Podcasts about Risky Business

1983 film by Paul Brickman

  • 1,730PODCASTS
  • 2,497EPISODES
  • 46mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Aug 27, 2025LATEST
Risky Business

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Risky Business

Latest podcast episodes about Risky Business

Risky Business
Risky Business #804 -- Phrack's DPRK hacker is probably a Chinese APT guy

Risky Business

Play Episode Listen Later Aug 27, 2025 53:32


On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: Australia expels Iranian ambassador Hackers sabotage Iranian shipping satcoms APT hacker got doxxed in Phrack. Kind of. They're probably Chinese, not DPRK? Trail of Bits uses image-downscaling to sneak prompts into Google Gemini The Com's King Bob gets ten years in the slammer It's a day that ends in -y, so of course there's a new Citrix Netscaler RCE being used in the wild. This week's episode is brought to you by Corelight. Chief Strategy Officer Greg Bell talks through how they've been implementing AI for sifting through your network data. A model-context-protocol server that can rummage in all those packet logs for you while you keep investigating? Yes please. This episode is also available on Youtube. Show notes Embassy staff flee Canberra in dead of night | news.com.au — Australia's leading news site for latest headlines Swedish security service says Iran uses criminal networks in Sweden | Reuters Risky Bulletin: Hackers sabotage Iranian ships at sea, again - Risky Business Media Microsoft scales back Chinese access to cyber early warning system | Reuters Microsoft Didn't Disclose Key Details to U.S. Officials of China-Based Engineers, Record Shows — ProPublica .:: Phrack Magazine ::. Uncovering the Chinese Proxy Service Used in APT Campaigns Weaponizing image scaling against production AI systems -The Trail of Bits Blog FBI, Cisco warn of Russia-linked hackers targeting critical infrastructure organizations | Cybersecurity Dive CrowdStrike warns of uptick in Silk Typhoon attacks this summer | CyberScoop Kevin Beaumont: "There's a bunch of new Netscal…" - Cyberplace US charges Oregon man in vast botnet-for-hire operation | Cybersecurity Dive South Korea arrests suspected Chinese hacker accused of targeting BTS singer and other celebrities | The Record from Recorded Future News SIM-Swapper, Scattered Spider Hacker Gets 10 Years – Krebs on Security Chinese national who sabotaged Ohio company's systems handed four-year jail stint | The Record from Recorded Future News Nevada state offices close after wide-ranging 'network security incident' | Reuters DSLRoot, Proxies, and the Threat of ‘Legal Botnets' – Krebs on Security Russia weighs Google Meet ban as part of foreign tech crackdown | The Record from Recorded Future News Kremlin-Mandated Messaging App Max Is Designed To Spy On Users Иеромонах РПЦ Макарий призвал помолиться за мессенджер MAX

Mostly Film
Take 189: Risky Business & Don't Look Up. Cruise Vs. DiCaprio: A Hollywood Legacy.

Mostly Film

Play Episode Listen Later Aug 24, 2025 38:37


Nightmare Next Door
Risky Business

Nightmare Next Door

Play Episode Listen Later Aug 22, 2025 36:48


When Bob Eidman is found executed in his office in broad daylight, the people of St. Charles are terrified a cold-blooded killer is on the loose. But when police discover Bob's secret life, they expose a slew of suspects with motive for murder Hosted on Acast. See acast.com/privacy for more information.

Risky Business
Risky Business #803 -- Oracle's CSO Mary Ann Davidson quietly departs

Risky Business

Play Episode Listen Later Aug 20, 2025 58:28


On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: Oracle's long term CSO departs, and we're not that sad about it Canada's House of Commons gets popped through a Microsoft bug Russia degrades voice calls via Whatsapp and Telegram to push people towards Max South-East Asian scam compounds are also behind child sextortion Reports that the UK has backed down on Apple crypto are… strange Oh and of course there's a Fortinet bug! There's always a Fortinet bug! This week's episode is sponsored by open source identity provider Authentik. CEO Fletcher Heisler joins the show this week, and explains the journey of implementing SSO backed login on Windows, Mac and Linux. You'll never guess which one was a few lines of PAM config, and which was a multi-month engineering project! This episode is also available on Youtube. Show notes Is Oracle facing headwinds? After layoffs, its 4-decade veteran Chief Security Officer Mary Ann Davidson departs Oracle CSO blasted over anti-security research rant - iTnews New York lawsuit against Zelle creator alleges features allowed $1 billion in thefts | The Record from Recorded Future News Mobile Phishers Target Brokerage Accounts in ‘Ramp and Dump' Cashout Scheme – Krebs on Security How we found TeaOnHer spilling users' driver's licenses in less than 10 minutes | TechCrunch UK has backed down on demand to access US Apple user data, spy chief says DNI Tulsi Gabbard on X: "As a result, the UK has agreed to drop its mandate for" Hackers target Workday in social engineering attack Russia curbs WhatsApp, Telegram calls to counter cybercrime | The Record from Recorded Future News Hackers reportedly compromise Canadian House of Commons through Microsoft vulnerability | The Record from Recorded Future News Norway police believe pro-Russian hackers were behind April dam sabotage | The Record from Recorded Future News US agencies, international allies issue guidance on OT asset inventorying | Cybersecurity Dive FortMajeure: Authentication Bypass in FortiWeb (CVE-2025-52970) U.S. State Dept - Near Eastern Affairs on X: "He did not claim diplomatic immunity and was released by a state judge" 493 Cases of Sextortion Against Children Linked to Notorious Scam Compounds | WIRED .:: Phrack Magazine ::. Accenture to buy Australian cyber security firm CyberCX - iTnews

Bob Sirott
This Week in Chicago History: Tom Skilling, Eddie Vedder, and ‘Risky Business'

Bob Sirott

Play Episode Listen Later Aug 20, 2025


Anna Davlantes, WGN Radio's investigative correspondent, joins Bob Sirott to share what happened this week in Chicago history. Stories include the opening of Charlie Trotter’s, Ozzy Osbourne’s special Wrigley Field performance, Tom Skilling’s debut on WGN-TV, and more.

Risky Business
Risky Biz Soap Box: How to measure vulnerability reachability

Risky Business

Play Episode Listen Later Aug 14, 2025 35:48


In this Soap Box edition of the Risky Business podcast Patrick Gray chats with Socket founder Feross Aboukhadijeh about how to measure the reachability of vulnerabilities in applications. It's great to know there's a CVE in a library you're using, but it's even better if you can say whether or not that vulnerability actually impacts your application. They also talk about how Socket started out as a way to discover malicious packages in software projects, but these days it's playing the CVE game as well. This episode is also available on Youtube. Show notes

Risky Business
Risky Business #802 -- Accessing internal Microsoft apps with your Hotmail creds

Risky Business

Play Episode Listen Later Aug 13, 2025 60:00


On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: CISA warns about the path from on-prem Exchange to the cloud Microsoft awards a crisp zero dollar bill for a report about what a mess its internal Entra-authed apps are Everyone and their dog seems to have a shell in US Federal Court information systems Google pays $250k for a Chrome sandbox escape Attackers use javascript in adult SVG files to … farm facebook likes?! SonicWall says users aren't getting hacked with an 0day… this time. This week's episode is sponsored by SpecterOps. Chief product officer Justin Kohler talks about how the flagship Bloodhound tool has evolved to map attack paths anywhere. Bring your own applications, directories and systems into the graph, and join the identity attacks together. This episode is also available on Youtube. Show notes CISA, Microsoft issue alerts on ‘high-severity' Exchange vulnerability | The Record from Recorded Future News Advanced Active Directory to Entra ID lateral movement techniques Consent & Compromise: Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications Cartels may be able to target witnesses after major court hack Federal judiciary tightens digital security as it deals with ‘escalated cyberattacks' | The Record from Recorded Future News Citrix NetScaler flaws lead to critical infrastructure breaches | Cybersecurity Dive DARPA touts value of AI-powered vulnerability detection as it announces competition winners | Cybersecurity Dive Buttercup is now open-source! HTTP/1.1 must die: the desync endgame US confirms takedown of BlackSuit ransomware gang that racked up $370 million in ransoms | The Record from Recorded Future News North Korean cyber-espionage group ScarCruft adds ransomware in recent attack | The Record from Recorded Future News Adult sites are stashing exploit code inside racy .svg files - Ars Technica Google pays 250k for Chromium sandbox escape SonicWall says recent attack wave involved previously disclosed flaw, not zero-day | Cybersecurity Dive Two groups exploit WinRAR flaws in separate cyber-espionage campaigns | The Record from Recorded Future News Tornado Cash cofounder dodges money laundering conviction, found guilty of lesser charge | The Record from Recorded Future News Hackers Hijacked Google's Gemini AI With a Poisoned Calendar Invite to Take Over a Smart Home | WIRED Malware in Open VSX: These Vibes Are Off How attackers are using Active Directory Federation Services to phish with legit office.com links Introducing our guide to phishing detection evasion techniques The State of Attack Path Management

Bad Dads Film Review
Midweek Mention... Risky Business

Bad Dads Film Review

Play Episode Listen Later Aug 13, 2025 19:14


You can now text us anonymously to leave feedback, suggest future content or simply hurl abuse at us. We'll read out any texts we receive on the show. Click here to try it out!Welcome back to Bad Dads Film Review! This week we're donning our Ray-Bans, sliding across the living room floor, and revisiting the film that launched Tom Cruise into superstardom — Risky Business (1983). Equal parts coming-of-age comedy, satire, and cautionary tale, it's a movie that defined a certain brand of 80s cool while slyly critiquing the era's obsession with wealth and success.Directed by Paul Brickman, Risky Business follows Joel Goodson (Tom Cruise), a high-achieving Chicago high school student left home alone while his parents are away. Initially envisioning a week of harmless fun, things spiral after a night with call girl Lana (Rebecca De Mornay) leads Joel into a world of escalating consequences, entrepreneurial schemes, and moral compromises.What begins as a teenage fantasy of freedom and rebellion becomes a sharply observed journey into adulthood — and a satire of the “make it big” mentality that fuelled the 80s.While it has that glossy 80s comedy appeal, Risky Business is far smarter and more cynical than it first appears. It's one of those films that teenage audiences might take at face value as a tale of freedom and rebellion, but adults will recognise as a sharp social critique. That said, it's very much an R-rated outing — so maybe not one for family movie night.In the end, Risky Business is more than just a star-making turn for Tom Cruise. It's a stylish, clever, and surprisingly subversive look at ambition, temptation, and the thin line between opportunity and exploitation.

Risky Business
Risky Business #801 -- AI models can hack well now and it's weirding us out

Risky Business

Play Episode Listen Later Aug 6, 2025 66:01


On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news. Google security engineering VP Heather Adkins drops by to talk about their AI bug hunter, and Risky Business producer Amberleigh Jack makes her main show debut. This episode explores the rise of AI-powered bug hunting: Google's Project Zero and Deepmind team up to find and report 20 bugs to open source projects The XBOW AI bug hunting platform sees success on HackerOne Is an AI James Kettle on the horizon? There's also plenty of regular cybersecurity news to discuss: On-prem Sharepoint's codebase is maintained out of China… awkward! China frets about the US backdooring its NVIDIA chips, how you like ‘dem apples, China? SonicWall advises customers to turn off their VPNs Hardware controlling Dell laptop fingerprint and card readers has nasty driver bugs Russia uses its ISPs to in-the-middle embassy computers and backdoor ‘em. The Russian government pushes VK's Max messenger for everything This week's show is sponsored by device management platform Devicie. Head of Solutions Sean Ollerton talks through the impending Windows 10 apocalypse, as Microsoft ends mainstream support. He says Windows 11 isn't as scary as people make out, but if the update isn't on your radar now, time is running out. This episode is also available on Youtube. Show notes Google says its AI-based bug hunter found 20 security vulnerabilities | TechCrunch Is XBOW's success the beginning of the end of human-led bug hunting? Not yet. | CyberScoop James Kettle on X: "There I am being careful to balance hyping my talk without going too far and then this gets published

Here to Evolve
77. We Judged 20 Fitness Fads So You Don't Have To

Here to Evolve

Play Episode Listen Later Aug 5, 2025 71:42


From cold plunges to booty bands, 75 Hard to walking pads — the fitness world is flooded with trends claiming to be the next big thing. But are they actually worth your time… or just another fast track to burnout, boredom, or broken knees? In this episode, we put 20 of the most popular fitness fads on trial. No filters — just real talk, bold opinions, and honest takes on what's actually helpful… and what's total nonsense. We cover: The real deal with 12-3-30 Whether HIIT every day is helping or hurting you Why some trends are all hype and no science The hidden risks behind influencer workouts And the one trend we secretly love (but kind of hate ourselves for it) If you've ever wondered, “Should I be doing that too?” — this one's for you. Tune in, laugh a little, and walk away knowing which trends are worth your energy… and which belong in the trash. Because when it comes to your health, clarity beats chaos. Every time. APPLY FOR COACHING: https://www.lvltncoaching.com/1-1-coaching SDE Method app: https://www.lvltncoaching.com/sde-method-app Project B Waiting List https://quest.lvltncoaching.com/project-b Macros Guide https://www.lvltncoaching.com/free-resources/calculate-your-macros Join the Facebook Community: https://www.facebook.com/groups/lvltncoaching FREE TOOLS to start your health and fitness journey: https://www.lvltncoaching.com/resources/freebies Alessandra's Instagram: http://instagram.com/alessandrascutnik Joelle's Instagram: https://www.instagram.com/joellesamantha?igsh=ZnVhZjFjczN0OTdn Josh's Instagram: http://instagram.com/joshscutnik Chapters: 00:00 Introduction to Fitness Trends 02:30 75 Hard: Mental Toughness or Burnout? 09:00 Walking Pads: Productivity or Distraction? 12:50 Carnivore Diet: Survival Mode or Nonsense? 14:29 High Rep, Lightweight Workouts: Are They Effective? 18:53 10,000 Steps a Day: Myth or Reality? 24:41 Energy Drinks: Boost or Burden? 30:59 Refreshing Mocktails and Hydration Choices 33:01 Caffeine: Energy Blocker or Performance Enhancer? 34:04 Barefoot Training: Trendy or Beneficial? 36:46 Fasted Cardio: Effective or Unnecessary? 42:36 Running Safety and Awareness 45:47 Booty Bands: Effective Tool or Marketing Gimmick? 48:10 HIIT: Efficient Fat Loss or Stress Inducer? 48:39 The Influence of HRV on Workouts 49:26 Pros and Cons of Influencer Workouts 50:40 Cold Plunges and Ice Baths: A Personal Perspective 51:57 Exploring Red Light Therapy 53:54 The Myths of Sweating and Fat Loss 55:17 Ankle Weights: Functional Boost or Risky Business? 55:58 Group Fitness Classes: Community or Chaos? 57:27 The 12-3-30 Treadmill Method: A Trend or Effective Workout? 59:32 Smartwatches and HRV: Helpful Tool or Mental Trap? 01:02:30 Fitness Challenges: Jumpstart or Yo-Yo Effect? 01:05:00 Peloton: Game-Changer or Overpriced Spin Cult?

Hochman and Crowder
Hour 4: Risky Business & Matt Mervis

Hochman and Crowder

Play Episode Listen Later Aug 5, 2025 14:25


In hour four, remembering "Risky Business" and why Appel still has not scene it. Also, remembering the good times with Matt Mervis and The Marlins.

Multiplex Overthruster
Risky Business: Summer of '83

Multiplex Overthruster

Play Episode Listen Later Aug 2, 2025 130:16


Put on your Ray-Bans, rev up the Porsche, and crank up the Tangerine Dream! It's time for the movie that made Tom Cruise a star, which somehow Javi and Paul had never seen! Listen as they, with the help of ever-patient Producer Brad, get past their preconceived notions and are rewarded with a teen sex comedy that has more in common with Blue Velvet than Porky's. Suburban high school senior Joel (Cruise), afflicted with anxiety about getting into Princeton and left home alone by his materialistic parents, is prodded by devil-on-his-shoulder pal Miles (Curtis Armstrong) down the path to some Risky Business in the form of call girl Lana (Rebecca De Mornay), who turns Joel's home into a brothel. Is it a swooning love letter to capitalism, or subversive indictment of it, or both? Javi and Paul marvel and muse at this unexpectedly layered, nuanced, and finely crafted film rife with symbolism, sex positivity, delightful dream sequences, awesome needle drops, surprisingly positive trans representation, a crystal egg, and a young Joe Pantoliano as Guido the Killer Pimp. There is no substitute!Show Notes:1983 Box OfficeAugust 5-7, 1983, Weekend Box OfficeRisky Business Box Office ResultsHollywood Reporter excerpts from Curtis Armstrong's 2017 memoir, Revenge of the Nerd.Top 100 Stars in Leading roles at the Domestic Box OfficeFollow us!InstagramBlueskyemail: Multiplexoverthruster@gmail.com Hosted on Acast. See acast.com/privacy for more information.

Farming For Change
Risky Business

Farming For Change

Play Episode Listen Later Aug 1, 2025 55:57


In this episode, James and Ben are joined by Oliver Scott, the Farms Director at Mawley Hall in Shropshire, to discuss 'agflation', the importance of diversity in farming and the financial viability of moving away from the status quo.

Risky Business
Risky Business #800 — The SharePoint bug may have leaked from Microsoft MAPP

Risky Business

Play Episode Listen Later Jul 30, 2025 53:37


On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: Did the SharePoint bug leak out of the Microsoft MAPP program? Expel retracts its FIDO bypass writeup The mess surrounding the women-only dating-safety app Tea gets worse Broadcom customers struggle to get patches for VMWare hypervisor escapes Aeroflot gets hacked by the Cyber Partisans, disrupting flights This week's episode is sponsored by Push Security. Satisfied Push customer Daniel Cuthbert from Santander Bank joins on their behalf. He explains how having telemetry about identity from inside the browser is a key pillar for investigating intrusions in the browser-centric future. This episode is also available on Youtube. Show notes Microsoft Probing Whether Cyber Alert Tipped Off Chinese Hackers Microsoft says Warlock ransomware deployed in SharePoint attacks as governments scramble | The Record from Recorded Future News What we know about the Microsoft SharePoint attacks | Cybersecurity Dive An important update (and apology) on our PoisonSeed blog Tea User Files Class Action After Women's Safety App Exposes Data A Second Tea Breach Reveals Users' DMs About Abortions and Cheating Top Lawyer for National Security Agency Is Fired From Help Desk to Hypervisor: Defending Your VMware vSphere Estate from UNC3944 VMware prevents some perpetual license holders from downloading patches Pro-Ukrainian hackers take credit for attack that snarls Russian flight travel - Ars Technica КИБЕРУДАР ПО АЭРОФЛОТУ РФ!v Treasury sanctions North Koreans involved in IT-worker schemes | Cybersecurity Dive Minnesota governor activates National Guard amid St. Paul cyberattack | StateScoop Outage was result of cyberattack, Post Luxembourg says Clorox files $380 million suit blaming Cognizant for 2023 cyberattack | Cybersecurity Dive Cisco network access security platform vulnerabilities under active exploitation | CyberScoop Arizona woman sentenced to 8.5 years for running North Korean laptop farm | The Record from Recorded Future News Cybercrime forum Leak Zone publicly exposed its users' IP addresses | TechCrunch

Tiki and Tierney
Mets' Blast from the Past: Risky Business?

Tiki and Tierney

Play Episode Listen Later Jul 29, 2025 9:48


BT and Sal ignite a fiery debate on whether the New York Mets should turn to familiar faces to bolster their roster. From a potential reunion with Severino to considering other past players, the duo dissects the risks and rewards of bringing back former Mets. The discussion also touches on the delicate balance of trusting young talent versus acquiring proven, albeit familiar, veterans to make a push for the postseason.

The Path to Bitcoin
Episode #167 – Risky Business

The Path to Bitcoin

Play Episode Listen Later Jul 28, 2025 36:24


Risky Business
Risky Business #799 -- Everyone's Sharepoint gets shelled

Risky Business

Play Episode Listen Later Jul 23, 2025 73:55


Risky Biz returns after two weeks off, and there sure is cybersecurity news to catch up on. Patrick Gray and Adam Boileau discuss: Microsoft tried to make outsourcing the Pentagon's cloud maintenance to China okay (it was not) She shells Sharepoint by the sea-shore (by ‘she' we mean ‘China') Four (alleged) Scattered Spider members arrested (and bailed) in the UK Hackers spend $2700 to buy creds for a Brazilian payment system, steal $100M Fortinet has SQLI in the auth header, Citrix mem leak is weaponised, HP hardcodes creds and Sonicwalls get user-moderootkits. Just security vendor things! This week's episode is sponsored by Airlock Digital. CEO David Cottingham talks through what it takes to build a mature, resilient management platform for a security critical system. This episode is also available on Youtube. Show notes Update on DOD's cloud services Microsoft to stop using engineers in China for tech support of US military, Hegseth orders review A Little-Known Microsoft Program Could Expose the Defense Department to Chinese Hackers While DOD policy bans unauthorized apps like TikTok from being on employees phones over national security risks Microsoft Fix Targets Attacks on SharePoint Zero-Day – Krebs on Security National Guard was hacked by China's 'Salt Typhoon' group, DHS says Suspected contractor for China's Hafnium group arrested in in Italy | Cybersecurity Dive Singapore accuses Chinese state-backed hackers of attacking critical infrastructure networks | The Record from Recorded Future News UK Arrests Four in ‘Scattered Spider' Ransom Group – Krebs on Security Four people bailed after arrests over cyber attacks on M&S, Co-op and Harrods Brazilian police arrest IT worker over $100 million cyber theft | The Record from Recorded Future News At Least 750 US Hospitals Faced Disruptions During Last Year's CrowdStrike Outage, Study Finds | WIRED Hacker returns cryptocurrency stolen from GMX exchange after $5 million bounty payment | The Record Indian crypto exchange CoinDCX says $44 million stolen from reserves | The Record Chainalysis: $2.17 billion in crypto stolen in first half of 2025, driven by North Korean hacks | The Record PoisonSeed bypassing FIDO keys to ‘fetch' user accounts Risky Bulletin: Browser extensions hijacked for web scraping botnet A Startup is Selling Data Hacked from Peoples' Computers to Debt Collectors A surveillance vendor was caught exploiting a new SS7 attack to track people's phone locations | TechCrunch Ukrainian hackers wipe databases at Russia's Gazprom in major cyberattack, intelligence source says File transfer company CrushFTP warns of zero-day exploit seen in the wild | The Record HPE warns of hardcoded passwords in Aruba access points Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector (CVE-2025-25257) Researchers, CISA confirm active exploitation of critical Citrix Netscaler flaw | Cybersecurity Dive Google finds custom backdoor being installed on SonicWall network devices - Ars Technica Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years

Risky Business News
Sponsored: Haroon Meer's secret to business success is… love

Risky Business News

Play Episode Listen Later Jul 20, 2025 20:53


In this Risky Business sponsored interview, Thinkst Canary CEO Haroon Meer chats to Casey Ellis about the company's impressive growth over the past decade, and how it approached that path a little differently to other firms. Haroon's advice for young startup founders: Is your problem worth solving? And can you actually solve it? And… Love your customers. Show notes

Risky Business
Risky Biz Soap Box: Prowler, the open cloud security platform

Risky Business

Play Episode Listen Later Jul 14, 2025 32:08


In this sponsored Soap Box edition of the Risky Business podcast Patrick Gray chats with Toni de la Fuente, founder of open source multi-cloud security product Prowler. Toni explains how Prowler came to be, and how its journey followed his own learning about the cloud. The pair also discuss Prowler's successful transition from an open-source project into a community, and now a growing business with an as-a-service platform. This episode is also available on Youtube. Show notes

Stonebridge Podcast
Risky Business

Stonebridge Podcast

Play Episode Listen Later Jul 14, 2025 36:22


Pastor: Brandon LeveringSeries: God in the VaporScripture: Ecclesiastes 11:1-6Main Point: In the face of life's uncertainties, give boldly, work boldly, and trust God boldly.

AIPT Movies
Julygantic - Tremors (1990)

AIPT Movies

Play Episode Listen Later Jul 13, 2025 72:35


Welcome to another episode of Death Don't Do Fiction, the AIPT Movies podcast! The podcast about the enduring legacy of our favorite movies! It's July, so that means it's time for our “Julygantic” series! Where we cover monster movies! In this week's episode, Alex, Tim, and guest Matt Naughton discuss Kevin Bacon's 1990 creature feature, Tremors!Beautiful locations! Handy men with questionable skills! Multi-tongue appendages! Grabboid cam! Rampant disrespect of vehicles! Perverse barbed wire! Training for a pogo stick world record! Doomsday prepper validation! Vodka sauce gore! A satisfying blend of horror and comedy! One of cinema's most iconic posters! Glorious practical effects, from miniatures to damp, animatronic puppets! A solid, committed cast that includes Kevin Bacon, Fred Ward, Reba McEntire, Michael Gross, Victor Wong, and Finn Carter! An ode to B movies that makes you afraid of land the way Jaws made you afraid of water!In addition, Matt Naughton shares his spoiler-free thoughts on the John Cena & Idris Elba action comedy Heads of State, while Alex does the same for M3GAN 2.0, Jurassic World Rebirth, Risky Business, and Under Siege!The Death Don't Do Fiction podcast brings you the latest in movie news, reviews, and more! Hosted by supposed “industry vets,” Alex Harris and Tim Gardiner, the show gives you a peek behind the scenes from two filmmakers with oddly nonexistent filmographies. You can find Alex on Twitter, Bluesky, or Letterboxd @actionharris. This episode's guest, Matt Naughton, can be found on Instagram @mnaughty85. Tim can't be found on social media because he doesn't exist. If you have any questions or suggestions for the Death Don't Do Fiction crew, they can be reached at aiptmoviespod@gmail.com, or you can find them on Twitter or Instagram @aiptmoviespod.Theme song is “We Got it Goin On” by Cobra Man.

Risky Business News
Sponsored: Should we ever trust AI?

Risky Business News

Play Episode Listen Later Jul 13, 2025 14:19


In this Risky Business sponsored interview, Zero Networks Field CTO, Chris Boehm discusses the everyone-gets-an-AI future with Casey Ellis. Zero Networks makes network microsegmentation achievable without simply handing an AI control of the network. Will generative artificial intelligence ever be trusted to make hard access control decisions? Show notes

The Library - Halo Lorecast
118 - RISKy Business (and when it all falls apart)

The Library - Halo Lorecast

Play Episode Listen Later Jul 10, 2025 93:57


When RISK fails to be the focal point of discussion, things quickly go off the rails... The Library - Halo Lorecast is a JumperScape Audio production created by Austin Murphy. Connect with the audience and support us at jumperscape.com! Learn more about your ad choices. Visit megaphone.fm/adchoices

falls risky business austin murphy
Rewind Video
Pleasure

Rewind Video

Play Episode Listen Later Jul 10, 2025 65:28


This week's theme is Pleasure. Bob & Robb recommend six movies that gratify.  Bob:  Pleasure (18:48), Babygirl (36:53), Secretary (55:09)  Robb:  Eyes Wide Shut (4:26), Groove (28:43), Risky Business (45:14)  Follow —>  Rewind Video: https://rewindvideopod.substack.com/p/follow-rewind-video  Bob: https://letterboxd.com/rgdjr/  Robb: http://robbwitmer.info   

My Happy Thyroid
Ep. 204: Seaweed, Kelp & Your Thyroid: Superfood or Risky Business?

My Happy Thyroid

Play Episode Listen Later Jul 10, 2025 7:36


Seaweed and kelp are praised as superfoods packed with iodine and minerals—but are they actually helping or hurting your thyroid? In this episode, we dive into the science behind these ocean plants and their impact on thyroid function, especially for those with hypothyroidism or Hashimoto's disease.We'll explore how iodine affects your thyroid, why too much can be just as harmful as too little, and whether seaweed snacks or kelp supplements belong in your diet. Learn what the research says, who should be cautious, and how to make smart choices when it comes to iodine-rich foods. If you've ever wondered whether your favorite sushi roll could be messing with your hormones, this is the episode for you. NEED MORE INFORMATION? Seaweed, Kelp & Your Thyroidhttps://www.palomahealth.com/learn/seaweed-kelp-affect-thyroid ABOUT PALOMA HEALTH⁠⁠Paloma Health ⁠⁠⁠⁠⁠⁠⁠⁠is an online medical practice focused exclusively on treating hypothyroidism. From online visits with your provider to easy prescription management and lab orders, we create personalized treatment plans for you. Become a member⁠, or try our at-home test kit and experience a whole new level of hypothyroid care. Use code PODCAST to save $30 at checkout.Disclaimer: The $30 discount is only valid for first-time Paloma Health members and test kit users. Coupon must be entered at the time of checkout. Become a Paloma Member:https://www.palomahealth.com/pricing-hypothyroidism Paloma Complete Thyroid Blood Test Kit:https://www.palomahealth.com/home-thyroid-blood-test-kit

Freakonomics Radio
How to Make Your Own Luck (Update)

Freakonomics Radio

Play Episode Listen Later Jul 9, 2025 58:07


Before she decided to become a poker pro, Maria Konnikova didn't know how many cards are in a deck. But she did have a Ph.D. in psychology, a brilliant coach, and a burning desire to know whether life is driven more by skill or chance. She found some answers in poker — and she's willing to tell us everything she learned. SOURCES:Maria Konnikova, author of The Biggest Bluff. RESOURCES:“Gender Differences in Performance Predictions: Evidence from the Cognitive Reflection Test,” by Patrick Ring, Levent Neyse, Tamas David-Barett, and Ulrich Schmidt (Frontiers in Psychology, 2016).“The headwinds/tailwinds Asymmetry: An Availability Bias in Assessments of Barriers and Blessings,” by Shai Davidai and Thomas Gilovich (Journal of Personality and Social Psychology, 2016).“The Two Settings of Kind and Wicked Learning Environments,” by Robin M. Hogarth, Tomás Lejarraga, and Emre Soyer (Current Directions in Psychological Science, 2015)."The Limits of Self-Control: Self-Control, Illusory Control, and Risky Financial Decision Making,” by Maria Konnikova (Columbia University, 2013).“Generalized expectancies for internal versus external control of reinforcement” by J.B. Rotter (Psychological Monographs: General and Applied, 1966). EXTRAS:The Biggest Bluff: How I Learned to Pay Attention, Master Myself, and Win, by Maria Konnikova.Mastermind: How to Think Like Sherlock Holmes, by Maria Konnikova.The Confidence Game, by Maria Konnikova.Theory of Games and Economic Behavior, by John Von Neumann and Oskar Morgenstern."This Year's World Series Of Poker Is Different," by Risky Business with Nate Silver and Maria Konnikova (2025).

The West Live Podcast
CCTV in childcare is risky business

The West Live Podcast

Play Episode Listen Later Jul 9, 2025 1:12


See omnystudio.com/listener for privacy information.

Sales Gravy: Jeb Blount
What Veteran Sellers Need to Know About Going from Referrals to Social Media

Sales Gravy: Jeb Blount

Play Episode Listen Later Jul 8, 2025 16:29


Here's the brutal truth about social media for sales: You're already behind, and it's going to be a grind. That's the reality Margarita from Dallas discovered when she called into our podcast. She's a seasoned realtor with 20+ years of experience, built her entire business on referrals and warm market relationships, and suddenly realized she needs to master social media to stay competitive. Sound familiar? You're not alone if you're staring at this digital mountain wondering how the hell you're going to climb it. But what makes Margarita's situation even more challenging and why her story matters to every sales professional reading is this: She's trying to compress 20 years of relationship building into a social media strategy that can compete with people who've been doing this for decades. The Tom Cruise Problem: Building Your Social Media Presence Takes Time Remember the first time you saw Tom Cruise in a movie? For me, it was Risky Business, some kid dancing around in his underwear. He wasn't the "last movie star" then. He was just another actor trying to make it. But here's the thing: Today, if you saw Tom Cruise walking down the street, you'd lose your mind. You'd want selfies, autographs, the whole nine yards. Why? Because over decades, he created millions of micro-interactions that built trust, familiarity, and fandom. That's exactly what you need to do on social media. You need to create fans of YOU. The problem is that most sales professionals want to skip the relationship-building phase and jump straight to the closing phase. They want to post a few listing videos and magically generate leads. That's not how it works. The Algorithm Rewards Consistency, Not Perfection Here's the part that's going to hurt: You need to post every single day. Not when you feel like it. Not when you have something "good" to share. Every. Single. Day. When you first start, your content is going to suck. Your first TikTok video? Three people will watch it. Your first Instagram post? Crickets. Your first LinkedIn article? Your mom and your real estate buddy will like it. I know because I've been there. We've all been there. The algorithms don't care about your feelings—they care about consistency. Think about it this way: You're not just competing with other sales professionals for attention. You're competing with Netflix, YouTube, TikTok, and every other form of entertainment for your prospects' eyeballs. The only way to win that battle is to show up relentlessly until people start recognizing your name and face. The Two-Bucket Strategy: Marketing vs. Lead Generation When you think about social media as a sales professional, you need to separate it into two distinct buckets: Bucket 1: Marketing and Brand Building This is about name recognition, familiarity, and staying top-of-mind. When people in your market are ready to buy or sell, your name should be the first one they think of. This bucket is about volume, consistency, and building your personal brand. Bucket 2: Direct Lead Generation This is about watching what prospects are doing, engaging with them directly, and converting social interactions into sales conversations. This bucket is about quality, relationship building, and moving people from digital relationships to actual appointments. Most people focus entirely on Bucket 1 and wonder why they're not getting leads. Others focus only on Bucket 2 and wonder why their content isn't reaching anyone. You need both working in harmony. Your 3-Pillar Content Strategy System Here's what you need to post consistently: Original Content: This is your unique perspective, your experience, your stories. If you're a 20-year veteran like Margarita, you have war stories that new agents don't. You've survived market crashes, interest rate spikes, and industry changes. Share that wisdom. Curated Content: Find industry articles, market reports, and news relevant to your prospects.

Parenting Matters Now with Dr. Roger Smith
The Risky Business of Raising Kids | Episode 382

Parenting Matters Now with Dr. Roger Smith

Play Episode Listen Later Jul 7, 2025 4:43


Are you teaching your children to play it safe, or empowering them to take calculated risks and innovate? Dr. Roger Smith challenges common parenting advice, arguing that fostering a risk-taking mindset is crucial for children to become problem-solvers, dreamers, and leaders. Discover how overprotection, premature rescuing, and excessive praise can hinder their development, and learn practical ways to encourage adventure and resilience in your kids.   Visit me at: https://rogersmithmd.com/ This has been a production of ThePodcastUpload.com 

Risky Business
Risky Business #798 -- Mexican cartel surveilled the FBI to identify, kill witnesses

Risky Business

Play Episode Listen Later Jul 2, 2025 62:19


On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: Australian airline Qantas looks like it got a Scattered Spider-ing Microsoft works towards blunting the next CrowdStrike disaster Changes are coming for Microsoft's default enterprise app consenting setup Synology downplays hardcoded passwords for its M365 cloud backup agent The next Citrix Netscaler memory disclosure looks nasty Drug cartels used technical surveillance to find, fix and finish FBI informants and witnesses This week's episode is sponsored by RAD Security. Co-founder Jimmy Mesta joins to talk through how they use AI automation to assess the security posture of sprawling cloud environments. This episode is also available on Youtube. Show notes Qantas hit by cyber attack, leaving 6 million customer records at risk of data breach Scattered Spider appears to pivot toward aviation sector | Cybersecurity Dive Microsoft to make Windows more resilient following 2024 IT outage | Cybersecurity Dive (384) The Ultimate Guide to App Consent in Microsoft Entra - YouTube When Backups Open Backdoors: Accessing Sensitive Cloud Data via "Synology Active Backup for Microsoft 365" / modzero AT&T deploys new account lock feature to counter SIM swapping | CyberScoop Iran-linked hackers threaten to release Trump aides' emails | Reuters US government warns of new Iran-linked cyber threats on critical infrastructure | Cybersecurity Dive Actively exploited vulnerability gives extraordinary control over server fleets - Ars Technica Critical vulnerability in Citrix Netscaler raises specter of exploitation wave | Cybersecurity Dive Identities of More Than 80 Americans Stolen for North Korean IT Worker Scams | WIRED Cloudflare confirms Russia restricting access to services amid free internet crackdown | The Record from Recorded Future News Mexican drug cartel used hacker to track FBI official, then killed potential FBI informants, government audit says | CNN Politics Audit of the FBI's Efforts to Mitigate the Effects of Ubiquitous Technical Surveillance - Redacted Report NATO members aim for spending 5% of GDP on defense, with 1.5% eligible for cyber | The Record from Recorded Future News US sanctions bulletproof hosting provider for supporting ransomware, infostealer operations | CyberScoop US, French authorities confirm arrest of BreachForums hackers | TechCrunch Spanish police arrest five over $542 million crypto investment scheme | The Record from Recorded Future News Scam compounds labeled a 'living nightmare' as Cambodian government accused of turning a blind eye | The Record from Recorded Future News

Risky Business
Risky Business #797 -- Stuxnet vs Massive Ordnance Penetrators

Risky Business

Play Episode Listen Later Jun 25, 2025 62:16


On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: We roll our eyes over the “16 billion credentials” leak hitting mainstream news Some interesting cyber angles emerge from the conflict in Iran Opensource maintainer of libxml2 is fed up with this hacker crap Shockingly, there are yet more ways to trick people into pasting commands into Windows Veeam “patches” its backup software RCE like it's 2002 … by breaking the public PoC This week's episode is sponsored by Internet-wide honeypot reconnaissance platform, Greynoise. Founder Andrew Morris joins to talk about their journey spotting Chinese ORB-builders hacking thousands of ASUS routers, and why they're destined for the woodchipper. This episode is also available on Youtube. Show notes No, the 16 billion credentials leak is not a new data breach Canadian telecom hacked by suspected China state group - Ars Technica Telecom giant Viasat breached by China's Salt Typhoon hackers WarTranslated on X: "Iran's jamming GPS in the Strait of Hormuz, messing with ~970 ships, per Windward. UKMTO confirms the interference. Faulty AIS coordinates are screwing up navigation in the Persian Gulf. The IRGC threatens to shut the strait down in hours. https://t.co/kdMJvshOGC" / X Dmitri Alperovitch on X: "Chairman of the Joint Chiefs Gen. Dan Caine says @US_CYBERCOM supported this strike mission" / X Top Pentagon spy pick rejected by White House - POLITICO DHS warns of heightened cyber threat as US enters Iran conflict | Cybersecurity Dive Exclusive: Early US intel assessment suggests strikes on Iran did not destroy nuclear sites, sources say U.S. braces for Iran's response after overnight strikes on nuclear sites Assessing the Damage to Iran's Nuclear Program Iran Hacks Tirana Municipality in Retaliation Over MEK - Tirana Times Iran's government says it shut down internet to protect against cyberattacks | TechCrunch Aflac discloses cyber intrusion linked to wider crime spree targeting insurance industry | Cybersecurity Dive Tonga Ministry of Health hit with cyberattack affecting website, IT systems | The Record from Recorded Future News Alleged Ryuk ransomware gang member arrested in Ukraine and extradited to US | The Record from Recorded Future News Russia releases REvil members after convictions for payment card fraud | The Record from Recorded Future News OneLogin, Many Issues: How I Pivoted from a Trial Tenant to Compromising Customer Signing Keys - SpecterOps Triaging security issues reported by third parties (#913) · Issue · GNOME/libxml2 README: Set expectations straight (35d04a08) · Commits · GNOME / libxml2 · GitLab What's in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia | Google Cloud Blog FileFix - A ClickFix Alternative | mr.d0x Address bar shows hp.com. Browser displays scammers' malicious text anyway. - Ars Technica Researchers urge vigilance as Veeam releases patch to address critical flaw | Cybersecurity Dive ASUSpicious Flaw - Millions of Users' Information Exposed Since 2022 | MrBruh's Epic Blog Perth dad who created ‘evil twin' Wi-Fi did so to access pictures of women GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers

Risky Business
Risky Business #796 -- With special guest co-host Chris Krebs

Risky Business

Play Episode Listen Later Jun 18, 2025 61:04


On this week's show Patrick Gray and Adam Boileau are joined by special guest Chris Krebs to discuss the week's cybersecurity news. They talk through: Israeli “hacktivists” take out an Iranian state-owned bank Scattered-spider and friends pivot into attacking insurers Securing identities in a cloud-first world keeps us awake at night Microsoft takes the “aas” out of SaaS for Europe, leaving us with just software! An AI prompt injection into M365 exfils corporate data This week's episode is sponsored by Kroll's Cyber practice. Kroll Cyber Associate Managing Director George Glass is based in London and talks through his experiences helping organisations in the UK deal with the Scattered Spider attacks. This episode is also available on Youtube. Show notes Iran's Bank Sepah disrupted by cyberattack claimed by pro-Israel hacktivist group | CyberScoop Iran orders officials to ditch connected devices Heightened Cyberthreat Amidst Israel-Iran Conflict Threat group linked to UK, US retail attacks now targeting insurance industry | Cybersecurity Dive Coming to Apple OSes: A seamless, secure way to import and export passkeys - Ars Technica Cyberattack on Washington Post Compromises Email Accounts of Journalists Hackers impersonating US government compromise email account of prominent Russia researcher | The Record from Recorded Future News A good one to talk to Chris about: Breaking down ‘EchoLeak', the First Zero-Click AI Vulnerability Enabling Data Exfiltration from Microsoft 365 Copilot CISA warns of supply chain risks as ransomware attacks exploit SimpleHelp flaws | Cybersecurity Dive Whole Foods supplier making progress on restoration after cyberattack left shelves empty | The Record from Recorded Future News Ransomware attack on ticketing platform upends South Korean entertainment industry | The Record from Recorded Future News Advisory: Cybersecurity incident

Risky Business
Soap Box: AI has entered the SOC, and it ain't going anywhere

Risky Business

Play Episode Listen Later Jun 16, 2025 30:58


In this sponsored Soap Box edition of the Risky Business podcast Patrick Gray chats with Dropzone AI founder Ed Wu about the role of LLMs in the SOC. The debate about whether AI agents are going to wind up in the SOC is over, they've already arrived. But what are they good for? What are they NOT good for? And where else will we see AI popping up in security? This episode is also available on Youtube. Show notes

The Backbone Wrestling Network
NWA Crock and Roll Revisit #2: May 1985

The Backbone Wrestling Network

Play Episode Listen Later Jun 14, 2025 174:24


 Originally aired: August 19, 2020 on Place to Be Wrestling Network It's a jam-packed second episode as hosts Shawn, Calum, and Doctor G are joined by guest Matt Souza to break down the action from May 1985 in Jim Crockett Promotions! Expect two major title changes, two TV Title matches (including a hidden gem classic), and Ron Garvin defending the National Heavyweight Title. The crew also dives into: A surprisingly divisive 3-star Italian Stallion match The conclusion of Dusty Rhodes' Gorilla saga and the intensifying feud with Tully Blanchard The escalating Jones/Valiant war, where emotions run high—including a shocking Jones/Flair comparison Ric Flair's brilliance in his ongoing program with Magnum T.A. The charisma of Buddy “The Smooth Operator” Landell And so much more from the golden days of NWA  So fire up the Superstation, set your clocks to 6:05 PM Eastern, and get ready to roll through one of the most thrilling months in 1985 wrestling history. As Dusty would say: It's Risky Business in May '85, Daddy!  

Risky Business
Risky Business #795 -- How The Com is hacking Salesforce tenants

Risky Business

Play Episode Listen Later Jun 11, 2025 67:34


On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: New York Times gets a little stolen Russian FSB data as a treat iVerify spots possible evidence of iOS exploitation against the Harris-Walz campaign Researcher figures out a trick to get Google account holders' full names and phone numbers Major US food distributor gets ransomwared The Com's social engineering of Salesforce app authorisations is a harbinger of our future problems Australian Navy forgets New Zealand has computers, zaps Kiwis with their giant radar. This week's episode is sponsored by identity provider Okta. Long-time friend of the show Alex Tilley is Okta's Global Threat Research Coordinator, and he joins to discuss how organisations can use both human and technical signals to spot North Koreans in their midst. This episode is also available on Youtube. Show notes How The Times Obtained Secret Russian Intelligence Documents - The New York Times Ukraine's military intelligence claims cyberattack on Russian strategic bomber maker | The Record from Recorded Future News Harris-Walz campaign may have been targeted by iPhone hackers, cybersecurity firm says iVerify Uncovers Evidence of Zero-Click Mobile Exploitation in the U.S. Spyware maker cuts ties with Italy after government refused audit into hack of journalist's phone | The Record from Recorded Future News Italian lawmakers say Italy used spyware to target phones of immigration activists, but not against journalist | TechCrunch Android chipmaker Qualcomm fixes three zero-days exploited by hackers | TechCrunch Cellebrite to acquire mobile testing firm Corellium in $200 million deal | CyberScoop Apple Gave Governments Data on Thousands of Push Notifications A Researcher Figured Out How to Reveal Any Phone Number Linked to a Google Account Bruteforcing the phone number of any Google user Acreed infostealer poised to replace Lumma after global crackdown | The Record from Recorded Future News BidenCash darknet forum taken down by US, Dutch law enforcement | The Record from Recorded Future News NHS calls for 1 million blood donors as UK stocks remain low following cyberattack | The Record from Recorded Future News Major food wholesaler says cyberattack impacting distribution systems | The Record from Recorded Future News Kettering Health confirms attack by Interlock ransomware group as health record system is restored | The Record from Recorded Future News Hackers abuse malicious version of Salesforce tool for data theft, extortion | Cybersecurity Dive shubs on X: "IP whitelisting is fundamentally broken. At @assetnote, we've successfully bypassed network controls by routing traffic through a specific location (cloud provider, geo-location). Today, we're releasing Newtowner, to help test for this issue: https://t.co/X3dkMz9gwK" / X Ross Ulbricht Got a $31 Million Donation From a Dark Web Dealer, Crypto Tracers Suspect | WIRED Australian navy ship causes radio and internet outages to parts of New Zealand

Thinking Poker
Risky Business: Why ChatGPT Sucks at Poker

Thinking Poker

Play Episode Listen Later Jun 9, 2025 52:33


This week, we're bringing you an episode of Risky Business, a podcast about better decision making from our friends Nate Silver and Maria Konnikova. You can find more Risky Business at https://www.pushkin.fm/podcasts/risky-business-with-nate-silver-maria-konnikova. You can join Andrew and Carlos on ClubWPT ... Read more...

Gavin and Ruby Go To a Movie
Risky Business, Friendship Review

Gavin and Ruby Go To a Movie

Play Episode Listen Later Jun 5, 2025 40:23


In this post-grad episode of the Gavin and Ruby Go To a Movie podcast, Gavin and Ruby celebrate their recent high school graduation (as well as the return of the podcast) by watching some darkly comedic movies. The first is Tom Cruise's consumerist classic, Risky Business, while the second is the recently released, absurd comedy, Friendship. Boy, you should know that we are back!Risky Business: 7:00Friendship: 25:01Instagram: @gavinandrubypodcastGavin's Letterboxd: Gavin_LemonRuby's Letterboxd: ruuubyv

Risky Business
Risky Business #794 -- Psychic Panda outgunned by Fluffy Lizard and UNC56728242

Risky Business

Play Episode Listen Later Jun 4, 2025 58:22


On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: Cyber firms agree to deconflict and cross-reference hacker group names Russian nuclear facility blueprints gathered from public procurement websites Someone audio deepfaked the White House Chief of Staff, but for the dumbest reasons Germany identifies the Trickbot kingpin Google spots China's MSS using Calendar events for malware C2 Meta apps abuse localhost listeners to track web sessions. This week's episode is sponsored by automation vendor Tines. Its Field CISO, Matt Muller, joins the show to discuss an open letter penned by JP Morgan Chase's CISO that pleads with Software as a Service suppliers to try to suck less at security. This episode is also available on Youtube. Show notes 'Forest Blizzard' vs 'Fancy Bear' - cyber companies hope to untangle weird hacker nicknames | Reuters Ukraine's Massive Drone Attack Was Powered by Open Source Software Massive security breach: Russian nuclear facilities exposed online How a Spyware App Compromised Assad's Army - New Lines Magazine Exclusive | Federal Authorities Probe Effort to Impersonate White House Chief of Staff Susie Wiles - WSJ Malaysian home minister's WhatsApp hacked, used to scam contacts | The Record from Recorded Future News U.S. Sanctions Cloud Provider ‘Funnull' as Top Source of ‘Pig Butchering' Scams – Krebs on Security Top counter antivirus service disrupted in global takedown | CyberScoop Cops in Germany Claim They've ID'd the Mysterious Trickbot Ransomware Kingpin | WIRED Australian ransomware victims now must tell the government if they pay up | The Record from Recorded Future News Google: China-backed hackers hiding malware in calendar events | Cybersecurity Dive Coinbase breach linked to customer data leak in India, sources say | Reuters US military IT specialist arrested for allegedly trying to leak secrets to foreign government | The Record from Recorded Future News NSO appeals WhatsApp decision, says it can't pay $168 million in ‘unlawful' damages | The Record from Recorded Future News ConnectWise says nation-state attack targeted multiple ScreenConnect customers | The Record from Recorded Future News Google Online Security Blog: Sustaining Digital Certificate Security - Upcoming Changes to the Chrome Root Store Meta and Yandex are de-anonymizing Android users' web browsing identifiers - Ars Technica An Open Letter to Third-Party Suppliers

The Ben and Skin Show
Ranking The Tom Cruise Movies

The Ben and Skin Show

Play Episode Listen Later Jun 4, 2025 11:27 Transcription Available


What's your all-time favorite Tom Cruise movie—and does it even crack the top 10?In this wildly entertaining episode of The Ben and Skin Show, the crew dives headfirst into a chaotic blend of movie rankings, brewery updates, and one of the most hilariously off-the-rails closing lines in show history.Join Ben Rogers, Jeff “Skin” Wade, Kevin “KT” Turner, and Krystina Ray as they:

Risky Business
Risky Business #793 -- Scattered Spider is hijacking MX records

Risky Business

Play Episode Listen Later May 28, 2025 64:52


In this week's edition of Risky Business Dmitri Alperovitch and Adam Boileau join Patrick Gray to talk through the week's news, including: EXCLUSIVE: A Scattered Spider-style crew is hijacking DNS MX entries and compromising enterprises within minutes The SVG format brings the all horrors of HTML+JS to image files, and attackers have noticed Brian Krebs eats a 6.3Tbps DDoS … ‘cause that's how you demo your packet cannon Law enforcement takes out Lumma Stealer, Qakbot, Danabot and some dark web drug traffickers Iranian behind 2019 Baltimore ransomware mysteriously appears in North Carolina and pleads guilty CISA's leadership is fleeing in droves, even though the US needs them more than ever. This week's episode is sponsored by Thinkst Canary. Long time friend of the show Haroon Meer joins and talks through where he feels the industry is at, having just returned home from the AI-fueled hype at this year's RSA conference. This episode is also available on Youtube. Show notes China-linked ‘Silk Typhoon' hackers accessed Commvault cloud environments, person familiar says - Nextgov/FCW Risky Bulletin: SVG use for phishing explodes in 2025 - Risky Business Media KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS – Krebs on Security Midwestern telco Cellcom confirms cyber incident after days of service outages | The Record from Recorded Future News Microsoft leads international takedown of Lumma Stealer | Cybersecurity Dive Who said what? on X: "Message from the administrator of Lumma Stealer on the forums about the recent events

Beer and a Movie
355: Mission: Impossible - The Final Reckoning/Risky Business with Guest Adam Beam

Beer and a Movie

Play Episode Listen Later May 28, 2025 66:37


On this week's Beer and a Movie, the stakes are high, the hops are higher, and Tom Cruise is still running. We're joined by special guest Adam Beam for an explosive deep dive into Mission: Impossible – The Final Reckoning, followed by a throwback to the tighty-whitey chaos of Risky Business.

Even the Rich
Tom Cruise: Risky Business | 279

Even the Rich

Play Episode Listen Later May 27, 2025 51:13


Richies, just in time for ""Mission: Impossible – The Final Reckoning"" - the last installment of the MI franchise - we bring you one of the most bankable stars in the world, Tom Cruise. As a boy, he's bullied because of his height, and faces learning difficulties at school. But that was then and this is now. Thanks to roles in “Risky Business,” “Top Gun,” “A Few Good Men,” and the money-printing “Mission: Impossible” franchise, Tom has become not only an enormous action star, but one of Hollywood's most surefire leading men. And one of its most controversial. Who could forget the image of him jumping up and down on Oprah's couch after falling for Katie Holmes? Or when the “War of the Worlds” star and public face of Scientology stirs the pot on “Today,"" criticizing Brooke Shields for using medication to treat postpartum depression. (A major no-no according to Tom's church.) There's no questioning Tom's mega-star status - or his extremely polarizing views.You can follow Brooke and Aricia on socials at @brookesiffrinn and @ariciaskidmorewilliamss. And check out the brand new Even the Rich merch store at www.eventherich.com.Be the first to know about Wondery's newest podcasts, curated recommendations, and more! Sign up now at https://wondery.fm/wonderynewsletterListen to Even The Rich on the Wondery App or wherever you get your podcasts. Experience all episodes ad-free and be the first to binge the newest season. Unlock exclusive early access by joining Wondery+ in the Wondery App or on Apple Podcasts. Start your free trial today by visiting wondery.com/links/even-the-rich/ now.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Rarified Heir Podcast
Episode #237: Matthew Specktor (Fred Specktor)

Rarified Heir Podcast

Play Episode Listen Later May 27, 2025 102:36


Today on the Rarified Heir Podcast, we are talking to novelist  Matthew Specktor, whose new book, The Golden Hour: A Story of Family and Power in Hollywood, is out now and getting rave reviews. Matthew spoke to us about growing up behind the scenes in Hollywood as the son of an icon of the film industry, Fred Specktor, a super-agent of A-list Hollywood talent who is still going strong at 92 years old. With a roster of clients that included everyone from Robert DeNiro, Gene Hackman, Morgan Freeman, Helen Mirren, Danny Devito and many, many more, Matthew was brought up in and around the film business and had a firsthand look. Part memoir, part biography, part cultural history & part fiction, The Golden Hour has been priases in outlets such as NPR, the New York Times, the Kirkus Review, the LA Times and many more for it's unique look into Hollywood and the battle between art vs. commerce and much more. As this is his third book based on his take on Hollywood, Matthew is getting name-checked alongside iconic LA based, Hollywood centric authors such as Joan Didion and William Goldman and getting praise from authors like Jonathan Lethem and Griffin Dunne. High praise indeed. We get into that as well as how Matthew formed the book and the basis of his exploration into his family and the city formed him, shortly. Matthew's behind-the-scenes stories of how Hollywood was created in the second half of the twentieth century at Tinseltown institutions like MCA, William Morris and CAA beginning in the 1950s and where we are today, 70 years later a a large part of this episode. But we also hear personal stories about pranks the pre-rat pack played on him and his best friend Renee Estevez (daughter of Martin Sheen) in high school, what LA restaurants his family ate on special occasions, the cars and vanity plates of super agents in the City of Angelss and the movie theaters and books that shaped his youth on the Westside of Los Angeles. This is the Rarified Heir Podcast and if you've never had David Lynch tell you, you were more an artist than a deal maker at 13, take a listen because Matthew Specktor has. Everyone has a story.

Have Such A Good Day
Big Heart City, Risky Business, We Are the World

Have Such A Good Day

Play Episode Listen Later May 27, 2025 52:22


Sarah is proud of herself and Heather braves a curveball. THANK YOU to our Patrons! Please consider directly supporting us at Patreon for ad-free episodes, access to our Discord server, and all around good vibes as you help us keep the lights on.Support this show http://supporter.acast.com/hsgd. Hosted on Acast. See acast.com/privacy for more information.

Risky Business
Risky Business #792 -- Beware, Coinbase users. Crypto thieves are taking fingers now

Risky Business

Play Episode Listen Later May 21, 2025 53:01


On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: TeleMessage memory dumps show up on DDoSecrets Coinbase contractor bribed to hand over user data Telegram does seem to be actually cooperating with law enforcement Britain's legal aid service gets 15 years worth of applicant data stolen Shocking no one, Ivanti were weaseling when they blamed latest bugs on a third party library This week's episode is sponsored by Prowler, who make an open source cloud security tool. Founder and original project developer Toni de la Fuente joins to talk through the flexibility that open tooling brings. Prowler is also adding support for SaaS platforms like M365, and of course, an AI assistant to help you write checks! This episode is also available on Youtube. Show notes TeleMessage - Distributed Denial of Secrets How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes | WIRED Coinbase says thieves stole user data and tried to extort $20M Hack could cost Coinbase up to $400M: filing | Cybersecurity Dive Severed Fingers and ‘Wrench Attacks' Rattle the Crypto Elite Money Stuff: US Debt Rates Itself | NewsletterHunt 2 massive black market services blocked by Telegram, messaging app says | Reuters Telegram Gave Authorities Data on More than 20,000 Users GovDelivery, an email alert system used by governments, abused to send scam messages | TechCrunch ATO warning as hackers steal $14,000 in tax returns: ‘Be wary' Hack of SEC social media account earns 14-month prison sentence for Alabama man | The Record from Recorded Future News 19-year-old accused of largest child data breach in U.S. agrees to plead guilty Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy | 7NEWS Pegasus spyware maker rebuffed in efforts to get off trade blacklist - The Washington Post Ransomware attack hits supplier of refrigerated groceries to British supermarkets | The Record from Recorded Future News UK government confirms massive data breach following hack of Legal Aid Agency | The Record from Recorded Future News Ivanti Endpoint Mobile Manager customers exploited via chained vulnerabilities | Cybersecurity Dive Expression Payloads Meet Mayhem - Ivanti EPMM Unauth RCE Chain (CVE-2025-4427 and CVE-2025-4428)

TV Guidance Counselor Podcast
TV Guidance Counselor Episode 689: Mangesh Hattikudur

TV Guidance Counselor Podcast

Play Episode Listen Later May 19, 2025 103:08


May 9-16, 1992 This week Ken welcomes co-founder of Mental Floss, co-founder of Kaleidoscope and host of the Part-Time Genius and Skyline Drive podcasts, Mangesh Hattikudur. Ken and Mangesh discuss downtown Brooklyn, going to college in North Carolina, spending your Summers in Idia, spending a year abroad in Atlanta, Brooklyn Manners, not being able to watch R rated movies, the book adaptation life hack, VHS terror, bootleg tapes, the hunt for nudity, The Carolinas, brown outs, shows the US exports, saying goodbye to Johnny Carson, Ken's day with John Cleese, Bob and Ray, the launch of Comedy Central as CTV/Comedy Channel/HA!, hunting down comedy lps, learning joke structure, Stephen Wright, Conan, talk shows, the death of John Candy, Jim Henson's death, Ed McMahon, what local news casters are paid, Vanna White's music career, the greatest picture of Richard Simmons ever, Jake Steinfeld, why Saturdays were tough, turning your house into a mini-golf course, the sries finale of Golden Girls, why Caddyshack II is better than Caddyshack, talk shows hosted by people playing a character, swear replacements, Parker Lewis Can't Lose, ripped from the headlines made for TV murder, how 70s vigilante revenge movies became 90s made for TV movies for women, Risky Business, the nostalgia lens, why you should always go back and revisit your childhood favorites, Police Academy, Revenge of the Nerds, movies that don't fly now, the evolution of R rated movie to children's cartoon, The Boston Celtics, Rescue 9-1-1, the theme song from Rescue 9-1-1, the 3.2.1 Contact Sex Special, Mental Floss, Davis Rules, the TV road not taken, network executives ruining shows, Night Court's final season before the reboot, when Harry Anderson would guest start on Cheers, how Park St Under was absolutely NOT ripped off to make Cheers, how one script became Beverly Hills Cop AND Cobra, Roald Dahl, Alfred Hitchcock Presents, loving Tom Arnold, 20/20, live exorcisms, and getting to the bottom of if the bush really burned. 

Risky Business
Risky Business #791 -- Woof! Copilot for Sharepoint coughs up creds and keys

Risky Business

Play Episode Listen Later May 14, 2025 57:52


On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: Struggling to find that pesky passwords.xlsx in Sharepoint? Copilot has your back! The ransomware ecosystem is finding life a bit tough lately SAP Netweaver bug being used by Chinese APT crew Academics keep just keep finding CPU side-channel attacks And of course… bugs! Asus, Ivanti, Fortinet… and a Nissan LEAF? This week's episode is sponsored by Resourcely, who will soothe your Terraform pains. Founder and CEO Tracis McPeak joins to talk about how to get from a very red dashboard full of cloud problems to a workable future. This episode is also available on Youtube. Show notes Exploiting Copilot AI for SharePoint | Pen Test Partners MrBruh's Epic Blog Ransomware group Lockbit appears to have been hacked, analysts say | Reuters "CONTI LEAK: Video they tried to bury! 6+ Conti members on a private jet. TARGET's birthday — $10M bounty on his head. Filmed by TARGET himself. Original erased — we kept a copy." Mysterious hackers who targeted Marks and Spencer's computer systems hint at political allegiance as they warn other tech criminals not to attack former Soviet states The organizational structure of ransomware groups is evolving rapidly. SAP NetWeaver exploitation enters second wave of threat activity China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures DOGE software engineer's computer infected by info-stealing malware Hackers hijack Japanese financial accounts to conduct nearly $2 billion in trades FBI and Dutch police seize and shut down botnet of hacked routers Poland arrests four in global DDoS-for-hire takedown School districts hit with extortion attempts after PowerSchool breach EU launches vulnerability database to tackle cybersecurity threats Training Solo - vusec Branch Privilege Injection: Exploiting Branch Predictor Race Conditions – Computer Security Group Remote Exploitation of Nissan Leaf: Controlling Critical Body Elements from the Internet PSIRT | FortiGuard Labs EPMM Security Update | Ivanti

Risky Business
Risky Business #790 -- Bye bye Signal-gate, hello TeleMessage-gate

Risky Business

Play Episode Listen Later May 7, 2025 56:12


On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: White House's off-brand Israeli Signal fork logs cleartext messages with hard coded creds while getting hacked (twice). Just … Wow. Ransomware attacks on UK retailers are linked, and Marks & Spencer has it extra bad After six years dormant, a Magento eCommerce platform backdoor comes to life The North Korean IT worker scam is truly webscale NSO group owes Meta $168m for hacking WhatsApp This week's episode is sponsored by vulnerability management wranglers, Nucleus Security. Aaron Unterberger joins to talk through the complexities of tracking vulnerabilities in cloud components - left to the source, right to the deployments, and …sideways into the sidecars? This week's show also features an excerpt from Pat's interview with Senator Mark Warner - Scoot back one in your podcast feed to check out the full chat, or find it on Youtube. This episode is available on Youtube too. Show notes Mike Waltz Accidentally Reveals Obscure App the Government Is Using to Archive Signal Messages Despite misleading marketing, Israeli company TeleMessage, used by Trump officials, can access plaintext chat logs The Signal Clone the Trump Admin Uses Was Hacked App used by Mike Waltz suspends services after hacking claims Senator Demands Investigation into Trump Admin Signal Clone After 404 Media Investigation MG on X: "Looks like TeleMessage was probably procured and rolled out under Biden. There are public records for it. https://t.co/XCuZpi8PL3" / X Harrods becomes latest retailer to announce attempted cyberattack | The Record from Recorded Future News Co-op DragonForce cyber attack includes customer data, firm admits Co-op cyber attack: Staff told to keep cameras on in meetings Hundreds of e-commerce sites hacked in supply-chain attack - Ars Technica Microsoft's new “passwordless by default” is great but comes at a cost - Ars Technica Windows RDP lets you log in using revoked passwords. Microsoft is OK with that. - Ars Technica North Korean operatives have infiltrated hundreds of Fortune 500 companies | CyberScoop US wants to cut off key player in Southeast Asian cybercrime industry | The Record from Recorded Future News Myanmar militia leader sanctioned by US over cyber scam connections | The Record from Recorded Future News Trump proposes major cut to CISA's budget, citing false ‘censorship' claims | Cybersecurity Dive NSA to cut up to 2,000 civilian roles as part of intel community downsizing | The Record from Recorded Future News NSO Group owes $168M in damages to WhatsApp over spyware infections, jury says | CyberScoop

Risky Business
BONUS INTERVIEW: Senator Mark Warner on Signalgate, Volt Typhoon and tariffs

Risky Business

Play Episode Listen Later May 6, 2025 49:44


In this extended interview the Vice Chair of the Senate Select Committee on Intelligence, Senator Mark Warner, joins Risky Business host Patrick Gray to talk about: The latest developments in the Signalgate scandal Why America needs to be more aggressive in responding to Volt Typhoon How tariffs are affecting American alliances Why the Five Eyes alliance is sacrosanct This episode is available on Youtube Show notes

Pod Meets World
Bronson Pinchot Meets World

Pod Meets World

Play Episode Listen Later Apr 7, 2025 64:21 Transcription Available


Let's do the Dance of Joy as the gang digs deeper into the TGIF-verse to hang with our distant cousin from Mypos - Balki Bartokomous (a.k.a. the legendary Bronson Pinchot)! Bronson shares stories from his iconic roles in “Beverly Hills Cop," “Risky Business” and “True Romance," but also opens up about the challenge of playing silly characters when in reality…not everything is silly. A Friday night neighbor on "Perfect Strangers" AND "Step By Step," he details how he's become an absolute powerhouse in audiobooks and how he responds when someone KINDA recognizes him. Grab a seat, because Bronson Pinchot is chatting on a brand new Pod Meets World... Follow @podmeetsworldshow on Instagram and TikTok!See omnystudio.com/listener for privacy information.