1983 film by Paul Brickman
POPULARITY
Categories
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: Shai-Hulud worm propagates via npm and steals credentials Jaguar Land Rover attack may put smaller suppliers out of business Leaked data emerges from the vendor behind the Great Firewall of China Vastaamo hacker walks free while appeal is underway Why is a senator so mad about Kerberos? This week's episode is sponsored by Knocknoc. Chief exec Adam Pointon joins to talk through the surprising number of customers that are using Knocknoc's identity-to-firewall glue to protect internal services and networks. This week's episode is also available on Youtube. Show notes Self-Replicating Worm Hits 180+ Software Packages – Krebs on Security Jaguar Land Rover: Some suppliers 'face bankruptcy' due to hack crisis Jaguar Land Rover production shutdown could last until November U.S. Investors, Trump Close In on TikTok Deal With China - WSJ U.S. Investors, Trump Close In on TikTok Deal With China - WSJ How China's Propaganda and Surveillance Systems Really Operate | WIRED Mythical Beasts: Diving into the depths of the global spyware market - Atlantic Council Hacker convicted of extorting 20,000 psychotherapy victims walks free during appeal | The Record from Recorded Future News US national charged in Finnish psychotherapy center extortion | The Record from Recorded Future News BreachForums administrator given three-year prison stint after resentencing | The Record from Recorded Future News Microsoft, Cloudflare disrupt RaccoonO365 credential stealing tool run by Nigerian national | The Record from Recorded Future News Senator blasts Microsoft for making default Windows vulnerable to “Kerberoasting” - Ars Technica Exclusive: US warns hidden radios may be embedded in solar-powered highway infrastructure | Reuters Israel announces seizure of $1.5M from crypto wallets tied to Iran | TechCrunch
The employment law landscape is evolving rapidly, especially for health care employers. Timothy A. Hilton, Partner, Husch Blackwell LLP, and Gary McLaughlin, Partner, Mitchell Silberberg & Knupp LLP, discuss the areas of greatest concern for health care employers. They cover wage and hour issues, considerations related to remote work, and religious and ADA accommodation issues. Timothy and Gary spoke about this topic at AHLA's 2025 Annual Meeting in San Diego, CA.Watch this episode: https://www.youtube.com/watch?v=T_ltW2fsTWoLearn more about the AHLA 2025 Annual Meeting that took place in San Diego, CA: https://www.americanhealthlaw.org/annualmeeting Essential Legal Updates, Now in Audio AHLA's popular Health Law Daily email newsletter is now a daily podcast, exclusively for AHLA Premium members. Get all your health law news from the major media outlets on this podcast! To subscribe and add this private podcast feed to your podcast app, go to americanhealthlaw.org/dailypodcast. Stay At the Forefront of Health Legal Education Learn more about AHLA and the educational resources available to the health law community at https://www.americanhealthlaw.org/.
In this sponsored Soap Box edition of the Risky Business podcast, industry legend HD Moore joins the show to talk about runZero's major push into vulnerability management. With its new Nuclei integration, runZero is now able to get a very accurate picture of what's vulnerable in your environment, without spraying highly privileged credentials at attackers on your network. It can also integrate with your EDR platform, and other data sources, to give you powerful visibility into the true state of things on your network and in your cloud. This episode is also available on Youtube. Show notes
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: Apple ruins exploit developers' week with fresh memory corruption mitigations Feross Aboukhadijeh drops by to talk about the big, dumb npm supply chain attack Salesloft says its GitHub was the initial entry point for its compromise Sitecore says people should “patch” its using-the-keymat-from-the-documentation “zero day” Rogue certs for 1.1.1.1 appear to be just (stupid) testing Jaguar Land Rover ransomware attackers are courting trouble This week's episode is sponsored by open source cloud security tool, Prowler. Founder Toni de la Fuente joins to discuss their new support for Microsoft 365. Time to point Prowler at your OneDrive and Sharepoint! This episode is also available on Youtube. Show notes Blog - Memory Integrity Enforcement: A complete vision for memory safety in Apple devices - Apple Security Research Venezuela's president thinks American spies can't hack Huawei phones | TechCrunch 18 Popular Code Packages Hacked, Rigged to Steal Crypto – Krebs on Security Software packages with more than 2 billion weekly downloads hit in supply-chain attack - Ars Technica Salesloft platform integration restored after probe reveals monthslong GitHub account compromise | Cybersecurity Dive CISA orders federal agencies to patch Sitecore zero-day following hacking reports | The Record from Recorded Future News SAP warns of high-severity vulnerabilities in multiple products - Ars Technica The number of mis-issued 1.1.1.1 certificates grows. Here's the latest. - Ars Technica Cyberattack on Jaguar Land Rover threatens to hit British economic growth | The Record from Recorded Future News Cyberattack forces Jaguar Land Rover to tell staff to stay at home | The Record from Recorded Future News Bridgestone Americas continues probe as it looks to restore operations | Cybersecurity Dive Qantas penalizes executives for July cyberattack | The Record from Recorded Future News Cyber Command, NSA to remain under single leader as officials shelve plan to end 'dual hat' | The Record from Recorded Future News GOP Cries Censorship Over Spam Filters That Work – Krebs on Security Risky Bulletin: APT report? No, just a phishing test! - Risky Business Media Post by @patrick.risky.biz — Bluesky
NFL fans everywhere are outraged at commercials being added to the Redzone channel, a healthcare worker down South saved a raccoon after it got drunk behind a distillery, we found a remedy for car sickness, read our Penny Power "Peeves of the Week," and hit the phones to share stories about the riskiest things we've ever done! See omnystudio.com/listener for privacy information.
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: The Salesloft breach and why OAuth soup is a problem The Salt Typhoon telco hackers turn out to be Chinese private sector, but state-directed Google says it will stand up a “disruption unit” Microsoft writes up a ransomware gang that's all-in on the cloud future Aussie firm hot-mics its work-from-home employees' laptops Youtube scam baiters help the feds take down a fraud ring This episode is sponsored by Dropzone.AI. Founder and CEO Edward Wu joins the show to talk about how AI driven SOC tools can help smaller organisations claw their way above the “security poverty line”. A dedicated monitoring team, threat hunting and alert triage, in a company that only has a couple of part time infosec people? Yes please! This episode is also available on Youtube. Show notes The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft – Krebs on Security Salesloft: The Leading AI Revenue Orchestration Platform Palo Alto Networks, Zscaler customers impacted by supply chain attacks | Cybersecurity Dive The impact of the Salesloft Drift breach on Cloudflare and our customers China used three private companies to hack global telecoms, U.S. says CSA_COUNTERING_CHINA_STATE_ACTORS_COMPROMISE_OF_NETWORKS.PDF Google previews cyber ‘disruption unit' as U.S. government, industry weigh going heavier on offense | CyberScoop Ransomware gang takedowns causing explosion of new, smaller groups | The Record from Recorded Future News Hundreds of Swedish municipalities impacted by suspected ransomware attack on IT supplier | The Record from Recorded Future News Storm-0501's evolving techniques lead to cloud-based ransomware | Microsoft Security Blog The Era of AI-Generated Ransomware Has Arrived | WIRED Between Two Nerds: How threat actors are using AI to run wild - YouTube Affiliates Flock to ‘Soulless' Scam Gambling Machine – Krebs on Security UK sought broad access to Apple customers' data, court filing suggests ICE reactivates contract with spyware maker Paragon | TechCrunch WhatsApp fixes 'zero-click' bug used to hack Apple users with spyware | TechCrunch Safetrac turned staff laptops into covert recording devices to monitor WFH Risky Bulletin: YouTubers unmask and help dismantle giant Chinese scam ring - Risky Business Media
In this conversation, Eric and Andy discuss the complexities and challenges faced in construction projects, particularly focusing on risk management, equipment delays, and unexpected complications. They share insights from a recent project involving HVAC equipment replacement and the impact of supply chain issues on timelines and costs. The discussion emphasizes the importance of assessing risks and planning for unforeseen circumstances in the construction industry.Send us a textSend us your feedback or topic ideas over on our social channels!Eric Aune @mechanicalhub Andy Mickelson @mick_plumbNewsletter sign up: https://bit.ly/MH_email
AI can accelerate a fully digital supply chain, but it can also bring cyberattacks, ethical dilemmas, and sustainability risks. Zero100 Principal Analyst Suzanne Lindsay and VPs, Research Geraint John and Kelly Coutinho explore the threats faced by leaders today and what they can do to protect their organizations.Why cybersecurity is the CSCO's problem after all (02:47) Fighting AI threats with AI (06:29) A blueprint for cyber-resilient supply chains (09:10) Can AI power true sustainability? (12:01) Safeguarding the human workforce in the agentic AI era (18:01) The dark side vs the gains: Striking the AI balance (20:24)
GUEST: John Hinze, Director of Corporate Finance at the B.C Securities Commission Learn more about your ad choices. Visit megaphone.fm/adchoices
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: Australia expels Iranian ambassador Hackers sabotage Iranian shipping satcoms APT hacker got doxxed in Phrack. Kind of. They're probably Chinese, not DPRK? Trail of Bits uses image-downscaling to sneak prompts into Google Gemini The Com's King Bob gets ten years in the slammer It's a day that ends in -y, so of course there's a new Citrix Netscaler RCE being used in the wild. This week's episode is brought to you by Corelight. Chief Strategy Officer Greg Bell talks through how they've been implementing AI for sifting through your network data. A model-context-protocol server that can rummage in all those packet logs for you while you keep investigating? Yes please. This episode is also available on Youtube. Show notes Embassy staff flee Canberra in dead of night | news.com.au — Australia's leading news site for latest headlines Swedish security service says Iran uses criminal networks in Sweden | Reuters Risky Bulletin: Hackers sabotage Iranian ships at sea, again - Risky Business Media Microsoft scales back Chinese access to cyber early warning system | Reuters Microsoft Didn't Disclose Key Details to U.S. Officials of China-Based Engineers, Record Shows — ProPublica .:: Phrack Magazine ::. Uncovering the Chinese Proxy Service Used in APT Campaigns Weaponizing image scaling against production AI systems -The Trail of Bits Blog FBI, Cisco warn of Russia-linked hackers targeting critical infrastructure organizations | Cybersecurity Dive CrowdStrike warns of uptick in Silk Typhoon attacks this summer | CyberScoop Kevin Beaumont: "There's a bunch of new Netscal…" - Cyberplace US charges Oregon man in vast botnet-for-hire operation | Cybersecurity Dive South Korea arrests suspected Chinese hacker accused of targeting BTS singer and other celebrities | The Record from Recorded Future News SIM-Swapper, Scattered Spider Hacker Gets 10 Years – Krebs on Security Chinese national who sabotaged Ohio company's systems handed four-year jail stint | The Record from Recorded Future News Nevada state offices close after wide-ranging 'network security incident' | Reuters DSLRoot, Proxies, and the Threat of ‘Legal Botnets' – Krebs on Security Russia weighs Google Meet ban as part of foreign tech crackdown | The Record from Recorded Future News Kremlin-Mandated Messaging App Max Is Designed To Spy On Users Иеромонах РПЦ Макарий призвал помолиться за мессенджер MAX
When Bob Eidman is found executed in his office in broad daylight, the people of St. Charles are terrified a cold-blooded killer is on the loose. But when police discover Bob's secret life, they expose a slew of suspects with motive for murder Hosted on Acast. See acast.com/privacy for more information.
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: Oracle's long term CSO departs, and we're not that sad about it Canada's House of Commons gets popped through a Microsoft bug Russia degrades voice calls via Whatsapp and Telegram to push people towards Max South-East Asian scam compounds are also behind child sextortion Reports that the UK has backed down on Apple crypto are… strange Oh and of course there's a Fortinet bug! There's always a Fortinet bug! This week's episode is sponsored by open source identity provider Authentik. CEO Fletcher Heisler joins the show this week, and explains the journey of implementing SSO backed login on Windows, Mac and Linux. You'll never guess which one was a few lines of PAM config, and which was a multi-month engineering project! This episode is also available on Youtube. Show notes Is Oracle facing headwinds? After layoffs, its 4-decade veteran Chief Security Officer Mary Ann Davidson departs Oracle CSO blasted over anti-security research rant - iTnews New York lawsuit against Zelle creator alleges features allowed $1 billion in thefts | The Record from Recorded Future News Mobile Phishers Target Brokerage Accounts in ‘Ramp and Dump' Cashout Scheme – Krebs on Security How we found TeaOnHer spilling users' driver's licenses in less than 10 minutes | TechCrunch UK has backed down on demand to access US Apple user data, spy chief says DNI Tulsi Gabbard on X: "As a result, the UK has agreed to drop its mandate for" Hackers target Workday in social engineering attack Russia curbs WhatsApp, Telegram calls to counter cybercrime | The Record from Recorded Future News Hackers reportedly compromise Canadian House of Commons through Microsoft vulnerability | The Record from Recorded Future News Norway police believe pro-Russian hackers were behind April dam sabotage | The Record from Recorded Future News US agencies, international allies issue guidance on OT asset inventorying | Cybersecurity Dive FortMajeure: Authentication Bypass in FortiWeb (CVE-2025-52970) U.S. State Dept - Near Eastern Affairs on X: "He did not claim diplomatic immunity and was released by a state judge" 493 Cases of Sextortion Against Children Linked to Notorious Scam Compounds | WIRED .:: Phrack Magazine ::. Accenture to buy Australian cyber security firm CyberCX - iTnews
Anna Davlantes, WGN Radio's investigative correspondent, joins Bob Sirott to share what happened this week in Chicago history. Stories include the opening of Charlie Trotter’s, Ozzy Osbourne’s special Wrigley Field performance, Tom Skilling’s debut on WGN-TV, and more.
In this Soap Box edition of the Risky Business podcast Patrick Gray chats with Socket founder Feross Aboukhadijeh about how to measure the reachability of vulnerabilities in applications. It's great to know there's a CVE in a library you're using, but it's even better if you can say whether or not that vulnerability actually impacts your application. They also talk about how Socket started out as a way to discover malicious packages in software projects, but these days it's playing the CVE game as well. This episode is also available on Youtube. Show notes
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: CISA warns about the path from on-prem Exchange to the cloud Microsoft awards a crisp zero dollar bill for a report about what a mess its internal Entra-authed apps are Everyone and their dog seems to have a shell in US Federal Court information systems Google pays $250k for a Chrome sandbox escape Attackers use javascript in adult SVG files to … farm facebook likes?! SonicWall says users aren't getting hacked with an 0day… this time. This week's episode is sponsored by SpecterOps. Chief product officer Justin Kohler talks about how the flagship Bloodhound tool has evolved to map attack paths anywhere. Bring your own applications, directories and systems into the graph, and join the identity attacks together. This episode is also available on Youtube. Show notes CISA, Microsoft issue alerts on ‘high-severity' Exchange vulnerability | The Record from Recorded Future News Advanced Active Directory to Entra ID lateral movement techniques Consent & Compromise: Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications Cartels may be able to target witnesses after major court hack Federal judiciary tightens digital security as it deals with ‘escalated cyberattacks' | The Record from Recorded Future News Citrix NetScaler flaws lead to critical infrastructure breaches | Cybersecurity Dive DARPA touts value of AI-powered vulnerability detection as it announces competition winners | Cybersecurity Dive Buttercup is now open-source! HTTP/1.1 must die: the desync endgame US confirms takedown of BlackSuit ransomware gang that racked up $370 million in ransoms | The Record from Recorded Future News North Korean cyber-espionage group ScarCruft adds ransomware in recent attack | The Record from Recorded Future News Adult sites are stashing exploit code inside racy .svg files - Ars Technica Google pays 250k for Chromium sandbox escape SonicWall says recent attack wave involved previously disclosed flaw, not zero-day | Cybersecurity Dive Two groups exploit WinRAR flaws in separate cyber-espionage campaigns | The Record from Recorded Future News Tornado Cash cofounder dodges money laundering conviction, found guilty of lesser charge | The Record from Recorded Future News Hackers Hijacked Google's Gemini AI With a Poisoned Calendar Invite to Take Over a Smart Home | WIRED Malware in Open VSX: These Vibes Are Off How attackers are using Active Directory Federation Services to phish with legit office.com links Introducing our guide to phishing detection evasion techniques The State of Attack Path Management
You can now text us anonymously to leave feedback, suggest future content or simply hurl abuse at us. We'll read out any texts we receive on the show. Click here to try it out!Welcome back to Bad Dads Film Review! This week we're donning our Ray-Bans, sliding across the living room floor, and revisiting the film that launched Tom Cruise into superstardom — Risky Business (1983). Equal parts coming-of-age comedy, satire, and cautionary tale, it's a movie that defined a certain brand of 80s cool while slyly critiquing the era's obsession with wealth and success.Directed by Paul Brickman, Risky Business follows Joel Goodson (Tom Cruise), a high-achieving Chicago high school student left home alone while his parents are away. Initially envisioning a week of harmless fun, things spiral after a night with call girl Lana (Rebecca De Mornay) leads Joel into a world of escalating consequences, entrepreneurial schemes, and moral compromises.What begins as a teenage fantasy of freedom and rebellion becomes a sharply observed journey into adulthood — and a satire of the “make it big” mentality that fuelled the 80s.While it has that glossy 80s comedy appeal, Risky Business is far smarter and more cynical than it first appears. It's one of those films that teenage audiences might take at face value as a tale of freedom and rebellion, but adults will recognise as a sharp social critique. That said, it's very much an R-rated outing — so maybe not one for family movie night.In the end, Risky Business is more than just a star-making turn for Tom Cruise. It's a stylish, clever, and surprisingly subversive look at ambition, temptation, and the thin line between opportunity and exploitation.
We like a sure thing. We like to know that whatever we do will succeed. But the reality is that we have no such guarantees in life. But when we try to play it safe and avoid taking risks, the only thing we succeed in doing is nothing. Jesus expects his followers to have a bias for action. Serving God by serving others doesn't guarantee success from the world's perspective, but it open's the door to God's approval. In the Kingdom, the biggest risk you take is taking no risks at all.
I talked with my guest about adopting and managing legal technology with an eye toward law firm ethics. Episode Highlights 03:51 - Essential Legal Tech Tools 06:00 - Vendor Partnership Program at alps 06:51 - Wire Fraud and Its Risks 07:59 - Deepfake Scams in Transactions 09:23 - Technology Integration Challenges 10:05 - Importance of Tech Training 13:23 - Tech Adoption Barriers for Lawyers 15:28 - Vetting Tech Vendors for Security 18:11 - Younger Lawyers and Tech Challenges 19:29 - Importance of Processes and Workflows 20:47 - Vetting Software for Risk Reduction 25:51 - Selecting Malpractice Insurance 27:59 - Necessity of Cyber Insurance Episode Resources Connect with Jared Correia jared@redcavelegal.com https://redcavelegal.com/ https://www.linkedin.com/in/jaredcorreia https://twitter.com/RedCaveLegal www.linkedin.com/in/jaredcorreia/ Connect with Rio Laine https://www.alpsinsurance.com/
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news. Google security engineering VP Heather Adkins drops by to talk about their AI bug hunter, and Risky Business producer Amberleigh Jack makes her main show debut. This episode explores the rise of AI-powered bug hunting: Google's Project Zero and Deepmind team up to find and report 20 bugs to open source projects The XBOW AI bug hunting platform sees success on HackerOne Is an AI James Kettle on the horizon? There's also plenty of regular cybersecurity news to discuss: On-prem Sharepoint's codebase is maintained out of China… awkward! China frets about the US backdooring its NVIDIA chips, how you like ‘dem apples, China? SonicWall advises customers to turn off their VPNs Hardware controlling Dell laptop fingerprint and card readers has nasty driver bugs Russia uses its ISPs to in-the-middle embassy computers and backdoor ‘em. The Russian government pushes VK's Max messenger for everything This week's show is sponsored by device management platform Devicie. Head of Solutions Sean Ollerton talks through the impending Windows 10 apocalypse, as Microsoft ends mainstream support. He says Windows 11 isn't as scary as people make out, but if the update isn't on your radar now, time is running out. This episode is also available on Youtube. Show notes Google says its AI-based bug hunter found 20 security vulnerabilities | TechCrunch Is XBOW's success the beginning of the end of human-led bug hunting? Not yet. | CyberScoop James Kettle on X: "There I am being careful to balance hyping my talk without going too far and then this gets published
From cold plunges to booty bands, 75 Hard to walking pads — the fitness world is flooded with trends claiming to be the next big thing. But are they actually worth your time… or just another fast track to burnout, boredom, or broken knees? In this episode, we put 20 of the most popular fitness fads on trial. No filters — just real talk, bold opinions, and honest takes on what's actually helpful… and what's total nonsense. We cover: The real deal with 12-3-30 Whether HIIT every day is helping or hurting you Why some trends are all hype and no science The hidden risks behind influencer workouts And the one trend we secretly love (but kind of hate ourselves for it) If you've ever wondered, “Should I be doing that too?” — this one's for you. Tune in, laugh a little, and walk away knowing which trends are worth your energy… and which belong in the trash. Because when it comes to your health, clarity beats chaos. Every time. APPLY FOR COACHING: https://www.lvltncoaching.com/1-1-coaching SDE Method app: https://www.lvltncoaching.com/sde-method-app Project B Waiting List https://quest.lvltncoaching.com/project-b Macros Guide https://www.lvltncoaching.com/free-resources/calculate-your-macros Join the Facebook Community: https://www.facebook.com/groups/lvltncoaching FREE TOOLS to start your health and fitness journey: https://www.lvltncoaching.com/resources/freebies Alessandra's Instagram: http://instagram.com/alessandrascutnik Joelle's Instagram: https://www.instagram.com/joellesamantha?igsh=ZnVhZjFjczN0OTdn Josh's Instagram: http://instagram.com/joshscutnik Chapters: 00:00 Introduction to Fitness Trends 02:30 75 Hard: Mental Toughness or Burnout? 09:00 Walking Pads: Productivity or Distraction? 12:50 Carnivore Diet: Survival Mode or Nonsense? 14:29 High Rep, Lightweight Workouts: Are They Effective? 18:53 10,000 Steps a Day: Myth or Reality? 24:41 Energy Drinks: Boost or Burden? 30:59 Refreshing Mocktails and Hydration Choices 33:01 Caffeine: Energy Blocker or Performance Enhancer? 34:04 Barefoot Training: Trendy or Beneficial? 36:46 Fasted Cardio: Effective or Unnecessary? 42:36 Running Safety and Awareness 45:47 Booty Bands: Effective Tool or Marketing Gimmick? 48:10 HIIT: Efficient Fat Loss or Stress Inducer? 48:39 The Influence of HRV on Workouts 49:26 Pros and Cons of Influencer Workouts 50:40 Cold Plunges and Ice Baths: A Personal Perspective 51:57 Exploring Red Light Therapy 53:54 The Myths of Sweating and Fat Loss 55:17 Ankle Weights: Functional Boost or Risky Business? 55:58 Group Fitness Classes: Community or Chaos? 57:27 The 12-3-30 Treadmill Method: A Trend or Effective Workout? 59:32 Smartwatches and HRV: Helpful Tool or Mental Trap? 01:02:30 Fitness Challenges: Jumpstart or Yo-Yo Effect? 01:05:00 Peloton: Game-Changer or Overpriced Spin Cult?
In hour four, remembering "Risky Business" and why Appel still has not scene it. Also, remembering the good times with Matt Mervis and The Marlins.
Put on your Ray-Bans, rev up the Porsche, and crank up the Tangerine Dream! It's time for the movie that made Tom Cruise a star, which somehow Javi and Paul had never seen! Listen as they, with the help of ever-patient Producer Brad, get past their preconceived notions and are rewarded with a teen sex comedy that has more in common with Blue Velvet than Porky's. Suburban high school senior Joel (Cruise), afflicted with anxiety about getting into Princeton and left home alone by his materialistic parents, is prodded by devil-on-his-shoulder pal Miles (Curtis Armstrong) down the path to some Risky Business in the form of call girl Lana (Rebecca De Mornay), who turns Joel's home into a brothel. Is it a swooning love letter to capitalism, or subversive indictment of it, or both? Javi and Paul marvel and muse at this unexpectedly layered, nuanced, and finely crafted film rife with symbolism, sex positivity, delightful dream sequences, awesome needle drops, surprisingly positive trans representation, a crystal egg, and a young Joe Pantoliano as Guido the Killer Pimp. There is no substitute!Show Notes:1983 Box OfficeAugust 5-7, 1983, Weekend Box OfficeRisky Business Box Office ResultsHollywood Reporter excerpts from Curtis Armstrong's 2017 memoir, Revenge of the Nerd.Top 100 Stars in Leading roles at the Domestic Box OfficeFollow us!InstagramBlueskyemail: Multiplexoverthruster@gmail.com Hosted on Acast. See acast.com/privacy for more information.
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: Did the SharePoint bug leak out of the Microsoft MAPP program? Expel retracts its FIDO bypass writeup The mess surrounding the women-only dating-safety app Tea gets worse Broadcom customers struggle to get patches for VMWare hypervisor escapes Aeroflot gets hacked by the Cyber Partisans, disrupting flights This week's episode is sponsored by Push Security. Satisfied Push customer Daniel Cuthbert from Santander Bank joins on their behalf. He explains how having telemetry about identity from inside the browser is a key pillar for investigating intrusions in the browser-centric future. This episode is also available on Youtube. Show notes Microsoft Probing Whether Cyber Alert Tipped Off Chinese Hackers Microsoft says Warlock ransomware deployed in SharePoint attacks as governments scramble | The Record from Recorded Future News What we know about the Microsoft SharePoint attacks | Cybersecurity Dive An important update (and apology) on our PoisonSeed blog Tea User Files Class Action After Women's Safety App Exposes Data A Second Tea Breach Reveals Users' DMs About Abortions and Cheating Top Lawyer for National Security Agency Is Fired From Help Desk to Hypervisor: Defending Your VMware vSphere Estate from UNC3944 VMware prevents some perpetual license holders from downloading patches Pro-Ukrainian hackers take credit for attack that snarls Russian flight travel - Ars Technica КИБЕРУДАР ПО АЭРОФЛОТУ РФ!v Treasury sanctions North Koreans involved in IT-worker schemes | Cybersecurity Dive Minnesota governor activates National Guard amid St. Paul cyberattack | StateScoop Outage was result of cyberattack, Post Luxembourg says Clorox files $380 million suit blaming Cognizant for 2023 cyberattack | Cybersecurity Dive Cisco network access security platform vulnerabilities under active exploitation | CyberScoop Arizona woman sentenced to 8.5 years for running North Korean laptop farm | The Record from Recorded Future News Cybercrime forum Leak Zone publicly exposed its users' IP addresses | TechCrunch
BT and Sal ignite a fiery debate on whether the New York Mets should turn to familiar faces to bolster their roster. From a potential reunion with Severino to considering other past players, the duo dissects the risks and rewards of bringing back former Mets. The discussion also touches on the delicate balance of trusting young talent versus acquiring proven, albeit familiar, veterans to make a push for the postseason.
Risky Biz returns after two weeks off, and there sure is cybersecurity news to catch up on. Patrick Gray and Adam Boileau discuss: Microsoft tried to make outsourcing the Pentagon's cloud maintenance to China okay (it was not) She shells Sharepoint by the sea-shore (by ‘she' we mean ‘China') Four (alleged) Scattered Spider members arrested (and bailed) in the UK Hackers spend $2700 to buy creds for a Brazilian payment system, steal $100M Fortinet has SQLI in the auth header, Citrix mem leak is weaponised, HP hardcodes creds and Sonicwalls get user-moderootkits. Just security vendor things! This week's episode is sponsored by Airlock Digital. CEO David Cottingham talks through what it takes to build a mature, resilient management platform for a security critical system. This episode is also available on Youtube. Show notes Update on DOD's cloud services Microsoft to stop using engineers in China for tech support of US military, Hegseth orders review A Little-Known Microsoft Program Could Expose the Defense Department to Chinese Hackers While DOD policy bans unauthorized apps like TikTok from being on employees phones over national security risks Microsoft Fix Targets Attacks on SharePoint Zero-Day – Krebs on Security National Guard was hacked by China's 'Salt Typhoon' group, DHS says Suspected contractor for China's Hafnium group arrested in in Italy | Cybersecurity Dive Singapore accuses Chinese state-backed hackers of attacking critical infrastructure networks | The Record from Recorded Future News UK Arrests Four in ‘Scattered Spider' Ransom Group – Krebs on Security Four people bailed after arrests over cyber attacks on M&S, Co-op and Harrods Brazilian police arrest IT worker over $100 million cyber theft | The Record from Recorded Future News At Least 750 US Hospitals Faced Disruptions During Last Year's CrowdStrike Outage, Study Finds | WIRED Hacker returns cryptocurrency stolen from GMX exchange after $5 million bounty payment | The Record Indian crypto exchange CoinDCX says $44 million stolen from reserves | The Record Chainalysis: $2.17 billion in crypto stolen in first half of 2025, driven by North Korean hacks | The Record PoisonSeed bypassing FIDO keys to ‘fetch' user accounts Risky Bulletin: Browser extensions hijacked for web scraping botnet A Startup is Selling Data Hacked from Peoples' Computers to Debt Collectors A surveillance vendor was caught exploiting a new SS7 attack to track people's phone locations | TechCrunch Ukrainian hackers wipe databases at Russia's Gazprom in major cyberattack, intelligence source says File transfer company CrushFTP warns of zero-day exploit seen in the wild | The Record HPE warns of hardcoded passwords in Aruba access points Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector (CVE-2025-25257) Researchers, CISA confirm active exploitation of critical Citrix Netscaler flaw | Cybersecurity Dive Google finds custom backdoor being installed on SonicWall network devices - Ars Technica Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years
In this Risky Business sponsored interview, Thinkst Canary CEO Haroon Meer chats to Casey Ellis about the company's impressive growth over the past decade, and how it approached that path a little differently to other firms. Haroon's advice for young startup founders: Is your problem worth solving? And can you actually solve it? And… Love your customers. Show notes
In this sponsored Soap Box edition of the Risky Business podcast Patrick Gray chats with Toni de la Fuente, founder of open source multi-cloud security product Prowler. Toni explains how Prowler came to be, and how its journey followed his own learning about the cloud. The pair also discuss Prowler's successful transition from an open-source project into a community, and now a growing business with an as-a-service platform. This episode is also available on Youtube. Show notes
Pastor: Brandon LeveringSeries: God in the VaporScripture: Ecclesiastes 11:1-6Main Point: In the face of life's uncertainties, give boldly, work boldly, and trust God boldly.
Welcome to another episode of Death Don't Do Fiction, the AIPT Movies podcast! The podcast about the enduring legacy of our favorite movies! It's July, so that means it's time for our “Julygantic” series! Where we cover monster movies! In this week's episode, Alex, Tim, and guest Matt Naughton discuss Kevin Bacon's 1990 creature feature, Tremors!Beautiful locations! Handy men with questionable skills! Multi-tongue appendages! Grabboid cam! Rampant disrespect of vehicles! Perverse barbed wire! Training for a pogo stick world record! Doomsday prepper validation! Vodka sauce gore! A satisfying blend of horror and comedy! One of cinema's most iconic posters! Glorious practical effects, from miniatures to damp, animatronic puppets! A solid, committed cast that includes Kevin Bacon, Fred Ward, Reba McEntire, Michael Gross, Victor Wong, and Finn Carter! An ode to B movies that makes you afraid of land the way Jaws made you afraid of water!In addition, Matt Naughton shares his spoiler-free thoughts on the John Cena & Idris Elba action comedy Heads of State, while Alex does the same for M3GAN 2.0, Jurassic World Rebirth, Risky Business, and Under Siege!The Death Don't Do Fiction podcast brings you the latest in movie news, reviews, and more! Hosted by supposed “industry vets,” Alex Harris and Tim Gardiner, the show gives you a peek behind the scenes from two filmmakers with oddly nonexistent filmographies. You can find Alex on Twitter, Bluesky, or Letterboxd @actionharris. This episode's guest, Matt Naughton, can be found on Instagram @mnaughty85. Tim can't be found on social media because he doesn't exist. If you have any questions or suggestions for the Death Don't Do Fiction crew, they can be reached at aiptmoviespod@gmail.com, or you can find them on Twitter or Instagram @aiptmoviespod.Theme song is “We Got it Goin On” by Cobra Man.
In this Risky Business sponsored interview, Zero Networks Field CTO, Chris Boehm discusses the everyone-gets-an-AI future with Casey Ellis. Zero Networks makes network microsegmentation achievable without simply handing an AI control of the network. Will generative artificial intelligence ever be trusted to make hard access control decisions? Show notes
When RISK fails to be the focal point of discussion, things quickly go off the rails... The Library - Halo Lorecast is a JumperScape Audio production created by Austin Murphy. Connect with the audience and support us at jumperscape.com! Learn more about your ad choices. Visit megaphone.fm/adchoices
This week's theme is Pleasure. Bob & Robb recommend six movies that gratify. Bob: Pleasure (18:48), Babygirl (36:53), Secretary (55:09) Robb: Eyes Wide Shut (4:26), Groove (28:43), Risky Business (45:14) Follow —> Rewind Video: https://rewindvideopod.substack.com/p/follow-rewind-video Bob: https://letterboxd.com/rgdjr/ Robb: http://robbwitmer.info
Seaweed and kelp are praised as superfoods packed with iodine and minerals—but are they actually helping or hurting your thyroid? In this episode, we dive into the science behind these ocean plants and their impact on thyroid function, especially for those with hypothyroidism or Hashimoto's disease.We'll explore how iodine affects your thyroid, why too much can be just as harmful as too little, and whether seaweed snacks or kelp supplements belong in your diet. Learn what the research says, who should be cautious, and how to make smart choices when it comes to iodine-rich foods. If you've ever wondered whether your favorite sushi roll could be messing with your hormones, this is the episode for you. NEED MORE INFORMATION? Seaweed, Kelp & Your Thyroidhttps://www.palomahealth.com/learn/seaweed-kelp-affect-thyroid ABOUT PALOMA HEALTHPaloma Health is an online medical practice focused exclusively on treating hypothyroidism. From online visits with your provider to easy prescription management and lab orders, we create personalized treatment plans for you. Become a member, or try our at-home test kit and experience a whole new level of hypothyroid care. Use code PODCAST to save $30 at checkout.Disclaimer: The $30 discount is only valid for first-time Paloma Health members and test kit users. Coupon must be entered at the time of checkout. Become a Paloma Member:https://www.palomahealth.com/pricing-hypothyroidism Paloma Complete Thyroid Blood Test Kit:https://www.palomahealth.com/home-thyroid-blood-test-kit
Before she decided to become a poker pro, Maria Konnikova didn't know how many cards are in a deck. But she did have a Ph.D. in psychology, a brilliant coach, and a burning desire to know whether life is driven more by skill or chance. She found some answers in poker — and she's willing to tell us everything she learned. SOURCES:Maria Konnikova, author of The Biggest Bluff. RESOURCES:“Gender Differences in Performance Predictions: Evidence from the Cognitive Reflection Test,” by Patrick Ring, Levent Neyse, Tamas David-Barett, and Ulrich Schmidt (Frontiers in Psychology, 2016).“The headwinds/tailwinds Asymmetry: An Availability Bias in Assessments of Barriers and Blessings,” by Shai Davidai and Thomas Gilovich (Journal of Personality and Social Psychology, 2016).“The Two Settings of Kind and Wicked Learning Environments,” by Robin M. Hogarth, Tomás Lejarraga, and Emre Soyer (Current Directions in Psychological Science, 2015)."The Limits of Self-Control: Self-Control, Illusory Control, and Risky Financial Decision Making,” by Maria Konnikova (Columbia University, 2013).“Generalized expectancies for internal versus external control of reinforcement” by J.B. Rotter (Psychological Monographs: General and Applied, 1966). EXTRAS:The Biggest Bluff: How I Learned to Pay Attention, Master Myself, and Win, by Maria Konnikova.Mastermind: How to Think Like Sherlock Holmes, by Maria Konnikova.The Confidence Game, by Maria Konnikova.Theory of Games and Economic Behavior, by John Von Neumann and Oskar Morgenstern."This Year's World Series Of Poker Is Different," by Risky Business with Nate Silver and Maria Konnikova (2025).
Here's the brutal truth about social media for sales: You're already behind, and it's going to be a grind. That's the reality Margarita from Dallas discovered when she called into our podcast. She's a seasoned realtor with 20+ years of experience, built her entire business on referrals and warm market relationships, and suddenly realized she needs to master social media to stay competitive. Sound familiar? You're not alone if you're staring at this digital mountain wondering how the hell you're going to climb it. But what makes Margarita's situation even more challenging and why her story matters to every sales professional reading is this: She's trying to compress 20 years of relationship building into a social media strategy that can compete with people who've been doing this for decades. The Tom Cruise Problem: Building Your Social Media Presence Takes Time Remember the first time you saw Tom Cruise in a movie? For me, it was Risky Business, some kid dancing around in his underwear. He wasn't the "last movie star" then. He was just another actor trying to make it. But here's the thing: Today, if you saw Tom Cruise walking down the street, you'd lose your mind. You'd want selfies, autographs, the whole nine yards. Why? Because over decades, he created millions of micro-interactions that built trust, familiarity, and fandom. That's exactly what you need to do on social media. You need to create fans of YOU. The problem is that most sales professionals want to skip the relationship-building phase and jump straight to the closing phase. They want to post a few listing videos and magically generate leads. That's not how it works. The Algorithm Rewards Consistency, Not Perfection Here's the part that's going to hurt: You need to post every single day. Not when you feel like it. Not when you have something "good" to share. Every. Single. Day. When you first start, your content is going to suck. Your first TikTok video? Three people will watch it. Your first Instagram post? Crickets. Your first LinkedIn article? Your mom and your real estate buddy will like it. I know because I've been there. We've all been there. The algorithms don't care about your feelings—they care about consistency. Think about it this way: You're not just competing with other sales professionals for attention. You're competing with Netflix, YouTube, TikTok, and every other form of entertainment for your prospects' eyeballs. The only way to win that battle is to show up relentlessly until people start recognizing your name and face. The Two-Bucket Strategy: Marketing vs. Lead Generation When you think about social media as a sales professional, you need to separate it into two distinct buckets: Bucket 1: Marketing and Brand Building This is about name recognition, familiarity, and staying top-of-mind. When people in your market are ready to buy or sell, your name should be the first one they think of. This bucket is about volume, consistency, and building your personal brand. Bucket 2: Direct Lead Generation This is about watching what prospects are doing, engaging with them directly, and converting social interactions into sales conversations. This bucket is about quality, relationship building, and moving people from digital relationships to actual appointments. Most people focus entirely on Bucket 1 and wonder why they're not getting leads. Others focus only on Bucket 2 and wonder why their content isn't reaching anyone. You need both working in harmony. Your 3-Pillar Content Strategy System Here's what you need to post consistently: Original Content: This is your unique perspective, your experience, your stories. If you're a 20-year veteran like Margarita, you have war stories that new agents don't. You've survived market crashes, interest rate spikes, and industry changes. Share that wisdom. Curated Content: Find industry articles, market reports, and news relevant to your prospects.
Are you teaching your children to play it safe, or empowering them to take calculated risks and innovate? Dr. Roger Smith challenges common parenting advice, arguing that fostering a risk-taking mindset is crucial for children to become problem-solvers, dreamers, and leaders. Discover how overprotection, premature rescuing, and excessive praise can hinder their development, and learn practical ways to encourage adventure and resilience in your kids. Visit me at: https://rogersmithmd.com/ This has been a production of ThePodcastUpload.com
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: Australian airline Qantas looks like it got a Scattered Spider-ing Microsoft works towards blunting the next CrowdStrike disaster Changes are coming for Microsoft's default enterprise app consenting setup Synology downplays hardcoded passwords for its M365 cloud backup agent The next Citrix Netscaler memory disclosure looks nasty Drug cartels used technical surveillance to find, fix and finish FBI informants and witnesses This week's episode is sponsored by RAD Security. Co-founder Jimmy Mesta joins to talk through how they use AI automation to assess the security posture of sprawling cloud environments. This episode is also available on Youtube. Show notes Qantas hit by cyber attack, leaving 6 million customer records at risk of data breach Scattered Spider appears to pivot toward aviation sector | Cybersecurity Dive Microsoft to make Windows more resilient following 2024 IT outage | Cybersecurity Dive (384) The Ultimate Guide to App Consent in Microsoft Entra - YouTube When Backups Open Backdoors: Accessing Sensitive Cloud Data via "Synology Active Backup for Microsoft 365" / modzero AT&T deploys new account lock feature to counter SIM swapping | CyberScoop Iran-linked hackers threaten to release Trump aides' emails | Reuters US government warns of new Iran-linked cyber threats on critical infrastructure | Cybersecurity Dive Actively exploited vulnerability gives extraordinary control over server fleets - Ars Technica Critical vulnerability in Citrix Netscaler raises specter of exploitation wave | Cybersecurity Dive Identities of More Than 80 Americans Stolen for North Korean IT Worker Scams | WIRED Cloudflare confirms Russia restricting access to services amid free internet crackdown | The Record from Recorded Future News Mexican drug cartel used hacker to track FBI official, then killed potential FBI informants, government audit says | CNN Politics Audit of the FBI's Efforts to Mitigate the Effects of Ubiquitous Technical Surveillance - Redacted Report NATO members aim for spending 5% of GDP on defense, with 1.5% eligible for cyber | The Record from Recorded Future News US sanctions bulletproof hosting provider for supporting ransomware, infostealer operations | CyberScoop US, French authorities confirm arrest of BreachForums hackers | TechCrunch Spanish police arrest five over $542 million crypto investment scheme | The Record from Recorded Future News Scam compounds labeled a 'living nightmare' as Cambodian government accused of turning a blind eye | The Record from Recorded Future News
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: We roll our eyes over the “16 billion credentials” leak hitting mainstream news Some interesting cyber angles emerge from the conflict in Iran Opensource maintainer of libxml2 is fed up with this hacker crap Shockingly, there are yet more ways to trick people into pasting commands into Windows Veeam “patches” its backup software RCE like it's 2002 … by breaking the public PoC This week's episode is sponsored by Internet-wide honeypot reconnaissance platform, Greynoise. Founder Andrew Morris joins to talk about their journey spotting Chinese ORB-builders hacking thousands of ASUS routers, and why they're destined for the woodchipper. This episode is also available on Youtube. Show notes No, the 16 billion credentials leak is not a new data breach Canadian telecom hacked by suspected China state group - Ars Technica Telecom giant Viasat breached by China's Salt Typhoon hackers WarTranslated on X: "Iran's jamming GPS in the Strait of Hormuz, messing with ~970 ships, per Windward. UKMTO confirms the interference. Faulty AIS coordinates are screwing up navigation in the Persian Gulf. The IRGC threatens to shut the strait down in hours. https://t.co/kdMJvshOGC" / X Dmitri Alperovitch on X: "Chairman of the Joint Chiefs Gen. Dan Caine says @US_CYBERCOM supported this strike mission" / X Top Pentagon spy pick rejected by White House - POLITICO DHS warns of heightened cyber threat as US enters Iran conflict | Cybersecurity Dive Exclusive: Early US intel assessment suggests strikes on Iran did not destroy nuclear sites, sources say U.S. braces for Iran's response after overnight strikes on nuclear sites Assessing the Damage to Iran's Nuclear Program Iran Hacks Tirana Municipality in Retaliation Over MEK - Tirana Times Iran's government says it shut down internet to protect against cyberattacks | TechCrunch Aflac discloses cyber intrusion linked to wider crime spree targeting insurance industry | Cybersecurity Dive Tonga Ministry of Health hit with cyberattack affecting website, IT systems | The Record from Recorded Future News Alleged Ryuk ransomware gang member arrested in Ukraine and extradited to US | The Record from Recorded Future News Russia releases REvil members after convictions for payment card fraud | The Record from Recorded Future News OneLogin, Many Issues: How I Pivoted from a Trial Tenant to Compromising Customer Signing Keys - SpecterOps Triaging security issues reported by third parties (#913) · Issue · GNOME/libxml2 README: Set expectations straight (35d04a08) · Commits · GNOME / libxml2 · GitLab What's in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia | Google Cloud Blog FileFix - A ClickFix Alternative | mr.d0x Address bar shows hp.com. Browser displays scammers' malicious text anyway. - Ars Technica Researchers urge vigilance as Veeam releases patch to address critical flaw | Cybersecurity Dive ASUSpicious Flaw - Millions of Users' Information Exposed Since 2022 | MrBruh's Epic Blog Perth dad who created ‘evil twin' Wi-Fi did so to access pictures of women GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers
On this week's show Patrick Gray and Adam Boileau are joined by special guest Chris Krebs to discuss the week's cybersecurity news. They talk through: Israeli “hacktivists” take out an Iranian state-owned bank Scattered-spider and friends pivot into attacking insurers Securing identities in a cloud-first world keeps us awake at night Microsoft takes the “aas” out of SaaS for Europe, leaving us with just software! An AI prompt injection into M365 exfils corporate data This week's episode is sponsored by Kroll's Cyber practice. Kroll Cyber Associate Managing Director George Glass is based in London and talks through his experiences helping organisations in the UK deal with the Scattered Spider attacks. This episode is also available on Youtube. Show notes Iran's Bank Sepah disrupted by cyberattack claimed by pro-Israel hacktivist group | CyberScoop Iran orders officials to ditch connected devices Heightened Cyberthreat Amidst Israel-Iran Conflict Threat group linked to UK, US retail attacks now targeting insurance industry | Cybersecurity Dive Coming to Apple OSes: A seamless, secure way to import and export passkeys - Ars Technica Cyberattack on Washington Post Compromises Email Accounts of Journalists Hackers impersonating US government compromise email account of prominent Russia researcher | The Record from Recorded Future News A good one to talk to Chris about: Breaking down ‘EchoLeak', the First Zero-Click AI Vulnerability Enabling Data Exfiltration from Microsoft 365 Copilot CISA warns of supply chain risks as ransomware attacks exploit SimpleHelp flaws | Cybersecurity Dive Whole Foods supplier making progress on restoration after cyberattack left shelves empty | The Record from Recorded Future News Ransomware attack on ticketing platform upends South Korean entertainment industry | The Record from Recorded Future News Advisory: Cybersecurity incident
In this sponsored Soap Box edition of the Risky Business podcast Patrick Gray chats with Dropzone AI founder Ed Wu about the role of LLMs in the SOC. The debate about whether AI agents are going to wind up in the SOC is over, they've already arrived. But what are they good for? What are they NOT good for? And where else will we see AI popping up in security? This episode is also available on Youtube. Show notes
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: New York Times gets a little stolen Russian FSB data as a treat iVerify spots possible evidence of iOS exploitation against the Harris-Walz campaign Researcher figures out a trick to get Google account holders' full names and phone numbers Major US food distributor gets ransomwared The Com's social engineering of Salesforce app authorisations is a harbinger of our future problems Australian Navy forgets New Zealand has computers, zaps Kiwis with their giant radar. This week's episode is sponsored by identity provider Okta. Long-time friend of the show Alex Tilley is Okta's Global Threat Research Coordinator, and he joins to discuss how organisations can use both human and technical signals to spot North Koreans in their midst. This episode is also available on Youtube. Show notes How The Times Obtained Secret Russian Intelligence Documents - The New York Times Ukraine's military intelligence claims cyberattack on Russian strategic bomber maker | The Record from Recorded Future News Harris-Walz campaign may have been targeted by iPhone hackers, cybersecurity firm says iVerify Uncovers Evidence of Zero-Click Mobile Exploitation in the U.S. Spyware maker cuts ties with Italy after government refused audit into hack of journalist's phone | The Record from Recorded Future News Italian lawmakers say Italy used spyware to target phones of immigration activists, but not against journalist | TechCrunch Android chipmaker Qualcomm fixes three zero-days exploited by hackers | TechCrunch Cellebrite to acquire mobile testing firm Corellium in $200 million deal | CyberScoop Apple Gave Governments Data on Thousands of Push Notifications A Researcher Figured Out How to Reveal Any Phone Number Linked to a Google Account Bruteforcing the phone number of any Google user Acreed infostealer poised to replace Lumma after global crackdown | The Record from Recorded Future News BidenCash darknet forum taken down by US, Dutch law enforcement | The Record from Recorded Future News NHS calls for 1 million blood donors as UK stocks remain low following cyberattack | The Record from Recorded Future News Major food wholesaler says cyberattack impacting distribution systems | The Record from Recorded Future News Kettering Health confirms attack by Interlock ransomware group as health record system is restored | The Record from Recorded Future News Hackers abuse malicious version of Salesforce tool for data theft, extortion | Cybersecurity Dive shubs on X: "IP whitelisting is fundamentally broken. At @assetnote, we've successfully bypassed network controls by routing traffic through a specific location (cloud provider, geo-location). Today, we're releasing Newtowner, to help test for this issue: https://t.co/X3dkMz9gwK" / X Ross Ulbricht Got a $31 Million Donation From a Dark Web Dealer, Crypto Tracers Suspect | WIRED Australian navy ship causes radio and internet outages to parts of New Zealand
This week, we're bringing you an episode of Risky Business, a podcast about better decision making from our friends Nate Silver and Maria Konnikova. You can find more Risky Business at https://www.pushkin.fm/podcasts/risky-business-with-nate-silver-maria-konnikova. You can join Andrew and Carlos on ClubWPT ... Read more...
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: Cyber firms agree to deconflict and cross-reference hacker group names Russian nuclear facility blueprints gathered from public procurement websites Someone audio deepfaked the White House Chief of Staff, but for the dumbest reasons Germany identifies the Trickbot kingpin Google spots China's MSS using Calendar events for malware C2 Meta apps abuse localhost listeners to track web sessions. This week's episode is sponsored by automation vendor Tines. Its Field CISO, Matt Muller, joins the show to discuss an open letter penned by JP Morgan Chase's CISO that pleads with Software as a Service suppliers to try to suck less at security. This episode is also available on Youtube. Show notes 'Forest Blizzard' vs 'Fancy Bear' - cyber companies hope to untangle weird hacker nicknames | Reuters Ukraine's Massive Drone Attack Was Powered by Open Source Software Massive security breach: Russian nuclear facilities exposed online How a Spyware App Compromised Assad's Army - New Lines Magazine Exclusive | Federal Authorities Probe Effort to Impersonate White House Chief of Staff Susie Wiles - WSJ Malaysian home minister's WhatsApp hacked, used to scam contacts | The Record from Recorded Future News U.S. Sanctions Cloud Provider ‘Funnull' as Top Source of ‘Pig Butchering' Scams – Krebs on Security Top counter antivirus service disrupted in global takedown | CyberScoop Cops in Germany Claim They've ID'd the Mysterious Trickbot Ransomware Kingpin | WIRED Australian ransomware victims now must tell the government if they pay up | The Record from Recorded Future News Google: China-backed hackers hiding malware in calendar events | Cybersecurity Dive Coinbase breach linked to customer data leak in India, sources say | Reuters US military IT specialist arrested for allegedly trying to leak secrets to foreign government | The Record from Recorded Future News NSO appeals WhatsApp decision, says it can't pay $168 million in ‘unlawful' damages | The Record from Recorded Future News ConnectWise says nation-state attack targeted multiple ScreenConnect customers | The Record from Recorded Future News Google Online Security Blog: Sustaining Digital Certificate Security - Upcoming Changes to the Chrome Root Store Meta and Yandex are de-anonymizing Android users' web browsing identifiers - Ars Technica An Open Letter to Third-Party Suppliers
In this week's edition of Risky Business Dmitri Alperovitch and Adam Boileau join Patrick Gray to talk through the week's news, including: EXCLUSIVE: A Scattered Spider-style crew is hijacking DNS MX entries and compromising enterprises within minutes The SVG format brings the all horrors of HTML+JS to image files, and attackers have noticed Brian Krebs eats a 6.3Tbps DDoS … ‘cause that's how you demo your packet cannon Law enforcement takes out Lumma Stealer, Qakbot, Danabot and some dark web drug traffickers Iranian behind 2019 Baltimore ransomware mysteriously appears in North Carolina and pleads guilty CISA's leadership is fleeing in droves, even though the US needs them more than ever. This week's episode is sponsored by Thinkst Canary. Long time friend of the show Haroon Meer joins and talks through where he feels the industry is at, having just returned home from the AI-fueled hype at this year's RSA conference. This episode is also available on Youtube. Show notes China-linked ‘Silk Typhoon' hackers accessed Commvault cloud environments, person familiar says - Nextgov/FCW Risky Bulletin: SVG use for phishing explodes in 2025 - Risky Business Media KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS – Krebs on Security Midwestern telco Cellcom confirms cyber incident after days of service outages | The Record from Recorded Future News Microsoft leads international takedown of Lumma Stealer | Cybersecurity Dive Who said what? on X: "Message from the administrator of Lumma Stealer on the forums about the recent events
Richies, just in time for ""Mission: Impossible – The Final Reckoning"" - the last installment of the MI franchise - we bring you one of the most bankable stars in the world, Tom Cruise. As a boy, he's bullied because of his height, and faces learning difficulties at school. But that was then and this is now. Thanks to roles in “Risky Business,” “Top Gun,” “A Few Good Men,” and the money-printing “Mission: Impossible” franchise, Tom has become not only an enormous action star, but one of Hollywood's most surefire leading men. And one of its most controversial. Who could forget the image of him jumping up and down on Oprah's couch after falling for Katie Holmes? Or when the “War of the Worlds” star and public face of Scientology stirs the pot on “Today,"" criticizing Brooke Shields for using medication to treat postpartum depression. (A major no-no according to Tom's church.) There's no questioning Tom's mega-star status - or his extremely polarizing views.You can follow Brooke and Aricia on socials at @brookesiffrinn and @ariciaskidmorewilliamss. And check out the brand new Even the Rich merch store at www.eventherich.com.Be the first to know about Wondery's newest podcasts, curated recommendations, and more! Sign up now at https://wondery.fm/wonderynewsletterListen to Even The Rich on the Wondery App or wherever you get your podcasts. Experience all episodes ad-free and be the first to binge the newest season. Unlock exclusive early access by joining Wondery+ in the Wondery App or on Apple Podcasts. Start your free trial today by visiting wondery.com/links/even-the-rich/ now.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: TeleMessage memory dumps show up on DDoSecrets Coinbase contractor bribed to hand over user data Telegram does seem to be actually cooperating with law enforcement Britain's legal aid service gets 15 years worth of applicant data stolen Shocking no one, Ivanti were weaseling when they blamed latest bugs on a third party library This week's episode is sponsored by Prowler, who make an open source cloud security tool. Founder and original project developer Toni de la Fuente joins to talk through the flexibility that open tooling brings. Prowler is also adding support for SaaS platforms like M365, and of course, an AI assistant to help you write checks! This episode is also available on Youtube. Show notes TeleMessage - Distributed Denial of Secrets How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes | WIRED Coinbase says thieves stole user data and tried to extort $20M Hack could cost Coinbase up to $400M: filing | Cybersecurity Dive Severed Fingers and ‘Wrench Attacks' Rattle the Crypto Elite Money Stuff: US Debt Rates Itself | NewsletterHunt 2 massive black market services blocked by Telegram, messaging app says | Reuters Telegram Gave Authorities Data on More than 20,000 Users GovDelivery, an email alert system used by governments, abused to send scam messages | TechCrunch ATO warning as hackers steal $14,000 in tax returns: ‘Be wary' Hack of SEC social media account earns 14-month prison sentence for Alabama man | The Record from Recorded Future News 19-year-old accused of largest child data breach in U.S. agrees to plead guilty Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy | 7NEWS Pegasus spyware maker rebuffed in efforts to get off trade blacklist - The Washington Post Ransomware attack hits supplier of refrigerated groceries to British supermarkets | The Record from Recorded Future News UK government confirms massive data breach following hack of Legal Aid Agency | The Record from Recorded Future News Ivanti Endpoint Mobile Manager customers exploited via chained vulnerabilities | Cybersecurity Dive Expression Payloads Meet Mayhem - Ivanti EPMM Unauth RCE Chain (CVE-2025-4427 and CVE-2025-4428)