't just react to threats — stop them with ThreatLocker. Find the stories behind the headlines at CISOseries.com.
Join podcaster and author, Mike Wilkerson, aka Stellium7, to talk about his new book, The Hacker Prince.We will be learning the ins and outs of how he got his tech skills and what adventure came of it, based on this true story.Here's a note about our last stream, this one will be a gooder too!!Your interview conversation skills, while always tremendous, continually evolve. The conversation with Mike was so good I don't really have the words to convey. You were really in sync, you two. Glad I stumbled upon it!Mike's bio:For over a decade, Mike Wilkerson has worked as a chiropractor in Spain, where his mission has been to help improve health one spine and mind at a time.Mike has always asked unconventional questions. As a teen computer hobbyist turned hacker in the early 80's, his thirst for deeper knowledge led to wild adventures with some of the top hackers in the nation. In 1985, the fun ended with brief incarceration, for his infiltration of computer servers at Microsoft and three other Seattle corporations. Interest in examining the 'unquestionables' never waned.In the decades that followed, Mike evolved from mischievous hacker, to benevolent back-cracker and in recent years an independent researcher. His research and presentations are available on the Stellium7 Youtube channel.https://www.youtube.com/@Stellium7***Bumper music by Liam Martens, aka ツSaiko, sub to him here on YouTube: https://www.youtube.com/@SA1KO0O1 ***MORE FROM BETHSign up to take a 10-minute King Hero's Journey archetype quizApply to become a member of the House of Free WillRumbleKing Hero Telegram ChannelTwitter (X)InstagramSign up for a Hero's Journey Archetype ReadingOrder a copy of my book, ‘Journey: A Map of Archetypes to Find Lost Purpose in a Sea of Meaninglessness'Donate by PayPal if you're inspiredFollow the King Hero's Journey Podcast on... Apple Podcasts Spotify ***And if we're just meeting...I'm Beth Martens, a pattern hunter, archetype reader, podcaster, author, coach trainer, and business coach, and my calling is a life or death thing. After a decade as a corporate VP in my family's firm, eight trips to India, and a three-year battle with cancer nearly 25 years ago, I used archetypes and deprogramming harmful patterns to save my life.I was doing nearly everything wrong, in the physical, but tapped into and let go of the roots of the matter that were embedded and unconscious. And I went from dying to living practically overnight.Today I help people who love the truth more than their beliefs, and who want to serve with their life's work and be on their Hero's Journey, to de-program the beast system and stop making it easy for those trying to kill us.I host regular King Hero interviews highlighting leaders, entrepreneurs, movement makers, and lovers of freedom.
In the 1920s, Birmingham was known as “The Magic City.”Steel, smoke, opportunity—and something much darker.It began in a small corner store.Then another.And another.Grocers were attacked in the dead of night. Families were slaughtered in their beds.The weapon was simple. Primitive. Personal.An axe.For four years, fear ruled the streets. Doors were barricaded. Neighborhoods formed militias. The police were desperate enough to consult Ouija boards… and corrupt enough to let the Ku Klux Klan lead the investigation.Newspapers blamed a shadowy killer they called “Henry the Hacker.”But the truth was far more terrifying.This wasn't the story of one monster.It was the story of a city full of them. LINKS FOR MY DEBUT NOVEL, THE FORGOTTEN BOROUGHwww.hauntedamericanhistory.comBarnes and Noble - https://www.barnesandnoble.com/w/the-forgotten-borough-christopher-feinstein/1148274794?ean=9798319693334AMAZON: https://www.amazon.com/dp/B0FQPQD68SEbookGOOGLE: https://play.google.com/store/books/details?id=S5WCEQAAQBAJ&pli=1KOBO: https://www.kobo.com/us/en/ebook/the-forgotten-borough-2?sId=a10cf8af-5fbd-475e-97c4-76966ec87994&ssId=DX3jihH_5_2bUeP1xoje_SMASHWORD: https://www.smashwords.com/books/view/1853316 !! DISTURB ME !! APPLE - https://podcasts.apple.com/us/podcast/disturb-me/id1841532090SPOTIFY - https://open.spotify.com/show/3eFv2CKKGwdQa3X2CkwkZ5?si=faOUZ54fT_KG-BaZOBiTiQYOUTUBE - https://www.youtube.com/@DisturbMePodcastwww.disturbmepodcast.com YOUTUBEhttps://www.youtube.com/@hauntedchris TikTok- @hauntedchris LEAVE A VOICEMAIL - 609-891-8658 Patreon- https://www.patreon.com/hauntedamericanhistoryTwitter- @Haunted_A_HInstagram- haunted_american_historyemail- hauntedamericanhistory@gmail.com Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — Musical Views of the Universe04:05 - – BHIS - Talkin' Bout [infosec] News 2025-11-0304:39 - Story # 1: Ransomware profits drop as victims stop paying hackers06:22 - Chart since 201916:06 - Story # 2: More than a million people every week show suicidal intent when chatting with ChatGPT, OpenAI estimates33:02 - Story # 3: 10M people watched a YouTuber shim a lock; the lock company sued him. Bad idea.41:18 - Story # 4: ‘Dangerous' YouTube videos struck down for bypassing Windows 11 account setup [Update: Restored]47:13 - Story # 5: Chicago firm that resolves ransomware attacks had rogue workers carrying out their own hacks, FBI says51:08 - Story # 6: Microsoft: DNS outage impacts Azure and Microsoft 365 services54:33 - Story # 7: EY Data Leak – Massive 4TB SQL Server Backup Exposed Publicly on Microsoft Azure55:22 - Stordy # 8: Black Hat Europe 2025 Arsenal: 8 AI Security Tools Transforming Cybersecurity
Hacker After Dark 11-5-25 by 1010 XL Jax Sports Radio
Matthew Devost is a cybersecurity, risk management, and national security expert with over 25 years of experience. He is the CEO and Co-Founder of OODA LLC and Devsec previously founded the Terrorism Research Center and cybersecurity consultancy FusionX, which was acquired by Accenture. At Accenture, he led the Global Cyber Defense practice. Matthew has held key leadership roles at iDefense, iSIGHT Partners, Total Intel, SDI, Tulco Holdings, and Technical Defense, making him a trusted voice in cyber threat intelligence and critical infrastructure protection. 00:00 Introduction02:03 The Evolution of Cybersecurity and National Security Risks06:16 Understanding Cyber Threats and Strategies for Defense11:19 The Role of Private Sector in Cybersecurity14:40 Addressing Cybersecurity Challenges and Failures of Imagination17:16 Overcoming Inertia in Cybersecurity Leadership20:42 The Importance of Red Teaming and Realistic Simulations24:44 The Impact of AI on Cybersecurity29:31 Future of Cybersecurity and Emerging Technologies36:56 Overview of OODA and DevSec Ventures
#SecurityConfidential #DarkRhiinoSecurityMatthew Devost is a cybersecurity, risk management, and national security expert with over 25 years of experience. He is the CEO and Co-Founder of OODA LLC and Devsec previously founded the Terrorism Research Center and cybersecurity consultancy FusionX, which was acquired by Accenture. At Accenture, he led the Global Cyber Defense practice. Matthew has held key leadership roles at iDefense, iSIGHT Partners, Total Intel, SDI, Tulco Holdings, and Technical Defense, making him a trusted voice in cyber threat intelligence and critical infrastructure protection. 00:00 Introduction02:03 The Evolution of Cybersecurity and National Security Risks06:16 Understanding Cyber Threats and Strategies for Defense11:19 The Role of Private Sector in Cybersecurity14:40 Addressing Cybersecurity Challenges and Failures of Imagination17:16 Overcoming Inertia in Cybersecurity Leadership20:42 The Importance of Red Teaming and Realistic Simulations24:44 The Impact of AI on Cybersecurity29:31 Future of Cybersecurity and Emerging Technologies36:56 Overview of OODA and DevSec Ventures----------------------------------------------------------------------To learn more about Matthew visit https://www.devost.net/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com
This is a recap of the top 10 posts on Hacker News on November 05, 2025. This podcast was generated by wondercraft.ai (00:30): Zohran Mamdani wins the New York mayoral raceOriginal post: https://news.ycombinator.com/item?id=45818421&utm_source=wondercraft_ai(01:53): Solarpunk is happening in AfricaOriginal post: https://news.ycombinator.com/item?id=45827190&utm_source=wondercraft_ai(03:17): YouTube erased more than 700 videos documenting Israeli human rights violationsOriginal post: https://news.ycombinator.com/item?id=45822018&utm_source=wondercraft_ai(04:41): New gel restores dental enamel and could revolutionise tooth repairOriginal post: https://news.ycombinator.com/item?id=45826995&utm_source=wondercraft_ai(06:04): I'm worried that they put co-pilot in ExcelOriginal post: https://news.ycombinator.com/item?id=45820872&utm_source=wondercraft_ai(07:28): Norway reviews cybersecurity after remote-access feature found in Chinese busesOriginal post: https://news.ycombinator.com/item?id=45824658&utm_source=wondercraft_ai(08:52): Direct File won't happen in 2026, IRS tells statesOriginal post: https://news.ycombinator.com/item?id=45818319&utm_source=wondercraft_ai(10:15): iOS 26.2 to allow third-party app stores in Japan ahead of regulatory deadlineOriginal post: https://news.ycombinator.com/item?id=45822302&utm_source=wondercraft_ai(11:39): Dillo, a multi-platform graphical web browserOriginal post: https://news.ycombinator.com/item?id=45826266&utm_source=wondercraft_ai(13:03): The shadows lurking in the equationsOriginal post: https://news.ycombinator.com/item?id=45823141&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
Un articolo scottante sottolinea tutte le ambiguità del ruolo di Tether nell'attuale scenario economico e politico, denunciando la collusione di molti pseudo-bitcoiner e coniando un nuovo termine: CBDC by proxy.Inoltre: si avvicina la sentenza nel processo Wasabi wallet, la città di Londra difende il contante, congelati i conti dell'attivista anti Von Der Leyen, e i virus sulla shitchain di Ethereum potrebbero arrivare anche su bitcoin.It's showtime!
Hacker After Dark 11-4-25 by 1010 XL Jax Sports Radio
What was behind Microsoft's Azure outage that impacted businesses around the world? And Wiper attacks are on the rise in New Zealand - these are malware attacks designed to permanently delete data.
China-Linked hackers target Cisco firewalls. MIT Sloan withdraws controversial “AI-Driven Ransomware” paper. A new study questions the value of cybersecurity training. Hackers exploit OpenAI's API as a malware command channel. Apple patches over 100 Security flaws across devices. A Florida-based operator of mental health and addiction treatment centers exposes sensitive patient information. OPM plans a “mass deferment” for Cybercorps scholars affected by the government shutdown. Lawmakers urge the FTC to investigate Flock Safety's cybersecurity gaps. Cybercriminals team with organized crime for high-tech cargo thefts. Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies discussing ICE's controversial facial scanning initiative. A priceless theft meets a worthless password. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest We are joined by Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies discussing ICE's controversial facial scanning initiative. You can read more about Ben's topic from 404 Media: You Can't Refuse To Be Scanned by ICE's Facial Recognition App, DHS Document Says. Selected Reading China-Linked Hackers Target Cisco Firewalls in Global Campaign (Hackread) MIT Sloan shelves paper about AI-driven ransomware (The Register) CyberSlop — meet the new threat actor, MIT and Safe Security (DoublePulsar) Study concludes cybersecurity training doesn't work (KPBS Public Media) Microsoft: OpenAI API moonlights as malware HQ (The Register) Apple Patches 19 WebKit Vulnerabilities (SecurityWeek) Data Theft Hits Behavioral Health Network in 3 States (Bank Infosecurity) OPM plans to give CyberCorps members more time to find jobs after shutdown ends (CyberScoop) Lawmakers ask FTC to probe Flock Safety's cybersecurity practices (The Record) Cybercriminals, OCGs team up on lucrative cargo thefts (The Register) Louvre Robbery: Security Flaws: The (Obviously) Password Was "Louvre" (L'Unione Sarda) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Timestamps: 0:00 i still don't believe this is real 0:13 Microsoft fixes “Update and Shut Down” bug 1:44 AMD clarifies RDNA 1, 2 driver situation 3:01 Google pulls Gemma from AI Studio 4:28 DeleteMe! 4:59 QUICK BITS INTRO 5:07 Apple launches App Store for the Web 5:47 Hackers, Crime rings work together 6:38 Snapmaker 3D U1 Printer on sale 7:21 SpaceX, Besxar to make chips in orbit 8:22 ‘Sunlight on Demand' NEWS SOURCES: https://lmg.gg/3BPEq Learn more about your ad choices. Visit megaphone.fm/adchoices
Hacker After Dark 11-3-25 by 1010 XL Jax Sports Radio
This is a recap of the top 10 posts on Hacker News on November 03, 2025. This podcast was generated by wondercraft.ai (00:30): Tiny electric motor can produce more than 1,000 horsepowerOriginal post: https://news.ycombinator.com/item?id=45797242&utm_source=wondercraft_ai(01:54): Simple trick to increase coverage: Lying to users about signal strengthOriginal post: https://news.ycombinator.com/item?id=45795036&utm_source=wondercraft_ai(03:18): Why Nextcloud feels slow to useOriginal post: https://news.ycombinator.com/item?id=45798681&utm_source=wondercraft_ai(04:43): Google suspended my company's Google cloud account for the third timeOriginal post: https://news.ycombinator.com/item?id=45798827&utm_source=wondercraft_ai(06:07): Ask HN: Who is hiring? (November 2025)Original post: https://news.ycombinator.com/item?id=45800465&utm_source=wondercraft_ai(07:31): The Case Against PGVectorOriginal post: https://news.ycombinator.com/item?id=45798479&utm_source=wondercraft_ai(08:56): > Htmx – The Fetch()eningOriginal post: https://news.ycombinator.com/item?id=45803358&utm_source=wondercraft_ai(10:20): Learning to read Arthur Whitney's C to become smart (2024)Original post: https://news.ycombinator.com/item?id=45800777&utm_source=wondercraft_ai(11:45): First recording of a dying human brain shows waves similar to memory flashbacks (2022)Original post: https://news.ycombinator.com/item?id=45796421&utm_source=wondercraft_ai(13:09): AI's Dial-Up EraOriginal post: https://news.ycombinator.com/item?id=45804377&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
The FCC plans to roll back cybersecurity mandates that followed Salt Typhoon. The alleged cybercriminal MrICQ has been extradited to the U.S. Ransomware negotiators are accused of conducting ransomware attacks. Ernst & Young accidentally exposed a 4-terabyte SQL Server backup. A hacker claims responsibility for last week's University of Pennsylvania breach. The UK chronicles cyberattacks on Britain's drinking water suppliers. Monday business brief. Our guest is Caleb Tolin, host of Rubrik's Data Security Decoded podcast. Hackers massage the truth. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Caleb Tolin, host of Rubrik's Data Security Decoded podcast, as he is introducing himself and his show joining the N2K CyberWire network. You can catch new episodes of Data Security Decoded the first and third Tuesdays of each month on your favorite podcast app. Selected Reading FCC plans vote to remove cyber regulations installed after theft of Trump info from telecoms (The Record) Alleged Jabber Zeus Coder ‘MrICQ' in U.S. Custody (Krebs on Security) Chicago firm that resolves ransomware attacks had rogue workers carrying out their own hacks, FBI says (Chicago Sun Times) Ernst & Young cloud misconfiguration leaks 4TB SQL Server backup on Microsoft Azure (Beyond Machines) Penn hacker claims to have stolen 1.2 million donor records in data breach (Bleeping Computer) Hackers are attacking Britain's drinking water suppliers (The Record) JumpCloud acquires Breez. Chainguard secures $280 million in growth financing. Sublime Security closes $150 million Series C round. (N2K Pro) Hackers steal data, extort $350,000 from massage parlor clients (Korea JoongAng Daily) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
SPONSORS: 1) FUM: Head to https://www.tryfum.com/JULIAN and use promo code JULIAN to get your free gift with purchase and start the Good Habit today! 2) BUBS NATURALS: Live better for longer w/ BUBS Naturals. For a limited time, get 20% Off your entire order w/ code JULIAN at https://Bubsnaturals.com WATCH THE PREVIOUS MIKE YEAGLEY EPISODE HERE: https://youtu.be/UIB2T0g8wpE PATREON: https://www.patreon.com/JulianDorey (***TIMESTAMPS in description below) ~ Mike Yeagley is a data strategist, defense contractor, and one of the early architects of ADINT — Advertising Intelligence. He's known for showing U.S. intelligence how ad-tech location data, the same data used for marketing and mobile tracking, could expose troop movements, covert facilities, and even Vladimir Putin's entourage. Yeagley's work bridges big data, national security, and digital surveillance, redefining how modern governments harvest information in the name of protection — and control. FOLLOW JULIAN DOREY INSTAGRAM (Podcast): https://www.instagram.com/juliandoreypodcast/ INSTAGRAM (Personal): https://www.instagram.com/julianddorey/ X: https://twitter.com/julianddorey JULIAN YT CHANNELS - SUBSCRIBE to Julian Dorey Clips YT: https://www.youtube.com/@juliandoreyclips - SUBSCRIBE to Julian Dorey Daily YT: https://www.youtube.com/@JulianDoreyDaily - SUBSCRIBE to Best of JDP: https://www.youtube.com/@bestofJDP ****TIMESTAMPS**** 00:00 – Intro 01:37 – The Epstein Data Map Exposed 15:59 – Epstein Ohio Ties & Island Witnesses 25:57 – Three Presidents, One Silent DOJ 37:00 – Lost Evidence & Epstein Broken Justice 56:47 – DNA, Data & Civil Collapse 01:18:00 – The Epstein Call That Never Came 01:29:43 – Epstein Power, Secrecy & Hidden Fortunes 01:52:15 – DARPA, Bannon & Surveillance State 02:24:53 – Tech Giants & Modern Espionage 02:36:47 – Palantir, Prediction & Global Control 02:49:15 – Mike's work CREDITS: - Host, Editor & Producer: Julian Dorey - COO, Producer & Editor: Alessi Allaman - https://www.youtube.com/@UCyLKzv5fKxGmVQg3cMJJzyQ - In-Studio Producer: Joey Deef - https://www.instagram.com/joeydeef/ Julian Dorey Podcast Episode 351 - Mike Yeagley Learn more about your ad choices. Visit podcastchoices.com/adchoices