1983 film by Paul Brickman
POPULARITY
Categories
In his book “Rewinding the ‘80s” (on shelves Tuesday), film historian John Malahy examines — per the subtitle — “cinema under the influence of music videos, action stars, and a Cold War.” He joins us to discuss what may be the quintessential ‘80s movie, and the breakthrough role of the quintessential ‘80s movie star: Tom Cruise in Paul Brickman's “Risky Business.” Support this podcast at — https://redcircle.com/one-heat-minute-productions/exclusive-contentAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
On this week's show Patrick Gray is on holiday so Amberleigh Jack and Adam Boileau hijack the studio to discuss the week's cybersecurity news, including: Hackers learn that trying to coerce a journalist just makes for … a great story? A man in his 40s gets arrested over the European airport chaos. Yep, we're surprised, too. Adam fanboys over Watchtowr Labs while bemoaning Fortra. Academics pick apart Tile trackers and find them lacking CISA tells agencies to patch their damn Cisco gear This episode is also available on YouTube. Show notes 'You'll never need to work again': Criminals offer reporter money to hack BBC Government to guarantee £1.5bn Jaguar Land Rover loan after cyber shutdown Feds Tie ‘Scattered Spider' Duo to $115M in Ransoms – Krebs on Security UK authorities arrest man in connection with cyberattack against aviation vendor | Cybersecurity Dive Chinese scammer pleads guilty after UK seizes nearly $7 billion in bitcoin Cyberattack on Japanese beer giant Asahi limits shipping, call center operations | The Record from Recorded Future News Afghanistan plunged into nationwide internet blackout, disrupting air travel, medical care | The Record from Recorded Future News Tile trackers are a stalker's dream, say Georgia Tech researchers Intel and AMD trusted enclaves, the backbone of network security, fall to physical attacks - Ars Technica Supermicro server motherboards can be infected with unremovable malware - Ars Technica China-linked hackers use ‘BRICKSTORM' backdoor to steal IP | The Record from Recorded Future News Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors Federal agencies given one day to patch exploited Cisco firewall bugs | The Record from Recorded Future News Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability Is This Bad? This Feels Bad. (Fortra GoAnywhere CVE-2025-10035) It Is Bad (Exploitation of Fortra GoAnywhere MFT CVE-2025-10035) - Part 2
In this episode of the Retirement Playbook, Rick and Granger Hughes discuss essential strategies for retirement planning, focusing on income generation, tax implications of Roth conversions, the future of Social Security, and investment strategies. They emphasize the importance of creating a sustainable income in retirement and the need for a comprehensive plan to address potential financial challenges. The conversation highlights the evolving landscape of retirement planning and emphasizes the importance of individuals staying informed and proactive in their financial decisions. Hit play to discover what your financial advisor should be telling you. For events and complimentary consultations, visit hughesretirementgroup.com.See omnystudio.com/listener for privacy information.
On this week's show Patrick Gray and special guest Rob Joyce discuss the week's cybersecurity news, including: Secret Service raids a SIM farm in New York MI6 launches a dark web portal Are the 2023 Scattered Spider kids finally getting their comeuppance? Production halt continues for Jaguar Land Rover GitHub tightens its security after Shai-Hulud worm This week's episode is sponsored by Sublime Security. In this week's sponsor interview, Sublime founder and CEO Josh Kamdjou joins host Patrick Gray to chat about the pros and cons of using agentic AI in an email security platform. This episode is also available on YouTube Show notes U.S. Secret Service disrupts telecom network that threatened NYC during U.N. General Assembly MI6 launches darkweb portal to recruit foreign spies | The Record from Recorded Future News One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens | dirkjanm.io Github npm changes Flights across Europe delayed after cyberattack targets third-party vendor | Cybersecurity Dive Major European airports work to restore services after cyberattack on check-in systems | The Record from Recorded Future News When “Goodbye” isn't the end: Scattered LAPSUS$ Hunters hack on | DataBreaches.Net UK arrests 2 more alleged Scattered Spider hackers over London transit system breach | Cybersecurity Dive Alleged Scattered Spider member turns self in to Las Vegas police | The Record from Recorded Future News Las Vegas police arrest minor accused of high-profile 2023 casino attacks | CyberScoop DOJ: Scattered Spider took $115 million in ransoms, breached a US court system | The Record from Recorded Future News vx-underground on X: "Scattered Spider ransoms company for 964BTC - wtf_thats_alot.jpeg - Document says "Cost of BTC at time was $36M" - $36M / 964BTC = $37.5K - BTC value was $37.5K in November, 2023 - Google "Ransomware, November, 2023" - omfg.exe https://t.co/uv2EzbL5HT" | X JLR ‘cyber shockwave ripping through UK industry' as supplier share price plummets by 55% | The Record from Recorded Future News Jaguar Land Rover to extend production pause into October following cyberattack | Cybersecurity Dive New plan would give Congress another 18 months to revisit Section 702 surveillance powers | The Record from Recorded Future News AI-powered vulnerability detection will make things worse, not better, former US cyber official warns | Cybersecurity Dive
This week on Eavesdroppin' comedy podcast, Geordie & Michelle discuss risky behaviours...Michelle looks at the disturbing and harrowing case of serial killer nurse Charles Cullen. Every time Charles Cullen got a new job at a new hospital, patients begin dying in mysterious and unexplained ways. IV bags suddenly become contaminated. People were dying from high levels of strange meds. Although suspicion was directed towards Charles, nothing happened and Charles simplu moved on to the next hospital to continue his killing spree - until he didn't. Listen now to see how Charles's risky behaviour finally unravelled.Geordie then looks at a different kind of risky behaviour: people who jump into wild animal enclosures! There's the woman who wanted a selfie with a jaguar! The guy who wrestled a walrus! A group of teens who tormented a Siberian tiger! So why do people risk their lives by acting recklessly with wild animals or homemade hot air balloons or worse? Listen now to hear these stories and more...So pop on your headphones, grab a brown lemonade and join Geordie & Michelle for this week's episode, plus chat about Jeff Buckley and Elizabeth Fraser, Agony Aunt questions and more, only on Eavesdroppin' comedy podcast. And remember, wherever you are, whatever you do, just keep Eavesdroppin'!*Disclaimer: We don't claim to have any factual info about anything ever and our opinions are just opinions not fact, sooorrrryyy! Don't sue us!Please rate, review, tell your friends and subscribe in all the usual places – it really helps us and we love it when you do!Support us on Patreon: https://www.patreon.com/eavesdroppinDo write in with your stories at hello@eavesdroppinpodcast.com or send us a Voice Note!Listen: http://www.eavesdroppinpodcast.comorhttps://podfollow.com/eavesdroppinYouTube: https://www.youtube.com/channel/UCqcuzv-EXizUo4emmt9PgfwFacebook: https://www.facebook.com/eavesdroppinpodcast#charlescullen #killernurse #truecrime #riskybehaviours #wildanimaldeaths #animalenclosuredeaths #darwinawards #thrillseekers #mauledtodeath #reallife #truestories #eavesdroppin #eavesdroppinpodcast #eavesdroppincomedypodcast #podcast #comedy Hosted on Acast. See acast.com/privacy for more information.
In this episode of What the Tech, Becky Cross (VP of Client Partnerships) sits down with CSO, Fred Franks, to recap highlights from our recent Strategy Series live panel. This panel brought together tech leaders from across Northeast Ohio, including experts from Westfield Bank, Oswald Insurance, and Calfee , to discuss the evolving cybersecurity ecosystem. From risk management to AI-driven tools to legal and insurance implications, hear the biggest takeaways and insights from the event.
Do you know Why AI Makes Your Website MORE Important, Not Less? While AI agents seem to be replacing everything, your website is the one place you control your message and the primary "repository of information" that large language models use to learn about your business. In this interview, domain broker Jeffrey Gabriel explains that without a well-written website, AI models can't easily find, understand, or prioritize your business over competitors. Learn why your site is the essential "home base" you need to succeed in the age of AI.Book a 1-on-1 advisory session with me to apply these principles to your business: https://calendly.com/wltb/advisoryGuest: Jeffrey Gabriel, Founder of SawWebsite: https://saw.com
In this episode, Matt Goolsby leads the team through a discussion on risk aversion, extra perks that come with Medicare Advantage, and the IRS going after false tax credit claims inspired by Social Media ads. Go to RetirementHelp.com to learn more #retirement #podcast #show #money #finance #stockmarket #taxes #estateplanning #medicare #healthcare #Trump #onebigbeautifulbill #congress #republicans Between 03/2020 and 06/2025 investment advisory services were offered through Foundations Investment Advisors LLC (CRD#:175083) Investment advisory services are dually offered through Foundations Investment Advisors, LLC, an SEC-registered investment adviser, and Market Investment Group, LLC, an SEC-registered investment adviser. The investment adviser representatives of Market are also affiliated with and registered through Foundations Investment Advisors, LLC, and may provide services on behalf of both firms to clients or prospective clients where properly licensed or exempt. This show is presented by Market Investment Group, LLC, an SEC registered investment adviser that only conducts business in jurisdictions where it is properly registered, or is excluded or exempted from registration requirements. Registration as an investment adviser is not an endorsement of the firm by securities regulators and does not mean that the adviser has achieved a specific level of skill or ability. The firm is not engaged in the practice of law or accounting. The information presented is believed to be current. It should not be viewed as personalized investment advice. All expressions of opinion reflect the judgment of the presenter on the date of the show's publication and are subject to change. The information presented is not an offer to buy or sell, or a solicitation of any offer to buy or sell, any of the securities discussed. You should consult with a professional adviser before implementing any of the strategies discussed. Any legal or tax information provided in this show is general in nature. Always consult an attorney or tax professional regarding your specific legal or tax situation. Annuity and life insurance guarantees are subject to the claims-paying ability of the issuing insurance company. If you withdraw money from or surrender your contract within a certain time after investing, the insurance company may assess a surrender charge. Withdrawals may be subject to tax penalties and income taxes. Persons selling annuities and other insurance products receive compensation for these transactions. These commissions are separate and distinct from fees charged for advisory services. Insurance products also contain additional fees and expenses. Social Security rules and regulations are subject to change at any time. Always consult with your local Social Security office before acting upon any information provided herein. A Roth conversion may not be suitable for your situation. The primary goal in converting retirement assets into a Roth IRA is to reduce the future tax liability on the distributions you take in retirement, or on the distributions of your beneficiaries. The information provided is to help you determine whether or not a Roth IRA conversion may be appropriate for your particular circumstances. Please review your retirement savings, tax, and legacy planning strategies with your legal/tax advisor to be sure a Roth IRA conversion fits into your planning strategies. This is not endorsed by the U.S. government or associated with any federal Medicare program. We do not offer every plan available in your area. Any information we provide is limited to those plans we do offer in your area. Please contact Medicare.gov or 1-800-MEDICARE to get information on all your options. All client or prospective client names have been changed to protect the identities of the individuals discussed. All rights reserved.
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: Shai-Hulud worm propagates via npm and steals credentials Jaguar Land Rover attack may put smaller suppliers out of business Leaked data emerges from the vendor behind the Great Firewall of China Vastaamo hacker walks free while appeal is underway Why is a senator so mad about Kerberos? This week's episode is sponsored by Knocknoc. Chief exec Adam Pointon joins to talk through the surprising number of customers that are using Knocknoc's identity-to-firewall glue to protect internal services and networks. This week's episode is also available on Youtube. Show notes Self-Replicating Worm Hits 180+ Software Packages – Krebs on Security Jaguar Land Rover: Some suppliers 'face bankruptcy' due to hack crisis Jaguar Land Rover production shutdown could last until November U.S. Investors, Trump Close In on TikTok Deal With China - WSJ U.S. Investors, Trump Close In on TikTok Deal With China - WSJ How China's Propaganda and Surveillance Systems Really Operate | WIRED Mythical Beasts: Diving into the depths of the global spyware market - Atlantic Council Hacker convicted of extorting 20,000 psychotherapy victims walks free during appeal | The Record from Recorded Future News US national charged in Finnish psychotherapy center extortion | The Record from Recorded Future News BreachForums administrator given three-year prison stint after resentencing | The Record from Recorded Future News Microsoft, Cloudflare disrupt RaccoonO365 credential stealing tool run by Nigerian national | The Record from Recorded Future News Senator blasts Microsoft for making default Windows vulnerable to “Kerberoasting” - Ars Technica Exclusive: US warns hidden radios may be embedded in solar-powered highway infrastructure | Reuters Israel announces seizure of $1.5M from crypto wallets tied to Iran | TechCrunch
Ep 540 - Rental Development: Risky Business Beau Jarvis & Kerri Jackson By Stuart McNish The rental vacancy rate in Greater Vancouver and the Fraser Valley is tight – less than one per cent, year over year. “That, on its own, puts pressure on the market driving up rental rates,” says Kerri Jackson of Concert Properties. Building new supply is a long and challenging process in a remarkably complex municipal landscape made up of 21 different jurisdictions. Add in factors such as a decades-long shift away from purpose built rental in favour of condo developments that once sold to investors became rental properties. Beau Jarvis of Wesgroup says, “Recently, purpose-built rental housing has resurfaced as a way of easing the tight supply – a good idea, but one that developers are hard-pressed to jump onside with minimal uptake from developers.” As of October 2024, there are minimal purpose-built rental properties throughout the Metro Vancouver and Fraser Valley region. Those properties are a step in the right direction; however, they do not come close to the volume of new projects that are required to meet demand. We invited Kerri Jackson of Concert Properties and Beau Jarvis of Wesgroup to join us for Conversation That Matters about the value of purpose-built rentals and why it's a risky business. You can see the interview here https://www.conversationsthatmatter.ca/ Learn More about our guests career at careersthatmatter.ca
The employment law landscape is evolving rapidly, especially for health care employers. Timothy A. Hilton, Partner, Husch Blackwell LLP, and Gary McLaughlin, Partner, Mitchell Silberberg & Knupp LLP, discuss the areas of greatest concern for health care employers. They cover wage and hour issues, considerations related to remote work, and religious and ADA accommodation issues. Timothy and Gary spoke about this topic at AHLA's 2025 Annual Meeting in San Diego, CA.Watch this episode: https://www.youtube.com/watch?v=T_ltW2fsTWoLearn more about the AHLA 2025 Annual Meeting that took place in San Diego, CA: https://www.americanhealthlaw.org/annualmeeting Essential Legal Updates, Now in Audio AHLA's popular Health Law Daily email newsletter is now a daily podcast, exclusively for AHLA Premium members. Get all your health law news from the major media outlets on this podcast! To subscribe and add this private podcast feed to your podcast app, go to americanhealthlaw.org/dailypodcast. Stay At the Forefront of Health Legal Education Learn more about AHLA and the educational resources available to the health law community at https://www.americanhealthlaw.org/.
In this sponsored Soap Box edition of the Risky Business podcast, industry legend HD Moore joins the show to talk about runZero's major push into vulnerability management. With its new Nuclei integration, runZero is now able to get a very accurate picture of what's vulnerable in your environment, without spraying highly privileged credentials at attackers on your network. It can also integrate with your EDR platform, and other data sources, to give you powerful visibility into the true state of things on your network and in your cloud. This episode is also available on Youtube. Show notes
"Risky Business" by Matthew Schlesinger
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: Apple ruins exploit developers' week with fresh memory corruption mitigations Feross Aboukhadijeh drops by to talk about the big, dumb npm supply chain attack Salesloft says its GitHub was the initial entry point for its compromise Sitecore says people should “patch” its using-the-keymat-from-the-documentation “zero day” Rogue certs for 1.1.1.1 appear to be just (stupid) testing Jaguar Land Rover ransomware attackers are courting trouble This week's episode is sponsored by open source cloud security tool, Prowler. Founder Toni de la Fuente joins to discuss their new support for Microsoft 365. Time to point Prowler at your OneDrive and Sharepoint! This episode is also available on Youtube. Show notes Blog - Memory Integrity Enforcement: A complete vision for memory safety in Apple devices - Apple Security Research Venezuela's president thinks American spies can't hack Huawei phones | TechCrunch 18 Popular Code Packages Hacked, Rigged to Steal Crypto – Krebs on Security Software packages with more than 2 billion weekly downloads hit in supply-chain attack - Ars Technica Salesloft platform integration restored after probe reveals monthslong GitHub account compromise | Cybersecurity Dive CISA orders federal agencies to patch Sitecore zero-day following hacking reports | The Record from Recorded Future News SAP warns of high-severity vulnerabilities in multiple products - Ars Technica The number of mis-issued 1.1.1.1 certificates grows. Here's the latest. - Ars Technica Cyberattack on Jaguar Land Rover threatens to hit British economic growth | The Record from Recorded Future News Cyberattack forces Jaguar Land Rover to tell staff to stay at home | The Record from Recorded Future News Bridgestone Americas continues probe as it looks to restore operations | Cybersecurity Dive Qantas penalizes executives for July cyberattack | The Record from Recorded Future News Cyber Command, NSA to remain under single leader as officials shelve plan to end 'dual hat' | The Record from Recorded Future News GOP Cries Censorship Over Spam Filters That Work – Krebs on Security Risky Bulletin: APT report? No, just a phishing test! - Risky Business Media Post by @patrick.risky.biz — Bluesky
NFL fans everywhere are outraged at commercials being added to the Redzone channel, a healthcare worker down South saved a raccoon after it got drunk behind a distillery, we found a remedy for car sickness, read our Penny Power "Peeves of the Week," and hit the phones to share stories about the riskiest things we've ever done! See omnystudio.com/listener for privacy information.
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: The Salesloft breach and why OAuth soup is a problem The Salt Typhoon telco hackers turn out to be Chinese private sector, but state-directed Google says it will stand up a “disruption unit” Microsoft writes up a ransomware gang that's all-in on the cloud future Aussie firm hot-mics its work-from-home employees' laptops Youtube scam baiters help the feds take down a fraud ring This episode is sponsored by Dropzone.AI. Founder and CEO Edward Wu joins the show to talk about how AI driven SOC tools can help smaller organisations claw their way above the “security poverty line”. A dedicated monitoring team, threat hunting and alert triage, in a company that only has a couple of part time infosec people? Yes please! This episode is also available on Youtube. Show notes The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft – Krebs on Security Salesloft: The Leading AI Revenue Orchestration Platform Palo Alto Networks, Zscaler customers impacted by supply chain attacks | Cybersecurity Dive The impact of the Salesloft Drift breach on Cloudflare and our customers China used three private companies to hack global telecoms, U.S. says CSA_COUNTERING_CHINA_STATE_ACTORS_COMPROMISE_OF_NETWORKS.PDF Google previews cyber ‘disruption unit' as U.S. government, industry weigh going heavier on offense | CyberScoop Ransomware gang takedowns causing explosion of new, smaller groups | The Record from Recorded Future News Hundreds of Swedish municipalities impacted by suspected ransomware attack on IT supplier | The Record from Recorded Future News Storm-0501's evolving techniques lead to cloud-based ransomware | Microsoft Security Blog The Era of AI-Generated Ransomware Has Arrived | WIRED Between Two Nerds: How threat actors are using AI to run wild - YouTube Affiliates Flock to ‘Soulless' Scam Gambling Machine – Krebs on Security UK sought broad access to Apple customers' data, court filing suggests ICE reactivates contract with spyware maker Paragon | TechCrunch WhatsApp fixes 'zero-click' bug used to hack Apple users with spyware | TechCrunch Safetrac turned staff laptops into covert recording devices to monitor WFH Risky Bulletin: YouTubers unmask and help dismantle giant Chinese scam ring - Risky Business Media
In this conversation, Eric and Andy discuss the complexities and challenges faced in construction projects, particularly focusing on risk management, equipment delays, and unexpected complications. They share insights from a recent project involving HVAC equipment replacement and the impact of supply chain issues on timelines and costs. The discussion emphasizes the importance of assessing risks and planning for unforeseen circumstances in the construction industry.Send us a textSend us your feedback or topic ideas over on our social channels!Eric Aune @mechanicalhub Andy Mickelson @mick_plumbNewsletter sign up: https://bit.ly/MH_email
AI can accelerate a fully digital supply chain, but it can also bring cyberattacks, ethical dilemmas, and sustainability risks. Zero100 Principal Analyst Suzanne Lindsay and VPs, Research Geraint John and Kelly Coutinho explore the threats faced by leaders today and what they can do to protect their organizations.Why cybersecurity is the CSCO's problem after all (02:47) Fighting AI threats with AI (06:29) A blueprint for cyber-resilient supply chains (09:10) Can AI power true sustainability? (12:01) Safeguarding the human workforce in the agentic AI era (18:01) The dark side vs the gains: Striking the AI balance (20:24)
GUEST: John Hinze, Director of Corporate Finance at the B.C Securities Commission Learn more about your ad choices. Visit megaphone.fm/adchoices
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: Australia expels Iranian ambassador Hackers sabotage Iranian shipping satcoms APT hacker got doxxed in Phrack. Kind of. They're probably Chinese, not DPRK? Trail of Bits uses image-downscaling to sneak prompts into Google Gemini The Com's King Bob gets ten years in the slammer It's a day that ends in -y, so of course there's a new Citrix Netscaler RCE being used in the wild. This week's episode is brought to you by Corelight. Chief Strategy Officer Greg Bell talks through how they've been implementing AI for sifting through your network data. A model-context-protocol server that can rummage in all those packet logs for you while you keep investigating? Yes please. This episode is also available on Youtube. Show notes Embassy staff flee Canberra in dead of night | news.com.au — Australia's leading news site for latest headlines Swedish security service says Iran uses criminal networks in Sweden | Reuters Risky Bulletin: Hackers sabotage Iranian ships at sea, again - Risky Business Media Microsoft scales back Chinese access to cyber early warning system | Reuters Microsoft Didn't Disclose Key Details to U.S. Officials of China-Based Engineers, Record Shows — ProPublica .:: Phrack Magazine ::. Uncovering the Chinese Proxy Service Used in APT Campaigns Weaponizing image scaling against production AI systems -The Trail of Bits Blog FBI, Cisco warn of Russia-linked hackers targeting critical infrastructure organizations | Cybersecurity Dive CrowdStrike warns of uptick in Silk Typhoon attacks this summer | CyberScoop Kevin Beaumont: "There's a bunch of new Netscal…" - Cyberplace US charges Oregon man in vast botnet-for-hire operation | Cybersecurity Dive South Korea arrests suspected Chinese hacker accused of targeting BTS singer and other celebrities | The Record from Recorded Future News SIM-Swapper, Scattered Spider Hacker Gets 10 Years – Krebs on Security Chinese national who sabotaged Ohio company's systems handed four-year jail stint | The Record from Recorded Future News Nevada state offices close after wide-ranging 'network security incident' | Reuters DSLRoot, Proxies, and the Threat of ‘Legal Botnets' – Krebs on Security Russia weighs Google Meet ban as part of foreign tech crackdown | The Record from Recorded Future News Kremlin-Mandated Messaging App Max Is Designed To Spy On Users Иеромонах РПЦ Макарий призвал помолиться за мессенджер MAX
When Bob Eidman is found executed in his office in broad daylight, the people of St. Charles are terrified a cold-blooded killer is on the loose. But when police discover Bob's secret life, they expose a slew of suspects with motive for murder Hosted on Acast. See acast.com/privacy for more information.
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: Oracle's long term CSO departs, and we're not that sad about it Canada's House of Commons gets popped through a Microsoft bug Russia degrades voice calls via Whatsapp and Telegram to push people towards Max South-East Asian scam compounds are also behind child sextortion Reports that the UK has backed down on Apple crypto are… strange Oh and of course there's a Fortinet bug! There's always a Fortinet bug! This week's episode is sponsored by open source identity provider Authentik. CEO Fletcher Heisler joins the show this week, and explains the journey of implementing SSO backed login on Windows, Mac and Linux. You'll never guess which one was a few lines of PAM config, and which was a multi-month engineering project! This episode is also available on Youtube. Show notes Is Oracle facing headwinds? After layoffs, its 4-decade veteran Chief Security Officer Mary Ann Davidson departs Oracle CSO blasted over anti-security research rant - iTnews New York lawsuit against Zelle creator alleges features allowed $1 billion in thefts | The Record from Recorded Future News Mobile Phishers Target Brokerage Accounts in ‘Ramp and Dump' Cashout Scheme – Krebs on Security How we found TeaOnHer spilling users' driver's licenses in less than 10 minutes | TechCrunch UK has backed down on demand to access US Apple user data, spy chief says DNI Tulsi Gabbard on X: "As a result, the UK has agreed to drop its mandate for" Hackers target Workday in social engineering attack Russia curbs WhatsApp, Telegram calls to counter cybercrime | The Record from Recorded Future News Hackers reportedly compromise Canadian House of Commons through Microsoft vulnerability | The Record from Recorded Future News Norway police believe pro-Russian hackers were behind April dam sabotage | The Record from Recorded Future News US agencies, international allies issue guidance on OT asset inventorying | Cybersecurity Dive FortMajeure: Authentication Bypass in FortiWeb (CVE-2025-52970) U.S. State Dept - Near Eastern Affairs on X: "He did not claim diplomatic immunity and was released by a state judge" 493 Cases of Sextortion Against Children Linked to Notorious Scam Compounds | WIRED .:: Phrack Magazine ::. Accenture to buy Australian cyber security firm CyberCX - iTnews
Anna Davlantes, WGN Radio's investigative correspondent, joins Bob Sirott to share what happened this week in Chicago history. Stories include the opening of Charlie Trotter’s, Ozzy Osbourne’s special Wrigley Field performance, Tom Skilling’s debut on WGN-TV, and more.
In this Soap Box edition of the Risky Business podcast Patrick Gray chats with Socket founder Feross Aboukhadijeh about how to measure the reachability of vulnerabilities in applications. It's great to know there's a CVE in a library you're using, but it's even better if you can say whether or not that vulnerability actually impacts your application. They also talk about how Socket started out as a way to discover malicious packages in software projects, but these days it's playing the CVE game as well. This episode is also available on Youtube. Show notes
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: CISA warns about the path from on-prem Exchange to the cloud Microsoft awards a crisp zero dollar bill for a report about what a mess its internal Entra-authed apps are Everyone and their dog seems to have a shell in US Federal Court information systems Google pays $250k for a Chrome sandbox escape Attackers use javascript in adult SVG files to … farm facebook likes?! SonicWall says users aren't getting hacked with an 0day… this time. This week's episode is sponsored by SpecterOps. Chief product officer Justin Kohler talks about how the flagship Bloodhound tool has evolved to map attack paths anywhere. Bring your own applications, directories and systems into the graph, and join the identity attacks together. This episode is also available on Youtube. Show notes CISA, Microsoft issue alerts on ‘high-severity' Exchange vulnerability | The Record from Recorded Future News Advanced Active Directory to Entra ID lateral movement techniques Consent & Compromise: Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications Cartels may be able to target witnesses after major court hack Federal judiciary tightens digital security as it deals with ‘escalated cyberattacks' | The Record from Recorded Future News Citrix NetScaler flaws lead to critical infrastructure breaches | Cybersecurity Dive DARPA touts value of AI-powered vulnerability detection as it announces competition winners | Cybersecurity Dive Buttercup is now open-source! HTTP/1.1 must die: the desync endgame US confirms takedown of BlackSuit ransomware gang that racked up $370 million in ransoms | The Record from Recorded Future News North Korean cyber-espionage group ScarCruft adds ransomware in recent attack | The Record from Recorded Future News Adult sites are stashing exploit code inside racy .svg files - Ars Technica Google pays 250k for Chromium sandbox escape SonicWall says recent attack wave involved previously disclosed flaw, not zero-day | Cybersecurity Dive Two groups exploit WinRAR flaws in separate cyber-espionage campaigns | The Record from Recorded Future News Tornado Cash cofounder dodges money laundering conviction, found guilty of lesser charge | The Record from Recorded Future News Hackers Hijacked Google's Gemini AI With a Poisoned Calendar Invite to Take Over a Smart Home | WIRED Malware in Open VSX: These Vibes Are Off How attackers are using Active Directory Federation Services to phish with legit office.com links Introducing our guide to phishing detection evasion techniques The State of Attack Path Management
You can now text us anonymously to leave feedback, suggest future content or simply hurl abuse at us. We'll read out any texts we receive on the show. Click here to try it out!Welcome back to Bad Dads Film Review! This week we're donning our Ray-Bans, sliding across the living room floor, and revisiting the film that launched Tom Cruise into superstardom — Risky Business (1983). Equal parts coming-of-age comedy, satire, and cautionary tale, it's a movie that defined a certain brand of 80s cool while slyly critiquing the era's obsession with wealth and success.Directed by Paul Brickman, Risky Business follows Joel Goodson (Tom Cruise), a high-achieving Chicago high school student left home alone while his parents are away. Initially envisioning a week of harmless fun, things spiral after a night with call girl Lana (Rebecca De Mornay) leads Joel into a world of escalating consequences, entrepreneurial schemes, and moral compromises.What begins as a teenage fantasy of freedom and rebellion becomes a sharply observed journey into adulthood — and a satire of the “make it big” mentality that fuelled the 80s.While it has that glossy 80s comedy appeal, Risky Business is far smarter and more cynical than it first appears. It's one of those films that teenage audiences might take at face value as a tale of freedom and rebellion, but adults will recognise as a sharp social critique. That said, it's very much an R-rated outing — so maybe not one for family movie night.In the end, Risky Business is more than just a star-making turn for Tom Cruise. It's a stylish, clever, and surprisingly subversive look at ambition, temptation, and the thin line between opportunity and exploitation.
I talked with my guest about adopting and managing legal technology with an eye toward law firm ethics. Episode Highlights 03:51 - Essential Legal Tech Tools 06:00 - Vendor Partnership Program at alps 06:51 - Wire Fraud and Its Risks 07:59 - Deepfake Scams in Transactions 09:23 - Technology Integration Challenges 10:05 - Importance of Tech Training 13:23 - Tech Adoption Barriers for Lawyers 15:28 - Vetting Tech Vendors for Security 18:11 - Younger Lawyers and Tech Challenges 19:29 - Importance of Processes and Workflows 20:47 - Vetting Software for Risk Reduction 25:51 - Selecting Malpractice Insurance 27:59 - Necessity of Cyber Insurance Episode Resources Connect with Jared Correia jared@redcavelegal.com https://redcavelegal.com/ https://www.linkedin.com/in/jaredcorreia https://twitter.com/RedCaveLegal www.linkedin.com/in/jaredcorreia/ Connect with Rio Laine https://www.alpsinsurance.com/
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news. Google security engineering VP Heather Adkins drops by to talk about their AI bug hunter, and Risky Business producer Amberleigh Jack makes her main show debut. This episode explores the rise of AI-powered bug hunting: Google's Project Zero and Deepmind team up to find and report 20 bugs to open source projects The XBOW AI bug hunting platform sees success on HackerOne Is an AI James Kettle on the horizon? There's also plenty of regular cybersecurity news to discuss: On-prem Sharepoint's codebase is maintained out of China… awkward! China frets about the US backdooring its NVIDIA chips, how you like ‘dem apples, China? SonicWall advises customers to turn off their VPNs Hardware controlling Dell laptop fingerprint and card readers has nasty driver bugs Russia uses its ISPs to in-the-middle embassy computers and backdoor ‘em. The Russian government pushes VK's Max messenger for everything This week's show is sponsored by device management platform Devicie. Head of Solutions Sean Ollerton talks through the impending Windows 10 apocalypse, as Microsoft ends mainstream support. He says Windows 11 isn't as scary as people make out, but if the update isn't on your radar now, time is running out. This episode is also available on Youtube. Show notes Google says its AI-based bug hunter found 20 security vulnerabilities | TechCrunch Is XBOW's success the beginning of the end of human-led bug hunting? Not yet. | CyberScoop James Kettle on X: "There I am being careful to balance hyping my talk without going too far and then this gets published
From cold plunges to booty bands, 75 Hard to walking pads — the fitness world is flooded with trends claiming to be the next big thing. But are they actually worth your time… or just another fast track to burnout, boredom, or broken knees? In this episode, we put 20 of the most popular fitness fads on trial. No filters — just real talk, bold opinions, and honest takes on what's actually helpful… and what's total nonsense. We cover: The real deal with 12-3-30 Whether HIIT every day is helping or hurting you Why some trends are all hype and no science The hidden risks behind influencer workouts And the one trend we secretly love (but kind of hate ourselves for it) If you've ever wondered, “Should I be doing that too?” — this one's for you. Tune in, laugh a little, and walk away knowing which trends are worth your energy… and which belong in the trash. Because when it comes to your health, clarity beats chaos. Every time. APPLY FOR COACHING: https://www.lvltncoaching.com/1-1-coaching SDE Method app: https://www.lvltncoaching.com/sde-method-app Project B Waiting List https://quest.lvltncoaching.com/project-b Macros Guide https://www.lvltncoaching.com/free-resources/calculate-your-macros Join the Facebook Community: https://www.facebook.com/groups/lvltncoaching FREE TOOLS to start your health and fitness journey: https://www.lvltncoaching.com/resources/freebies Alessandra's Instagram: http://instagram.com/alessandrascutnik Joelle's Instagram: https://www.instagram.com/joellesamantha?igsh=ZnVhZjFjczN0OTdn Josh's Instagram: http://instagram.com/joshscutnik Chapters: 00:00 Introduction to Fitness Trends 02:30 75 Hard: Mental Toughness or Burnout? 09:00 Walking Pads: Productivity or Distraction? 12:50 Carnivore Diet: Survival Mode or Nonsense? 14:29 High Rep, Lightweight Workouts: Are They Effective? 18:53 10,000 Steps a Day: Myth or Reality? 24:41 Energy Drinks: Boost or Burden? 30:59 Refreshing Mocktails and Hydration Choices 33:01 Caffeine: Energy Blocker or Performance Enhancer? 34:04 Barefoot Training: Trendy or Beneficial? 36:46 Fasted Cardio: Effective or Unnecessary? 42:36 Running Safety and Awareness 45:47 Booty Bands: Effective Tool or Marketing Gimmick? 48:10 HIIT: Efficient Fat Loss or Stress Inducer? 48:39 The Influence of HRV on Workouts 49:26 Pros and Cons of Influencer Workouts 50:40 Cold Plunges and Ice Baths: A Personal Perspective 51:57 Exploring Red Light Therapy 53:54 The Myths of Sweating and Fat Loss 55:17 Ankle Weights: Functional Boost or Risky Business? 55:58 Group Fitness Classes: Community or Chaos? 57:27 The 12-3-30 Treadmill Method: A Trend or Effective Workout? 59:32 Smartwatches and HRV: Helpful Tool or Mental Trap? 01:02:30 Fitness Challenges: Jumpstart or Yo-Yo Effect? 01:05:00 Peloton: Game-Changer or Overpriced Spin Cult?
In hour four, remembering "Risky Business" and why Appel still has not scene it. Also, remembering the good times with Matt Mervis and The Marlins.
Put on your Ray-Bans, rev up the Porsche, and crank up the Tangerine Dream! It's time for the movie that made Tom Cruise a star, which somehow Javi and Paul had never seen! Listen as they, with the help of ever-patient Producer Brad, get past their preconceived notions and are rewarded with a teen sex comedy that has more in common with Blue Velvet than Porky's. Suburban high school senior Joel (Cruise), afflicted with anxiety about getting into Princeton and left home alone by his materialistic parents, is prodded by devil-on-his-shoulder pal Miles (Curtis Armstrong) down the path to some Risky Business in the form of call girl Lana (Rebecca De Mornay), who turns Joel's home into a brothel. Is it a swooning love letter to capitalism, or subversive indictment of it, or both? Javi and Paul marvel and muse at this unexpectedly layered, nuanced, and finely crafted film rife with symbolism, sex positivity, delightful dream sequences, awesome needle drops, surprisingly positive trans representation, a crystal egg, and a young Joe Pantoliano as Guido the Killer Pimp. There is no substitute!Show Notes:1983 Box OfficeAugust 5-7, 1983, Weekend Box OfficeRisky Business Box Office ResultsHollywood Reporter excerpts from Curtis Armstrong's 2017 memoir, Revenge of the Nerd.Top 100 Stars in Leading roles at the Domestic Box OfficeFollow us!InstagramBlueskyemail: Multiplexoverthruster@gmail.com Hosted on Acast. See acast.com/privacy for more information.
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: Did the SharePoint bug leak out of the Microsoft MAPP program? Expel retracts its FIDO bypass writeup The mess surrounding the women-only dating-safety app Tea gets worse Broadcom customers struggle to get patches for VMWare hypervisor escapes Aeroflot gets hacked by the Cyber Partisans, disrupting flights This week's episode is sponsored by Push Security. Satisfied Push customer Daniel Cuthbert from Santander Bank joins on their behalf. He explains how having telemetry about identity from inside the browser is a key pillar for investigating intrusions in the browser-centric future. This episode is also available on Youtube. Show notes Microsoft Probing Whether Cyber Alert Tipped Off Chinese Hackers Microsoft says Warlock ransomware deployed in SharePoint attacks as governments scramble | The Record from Recorded Future News What we know about the Microsoft SharePoint attacks | Cybersecurity Dive An important update (and apology) on our PoisonSeed blog Tea User Files Class Action After Women's Safety App Exposes Data A Second Tea Breach Reveals Users' DMs About Abortions and Cheating Top Lawyer for National Security Agency Is Fired From Help Desk to Hypervisor: Defending Your VMware vSphere Estate from UNC3944 VMware prevents some perpetual license holders from downloading patches Pro-Ukrainian hackers take credit for attack that snarls Russian flight travel - Ars Technica КИБЕРУДАР ПО АЭРОФЛОТУ РФ!v Treasury sanctions North Koreans involved in IT-worker schemes | Cybersecurity Dive Minnesota governor activates National Guard amid St. Paul cyberattack | StateScoop Outage was result of cyberattack, Post Luxembourg says Clorox files $380 million suit blaming Cognizant for 2023 cyberattack | Cybersecurity Dive Cisco network access security platform vulnerabilities under active exploitation | CyberScoop Arizona woman sentenced to 8.5 years for running North Korean laptop farm | The Record from Recorded Future News Cybercrime forum Leak Zone publicly exposed its users' IP addresses | TechCrunch
BT and Sal ignite a fiery debate on whether the New York Mets should turn to familiar faces to bolster their roster. From a potential reunion with Severino to considering other past players, the duo dissects the risks and rewards of bringing back former Mets. The discussion also touches on the delicate balance of trusting young talent versus acquiring proven, albeit familiar, veterans to make a push for the postseason.
Risky Biz returns after two weeks off, and there sure is cybersecurity news to catch up on. Patrick Gray and Adam Boileau discuss: Microsoft tried to make outsourcing the Pentagon's cloud maintenance to China okay (it was not) She shells Sharepoint by the sea-shore (by ‘she' we mean ‘China') Four (alleged) Scattered Spider members arrested (and bailed) in the UK Hackers spend $2700 to buy creds for a Brazilian payment system, steal $100M Fortinet has SQLI in the auth header, Citrix mem leak is weaponised, HP hardcodes creds and Sonicwalls get user-moderootkits. Just security vendor things! This week's episode is sponsored by Airlock Digital. CEO David Cottingham talks through what it takes to build a mature, resilient management platform for a security critical system. This episode is also available on Youtube. Show notes Update on DOD's cloud services Microsoft to stop using engineers in China for tech support of US military, Hegseth orders review A Little-Known Microsoft Program Could Expose the Defense Department to Chinese Hackers While DOD policy bans unauthorized apps like TikTok from being on employees phones over national security risks Microsoft Fix Targets Attacks on SharePoint Zero-Day – Krebs on Security National Guard was hacked by China's 'Salt Typhoon' group, DHS says Suspected contractor for China's Hafnium group arrested in in Italy | Cybersecurity Dive Singapore accuses Chinese state-backed hackers of attacking critical infrastructure networks | The Record from Recorded Future News UK Arrests Four in ‘Scattered Spider' Ransom Group – Krebs on Security Four people bailed after arrests over cyber attacks on M&S, Co-op and Harrods Brazilian police arrest IT worker over $100 million cyber theft | The Record from Recorded Future News At Least 750 US Hospitals Faced Disruptions During Last Year's CrowdStrike Outage, Study Finds | WIRED Hacker returns cryptocurrency stolen from GMX exchange after $5 million bounty payment | The Record Indian crypto exchange CoinDCX says $44 million stolen from reserves | The Record Chainalysis: $2.17 billion in crypto stolen in first half of 2025, driven by North Korean hacks | The Record PoisonSeed bypassing FIDO keys to ‘fetch' user accounts Risky Bulletin: Browser extensions hijacked for web scraping botnet A Startup is Selling Data Hacked from Peoples' Computers to Debt Collectors A surveillance vendor was caught exploiting a new SS7 attack to track people's phone locations | TechCrunch Ukrainian hackers wipe databases at Russia's Gazprom in major cyberattack, intelligence source says File transfer company CrushFTP warns of zero-day exploit seen in the wild | The Record HPE warns of hardcoded passwords in Aruba access points Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector (CVE-2025-25257) Researchers, CISA confirm active exploitation of critical Citrix Netscaler flaw | Cybersecurity Dive Google finds custom backdoor being installed on SonicWall network devices - Ars Technica Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years
In this sponsored Soap Box edition of the Risky Business podcast Patrick Gray chats with Toni de la Fuente, founder of open source multi-cloud security product Prowler. Toni explains how Prowler came to be, and how its journey followed his own learning about the cloud. The pair also discuss Prowler's successful transition from an open-source project into a community, and now a growing business with an as-a-service platform. This episode is also available on Youtube. Show notes
Pastor: Brandon LeveringSeries: God in the VaporScripture: Ecclesiastes 11:1-6Main Point: In the face of life's uncertainties, give boldly, work boldly, and trust God boldly.
Welcome to another episode of Death Don't Do Fiction, the AIPT Movies podcast! The podcast about the enduring legacy of our favorite movies! It's July, so that means it's time for our “Julygantic” series! Where we cover monster movies! In this week's episode, Alex, Tim, and guest Matt Naughton discuss Kevin Bacon's 1990 creature feature, Tremors!Beautiful locations! Handy men with questionable skills! Multi-tongue appendages! Grabboid cam! Rampant disrespect of vehicles! Perverse barbed wire! Training for a pogo stick world record! Doomsday prepper validation! Vodka sauce gore! A satisfying blend of horror and comedy! One of cinema's most iconic posters! Glorious practical effects, from miniatures to damp, animatronic puppets! A solid, committed cast that includes Kevin Bacon, Fred Ward, Reba McEntire, Michael Gross, Victor Wong, and Finn Carter! An ode to B movies that makes you afraid of land the way Jaws made you afraid of water!In addition, Matt Naughton shares his spoiler-free thoughts on the John Cena & Idris Elba action comedy Heads of State, while Alex does the same for M3GAN 2.0, Jurassic World Rebirth, Risky Business, and Under Siege!The Death Don't Do Fiction podcast brings you the latest in movie news, reviews, and more! Hosted by supposed “industry vets,” Alex Harris and Tim Gardiner, the show gives you a peek behind the scenes from two filmmakers with oddly nonexistent filmographies. You can find Alex on Twitter, Bluesky, or Letterboxd @actionharris. This episode's guest, Matt Naughton, can be found on Instagram @mnaughty85. Tim can't be found on social media because he doesn't exist. If you have any questions or suggestions for the Death Don't Do Fiction crew, they can be reached at aiptmoviespod@gmail.com, or you can find them on Twitter or Instagram @aiptmoviespod.Theme song is “We Got it Goin On” by Cobra Man.
When RISK fails to be the focal point of discussion, things quickly go off the rails... The Library - Halo Lorecast is a JumperScape Audio production created by Austin Murphy. Connect with the audience and support us at jumperscape.com! Learn more about your ad choices. Visit megaphone.fm/adchoices
This week's theme is Pleasure. Bob & Robb recommend six movies that gratify. Bob: Pleasure (18:48), Babygirl (36:53), Secretary (55:09) Robb: Eyes Wide Shut (4:26), Groove (28:43), Risky Business (45:14) Follow —> Rewind Video: https://rewindvideopod.substack.com/p/follow-rewind-video Bob: https://letterboxd.com/rgdjr/ Robb: http://robbwitmer.info
Before she decided to become a poker pro, Maria Konnikova didn't know how many cards are in a deck. But she did have a Ph.D. in psychology, a brilliant coach, and a burning desire to know whether life is driven more by skill or chance. She found some answers in poker — and she's willing to tell us everything she learned. SOURCES:Maria Konnikova, author of The Biggest Bluff. RESOURCES:“Gender Differences in Performance Predictions: Evidence from the Cognitive Reflection Test,” by Patrick Ring, Levent Neyse, Tamas David-Barett, and Ulrich Schmidt (Frontiers in Psychology, 2016).“The headwinds/tailwinds Asymmetry: An Availability Bias in Assessments of Barriers and Blessings,” by Shai Davidai and Thomas Gilovich (Journal of Personality and Social Psychology, 2016).“The Two Settings of Kind and Wicked Learning Environments,” by Robin M. Hogarth, Tomás Lejarraga, and Emre Soyer (Current Directions in Psychological Science, 2015)."The Limits of Self-Control: Self-Control, Illusory Control, and Risky Financial Decision Making,” by Maria Konnikova (Columbia University, 2013).“Generalized expectancies for internal versus external control of reinforcement” by J.B. Rotter (Psychological Monographs: General and Applied, 1966). EXTRAS:The Biggest Bluff: How I Learned to Pay Attention, Master Myself, and Win, by Maria Konnikova.Mastermind: How to Think Like Sherlock Holmes, by Maria Konnikova.The Confidence Game, by Maria Konnikova.Theory of Games and Economic Behavior, by John Von Neumann and Oskar Morgenstern."This Year's World Series Of Poker Is Different," by Risky Business with Nate Silver and Maria Konnikova (2025).
Here's the brutal truth about social media for sales: You're already behind, and it's going to be a grind. That's the reality Margarita from Dallas discovered when she called into our podcast. She's a seasoned realtor with 20+ years of experience, built her entire business on referrals and warm market relationships, and suddenly realized she needs to master social media to stay competitive. Sound familiar? You're not alone if you're staring at this digital mountain wondering how the hell you're going to climb it. But what makes Margarita's situation even more challenging and why her story matters to every sales professional reading is this: She's trying to compress 20 years of relationship building into a social media strategy that can compete with people who've been doing this for decades. The Tom Cruise Problem: Building Your Social Media Presence Takes Time Remember the first time you saw Tom Cruise in a movie? For me, it was Risky Business, some kid dancing around in his underwear. He wasn't the "last movie star" then. He was just another actor trying to make it. But here's the thing: Today, if you saw Tom Cruise walking down the street, you'd lose your mind. You'd want selfies, autographs, the whole nine yards. Why? Because over decades, he created millions of micro-interactions that built trust, familiarity, and fandom. That's exactly what you need to do on social media. You need to create fans of YOU. The problem is that most sales professionals want to skip the relationship-building phase and jump straight to the closing phase. They want to post a few listing videos and magically generate leads. That's not how it works. The Algorithm Rewards Consistency, Not Perfection Here's the part that's going to hurt: You need to post every single day. Not when you feel like it. Not when you have something "good" to share. Every. Single. Day. When you first start, your content is going to suck. Your first TikTok video? Three people will watch it. Your first Instagram post? Crickets. Your first LinkedIn article? Your mom and your real estate buddy will like it. I know because I've been there. We've all been there. The algorithms don't care about your feelings—they care about consistency. Think about it this way: You're not just competing with other sales professionals for attention. You're competing with Netflix, YouTube, TikTok, and every other form of entertainment for your prospects' eyeballs. The only way to win that battle is to show up relentlessly until people start recognizing your name and face. The Two-Bucket Strategy: Marketing vs. Lead Generation When you think about social media as a sales professional, you need to separate it into two distinct buckets: Bucket 1: Marketing and Brand Building This is about name recognition, familiarity, and staying top-of-mind. When people in your market are ready to buy or sell, your name should be the first one they think of. This bucket is about volume, consistency, and building your personal brand. Bucket 2: Direct Lead Generation This is about watching what prospects are doing, engaging with them directly, and converting social interactions into sales conversations. This bucket is about quality, relationship building, and moving people from digital relationships to actual appointments. Most people focus entirely on Bucket 1 and wonder why they're not getting leads. Others focus only on Bucket 2 and wonder why their content isn't reaching anyone. You need both working in harmony. Your 3-Pillar Content Strategy System Here's what you need to post consistently: Original Content: This is your unique perspective, your experience, your stories. If you're a 20-year veteran like Margarita, you have war stories that new agents don't. You've survived market crashes, interest rate spikes, and industry changes. Share that wisdom. Curated Content: Find industry articles, market reports, and news relevant to your prospects.
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: Australian airline Qantas looks like it got a Scattered Spider-ing Microsoft works towards blunting the next CrowdStrike disaster Changes are coming for Microsoft's default enterprise app consenting setup Synology downplays hardcoded passwords for its M365 cloud backup agent The next Citrix Netscaler memory disclosure looks nasty Drug cartels used technical surveillance to find, fix and finish FBI informants and witnesses This week's episode is sponsored by RAD Security. Co-founder Jimmy Mesta joins to talk through how they use AI automation to assess the security posture of sprawling cloud environments. This episode is also available on Youtube. Show notes Qantas hit by cyber attack, leaving 6 million customer records at risk of data breach Scattered Spider appears to pivot toward aviation sector | Cybersecurity Dive Microsoft to make Windows more resilient following 2024 IT outage | Cybersecurity Dive (384) The Ultimate Guide to App Consent in Microsoft Entra - YouTube When Backups Open Backdoors: Accessing Sensitive Cloud Data via "Synology Active Backup for Microsoft 365" / modzero AT&T deploys new account lock feature to counter SIM swapping | CyberScoop Iran-linked hackers threaten to release Trump aides' emails | Reuters US government warns of new Iran-linked cyber threats on critical infrastructure | Cybersecurity Dive Actively exploited vulnerability gives extraordinary control over server fleets - Ars Technica Critical vulnerability in Citrix Netscaler raises specter of exploitation wave | Cybersecurity Dive Identities of More Than 80 Americans Stolen for North Korean IT Worker Scams | WIRED Cloudflare confirms Russia restricting access to services amid free internet crackdown | The Record from Recorded Future News Mexican drug cartel used hacker to track FBI official, then killed potential FBI informants, government audit says | CNN Politics Audit of the FBI's Efforts to Mitigate the Effects of Ubiquitous Technical Surveillance - Redacted Report NATO members aim for spending 5% of GDP on defense, with 1.5% eligible for cyber | The Record from Recorded Future News US sanctions bulletproof hosting provider for supporting ransomware, infostealer operations | CyberScoop US, French authorities confirm arrest of BreachForums hackers | TechCrunch Spanish police arrest five over $542 million crypto investment scheme | The Record from Recorded Future News Scam compounds labeled a 'living nightmare' as Cambodian government accused of turning a blind eye | The Record from Recorded Future News
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: We roll our eyes over the “16 billion credentials” leak hitting mainstream news Some interesting cyber angles emerge from the conflict in Iran Opensource maintainer of libxml2 is fed up with this hacker crap Shockingly, there are yet more ways to trick people into pasting commands into Windows Veeam “patches” its backup software RCE like it's 2002 … by breaking the public PoC This week's episode is sponsored by Internet-wide honeypot reconnaissance platform, Greynoise. Founder Andrew Morris joins to talk about their journey spotting Chinese ORB-builders hacking thousands of ASUS routers, and why they're destined for the woodchipper. This episode is also available on Youtube. Show notes No, the 16 billion credentials leak is not a new data breach Canadian telecom hacked by suspected China state group - Ars Technica Telecom giant Viasat breached by China's Salt Typhoon hackers WarTranslated on X: "Iran's jamming GPS in the Strait of Hormuz, messing with ~970 ships, per Windward. UKMTO confirms the interference. Faulty AIS coordinates are screwing up navigation in the Persian Gulf. The IRGC threatens to shut the strait down in hours. https://t.co/kdMJvshOGC" / X Dmitri Alperovitch on X: "Chairman of the Joint Chiefs Gen. Dan Caine says @US_CYBERCOM supported this strike mission" / X Top Pentagon spy pick rejected by White House - POLITICO DHS warns of heightened cyber threat as US enters Iran conflict | Cybersecurity Dive Exclusive: Early US intel assessment suggests strikes on Iran did not destroy nuclear sites, sources say U.S. braces for Iran's response after overnight strikes on nuclear sites Assessing the Damage to Iran's Nuclear Program Iran Hacks Tirana Municipality in Retaliation Over MEK - Tirana Times Iran's government says it shut down internet to protect against cyberattacks | TechCrunch Aflac discloses cyber intrusion linked to wider crime spree targeting insurance industry | Cybersecurity Dive Tonga Ministry of Health hit with cyberattack affecting website, IT systems | The Record from Recorded Future News Alleged Ryuk ransomware gang member arrested in Ukraine and extradited to US | The Record from Recorded Future News Russia releases REvil members after convictions for payment card fraud | The Record from Recorded Future News OneLogin, Many Issues: How I Pivoted from a Trial Tenant to Compromising Customer Signing Keys - SpecterOps Triaging security issues reported by third parties (#913) · Issue · GNOME/libxml2 README: Set expectations straight (35d04a08) · Commits · GNOME / libxml2 · GitLab What's in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia | Google Cloud Blog FileFix - A ClickFix Alternative | mr.d0x Address bar shows hp.com. Browser displays scammers' malicious text anyway. - Ars Technica Researchers urge vigilance as Veeam releases patch to address critical flaw | Cybersecurity Dive ASUSpicious Flaw - Millions of Users' Information Exposed Since 2022 | MrBruh's Epic Blog Perth dad who created ‘evil twin' Wi-Fi did so to access pictures of women GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers
On this week's show Patrick Gray and Adam Boileau are joined by special guest Chris Krebs to discuss the week's cybersecurity news. They talk through: Israeli “hacktivists” take out an Iranian state-owned bank Scattered-spider and friends pivot into attacking insurers Securing identities in a cloud-first world keeps us awake at night Microsoft takes the “aas” out of SaaS for Europe, leaving us with just software! An AI prompt injection into M365 exfils corporate data This week's episode is sponsored by Kroll's Cyber practice. Kroll Cyber Associate Managing Director George Glass is based in London and talks through his experiences helping organisations in the UK deal with the Scattered Spider attacks. This episode is also available on Youtube. Show notes Iran's Bank Sepah disrupted by cyberattack claimed by pro-Israel hacktivist group | CyberScoop Iran orders officials to ditch connected devices Heightened Cyberthreat Amidst Israel-Iran Conflict Threat group linked to UK, US retail attacks now targeting insurance industry | Cybersecurity Dive Coming to Apple OSes: A seamless, secure way to import and export passkeys - Ars Technica Cyberattack on Washington Post Compromises Email Accounts of Journalists Hackers impersonating US government compromise email account of prominent Russia researcher | The Record from Recorded Future News A good one to talk to Chris about: Breaking down ‘EchoLeak', the First Zero-Click AI Vulnerability Enabling Data Exfiltration from Microsoft 365 Copilot CISA warns of supply chain risks as ransomware attacks exploit SimpleHelp flaws | Cybersecurity Dive Whole Foods supplier making progress on restoration after cyberattack left shelves empty | The Record from Recorded Future News Ransomware attack on ticketing platform upends South Korean entertainment industry | The Record from Recorded Future News Advisory: Cybersecurity incident
In this sponsored Soap Box edition of the Risky Business podcast Patrick Gray chats with Dropzone AI founder Ed Wu about the role of LLMs in the SOC. The debate about whether AI agents are going to wind up in the SOC is over, they've already arrived. But what are they good for? What are they NOT good for? And where else will we see AI popping up in security? This episode is also available on Youtube. Show notes
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: New York Times gets a little stolen Russian FSB data as a treat iVerify spots possible evidence of iOS exploitation against the Harris-Walz campaign Researcher figures out a trick to get Google account holders' full names and phone numbers Major US food distributor gets ransomwared The Com's social engineering of Salesforce app authorisations is a harbinger of our future problems Australian Navy forgets New Zealand has computers, zaps Kiwis with their giant radar. This week's episode is sponsored by identity provider Okta. Long-time friend of the show Alex Tilley is Okta's Global Threat Research Coordinator, and he joins to discuss how organisations can use both human and technical signals to spot North Koreans in their midst. This episode is also available on Youtube. Show notes How The Times Obtained Secret Russian Intelligence Documents - The New York Times Ukraine's military intelligence claims cyberattack on Russian strategic bomber maker | The Record from Recorded Future News Harris-Walz campaign may have been targeted by iPhone hackers, cybersecurity firm says iVerify Uncovers Evidence of Zero-Click Mobile Exploitation in the U.S. Spyware maker cuts ties with Italy after government refused audit into hack of journalist's phone | The Record from Recorded Future News Italian lawmakers say Italy used spyware to target phones of immigration activists, but not against journalist | TechCrunch Android chipmaker Qualcomm fixes three zero-days exploited by hackers | TechCrunch Cellebrite to acquire mobile testing firm Corellium in $200 million deal | CyberScoop Apple Gave Governments Data on Thousands of Push Notifications A Researcher Figured Out How to Reveal Any Phone Number Linked to a Google Account Bruteforcing the phone number of any Google user Acreed infostealer poised to replace Lumma after global crackdown | The Record from Recorded Future News BidenCash darknet forum taken down by US, Dutch law enforcement | The Record from Recorded Future News NHS calls for 1 million blood donors as UK stocks remain low following cyberattack | The Record from Recorded Future News Major food wholesaler says cyberattack impacting distribution systems | The Record from Recorded Future News Kettering Health confirms attack by Interlock ransomware group as health record system is restored | The Record from Recorded Future News Hackers abuse malicious version of Salesforce tool for data theft, extortion | Cybersecurity Dive shubs on X: "IP whitelisting is fundamentally broken. At @assetnote, we've successfully bypassed network controls by routing traffic through a specific location (cloud provider, geo-location). Today, we're releasing Newtowner, to help test for this issue: https://t.co/X3dkMz9gwK" / X Ross Ulbricht Got a $31 Million Donation From a Dark Web Dealer, Crypto Tracers Suspect | WIRED Australian navy ship causes radio and internet outages to parts of New Zealand
Richies, just in time for ""Mission: Impossible – The Final Reckoning"" - the last installment of the MI franchise - we bring you one of the most bankable stars in the world, Tom Cruise. As a boy, he's bullied because of his height, and faces learning difficulties at school. But that was then and this is now. Thanks to roles in “Risky Business,” “Top Gun,” “A Few Good Men,” and the money-printing “Mission: Impossible” franchise, Tom has become not only an enormous action star, but one of Hollywood's most surefire leading men. And one of its most controversial. Who could forget the image of him jumping up and down on Oprah's couch after falling for Katie Holmes? Or when the “War of the Worlds” star and public face of Scientology stirs the pot on “Today,"" criticizing Brooke Shields for using medication to treat postpartum depression. (A major no-no according to Tom's church.) There's no questioning Tom's mega-star status - or his extremely polarizing views.You can follow Brooke and Aricia on socials at @brookesiffrinn and @ariciaskidmorewilliamss. And check out the brand new Even the Rich merch store at www.eventherich.com.Be the first to know about Wondery's newest podcasts, curated recommendations, and more! Sign up now at https://wondery.fm/wonderynewsletterListen to Even The Rich on the Wondery App or wherever you get your podcasts. Experience all episodes ad-free and be the first to binge the newest season. Unlock exclusive early access by joining Wondery+ in the Wondery App or on Apple Podcasts. Start your free trial today by visiting wondery.com/links/even-the-rich/ now.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.