Degree of resistance to, or protection from, harm
POPULARITY
Categories
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
CTRL-Z DLL Hooking Attackers may use a simple reload trick to overwrite breakpoints left by analysts to reverse malicious binaries. https://isc.sans.edu/diary/CTRL-Z%20DLL%20Hooking/32294 Global Admin in every Entra ID tenant via Actor tokens As part of September s patch Tuesday, Microsoft patched CVE-2025-55241. The discoverer of the vulnerability, Dirk-jan Mollema has published a blog post showing how this vulnerability could have been exploited. https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/ WatchGuard Firebox iked Out of Bounds Write Vulnerability CVE-2025-9242 WatchGuard patched an out-of-bounds write vulnerability, which could allow an unauthenticated attacker to compromise the devices. https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00015 NVidia Triton Inference Server NVIDIA patched critical vulnerabilities in its Triton Inference Server. https://nvidia.custhelp.com/app/answers/detail/a_id/5691
A clear, time-based approach to building EDC, Go Bags, Get Home Bags, and Bug Out Bags—without gear lists or confusion. The post Time-Based Layered Bag System for Practical Prepping appeared first on Mind4Survival.
Can America's immigration system handle the 2026 FIFA World Cup? With 3 million daily travelers expected and visa wait times stretching hundreds of days in key countries, we're facing unprecedented challenges. Ryan Propis from the US Travel Association joins us to discuss what needs to happen now - from expanding visa waiver programs to deploying AI-powered screening technology. This isn't just about soccer; it's about America's ability to welcome the world while maintaining security. This is our first episode in an ongoing series, looking forward to the FIFA World Cup 2026.GUEST: Ryan Propis, VP of Security and Facilitation, US Travel HOST: Lauren ClarkeNEWS NERD: Rob TaylorPRODUCER: Adam BelmarResource Links:Commission on Seamless and Secure Travel ReportFIFA World Cup 26: Host countries, cities, dates, teams, tickets, qualifying and more
When markets soar, investors face a subtle but dangerous temptation: trading wisdom for excitement.With headlines touting record highs and optimism running wild, it's easy to get swept up in the momentum. But is now the time to double down—or to take a step back and exercise caution? Today, Mark Biller joins us to unpack the dangers of investing with emotion instead of wisdom.Mark Biller is Executive Editor and Senior Portfolio Manager at Sound Mind Investing, an underwriter of Faith & Finance. Bull Market Optimism: Proceed with CautionThe stock market has staged a remarkable comeback since spring, and many investors are feeling hopeful about the year ahead. But while optimism is natural, there's a fine line between healthy confidence and dangerous overconfidence.Just a few months ago, fear dominated the market. Now, investor sentiment has swung in the opposite direction—toward excessive optimism. History shows us that both extremes can lead to poor decision-making. Just as fear prompts panic-selling in downturns, overconfidence during bull markets can drive people to take unnecessary risks.The late 1990s provide a clear example. The dot-com bubble fueled euphoric investing in internet companies, but when the bubble burst, enormous wealth evaporated. While the internet did transform the world, many early investors paid a steep price for ignoring caution.The Risk of Projecting the PresentOptimism in the long term is typically rewarded—stocks have trended upward for more than a century despite wars, recessions, and downturns. But short-term overconfidence is dangerous. Since October 2023, the stock market has gained about 60%—roughly six years of typical returns compressed into less than two. It's unrealistic to assume such momentum will continue indefinitely.In environments like this, investors often fall into two traps:Doubling down on every dip. Rather than seeing pullbacks as a chance to pause, many rush to “buy the dip” without considering long-term goals. Abandoning diversification. When some holdings lag behind, it's tempting to dump them in favor of high-flyers like gold or crypto. This shortsightedness often backfires.Diversification: A Biblical PrincipleKing Solomon offered timeless wisdom in Ecclesiastes 11:2: “Give a portion to seven, or even to eight, for you know not what disaster may happen on earth.” Diversification is, at its core, an act of humility. Since no one knows the future, spreading investments across asset classes is the most reliable defense against both downturns and emotional decision-making.While diversification may feel “boring” during bull markets, it provides stability that helps investors stay committed to their plan when volatility inevitably returns.A strong investment strategy accounts for risk tolerance, life stage, and long-term goals. For a younger investor, this might mean a higher allocation to stocks, consistent 401(k) contributions, and the discipline to stay invested through ups and downs. For others, it may involve gradual adjustments, such as including gold or bonds. The key is making changes based on thoughtful, long-term reasoning—not fear of missing out.Confidence vs. OverconfidenceHealthy confidence comes from setting reasonable goals, understanding fundamentals, and staying the course. Overconfidence, on the other hand, assumes you can predict what's coming next—a trap no investor avoids for long.Optimism has its place, but unchecked euphoria can cloud judgment. By remembering history, practicing diversification, and committing to a steady long-term plan, investors can avoid the pitfalls of emotional decision-making and pursue lasting financial fruitfulness.If you'd like to learn more about becoming a Sound Mind Investing (SMI) member, you can visit them at SoundMindInvesting.org. On Today's Program, Rob Answers Listener Questions:I'm 72, still running my business, and I have both an IRA and a Roth that I've never touched. What's the most tax-efficient way to start taking money out while minimizing what goes to the government?I need to withdraw from two retirement accounts with about $9,000 each. They're planning to withhold 20% plus fees—around $2,200 per account. Is that normal, and what are my options since I need the cash quickly?Resources Mentioned:Faithful Steward: FaithFi's New Quarterly Magazine (Become a FaithFi Partner)Sound Mind Investing (SMI)Bull Market? Great! But Don't Get Carried Away by Joseph Slife (Sound Mind Investing Article)Wisdom Over Wealth: 12 Lessons from Ecclesiastes on MoneyLook At The Sparrows: A 21-Day Devotional on Financial Fear and AnxietyRich Toward God: A Study on the Parable of the Rich FoolFind a Certified Kingdom Advisor (CKA) or Certified Christian Financial Counselor (CertCFC)FaithFi App Remember, you can call in to ask your questions most days at (800) 525-7000. Faith & Finance is also available on the Moody Radio Network and American Family Radio. Visit our website at FaithFi.com where you can join the FaithFi Community and give as we expand our outreach. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
By Brian Kerg Commander William Spears, U.S. Navy, joins the program to discuss his article, “What Moral Leadership Looks Like,” which examines the philosophical approach of Admiral Stockdale during his time as a POW in North Vietnam. Commander William C. Spears is a submarine warfare officer in the U.S. Navy and the author of Stoicism as … Continue reading Sea Control 586: What Moral Leadership Looks Like with William Spears →
This week on the Mr. Throwback Thursday Podcast, we bring you Yasiin Bey asking for the smoke, Times Square getting an upgrade, the Security of the First World getting a documentary, Long Beach baseball gets a new owner, Serch gets himself in some hot water, and we bring you new music from Mikey D (that...
Send us a textWhat happens when you lose your Bitcoin in the Mt. Gox hack, then watch 44,000 Ethereum vanish from a project you helped build? For Xavier Hendricks, these painful experiences sparked a mission to revolutionize crypto security through radical simplicity.Xavier's journey from blockchain enthusiast to security specialist reveals a counterintuitive truth: the best security removes technology rather than adds it. "Anything that's complicated, anything that's technical, is a weakness," he explains with the hard-earned wisdom of someone who's experienced devastating hacks firsthand.As CEO of NGRAVE, Xavier has created a hardware wallet designed around this philosophy. The solution keeps private keys completely offline while allowing users to sign transactions through an intuitive QR code system that anyone can visually verify. Most impressive is their unique backup solution: two metal plates with a punch system creating a split key backup resistant to fire, water, and physical damage.Beyond the technical innovations, Xavier's perspective on the psychological aspects of crypto security is what truly sets this conversation apart. The industry asks people to take full responsibility for their assets, akin to keeping all your cash in your living room. Creating solutions people actually feel comfortable using requires addressing both technical and emotional security needs.The conversation evolves to explore how trust is quickly lost in the security space, the future of integrating services like staking without compromising security, and why looking beyond the "ugliness on the surface" reveals blockchain's true potential as a peer-to-peer financial system that preserves individual freedom.Join us to discover why simplicity trumps complexity in wallet design, how military-grade security certification meets user-friendly design, and what's next as crypto adoption expands beyond technical enthusiasts to mainstream investors.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Why You Need Phishing-Resistant Authentication NOW. The recent compromise of a number of high-profile npmjs.com accounts has yet again shown how dangerous a simple phishing email can be. https://isc.sans.edu/diary/Why%20You%20Need%20Phishing%20Resistant%20Authentication%20NOW./32290 S1ngularity/nx Attackers Strike Again A second wave of attacks has hit over a hundred npm-related GitHub repositories. The updated payload implements a worm that propagates itself to other repositories. https://www.aikido.dev/blog/s1ngularity-nx-attackers-strike-again ChatGPT s Calendar Integration Can Be Exploited to Steal Emails ChatGPT s new MCP integration can be used, via prompt injection, to affect software connected to ChatGPT via MCP. https://www.linkedin.com/posts/eito-miyamura-157305121_we-got-chatgpt-to-leak-your-private-email-activity-7372306174253256704-xoX1/
The Trump administration's recent lethal strikes on purported drug boats in Venezuela drew widespread condemnation from experts in international law. On Today's Show:Brian Finucane, senior adviser at the International Crisis Group and a non-resident senior fellow at Reiss Center on Law and Security at NYU Law, talks about the strikes and the legal issues around them.
Decide who to let into your group before crisis hits. Trust, skills, risk, and resources guide the standard for long-term survival. The post Who Gets In During Collapse? Build Your Group SOP appeared first on Mind4Survival.
Apple just rewrote the rules of device security with a chip-level upgrade that could wipe out most iPhone vulnerabilities overnight. Find out how "memory integrity enforcement" aims to make exploits a thing of the past—and why it took half a decade to pull off. Are Bitcoin ATMs anything more than scamming terminals. Ransomware hits the Uvalde school district and Jaguar. Did "Scattered LapSus Hunters" just throw in the towel. Germany, for one, to vote "no" on Chat Control. Russia's new MAX messenger has startup troubles. Samsung follows Apple's WhatsApp patch chain. Shocker: UK school hacks are mostly by students. HackerOne was hacked. Connected washing machines in Amsterdam hacked. DDoS breaks another record. Bluesky to implement conditional age verification. Enforcement actions for Global Privacy Control. Might Apple have finally beaten vulnerabilities Show Notes - https://www.grc.com/sn/SN-1043-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: joindeleteme.com/twit promo code TWIT vanta.com/SECURITYNOW threatlocker.com for Security Now bitwarden.com/twit Melissa.com/twit
Apple just rewrote the rules of device security with a chip-level upgrade that could wipe out most iPhone vulnerabilities overnight. Find out how "memory integrity enforcement" aims to make exploits a thing of the past—and why it took half a decade to pull off. Are Bitcoin ATMs anything more than scamming terminals. Ransomware hits the Uvalde school district and Jaguar. Did "Scattered LapSus Hunters" just throw in the towel. Germany, for one, to vote "no" on Chat Control. Russia's new MAX messenger has startup troubles. Samsung follows Apple's WhatsApp patch chain. Shocker: UK school hacks are mostly by students. HackerOne was hacked. Connected washing machines in Amsterdam hacked. DDoS breaks another record. Bluesky to implement conditional age verification. Enforcement actions for Global Privacy Control. Might Apple have finally beaten vulnerabilities Show Notes - https://www.grc.com/sn/SN-1043-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: joindeleteme.com/twit promo code TWIT vanta.com/SECURITYNOW threatlocker.com for Security Now bitwarden.com/twit Melissa.com/twit
"Yours, Lord, is the greatness and the power and the glory and the majesty and the splendor, for everything in heaven and earth is yours." - 1 Chronicles 29:11If God owns it all, what does that mean for the way we manage money? Brian Holtz is here to unpack the Five Pillars of Financial Discipleship—principles that, when embraced by families, bring freedom and joy to their finances.Brian Holtz is the CEO of Compass Financial Ministry and the author of Financial Discipleship for Families: Intentionally Raising Faithful Children.More Than Money ManagementWhen it comes to managing money as followers of Christ, the Bible calls us to more than financial freedom or peace of mind. It calls us to financial discipleship—a life of stewardship, surrender, and multiplication for God's Kingdom. Here are five key pillars that shape this journey.Pillar One: OwnershipEverything begins with recognizing who truly owns it all. Scripture reminds us in Psalm 24:1, Haggai 2:8, and 1 Chronicles 29:11 that God is the Creator and ultimate Owner of everything. Our role is not ownership but stewardship. This mindset shift—from “mine” to “His”—brings both relief and challenge. It's freeing to know the responsibility doesn't all rest on us, but humbling to realize our lives and resources are not ultimately ours to control.Pillar Two: SurrenderAcknowledging God's ownership requires surrender. Luke 14:33 makes this clear: discipleship means yielding everything back to God, not just intellectually but in our hearts. This surrender extends beyond giving—it includes how we spend, save, and plan. Trusting God's plan over our own is an act of daily obedience.Pillar Three: ChoiceIn Matthew 6:24, Jesus tells us we cannot serve both God and money. Every financial decision—whether saving, giving, or spending—reveals who we serve. Choosing God requires aligning daily habits with His Word, even when it feels counterintuitive. As Isaiah reminds us, God's ways are higher and better than ours.Pillar Four: MultiplicationDiscipleship is never meant to stop with us. In the Parable of the Talents, Jesus calls us to multiply what He has entrusted to us. This means sharing what we've learned and inviting others into the journey. Financial discipleship involves helping others apply biblical wisdom so that God's Kingdom continues to grow.Pillar Five: Eternal FocusFinally, discipleship means setting our eyes on eternity. Jesus said in Matthew 6:19–21 to store up treasures in heaven, not on earth. But these treasures aren't material—they're about our relationship with Christ. Living with an eternal focus keeps us from being distracted by temporary wealth and anchors our hope in Him alone.How Financial Discipleship DiffersIt's easy to confuse financial discipleship with financial stewardship or freedom. Stewardship may stop at wise resource management, but discipleship goes further—it's about helping others learn, apply, and multiply biblical truth for God's glory. True discipleship always leads to transformation, both personally and in community.Compass Financial Ministry exists to equip believers to live this way. Through resources, training, and community, they help people break free from the love of money and serve God more fully. Financial discipleship is really about helping others learn, apply, and multiply everything for God's glory, rather than for our own. To learn more, visit CompassFinancialMinistry.org.On Today's Program, Rob Answers Listener Questions:I'm about to receive money from a relative's trust and want to place it in a high-yield money market account. How can I find a reputable option, especially since I don't recognize many of the online banks?I'm 47 and just starting my career after years as a stay-at-home mom. My employer offers a 403(b), but the 3% match doesn't kick in until after a year. Should I start contributing now or wait? I'm also still working on paying off debt.I'm newly married, expecting our first child, and we're in the process of house hunting. Should we go through a mortgage broker or a bank for our loan? And can you share advice on budgeting as we start our family?I have a Roth portion in my 401(k). When I retire in a few months, can I withdraw that money tax-free?I just sold an RV for $40,000 that I bought five years ago for $30,000. The title agency issued me a 1099—what does that mean for my taxes?Resources Mentioned:Faithful Steward: FaithFi's New Quarterly Magazine (Become a FaithFi Partner)Compass Financial MinistryFinancial Discipleship for Families: Intentionally Raising Faithful Children by Brian C. HoltzMoney and Marriage God's Way by Howard DaytonChristian Community Credit Union (CCCU)Bankrate.comMovement MortgageWisdom Over Wealth: 12 Lessons from Ecclesiastes on MoneyLook At The Sparrows: A 21-Day Devotional on Financial Fear and AnxietyRich Toward God: A Study on the Parable of the Rich FoolFind a Certified Kingdom Advisor (CKA) or Certified Christian Financial Counselor (CertCFC)FaithFi App Remember, you can call in to ask your questions most days at (800) 525-7000. Faith & Finance is also available on the Moody Radio Network and American Family Radio. Visit our website at FaithFi.com where you can join the FaithFi Community and give as we expand our outreach. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Podcast Show Notes: Pankaj Patel – Redefining Networking and Security in the Age of AI Guest: Pankaj Patel, Founder and CEO of Nile | Former EVP and Chief Development Officer at Cisco | Partner at JC2 Ventures | Senior Advisor at March Capital Episode Overview In this episode, we sit down with Pankaj Patel, one of the most influential leaders in enterprise technology. As the former engineering head of Cisco's $38 billion portfolio with a $6 billion R&D budget, and now the founder and CEO of Nile, Pankaj brings unparalleled insight into the future of networking, AI, and enterprise security. Pankaj shares lessons from building and leading global engineering organizations, the principles he applied to acquisitions and innovation at scale, and why he believes simplicity and security must define the next era of enterprise technology. We also explore how Nile is disrupting the status quo, delivering secure and simple networking as a service, and why Pankaj considers this company the fulfillment of an “unfulfilled mission” in his career. Whether you're a technology executive, founder, or investor, this conversation offers invaluable perspective on how to navigate complexity, embrace AI, and prepare for the enterprise networks of the future. What You'll Learn in This Episode Leadership at scale: What it was like managing 29,000 engineers and a $6 billion R&D budget at Cisco. Acquisition strategy: How Pankaj evaluated companies for acquisition and integration. The AI reality check: Why many legacy companies are calling themselves AI-first, and whether the claims hold up. Simplicity in enterprise tech: Why products have historically been built around complexity, and why simplifying networks is both challenging and essential. Security reimagined: What truly makes a system secure, why humans are often the weakest link, and how AI will transform security. The “unfulfilled mission”: Why Pankaj launched Nile and how the company is disrupting the networking industry. Future of enterprise tech: How networking, AI, and security are converging to reshape the next decade. Investor perspective: What Pankaj looks for in founders and startups as a board member, advisor, and venture partner. Key Questions We Discuss What principles guided your allocation of Cisco's $6 billion R&D budget? What criteria did you use when acquiring companies, and how did you evaluate integration risk? Why has enterprise tech often thrived on complexity, and how is Nile changing that? How do you see AI shaping the future of networking and security? What advice would you give to enterprises overwhelmed by legacy systems? What was the “unfulfilled mission” that led you to launch Nile? How has your leadership style evolved from managing tens of thousands at Cisco to leading a focused startup team? What do you look for in founders when joining boards or investing? How will the convergence of networking, AI, and security define the next 5–10 years? About Pankaj Patel Pankaj Patel is the Founder and CEO of Nile, where he is reimagining the future of networking by delivering secure, simple, and customer-obsessed services. Previously, he served as Executive Vice President and Chief Development Officer at Cisco, overseeing the company's $38 billion product portfolio. He is also a Partner and Chief Strategy Officer at JC2 Ventures, a Senior Advisor at March Capital, and serves on the boards of several leading technology startups. Connect with Pankaj Patel LinkedIn: Pankaj Patel Nile: https://nilesecure.com Disclaimer The views expressed in this podcast are for informational purposes only and do not constitute financial, legal, or investment advice. Please consult with a qualified professional regarding your specific situation. The views expressed are those of the guest and host and do not necessarily reflect the views of Finalis Inc. or Finalis Securities LLC, Member FINRA/SIPC. #ai #cybersecurity #nilesecure #siliconvalley #podcast
It's been awhile since I have shared something from John Maxwell's “Daily Reader.” This is from September 16 and it deals with Significance over Security. It gets us thinking about settling for security (and in today's world, that sounds great with all of the crazy things going on), but it also gets us thinking about how significant we are in our lives. It's a mind shift to our purpose and our life's mission. Doesn't matter our age or where we are in our lives, we can always make the shift he shares in this. This has been on my heart, on my mind and in my actions for a long time. I just need to turn up the heat of me going after this now in my life. How about you? Thanks for listening. Please take a few moments to subscribe & share this with someone, also leave a 5 Star rating on Apple Podcasts and ITunes or other services where you find this show. Find me on Facebook: https://www.facebook.com/coachtoexpectsuccess/ on Twitter / “X”: @coachtosuccess and on Instagram at: @coachjohndaly - My YouTube Channel is at: Coach John Daly. Email me at: CoachJohnDalyPodcast@gmail.com You can also head on over to https://www.coachtoexpectsuccess.com/ and get in touch with me there on my homepage along with checking out my Top Book list too. Other things there on my site are being worked on too. Please let me know that you are reaching out to me from my podcast.
Air Date 9/16/2025 Between recent Labor Day rallies and Republican Town Hall meetings, we're seeing that resistance to Trump's deeply unpopular policies is alive and well. Plus we're going to look at some historical legacies of resistance movements that can both inform and inspire us today. Be part of the show! Leave us a message or text at 202-999-3991, message us on Signal at the handle bestoftheleft.01, or email Jay@BestOfTheLeft.com Full Show Notes Check out our new show, SOLVED! on YouTube! BestOfTheLeft.com/Support (Members Get Bonus Shows + No Ads!) KEY POINTS KP 1: While We Were Out An Eye-opening Roundup of Everything We Missed or Wished We Had Over the Past Week - The Bradcast - Air Date 9-2-25 KP 2: How Labor Unions Shape Society Margaret Levi (re-release) - TED Talks Daily - Air Date 9-1-25 KP 3: This Is An Invasion - Pritzker, Trump, and the Union Coming Apart + Venezuelan Boat Attack - Straight White American Jesus - Air Date 9-5-25 KP 4: What A Raucous Nebraska Town Hall Says About The Country's Mood - The Brian Lehrer Show - Air Date 8-6-25 KP 5: Microsoft Is an Active Partner in the Genocide! Inside the Tech Worker Revolt for Palestine - Working People - Air Date 9-4-25 KP 6: Rules for Surviving Authoritarian Times - How to Fix It - Air Date 6-22-25 KP 7: We Are All D.C. Massive Protests Rock US Capital in Defiance of Trump - The Real News Network - Air Date 9-7-25 (00:53:35) NOTE FROM THE EDITOR On what our history can tell us about our present political conflict A Senator Just Unapologetically Declared the U.S. a White Homeland DEEPER DIVES (01:03:18) SECTION A: LABOR DAY (01:36:45) SECTION B: PROTESTS (02:08:57) SECTION C: STATE-LEVEL PUSHBACK (02:39:21) SECTION D: LEGACIES OF RESISTANCE SHOW IMAGE CREDITS Description: Photo from the Labor Day rally in Boston depicting Sen. Ed Markey, Rep. Ayanna Pressley, and Sen. Elizabeth Warren holding a “Workers” banner with other participants. Tall, vertical rally flags are held behind them that say “Justice”, “Solidarity,” “Fairness,” “Security,” and “Freedom” Credit: Internal photo. “Boston Labor Day Rally” | Copyright 2025, Best of the Left, All rights reserved.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Apple Updates Apple released major updates for all of its operating systems. In addition to new features, these updates patch 33 different vulnerabilities. https://isc.sans.edu/diary/Apple%20Updates%20Everything%20-%20iOS%20macOS%2026%20Edition/32286 Microsoft End of Life October 14th, support for Windows 10, Exchange 2016, and Exchange 2019 will end. https://support.microsoft.com/en-us/windows/windows-10-support-ends-on-october-14-2025-2ca8b313-1946-43d3-b55c-2b95b107f281#:~:text=As%20a%20reminder%2C%20Windows%2010,one%20that%20supports%20Windows%2011. https://techcommunity.microsoft.com/blog/exchange/t-9-months-exchange-server-2016-and-exchange-server-2019-end-of-support/4366605 Phishing Targeting Rust Developers Rust developers are reporting similar phishing emails as the emails causing the major NPM compromise last week. https://github.com/rust-lang/crates.io/discussions/11889#discussion-8886064 Samsung Patches 0-Day Samsung released its monthly updates for its flagship phones fixing, among other vulnerability, an already exploited 0-day. https://security.samsungmobile.com/securityUpdate.smsb
OpenAI's Codex has already shipped hundreds of thousands of pull requests in its first month. But what is it really, and how will coding agents change the future of software?In this episode, General Partner Anjney Midha goes behind the scenes with one of Codex's product leads- Alexander Embiricos - to unpack its origin story, why its PR success rate is so high, the safety challenges of autonomous agents, and what this all means for developers, students, and the future of coding. Timecodes:0:00 Intro: The Vision for AI Agents1:25 Codex's Origin and Naming3:20 Early Prototypes and Agent Form Factors6:00 Cloud Agents: Safety and Security9:40 Prompt Injection and Attack Vectors12:00 PR Merging: Metrics and Transparency17:00 The Future of Code Review and Automation20:00 User Adoption: Internal vs. External Surprises22:00 Multi-Turn Interactions and Product Learnings29:30 Best-of-N, Slot Machine Analogy, and Creativity33:00 Human Taste, Iteration, and Collaboration40:00 AI's Impact on Software Engineering Careers45:00 Education, CS Degrees, and AI Integration49:00 Prototyping, Hackathons, and Speed to Magic55:00 Legacy Code, Modernization, and Global Adoption1:00:00 Enterprise, Security, and Air-Gapped Environments1:05:00 Product Roadmap and Future of Codex1:10:00 Advice for Founders and Startups1:15:00 Education Reform and Project-Based Learning1:20:00 Hiring, Building, and New Grad Advice Resources: Find Alex on X: https://x.com/embiricoFind Anjney on X: https://twitter.com/AnjneyMidha Stay Updated: If you enjoyed this episode, be sure to like, subscribe, and share with your friends!Find a16z on X: https://x.com/a16zFind a16z on LinkedIn: https://www.linkedin.com/company/a16zListen to the a16z Podcast on Spotify: https://open.spotify.com/show/5bC65RDvs3oxnLyqqvkUYXListen to the a16z Podcast on Apple Podcasts: https://podcasts.apple.com/us/podcast/a16z-podcast/id842818711Follow our host: https://x.com/eriktorenbergPlease note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures. Stay Updated:Find a16z on XFind a16z on LinkedInListen to the a16z Podcast on SpotifyListen to the a16z Podcast on Apple PodcastsFollow our host: https://twitter.com/eriktorenberg Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
You can build effective, scalable detection pipelines using free and open-source tools like Zeek, Suricata, YARA, and Security Onion. Today on Packet Protector we welcome Matt Gracie, Senior Engineer at Security Onion Solutions — the team behind the open-source platform used for detection engineering, network security monitoring, and log management. Matt has over 15 years... Read more »
Charles Spurgeon once said, “Consider how precious a soul must be, when both God and the devil are after it.” The story of the Rich Young Ruler in Matthew 19 shows us just how true that is. This young man approached Jesus with a pressing question: “Teacher, what good thing must I do to get eternal life?”What followed was a conversation that revealed not only his heart but also the way possessions can grip any of us more deeply than we realize.A Revealing QuestionAt first glance, the man seemed sincere. But notice his words: “What good thing must I do?” He assumed that eternal life could be earned—checked off like an item on a list. Jesus, however, had just finished telling the crowd that the Kingdom belongs to those who receive it like children, wholly dependent on God's goodness. The man either missed or resisted that truth.When Jesus pointed him to the commandments, it wasn't because those could save him. It was to reveal what held the highest place in his heart. Outwardly, he looked moral. Inwardly, his wealth had become his god.When the man pressed further, Jesus cut to the core: “Go, sell your possessions and give to the poor, and you will have treasure in heaven. Then come, follow me.” Matthew 19:22 records the heartbreaking result: “When the young man heard this he went away sorrowful, for he had many possessions.”The issue wasn't money—it was devotion. Jesus loved him enough to name the one thing keeping him from life. For him, it was wealth. For us, it might be something else—career, reputation, control. Whatever we prize above Christ must be surrendered.What This Means for UsDoes this mean every believer is called to sell everything? Not necessarily. As the NIV Study Bible notes, Jesus's command applied directly to this man's spiritual condition. But the principle still stands: anything we cling to more tightly than Christ can become a barrier to faith.After the man walked away, Jesus warned His disciples: “It is easier for a camel to go through the eye of a needle than for a rich person to enter the kingdom of God.” Wealth is not evil, but it has the unique power to enslave us.So the question for us is this: What competes for your devotion? What gives you a sense of identity or security apart from Christ?Jesus's words to the Rich Young Ruler are both sobering and full of hope. Wealth can blind us to our need for God, but surrendering to Christ leads to true life. The invitation is the same today: Will we cling to temporary treasures, or embrace the eternal treasure of knowing Him?Because the problem isn't wealth, the problem is worship.———————————————————————————————————————At FaithFi, we often talk about being “rich toward God,” a phrase Jesus used in Luke 12 when warning about the Rich Fool. It means treasuring Christ above all else, practicing generosity, and holding our resources with open hands.That's why we've created the Rich Toward God study, designed to help you see money and possessions from God's perspective and reorient your heart toward eternal treasure. You can order a copy—or even place a bulk order for group study—at FaithFi.com/Shop.On Today's Program, Rob Answers Listener Questions:My husband and I have a blended family with some grown kids and some still at home. How should we set up the beneficiaries on our term life insurance?Our bank suggested that we keep our HELOC open even after the mortgage is paid off, as protection against fraudulent title transfers. Is that sound advice?I have savings bonds that have matured, and I'd like to add a co-owner. Since banks no longer handle this, how can I update the registration?I'm trying to help my 81-year-old mother understand reverse mortgages, and also explain to my siblings how it would work if she gets one—especially what happens to the home's value after she passes away.Resources Mentioned:Faithful Steward: FaithFi's New Quarterly Magazine (Become a FaithFi Partner)TreasuryDirectUnderstanding Reverse: Simplifying the Reverse Mortgage by Dan HultquistMovement MortgageWisdom Over Wealth: 12 Lessons from Ecclesiastes on MoneyLook At The Sparrows: A 21-Day Devotional on Financial Fear and AnxietyRich Toward God: A Study on the Parable of the Rich FoolFind a Certified Kingdom Advisor (CKA) or Certified Christian Financial Counselor (CertCFC)FaithFi App Remember, you can call in to ask your questions most days at (800) 525-7000. Faith & Finance is also available on the Moody Radio Network and American Family Radio. Visit our website at FaithFi.com where you can join the FaithFi Community and give as we expand our outreach. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
For the last 30 years, email security has been stuck in the past, focusing almost entirely on stopping bad things from getting into the inbox. In this episode, Rajan Kapoor, Field CISO at Material Security and former Director of Security at Dropbox, argues that this pre-breach mindset is dangerously outdated. The real challenge today is post-breach: protecting the sensitive data that already lives inside your mailboxes.The conversation explores why we must evolve from "email security" to the broader concept of "workspace security" . Rajan explains how interconnected productivity suites like Google Workspace and Microsoft 365 have turned the inbox into a gateway to everything else Drive, accounts, and sensitive company data. We also discuss how the rise of AI co-pilots will create new risks, as they can instantly find and surface over-shared data that was previously hidden in plain sight .Guest Socials - Rajan's LinkedinPodcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-Cloud Security Podcast- Youtube- Cloud Security Newsletter - Cloud Security BootCampIf you are interested in AI Cybersecurity, you can check out our sister podcast - AI Security PodcastQuestions asked:(00:00) Introduction(02:00) Who is Rajan Kapoor? Field CISO at Material Security(02:38) What is Email Security in 2025? The 30-Year-Old Problem(03:20) The Critical Shift: From Pre-Breach to Post-Breach Protection(04:20) The Rise of Workspace Security: Beyond the Inbox(06:00) Why Focusing on Email is "Not Even Half" The Problem(06:50) Are Microsoft 365 Security Challenges Different from Google's?(09:30) Rethinking the Approach to Email Security(11:40) How AI Co-Pilots Will Exploit Your Over-Shared Data(13:30) A Real-World Attack: From Email to Malicious OAuth App(17:00) How Should CISOs Structure Their Teams for Workspace Security?(19:25) The Role of CASB vs. API-Based Security for Data at Rest(23:10) How CISOs Can Separate Signal From Noise in a Crowded Market(24:45) Final Questions: Home Automation, Career Risks, and Ethiopian Food
You can build effective, scalable detection pipelines using free and open-source tools like Zeek, Suricata, YARA, and Security Onion. Today on Packet Protector we welcome Matt Gracie, Senior Engineer at Security Onion Solutions — the team behind the open-source platform used for detection engineering, network security monitoring, and log management. Matt has over 15 years... Read more »
What does cyberwarfare really look like behind the headlines? This week, Roo sits down with Hayley Benedict, a cyber intelligence analyst at RANE, to explore the evolving world of digital conflict. From hacktivists to disinformation specialists, Hayley shares how nation states, criminals, and ideologically driven groups are blurring lines — and why data theft, disruption, and doubt remain the weapons of choice.
Executive sessions are all about pulling back the curtain, and this one does just that. Sean Hawkins, Co-Founder and VP of Development at HawkSoft, joins Jason to share how a farm kid turned programmer helped build one of the industry's most trusted systems. From navigating shiny tech trends to keeping data ownership and people first, Sean's story shows why HawkSoft's culture continues to stand out. Key Topics: Sean's early programming roots and the origins of HawkSoft with his dad Why InsurTech “shiny objects” sometimes become core system features Balancing thousands of agency requests without losing product focus The importance of data ownership and HawkSoft's people-first philosophy Security challenges with users, vendors, and virtual employees How Sean blends product leadership with being a developer at heart Life outside of work: woodworking, pickup basketball, and raising five kids Reach out to: Sean Hawkins Jason Cass Visit Website: HawkSoft Agency Intelligence Produced by PodSquad.fm
Welcome to Model FA Episode 194! David DeCelle sits down with Chris King, CEO of Eagle Brook Advisors, to dive deep into the evolving world of crypto in financial planning. Chris shares his journey from early Bitcoin research in college to building Eagle Brook, a leading digital asset platform for RIAs. Discover how Eagle Brook empowers advisors with automated tax loss harvesting, direct Bitcoin ownership, and seamless integration with major reporting platforms. In this episode, you'll learn: Chris King's backstory and what inspired him to launch Eagle Brook Advisors The unique value proposition of Eagle Brook for RIAs and their clients How automated tax loss harvesting works and why it's a game-changer for Bitcoin investors The importance of direct Bitcoin ownership versus ETFs and retail platforms How Eagle Brook ensures institutional-grade security and compliance Trends in crypto allocations among high-net-worth clients and advisors The educational resources Eagle Brook provides to empower advisors What's next for Eagle Brook, including product roadmap and market expansion Whether you're a financial advisor curious about crypto or an investor seeking smarter ways to manage digital assets, this episode is packed with actionable insights and real-world examples Connect with Chris: LinkedIn: https://www.linkedin.com/in/christopherking7/ Website: https://eaglebrook.com/ --- About the Model FA Podcast The Model FA podcast is a show for fiduciary financial advisors. In each episode, our host David DeCelle sits down with industry experts, strategic thinkers, and advisors to explore what it takes to build a successful practice — and have an abundant life in the process. We believe in continuous learning, tactical advice, and strategies that work — no “gotchas” or BS. Join us to hear stories from successful financial advisors, get actionable ideas from experts, and re-discover your drive to build the practice of your dreams. Did you like this conversation? Then leave us a rating and a review in whatever podcast player you use. We would love your feedback, and your ratings help us reach more advisors with ideas for growing their practices, attracting great clients, and achieving a better quality of life. While you are there, feel free to share your ideas about future podcast guests or topics you'd love to see covered. Our Team: President of Model FA, David DeCelle If you like this podcast, you will love our community! Join the Model FA Community on Facebook to connect with like-minded advisors and share the day-to-day challenges and wins of running a growing financial services firm.
To get to the benefits that AI offers, organizations have to address their technology infrastructure in ways that are much broader than historical approaches. Senior analyst Greg Macatee joins host Eric Hanselman to delve into what's required and what enterprises are identifying in the recent Voice of the Enterprise AI and Machine Learning study. Enterprises are struggling with raising the success levels of AI projects. Over 60% report moderate to severe challenges in achieving AI success. Bringing together the computational power and the right quality data in the right locations can be complicated in the hybrid environments that more are operating. It's not just a matter of being more selective with use cases, AI requires a set of organizational skills that have to be honed. Starting small and iterating can reduce risk while building competency. Infrastructure has to shift in new ways, as well. Data management processes that can build the necessary data pipelines to feed AI applications bring together a broader set of tech disciplines. There are new wrinkles in AI infrastructure ecosystems, with new providers looking to address supply chain constraints, like the Neocloud or GPU as a Service (GPUaaS) providers. Even hyperscalers are looking to them to meet surging demand in a tight market. Those new options offer new choices, but enterprises need to match them with their AI goals. More S&P Global Content: Navigating the AI infrastructure landscape The path from LLMs to agentic AI Next in Tech | Ep. 225: Security for MCP For S&P Global Subscribers: AI infrastructure strategies evolve amid widespread data challenges – Highlights from VotE: AI & Machine Learning Generative AI Market Monitor & Forecast AI infrastructure: Trends, thoughts and a 2025 research agenda Credits: Host/Author: Eric Hanselman Guest: Greg Macatee Producer/Editor: Adam Kovalsky Published With Assistance From: Sophie Carr, Feranmi Adeoshun, Kyra Smith
In this episode of NucleCast, Adam interviews Dr. Rich Tighe, the president and CEO of Consolidated Nuclear Security, discussing the current operations and future outlook of the Y-12 National Security Complex. Rich explains the complex's historical significance, its current missions, and the challenges it faces in workforce recruitment and safety. The conversation also touches on modernization efforts, collaboration with design agencies, and the importance of community support. Rich shares his aspirations for the future, including the need for continued growth and innovation in nuclear security.Richard (Rich) Tighe is president and chief executive officer of Consolidated Nuclear Security, the Bechtel led management and operating contractor for the Y 12 National Security Complex in Oak Ridge, Tennessee, with a workforce of approximately 9,500. Tighe (pronounced “tie”) joined CNS in September 2022, and led the company through the separation of the Pantex Plant from CNS's management and operating contract. Before the separation, Tighe led a combined 13,500 employees through significant growth and record performance. As the National Nuclear Security Administration mission and project scope grew at the sites, CNS met all deliverables to the military under Tighe's leadership. Additionally, during his tenure, CNS added more than 1,500 team members, including engineers, scientists, professional staff, and craft workers, and both sites improved safety performance, achieving more than 12.6 million consecutive hours without a lost time injury. Under Tighe's leadership, CNS has been awarded a 2-year contract extension at Y-12.Before joining CNS, Tighe served for nearly 4 years as president and general manager of National Aerospace Solutions (NAS), the Bechtel-led test operations and sustainment contractor for the Arnold Engineering Development Complex at Arnold Air Force Base near Tullahoma,Tennessee. He also was manager of strategy, marketing, and business development for Bechtel's Nuclear, Security, and Environmental global business unit, an $8 billion business. He served as the NS&E representative to the Bechtel Group Marketing and Business Development Committee and represented Bechtel on the board of managers for NAS and Kwajalein Range Services.Tighe joined Bechtel in 2006 as marketing and business development manager; he was elected principal vice president in 2016 and senior vice president in 2023. Before his service with Bechtel, Tighe worked for Lockheed Martin at the Nevada Test Site for more than a decade, holding several scientific and management posts and ultimately advancing to assistant general manager for high-hazard test and evaluation.Tighe was a postdoctoral fellow in the Nuclear Science Division of the Lawrence Berkeley National Laboratory at the University of California.He earned a Ph.D. in experimental nuclear physics from the University of Notre Dame, Indiana, and a B.S. in physics from Loras College in Dubuque, Iowa.Socials:Follow on Twitter at @NucleCastFollow on LinkedIn: https://linkedin.com/company/nuclecastpodcastSubscribe RSS Feed: https://rss.com/podcasts/nuclecast-podcast/Rate: https://podcasts.apple.com/us/podcast/nuclecast/id1644921278Email comments and topic/guest suggestions to NucleCast@anwadeter.org
Send us a textAchieving Coast Fire: Tom and Jill's Journey to Financial IndependenceIn this episode of the Retire Early Retire Now podcast, host Hunter Kelly, a certified financial planner, dives into a real-life case study featuring Tom and Jill, a couple who achieved their 'coast fire' number at age 51. Hunter details their journey of disciplined saving, low debt, and intentional financial planning. Tom's 20-year military career and subsequent police department role, combined with Jill's teaching career, allowed them to raise their two daughters while maintaining a modest lifestyle. Their story is a testament to the power of consistent saving and the impact of a well-structured financial plan. Despite facing unexpected challenges such as Jill's cancer diagnosis, their foresight in building an emergency fund and investing consistently ensured they remained financially secure. This episode underscores the significance of having financial flexibility and the peace of mind that comes with it, encouraging listeners to assess their own 'coast fire' status and take steps towards financial independence.00:00 Introduction to Coast Fire01:39 Meet Tom and Jill02:51 The Power of Consistency06:23 Overcoming Life's Curveballs08:21 The Importance of a Brokerage Account12:31 Lessons from Tom and Jill15:30 Conclusion and Call to ActionCheck out the Palm Valley Wealth Management WebsitePalmValleywm.comCheck us out on InstagramLinkedIn FacebookListen to the Podcast Here! AppleSpotify
The dynamic evolution of hacker culture, the ongoing transformation of cybersecurity conferences, and the importance of resilience and curiosity among security researchers are all topics covered in this episode through stories of past and present with Dhillon Kannabhiran, CEO and Founder of Hack In The Box (HITB) and Out Of The Box. He and Phillip Wylie examine the shift from open knowledge sharing and exploration to the monetization and commercialization of cybersecurity exploits. Dhillon offers insights into the unique approaches Hack In The Box and Out of the Box conferences have taken, encouraging people the valuing of persistence and the collaborative spirit that push the community forward.Dhillon Kannabhiran on LinkedIn: https://www.linkedin.com/in/l33tdawg/Dhillon Kannabhiran on X: https://x.com/l33tdawgKey Points/Topics Covered:Evolution of hacker culture and the foundational role of resilience and curiosityHistory, mission, and format of Hack In The Box and Out of the Box conferencesShifts in conference and research communities post-COVID and the influence of commercialization on sharingThe continuing need for community, knowledge sharing, and supporting new talent in cybersecurityThe changing landscape of security research and bug hunting with the advent of AI and new technology Let's connect about IoT Security!Follow Phillip Wylie at https://www.linkedin.com/in/phillipwyliehttps://youtube.com/@phillipwylieThe IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast
Please use the Contact Form on this blog or our twitter feed to send us your questions, or to suggest future episode topics you would like us to cover.
In that latest episode of the Security Sprint, Dave and Andy covered the following topics:Warm Open:• TribalNet 2025!• FB-ISAO Releases an All-Faiths Analysis of Attacks on U.S. Houses of Worship in 2024, FB-ISAO Releases an All-Faiths Analysis of Attacks on U.S. Houses of Worship in 2024 & FB-ISAO Newsletter• Water at the 2025 WaterPro Conference• Errol LinkedIn: A Looming Deadline: The Cybersecurity Information Sharing Act of 2015• Health-ISAC and CI-ISAC Australia joint white paper Main Topics:Charlie Kirk Assassination• The Hostile Event Attack Cycle (HEAC)• De-escalation Reference Card: CISA De-escalation Reference Card & CISA De-escalation Reference Card Printer FriendlyInsider Threat Awareness Month: Fake Faces, Real Damage: The Corporate Risk of AI-Powered Manipulation. Security professionals are rapidly confronting a new reality: artificial intelligence (AI) and big data, while excellent tools for improving productivity and business operations, are equally lowering the barriers for sophisticated attacks by a wide range of threat groups. From hostile nation-states to issue-motivated groups to cybercriminals, these technologies are enabling attacks that are more personalized, scalable, and harder to detect. The widespread availability of our personal data—from what we post on social media to the massive resale of information gathered by data brokers from both our devices and our online activity—has made open-source data the key ingredient for highly effective AI-driven deception and disruption and enabled the creation of deepfakes.Quick Hits:• NOAA - Hurricane Erin: When distant storms pose a danger to America's coastal communities• Exclusive: US warns hidden radios may be embedded in solar-powered highway infrastructure• 'Chilling reminder': Multiple historically Black universities under lockdown after receiving threats• 1 injured while U.S. Naval Academy building was cleared after reported threat• Police Swarm UMass Boston After Unconfirmed Shooting Report Sparks Campus Chaos• USCP Clears False Bomb Threat & Police clear possible bomb threat at DNC headquarters• A shooting at Denver-area high school leaves community shaken during third week of school• Man Pleads Guilty to Attempting to Use a Weapon of Mass Destruction and Attempting to Destroy an Energy Facility in Nashville• Out of the woodwork: Examining the global aspirations of The Base• The Online Radicalization of Youth Remains a Growing Problem Worldwide• CTC - The Global State of al-Qa`ida 24 Years After 9/11 • 18 Popular Code Packages Hacked, Rigged to Steal Crypto• Hackers Exploit JavaScript Accounts in Massive Crypto Attack Reportedly Affecting 1B+ Downloads• npm Supply chain Attack: Oops, No Victims: The Largest Supply Chain Attack Stole 5 Cents• Salesloft: March GitHub repo breach led to Salesforce data theft attacks• Ransomware Losses Climb as AI Pushes Phishing to New Heights• Stopping ransomware before it starts: Lessons from Cisco Talos Incident Response
SEND ME A TEXT MESSAGE NOWThe Monday Fallout starts this week off with Trump once again waving the banner of emergency. The word itself is supposed to create urgency, fear, action. But when it gets used over and over, what is left of its meaning?Next comes the battle over TikTok. On the surface it is framed as a matter of national security. Scratch a little deeper and the question becomes what the real truth is in this ongoing and delayed battle.TikTok is no longer just a distraction filled with dances and jokes. It has become a global chessboard where algorithms and ownership carry more weight than speeches. When deals are struck, the question is not who owns the app but who owns the influence.George Santos steps into the spotlight again, only this time the stage is a courtroom. A man who built his career on fabrications finds himself caught in a ruling that shines a light on truth, comedy, and consequence.The pattern is hard to ignore. Emergencies that blur into reruns. Security that may not be secure at all. A public figure who cannot outrun the punchline of his own story.These are not just headlines. They are signals of how power is used and how the narrative is managed. When the same storylines keep circling back, the repetition itself becomes part of the message.Questions remain. What happens when extraordinary powers start to feel routine. What happens when the justification of security sounds more like the language of profit. What happens when the performance finally crashes into accountability.This episode is not about settling those questions but raising them in full view. The answers are not packaged, the direction is not obvious, and that is what makes them worth asking.By the time it ends, the stories of Trump, TikTok, and Santos look less like separate headlines and more like pieces of the same larger play. The stage is crowded, the audience is restless, and the performance keeps repeating until someone decides to call it out.Would love to hear from you…WolfPackTalks@gmail.comAWorldGoneMadPodcast@gmail.com
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Web Searches For Archives Didier observed additional file types being searched for as attackers continue to focus on archive files as they spider web pages https://isc.sans.edu/diary/Web%20Searches%20For%20Archives/32282 FBI Flash Alert: Salesforce Attacks The FBI is alerting users of Salesforce of two different threat actors targeting Salesforce. There are no new vulnerabilities disclosed, but the initial access usually takes advantage of social engineering or leaked data from the Salesdrift compromise. https://www.ic3.gov/CSA/2025/250912.pdf VSCode Cursor Extensions Malware Koe Security unmasked details about a recent malicious cursor extension campaign they call White Cobra. https://www.koi.security/blog/whitecobra-vscode-cursor-extensions-malware BSides Augusta https://bsidesaugusta.org/
Show DescriptionDave's got a Whiskey related content warning, recent security vulnerabilities in NPM, challenges with password management, and the complexities of digital security. They delve into Google's antitrust issues and the dynamics of the browser market, before transitioning to innovations in CSS, including custom properties and functions. The conversation wraps up with thoughts on the future of CSS and web development. Listen on WebsiteLinks Whiskey Web and Whatnot: Web Development, Neat Storybook: Frontend workshop for UI development Largest NPM Compromise in History - Supply Chain Attack : r/programming We all dodged a bullet - Xe Iaso Post by @cabel.panic.com — Bluesky Special: One on One with a Hacker – ShopTalk 1Password Watchtower This 25-minute video is the most riveting sudoku puzzle you will ever watch | The Verge Many years on the job and I still don't get it. - daverupert.com if() - CSS | MDN CSS at-rule functions - CSS | MDN CSS color-scheme-dependent colors with light-dark() – Bram.us Matthias Ott
Conservative political activist, Charlie Kirk, has been assassinted in Utah and I was there and witnessed it first hand. After a 36 hour manhunt, Charlie's assassin has been caught by authorities. The Democrats are having a tough time dealing with the fact that they have to own this that there are many trying to go out of their way to prove that there assassin was a Republican. I will provide evidence on the show that proves that it is the Left rhtoric that led up to the shooting, despite what the Left claims. -Thank you for listening!-
Jason surprises his childhood friend, Alexis and Holly review "Treasure Island," Alexis's son wants security at his birthday, and a laughin' and leakin' moment in IndianaSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Free speech now comes with a body count. Kill Culture is here—and it's targeting people who speak out. The post From Cancel Culture to Kill Culture appeared first on Mind4Survival.
You CAN Add a (Good) CarPlay Screen to Older Cars The Great Podfeet Server Migration of 2025 Support the Show Security Bits — 14 September 2025 Transcript of NC_2025_09_14 Join the Conversation: allison@podfeet.com podfeet.com/slack Support the Show: Patreon Donation Apple Pay or Credit Card one-time donation PayPal one-time donation Podfeet Podcasts Mugs at Zazzle NosillaCast 20th Anniversary Shirts Referral Links: Setapp - 1 month free for you and me PETLIBRO - 30% off for you and me Parallels Toolbox - 3 months free for you and me Learn through MacSparky Field Guides - 15% off for you and me Backblaze - One free month for me and you Eufy - $40 for me if you spend $200. Sadly nothing in it for you. PIA VPN - One month added to Paid Accounts for both of us CleanShot X - Earns me $25%, sorry nothing in it for you but my gratitude
To wrap up this short series on things that went down while I was away, we'll be looking at some alarming developments in US security.Join the Patreon here: https://www.patreon.com/PeterZeihanFull Newsletter: https://mailchi.mp/zeihan/while-i-was-gone-part-4-us-security
Finding a job in today's economy can feel overwhelming, but you don't have to face it alone. With interest rates remaining high and the job market slowing, this is a strategic moment to refresh your job search. By combining diligence, adaptability, and prayerful preparation, you can approach this season with confidence rooted in God's wisdom.Proverbs 27:12 reminds us: “The prudent sees danger and hides himself, but the simple go on and suffer for it.” Preparation matters—not just in life but in your job search. With the right approach, you can steward your time, skills, and relationships wisely while trusting God to guide your steps.A great place to start is your resume. Applicant Tracking Systems (ATS) filter applications before a human ever reviews them, so tailoring your resume to each job description is essential. Use specific keywords, highlight measurable results, and connect your experience directly to the role. Think of it as stewardship—presenting your God-given abilities thoughtfully and effectively.Building Relationships That Open DoorsEven in a digital age, networking is still king. Studies show up to 85% of jobs are filled through referrals, and many roles are never posted publicly. Reconnect with colleagues, reach out to mentors, and don't overlook your church community. Genuine, relational conversations—built on curiosity rather than transaction—often lead to opportunities you couldn't find otherwise.Employers are also seeking adaptable learners. Developing skills in areas like AI, digital communication, or project management shows you're willing to grow. Affordable platforms like Coursera, edX, and Google Career Certificates make it easy to build new skills that employers value.Standing Out in a Digital WorldYour online presence is often the first impression an employer has. More than 70% of hiring managers review social media profiles, and nearly half say what they find influences their decision. Clean up questionable content, complete your LinkedIn profile, and stay active with thoughtful updates. Treat it as your digital business card—when you remain visible, opportunities are more likely to find you.Interviews have also shifted online. Prepare your space, dress professionally, and look into the camera to build connection. Small details—like lighting, posture, and a thank-you note afterward—leave a lasting impact.Trusting God in the ProcessA slowing job market can stir up fear, but Philippians 4:6–7 offers comfort: “Do not be anxious about anything, but in everything by prayer and supplication with thanksgiving let your requests be made known to God. And the peace of God, which surpasses all understanding, will guard your hearts and your minds in Christ Jesus.”Preparation and diligence matter, but so do prayer and trust. God orders your steps. Every interview, every connection, and every opportunity is part of His greater story for your life. Search faithfully, not fearfully, knowing He is your ultimate provider.On Today's Program, Rob Answers Listener Questions:What is the statute of limitations for a collection agency to pursue a debt I still owe?I'm thinking about applying for Social Security Disability because of a physical condition from my recent job. What are the advantages and disadvantages of doing that?I still owe $31,000 on my mortgage, but I've been paying an extra $2,000 each month. A friend told me I shouldn't rush to pay it off. What's your advice?I'm 70 years old and live in a busy part of Chicago. Due to my age and zip code, I'm being charged very high rates by insurance companies. Is that legal, and what can I do to get the best coverage for my money?Resources Mentioned:Faithful Steward: FaithFi's New Quarterly Magazine (Become a FaithFi Partner)Policygenius | NerdWallet | Insurify | The ZebraCoursera | edX | Google Career Certificates | LinkedIn LearningConsumer Financial Protection BureauWisdom Over Wealth: 12 Lessons from Ecclesiastes on MoneyLook At The Sparrows: A 21-Day Devotional on Financial Fear and AnxietyRich Toward God: A Study on the Parable of the Rich FoolFind a Certified Kingdom Advisor (CKA) or Certified Christian Financial Counselor (CertCFC)FaithFi App Remember, you can call in to ask your questions most days at (800) 525-7000. Faith & Finance is also available on the Moody Radio Network and American Family Radio. Visit our website at FaithFi.com where you can join the FaithFi Community and give as we expand our outreach.
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Faith Kent. Together, they delve into the critical role of effective communication, the art of role adaptation, and the psychological dynamics in crisis situations. The conversation highlights the importance of proactive preparedness and fostering trust within teams to tackle challenges with confidence. [Sept 15, 2025] 00:00 - Intro 00:42 - Faith Kent Intro 01:21 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 03:09 - Breaking & Entering 04:45 - Blending In 07:45 - Frank's Computer 10:13 - Unusual Communications 12:17 - Cochlear Implant 14:19 - Ethical Boundaries 16:11 - Community Pride 18:00 - Leaning Into the Discomfort 21:57 - Not an Afterthought 23:08 - Diversity for Security 27:00 – Trust, But Verify (Always) 28:23 - Wrap Up - Deaf Gain: Raising the Stakes for Human Diversity - https://gallaudet.edu/deaf-president-now/ - https://www.lifeprint.com/ 29:03 - Outro - www.social-engineer.com - www.innocentlivesfoundation.org
Since late August, the Trump administration has sent a flotilla of U.S. warships to the southern Caribbean, in the largest naval display in the region in decades. On September 2, a U.S. drone strike sank a small boat near the Venezuelan coast, killing as many as eleven civilians. Administration officials allege the vessel carried cocaine, but have presented no evidence. In this WOLA Podcast episode, Adam Isacson speaks with Laura Dib, Director for Venezuela, and John Walsh, Director for Drug Policy and the Andes, about the shockwaves from this escalation, both region-wide and especially in Venezuela. An Extreme New Military Stance: Seven warships and up to 7,000 personnel now patrol Caribbean waters near Venezuela. A lethal strike on September 2 marks, as Walsh calls it, “a radical departure” from decades of U.S. maritime drug-interdiction practice. Serious Legal and Human-Rights Implications: U.S. law authorizes interdiction of illegal drugs, not summary execution. “There's a word in English for an act like this,” Walsh warns. “That word is murder.” International law allows the use of force only in self-defense or with the approval of the UN Security Council—neither applies. U.S. law and policy, too, prohibit the use of lethal force on civilians without a self-defense justification. That is so even if those civilians are labeled “terrorists,” if there is no link to the September 11, 2001 attacks, and no explicit congressional authorization for the use of force. The Venezuela Context: After fraudulent July 2024 elections, Nicolás Maduro governs without legitimacy, with widespread persecution and what Dib calls “reasons to believe that crimes against humanity have been committed.” There is also a clear connection between large-scale corruption and the complex humanitarian emergency in which the country is immersed. Criminal economies flourish in a regime of state-embedded drug trafficking, but Venezuela is not the busiest route for U.S.-bound cocaine. The Reality of the U.S. Drug Overdose Crisis: The U.S. overdose emergency is driven by fentanyl and other opioids “that come almost entirely through Mexico,” Walsh notes, “with zero to do with anything in the Caribbean.” At least as of 2022, 80 percent of cocaine also transits the Pacific route via Central America and Mexico, not the Caribbean. U.S. Political Calculations: Trump administration officials boast of the strike and hint at more. They frame Venezuela as a “narco-terror” threat while simultaneously maintaining oil licenses, cooperating on deportations, and even meeting with Maduro earlier this year. Walsh warns the move feeds a domestic narrative of an “invasion” of migrants and organized crime groups to justify domestic use of emergency powers. Regional and Global Fallout: Some Latin American governments show “striking silence,” Dib observes, torn between defending sovereignty and condemning Maduro's abuses. The OAS and UN have issued only mild calls for de-escalation, reflecting both U.S. pressure and Venezuela's authoritarian reality. Both guests outline alternatives: Cut the Financial Lifelines: Dib calls for re-establishing the Justice Department's Kleptocracy Asset Recovery Initiative to seize billions in stolen Venezuelan assets. The U.S. government should coordinate more closely with Europe and Latin America to track the proceeds of corruption and undermine the economic pillar of support for authoritarian governments with connections to illicit economies. Support Civil Society and Rule of Law: It is urgent to restore programming previously administered by USAID that sustains independent journalism and human-rights groups now operating under threat, and to use universal-jurisdiction statutes to prosecute Venezuelan officials responsible for torture or other grave abuses. Address U.S. Drug Demand at Home: Expand and strengthen harm-reduction and treatment—naloxone distribution, methadone access—that have begun to lower overdose deaths. Reject the false promise of militarized interdiction that decades of evidence show to be ineffective and costly. As Isacson sums up, “From overdose prevention to supporting civil society in Venezuela to curbing illicit financial flows…the administration is taking key tools out of its toolbox” while swinging a military sledgehammer. Other resources from WOLA: September 8 - Q&A: Tension between Venezuela and the United States: between truth and theater September 3 - Lethal U.S. military strike on alleged drug traffickers sets a dangerous precedent in the “war on drugs” August 14 - One year since the presidential election of July 28, 2024: the Venezuelan crisis August 13 - Five Reasons Why Trump's Anti-Cartel Military Plan Will Fail
The winners are in from the biggest night in television. Security for the 2028 Olympics will be in the hands of the feds. Find out what that means for LA. Why you may be paying a lot more on your water bill. Plus, more.Support The L.A. Report by donating at LAist.com/join and by visiting https://laist.comVisit www.preppi.com/LAist to receive a FREE Preppi Emergency Kit (with any purchase over $100) and be prepared for the next wildfire, earthquake or emergency! Support the show: https://laist.com
Guest: Cy Khormaee, CEO, AegisAI Ryan Luo, CTO, AegisAI Topics: What is the state of email security in 2025? Why start an email security company now? Is it true that there are new and accelerating AI threats to email? It sounds cliche, but do you really have to use good AI to fight bad AI? What did you learn from your time fighting abuse at scale at Google that is helping you now How do you see the future of email security and what role will AI play? Resources: aegisai.ai EP40 2021: Phishing is Solved? EP41 Beyond Phishing: Email Security Isn't Solved EP28 Tales from the Trenches: Using AI for Gmail Security EP50 The Epic Battle: Machine Learning vs Millions of Malicious Documents
The assassination of Charlie Kirk marks more than a shocking act of political violence - it is a symptom of America's accelerating era of violent populism, and it will continue to escalate without intervention. That's according to Robert Pape, one of the world's foremost experts on political violence, terrorism, and national security and director of the Chicago Project on Security and Threats.Roland speaks to Pape about what next after Kirk's murder, the deeper forces driving America's unrest and what lessons other countries in the West should take from it. Plus, Venetia speaks to The Telegraph's Samaan Lateef about the historic protests in Nepal and how Gen Z demonstrators overturned a government by using new online technology such as Discord and Chat GPT.https://linktr.ee/BattleLinesContact us with feedback or ideas:battlelines@telegraph.co.uk@venetiarainey@RolandOliphant Hosted on Acast. See acast.com/privacy for more information.
Today's guest is Kyle Ryan, Senior Engineering Manager and Principal Engineer at Dune Security. Founded in 2023, Dune Security's User Adaptive Risk Management solution automatically prevents insider threats in real time. With 90% of breaches starting from human error, traditional phishing simulations and compliance training often fail to reduce real-world risk. Dune addresses this with a unified platform that continuously monitors behavior, tailors interventions and adapts protections around high-risk users.Kyle is highly skilled in AI & Machine Learning research and development, with a specialization in building secure, robust and scalable systems for cutting-edge cybersecurity solutions. He is currently developing advanced technologies to prevent AI-powered social engineering attacks and enable real-time, dynamic risk profiling of employees. Kyle believes that as threat actors evolve, organizations must adapt using data-driven methods to reduce the attack surface and strengthen defenses.In this episode, Kyle talks about:0:00 His journey from early chatbot work to founding engineer at Dune2:19 How Dune Security simulates advanced phishing attacks to train users4:45 How his role evolved from generalist to AI R&D8:17 Delivering authentic threat simulations and risk visibility for organizations11:20 Why future threats will be hyper-personalised, cross-channel and AI-driven14:58 His key advice to stay on AI's cutting edge and solve hard problemsTo find out more about all the great work happening at Dune Security, check out the website www.dune.security
In love he predestined us for adoption to himself as sons through Jesus Christ, according to the purpose of his will, to the praise of his glorious grace, with which he has blessed us in the Beloved. I. God the Father's loving predestination of his people. II. God the Father's loving adoption of his people. III. God the Father's loving grace to his people.
“XSponse is a full ecosystem built on a network-based system using PoE and BLE technology,” says Blake Albertsen, VP of Sales at XSponse, in an interview with Doug Green, Publisher of Technology Reseller News, during ScanSource Partner First. Albertsen highlighted XSponse's integrated security and communications platform, which combines wearable technology, wall-mounted devices, and advanced detection capabilities. The ecosystem is designed for deployment in schools, hospitals, corrections, hospitality, and casinos, offering both large-scale and small-footprint solutions. One key feature is XSponse's wearable badge technology, which provides immediate safety alerts. With a triple-button press, the badge triggers LED and vibration feedback, sends alerts through the network, and can even dispatch 911 calls to on-site security officers. The devices also support full audio intercom functions and include built-in cameras with electromagnetic shutters for privacy. XSponse extends beyond personal safety with unique environmental monitoring capabilities, including a vape detector that integrates into HVAC systems to identify vaping and other anomalies such as methane, carbon monoxide, and various toxins. Albertsen emphasized that the system is designed to integrate directly into existing security infrastructures, giving organizations a robust, scalable platform to enhance safety, communication, and real-time incident response. For more information, visit xsponse.com.
Please enjoy this encore of Career Notes. Advisory CISO at Cisco, Helen Patton, shares that a combination of dumb luck, hard work and serendipity that got her to where she is today. Growing up in the country in Australia, Helen notes that computers were not really a thing. She happened into technology after moving to the US, as she was the only person in her office under 40. Of course she would be comfortable with computers and able to handle a database conversion, right? That launched her into a career that spanned supporting small nonprofits, working at one of the biggest banks on Wall Street while leading a global team, being the CISO of a major university, and now Advisory CISO at Cisco. Helen recently wrote a book, "Navigating the Cybersecurity Career Path," to help others know when it's time to move on from one role to another role as part of desire to give back to the community. We thank Helen for sharing her story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices