POPULARITY
Categories
The episode identifies a fundamental structural shift in the MSP and IT services landscape: vendor channel consolidation and ecosystem dependency are increasingly determining who controls customer relationships, margins, and access to recurring revenue streams. Companies such as Microsoft, Anthropic, and Huntress are actively reshaping the ecosystem by investing significant resources in partner programs and platform strategies that dictate operational baselines and restrict neutrality. This realignment is driving MSPs to deliberately choose platform alignments, as attempting to remain neutral increasingly results in a loss of relevance and market access. Central to this shift is Anthropic's $100 million investment in launching the Claude Partner Network for 2026, which creates certification and co-sell incentives for firms capable of implementing Claude within enterprise environments. According to Dave Sobel, this is not long-range product development but a concentrated customer acquisition cost to rapidly build channel coverage. In parallel, Microsoft is embedding Anthropic models within Copilot, shifting to a multi-model approach that retains flexibility at the AI model layer while keeping Azure as the entrenched operational platform. Supporting developments reinforce these channel and ecosystem pressures. Huntress's move to expand its partner program to value-added resellers (VARs) dilutes its previously MSP-exclusive channel, removing some of the distribution advantages MSPs may have relied upon. Sonomi's positioning of third-party risk management as an MSP revenue opportunity comes amid rising supply chain risk, as supported by ConnectWise's 2026 MSP Threat Report highlighting increased identity abuse and supply chain attacks. Simultaneously, declining PC shipments—especially for budget devices—are shifting the economic emphasis from hardware projects to operational service engagements such as identity governance and lifecycle management. The operational implications for MSPs are clear: partner program frameworks have become the gatekeepers of pricing, leads, and ongoing service annuities, reducing the room for independent strategy or procurement-driven decisions. Ecosystem alignment must be intentional and based on a realistic assessment of program timelines, certification windows, and revenue structure. As hardware refresh cycles slow and vendors consolidate services and identity requirements, MSPs face increased dependency risk, potential margin erosion, and diminished negotiating leverage. Those failing to anticipate or adapt to these shifts risk being relegated to subcontractor roles without control over customer relationships or recurring revenues. Three things to know today 00:00 AI Channel War 02:27 Identity Baseline Shift 03:43 Refresh Revenue Shift 04:46 Why Do We Care? Supported by: Small Biz Thoughts Community
When the Sportsmaster and Huntress have a marital spat, there's only one way to resolve the situation... A HEROES VS VILLAINS BASEBALL GAME!?!?!? Join David, Peter, Steve and some familiar voices as we celebrate our 300th episode with this crazy story from DC Super-Stars #10. Don't swing and miss it! You can find some of our guests through the following links - Brandon "Superman" Peters is currently reviewing the 1966 Batman TV series at https://thebrandonpetersshow.com/ Chuck "Green Arrow" Loridans talks about his pop culture passions on the Boxing Glove Arrow Podcast at https://savagechuck.podbean.com/ Kelly “Black Canary” Blair's peek into the Paris Metro can be found at https://taplink.cc/metrostoppodcast You can hear listen to Paul Kien's coverage of this issue on DC SpecialCast here - https://fireandwaterpodcast.com/podcast/dcsc01/ A special thanks to John Steib for his contribution to this episode. Email us at theearth2podcast@gmail.com Facebook www.facebook.com/theearth2podcast Instagram www.instagram.com/theearth2podcast Twitter www.twitter.com/podcast_earth2 Leave us a Voicemail at www.speakpipe.com/theearth2podcast Find our Linktree at https://linktr.ee/theearth2podcast #dccomics #Superman #Batman #Joker #WonderWoman #LexLuthor #GreenArrow #BlackCanary #PlasticMan #UncleSam #KidFlash #Amazo #MatterMaster #DrPolaris #TattooedMan #Sportsmaster #Huntress
The Huntress Podcast is back to talk about the Huntress moonlighting with the Outsiders, led by Nightwing and Arsenal. Let us know if you read this era of DC Comics back in the early 2000's at feathersandfoes@gmail.com https://wrightonnetwork.libsyn.com/website www.patreon.com/wrightonnetwork
Interview with Anna Pham Breaking in with ClickFix: Anatomy of a modern endpoint attack Cybersecurity company Huntress just published a report on a new ClickFix variant they've discovered, which they've dubbed CrashFix. This technique was developed by KongTuke to serve as the primary lure within a new custom malicious browser extension also created by the group. In short, the team observed the threat actors using KongTuke's malicious browser extension to display a fake security warning, claiming the browser had “stopped abnormally” and prompting users to run a “scan” to remediate the threats. Upon “running the scan,” the user is presented with a fake “Security issues detected” alert and instructed to manually “fix” the issue by opening the Windows Run dialog, pasting from their clipboard, and pressing Enter. The malicious extension silently copies a PowerShell command to the clipboard, disguised as a legitimate repair command. From there, they execute the malicious command. Segment Resources: BLOG - Dissecting CrashFix: KongTuke's New Toy Interview with David Zendzian Continuous compliance and real security lifecycle management Supply chain attacks are not just on the rise; attackers are learning from the past, making these attacks even more effective and dangerous than before. It was just over a month ago when the Shai-Hulud attack first impacted NPM packages, forcing enterprises around the world into lockdown. While only 187 packages were compromised in that initial incident, it served as a wake-up call for many: an accurate inventory of systems is good, but a clear, real-time Software Bill of Materials (SBOM) for applications is non-negotiable. In this world of manifest based infrastructure and container based applications with (real) "devsecops", the dream of continuous upgrades of OS/Runtime/Stack/App and App Dependencies is very mature and there are solid examples of companies and federal entities managing this at scale without thousands of teams and people. Segment Resources: BLOG - Supply Chain Security: How accurate SBOMs can deliver proactive threat mitigation Interview with Jacob Horne CMMC Phase 1 Enforcement — What the November 10 Deadline Means for the Defense Supply Chain With the upcoming CMMC Phase 1 enforcement on November 10, cybersecurity teams across the defense and federal supply chain are facing new compliance requirements that directly affect contract eligibility and data-protection standards. Jacob Horne, Chief Cybersecurity Evangelist at Summit 7, can break down what this milestone means for enterprise security leaders, MSPs/MSSPs, and contractors preparing for audits. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-449
Interview with Anna Pham Breaking in with ClickFix: Anatomy of a modern endpoint attack Cybersecurity company Huntress just published a report on a new ClickFix variant they've discovered, which they've dubbed CrashFix. This technique was developed by KongTuke to serve as the primary lure within a new custom malicious browser extension also created by the group. In short, the team observed the threat actors using KongTuke's malicious browser extension to display a fake security warning, claiming the browser had "stopped abnormally" and prompting users to run a "scan" to remediate the threats. Upon "running the scan," the user is presented with a fake "Security issues detected" alert and instructed to manually "fix" the issue by opening the Windows Run dialog, pasting from their clipboard, and pressing Enter. The malicious extension silently copies a PowerShell command to the clipboard, disguised as a legitimate repair command. From there, they execute the malicious command. Segment Resources: BLOG - Dissecting CrashFix: KongTuke's New Toy Interview with David Zendzian Continuous compliance and real security lifecycle management Supply chain attacks are not just on the rise; attackers are learning from the past, making these attacks even more effective and dangerous than before. It was just over a month ago when the Shai-Hulud attack first impacted NPM packages, forcing enterprises around the world into lockdown. While only 187 packages were compromised in that initial incident, it served as a wake-up call for many: an accurate inventory of systems is good, but a clear, real-time Software Bill of Materials (SBOM) for applications is non-negotiable. In this world of manifest based infrastructure and container based applications with (real) "devsecops", the dream of continuous upgrades of OS/Runtime/Stack/App and App Dependencies is very mature and there are solid examples of companies and federal entities managing this at scale without thousands of teams and people. Segment Resources: BLOG - Supply Chain Security: How accurate SBOMs can deliver proactive threat mitigation Interview with Jacob Horne CMMC Phase 1 Enforcement — What the November 10 Deadline Means for the Defense Supply Chain With the upcoming CMMC Phase 1 enforcement on November 10, cybersecurity teams across the defense and federal supply chain are facing new compliance requirements that directly affect contract eligibility and data-protection standards. Jacob Horne, Chief Cybersecurity Evangelist at Summit 7, can break down what this milestone means for enterprise security leaders, MSPs/MSSPs, and contractors preparing for audits. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-449
Interview with Anna Pham Breaking in with ClickFix: Anatomy of a modern endpoint attack Cybersecurity company Huntress just published a report on a new ClickFix variant they've discovered, which they've dubbed CrashFix. This technique was developed by KongTuke to serve as the primary lure within a new custom malicious browser extension also created by the group. In short, the team observed the threat actors using KongTuke's malicious browser extension to display a fake security warning, claiming the browser had "stopped abnormally" and prompting users to run a "scan" to remediate the threats. Upon "running the scan," the user is presented with a fake "Security issues detected" alert and instructed to manually "fix" the issue by opening the Windows Run dialog, pasting from their clipboard, and pressing Enter. The malicious extension silently copies a PowerShell command to the clipboard, disguised as a legitimate repair command. From there, they execute the malicious command. Segment Resources: BLOG - Dissecting CrashFix: KongTuke's New Toy Interview with David Zendzian Continuous compliance and real security lifecycle management Supply chain attacks are not just on the rise; attackers are learning from the past, making these attacks even more effective and dangerous than before. It was just over a month ago when the Shai-Hulud attack first impacted NPM packages, forcing enterprises around the world into lockdown. While only 187 packages were compromised in that initial incident, it served as a wake-up call for many: an accurate inventory of systems is good, but a clear, real-time Software Bill of Materials (SBOM) for applications is non-negotiable. In this world of manifest based infrastructure and container based applications with (real) "devsecops", the dream of continuous upgrades of OS/Runtime/Stack/App and App Dependencies is very mature and there are solid examples of companies and federal entities managing this at scale without thousands of teams and people. Segment Resources: BLOG - Supply Chain Security: How accurate SBOMs can deliver proactive threat mitigation Interview with Jacob Horne CMMC Phase 1 Enforcement — What the November 10 Deadline Means for the Defense Supply Chain With the upcoming CMMC Phase 1 enforcement on November 10, cybersecurity teams across the defense and federal supply chain are facing new compliance requirements that directly affect contract eligibility and data-protection standards. Jacob Horne, Chief Cybersecurity Evangelist at Summit 7, can break down what this milestone means for enterprise security leaders, MSPs/MSSPs, and contractors preparing for audits. Show Notes: https://securityweekly.com/esw-449
Jessica Jones: The Cryptid Huntress - True Paranormal Investigations - Steve welcomes The Cryptid Huntress, Jessica Jones, to talk about her boots on the ground investigations into the paranormal. Find Jessica online: https://www.youtube.com/@TheCryptidHuntress and https://www.thecryptidhuntress.comBecome a supporter of this podcast: https://www.spreaker.com/podcast/missing-persons-mysteries--5624803/support.
Interview with Anna Pham Breaking in with ClickFix: Anatomy of a modern endpoint attack Cybersecurity company Huntress just published a report on a new ClickFix variant they've discovered, which they've dubbed CrashFix. This technique was developed by KongTuke to serve as the primary lure within a new custom malicious browser extension also created by the group. In short, the team observed the threat actors using KongTuke's malicious browser extension to display a fake security warning, claiming the browser had "stopped abnormally" and prompting users to run a "scan" to remediate the threats. Upon "running the scan," the user is presented with a fake "Security issues detected" alert and instructed to manually "fix" the issue by opening the Windows Run dialog, pasting from their clipboard, and pressing Enter. The malicious extension silently copies a PowerShell command to the clipboard, disguised as a legitimate repair command. From there, they execute the malicious command. Segment Resources: BLOG - Dissecting CrashFix: KongTuke's New Toy Interview with David Zendzian Continuous compliance and real security lifecycle management Supply chain attacks are not just on the rise; attackers are learning from the past, making these attacks even more effective and dangerous than before. It was just over a month ago when the Shai-Hulud attack first impacted NPM packages, forcing enterprises around the world into lockdown. While only 187 packages were compromised in that initial incident, it served as a wake-up call for many: an accurate inventory of systems is good, but a clear, real-time Software Bill of Materials (SBOM) for applications is non-negotiable. In this world of manifest based infrastructure and container based applications with (real) "devsecops", the dream of continuous upgrades of OS/Runtime/Stack/App and App Dependencies is very mature and there are solid examples of companies and federal entities managing this at scale without thousands of teams and people. Segment Resources: BLOG - Supply Chain Security: How accurate SBOMs can deliver proactive threat mitigation Interview with Jacob Horne CMMC Phase 1 Enforcement — What the November 10 Deadline Means for the Defense Supply Chain With the upcoming CMMC Phase 1 enforcement on November 10, cybersecurity teams across the defense and federal supply chain are facing new compliance requirements that directly affect contract eligibility and data-protection standards. Jacob Horne, Chief Cybersecurity Evangelist at Summit 7, can break down what this milestone means for enterprise security leaders, MSPs/MSSPs, and contractors preparing for audits. Show Notes: https://securityweekly.com/esw-449
In this Edge of Wonder Live, Ben Chasteen interviews The Cryptid Huntress, who details real encounters with Bigfoot, Dogman, and remote viewing. Visit https://rise.tv for exclusive content Visit https://metaphysicalcoffee.com for coffee that's out of this world Jessica Jones is a field researcher of cryptids and a remote viewer based in Georgia. As an active member of various research groups associated with all things paranormal, she has obtained groundbreaking evidence that several creature sighting hotspots in the southeast United States are portals and alien hubs comparable to the infamous Skinwalker Ranch. Exclusively on Rise.TV during the “Dig Deep” Live Q&A segment, ask Ben and Jessica your questions directly. Finally, in the fan-favorite Top 10 Weirder News of the Week, hear hilarious and bizarre stories from Ben, such as a man whose phone saved his life, the Brit who declared himself president of his own country, the University of Iowa pledges who were spotted covered in food in a weird police video, and more. And as always, see you out… on the edge!
(Presented by TLPBLACK: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.) Huntress threat intelligence analyst Greg Linares shares insights on the modern ransomware ecosystem, including how crews operate like businesses and why Akira, Medusa, RansomHub, and Qilin cause so much damage. Plus, signs of overlap between ransomware and nation-state activity, what “time to ransom” really means for defenders, and why techniques like ClickFix and credential theft keep working at scale. The conversation also covers the surge in RMM tool abuse, how “living off the land” attacks can unfold without traditional malware, and the basic defenses smaller organizations can prioritize.
What if your burnout isn't random…What if your relationship patterns aren't fate…What if the version of you running your life simply isn't the right archetype for the job?In this episode of Chakras & Cusswords, we break down the 7 Feminine Archetypes through the 7 chakra system — and how each one lives inside your body.From the grounded stability of the Mother in the Root,to the sensual magnetism of the Lover in the Sacral,to the sovereign authority of the Queen in the Solar Plexus,to the intuitive power of the Mystic in the Third Eye,and the spiritual wisdom of the Crone in the Crown…This isn't surface-level “divine feminine” talk.We're getting real about:Where women give their power awayHow pleasure gets suppressedWhy boundaries feel hardAnd how to consciously choose which archetype leads each area of your lifeYou'll learn how to:✨ Identify which chakra is imbalanced✨ Recognize which archetype is running the show✨ Stop over-mothering your partner✨ Speak with Huntress-level clarity✨ Drop the Mystic back into the body✨ And crown your inner Queen where she belongsThis episode is part spiritual psychology, part shadow work, and part energetic reclamation.Because you are not meant to be one thing.You are meant to be the woman who can nurture, seduce, lead, speak, surrender — and walk away when necessary.Which chakra needs healing right now?Let's find out.
John Hammond was a kid who Googled "how to become a hacker" and took it seriously. He learned Python, found his way into the Coast Guard Academy, and remembers squaring down a stairwell at two in the morning - rigid military posture, full indoctrination protocol - vibrating with excitement because he was about to sit next to smart people and solve security problems for a living. That visceral, middle-of-the-night certainty became the foundation of everything that followed.Today he's a principal security researcher on the Adversary Tactics team at Huntress, employee number twenty-eight at a company that's now over six hundred people. He's also one of the most recognized cybersecurity educators on the internet, producing hour-long exploit deep dives on YouTube that get more genuine engagement than most vendors' entire content budgets combined.In this episode, John talks about why the cybersecurity industry is stuck on a treadmill it may never get off and whether the business model actually depends on that treadmill keeping pace.He explains why Huntress is deliberately slow about integrating AI into their human-led SOC and why that uncertainty is more credible than the confident claims coming from thousands of other cybersecurity vendors in the space.We also get into territory that most cybersecurity conversations gloss over.John makes the case that the security awareness gap isn't informational - the information exists, he's made it free on YouTube - it's motivational, and most training programs are built around what the security team thinks is important rather than what the end user actually cares about.He talks about why checklists function as a ceiling on curiosity, and why the discoveries that actually matter are the ones that never make it onto the procedure document.And he gets real about burnout - the arc from obsessive passion to unsustainable output that the industry celebrates in keynotes and ignores in its operational expectations.There's a moment near the end where I asked him to describe Huntress in three words and he gave me an internal mantra - ethical badasses - that says more about how the company thinks about culture as a competitive weapon than any mission statement ever could.This is a conversation about what happens when someone who never optimized for credibility becomes one of the most credible voices in the room.Listen and enjoy.A special thanks to our friends at Huntress for partnering with us to tell this story. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit audience1st.substack.com
The Huntress Podcast is back to talk classic trap cliffhangers, no ties to humanity villains and the awesome hero known as the Huntress. Summary by our own Diane Darcy: News of the Huntress allegedly killing a bank robber has spread like wildfire throughout the mainstream media, and Harry Sims once again castigates his girlfriend on how she handled a dangerous criminal irresponsibly. Fed up with her boyfriend's rebukes, Helena Wayne fires back at him by pointing out how he's losing perspective on a case where evidence of her involvement in the criminal's death is faulty at best. Upon Harry revealing that all of the criminals she's "tangled" with recently has ended up dead, Helena begins to take notice of a suspicious recurring pattern. If all of these criminals are "dying" on her, who is signing off on their death certificates and where are their funerals being held? Taking a closer look at each of the criminals profiles, she narrows down her suspects to the personnel of one funeral home in Gotham. The only one in town seemingly "interested" in these criminals. When the Huntress goes out to investigate the suspicious funeral home, what she sees next may be more than she had bargained for. Who is the Undertaker and why is he killing off all of these criminals she's been capturing? More importantly, what is he up to and why? Write to us at feathersandfoes@gmail.com www.patreon.com/wrightonnetwork https://wrightonnetwork.libsyn.com/website
Cybercrime's escalation has reached a projected $12.2 trillion annual impact by 2031, with a notable surge in remote monitoring and management (RMM) tool abuse—up 277% year-over-year, according to Huntress and supporting vendor reports. Attackers utilize legitimate IT tools to facilitate stealthier ransomware and phishing campaigns, amplifying structural vulnerabilities within MSP technology stacks. Key metrics from Acronis, WatchGuard, and Vectra AI indicate a shift to smaller, more evasive malware campaigns, longer times to ransomware deployment (averaging 20 hours), and widespread unaddressed security alerts, raising questions about the adequacy of current defenses and incident response practices. Vendor-supplied threat intelligence further shows that MSPs' reliance on signature-based platforms and insufficient visibility leaves them exposed to evolving attack techniques. Data reviewed suggests phishing footholds can quickly compromise cross-client environments, and legal ramifications heavily fall on the service provider when RMM or monitoring tools act as entry points. Notably, only about 58-60% of organizations report full visibility across their systems, with a majority of alerts remaining unaddressed, underscoring gaps in operational maturity and preparedness. Adjacent coverage highlighted Microsoft Copilot's repeated security control failures within regulated environments, specifically its inability to enforce sensitivity labels and boundaries across emails—most recently affecting the UK's National Health Service. The lack of vendor-announced architectural changes calls into question the viability of deploying AI tools in compliance-driven contexts. Separately, political and public backlash against surveillance technologies (such as Flock cameras) demonstrates that unchecked data collection is no longer a manageable passive risk, as data becomes increasingly actionable and retains liability beyond technical considerations. The practical takeaway for MSPs and IT leaders is a need to prioritize audit, documentation, and enforcement of controls within their technology stacks, especially where vendor tools or AI-driven automation intersect with compliance and client trust. Preserving operational optionality and scrutinizing vendor terms—particularly data sharing and architectural enforcement—are essential to reduce exposure. Waiting for vendor patches, disregarding documented control failures, or underestimating public scrutiny elevate liability across legal, reputational, and client relationship domains. Four things to know today: 00:00 Vendor Threat Reports Converge on One Risk MSPs Can't Outsource: The RMM as Breach Vector 05:11 Copilot Failed Compliance Controls Twice in Eight Months — A Patch Won't Fix That 07:03 Flock Backlash Exposes the Liability Hidden in Every Vendor Data-Sharing Contract 09:42 GTDC Summit: Distributors Pitch AI On-Ramp as Hyperscalers Compress Their Margin Sponsored by:
Text us your thoughts on the episode or the show!In this episode of Ops Cast, we explore a side of operations leadership that rarely appears in roadmaps or system diagrams but determines whether teams thrive or burn out.Kimi Corrigan, Vice President of Marketing Operations at Huntress, joins Michael Hartmann on our latest Ops Cast episode. Kimi shares her perspective on servant leadership, psychological safety, and the emotional intelligence required to lead effectively inside fast-growing, complex organizations.The conversation goes beyond tools and processes to focus on the human side of operations. Kimi discusses how to lead with empathy without lowering standards, how to navigate difficult conversations with honesty and accountability, and how to create sustainable team rhythms in environments that often default to constant firefighting.They also examine how ops leaders can enter new organizations thoughtfully, read culture before pushing change, and decide where to invest their energy early. Kimi shares where AI can genuinely support leadership development, not as a replacement for judgment, but as a tool for reflection, communication, and clarity.What you will learn: • How to balance servant leadership with high performance expectations • Why psychological safety is essential in ops teams • How to lead through growth and organizational transition • Ways to build sustainable team trust outside of crisis moments • The non-technical skills that prepare operators for leadership roles • Where AI can strengthen communication and self-awarenessIf you are leading a Marketing Ops team or aspiring to step into leadership, this episode highlights the interpersonal skills that often matter more than technical mastery.Be sure to subscribe, rate, and review Ops Cast, and join the conversation at MarketingOps.com.Episode Brought to You By MO Pros The #1 Community for Marketing Operations Professionals We're an official media partner of B2BMX 2026 — the B2B Marketing Exchange — happening March 9-11 at the Omni La Costa Resort in Carlsbad, CA. It's practitioner-focused with 50+ breakout sessions, keynotes, and hands-on workshops covering AI in B2B, GTM strategy, and advanced ABM. Real networking, real takeaways. And because we're a media partner, you get 20% off an All-Access Pass with code B2BMAOP at checkout. Head to b2bmarketing.exchange to grab your spot. MarketingOps.com is curating the GTM Ops Track at Demand & Expand (May 19-20, San Francisco) - the premier B2B marketing event featuring 600+ practitioners sharing real solutions to real problems. Use code MOPS20 for 20% off tickets, or get 35-50% off as a MarketingOps.com member. Learn more at demandandexpand.com.Support the show
Christie Green spends days at a time in the mountains, in the snow, tracking elk, solo. Her hunting journey began at 40 as a practical way to feed herself and her family, and became a fierce and fluid exploration of womanhood, motherhood, stewardship, intuition, listening and kinship. Christie wrote a memoir about her experiences called Moonlight Elk that I rapturously devoured, licking my fingertips with every turn of the page, it is that delicious.
Host Jason Blitman is joined by prolific author Kate Quinn to talk about her latest novel, The Astral Library. Conversation highlights include:
Sumate a la #ComunidadGUSIAN ingresando a gusian.arIAN LEE CRISIS EN VIDEO!Seguimos con el clásico de Jeph Loeb y Jim Lee amado y odiado casi por igual.Ian no decide si se queda con Thomas o con Killer Croc... aunque el coco gana puntos por lagarto.Ian ama a Huntress.Ian odia a Huntress.Bats y Catwoman chapan y todo es alegría.Próxima lectura: HUSH #5 y #5 (Batman #611 y #612)
The Huntress Podcast is back to talk about the final installment of the Checkmate vs. Huntress saga within the pages of Gotham Knights #40. Write to us at feathersandfoes@gmail.com We would love to hear from you. We would also like to hear from you if you read Batman: Gotham Knights back in the day. www.patreon.com/wrightonnetwork
GC13 and David discuss The Wolves Who Wandered from the second season of Adventure Time: Fionna and Cake. If men are from Mars, then Fionna and Fennel need to travel to Venus to rescue the ultimate source of love: DJ Flame. But not really. Thanks for that, Huntress. The broken tool has sought the flame though. Unfortunately she seeks the flame a little too hard, to the point where she really hurts Marshal. Ice cold, Fionna, ice cold.
Andrew Morgan of What's On Netflix & Recent Activity returns to review Sundance 2026 including big name films like Josephine starring Channing Tatum, Sony Pictures Classics acquisition Ha-Chan, Shake Your Booty!, Hanging By a Wire from Universal, Iliza Schlesinger's Chasing Summer and a bunch of other notable upcoming 2026 films. US DRAMATIC SECTION: Josephine, starring Channing Tatum & Gemma Chan, 2x Award Winner - 3:13 Carousel, starring Chris Pine & Jenny Slate - 14:23 Ha-Chan, Shake Your Booty! Acquired by Sony Pictures Classics - 21:38 Union County, starring Will Poulter & Noah Centineo - 27:09 Bedford Park, also acquired by Sony - 33:35 The Musical, starring Will Brill, Gillian Jacobs & Rob Lowe - 36:05 WORLD CINEMA: Shame and Money, Grand Jury Prize Winner - 43:28 Extra Geography, a funny coming of age movie from the UK - 45:57 The Huntress, a Mexican revenge thriller starring Adriana Paz - 52:13 Hold Onto Me, the Audience Award Winner - 54:33 To Hold A Mountain wins the Doc prize - 55:44 Hanging By A Wire is a major crowd pleaser - 57:47 US DOCS, NEXT & MIDNIGHT SECTIONS: Nuisance Bear expands on the Oscar Nominated short + Soul Patrol - 1:04:11 American Doctor is AlsoMike's highest rated film of the fest - 1:06:48 The Incomer, starring Domhnall Gleeson & Gayle Ranking - 1:10:07 Rock Springs, starring Kelly Marie Tran & Benedict Wong - 1:12:33 Leviticus, Saccharine & undertone: reviewing the reviewers - 1:14:32 PREMIERES SECTION: Chasing Summer, starring Iliza Schlesinger was a favorite for us - 1:16:07 & a rapid fire look at the rest of the Premieres Section - 1:18:49 This Segment includes our thoughts on receptions for The Only Living Pickpocket in NY, The Weight, The Invite, I Want Your Sex, Gail Daughtry and the Celebrity Sex Pass, The Shitheads, The Moment & The Gallerist. OUTRO: The Words of Wisdom today are to follow Andrew Morgan online. Andrew is a film critic for What's On Netflix: https://www.whats-on-netflix.com/author/andrew-morgan/ Andrew co-hosts Recent Activity: https://recent-activity.captivate.fm/listen And Recent Activity is now on YouTube! https://www.youtube.com/@RecentActPod Otherwise, you can follow us at MMO here: https://linktr.ee/mikemikeandoscar
Jessica Jones: The Cryptid Huntress - True Paranormal Investigations - Steve welcomes The Cryptid Huntress, Jessica Jones, to talk about her boots on the ground investigations into the paranormal. Find Jessica online: https://www.youtube.com/@TheCryptidHuntress and https://www.thecryptidhuntress.comBecome a supporter of this podcast: https://www.spreaker.com/podcast/missing-persons-mysteries--5624803/support.
The Sportsmaster and Huntress return... or should that be, make their debut? Find out as David and Peter cover the epic battle between the Dynamite Duo and Mr & Mrs Menace from Batman Family #7! Email us at theearth2podcast@gmail.com Facebook www.facebook.com/theearth2podcast Instagram www.instagram.com/theearth2podcast Twitter www.twitter.com/podcast_earth2 Leave us a Voicemail at www.speakpipe.com/theearth2podcast And we're now on Bluesky at https://bsky.app/profile/theearth2podcast.bsky.social #dccomics #dcmultiverse #Robin #Nightwing #Batgirl #Sportsmaster #Huntress #TheHuntress #Batman #BatmanFamily
In this episode of Run the Numbers, CJ sits down with Maria Izurieta, CFO of Huntress, to unpack what it really means to lead finance as a connective tissue across the organization. Drawing on experience across VC-backed, PE-owned, and public companies, Maria shares how she balances impact versus perfection, builds trust through small wins, and helps teams move from transactional finance to insight-driven decision making. They dig into data transparency, centralized BI, partnering with sales and marketing on revenue, and why the best CFOs unblock friction instead of becoming the “no” department — all while bringing a deeply people-first lens to scale.—SPONSORS:Abacum is a modern FP&A platform built by former CFOs to replace slow, consultant-heavy planning tools. With self-service integrations and AI-powered workflows for forecasting, variance analysis, and scenario modeling, Abacum helps finance teams scale without becoming software admins. Trusted by teams at Strava, Replit, and JG Wentworth—learn more at https://www.abacum.aiBrex is an intelligent finance platform that combines corporate cards, built-in expense management, and AI agents to eliminate manual finance work. By automating expense reviews and reconciliations, Brex gives CFOs more time for the high-impact work that drives growth. Join 35,000+ companies like Anthropic, Coinbase, and DoorDash at https://www.brex.com/metricsMetronome is real-time billing built for modern software companies. Metronome turns raw usage events into accurate invoices, gives customers bills they actually understand, and keeps finance, product, and engineering perfectly in sync. That's why category-defining companies like OpenAI and Anthropic trust Metronome to power usage-based pricing and enterprise contracts at scale. Focus on your product — not your billing. Learn more and get started at https://www.metronome.comRightRev is an automated revenue recognition platform built for modern pricing models like usage-based pricing, bundles, and mid-cycle upgrades. RightRev lets companies scale monetization without slowing down close or compliance. For RevRec that keeps growth moving, visit https://www.rightrev.comRillet is an AI-native ERP built for modern finance teams that want to close faster without fighting legacy systems. Designed to support complex revenue recognition, multi-entity operations, and real-time reporting, Rillet helps teams achieve a true zero-day close—with some customers closing in hours, not days. If you're scaling on an ERP that wasn't built in the 90s, book a demo at https://www.rillet.com/cjTabs is an AI-native revenue platform that unifies billing, collections, and revenue recognition for companies running usage-based or complex contracts. By bringing together ERP, CRM, and real product usage data into a single system of record, Tabs eliminates manual reconciliations and speeds up close and cash collection. Companies like Cortex, Statsig, and Cursor trust Tabs to scale revenue efficiently. Learn more at https://www.tabs.com/run—LINKS:Maria on LinkedIn: https://www.linkedin.com/in/maria-izurieta-909a3b/Company: https://www.huntress.com/CJ on LinkedIn: https://www.linkedin.com/in/cj-gustafson-13140948/Mostly metrics: https://www.mostlymetrics.com—RELATED EPISODES:How the Best CFOs Lead Without Being the CEO | Ken Stillwellhttps://youtu.be/O4cx9NBqQso—TIMESTAMPS:00:00:00 Preview and Intro00:01:01 Maria's Background00:03:09 People-First Team Building00:05:16 People, Process, Systems at Scale00:07:13 Removing Friction Outside Finance00:09:15 Data Transparency & Decision-Making00:11:06 Sponsors — Abacum | Brex | Metronome00:14:22 Forward-Deployed Data00:16:21 Centralized Data vs. Silos00:19:23 Finance as Data Steward00:21:08 Cost-to-Price Feedback Loop00:22:35 Curiosity Builds Credibility00:23:43 Sponsors — RightRev | Rillet | Tabs00:27:12 Trust First, Then Impact00:30:27 Celebrating Small Wins00:31:21 From Transactions to Insights00:33:00 CFO at the Revenue Table00:34:32 Educating the Org on Metrics00:36:21 Customer-Level Margin Reality00:37:13 Using Facts to Change Decisions00:38:27 Ownership Mindset in Growth Companies00:39:10 VC vs. PE vs. Public CFO Tradeoffs00:41:02 Operating Inside Constraints00:42:18 Finding Your Stage Fit00:44:17 Building a Personal Advisor Network00:46:43 Visibility and Women in Leadership00:47:44 Work–Life Integration, Not Balance00:48:45 Lightning Round: Biggest Mistake00:50:10 Advice to Younger Self00:51:36 Finance Tech Stack00:52:01 Craziest Expense Story00:52:44 Credits#RunTheNumbersPodcast #CFOLeadership #ScalingCompanies #DataDrivenDecisions #ExecutiveLeadership This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit cjgustafson.substack.com
Summary by Diane at https://www.helenawaynehuntress.com/2017/02/the-best-of-huntress-wonder-woman-302.html#more There is a new bank robber in town and his name is Pat Pending. Pat is no ordinary bank robber as he comes with some state-of-the-art technology that facilitate his thefts with little resistance. That is until he makes the mistake of hitting six banks in a row and grabs the attention of the Huntress! During his latest theft, he finds the Huntress waiting for him and engages him in a fight. Despite his arsenal, Pat Pending proves to be no match for the Huntress who knocks him out cold. However, he doesn't go down without pulling one last stunt of his own--one that gets the Huntress to flee in panic! Did Pat Pending take his own life, or did the Huntress go too far in her use of violence? And what does this disastrous exploit mean for Helena Wayne's relationship with Harry Sims who wants nothing more than for Helena to give up her alter ego? Helena Wayne knows she has a deeper mystery to unravel, but this is only the beginning! Let us know your thoughts about this story at feathersandfoes@gmail.com https://wrightonnetwork.libsyn.com/website www.patreon.com/wrightonnetwork
We dive into the first-ever Justice League America / Justice League Europe crossover, a landmark story that also kicks off Adam Hughes' legendary run on JLA. These issues feature the debut of Fire and Ice's iconic looks (although Fire's is basically regular clothes, two sizes too small), the Huntress and a new female Doctor Fate joining the team, appearances by the Spectre and Superman, the return of the Gray Man, and the introduction of Justice League's deadliest villain… Irwin Teasdale (actually, no). Along the way, we tackle the eternal question: is Batman a jerk, or not? These exciting issues (JLA #31–32 and JLE #7–9) by the incredible creative teams of Keith Giffen, J.M. DeMatteis, Adam Hughes, Bart Sears, William Messner-Loebs, and Art Nichols. You can follow us on Instagram: @comicsdiscourse114, Threads: @comicsdiscourse114, TikTok: https://www.tiktok.com/@comicsdiscourse114?_r=1&_t=ZT-91jpy3DIireFacebook: Facebook Comics Discourse 114 and X: https://x.com/comicsdiscourse?s=21 Also, please leave us a 5-star review at your favorite podcast platforms.
Today we are joined by Ben Folland, Security Operations Analyst from Huntress, discussing their work on "ClickFix Gets Creative: Malware Buried in Images." This analysis covers a ClickFix campaign that uses fake human verification checks and a realistic Windows Update screen to trick users into manually running malicious commands. The multi-stage attack chain leverages mshta.exe, PowerShell, and .NET loaders, ultimately delivering infostealers like LummaC2 and Rhadamanthys, with payloads hidden inside PNG images using steganography. While technically sophisticated, the campaign hinges on simple user interaction, underscoring the importance of user awareness and controls around command execution. The research can be found here: ClickFix Gets Creative: Malware Buried in Images Learn more about your ad choices. Visit megaphone.fm/adchoices
Place Ya Bets! Cal and Liam break down the return of Roulette and Meta-Brawl in "Grudge Match!" They'll discuss the Huntress and Black Canary's "frenemy" relationship, the DCAU's first trip to Bludhaven, and a surprise Bat Family cameo! All this, plus the Lads give their full score cards and preview next week's review on this latest JLU-themed episode of the DCAU Review!Please Consider Supporting the Podcast:Become a monthly or one time supporter of the pod at https://buymeacoffee.com/DCAUReviewSubscribe to the pod on Spotify or Apple Podcasts and please consider leaving us a 5-star reviewSubscribe to our new YouTube Channel https://www.youtube.com/@thedcaureviewpodcast5492Support the pod by picking up some merch at our shop https://dcaureview.myspreadshop.comFollow us: Twitter/X @DCAUReview Instagram @DCAUReview
Today we are joined by Ben Folland, Security Operations Analyst from Huntress, discussing their work on "ClickFix Gets Creative: Malware Buried in Images." This analysis covers a ClickFix campaign that uses fake human verification checks and a realistic Windows Update screen to trick users into manually running malicious commands. The multi-stage attack chain leverages mshta.exe, PowerShell, and .NET loaders, ultimately delivering infostealers like LummaC2 and Rhadamanthys, with payloads hidden inside PNG images using steganography. While technically sophisticated, the campaign hinges on simple user interaction, underscoring the importance of user awareness and controls around command execution. The research can be found here: ClickFix Gets Creative: Malware Buried in Images Learn more about your ad choices. Visit megaphone.fm/adchoices
GC13 and David discuss The Cat Who Tipped the Box from the second season of Adventure Time: Fionna and Cake. In the apartment it’s eat or be eaten, and Huntress Wizard isn’t about to let herself be eaten. Once she gets a bit bigger (to the point where snails aren’t a threat to her anyway) she also finds herself in the perfect position to distract Fionna. Huntress, Fionna doesn’t need help getting distracted. So, why can’t Prismo grant wishes anymore? And how is he keeping this a secret from Scarab?
In this episode of the 'Big Shot Bob Pod,' Robert Horry and his co-hosts dive into a variety of sports topics. They begin by discussing the Mount Rushmore of Oklahoma City Thunder players, following Shai Gilgeous-Alexander’s recent comments. They debate his choices and consider other players from the Seattle Supersonics era who could be included. Paul George's place on the list is particularly scrutinized by Rob and his co-hosts. Next, the conversation shifts to the scandal involving Michigan head coach Sheronne Moore. The hosts delve into the details of Moore’s downfall, including his affair with a staffer, how it led to his firing, and the personal consequences for all involved. They offer perspectives on the responsibilities of public figures and the implications of Moore's actions on his career and family life. The show wraps up with a discussion on potential NBA trades before the upcoming deadline. The co-hosts review a list of players rumored to be on the trading block, including Zion Williamson, James Harden, and Giannis Antetokounmpo. They analyze the likelihood and potential impact of these trades, focusing particularly on Trae Young, whom they believe is most likely to be moved. The hosts' insights provide a deep dive into the strategies teams might employ as they approach the critical trading period. 00:00 Introduction and Social Media Handles 02:11 OKC's Mount Rushmore Debate 05:38 Sheronne Moore Scandal Discussion 13:57 Power Dynamics and Personal Relationships 15:32 Trade Rumors and Predictions 18:56 Player Evaluations and Team Strategies 21:24 Future Moves and Speculations
This week, we continue our comprehensive coverage of the Frost and Fire V Festival in Ventura, California in October 2025. We resume the narrative on Day 2 with a trio of bands: Intranced, Blind Illusion and Early Moods. For each act, you will hear snippets of their studio output, live audio from the festival, and the impressions and reactions of the Night Demon guys. Listen in to hear about all the highs, the lows, the euphoria, and the snafus.LINKSIntranced "Switchblade" - SwitchbladeBlind Illusion "Straight as the Crowbar Flies" -Blind Illusion - Straight as the Crowbar Flies - Official Video 2021Early Moods - Music | Early Moods Listen at nightdemon.net/podcast or anywhere you listen to podcasts! Follow us on Instagram Like us on Facebook
The 2026 IPO market is heating up: John Jannarone and Evan Schlossman break down what to expect. John anticipates debuts from Kraken and OpenAI, while Evan is also watching Canva. Other expected names are Anthropic, Databricks, Huntress, SpaceX, and more tech companies. “We're seeing a huge amount of enthusiasm from investors,” Evan says. John notes capital raises from names like Anthropic, saying private markets are “red hot,” so retail investors need caution if these companies are continuing to look for funding. ======== Schwab Network ========Empowering every investor and trader, every market day.Options involve risks and are not suitable for all investors. Before trading, read the Options Disclosure Document. http://bit.ly/2v9tH6DSubscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about
GC13 and David discuss The Lion of Embers from the second season of Adventure Time: Fionna and Cake. Finn is safely in the Candy Kingdom, though there are an awful lot of princess who want to give him the reverse Snow White treatment. Huntress could use some of that lip moisture though, she’s currently dying of thirst literally while the princesses do so figuratively. Thankfully the universe provided and she survives, now it’s going to get good.
What if the most dangerous hackers are the ones who never touch a keyboard? The real threat isn't just about stolen credentials or ransomware; it's about understanding how attackers think before they even strike. In cybersecurity, defense starts with offense, and the best defenders are those who've walked in the hacker's shoes. In this episode, Ron sits down with John Hammond, principal security researcher at Huntress and one of cybersecurity's most recognizable educators. John shares his journey from Coast Guard enlistee to YouTube creator, building an entire media company around ethical hacking. They dig into the balance between public research and responsible disclosure, the rise of AI-augmented attacks, and why identity is now the biggest attack surface in modern enterprises. Impactful Moments: 00:00 - Introduction 01:00 - AI weaponized in cyber espionage 05:00 - Learning by teaching publicly 09:00 - Balancing curiosity with responsible disclosure 13:00 - Building a creator company 16:00 - Identity as the new frontier 20:00 - AI agents running breach simulations 22:00 - Predictions for cybersecurity in 2026 25:00 - Ron's hacking habit confession Links: John Hammond LinkedIn: https://www.linkedin.com/in/johnhammond010/ John Hammond Youtube: https://www.youtube.com/@_JohnHammond Article for Discussion: https://www.reuters.com/world/europe/russian-defense-firms-targeted-by-hackers-using-ai-other-tactics-2025-12-19/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
The Huntress Podcast is back to talk about Helena Bertinelli in the pages of Batman: Gotham Knights, where the secret government agency, Checkmate, is using some invasive techniques to coerce The Huntress into being their Queen, which could also lead the organization to The Batman. e-mail us at feathersandfoes@gmail.com Visit our website: https://wrightonnetwork.libsyn.com/website www.patreon.com/wrightonnetwork
GC13 and David discuss The Crocodile Who Bit a Log from the second season of Adventure Time: Fionna and Cake. This episode is definitely Huntress’s show, which we guess is good because she’s got herself together. (Well, after she got herself blown apart.) Green magic rules! Though it looks like there’s a lot more to green magic than she ever knew. In Fionna’s world she’s where she means to continue with most of the season: making trouble with the best of intentions! Thankfully Baby Finn survives her.
It's an ordinary day for Gotham's high school students as they attend a career day fair at their school. Also attending the event is Helena Wayne as a guest to talk about the law profession. The students are less than enthusiastic about the job prospects, prompting them to ask Helena what it is about her career that makes it "fun" for her. Helena answers the students' questions about the details of her job and then talks about what she "enjoys most" about it by very implicitly talking about her exploits as the Huntress. Helena gives an example of such a case by discussing an earlier exploit she made as the Huntress earlier that day - Diane Darcy Write to us at feathersandfoes@gmail.com https://wrightonnetwork.libsyn.com/website www.patreon.com/wrightonnetwork Bluesky: Huestone44
For the holiday break we are resurfacing some of our best episodes so far. Here is the best episode of season 3.Kyle left his job as a hacker at the NSA to launch Huntress. He bootstrapped for 3 years and burned all his savings. One of his co-founders quit. He got into an accelerator program, but had to sleep in his car for 16 weeks because he couldn't afford a hotel.Finally, 3 years in he'd hit $1.5M ARR. So he pitched 60 VCs for a Series A—and got 60 'no's. He was forced to raise a small, $1M inside round. But then things changed:2018: $1.5M ARR2019: $5M ARR2020: $10M ARR2021: $20M ARR2022: $40M ARR2023: $70M ARR2024: $100M+ ARRHuntress is valued at $2B.The investors who backed his $1M bridge are up 140x. Now every VC wants to invest—and Kyle's the one saying 'no'.Why you should listen: How to know whether you should keep going or quit.What it takes to get through the first few years at a bootstrapped startup.Why revenue expansion is a huge lever for fast-growth (Huntress has 140% net revenue retention).How starting a startup can impact your personal life and relationships.How to work with partners to sell to long tail SMB customers.Keywordsentrepreneurship, cybersecurity, product market fit, startup journey, military experience, SMB market, funding challenges, automation, human expertise, business growthTimestamps:(00:00:00) Intro(00:2:01) Working at the NSA(00:6:14) A big win in counter cyber terrorism(00:10:00) What gave way to Huntress(00:14:22) Pitching to a startup accelerator(00:16:29) Adopting curiosity(00:21:04) Getting ahead of cyber criminals(00:26:00) Starting to grow(00:32:50) Cult or conviction(00:35:00) It takes grit(00:39:50) Learning from people's lessons(00:42:20) Cockroaches and underdogs(00:46:10) Three strikes, I'm out(00:52:56) Having a military background(00:56:17) One piece of adviceSend me a message to let me know what you think!
Repost: Defending the Underdogs — Cybersecurity Lessons from Kyle Hanslovan (Huntress) This is a repost of an earlier episode of the Jess Larsen Show on Innovation & Leadership. In this episode, Jess Larsen sits down with Kyle Hanslovan, cybersecurity expert and CEO of Huntress, to unpack what it really takes to protect small and mid-sized businesses from modern cyber threats. Long before Huntress became a trusted name in defensive security, Kyle's journey began in the U.S. Air Force, continued through the intelligence community, and ultimately led him into the front lines of cybersecurity entrepreneurship. Kyle shares how thinking like an adversary—rather than just reacting to threats—became foundational to his approach, and why strong communication skills are just as critical as technical expertise in the security world. He also tells the origin story of Huntress: a real-world challenge, a bold proof-of-concept, and a clear realization that smaller organizations were dangerously underserved when it came to cyber defense. Even years later, this conversation remains strikingly relevant—offering timeless insights on leadership, problem-solving, and building mission-driven companies that protect the people most often overlooked. If you're interested in cybersecurity, entrepreneurship, or leadership forged under pressure, this episode is well worth revisiting. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of the HuntFishTravel Podcast, I sit down with Amy Siewe, better known as The Python Huntress. Amy is a professional python hunter working on the front lines of conservation in Florida, helping remove one of the most destructive invasive species in North America. We talk about how she went from real estate broker to full-time python hunter, what it's actually like to hunt massive snakes in the wild, and why this work is so critical to protecting native wildlife in the Everglades. We dive deep into how Burmese pythons ended up in Florida in the first place, the impact they've had on native mammals and ecosystems, what a real python hunt looks like, from spotlighting roads at night to catching snakes by hand, the largest python Amy has ever caught and a wild story to go with it, and how python hunting ties directly into scientific research and conservation. This episode is fascinating, intense, occasionally jaw-dropping (I probably said "bananas" way too many times to count), and deeply rooted in responsible conservation. Amy's respect for wildlife and the Everglades comes through loud and clear and I walked away with a whole new understanding of just how serious the python problem really is. Whether you're a hunter, angler, conservationist, or just someone who loves wild stories from the field, this is an episode you don't want to miss. Learn more or book a hunt: pythonhuntress.com Follow Amy's adventures: @thepythonhuntress on Instagram and @pythonhuntress on Facebook. Timestamps: 00:00 – 01:24 – Opening intro & setting the Everglades scene 01:24 – 02:37 – Meet Amy Siewe, The Python Huntress 02:37 – 04:05 – How Amy became a professional python hunter 04:05 – 05:48 – From thrill-seeking to conservation mission 05:48 – 07:16 – How Burmese pythons invaded Florida 07:16 – 08:47 – Population explosion & lack of predators 08:47 – 10:22 – How big pythons get (and how dangerous they could be) 10:22 – 12:18 – What pythons eat & ecosystem collapse 12:18 – 14:17 – Why the Everglades are the perfect python habitat 14:17 – 15:55 – How python hunts actually work 15:55 – 16:18 – Catching pythons by hand 16:18 – 17:30 – Spotting snakes at night 17:30 – 24:46 – The 17-foot, 110-pound python story 24:46 – 26:39 – Why live capture is necessary 26:39 – 29:07 – Research, data, and working with biologists 29:07 – 30:44 – Hair-raising moments in the field 30:44 – 31:39 – Licensing, legality, and invasive species rules 31:39 – 33:29 – Ethics, conservation, and respecting wildlife 33:29 – 35:25 – Booking a hunt & following Amy online 35:25 – 36:03 – Final thoughts & wrap-up
Steve welcomes The Cryptid Huntress, Jessica Jones, to talk about her boots on the ground investigations into the paranormal. Find Jessica online: https://www.youtube.com/@TheCryptidHuntress and https://www.thecryptidhuntress.comBecome a supporter of this podcast: https://www.spreaker.com/podcast/missing-persons-mysteries--5624803/support.
F&C S2E4 - Cake's tryna land some super weird TV spot with a bunch of tiny folks, and Fionna's hangover recovery becomes quite a hectic day!
The Huntress is kidnapped by Checkmate, who are trying to recruit her to join their organization/agency. Forced under certain hallucinogens by the Mad Hatter and Scarecrow, the leader of Checkmate is trying to psychoanalyze Helena via her responses. We know Helena is someone you can't make do anything. Even placing her in a padded room with a one way window can't keep this woman in confinement. Let us know what you thought about this issue and the Batman: Gotham Knights series as a whole at feathersandfoes@gmail.com https://wrightonnetwork.libsyn.com/website Bluesky: @huestone44 www.patreon.com/wrightonnetwork
Kyle Hanslovan is an award‑winning cyberwarfare expert, co‑founder of Huntress Labs, and a former NSA hacker whose real missions blur the line between espionage and war. In this eye‑opening episode, Kyle reveals the unfiltered truth about life inside America's most secretive spy agency — from being recruited at 17 to spearheading offensive hacking campaigns.In our first instalment, Hanslovan recounts clandestine operations where writing “software that kills” meant a bomb was the uninstaller. He explains how Wi‑Fi signals can map human bodies through walls and why $500 drones could soon be used for assassinations.From NSA tradecraft, AI war games, and DARPA's Cyber Grand Challenge to the emotional weight of counter‑terrorism and the ethics of intelligence after Snowden, Kyle pulls no punches. He compares NSA, CIA, FBI, and DEA missions, shares why he still calls the NSA the most ethical place he ever worked, and warns that private contractors like Palantir are iterating faster than the law can keep up.Support Kyle: https://www.kylehanslovan.comFollow Kyle: https://www.linkedin.com/in/kylehanslovan/Support Huntress: https://www.huntress.com/
Our favorite hero, The Huntress, is caught in the middle of a battle with two involving worlds, Earth One and Earth Two. Johnny Thunder's Earth 1 analogue, who is a nasty piece of work, has taken out the heavy hitters of the Justice League of America as well as the Justice Society of America with the help of the Thunderbolt, who is wreaking havoc...under protest, of course. Please share your thoughts with us about your experience with this two part crossover at feathersandfoes@gmail.com https://wrightonnetwork.libsyn.com/website www.patreon.com/wrightonnetwork
Find Tim Constantine & Six Sensory Podcast:https://open.spotify.com/show/3LVS0BihTLQDzb5DRtpx63?si=96Isq12bSkWh94CkRuKltwYouTube: https://youtube.com/@sixsensorypodcast?si=KXoO5h47Y1RErmoSPatreon: patreon.com/TimConstantine--------------------------------------------------------------------------------------------------To sign up for our Patreon go to-> Patreon.com/cultofconspiracypodcast To Join the Cajun Knight Patreon---> Patreon.com/cajunknight To Find The Cajun Knight Youtube Channel---> click hereTo Invest In Gold & Silver, CHECK OUT—-> Www.Cocsilver.com 10% OFF Rife Machine---> https://rifemachine.myshopify.com/?rfsn=7689156.6a9b5c To find the Meta Mysteries Podcast---> https://open.spotify.com/show/6IshwF6qc2iuqz3WTPz9Wv?si=3a32c8f730b34e79 50% OFF Adam&Eve products---> :adameve.com (promo code : CULT) To Sign up for our Rokfin go to --> Rokfin.com/cultofconspiracy Cult Of Conspiracy Linktree ---> https://linktr.ee/cultofconspiracyTo get 20% OFF GoodFeels THC Selzter----> shop.getgoodfeels.comBecome a supporter of this podcast: https://www.spreaker.com/podcast/cult-of-conspiracy--5700337/support.
Welcome to the latest Help Me With HIPAA episode where healthcare becomes the star of a suspense thriller, except the villains are hackers, and the plot twist? They really don't care how small your practice is. We're diving into Huntress' 2025 Cyber Threat Report, which basically confirms that if you're in healthcare, you've got a giant "Hack Me" sign taped to your digital forehead. From script-based exploits to info stealers with boundary issues, this episode breaks down how cyber threats are no longer knocking on the front door - they're already on the couch, eating your snacks, and stealing your patient data. More info at HelpMeWithHIPAA.com/535
Amazon has initiated legal action against Perplexity AI, alleging that the startup's AI browser improperly accesses Amazon customer accounts by mimicking human browsing behavior. The lawsuit, filed in the U.S. District Court for the Northern District of California, raises concerns about security risks associated with Perplexity's Comet browser. Amazon claims that this practice undermines customer experience and its curated shopping services. In response, Perplexity asserts that Amazon is leveraging its market dominance to stifle competition, emphasizing that user credentials are stored locally and not on their servers.In a related development, Microsoft researchers have introduced a new simulation environment called the Magentic Marketplace, aimed at evaluating the performance of AI agents. This initiative, developed in collaboration with Arizona State University, highlights vulnerabilities in current agentic models, particularly their ability to operate unsupervised and respond to complex scenarios. Initial experiments revealed that as customer agents faced increased options, their efficiency declined due to information overload, raising concerns about the practical application of AI agents in real-world settings.Additional updates include Netrix Global's acquisition of Ricoh's U.S. IT services business, marking Ricoh's exit from the managed services sector. This acquisition is expected to enhance Netrix's offerings and geographic reach, particularly in the Northeast and Southeast regions of the United States. Furthermore, several product announcements aimed at improving operational efficiency for MSPs were made, including Movila's Project Hub for project management and Huntress's support for Cybersecurity Maturity Model Certification compliance.For MSPs and IT service leaders, these developments underscore the importance of governance and compliance in the deployment of AI technologies. The legal dispute between Amazon and Perplexity highlights the need for clarity around user data handling and the implications of automated systems. Additionally, the acquisition of Ricoh's IT services by Netrix serves as a reminder of the challenges in the managed services market, emphasizing the necessity for specialization and operational efficiency. Vendors are increasingly recognizing the need to provide practical support tools that enhance operational capabilities rather than merely offering security solutions.Four things to know today00:00 Amazon Says Perplexity's AI Went Too Far — and Microsoft Just Proved Why Agents Still Struggle04:26 Ricoh's Out, Netrix Is In — Another Big Shift in the MSP Landscape06:18 Three New AI Tools Drop for MSPs—But Only One Might Actually Matter09:20 Project Templates, Compliance Docs, and Pay-as-You-Go: Vendors Focus on MSP Basics This is the Business of Tech.
Season 4, Episode 3She's powerful, protective, and dare I say a little rebellious? In this episode we're getting into the Fiery Huntress Archetype. Links:Wondering which archetype you are? Take the Feminine Survival Archetypes Quiz here: https://www.jessicaashwellness.com/quizAre you a Fiery Huntress in need of a little support? Check out your archetype bundle here: https://www.jessicaashwellness.com/bundles/p/fieryhuntress Connect: Follow me @jessicaashwellness on Instagram: https://www.instagram.com/jessicaashwellness/