Degree of resistance to, or protection from, harm
POPULARITY
Categories
The Patriotically Correct Radio Show with Stew Peters | #PCRadio
While Israel's Iron Dome crumbles under sustained Iranian barrages and Netanyahu brags about destroying Amalek worldwide, our treasonous “leaders” are prepping the draft to send your sons to die so Bibi can build his Third Temple empire on mountains of goyim corpses. Jeff Berwick blasts through to unmask the Zionist Satanic overlords behind Epstein's hits on Tzla inventors, phony Iran escalations, and chemtrail mass murder plots while burying plasma healing tech that's nuking vax injuries and arming us against their globalist nightmare.
The Patriotically Correct Radio Show with Stew Peters | #PCRadio
Stew rips the mask off Trump's Zionist puppet regime. Over the weekend, more American bodies piled up in Israel's endless Middle East war – a conflict Trump vows won't end until Netanyahu says so. Uncensored.AI founder J.D. Sharp joins Stew to expose how the Talmudic tribe controls churches, banks, Hollywood, media, and all mainstream AI to feed your sons into the war machine for their prophecy.
This conversation with William Deresiewicz, author of the bestselling Excellent Sheep, gets to the heart of a question so many families are quietly carrying: what does it actually mean for a child to flourish? Ginny and Bill talk about the way college admissions can cast a shadow backward over all of childhood, turning kids into performers instead of people, and why playtime, downtime, family time, books, boredom, risk, and real freedom are not extras but essentials. It's a deeply thoughtful episode about stepping off the treadmill, resisting fear-based parenting, and giving children the space to become fully themselves. Get your copy of Excellent Sheep here Learn more about Bill and all he has to offer here A huge thank you to our sponsors! Check them ALL out below: BetterHelp: Visit www.BetterHelp.com/1000HOURS today to get 10% off your first month. Quince - Visit www.quince.com/outside and get free shipping and 365 day returns Woom Bikes - Go to woom.com and use code OUTSIDE10 at checkout for 10% off your bike purchase KiwiCo- Get up to 50% off your first monthly crate at www.kiwico.com and use code 1000hours. Pocket Hose - text OUTSIDE to 64000 to.get a FREE, 360 degree rotating pocket pivot, AND a FREE thumb drive nozzle with purchase. IXL Learning - Head to www.ixl.com/1000hours to get an exclusive 20% savings on your membership Wayfair - Go to www.wayfair.com and shop all things home Cure Hydration- head to www.curehydration.com/outside to find a retailer near you Learn more about your ad choices. Visit megaphone.fm/adchoices
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Encrypted Client Hello: Ready for Prime Time? https://isc.sans.edu/diary/Encrypted%20Client%20Hello%3A%20Ready%20for%20Prime%20Time%3F/32778 The ExifTool vulnerability: how an image can infect macOS systems https://www.kaspersky.com/blog/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102/55362/ Remote code execution in Nextcloud Flow via vulnerable Windmill version https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g7vj-98x3-qvjf
Kyler Middleton, a software developer in the healthcare sector, builds and supports AI bots and AI agents that are now widely used inside the company where she works. Today on Packet Protector, Kyler stops by to talk about how and why she built these tools, how she (and her organization) address the risks these tools... Read more »
Kyler Middleton, a software developer in the healthcare sector, builds and supports AI bots and AI agents that are now widely used inside the company where she works. Today on Packet Protector, Kyler stops by to talk about how and why she built these tools, how she (and her organization) address the risks these tools... Read more »
A discussion of privacy, ethics, and technology was prompted after reports that Google recovered Nest camera footage believed to be deleted. Chuck Joiner, Marty Jencius, Jim Rea, Eric Bolden, Jeff Gamet, and Web Bixby review how cloud data is actually erased, the role of backups and mirrored servers, and the difficult balance between privacy promises and aiding law enforcement. The conversation expands into broader concerns about surveillance technology, online data permanence, and how companies should handle sensitive information in critical situations. This edition of MacVoices is sponsored by Squarespace. Go to Squarespace.com/macvoices and click "enter an offer code" under the pricing and put in the code "macvoices" to receive a 10% discount. Squarespace: Everything you need to create an exceptional website. Show Notes: Chapters: 00:00 Introduction to surveillance and AI topics00:24 Recovered Nest camera footage raises privacy questions01:08 How deleted video was reportedly recovered02:05 Ethical concerns about surveillance cameras02:22 Corporate dilemma: privacy vs public safety03:13 Questions about data retention policies04:25 How cloud storage distributes and retains data05:31 Monetization and retention of surveillance footage06:22 Guest departure and show housekeeping07:23 How “deleted” cloud data actually works08:36 Backups, mirrored servers, and forensic recovery09:59 Internal decision-making around recovered data11:08 Subscription models and video retention limits12:45 Law enforcement implications and future requests13:41 Encryption and control of stored video15:52 The permanence of data on the internet17:09 Lessons about sharing data online18:32 Sponsor message and website strategy discussion20:10 OpenClaw creator joins OpenAI21:10 Impact on the AI development race23:01 Limits and risks of current AI tools24:25 Security concerns with AI assistants25:44 The early stage of modern AI development27:14 Why OpenAI may be the safer home for the project28:52 AI interacting directly with operating systems30:05 The road toward intelligent digital assistants31:40 Closing reflections on technology ethics and change Links: Google recovers "deleted" Nest video in high-profile abduction casehttps://arstechnica.com/google/2026/02/google-recovers-deleted-nest-video-in-high-profile-abduction-case/ Peter Steinberger joins OpenAIhttps://thenextweb.com/news/peter-steinberger-joins-openai Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn, but prefers Bluesky. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Days before the United States dropped its first bombs on Iran, FBI Director Kash Patel fired members of a team that monitored threats from the Islamic Republic. The reason? They had investigated President Donald Trump's handling of classified documents.That move came amid a year of layoffs, budget cuts, resignations, and shifting priorities across America's national security agencies — including the FBI, the CIA, and the Department of Homeland Security.Now, as U.S. officials warn that Iran could retaliate with cyber attacks or terror attacks on U.S. soil, some experts are asking if the United States still has the capacity to defend itself.That's the question we try to answer in this edition of “If You Can Keep It,” our series exploring the biggest stories of the day and what they mean for our democracy.Find more of our programs online. Listen to 1A sponsor-free by signing up for 1A+ at plus.npr.org/the1a.To manage podcast ad preferences, review the links below:See pcm.adswizz.com for information about our collection and use of personal data for sponsorship and to manage your podcast sponsorship preferences.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.”See omnystudio.com/listener for privacy information.
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.”See omnystudio.com/listener for privacy information.
See omnystudio.com/listener for privacy information.
Plus: Archer Aviation sues rival Joby Aviation, alleging ties to Chinese suppliers. And Nasdaq partners with Kraken for around the clock tokenized stock trading. Julie Chang hosts. Learn more about your ad choices. Visit megaphone.fm/adchoices
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.”See omnystudio.com/listener for privacy information.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
YARA-X 1.14.0 Release https://isc.sans.edu/diary/YARA-X%201.14.0%20Release/32774 INTERPLAY BETWEEN IRANIAN TARGETING OF IP CAMERAS AND PHYSICAL WARFARE IN THE MIDDLE EAST https://research.checkpoint.com/2026/interplay-between-iranian-targeting-of-ip-cameras-and-physical-warfare-in-the-middle-east/ Announcing the Node.js LTS Upgrade and Modernization Program https://openjsf.org/blog/nodejs-lts-upgrade-program nginx UI Vulnerability https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-g9w5-qffc-6762
Learn how to prepare for the U.S.-Israel attack on Iran with actionable steps to stay informed, secure essentials, and build resilience. The post U.S.-Israel Strikes on Iran: How to Stay Prepared appeared first on Mind4Survival.
Crypto News: Crypto and Stocks dump as Oil prices spike. Expect market volatility. Trump's cyber strategy vows to 'support the security' of cryptocurrencies and blockchain.Brought to you by
Synopsis: What happens when the President threatens to invoke the Insurrection Act? Two leading voices weigh in on how Congress, veterans, and citizens can push back against rising militarization. This show is made possible by you! To become a sustaining member go to LauraFlanders.org/donate Description [original air-date November 2025]: The U.S. military is sworn to serve the Constitution, but that's getting complicated under Donald Trump. The President has deployed National Guard troops to half a dozen U.S. cities against the wishes of local officials and ICE agents are roaming around communities acting under unclear rules. Now the President is threatening to invoke the Insurrection Act. What difference would that make? Laura's guests are U.S. House Representative Pramila Jayapal and Marine veteran Janessa Goldbeck, who say it's time to reject authoritarianism and uphold the Constitution. Congresswoman Jayapal is the Ranking Member of the House Judiciary Subcommittee on Immigration Integrity, Security, and Enforcement and represents Washington State's 7th Congressional District. She has been at the forefront of congressional oversight and opposition to the Trump administration's immigration policies. Captain Goldbeck is CEO of Vet Voice, a national nonprofit that mobilizes veterans and military families to shape American democracy and defend the values they swore to protect. What can Congress, veterans and the general public do to stop the militarization of our cities? Join us for this powerful conversation, plus a commentary on the other times that the U.S. government has turned its military inward. Note: This conversation took place prior to the killings of Renee Good and Alex Pretti by ICE agents in MN] “What we're seeing now is the president attempting to reshape the U.S. military into a tool of his own domestic political control . . . And then to deploy uniformed service members and the National Guard across the country against the wishes of local elected leaders . . . I feel a lot of sadness and frustration on behalf of those who are serving in uniform today who are being put into this very partisan political position by the United States president.” - Janessa Goldbeck “What law enforcement should be doing — of any kind, whether it's ICE, National Guard, whoever — is trying to deescalate. What we clearly see this set of military actors doing is escalate, right? When you crack down brutally, when you shoot a rubber bullet at a faith leader in Chicago, or when you violently push someone down to the ground, who by the way happens to be the father of three U.S. Marines . . . I think that is really an attempt to suppress any kind of dissent.” - Rep. Pramila Jayapal Guests: • Captain Janessa Goldbeck: Marine Corps Veteran; CEO, Vet Voice Foundation • Congresswoman Pramila Jayapal: D-WA, 7th Congressional District Full Conversation Release: While our weekly shows are edited to time for broadcast on Public TV and community radio, we offer to our members and podcast subscribers the full uncut conversation. These audio exclusives are made possible thanks to our member supporters. Watch the special report on YouTube; PBS World Channel 11:30am ET Sundays, and on over 300 public stations across the country (check your listings, or search here via zipcode). Listen: Episodes air on community radio (check here to see if your station is airing the show) & as a podcast. RESOURCES: Related Laura Flanders Show Episodes: • Another January 6 Insurrection? 'War Game' Film Asks if We're Ready: Watch / Listen: Episode Cut and Full Uncut Conversation • Community Safety in a Time of Insurrection: Watch / Listen: Episode Cut • Inside the MAGA Movement: What Happens Now?: Watch / Listen: Episode Cut and Full Uncut Conversation Related Articles and Resources: • The Resistance Lab, grassroots trainings led by Pramila Jayapal and thought leaders from across the movement. • Pentagon orders states' national guards to form ‘quick reaction forces' for ‘crowd control' by Aaron Glantz, October 29, 2025, The Guardian • Congresswoman Pramila Jayapal at No Kings protest Seattle: ‘We are the people's movement that will save our democracy', October 18, 2025 - Watch - King5.com • Former Military Leaders Decry National Guard Deployment in Illinois, by Hannah Meisel, Capitol News Illinois, October 16, 2025, WTTW-PBS • Where has Trump suggested sending troops? In cities run by Democratic mayors, by Juliana Kim, October 16, 2025, NPR •. We Found That More Than 170 U.S. Citizens Have Been Held by Immigration Agents. They've Been Kicked, Dragged and Detained for Days. by Nicole Foy & photography by Sarahbeth Maney, October 16, 2025, ProPublica •. Trump open to invoking the Insurrection Act, by Irie Sentner, October 6, 2025, Politico • FAQ on Refusing Illegal Orders, by JMB, June 18, 2025, Military Law Task Force Full Episode Notes are located HERE. Music Credit: 'Thrum of Soil' by Bluedot Sessions, and original sound design by Jeannie Hopper Support Laura Flanders and Friends by becoming a member at https://www.patreon.com/c/lauraflandersandfriends Laura Flanders and Friends Crew: Laura Flanders-Executive Producer, Writer; Sabrina Artel-Supervising Producer; Jeremiah Cothren-Senior Producer; Veronica Delgado-Video Editor, Janet Hernandez-Communications Director; Jeannie Hopper-Audio Director, Podcast & Radio Producer, Audio Editor, Sound Design, Narrator; Sarah Miller-Development Director, Nat Needham-Editor, Graphic Design emeritus; David Neuman-Senior Video Editor, and Rory O'Conner-Senior Consulting Producer. FOLLOW Laura Flanders and FriendsInstagram: https://www.instagram.com/lauraflandersandfriends/Blueky: https://bsky.app/profile/lfandfriends.bsky.socialFacebook: https://www.facebook.com/LauraFlandersAndFriends/Tiktok: https://www.tiktok.com/@lauraflandersandfriendsYouTube: https://www.youtube.com/channel/UCFLRxVeYcB1H7DbuYZQG-lgLinkedin: https://www.linkedin.com/company/lauraflandersandfriendsPatreon: https://www.patreon.com/lauraflandersandfriendsACCESSIBILITY - The broadcast edition of this episode is available with closed captioned by clicking here for our YouTube Channel
Plus an update on the squatter remover that uses a samurai swordSee omnystudio.com/listener for privacy information.
From contested UK cooperation in the Iran conflict to explosive domestic terrorism and unresolved Epstein case mysteries, today's episode dissects the chaos at home and abroad. President Donald Trump navigates allies' delays, military strategy, and geopolitical risk, while law enforcement and media misreport ISIS-inspired attacks in New York City. Plus, shocking DOJ revelations from the Epstein case highlight systemic failure. Episode Summary The United States' Iran operation sparks global and domestic controversies. The UK initially refused U.S. requests to use military bases for attacks on Iran, creating a diplomatic firestorm. Prime Minister Keir Starmer faced heavy criticism from Tony Blair and British media, reportedly prioritizing political survival and immigrant voting blocs over allied cooperation. The HMS Dragon deployment and RAF response highlight logistical delays caused by strict labor rules, raising questions about NATO and allied reliability. On the ground, the U.S. and Israel maintain overwhelming air superiority against Iran. President Donald Trump praises the campaign's effectiveness, with thousands of Iranian military targets already struck and ground invasions deemed unnecessary. Energy markets spike, but experts assert the oil price increase is temporary. Domestically, New York City faced terror threats when self-radicalized ISIS supporters targeted protests near Gracie Mansion, using IEDs packed with the volatile “Mother of Satan” explosive. Misreporting by mainstream media initially mischaracterized the attackers and their motives, obscuring the severity of the incident. Legal and political commentary highlights the disconnect between narrative framing and reality. Meanwhile, new DOJ documents on the Jeffrey Epstein case reveal suspicious behavior and cash activity by prison staff before his death, raising further questions about accountability and transparency in federal institutions. Key Takeaways UK initially resisted U.S. requests to use military bases in Iran; Starmer faces criticism from Blair and the British media. HMS Dragon and RAF responses delayed due to labor regulations; NATO reliability questioned. U.S. and Israeli air forces dominate Iranian skies; ground invasion unnecessary. Oil prices spike temporarily; short-term disruptions tied to fear, not supply shortages. ISIS-inspired IED attacks in NYC misreported by media; attackers targeted ideological opponents. DOJ files on Epstein reveal suspicious cash deposits and questionable guard behavior, sparking renewed scrutiny. Topic Tags: Iran Conflict, Keir Starmer, Donald Trump, NATO, UK Military, ISIS, Gracie Mansion, Mother of Satan, Jeffrey Epstein, DOJ, FBI, U.S. Security, Oil Markets, Marco Rubio, Geopolitics, Domestic Terrorism
Interview with Anna Pham Breaking in with ClickFix: Anatomy of a modern endpoint attack Cybersecurity company Huntress just published a report on a new ClickFix variant they've discovered, which they've dubbed CrashFix. This technique was developed by KongTuke to serve as the primary lure within a new custom malicious browser extension also created by the group. In short, the team observed the threat actors using KongTuke's malicious browser extension to display a fake security warning, claiming the browser had “stopped abnormally” and prompting users to run a “scan” to remediate the threats. Upon “running the scan,” the user is presented with a fake “Security issues detected” alert and instructed to manually “fix” the issue by opening the Windows Run dialog, pasting from their clipboard, and pressing Enter. The malicious extension silently copies a PowerShell command to the clipboard, disguised as a legitimate repair command. From there, they execute the malicious command. Segment Resources: BLOG - Dissecting CrashFix: KongTuke's New Toy Interview with David Zendzian Continuous compliance and real security lifecycle management Supply chain attacks are not just on the rise; attackers are learning from the past, making these attacks even more effective and dangerous than before. It was just over a month ago when the Shai-Hulud attack first impacted NPM packages, forcing enterprises around the world into lockdown. While only 187 packages were compromised in that initial incident, it served as a wake-up call for many: an accurate inventory of systems is good, but a clear, real-time Software Bill of Materials (SBOM) for applications is non-negotiable. In this world of manifest based infrastructure and container based applications with (real) "devsecops", the dream of continuous upgrades of OS/Runtime/Stack/App and App Dependencies is very mature and there are solid examples of companies and federal entities managing this at scale without thousands of teams and people. Segment Resources: BLOG - Supply Chain Security: How accurate SBOMs can deliver proactive threat mitigation Interview with Jacob Horne CMMC Phase 1 Enforcement — What the November 10 Deadline Means for the Defense Supply Chain With the upcoming CMMC Phase 1 enforcement on November 10, cybersecurity teams across the defense and federal supply chain are facing new compliance requirements that directly affect contract eligibility and data-protection standards. Jacob Horne, Chief Cybersecurity Evangelist at Summit 7, can break down what this milestone means for enterprise security leaders, MSPs/MSSPs, and contractors preparing for audits. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-449
Table of Contents: STRATEGIC WARFARE PRAYER Previously Scott Johnson's Reports On Iran and Iran’s Supreme Devil Muslim Leader Ayatollah Ali Khamenei: End Time Current Events-1-6-20-Part 2–Table of Contents: Will Trump give neocons their war with Iran?–…Actual PROOF that your television news is all Propaganda–Iran: “Our Response Will Shock America to its core”–…U.S. Issues National Terrorism Advisory–Iran Has Hezbollah Sleeper Cells in the U.S. Ready to Strike–Major U.S. Cities Ramp up Security to Prepare For Potential Iran-Backed Attacks–Thousands chant ‘Death to America!' and hold signs vowing revenge at funeral of top Iranian general Qassem Soleimani after he was killed in US airstrike–First Time in Modern History: Mosques in Iran Raise Red Flag of Vengeance and War–Red flag raised at Mosque warning of severe battle to come…–Will punish Americans wherever they are–…CIVILIAN WAR PREPS RECOMMENDATIONS–…IF IRAN SITUATION BECOMES A GLOBAL WAR, THAT WOULD NOT BE GOOD FOR THE USA AT ALL. THE COUNTRY IS SO UNPREPARED SPIRITUALLY MENTALLY EMOTIONALLY AND PHYSICALLY–Islamic Groups ‘Thrilled' About US Governors Approving More Islamic Savage Refuges–WORLD WIDE RUSH PREPARING FOR THE BUILD UP FOR WORLD WAR 3-AND THE APPEARNCE OF THE ANTI-CHRIST MAN OF PEACE End Time Current Events: 3-29-15 — Part 3-Table of Contents: USA CAVES TO IRAN NUKE DEMANDS–Iran allowed to run nuke centrifuges at underground bunker…–KHAMENEI CALLS ‘DEATH TO AMERICA'–KERRY HAILS NUKE DEAL PROGESS–…Army issues troops safety instructions following Islamic State kill list threat–Announcement: USA Shelbyville Tennessee Terrorist Camps Positioned To Destroy Oak Ridge USA Nuclear Plants–DPS REPORT: Terrorists From ISIS and al-Shabab Apprehended in Texas: US Malls on Alert Following Threat–Tennessee terrorist camps well positioned to strike key cities End Time Current Events: 3-23-14 — Part 2-Table of Contents: …Leading Iranian Ayatollah: Mahdi (Islamic Messiah) Is Coming And He Has Plans To ‘Behead Western Leaders' End Time Current Events: 2-26-12–Part 1-Table of Contents: Iran has possessed nuclear warheads and that Western Intelligence has known of it for years–Ayatollah: Kill all Jews, annihilate Israel–Maitreya & the 12th Imam/ Imam Mahdi–Islam the Religion of Peace Teaches: Jews & Americans are enemies of Allah and humanity – Kill them Current: Iran’s Supreme Muslim Leader Ayatollah Ali Khamenei killed at 86 Iran’s Regime Executes 353 in One Month–February 2026; 2,600 Executions in the Past 11 Months!!–This unprecedented surge in executions demonstrates that the inhuman clerical regime cannot survive even for a single day without execution, imprisonment, and torture! Iran: Khamenei's New Record in Executions and Crimes–The number of executions in Iran in 2023 accounted for about 74% of all documented executions worldwide! USA – Israel & Iran War Top Headlines Read: USA burns through precision munitions, air defense interceptors…–Tehran shows off underground ‘Missile City’ of drones, rockets…THE COMING INVASION OF IRAN–LIST: All the countries now involved in conflict…–Global Leaders Brace for Fallout From Fast Metastasizing War…–Tehran's plan to turn Hormuz into death trap…–BOOTS ON THE GROUND–KURDS PREP FOR IRAN GROUND INVASION–AMERICANS STRANDED IN WARZONE–Iran’s new Ayatollah vows to ‘shed Trump’s blood’ in televised address…–Conflict spreads as drones hit Azerbaijan; Europeans send warships to Cyprus… IRAN THREAT TO NUKE TEL AVIV–RUSSIA ‘APOCALYPSE’ WARNING–MOSCOW PROVIDING INTEL TO TARGET US FORCES–LEAKED US INTEL WARNS OF IRAN DISASTER–DOUBTS IRAN REGIME WILL FALL CIA Analyst Larry Johnson Exposes Truth on Iran War US-Israeli attack on Iran expands into GLOBAL WAR: EU & UK join, Canada supports, Gulf regimes hit Trump Confirms US Went To War For Israel Previously: Here We Go! Trump’s Base Breaks Further As He Demands States Support Israel Or Risk Getting Disaster Relief! Scott Johnson's Previous Teachings: Emergency Freedom Alerts: 11-18-24-Part 2–Table of Contents:…Nov 12–Senate Republican Leader Mitch McConnell meets with newly elected GOP senators in his Capitol Hill office. These new senators are Israel-approved–AIPAC Tracker–Breaking–Donald Trump: “My first week back in the Oval Office, my administration will inform every college president that, if you do not end antisemitic propaganda, they will lose their accreditation and federal taxpayer support” I thought U.S had free speech? Emergency Freedom Alerts: 10-28-24-Part 1-Table of Contents:…Israeli Spy: Anyone Who Gets in Our way – even Politicians in the west . . . Will FALL”–The AIPAC PAC is a bipartisan, pro-Israel political action committee. It is the largest pro-Israel PAC in America and contributed more resources directly to candidates than any other PAC. 98% of AIPAC-backed candidates won their general election races in 2022–Every member of US Congress has an “AIPAC person” — a liaison between AIPAC and the politician–This “AIPAC baby sitter” tells the Congressman how to vote, what to tweet/say etc–This is just one way on how Israel controls America. Listener Comment: Does the Bible COMMAND Christians to blindly support the nation of ISRAEL?? What Does The Bible Say About The Jews (or any other race) Being Better Than Another? Is God done with the Jews? No, Not According to the Bible ‘End Times’: U.S. Troops Were Told the Iran War Is for Sparking “Armageddon” & the Return of Jesus Christ Trump’s commanders tell troops to prepare for Jesus’ return and issues a chilling Armageddon prophecy–US commanders tell troops Trump ‘anointed by Jesus’ to start Iran war sparking hundreds of complaints: I WONDER HOW MUCH INFLUENCE ‘SPIRITUAL ADVISOR’ PAULA WHITE CALLED ‘A PROPHET’ HAD ON TRUMP’S DECISION What do USA & Israel TRULY want in Iran? Total Control and Societal collapse PDF: Emergency Freedom Alerts 3-9-26 Click Here To Play The Part 1 Audio Source
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.”See omnystudio.com/listener for privacy information.
I'm starting these notes with a shout out to Joy for introducing me to today's guest - Mike Andrus. We had so much fun learning about his journey, his Security Company - Safe Day Services, and his style - Systems of Combative Arts. Often, when talking to Martial Artists, the subject of self-control comes up. Of course, we did an episode on that. In fact it was one of our first episodes. ! Here's a link:https://www.buzzsprout.com/477379/episodes/1815622Mr. Andrus and I both have Self-Defense books on Amazon. I've posted the link to my book a few times, Here is a link to his:https://www.amazon.com/Staying-Moment-practical-womens-sef-defense-ebook/dp/B00HQ35SZQ/ref=sr_1_2?crid=2IQIPCKWZAQVE&dib=eyJ2IjoiMSJ9.cNo2iLIv1j-Yom-9b-DngJeVfTNZPTjBkUL2g7ReROcM4Bsl5R7bPBeNsWNg0KGZWtM-KuwHPNOTUCLT10Vz5awSlkFex4J1oM-LzVJv6x1jqEXabeNxj0WXwa6Z2mja1DQRjJ3r4NKmu64DIS-Y_zf4l8-r4s5jS5VnP2uZIRk6U_0GZlRgYBTyLw05qRpkiJ5ppnmofug29XP6UQQ6Wx66nSYKMZ-DgIS2hWNp5JE.9r-Mge2cf6x9PojRTut5BRk6sISCAbvw_UiEi3OVQSM&dib_tag=se&keywords=Staying+in+the+Moment&qid=1772736409&s=books&sprefix=staying+in+the+moment%2Cstripbooks%2C178&sr=1-2I always appreciate you listening. Thank you. If you want to support us directly- click the link right here: Support the showThanks so much for listening and sharing the podcast with friends. Reach us all over the web. Facebook and twitter are simply wildcatdojo. However, insta is wildcatdojo conversations. (There's a story there.)On YouTube (where we are now airing some of our older episodes - complete with a slideshow that I tweak constantly) https://www.youtube.com/@wildcatdojo9869/podcastsAnd for our webpage, where you can also find all the episodes and see some info about the dojo: http://wildcatdojo.com/025-6/podcast.html . And of course, we love it when you support our sponsor Honor Athletics. Here is their link:https://honor-athletics.com/Thank you for listening.
Interview with Anna Pham Breaking in with ClickFix: Anatomy of a modern endpoint attack Cybersecurity company Huntress just published a report on a new ClickFix variant they've discovered, which they've dubbed CrashFix. This technique was developed by KongTuke to serve as the primary lure within a new custom malicious browser extension also created by the group. In short, the team observed the threat actors using KongTuke's malicious browser extension to display a fake security warning, claiming the browser had "stopped abnormally" and prompting users to run a "scan" to remediate the threats. Upon "running the scan," the user is presented with a fake "Security issues detected" alert and instructed to manually "fix" the issue by opening the Windows Run dialog, pasting from their clipboard, and pressing Enter. The malicious extension silently copies a PowerShell command to the clipboard, disguised as a legitimate repair command. From there, they execute the malicious command. Segment Resources: BLOG - Dissecting CrashFix: KongTuke's New Toy Interview with David Zendzian Continuous compliance and real security lifecycle management Supply chain attacks are not just on the rise; attackers are learning from the past, making these attacks even more effective and dangerous than before. It was just over a month ago when the Shai-Hulud attack first impacted NPM packages, forcing enterprises around the world into lockdown. While only 187 packages were compromised in that initial incident, it served as a wake-up call for many: an accurate inventory of systems is good, but a clear, real-time Software Bill of Materials (SBOM) for applications is non-negotiable. In this world of manifest based infrastructure and container based applications with (real) "devsecops", the dream of continuous upgrades of OS/Runtime/Stack/App and App Dependencies is very mature and there are solid examples of companies and federal entities managing this at scale without thousands of teams and people. Segment Resources: BLOG - Supply Chain Security: How accurate SBOMs can deliver proactive threat mitigation Interview with Jacob Horne CMMC Phase 1 Enforcement — What the November 10 Deadline Means for the Defense Supply Chain With the upcoming CMMC Phase 1 enforcement on November 10, cybersecurity teams across the defense and federal supply chain are facing new compliance requirements that directly affect contract eligibility and data-protection standards. Jacob Horne, Chief Cybersecurity Evangelist at Summit 7, can break down what this milestone means for enterprise security leaders, MSPs/MSSPs, and contractors preparing for audits. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-449
Interview with Anna Pham Breaking in with ClickFix: Anatomy of a modern endpoint attack Cybersecurity company Huntress just published a report on a new ClickFix variant they've discovered, which they've dubbed CrashFix. This technique was developed by KongTuke to serve as the primary lure within a new custom malicious browser extension also created by the group. In short, the team observed the threat actors using KongTuke's malicious browser extension to display a fake security warning, claiming the browser had "stopped abnormally" and prompting users to run a "scan" to remediate the threats. Upon "running the scan," the user is presented with a fake "Security issues detected" alert and instructed to manually "fix" the issue by opening the Windows Run dialog, pasting from their clipboard, and pressing Enter. The malicious extension silently copies a PowerShell command to the clipboard, disguised as a legitimate repair command. From there, they execute the malicious command. Segment Resources: BLOG - Dissecting CrashFix: KongTuke's New Toy Interview with David Zendzian Continuous compliance and real security lifecycle management Supply chain attacks are not just on the rise; attackers are learning from the past, making these attacks even more effective and dangerous than before. It was just over a month ago when the Shai-Hulud attack first impacted NPM packages, forcing enterprises around the world into lockdown. While only 187 packages were compromised in that initial incident, it served as a wake-up call for many: an accurate inventory of systems is good, but a clear, real-time Software Bill of Materials (SBOM) for applications is non-negotiable. In this world of manifest based infrastructure and container based applications with (real) "devsecops", the dream of continuous upgrades of OS/Runtime/Stack/App and App Dependencies is very mature and there are solid examples of companies and federal entities managing this at scale without thousands of teams and people. Segment Resources: BLOG - Supply Chain Security: How accurate SBOMs can deliver proactive threat mitigation Interview with Jacob Horne CMMC Phase 1 Enforcement — What the November 10 Deadline Means for the Defense Supply Chain With the upcoming CMMC Phase 1 enforcement on November 10, cybersecurity teams across the defense and federal supply chain are facing new compliance requirements that directly affect contract eligibility and data-protection standards. Jacob Horne, Chief Cybersecurity Evangelist at Summit 7, can break down what this milestone means for enterprise security leaders, MSPs/MSSPs, and contractors preparing for audits. Show Notes: https://securityweekly.com/esw-449
Interview with Anna Pham Breaking in with ClickFix: Anatomy of a modern endpoint attack Cybersecurity company Huntress just published a report on a new ClickFix variant they've discovered, which they've dubbed CrashFix. This technique was developed by KongTuke to serve as the primary lure within a new custom malicious browser extension also created by the group. In short, the team observed the threat actors using KongTuke's malicious browser extension to display a fake security warning, claiming the browser had "stopped abnormally" and prompting users to run a "scan" to remediate the threats. Upon "running the scan," the user is presented with a fake "Security issues detected" alert and instructed to manually "fix" the issue by opening the Windows Run dialog, pasting from their clipboard, and pressing Enter. The malicious extension silently copies a PowerShell command to the clipboard, disguised as a legitimate repair command. From there, they execute the malicious command. Segment Resources: BLOG - Dissecting CrashFix: KongTuke's New Toy Interview with David Zendzian Continuous compliance and real security lifecycle management Supply chain attacks are not just on the rise; attackers are learning from the past, making these attacks even more effective and dangerous than before. It was just over a month ago when the Shai-Hulud attack first impacted NPM packages, forcing enterprises around the world into lockdown. While only 187 packages were compromised in that initial incident, it served as a wake-up call for many: an accurate inventory of systems is good, but a clear, real-time Software Bill of Materials (SBOM) for applications is non-negotiable. In this world of manifest based infrastructure and container based applications with (real) "devsecops", the dream of continuous upgrades of OS/Runtime/Stack/App and App Dependencies is very mature and there are solid examples of companies and federal entities managing this at scale without thousands of teams and people. Segment Resources: BLOG - Supply Chain Security: How accurate SBOMs can deliver proactive threat mitigation Interview with Jacob Horne CMMC Phase 1 Enforcement — What the November 10 Deadline Means for the Defense Supply Chain With the upcoming CMMC Phase 1 enforcement on November 10, cybersecurity teams across the defense and federal supply chain are facing new compliance requirements that directly affect contract eligibility and data-protection standards. Jacob Horne, Chief Cybersecurity Evangelist at Summit 7, can break down what this milestone means for enterprise security leaders, MSPs/MSSPs, and contractors preparing for audits. Show Notes: https://securityweekly.com/esw-449
In this Sunday brunch edition of John Solomon Reports, we unpack the latest significant developments in global security, focusing on the recent gains against Iranian military threats and a high-profile conviction of an Iranian assassin linked to a plot against President Trump. John Solomon sets the stage for a discussion about the ongoing dangers in our world today.Kicking off the episode is Congressman Marlin Stutzman from Indiana, who shares his insights on national security and the implications of recent events regarding Iran. Following this, we welcome Texas State Representative Steve Toth, who made waves by defeating an incumbent in the Texas primaries. He provides a detailed account of his victory and the messages it sends to other incumbents.Next, we hear from Sean Carney, a prominent voice in the pro-life movement, as he addresses the tensions between the Trump administration and pro-life advocates concerning chemical abortions. His perspective sheds light on the ongoing debates within the movement.Finally, Patrick Hedger joins us to discuss financial responsibility.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Scott interviews author and scholar Robert Pape about the insights he's gained from his decades of extensive research into the strategic effectiveness of air power in war. Pape argues that, while modern precision bombs are remarkable at carrying out their tactical functions, they alone are not enough to win wars. And further, the obsession with tactical bombing campaigns can distract decisionmakers from the political dynamics that primarily determine how wars end. Discussed on the show: Bombing to Win: Air Power and Coercion in War by Robert A. Pape The Escalation Trap Robert A. Pape is Professor of Political Science and Director of the University of Chicago Project on Security and Threats and the author of Bombing to Win: Air Power and Coercion in War. Follow him on Twitter @ProfessorPape Audio cleaned up with the Podsworth app: https://podsworth.com Use code HORTON50 for 50% off your first order at Podsworth.com to clean up your voice recordings, sound like a pro, and also support the Scott Horton Show! For more on Scott's work: Check out The Libertarian Institute: https://www.libertarianinstitute.org Check out Scott's other show, Provoked, with Darryl Cooper https://youtube.com/@Provoked_Show Read Scott's books: Provoked: How Washington Started the New Cold War with Russia and the Catastrophe in Ukraine https://amzn.to/47jMtg7 (The audiobook of Provoked is being published in sections at https://scotthortonshow.com) Enough Already: Time to End the War on Terrorism: https://amzn.to/3tgMCdw Fool's Errand: Time to End the War in Afghanistan https://amzn.to/3HRufs0 Follow Scott on X @scotthortonshow And check out Scott's full interview archives: https://scotthorton.org/all-interviews This episode of the Scott Horton Show is sponsored by: Roberts and Roberts Brokerage Incorporated https://rrbi.co Moon Does Artisan Coffee https://scotthorton.org/coffee; Tom Woods' Liberty Classroom https://www.libertyclassroom.com/dap/a/?a=1616 and Dissident Media https://dissidentmedia.com You can also support Scott's work by making a one-time or recurring donation at https://scotthorton.org/donate/https://scotthortonshow.com or https://patreon.com/scotthortonshow Learn more about your ad choices. Visit megaphone.fm/adchoices
Download Audio. Scott interviews author and scholar Robert Pape about the insights he's gained from his decades of extensive research into the strategic effectiveness of air power in war. Pape argues that, while modern precision bombs are remarkable at carrying out their tactical functions, they alone are not enough to win wars. And further, the obsession with tactical bombing campaigns can distract decision-makers from the political dynamics that primarily determine how wars end. Discussed on the show: Bombing to Win: Air Power and Coercion in War by Robert A. Pape The Escalation Trap Robert A. Pape is Professor of Political Science and Director of the University of Chicago Project on Security and Threats and the author of Bombing to Win: Air Power and Coercion in War. Follow him on Twitter @ProfessorPape Audio cleaned up with the Podsworth app: https://podsworth.com Use code HORTON50 for 50% off your first order at Podsworth.com to clean up your voice recordings, sound like a pro, and also support the Scott Horton Show! For more on Scott’s work: Check out The Libertarian Institute: https://www.libertarianinstitute.org Check out Scott’s other show, Provoked, with Darryl Cooper https://youtube.com/@Provoked_Show Read Scott’s books: Provoked: How Washington Started the New Cold War with Russia and the Catastrophe in Ukraine https://amzn.to/47jMtg7 (The audiobook of Provoked is being published in sections at https://scotthortonshow.com) Enough Already: Time to End the War on Terrorism: https://amzn.to/3tgMCdw Fool's Errand: Time to End the War in Afghanistan https://amzn.to/3HRufs0 Follow Scott on X @scotthortonshow And check out Scott's full interview archives: https://scotthorton.org/all-interviews This episode of the Scott Horton Show is sponsored by: Roberts and Roberts Brokerage Incorporated https://rrbi.co Moon Does Artisan Coffee https://scotthorton.org/coffee; Tom Woods' Liberty Classroom https://www.libertyclassroom.com/dap/a/?a=1616 and Dissident Media https://dissidentmedia.com You can also support Scott's work by making a one-time or recurring donation at https://scotthorton.org/donate/https://scotthortonshow.com or https://patreon.com/scotthortonshow
Joining Brendan to discuss the Sunday papers are Ellen Coyne, Political Correspondent at the Irish Times; Gerard Howlin, former government adviser and Public Affairs Consultant; Susanne Rogers, from Social Justice Ireland; and Dan Mulhall, Former Irish Ambassador to Washington. Security analyst Declan Power joins by phone.
The international world order is being shaken up, and Europe's place at the new table is far from certain. Russia's war against Ukraine continues unabated. What security strategy should Europe pursue?Last year, the NATO allies agreed in The Hague to spend 3.5 percent of their GDP on direct defence expenditure. What does that mean in practice? Will Europe succeed in overcoming national interests, fragmented production, and slow coordination? Will Europe be able to defend Ukraine?Together with Justyna Gotkowska, Deputy Director and Head of the Security and Defence Department at the OSW Centre for Eastern Studies based in Warsaw, we examine Europe's security from the perspective of those closest to Russia's war and its long-term consequences and her four-point plan for Ukraine, which offers a potential European counterstrategy in response to Russian ‘peace' proposals. She is joined in conversation by Alex Krijger and Nikki Sterkenburg.Information wars: about this series With this three-part programme series, which is partially funded by a Public Diplomacy Grant from NATO, we want to provide in-depth analysis of current affairs and facilitate nuanced debate, thus making complex material accessible. Russian-Western relations are shaped by war, in the broadest sense of the word. What are the consequences of the hybrid forms of warfare? Such as cyber- and psychological warfare, and economic sanctions.In order to understand the current state of affairs, the Information Wars series will focus on the larger historical, societal and cultural context of the relations between Ukraine and NATO member states on the one hand, and Russia on the other hand.Programme editors: Ianthe Mosselman and Dirk StruikZie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.
The Patriotically Correct Radio Show with Stew Peters | #PCRadio
Donald Trump is a documented child-molesting pedophile puppet who's dragging America into an illegal slaughterhouse war for Israel while covering up his own Epstein crimes! The Goyim are awake, these kid-killing Zionist traitors are exposed, and it's time we take this country back before they turn every American into cannon fodder for Greater Israel! Ty Bollinger storms The Stew Peters Show with nukes on the Jewish-dominated censorship empire—deplatformed, demonetized, and targeted for blowing the lid off killer vaccines and Big Pharma's murder schemes.
SUPPORT THE CHANNEL:https://www.buymeacoffee.com/siliconcurtainhttps://www.patreon.com/siliconcurtainhttps://www.gofundme.com/f/scaling-up-campaign-to-fight-authoritarian-disinformation----------TRUSTED CHARITIES ON THE GROUND:Car4Ukrainehttps://car4ukraine.com/en-US/campaignsDzyga's Pawhttps://dzygaspaw.com/projectsSuperhumans - Hospital for war traumashttps://superhumans.com/en/UNBROKEN - Treatment. Prosthesis. Rehabilitation for Ukrainians in Ukrainehttps://unbroken.org.ua/Come Back Alivehttps://savelife.in.ua/en/Chefs For Ukraine - World Central Kitchenhttps://wck.org/relief/activation-chefs-for-ukraineUNITED24 - An initiative of President Zelenskyyhttps://u24.gov.ua/Serhiy Prytula Charity Foundationhttps://prytulafoundation.orgNGO “Herojam Slava”https://heroiamslava.org/----------PLATFORMS:Substack: https://substack.com/@siliconcurtainTwitter: https://twitter.com/CurtainSiliconLinkedin: https://www.linkedin.com/in/finkjonathan/Podcast: https://open.spotify.com/show/4thRZj6NO7y93zG11JMtqm----------
Microsoft's anti-"Microslop" censorship backfired spectacularly; Australia is cracking down on AI age verification while Meta is busy targeting toddlers; prediction markets are basically just insider trading with extra steps; AI chatbots are getting people killed and exposing spy operations; the Moon landing got pushed again; Opera got nostalgic at 30; Sony bought Charlie Brown; and Netflix is making documentaries with robot people now.Show notes at https://gog.show/736Watch on YouTube at https://youtu.be/6lw2Hy_U8QASponsors:DeleteMe - Get 20% off your DeleteMe plan when you go to JoinDeleteMe.com/GOG and use promo code GOG at checkout.Private Internet Access - Go to GOG.Show/vpn and sign up today. For a limited time only, you can get OUR favorite VPN for as little as $2.03 a month.SetApp - With a single monthly subscription you get 240+ apps for your Mac. Go to SetApp and get started today!!!1Password - Get a great deal on the only password manager recommended by Grumpy Old Geeks! gog.show/1passwordFOLLOW UPMicrosoft Bans the Word “Microslop” on Copilot Discord, Gets So Humiliated That It Locks Down the Whole ServerAustralia will consider requiring app stores to block AI services without age verificationA Day in the Life of an EnshittificatorIN THE NEWSMeta's what-if for tweensHow Meta Executives Talked About Child Safety Behind the ScenesThe Great Insider Trading Reckoning Reportedly Hits OpenAIKhamenei market meltdown on Kalshi shows how prediction markets still can't decide what ‘counts'Some Alleged Polymarket Insiders Made a Fortune on U.S. Strikes on IranPolymarket Decides Incentivizing a Nuclear Detonation Might Be a Bad IdeaA Chinese official's use of ChatGPT accidentally revealed a global intimidation operation‘Our Bond Is the Only Thing That's Real:' A New Lawsuit Alleges Google Gemini Drove a Man to SuicideThe Data Centers Have Arrived at the Edge of the Arctic CircleBig tech companies agree to not ruin your electric bill with AI data centersTerraPower gets OK to start construction of its first nuclear plantThe Supreme Court doesn't care if you want to copyright your AI-generated artAnthropic CEO Dario Amodei calls OpenAI's messaging around military deal 'straight up lies,' report saysThe $100 Billion OpenAI-Nvidia Deal Is Not HappeningNASA Announces Major Change to Plans For Putting Humans on The MoonThe US Senate empowers NASA to fully engage in lunar space raceAstronomers Estimated the Lifespan of Alien Civilizations, and It's Not Looking Good for UsMEDIA CANDYCharlie Brown now works for SonyThese AI Avatars in a Netflix True Crime Doc Are Disturbing ViewersNetflix buys Ben Affleck's AI film tech company, InterPositiveAPPS & DOODADSOpera Has Turned 30 and Is Celebrating With a Compelling Tribute to Web NostalgiaWeb Design MuseumMeta hit with a class action lawsuit over smart glasses' privacy claimsApple Macbook NeoAT THE LIBRARYUncommon People: Britpop and Beyond in 20 Songs by Miranda SawyerSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
The Patriotically Correct Radio Show with Stew Peters | #PCRadio
A United States Marine in dress blues had his arm deliberately snapped by Capitol Police and an AIPAC-bought Senator because he dared refuse to die for Israel's bloodlust. Peymon Mottahedeh joins to smash the biggest con job alive— there is NO constitutional requirement, NO statute, NOTHING forcing you to hand over your hard-earned cash to a government run by child-raping, blood-drinking Satanists who bomb kids abroad and poison you at home.
“The U.S. went to war in Iran because Iran made itself a Chinese weapon,” argues policy analyst Zineb Riboua, a research fellow at Hudson Institute's Center for Peace and Security in the Middle East.Riboua is the founder of the “China in MENA Project,” which tracks communist Chinese expansion and influence across the Middle East and North Africa (MENA).Is there a bigger dimension to the Iran war that people are missing?“We have this tendency to just look at the countries involved ... but there's a big player, and the big player here is China,” she says. “China has been investing immensely in the region in the last two decades, in courting, in coordinating, in cooperating with Gulf countries, with Iran itself, and also with its proxies.”And why, I ask her, has China been so keen on gaining strategic influence over the Middle East?It's because the Chinese Communist Party (CCP) understands that “China cannot rise without having the United States weakened in one of the most important regions in the world,” she said.“Iran has been that tool. China has built Iran's military arsenal. It has collaborated extensively with Iran's proxies, especially the Houthis.“And reversing that calculus is what Operation Epic Fury is doing.”In our interview, we delve deep into the symbiotic relationship between the two countries—why China needs Iran and why Iran needs China:Which role does Iran play on China's geopolitical chessboard?Why did China turn Iran into one of its strategic allies, and how did the Islamic Republic benefit?How dependent is the Iranian regime on China's military support and surveillance infrastructure?How dependent is China on Iran's oil?The goal of America's military operation, Riboua believes, is to dismantle the whole structure of the Islamic Republic. “The United States is destroying ... every single launcher, every single missile facility. Their whole Navy has been absolutely crushed. ... It's 2,000 targets so far, and they're hitting even more.”We also discuss what the Chinese regime will do if the Islamic Republic disappears.How will its geopolitical strategy be impacted? What will happen to the CCP's Belt and Road initiative, in which Iran played a central role? And how will China's economy and its relationships with its Middle Eastern and North African proxies be affected?Views expressed in this video are opinions of the host and the guest, and do not necessarily reflect the views of The Epoch Times.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Differentiating Between a Targeted Intrusion and an Automated Opportunistic Scanning [Guest Diary] https://isc.sans.edu/diary/Differentiating%20Between%20a%20Targeted%20Intrusion%20and%20an%20Automated%20Opportunistic%20Scanning%20%5BGuest%20Diary%5D/32768 CVE-2026-29000: Critical Authentication Bypass in pac4j-jwt - Using Only a Public Key (CVSS 10) https://www.codeant.ai/security-research/pac4j-jwt-authentication-bypass-public-key FreeScout Help Desk Vulnerability https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-mw88-x7j3-74vc Microsoft Authenticator Not Supported on Graphene OS https://www.heise.de/en/news/GrapheneOS-Microsoft-Authenticator-does-not-support-secure-Android-OS-11200495.html
Something strange has happened to relationship advice. People no longer approach love like explorers. They approach it like security guards. Scroll through the internet long enough and a pattern emerges. Every conversation about relationships now sounds like a warning label. Watch out for manipulators. Watch out for narcissists. Watch out for cheaters. Watch out for liars. Watch out for people who will use you, deceive you, drain you, betray you. And while some of those warnings carry truth, a deeper question hides underneath the noise. What happens to a relationship when the mind enters it already expecting danger? Tonight we examine a new cultural phenomenon quietly shaping how millions of people approach intimacy: the rise of what could be called the fear-based advice economy. Advice that teaches people how to detect betrayal faster than they learn how to understand themselves. Advice that sharpens suspicion but rarely strengthens reflection. Advice that trains people to analyze everyone else's motives while avoiding the uncomfortable question of how their own fears help create the emotional climate they complain about.
Security teams are under more pressure than ever, reacting at human speed while systems, identities, and AI agents operate at machine speed. In this episode of Security Matters, host David Puner sits down with cybersecurity leader and former FBI executive MK Palmore to explore why defenders struggle to keep pace and what it takes to regain control.From AI agents that overshare sensitive data to cloud misconfigurations that never seem to disappear to the persistent success of ransomware, MK explains how complexity, vendor sprawl, and overloaded teams create gaps that attackers continue to exploit. The conversation highlights how identity across human, machine, and emerging agent types has become the center of modern security and why fundamentals, prioritization, and platform thinking matter more than ever.Listeners will hear insight on: • Identity at machine speed and the rise of autonomous access • Why attackers still win more than 51 percent of the time • How ransomware continues to succeed despite industry progress • Why SMBs face “mission impossible” expectations • The true cost of vendor sprawl and operational overload • What effective security leadership looks like in the current threat environmentIf you work in identity, security operations, strategy, or leadership, this discussion cuts through hype and focuses on the realities defenders face and how to push back against the constant pressure of the tyranny of the now.
On this episode of Breaking Battlegrounds, hosts Sam Stone and Chuck Warren sit down with a wide-ranging lineup of guests to discuss global conflict, national security, state policy battles, and Arizona politics. Journalist Alessandra Hay, reporting from Armenia, joins the show to discuss her recent reporting on Iranian dissidents gathering in exile in Yerevan and the growing instability inside Iran. She shares stories from her article "The Iranian Exiles Bar Where Revolution Is Dreamed Up" and discusses the risks faced by those attempting to defect from the regime. Alessandra also examines how escalating tensions in Iran could affect Russia, Ukraine, and the broader geopolitical landscape. Find Alessandra's reporting at Iran War Dispatches: https://www.iranwar.news Next, Congressman Pat Harrigan (NC-10) joins the show to discuss national security concerns surrounding Russia and Iran, the political debate over war powers in Congress, and broader issues facing the American middle class and military leadership. Learn more about his work in Congress at: https://harrigan.house.gov/ Later, California State Senator Tony Strickland discusses the growing energy crisis in California caused by refinery closures and heavy regulations that could dramatically increase gas prices across the state. He also breaks down a major voter ID constitutional amendment effort that has already gathered more than 1.3 million signatures, as well as a recent Supreme Court decision reinforcing parental rights in education. Learn more: https://sr36.senate.ca.gov Voter ID Initiative: https://www.reformcalifornia.org/cavoterid/home Finally, Arizona businessman Elijah Norton, a candidate for Arizona State Treasurer, joins the podcast to discuss his campaign and his plan to bring fiscal discipline to government. Norton outlines proposals to root out waste, protect Arizona investments, expand school choice, and serve as a financial watchdog for taxpayers. Get involved with his campaign at: https://nortonforaz.com Don't forget to subscribe to Breaking Battlegrounds for weekly conversations on politics, policy, and the issues shaping America.
The Patriotically Correct Radio Show with Stew Peters | #PCRadio
America's Zionist-occupied government is sending our brave soldiers to die in the Middle East, all to fulfill ancient Jewish prophecies and expand Israel's demonic empire from the Nile to the Euphrates. Max Igan testifies live that the Tzla machine is shredding pain, numbness and devastating injuries overnight, from myocarditis vanishing after weeks of use to a kid's eye healing in three 10-minute sessions with photographic evidence. Explosive exposé with JD Sharp: How Zionist-controlled Trump is draining American blood and billions in an illegal Iran war, not for US security, but to fulfill the Jewish supremacists' Greater Israel fantasy from the Nile to Euphrates.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Want More XWorm? https://isc.sans.edu/diary/Want%20More%20XWorm%3F/32766 Cisco Secure Firewall Management Center Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-onprem-fmc-authbypass-5JPp45V2 LastPass Phishing https://www.securityweek.com/lastpass-users-targeted-with-backup-themed-phishing-emails/
Israel has launched a new wave of intense airstrikes on Iran and Hezbollah targets in Lebanon. Israeli forces say they targeted key infrastructure linked to the Iranian government, including a missile launcher in Qom and an air defense system in Isfahan. The IDF is also heavily targeting the Islamic Revolutionary Guard Corps (IRGC) and the Basij militia, Iran's volunteer paramilitary force, who were both behind the violent, bloody crackdown on protesters in January. FOX's Jonathan Savage speaks with Trey Yingst, chief foreign correspondent for the FOX News Channel, reporting from Tel Aviv, Israel, who says operations to destroy Iranian missile capabilities are a major focus now. Click Here To Follow 'The FOX News Rundown: Evening Edition' Learn more about your ad choices. Visit podcastchoices.com/adchoices
Want help uncovering the real reasons behind your urges and build a plan to overcome your pornography use? Click here to book a free call with Sam to get help to overcome pornography – https://stopporn.info/ Have questions you want me to address on future podcast episodes? Email me here: sam@healingcouples.org Episode show notes: Why does she keep getting triggered in public — even when he's doing everything “right”? In this episode, we unpack one of the most frustrating parts of porn addiction recovery: why in-the-moment coping tools don't actually fix a trigger problem. If you're a husband working to overcome porn addiction and public outings still feel tense… If you're a wife navigating betrayal trauma and getting triggered in grocery stores, parking lots, or restaurants… If you're both exhausted by the same argument happening again and again… This conversation will reframe everything. Most pornography addiction recovery advice focuses on managing the moment — breathing techniques, eye-boundary strategies, signal words, or leaving early. But those tools only treat symptoms. They don't address the deeper fear underneath the trigger: Has he actually changed — or is he just managing it better? That question cannot be answered in a parking lot. In this episode, you'll learn: Why triggers persist after porn addiction disclosure What's happening in a wife's nervous system after betrayal trauma The difference between behavior management and true heart change How to communicate internal transformation in porn addiction recovery Why “I'm trying harder” doesn't rebuild trust How to reduce triggers proactively — before you ever leave the house Porn addiction recovery isn't just about quitting pornography. It's about becoming someone different internally — and communicating that shift in a way your spouse can actually feel. Security isn't built in the moment. It's built outside of it. If you're serious about overcoming porn addiction, healing betrayal trauma, and rebuilding trust in your marriage, this episode is essential listening.
Steve Gibson and Leo Laporte host a special episode of Security Now live from ThreatLocker's Zero Trust World 2026 in Orlando, Florida. The final frontier of security is internal. Today, we have the tools, techniques and technologies to thwart attacks originating from outside our perimeter. We're now good at protecting our borders. But major high profile breaches occurring over the past several years have revealed that insufficient attention has been given to the security of our internal systems and networks. Today's greatest security weaknesses result from decades of system design, deployment and policy that have placed far too much trust on the conduct of those on the inside, behind our borders. Whether deliberate, inadvertent, or externally penetrating, the greatest challenge we now face is that of designing and deploying our internal security with strict adherence to the principles of least privilege and zero trust. Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsor: threatlocker.com/twit
Ready for an iPhone security audit? This episode is your personal walkthrough to reclaiming control, explaining not just what each privacy setting does but why changing them actually matters. Discover how hidden iOS settings let you outsmart sneaky trackers that follow you across apps, home networks, and even your own calendar. App permissions: location, tracking, calendars, contacts, health, photos Restricting calendar and photo access for better privacy App access to files, folders, focus modes, and health data Managing smart home and Apple Music permissions Third-party browser passkeys and selective photo sharing Apps controlling reminders and using Apple Wallet features Peripheral and Bluetooth permissions to limit device profiling Camera, microphone, and local network access by apps Motion, fitness, and nearby device tracking permissions Research and sensor data sharing for studies and health Speech recognition and journaling suggestions using device activity Viewing and managing blocked contacts and sharing via Safety Check Safety Check's emergency resets and granular access control Sensitive content warnings for nudity in photos or videos Sharing analytics with Apple and app developers (opt-in controls) Reviewing app transparency logs and network activity reports Accessory connection permissions and security update automation Stolen Device Protection and Lockdown Mode explained Host: Mikah Sargent Download or subscribe to Hands-On Apple at https://twit.tv/shows/hands-on-apple Want access to the ad-free audio and video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord. Sponsor: joindeleteme.com/twit promo code TWIT
My conversation with Thanassis starts at about 45 minutes in to today's show after headlines and clips Join us in Vegas for Podjam 3! Subscribe and Watch Interviews LIVE : On YOUTUBE.com/StandUpWithPete ON SubstackStandUpWithPete Stand Up is a daily podcast. I book,host,edit, post and promote new episodes with brilliant guests every day. This show is Ad free and fully supported by listeners like you! Please subscribe now for as little as 5$ and gain access to a community of over 750 awesome, curious, kind, funny, brilliant, generous souls Thanassis Cambanis is an author, journalist, and director of Century International. His work focuses on U.S. foreign policy, Arab politics, and social movements in the Middle East. He is currently working on a book about the impact of the 2003 Iraq invasion on the international system. He is the author of Once Upon A Revolution: An Egyptian Story (Simon and Schuster: 2015); A Privilege to Die: Inside Hezbollah's Legions and Their Endless War Against Israel (Free Press: 2010); and editor of Hybrid Actors: Armed Groups and State Fragmentation in the Middle East (TCF press: 2019), Citizenship and Its Discontents: The Struggle for Rights, Inclusion and Pluralism in the Middle East (TCF press: 2019), Order from Ashes: New Foundations for Security in the Middle East (TCF press: 2018), and Arab Politics Beyond The Uprisings: Experiments in an Era of Resurgent Authoritarianism (TCF press: 2017). He regularly contributes to Foreign Affairs, The New York Times, World Policy Review, and other publications. He is an adjunct professor at Columbia University's School of International and Public Affairs. On YOUTUBE.com/StandUpWithPete ON SubstackStandUpWithPete Listen rate and review on Apple Podcasts Listen rate and review on Spotify Pete On Instagram Pete on Blue Sky Pete on Threads Pete on Tik Tok Pete on Twitter Pete Personal FB page Stand Up with Pete FB page
This week, Jake and Bob celebrate the 150th episode of Restore the Glory! They take a moment to reflect on the story of how the podcast came to be, new insights learned, and their hopes for the future. This episode is a candid, behind-the-scenes look at what God has done in not only their lives but also the lives of listeners. Key Points: Jake and Bob express deep gratitude for God's evident presence and blessing throughout the life of the podcast. They share powerful testimonies from listeners, including marriages restored and lives changed through the podcast. The podcast has surpassed three million downloads, with many episodes reaching tens of thousands of listeners. The two most popular series are Anatomy of a Wound and Security, Maturity, and Purity A surprising "puzzle" they discuss is how some of their favorite episodes initially received fewer downloads than expected. Jake and Bob explain that their intention in difficult topics is always faithful dialogue rooted in Church teaching and charity. They also desire to remain docile to the Holy Spirit, committed to offering conversations that glorify God and foster authentic healing in the Church. Resources: Virginia Satir Daily Temperature Reading Appreciation New Information A Puzzle A Complaint/Concern Hopes and Dreams Anatomy of a Wound Series Security, Maturity, Purity Series The Life of Peter Series Chapters: 00:00 Introduction 03:15 Appreciation for the Podcast 10:04 New Information (Statistics!) 19:31 Puzzles We are Working Through 26:46 Complaints or Concerns About the Podcast 36:44 Our Hopes and Dreams for the Future Connect with Restore the Glory: Instagram: @restoretheglorypodcast Twitter: @RestoreGloryPod Facebook: Restore the Glory Podcast Never miss out on an episode by hitting the subscribe button right now! Help other people find the show and grow in holiness by sharing this podcast with them individually or on your social media. Thanks!
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Bruteforce Scans for CrushFTP https://isc.sans.edu/diary/Bruteforce%20Scans%20for%20CrushFTP%20/32762 Android March 2026 Patches, including 0-Day (CVE-2026-21385) https://source.android.com/docs/security/bulletin/2026/2026-03-01 OAuth redirection abuse enables phishing and malware delivery https://www.microsoft.com/en-us/security/blog/2026/03/02/oauth-redirection-abuse-enables-phishing-malware-delivery/