Degree of resistance to, or protection from, harm
POPULARITY
Categories
In This Hour:-- Yet another person attempts to assassinate President Trump. He was shot and killed, but there are lessons for anyone dedicated to personal protection.-- Noted security expert Wayne Black talks about "prefense" as well as the need to carry lights so you can identify threats and, if needed, shoot in the dark.-- What can we learn from the Nancy Guthrie case?Gun Talk 02.22.26 Hour 2Become a supporter of this podcast: https://www.spreaker.com/podcast/gun-talk--6185159/support.
OpenClaw is a self-hosted AI agent daemon that executes autonomous tasks through messaging apps like WhatsApp and Telegram using persistent memory. It integrates with Claude Code to enable software development and administrative automation directly from mobile devices. Links Notes and resources at ocdevel.com/mlg/mla-29 Try a walking desk - stay healthy & sharp while you learn & code Generate a podcast - use my voice to listen to any AI generated content you want OpenClaw is a self-hosted AI agent daemon (Node.js, port 18789) that executes autonomous tasks via messaging apps like WhatsApp or Telegram. Developed by Peter Steinberger in November 2025, the project reached 196,000 GitHub stars in three months. Architecture and Persistent Memory Operational Loop: Gateway receives message, loads SOUL.md (personality), USER.md (user context), and MEMORY.md (persistent history), calls LLM for tool execution, streams response, and logs data. Memory System: Compounds context over months. Users should prompt the agent to remember specific preferences to update MEMORY.md. Heartbeats: Proactive cron-style triggers for automated actions, such as 6:30 AM briefings or inbox triage. Skills: 5,705+ community plugins via ClawHub. The agent can author its own skills by reading API documentation and writing TypeScript scripts. Claude Code Integration Mobile to Deploy Workflow: The claude-code-skill bridge provides OpenClaw access to Bash, Read, Edit, and Git tools via Telegram. Agent Teams: claude-team manages multiple workers in isolated git worktrees to perform parallel refactors or issue resolution. Interoperability: Use mcporter to share MCP servers between Claude Code and OpenClaw. Industry Comparisons vs n8n: Use n8n for deterministic, zero-variance pipelines. Use OpenClaw for reasoning and ambiguous natural language tasks. vs Claude Cowork: Cowork is a sandboxed, desktop-only proprietary app. OpenClaw is an open-source, mobile-first, 24/7 daemon with full system access. Professional Applications Therapy: Voice to SOAP note transcription. PHI requires local Ollama models due to a lack of encryption at rest in OpenClaw. Marketing: claw-ads for multi-platform ad management, Mixpost for scheduling, and SearXNG for search. Finance: Receipt OCR and Google Drive filing. Requires human review to mitigate non-deterministic LLM errors. Real Estate: Proactive transaction deadline monitoring and memory-driven buyer matching. Security and Operations Hardening: Bind to localhost, set auth tokens, and use Tailscale for remote access. Default settings are unsafe, exposing over 135,000 instances. Injection Defense: Add instructions to SOUL.md to treat external emails and web pages as hostile. Costs: Software is MIT-licensed. API costs are paid per-token or bundled via a Claude subscription key. Onboarding: Run the BOOTSTRAP.md flow immediately after installation to define agent personality before requesting tasks.
The Patriotically Correct Radio Show with Stew Peters | #PCRadio
Frankie Stockes fills in for Stew Peters to cover the latest on the pending war with Iran, the Epstein File cover-up, FAKE alien hysteria, and the ongoing GENOCIDE of the American People Take a sneak peek at the TZLA event with Jeff Berwick and hear from the life-changing testimonies of users. This is what they stole from Nikola Tesla. This is the cure they suppress.
Corey's Army: Corey rants on Twitter about ya boys after someone allegedly did something at a screening in Rochester. Someone calls in to claim they did it.Phil Shapiro: We get direct response from Phil Shapiro regarding Corey calling him a rat and HDM calling him an abuser.22 Oath: It's time for Marcie to pay up and take the Oath of 22! This is about community, this is a way of life.Stalkers and Clapbacks: Marcie breaks down her Internet stalker and claps back at Youtube commenters.MAGIC CASTLE!, COREY FELDMAN!, PHIL SHAPIRO!, BIGGEST RAT!, GOBLIN GHOUL!, MINIONS!, FART GUN!, TWITTER!, EPSTEIN!, ARMY!, LAST STRAW!, TELL YOUR STORY!, SKEPTICAL!, GOONIES!, KERRI GREEN!, VIP!, MEET AND GREET!, FRIENDSHIP ARC!, KICKED OUT!, SECURITY!, ICLOUD!, BACKUP!, FOOTAGE!, DELETED!, BRAIN SURGERY!, COREY FELDMAN VS THE WORLD 1.5!, FILMMAKER!, ARTIST!, REACTION!, EDITED BY JIM!, SYMPATHETIC CHARACTER!, FUNNY GUYS!, 22 OATH!, COMMUNITY!, BIRD ON A WALL!, STALKERS!, MATT KENNEDY!, COREY'S TEAM!, CONFIRMED!, TROLL!, SPAMMING!, PR PERSON!, GOOFY GUYS!, CALLERS!, FOOTAGE!, AUDIENCE QUESTIONS!, HEART ON OUR SLEEVES!, MY TRUTH DOCUMENTARY!, PROVIDED FOOTAGE!, ANTHONY CUMIA!, YOUTUBE COMMENTERS!, HATERS!, DISTRIBUTION!, PLATFORMS!, NETFLIX!, INTERNATIONAL!, HALLE BARRY KEOGHAN!, MARCIE CLAPBACKS!, TREVOR!, HARMONY!, JOKER!, BONFIRE!, BOBBY KELLY!, CRITIQUES! You can find the videos from this episode at our Discord RIGHT HERE!
If you thought the internet was a dumpster fire before, the EU LAUNCHES SECOND INVESTIGATION INTO GROK because Musk's bot won't stop generating nonconsensual imagery. Meanwhile, META LARGELY FAILS TO PROTECT KIDS FROM AI CHATBOTS, proving that their internal safety checks are about as effective as a screen door on a submarine. If that doesn't creep you out, AFTER RING PRIVACY BACKLASH over police partnerships, a LEAKED EMAIL SUGGESTS RING PLANS TO EXPAND ‘SEARCH PARTY' from finding lost dogs to total neighborhood surveillance. Of course, REDDIT, META, AND GOOGLE VOLUNTARILY GAVE DHS INFO on users critical of ICE, because why stand up for privacy when you can just comply?In the news, we look at OPENCLAW, OPENAI AND THE FUTURE as the project's founder joins the Borg, even though META AND OTHER TECH FIRMS PUT RESTRICTIONS ON USE OF OPENCLAW because it's basically a security hole that can click your mouse for you. Peak stupidity has arrived with RFK JR'S NEW CHATBOT giving rectal dietary advice, while AI COMPANIES BOUGHT OUT ALL OF WESTERN DIGITAL'S HARD DRIVES through 2026, meaning you can't have storage because the bots need it more. Even VALVE ADMITS STEAM DECK AVAILABILITY IS AFFECTED by this memory hoarding. We also touch on STEVE BANNON SUED OVER MAGA CRYPTO SCHEME, LOS ANGELES COUNTY FILES LAWSUIT AGAINST ROBLOX for being a safety nightmare, and the fact that TESLA ROBOTAXIS REPORTEDLY CRASHING at four times the human rate. TESLA DODGES 30-DAY SUSPENSION by simply killing the word "Autopilot," while NEW YORK HITS THE BRAKES ON ROBOTAXI EXPANSION to keep the chaos at bay. Finally, POLYMARKET WITHDRAWS EXPLOSIVE ARTEMIS BETTING MARKET because betting on dead astronauts is too much even for them, leading the ETHEREUM CREATOR STARTING TO THINK THIS WHOLE PREDICTION MARKET THING MIGHT BE GAMBLING. As NEVADA SUES KALSHI and Jack Dorsey oversees INSIDE THE ROLLING LAYOFFS AT JACK DORSEY'S BLOCK—using AI to summarize the misery of his employees—just remember: YOU'LL BE SORRY WHEN YOU HEAR WHAT JUSTIN BIEBER'S $1.3 MILLION BORED APE IS WORTH NOW. Hint: it's twelve grand.In this week's MEDIA CANDY, we've got FREE BERT, KAT WILLIAMS: THE LAST REPORT, and the eternal return of SHREK. We're checking out MARK ROBER on Netflix, the return of MONARCH: LEGACY OF MONSTERS, and the trailer for GOOD LUCK, HAVE FUN, DON'T DIE. If you need a soundtrack for the apocalypse, Thomas Benjamin Wild Esq has you covered with STOP USING GENERATIVE A.I and the Gen-X anthem I'VE NO MORE F*S TO GIVE!.Moving to APPS & DOODADS, OBSIDIAN TO NOTES is a $14 well spent, unlike CURSOR and VISUAL STUDIO CODE which are getting bogged down by slow models. APPLE'S AI PENDANT sounds like a watered-down Humane pin that relies on your phone to think, and APPLE PODCASTS AND VIDEO remains a pipe dream because bandwidth costs money. We've reached the point where THERE'S A GRIM NEW EXPRESSION: “AI;DR” for things not worth reading, and THERE'S A NEW TERM FOR WORKERS FREAKING OUT over being replaced—AIRD, or AI Replacement Dysfunction—which is basically the low-grade panic of being made obsolete by a machine that thinks bananas go in your bum.AT THE LIBRARY, we're thumbing through CLEAVE THE SPARROW, THE REGICIDE REPORT by Charles Stross, and Robin Ince being NORMALLY WEIRD AND WEIRDLY NORMAL.Then we descend into THE DARK SIDE WITH DAVE, where the Muppets are taking over with THE MUPPET SHOW and MUPPETS NOW. We catch the latest on THE MANDALORIAN AND GROGU and TOY STORY 5, while tracking the PENTAGON PIZZA INDEX to see if war is breaking out. For the kids, we look at a 3D PRINTER / ENTRY LEVEL FOR KIDS like the Bambu Lab A1, and for the nerds, A STAR WARS-CENTRIC RSS FEED and a NEAT IDEA FOR AN RSS READER, “CURRENT,” which lets news drift away like water under a bridge. We wrap it all up with some HORROR IN UNDER TWO MINUTES and IMPECCABLE COVERS OF 80S SYNTH MUSIC, because at least the 80s had better soundtracks than this AI-generated nightmare.Sponsors:DeleteMe - Get 20% off your DeleteMe plan when you go to JoinDeleteMe.com/GOG and use promo code GOG at checkout.SquareSpace - go to squarespace.com/GRUMPY for a free trial. And when you're ready to launch, use code GRUMPY to save 10% off your first purchase of a website or domain.Private Internet Access - Go to GOG.Show/vpn and sign up today. For a limited time only, you can get OUR favorite VPN for as little as $2.03 a month.SetApp - With a single monthly subscription you get 240+ apps for your Mac. Go to SetApp and get started today!!!1Password - Get a great deal on the only password manager recommended by Grumpy Old Geeks! gog.show/1passwordShow notes at https://gog.show/734FOLLOW UPEU launches second investigation into Grok's nonconsensual image generationMeta largely fails to protect kids from AI chatbots, per its own testsAfter Ring privacy backlash, company abandons plans for police partnershipLeaked Email Suggests Ring Plans to Expand ‘Search Party' Surveillance Beyond DogsReddit, Meta, and Google Voluntarily Gave DHS Info of Anti-ICE Users, Report SaysIN THE NEWSOpenClaw, OpenAI and the futureMeta and Other Tech Firms Put Restrictions on Use of OpenClaw Over Security FearsRFK Jr's new chatbot advises the public on 'best foods to insert into rectum'AI Companies Bought Out All of Western Digital's Hard Drives for 2026 AlreadyValve admits Steam Deck availability is affected by memory and storage shortagesSteve Bannon sued over MAGA crypto schemeLos Angeles County files lawsuit against Roblox over child protectionsTesla Robotaxis Reportedly Crashing at a Rate That's 4x Higher Than HumansTesla dodges 30-day suspension in California after removing AutopilotNew York hits the brakes on robotaxi expansion planPolymarket withdraws explosive Artemis betting market after backlashEthereum Creator Starting to Think This Whole Prediction Market Thing Might be GamblingNevada sues Kalshi for operating a sports gambling market without a licenseInside the Rolling Layoffs at Jack Dorsey's BlockYou'll Be Sorry When You Hear What Justin Bieber's $1.3 Million Bored Ape Is Worth NowMEDIA CANDYFree BertKat Williams: The Last ReportShrekMark RoberMonarch: Legacy of MonstersGOOD LUCK, HAVE FUN, DON'T DIE | Official Trailer | February 13 - Only in TheatersSTOP USING GENERATIVE A.I (Original Song) by Thomas Benjamin Wild EsqI've No More F*s To Give! by Thomas Benjamin Wild EsqAPPS & DOODADSObsidian to NotesCursorVisual Studio CodeApple's AI Pendant Sounds Like a Watered-Down Humane Ai PinThere's a Grim New Expression: “AI;DR”There's a New Term for Workers Freaking Out Over Being Replaced by AIAT THE LIBRARYCleave the Sparrow by Jonathan KatzThe Regicide Report (Laundry Files Book 14) by Charles StrossNormally Weird and Weirdly Normal: My Adventures in Neurodiversity by Robin InceTHE DARK SIDE WITH DAVEDave BittnerThe CyberWireHacking HumansCaveatControl LoopOnly Malware in the BuildingThe Muppet ShowMuppets NowThe Mandalorian and Grogu | Official Trailer | In Theaters May 22Toy Story 5 | Official Trailer | In Theaters June 19Pentagon Pizza IndexBambu Lab A1A Star Wars-centric RSS feedCurrent RSS ReaderHorror in under two minutes.Impeccable covers of 80s synth musicTop Gun - Opening Theme (Synth Cover)CLOSING SHOUT-OUTSGreen Eggs and Ham narrated by the Reverend Jesse JacksonSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
The Patriotically Correct Radio Show with Stew Peters | #PCRadio
Frankie Stockes fills in for Stew Peters covering the latest updates from the Middle East, as the United States prepares to fight another war for Israel. Meanwhile, in the United States, government officials and propagandists are trying to shift the narrative away from the Epstein Files.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Under the Hood of DynoWiper https://isc.sans.edu/diary/Under%20the%20Hood%20of%20DynoWiper/32730 Vibe Password Generation: Predictable by Design https://www.irregular.com/publications/vibe-password-generation Vulnerabilities (CVE-2025-65715, CVE-2025-65716, CVE-2025-65717) in four popular IDE Extensions https://www.ox.security/blog/four-vulnerabilities-expose-a-massive-security-blind-spot-in-ide-extensions/ Grandstream GXP1600 VoIP Phones https://www.rapid7.com/blog/post/ve-cve-2026-2329-critical-unauthenticated-stack-buffer-overflow-in-grandstream-gxp1600-voip-phones-fixed/
Epstein's longtime patron and financial benefactor, Leslie Wexner, was finally brought before lawmakers on Wednesday — but not in a congressional hearing room, not under the glare of cameras, and not in Washington.
The “phoning it in conspiracy” is more of an observation. Have you noticed that media, entertainment, electronics, conspiracies, and food, etc. — and the commentary of and on such things — have gotten increasingly lazy? Short videos that grab attention or clickbait content is largely driven by algorithms and advertising but who authorizes it? We do. The public is responsible. We do not demand quality or context. In fact, we demand the opposite. Most just phone it in now, because it's easier. Have you also noticed that a plethora of once fringe topics have become popular? But those interested in such things for longer than “recently” are noticing that the stories have been tweaked just a little bit as to destroy the reality they contained. Reality is a good word to use here, too, because while the general public is embracing conspiracies thinking they've broken the programming of a dream state, they are actually slipping further into a coma. *The is the FREE archive, which includes advertisements. If you want an ad-free experience, you can subscribe below underneath the show description.WEBSITEFREE ARCHIVE (w. ads)SUBSCRIPTION ARCHIVE-X / TWITTERFACEBOOKINSTAGRAMYOUTUBE-BUY ME A COFFEECashApp: $rdgable PAYPAL: rdgable1991@gmail.comRyan's Books: https://thesecretteachings.info EMAIL: rdgable@yahoo.com / rdgable1991@gmail.comBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-secret-teachings--5328407/support.
This week on Defender Fridays, Farshad Abasi, Founder and CEO of Forward Security and Eureka DevSecOps, discusses how AI can help us set a new standard in app and cloud security. Farshad brings over 27 years of industry experience to the forefront of cybersecurity innovation. His professional journey includes key technical roles at Intel and Motorola, evolving into senior security positions as the Principal Security Architect for HSBC Global, and Head of IT Security for the Canadian division. Farshad's commitment to the field extends to his role as an instructor at BCIT, where he imparts his wealth of knowledge to the next generation of cybersecurity experts. His diverse experience, which spans startups to large enterprises, informs his approach to delivering adaptive and reliable solutions.Engaged actively in the cybersecurity community through roles in BSides Vancouver/MARS, OWASP Vancouver/AppSec PNW, and as a CISSP designate, Farshad's vision and leadership continue to drive the industry forward. Under his guidance, Forward Security is setting new standards in application and cloud security. Learn more at https://www.eurekadevsecops.com/ and https://forwardsecurity.com/Register for Live SessionsJoin us every Friday at 10:30am PT for live, interactive discussions with industry experts. Whether you're a seasoned professional or just curious about the field, these sessions offer an engaging dialogue between our guests, hosts, and you – our audience.Register here: https://limacharlie.io/defender-fridaysSubscribe to our YouTube channel and hit the notification bell to never miss a live session or catch up on past episodes!Sponsored by LimaCharlieThis episode is brought to you by LimaCharlie, a cloud-native SecOps platform where AI agents operate security infrastructure directly. Founded in 2018, LimaCharlie provides complete API coverage across detection, response, automation, and telemetry, with multi-tenant architecture designed for MSSPs and MDR providers managing thousands of unique client environments.Why LimaCharlie?Transparency: Complete visibility into every action and decision. No black boxes, no vendor lock-in.Scalability: Security operations that scale like infrastructure, not like procurement cycles. Move at cloud speed.Unopinionated Design: Integrate the tools you need, not just those contracts allow. Build security on your terms.Agentic SecOps Workspace (ASW): AI agents that operate alongside your team with observable, auditable actions through the same APIs human analysts use.Security Primitives: Composable building blocks that endure as tools come and go. Build once, evolve continuously.Try the Agentic SecOps Workspace free: https://limacharlie.ioLearn more: https://docs.limacharlie.ioFollow LimaCharlieSign up for free: https://limacharlie.ioLinkedIn: / limacharlieio X: https://x.com/limacharlieioCommunity Discourse: https://community.limacharlie.com/Host: Maxime Lamothe-Brassard - CEO / Co-founder at LimaCharlie
Negotiated Settlements and Expanding Security States. Anatol Lieven explains the European left's growing concerns about the Ukraine war fueling authoritarian security and surveillance measures. While a negotiated settlement requiring Ukraine to surrender the Donbas seems impossible in Kyiv, the conflict risks becoming a prolonged war of attrition dictated by modern drone warfare. #21918 4TH LIGHT HORSE IN THE JUDEAN HILLS
15 Czech Security and the Ukrainian Mob Unger discusses how Czech intelligence monitored Ivana Trump and explores Trump's negotiations with Pavel Fuks, a Ukrainian developer described as "pure Russian mob". Fuks, who boasted of FSB ties, negotiated for a Trump Tower in Moscow and later paid significant sums to attend Trump's inauguration. Guest Author: Craig Unger1868 PUBLISHING ROW
The Patriotically Correct Radio Show with Stew Peters | #PCRadio
Dan Dicks just obliterated the veil on this show—Canada's forcing SOGI gender perversion on kindergarten babies, mutilating confused kids through affirmation mills, then herding the broken straight into MAiD government-assisted suicide with over 100,000 already executed since 2016 in this demonic harvest.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Tracking Malware Campaigns With Reused Material https://isc.sans.edu/diary/Tracking%20Malware%20Campaigns%20With%20Reused%20Material/32726 From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day Windows Admin Center Elevation of Privilege Vulnerability CVE-2026-26119 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26119 DNS-PERSIST-01: A New Model for DNS-based Challenge Validation https://letsencrypt.org/2026/02/18/dns-persist-01.html Defending Web Apps https://www.sans.org/cyber-security-courses/application-security-securing-web-apps-api-microservices
Host Dennis Scully and BOH executive editor Fred Nicolaus discuss the biggest news in the design world, including a high-profile hire, Williams-Sonoma's AI ad deal, and why the uber-affluent are spending big on home security. Later, Havenly CEO Lee Mayer joins the show to talk about her acquisition of design platform The Expert. This episode is sponsored by Loloi and Morris & Co.LINKSThe ExpertHavenlyBusiness of Home
What happens when AI agents inherit access to enterprise systems but nobody governs their identities? Ido Shlomo, Co-Founder and CTO of Token Security, joins the conversation to unpack a rapidly growing challenge that many organizations face but few have addressed. As businesses accelerate AI adoption, agents are being deployed to fetch data from CRMs, process emails, and execute actions across platforms. The problem is that these agents often operate with persistent access, no clear ownership, and little visibility into what they can reach.How should security teams approach AI agent identity governance? Shlomo explains that the first step is discovery. Most companies do not know what their AI agent inventory looks like, and without that baseline, effective governance is impossible. The good news, he notes, is that agents do not suffer from politics. They do exactly what they are told and operate within the boundaries they are given. That predictability makes the challenge more manageable if the right tooling is in place.What makes an effective access policy for AI agents? Rather than relying on prompt filtering or output controls that add latency and friction, Shlomo advocates for intent-based permission models that scope each agent to access only what it needs, when it needs it. He frames the prioritization process as a matrix of access and autonomy, where the agents with the highest levels of both deserve immediate attention. For business leaders, the visibility that comes from this approach also reveals waste and inefficiency, highlighting departments and services that are not delivering on their intended value. To learn more about how to identify, govern, and secure AI agent identities, connect with the Token Security team and follow Ido Shlomo for practical guidance.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTIdo Shlomo, Co-Founder & CTO of Token SecurityOn LinkedIn: https://il.linkedin.com/in/ido--shlomoRESOURCESToken Security (Website): https://www.token.security/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSIdo Shlomo, Token Security, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, AI agent identity, non-human identity, identity governance, AI agent security, identity risk, least privilege, AI agent access, machine identity, NHI security, AI agent inventory, intent-based access Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Your email gateway isn't enough anymore, attackers are already inside the workspace through OAuth apps, browser extensions, and account takeover. In this episode, Ron sits down with Rajan Kapoor, VP of Security at Material Security, to break down the real risks hiding inside Google Workspace and Microsoft 365. They cover how phishing has evolved into full-blown business email compromise, why malicious OAuth apps are the new favorite attack vector, and what security teams, especially lean ones, can do right now to lock down their cloud workspace. Rajan also drops practical advice on passkeys, document sharing hygiene, and why data lifecycle management is a problem no one is solving well enough. Impactful Moments 00:00 – Introduction 03:30 – The current state of phishing 05:30 – Outbound email compromise risk 09:30 – OAuth apps as attack vectors 15:00 – AI agents accessing your workspace 16:00 – Prompt injection is the new SQL injection 18:00 – Allow listing apps immediately 24:30 – Google Workspace vs Microsoft 365 security 27:30 – Custom detections require API expertise 28:00 – Why passkeys matter right now 32:00 – Data lifecycle management for shared docs Links Connect with our guest, Rajan Kapoor, on LinkedIn: https://www.linkedin.com/in/rajankkapoor/ Learn more about Material Security: https://material.security ___ Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/ Check out our upcoming events: https://www.hackervalley.com/livestreams Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Markets confront a new phase of the AI revolution as autonomous bot swarms promise huge productivity gains but raise serious cybersecurity and disinformation risks. Plus, experts warn AI driven influence campaigns could threaten elections and national security as regulation lags behind innovation. And later, investors eye massive opportunities across AI infrastructure, quantum computing, and energy demand as the sector's total addressable market races toward trillions. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
In this episode, Katherine Forrest and Scott Caravello examine one of China's approaches to achieving artificial general intelligence (AGI), drawing on reports from Georgetown's Center for Security and Emerging Technology (CSET). They discuss the country's focus on embodied AI and robotics as a potential path to AGI, multilevel government initiatives supporting this development, a large-scale social simulator project in Wuhan, and significant investments in power grid and data center infrastructure. ## Learn More About Paul, Weiss's Artificial Intelligence practice: https://www.paulweiss.com/industries/artificial-intelligence
Former Senator Jim Talent discusses the precarious state of Iran's regime, emphasizing its threat to U.S. national security and support for terrorism, while analyzing the strategic opportunities for U.S. military and political action. Talent connects Iran's destabilization to broader geopolitical shifts in Venezuela and Cuba, assesses the implications of recent congressional funding for ICE, and critiques Alexandria Ocasio-Cortez's security conference remarks as a political misstep that could hinder her future ambitions. Hashtags: #JimTalent #Iran #USStrategy #Venezuela #Cuba #ICE #AlexandriaOcasioCortez #USNationalSecurity #MarkCoxMorningShow
#SecurityConfidential #DarkRhiinoSecurityRobert Siciliano is a cybersecurity and identity theft expert, private investigator, and CEO of Protect Now LLC, with over 30 years of experience protecting people and organizations from fraud, social engineering, and cybercrime. Known for closing the “Human Blindspot,” Robert developed the Strategic Human Firewall™ to help individuals and employees recognize and stop manipulation before technology ever fails. A Certified Speaking Professional and #1 bestselling author of multiple books on identity theft and privacy, he is a frequent media expert on CNN, Fox News, and The Today Show. Robert works at the intersection of physical and digital security, helping organizations defend against AI-driven fraud by strengthening the human layer of security.00:00 Intro01:35 Our Guest02:36 Protecting others for an early age05:48 I got hacked in the 90's09:26 Social Security Numbers on the Dark Web11:00 A Psychological form of denial19:04 The “Human Blindspot”21:00 The Criminals know more about us than we do23:20 Regulatory Compliance25:14 Going through Security with a guide30:03 The Strategic Human Firewall36:00 Change Minds = Change Hearts41:00 Social Engineering: What works?53:31 More about Robert----------------------------------------------------------------------To learn more about Robert visit https://www.linkedin.com/in/robertsiciliano/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com----------------------------------------------------------------------
Tune in live every weekday Monday through Friday from 9:00 AM Eastern to 10:15 AM.Buy our NFTJoin our DiscordCheck out our TwitterCheck out our YouTubeDISCLAIMER: The views shared on this show are the hosts' opinions only and should not be taken as financial advice. This content is for entertainment and informational purposes.
In this episode, we explore how artificial intelligence is revolutionizing HR, with a focus on building trust through data privacy and security. Join us as we discuss practical steps, emerging challenges, and the evolving role of HR professionals in the AI era. Key Topics: The importance of foundational data quality before implementing AI in HR Securing sensitive employee data and managing privacy concerns The role of semantic layers and data organization for effective AI use How AI impacts HR workflows and transforms knowledge work Practical approaches to integrating AI responsibly and securely Education needs for HR to understand AI risks and opportunities Future trends: AI's potential to reinvent HR practices, not just automate Resources & Links: Fuel 50 - Workforce Mobility and Talent Pipelines Amazon - Book: Data Privacy and Security in the Cloud Flurry - Official Website Amazon Bedrock - AI Model Service Anthropic - AI Safety and Privacy Guarantees OpenAI - Responsible AI Use Connect with Brian Platts: LinkedIn Twitter Timestamps: 00:30 - Welcome and introduction to the episode 01:15 - Brian Platts' background in HR and software 02:08 - Flurry's mission to make data meaningful for HR 03:26 - Fun fact: starting career driving a semi truck 04:44 - AI in HR: privacy, security, and data foundations 05:53 - Preparing your HR data for AI adoption 06:08 - Challenges with data quality and use cases 07:08 - Security considerations: private vs. public data 08:22 - Trusting AI vendors and data-sharing risks 09:15 - Teaching AI to query data securely 10:07 - Data organization and semantic layers 11:29 - Improving chatbots and avoiding misinformation 12:26 - Ensuring process accuracy and data integrity 13:14 - Sharing vs. protecting employee data 14:05 - Re-implementing permissions in AI-driven systems 15:01 - Education and awareness around AI security 16:13 - Learning from SaaS security issues during early cloud adoption 17:18 - HR's role in AI education and safeguarding IP 18:14 - Balancing productivity gains with security controls 19:06 - AI's impact on HR future: automation and new workforce roles 20:16 - The concept of the “Meat Layer” and human-AI collaboration 21:02 - Will AI replace HR jobs or empower them? 22:16 - The limits of current AI technology and future innovations 23:03 - Analogies: AI as a horse and the importance of tooling 24:06 - Embracing AI to enhance human work rather than replace it 25:16 - Reinventing HR processes beyond IT-led automation 26:18 - Regulatory challenges and incremental HR AI adoption 27:30 - How HR can lead responsible AI integration 28:03 - Final advice for HR professionals: think broadly and connect the dots
Send a textSchedule an Rx AssessmentWith cybercriminal activity accelerating and AI making scams more sophisticated by the day, one of the greatest threats facing pharmacies is through social engineering. Not by hacking systems, but by manipulating people.In this episode, Austin Murray and Scotty Sykes are joined by Chris Sykes, IT Director at Sykes & Company, to break down what social engineering really is, why pharmacies are prime targets, and how these attacks are evolving through email, phone calls, text messages, and even deep-fake technology.We cover:What social engineering is and how pharmacies are being targeted todayCommon pharmacy-specific scams, including fake refill notices, insurance requests, and ACH change attemptsHow AI and deep-fake voices are raising the stakesPractical steps pharmacies can take to slow down, verify requests, and protect PHIAnd more!More About Our Guest:Chris Sykes is the Director of IT at Sykes & Company, P.A., where he has been a key part of the team since 2006. With nearly 25 years in the IT industry, Chris combines deep technical expertise with a passion for helping both the firm and its clients become more efficient, secure, and technology-driven. Chris holds a Bachelor of Science in Business Administration with a concentration in Management Information Systems and a Master of Science in Technology Systems, both from East Carolina University. Outside of work, Chris enjoys running marathons, fishing and hunting with his boys, and spending quality time with his family at the beach.Learn more about Chris Sykes:Chris Sykes LinkedInCheck out all our social media:FacebookTwitterLinkedInScotty Sykes – CPA, CFP LinkedInScotty Sykes – CPA, CFP TwitterMore resources on this topic:Podcast - AI, Audits, & Advocacy: The Pharmacy Survival Guide with Trenton TheidePodcast - Navigating Cybersecurity, NIST and HIPAABlog - Technology, Security and Your PharmacyBlog - Protect You and Your Pharmacy: The Growing Threat of RansomwareBlog - Backing Up Your Business DataBlog - Spot a Hacked Email or Bad WebsiteBlog - Protect Your Pharmacy Data from Hackers
Send a textIn this solo episode, I share what the Olympics really look like behind the scenes and what they taught me about consistency, discipline and pressure.Most people see highlight reels. What I experienced was structure, repetition, logistics, and calm preparation.The Olympic Village is simple. Security is strict. Media coverage is global. But what truly matters isn't glamour, it's daily discipline. Our team went through two and a half years of preparation, constant adjustments, mental health support, and detailed planning to perform on that stage.I talk about:Why Olympic athletes rely on boring, repetitive routinesHow pressure is treated as a privilege, not a threatWhy sleep, hydration, and recovery matter more than flashy training toolsWhat losing 6-0 to the USA taught us about growth and perspectiveWhy small daily habits separate elite performance from average effortOne of the biggest takeaways for me was this: consistency beats intensity. Not just in elite hockey but in everyday life.You don't need Olympic talent to apply Olympic standards. You need discipline, recovery, repetition, and the ability to stay calm when things don't go perfectly.This episode is not about medals.It's about process.If you want long-term progress, in fitness, business or life, this one is for you.
The Anahat (Heart) is the home of Self, Soul, Spirit, Atma, all one and meaning the same. Time and time again Her Holiness Shri Mataji has told us: ‘You are nothing but your eternal Spirit.’ This centre has to be treated with the greatest respect and understanding. Pure love, which enlightens all, is the true quality of the Heart.
Manpower MD Lyndy Van Den Barselaar joins Africa Melane to explain why South Africans are staying in jobs, despite being unsatisfied. Presenter John Maytham is an actor and author-turned-talk radio veteran and seasoned journalist. His show serves a round-up of local and international news coupled with the latest in business, sport, traffic and weather. The host’s eclectic interests mean the program often surprises the audience with intriguing book reviews and inspiring interviews profiling artists. A daily highlight is Rapid Fire, just after 5:30pm. CapeTalk fans call in, to stump the presenter with their general knowledge questions. Another firm favourite is the humorous Thursday crossing with award-winning journalist Rebecca Davis, called “Plan B”. Thank you for listening to a podcast from Afternoon Drive with John Maytham Listen live on Primedia+ weekdays from 15:00 and 18:00 (SA Time) to Afternoon Drive with John Maytham broadcast on CapeTalk https://buff.ly/NnFM3Nk For more from the show go to https://buff.ly/BSFy4Cn or find all the catch-up podcasts here https://buff.ly/n8nWt4x Subscribe to the CapeTalk Daily and Weekly Newsletters https://buff.ly/sbvVZD5 Follow us on social media: CapeTalk on Facebook: https://www.facebook.com/CapeTalk CapeTalk on TikTok: https://www.tiktok.com/@capetalk CapeTalk on Instagram: https://www.instagram.com/ CapeTalk on X: https://x.com/CapeTalk CapeTalk on YouTube: https://www.youtube.com/@CapeTalk567 See omnystudio.com/listener for privacy information.
Everyone talks about “scaling with AI.” Few design the systems, standards, and safeguards that make scale safe—especially when the work is emotional, high-stakes, and human. In this episode, Coyne breaks down how to architect agentic AI that's simple, secure, and actually ships—plus what leaders need to know heading into 2026–2027. What you'll learnAgentic AI that works: Where LLMs belong (and don't), retry logic, rate limits, and human-in-the-loop checkpointsSecurity > shiny: Data hygiene, role-based access, and why “context engineering” beats prompt soupCompliance reality check: Fair housing, audits, and why brokerages need proof, not promisesTooling truth: Gemini Ultra vs. ChatGPT/Claude—when to mix, when to standardizeProcess before bots: Rethinking workflows, SOPs from screen recordings, and the 80/20 that moves revenueLeadership over micromanagement: Change how people think (mission/why) before changing what they doHost Justin Konikow runs Prime's multi-market operations and experiments at the edge of humans+AI in real estate. Coyne operates at the intersection of architecture, security, and enablement, translating hype into reliable, compliant outcomes. If this helped, subscribe, like, and drop a question—Justin will pull the best into a follow-up Q&A. Share this with a founder, broker-owner, or ops lead who needs a reality-based AI roadmap.
Ryan took overnight contract work because it was simple: show up, do the job, leave. No attachments. No history. No reason for anything to follow him home.This particular job was supposed to be no different—a single night installing equipment in a quiet corporate office after hours. But just after midnight, the routine shattered when a receptionist screamed in terror, claiming he'd been physically struck by something no one could see. Security footage confirmed it. The blows were real. The attacker was not.As the night went on, things escalated. Disembodied typing echoed through empty offices. A woman's voice sang softly where no one stood. And when Ryan saw something moving on a phone camera—something that noticed them watching—he realized this wasn't exhaustion or imagination.He was only there one night. No emotional connection. No reason to believe. And that's exactly why what happened still bothers him.#TrueGhostStory #OvernightShift #ParanormalExperience #RealGhostStories #OfficeHaunting #SecurityFootage #Unexplained #NightShiftHorror #HauntedBuildingsLove real ghost stories? Want even more?Become a supporter and unlock exclusive extras, ad-free episodes, and advanced access:
The Patriotically Correct Radio Show with Stew Peters | #PCRadio
Gareth Icke rips into the Epstein files leak as elite mockery—Jewish-linked globalists parading taped child rape, torture, cannibalism, sacrifices, and transhuman experiments, daring us to either submit or end them for defiling our children. BitChute's Ray Vahey details dodging Jewish-led globalist assaults—debanked in Europe, slammed by regimes, NGOs, and blacklists—delivering censorship-free video since 2017 with spy-free ops, honest trending, auto-monetization for creators, and a $10K shadowban bounty untouched.
MAGA continues to make an impact on the international stage! Tune into our latest podcast with our great host, Mike Slater, explores more of how U.S. Secretary of State Marco Rubio has done at the Munich Security Conference. Is Trumpism on the rise around the globe? Find out by listening!Following that opener, Slater chats with Breitbart's Washington Bureau Chief, Matt Boyle, about his latest adventures in Europe and what insider glimpses he's seeing from the Trump 2.0 Administration on another continent! Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Fake Incident Report Used in Phishing Campaign https://isc.sans.edu/diary/Fake%20Incident%20Report%20Used%20in%20Phishing%20Campaign/32722 Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets https://securelist.com/keenadu-android-backdoor/118913/ CVE-2026-25903: Apache NiFi: Missing Authorization of Restricted Permissions for Component Updates https://seclists.org/oss-sec/2026/q1/166 The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time https://unit42.paloaltonetworks.com/real-time-malicious-javascript-through-llms/ Encrypted RCS in iOS/iPadOS https://developer.apple.com/documentation/ios-ipados-release-notes/ios-ipados-26_4-release-notes
The other day, Kate and I were talking about the reasons why we like working on staff versus freelancing. Candidly, Kate told me that being on staff can sometimes feel easier (don't worry, I asked her if I could share this conversation with you!). And, hey, some seasons in our lives we just need ease in certain areas. We want to put our feet up for a sec and breathe. Of course, we're still producing top-notch work. Working on staff just has a different set of challenges than freelancing. But one of the things we talked about was how ease can disguise itself as security. And so, that's where we started this conversation of this week's Build Your Copywriting Business podcast episode. Take a listen and let me know if this helps you bring more intention to the decisions you're making in your business. --------------- Mentioned in the Episode You're Most Secure When You Take Control Ep. 49: How to Build Your Own Benefits as a Freelancer How to Make Time for Freelance Work Ep. 195: Freelance vs. Contract: Which is Better? Related Links Ep. 55: Building a Copywriting Side Hustle With a Full-Time Job – Claire's Story Ep. 75: How to Be a Part-Time Copywriter with a Full-Time Job – Catching Up with Alicia Is it Better to Be an On-Staff Copywriter or a Freelance Copywriter? -------------------- Get Free Copywriting Training here
With the era of globalization ending and nationalism on the rise around the world, today's guest has been advocating investors strongly consider the ProSec trade.ProSec is short for "production for Security": aka the sectors essential to national security.Since his last appearance on this channel, in the US, President Trump has proposed a massive 50% increase in military spending next year, and many European nations are considering similar increases.Is betting on further prioritization of national security spending looking even more attractive?How has the ProSec trade been performing so far?To discuss, we're fortunate to welcome to the program, Peter Tchir, Head of Macro Strategy at Academy Securities.REGISTER FOR THOUGHTFUL MONEY'S SPRING ONLINE CONFERENCE AT THE EARLY BIRD DISCOUNT PRICE at https://www.thoughtfulmoney.com/conference#nationalsecurity #energyinvesting #artificialintelligence _____________________________________________ Thoughtful Money LLC is a Registered Investment Advisor Promoter.We produce educational content geared for the individual investor. It's important to note that this content is NOT investment advice, individual or otherwise, nor should be construed as such.We recommend that most investors, especially if inexperienced, should consider benefiting from the direction and guidance of a qualified financial advisor registered with the U.S. Securities and Exchange Commission (SEC) or state securities regulators who can develop & implement a personalized financial plan based on a customer's unique goals, needs & risk tolerance.IMPORTANT NOTE: There are risks associated with investing in securities.Investing in stocks, bonds, exchange traded funds, mutual funds, money market funds, and other types of securities involve risk of loss. Loss of principal is possible. Some high risk investments may use leverage, which will accentuate gains & losses. Foreign investing involves special risks, including a greater volatility and political, economic and currency risks and differences in accounting methods.A security's or a firm's past investment performance is not a guarantee or predictor of future investment performance.Thoughtful Money and the Thoughtful Money logo are trademarks of Thoughtful Money LLC.Copyright © 2026 Thoughtful Money LLC. All rights reserved.
Hello and welcome to Handgun Radio! I'm your host Ryan Michad, Weerd Beard & Co from the wild woods of Central Maine and this is your home for all the news, information and discussion in the handgunning world! This week, we talk Security at places of worship with David & The S&W 396 […]
Louis-Vincent Gave joins The Jacob Shapiro Podcast to unpack a world that looks chaotic... but may be quietly reordering itself. From a surprising thaw in U.S.–China relations to a potential renaissance in Latin America and Canada, Louis argues that today's volatility is accelerating deeper structural shifts. He explains why Europe remains fragmented, why energy prices could derail everything, and why investors may be thinking about risk all wrong.--Timestamps:(00:00) - Welcome & Introducing Louis Gave (Gavekal Research)(02:43) - Liberation Day Shocks(05:02) - China De‑Westernizing Supply Chains After 2018(07:40) - Trump as Accelerant(09:31) - Why a US–China Cold War Is Economically Suicidal(11:50) - Drones Change War(13:47) - The ‘Swamp' Factor(18:27) - Defense Supply Chains & Rare Earth Dependence(21:19) - Xi's Priorities(25:47) - Xi's Security, PLA Purges, and Corruption Crackdowns(31:17) - Xi's Army Purge(32:37) - US-China Rapprochement(34:36) - Who Wins if the Cold War Ends?(35:58) - Why Latin America Looks Like the Breakout Trade (40:24) - Mexico Risks(42:24) - Bullish Canada(44:37) - Does USMCA Survive? (47:31) - No Army, No Foreign Policy(51:00) - Can Europe Rebuild Real Military Power?(53:27) - Ukraine Endgame(56:23) - What Keeps Louis Up at Night(01:00:32) - Bitcoin vs Diversification(01:01:30) - Closing Thoughts--Referenced in the Show:Louis-Vincent Gave - https://research.gavekal.com/author/louis-vincent-gave/--Jacob Shapiro Site: jacobshapiro.comJacob Shapiro LinkedIn: linkedin.com/in/jacob-l-s-a9337416Jacob Twitter: x.com/JacobShapJacob Shapiro Substack: jashap.substack.com/subscribe --The Jacob Shapiro Show is produced and edited by Audiographies LLC. More information at audiographies.com--Jacob Shapiro is a speaker, consultant, author, and researcher covering global politics and affairs, economics, markets, technology, history, and culture. He speaks to audiences of all sizes around the world, helps global multinationals make strategic decisions about political risks and opportunities, and works directly with investors to grow and protect their assets in today's volatile global environment. His insights help audiences across industries like finance, agriculture, and energy make sense of the world.--
Are you ready to get Security+ certified? Watch our free training course:In this month's Security+ Study Group, you'll learn about: Authentication factorsIdentifying SQL injectionsWireless handshake securityEmail retentionAuthentication and access decisionsAnd more!Keep the study process going! Watch additional Security+ Study Group video replays on the Professor Messer website.
It's open Q&A on the Security+ After Show!
How secure are your Chrome extensions and certificate signings really? This episode pulls back the curtain on a massive spyware discovery and exposes the convoluted hoops developers must jump through to prove their identity in 2026. Websites can place high demands upon limited CPU resources. Microsoft appears to back away from its security commitment. What's Windows 11 26H1 and where do I get it. Chrome 145 brings Device Bound Session Credentials. More countries are moving to ban underage social media use. The return of Roskomnadzor. Discord to require proof of adulthood for adult content. Might you still be using WinRAR 7.12 -- I was. Paragon's Graphite can definitely spy on all instant messaging. 30 malicious Chrome Extensions. 287 Chrome extensions from spying on 37.4 million users. The first malicious Outlook add-in steals 4000 user's credentials. Some AI "vibe" coding thoughts. What I just went through to obtain a new code signing certificate Show Notes - https://www.grc.com/sn/SN-1065-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT joindeleteme.com/twit promo code TWIT meter.com/securitynow zscaler.com/security hoxhunt.com/securitynow
Hello and welcome to Handgun Radio! I'm your host Ryan Michad, Weerd Beard & Co from the wild woods of Central Maine and this is your home for all the news, information and discussion in the handgunning world! This week, we talk Security at places of worship with David & The S&W 396 Night Guard with Daniel! Please check out the Patriot Patch Company for their awesome patches and other high quality items! Visit www.patriotpatch.co for more information! Cool artist “proof” rendition come along with the latest patch of the month patches! We are proudly sponsored by VZ Grips! Please go check out all their fantastic products at their website! VZ Grips! -KFrame Magna Grips Thank you to all our patreons! Visit us at https://www.patreon.com/handgunradio Week In Review: Ryan: -Not much, huge snowstorm. SUCKED!!! -ALL the 007 Movies on Netflix!! Weerd: Daniel: -S&W Night Guard 396 and more .44 Specials David: Drink Segment: Backwoods Bastard Food Segment: Leg of lamb Ingredients 7-8 lb leg of lamb 1 Tbs Black pepper 2 Tsp Salt ½ Tsp Crushed rosemary 2-3 cloves of Garlic Olive oil Recipe Rinse and pat dry the leg of lamb, and place on a rack in a roasting dish, meaty side up. Mix salt, pepper, and rosemary, then coat the surface of the lamb with about half the mixture. Sliver the garlic and coat it with the remaining spice mix. Poke holes in the roast and insert slivers of garlic. Coat with olive oil. Preheat the oven to 450F. Put the roasting pan in and immediately lower the temperature to 325F. Cook until the internal temperature reaches 125–130°F for medium-rare. Take out of the oven, and let rest for 15–20 minutes. Chef John's Tzatziki Sauce Main Topic: Planning Layout: Doors, window, cameras Equipment: First aid, AED, phones, flashlights, door wedges, etc Build a team with clearly defined and assigned roles Connect with local law enforcement agencies Communication plans Training: classes, exercises, and drills. Both with and without members present. Evacuation plan, Bunker plan, Medical Emergency plan, Fire plan, etc. Mental preparation: security team members need to give themselves permission to do bad things to bad people. If anyone can't, they should be relegated to a support role. There is no shame in this. Build good mental habits. Primary and secondary members assigned to provide information to Law Enforcement/911 Name and location of incident Physical description of shooter(s) Location of the shooter. Number of shooters, if more than one. Number and type of weapons held by the shooter(s) IE: handgun, shotgun, rifle? Number of potential victims at the location. How many people are present? Identifiable entrances and exits. Are the doors numbered? Law Enforcement Response - what to expect They are not there to treat wounded, they are there to end the threat. The initially responding officers will shout commands and may physically move or restrain people other than the shooters as needed. Once the threat is ended, additional first responders will enter to provide medical care. How to Survive the Incident Run, hide, fight Once they arrive, follow LEO instructions, keep hands visible, avoid quick movements. OODA loop: Observe, Orient, Decide, Act Legal defence: If force was used (up to and including deadly force) protecting members, there's a good chance that person or persons will be taken into custody. The family of the attacker may sue the defenders and victims. After an event: If LEOs haven't arrived, clear the scene Once LEOs arrive, see above Try to avoid disturbing the crime scene within reasonable limits Medical care. As with a depressurized airplane, check yourself first, then others Media: Primary and secondary security team personnel assigned to interact with media and run interference between them and traumatized/injured members. The Media is not your friend Counselling and therapy Wrap Up: Don't forget to shop Brownells using our affiliate link! Head to firearmsradio.net and click the affiliate link in the upper right hand corner! Be sure to go like Handgun Radio on facebook and share it with your friends! Leave us a review on iTunes! Check out VZ Grips! Listen to all the great shows on the Firearms Radio Network! Check out the Patriot Patch Company!! www.patriotpatch.co Weerd where can people find you? Assorted Calibers Podcast, Weer'd World Protect His House Oddball gunscarstech.com Assorted Calibers Podcast ACP and HGR Facebook Play screechingtires.wav David Blue Collar Prepping Brena Bock Author Page David Bock Author Page Team And More Claus of War: Santa's Battle Chronicles Xander: Assorted Calibers Podcast Here so Ryan doesn't do a bad impression of me Until next week, have fun & safe shooting!
The Security Weekly 25 index and the NASDAQ diverge. Funding and acquisitions continue shift to AI. Are security stocks out of favor? Netskope enters the index, but does not replace CyberArk, as Thoma Bravo buys Verint. We'll dig into all of this and more! The index is now made up of the following 25 stocks: SAIL Sailpoint Inc PANW Palo Alto Networks Inc CHKP Check Point Software Technologies Ltd RBRK Rubrik Inc GEN Gen Digital Inc FTNT Fortinet Inc AKAM Akamai Technologies Inc FFIV F5 Inc ZS Zscaler Inc OSPN Onespan Inc LDOS Leidos Holdings Inc QLYS Qualys Inc NTSK Netskope Inc CYBR Cyberark Software Ltd TENB Tenable Holdings Inc OKTA Okta Inc S SentinelOne Inc NET Cloudflare Inc CRWD Crowdstrike Holdings Inc NTCT NetScout Systems Inc VRNS Varonis Systems Inc RPD Rapid7 Inc FSLY Fastly Inc RDWR Radware Ltd ATEN A10 Networks Inc Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-435
How secure are your Chrome extensions and certificate signings really? This episode pulls back the curtain on a massive spyware discovery and exposes the convoluted hoops developers must jump through to prove their identity in 2026. Websites can place high demands upon limited CPU resources. Microsoft appears to back away from its security commitment. What's Windows 11 26H1 and where do I get it. Chrome 145 brings Device Bound Session Credentials. More countries are moving to ban underage social media use. The return of Roskomnadzor. Discord to require proof of adulthood for adult content. Might you still be using WinRAR 7.12 -- I was. Paragon's Graphite can definitely spy on all instant messaging. 30 malicious Chrome Extensions. 287 Chrome extensions from spying on 37.4 million users. The first malicious Outlook add-in steals 4000 user's credentials. Some AI "vibe" coding thoughts. What I just went through to obtain a new code signing certificate Show Notes - https://www.grc.com/sn/SN-1065-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT joindeleteme.com/twit promo code TWIT meter.com/securitynow zscaler.com/security hoxhunt.com/securitynow
#338: Every company adding AI coding tools runs into the same wall. Developers produce more code, but features don't ship any faster. The bottleneck just slides downstream -- to QA, to security, to legal, to whoever comes next in the pipeline. And the team that got faster? They don't even realize the people upstream could be feeding them more work. Viktor's take: the fastest possible setup is one person carrying a feature from idea to production. Not one person doing everything alone -- a system designed so nobody waits. Tests run in CI. Deployments happen through Argo CD. Security scanning is automated. There's a real difference between wiring up a light switch and hiring a butler to flip it for you. None of this is new. The same thing happened with punch cards, client-server, cloud, Kubernetes. One group adopts the new thing, everyone else says it doesn't apply to them, and the market eventually forces their hand. Meanwhile, every team in every company says they'd love to change if only the rest of the organization would get on board. Every team says this. So who's actually blocked? YouTube channel: https://youtube.com/devopsparadox Review the podcast on Apple Podcasts: https://www.devopsparadox.com/review-podcast/ Slack: https://www.devopsparadox.com/slack/ Connect with us at: https://www.devopsparadox.com/contact/
How have large language models impacted hacking? Richard talks to Erica Burgess about her experiences using LLMs for red team hacking, collecting bug bounties, and identifying vulnerabilities in systems. Erica discusses the power of LLMs to generate a variety of viewpoints on a potential exploit and help the hacker think "out of the box." Coordinating multiple agents to attempt a variety of exploits, retrieve information, and otherwise deal with the drudgery parts of hacking means a skilled operator can move faster - what once would be days of work can be minutes. Where does AI in hacking go? Lots of scary places - but also pointing the way to new ways to protect systems!LinksBurninator SecRecorded January 24, 2026
Today, Morgan, Andy, and Algene discuss the deployment of 100 U.S. troops to Nigeria, with another 100 on the way. The forces are tasked with training, intelligence sharing, and logistical support for Nigerian troops battling extremist violence in the north, but will not participate in combat operations. The move follows President Trump's sharp criticism of the Nigerian government, including claims that it has failed to protect Christians from what he has called a “genocide.”What is really driving instability in Nigeria and is Washington framing the conflict correctly? Will a limited U.S. security presence help address the root causes of violence, or risk reinforcing a misleading narrative? And as reports surface of Nigerians being recruited under false pretenses and sent to fight in Ukraine, what does that tell us about the pressures facing Nigeria's youth and the consequences of prolonged instability?Check out the answers to these questions and more in this episode of Fault Lines.@morganlroach@andykeiser@AlgeneSajeryLike what we're doing here? Be sure to rate, review, and subscribe. And don't forget to follow @faultlines_pod and @masonnatsec on Twitter!We are also on YouTube, and watch today's episode here: https://youtu.be/VrjT2IM1Yts Hosted on Acast. See acast.com/privacy for more information.
If you woke up today thinking, “Wow, I hope my neighbors don't solve disputes with a hammer,” congratulations — you're already ahead of Hillsboro.On today's episode of The Rizzuto Show, your favorite comedy podcast dives headfirst into a buffet of local chaos, celebrity controversy, and just enough heartfelt nostalgia to make you question your emotional stability.We kick things off in the Central West End where a 58-year-old man allegedly went on a full naked rampage in a high-end apartment building. Elevators were involved. Statues worth $500K were harmed. Security guards saw things they cannot unsee. This comedy podcast breaks down the entire “Friday the 13th but make it STL” moment and asks the important question: how does one man cause a million dollars in damage without pants?Then we pivot to Wash Ave, where a repeat offender made some very poor life choices less than two weeks after getting out of jail. We discuss personal recognizance bonds, public safety, and why “can't stop, won't stop” should not apply in this context.From there? Neighborhood drama escalates into full-on hammer justice in Hillsboro. A dad confronts another dad about bullying… and ends up facing first-degree assault charges. Conflict resolution tip from this comedy podcast: maybe try literally anything else first.We also honor the passing of Blueberry Hill co-founder Linda Edwards and reflect on what she meant to The Delmar Loop and St. Louis culture. It's heartfelt. It's nostalgic. It's the one moment in today's comedy podcast where we don't roast someone.Then it's Crap On Celebrities time — and we get into the uncomfortable but fascinating world of celebrities who somehow survived cancellation. From Snoop Dogg's glow-up to Mark Wahlberg's past, Vince Neil's history, Mike Tyson's comeback, and the wildly inconsistent court of public opinion — we break down who gets forgiven and why.Plus:Shia LaBeouf spotted at Mardi GrasJustin Timberlake allegedly on a “no boys night” leashAI lawsuits coming for HollywoodSantana & The Doobie Brothers blessing STLAnd Moon trying to explain tech business strategy while we slowly age in real timeIt's another beautifully unhinged installment of your favorite comedy podcast — daily chaos, sarcastic humor, pop culture commentary, and St. Louis stories that make you grateful for your relatively normal apartment building.Follow The Rizzuto Show → https://linktr.ee/rizzshow for more from your favorite daily comedy show.Connect with The Rizzuto Show Comedy Podcast online → https://1057thepoint.com/RizzShow.Hear The Rizz Show daily on the radio at 105.7 The Point | Hubbard Radio in St. Louis, MO.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Ryan took overnight contract work because it was simple: show up, do the job, leave. No attachments. No history. No reason for anything to follow him home.This particular job was supposed to be no different—a single night installing equipment in a quiet corporate office after hours. But just after midnight, the routine shattered when a receptionist screamed in terror, claiming he'd been physically struck by something no one could see. Security footage confirmed it. The blows were real. The attacker was not.As the night went on, things escalated. Disembodied typing echoed through empty offices. A woman's voice sang softly where no one stood. And when Ryan saw something moving on a phone camera—something that noticed them watching—he realized this wasn't exhaustion or imagination.He was only there one night. No emotional connection. No reason to believe. And that's exactly why what happened still bothers him.#TrueGhostStory #OvernightShift #ParanormalExperience #RealGhostStories #OfficeHaunting #SecurityFootage #Unexplained #NightShiftHorror #HauntedBuildingsLove real ghost stories? Want even more?Become a supporter and unlock exclusive extras, ad-free episodes, and advanced access:
The Patriotically Correct Radio Show with Stew Peters | #PCRadio
Jake GTV joins Stew Peters live from Puerto Vallarta at Anarchapulco ripping open the Epstein files that nail Bill Gates in direct collusion with Jeffrey Epstein—the pedo financier who bankrolled the entire COVID bioweapon operation—complete with pre-planned depopulation, white fibrous clots yanked from corpses, and skyrocketing deaths that prove this was mass murder, not a pandemic. Max Igan live from Anarchapulco Genesis in Puerto Vallarta dropping hard truth: Trump was Epstein's best buddy sharing the Talmudic, Star of Moloch child-sacrifice fetish of the elite Jewish network running blackmail-free pedo rings, while Rothschild central banks control compliant governments and depopulate the world through wars for Greater Israel.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
2026 64-Bits Malware Trend https://isc.sans.edu/diary/2026%2064-Bits%20Malware%20Trend/32718 A Comparative Security Analysis of Three Cloud-based Password Managers https://zkae.io Infostealer Infection Targeting OpenClaw Configurations https://www.infostealers.com/article/hudson-rock-identifies-real-world-infostealer-infection-targeting-openclaw-configurations/
Discover all of the podcasts in our network, search for specific episodes, get the Optimal Living Daily workbook, and learn more at: OLDPodcast.com. Episode 3915: Joshua Fields Millburn and Ryan Nicodemus reveal how fear and the illusion of security keep us tethered to unfulfilling lives, clinging to possessions, relationships, and routines that offer comfort but not meaning. By confronting the root fears behind our attachment and redefining security as something internal rather than external, we gain the freedom to live with intention, clarity, and purpose. Read along with the original article(s) here: https://www.theminimalists.com/fear/ AND https://www.theminimalists.com/security/ Quotes to ponder: "Discontent is uncertainty. And uncertainty is insecurity." "Real security, however, is found inside us, in consistent personal growth, not in a reliance on growing external factors." "Fear traps us: It prevents us from growing. It prevents us from contributing to other people. It prevents us from living happy, satisfied, fulfilled, free lives." Learn more about your ad choices. Visit megaphone.fm/adchoices