Degree of resistance to, or protection from, harm
POPULARITY
February 23, 2026 ~ Andy Arena, Executive Director of the Detroit Crime Commission, joins the show to discuss the shocking incident in which an armed man was shot and killed after breaching a security perimeter at Mar‑a‑Lago. Arena explains how these protective operations work and what this incident reveals about evolving security threats. Hosted by Simplecast, an AdsWizz company. See https://pcm.adswizz.com for information about our collection and use of personal data for advertising.
Send a textLast December the Cybersecurity and Infrastructure Security Agency, or CISA, issued an advisory warning manufacturers, operators of critical infrastructure, and really anybody associated with industrial control systems about the threats being presented by pro-Russian hacktivist groups.The advisory, issued in conjunction with numerous federal and international agencies, called out groups like the Cyber Army of Russia Reborn (CARR), Z-Pentest, NoName057 and Sector16 for taking advantage of insecure connection points and other vulnerabilities that allowed these state-sponsored actors to infiltrate, shut down, and ransom their targets in the United States.Historically, many manufacturers would find it hard to believe that their mid-size business in the heartland of America would be on the radar of foreign terrorist groups, but as our guest for today's episode explains, that is exactly the case.Will Dixon is a senior executive of Government & Law Enforcement at Intel 471 – a leading authority on the OT threat landscape. Watch/listen as he explains:How these group's initial plans to disrupt water treatment and other critical infrastructure has evolved into the strategic targeting of the U.S. manufacturing sector.Why hacktivist no longer applies to these "strategically aligned state groups."Why AI will not be as impactful for either side as many think.How these groups are part of Russia's bigger plans against the West.The important role vendors and suppliers can play in establishing cyber defenses.The ongoing challenges of breaking down IT-OT silos, and how hackers are using this dynamic against you.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.
```html welcome to wall-e's tech briefing for thursday, february 12th! explore today's essential tech topics: microsoft vulnerabilities alert: hackers exploit critical zero-day vulnerabilities affecting windows and office users, enabling unauthorized access and malware installation through smartscreen bypass. uber eats ai evolution: introduction of the "cart assistant," simplifying grocery shopping with list uploads and past order integration, marking a new trend in food delivery ai. amazon pharmacy expansion: plans for same-day prescription delivery to nearly 4,500 u.s. cities by year's end, reflecting amazon's growing influence in healthcare. openai restructuring: disbandment of the mission alignment team, with former leader josh achiam becoming chief futurist, steering ai's future direction. xai's interstellar ambitions: plans unveiled for space-based data centers and a moon factory for ai satellites, indicating groundbreaking strides in tech exploration. stay tuned for tomorrow's tech updates! ```
Send us a textWhen we talk about the challenges presented to those trying to secure the operational landscape of manufacturing, it's tough to avoid what I'd call the usual suspects - endpoints, connection points, credentials, vulnerabilities, silos and, of course, the impact of artificial intelligence.And just as there are benefits to discussing these individual aspects, it's equally important to look at things from a bigger picture in tying them all together. This not only helps us strengthen the chain, but appreciate the significance of reinforcing each of those links.Perhaps no one has helped tie all of these different players together better than our guest for this episode. Vinod D'Souza leads the manufacturing and industry vertical for Google Cloud's Office of the CISO. Watch/listen as we discuss:Emerging vulnerabilities and response plans.Segmentation challenges in the era of constant technological expansion.New-age approaches to patching.The connected fibers of artificial intelligence and the human factors of cybersecurity.Addressing IT and OT silos.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.
Scammers behind the Manage My Health security breach could attempt to contact affected customers. Earlier this month, the patient portal became aware more than 127-thousand users' health records had been compromised in an attack last year. Netsafe chief online safety officer Sean Lyons told Ryan Bridge that the cybercriminals could impersonate the company or other agencies - in what's known as a recovery scam. He says they could say they work for Manage My Heath or say they could help people secure information. He says it's a tried and tested path for scammers. LISTEN ABOVESee omnystudio.com/listener for privacy information.
Send us a textBack in 2020, the Department of Defense, as it was called at the time, introduced the Cybersecurity Maturity Model Certification (CMMC). It carried the goal of ensuring companies would be able to protect sensitive information when working on government contracts. The program requires contractors handling Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) to meet specified cybersecurity standards. Prior to CMMC, DoD contractors were required to self-attest cybersecurity compliance with frameworks set up by the National Institute of Standards of Technology (NIST). Fast forward to September 10 of last year and the Department of War as it's now known, published an update to the CMMC – basically launching a three-year rollout of elevated cybersecurity requirements. To help clarify some of the challenges and benefits associated with CMMC, I invited Mark Knight to the program. He's a Partner and Cybersecurity Risk Advisory Leader at Armanino. Listen as he offers:Details on what the updated CMMC is all about.The challenges of meeting these new compliance standards.Embracing the good and bad of government ambiguity in complying with CMMC.The impact this certification could have on all manufacturers, regardless of whether or not you're going after DOW contracts.The good and bad of utilizing AI for compliance work.How CMMC could spur M&A activity within the cybersecurity tool sector.The potential supply chain impacts of companies deciding against pursuing CMMC compliance.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.
Family members, both dead or alive. Plus pipes, pisco punch and the Green Bay Packers. Thanks for listening!Instagram - @LoveBoatProjectFacebook - The Love Boat ProjectEmail us - TheLoveBoatProject@gmail.comYouTube - The Love Boat Project
Send us a text"You don't have to get hacked to understand how you can get hacked."While I utilize that editorial director title to introduce myself before every episode of Security Breach, it's not the title that I've used the longest, think about the most, or with which I would hope to obtain the most acclaim. Rather, the job descriptor that meets all those requirements is the title of ... Dad. And perhaps the phrase most commonly utilized during my ongoing tenure in this position is some form of "are you ready?" Whether it was preparing to push a swing, toss a pitch or start a car, inquiring as to the state of my daughter's readiness was always the first, most important, and yet most basic action I took. I was reminded of this when speaking with our guest for this episode, Itzik Kotler, the co-founder and CTO of SafeBreach. While our conversation took us down a number of paths in discussing “shiny objects”, the problems with silos, and the evolution of hackers, he kept coming back to the basics, or what I like to constantly describe as the blocking and tackling of cybersecurity.At the heart of the focus on the basics is taking steps to be prepared for when, not if, you're targeted by hackers. So, if you're ready, listen as we discuss:Why every manufacturer is either a target or connected to a bigger target via their supply chain connections.The lure of "shiny objects", and how they can distract from the best approaches to cybersecurity upgrades.How hackers are exploiting the complexities of your environment.Why security strategies need to start with understanding what is truly at risk, and what level of risk is acceptable.The growing need for detection engineering.Evolving your enterprise in realizing that "hackers don't work in silos."The role AI can play in addressing alert fatigue.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.
A viral clip from Sandringham has American viewers fixated on an unexpected detail: what appeared to be a Buc-ee's plush toy in the crowd behind Prince William and his children during the Christmas Day church walk. The Texas convenience-store mascot has no UK footprint, making its appearance at a royal moment both baffling and instantly memeable, with speculation over how it ended up so close to the royals.We also revisit claims from Rob Shuter that Prince William objected to King Charles including Princesses Beatrice and Eugenie in the Christmas walk, with sources framing the disagreement as a wider clash over judgement and authority.Meanwhile, Kate is being described as an “eternal influencer” after recognition from British Vogue, as commentators point again to the so-called Kate effect on brands.Plus, renewed scrutiny of royal security after an intruder allegedly breached Kensington Palace grounds twice in the days before Christmas and has now pleaded guilty, with former royal protection officials raising questions about why he was able to return.We wrap with honours list headlines including Idris Elba's knighthood and Cynthia Erivo receiving an MBE, a redesigned British passport now bearing King Charles's coat of arms, and a new Amazon Prime Video documentary on the King's environmental work, narrated by Kate Winslet.Palace Intrigue is your daily royal family podcast, diving deep into the modern-day drama, power struggles, and scandals shaping the future of the monarchy.Hear our new show "Crown and Controversy: Prince Andrew" here.Check out "Palace Intrigue Presents: King WIlliam" here.
Send us a textWe've all heard the euphemism about knowledge being power. But perhaps the more accurate assessment comes from my favorite childhood cartoon. Yes, I've referenced it before, but when GI Joe signed off each episode by letting us know that “Knowing is Half the Battle”, Duke and his crew were echoing the same sentiment as our guest for today's episode.Evan Dornbush is the CEO of Desired Effect. A former DoD-trained state hacker, he's now working with cyber researchers to help promote their findings and get the vulnerabilities they detect into the hands of the software, network or equipment suppliers before hackers can leverage these findings, and wreak havoc on industrial control systems and production workflows. Listen as we discuss this strategy, as well:How to define roles and responsibilities in pushing Secure-by-Design initiatives forward.Why manufactures shouldn't look to out-tech the hacker.Strategies to help defenders from having to keep playing catch-up.How cybersecurity can be utilized as an operational tool.The ongoing challenges created by Zero Day vulnerabilities.Creating a culture that goes beyond just "spending for the cyber nerd."New ways to calculate ROI in advancing cybersecurity priorities.The cost benefits of investing in cyber talent.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.
For the first time since its founding in 1978, Community Beyond Violence is getting their own emergency shelter in Western Nevada County. The nonprofit organization works to end domestic violence and sexual assault. KVMR News speaks with Executive Director Allison Bischoffberger about the newly acquired space which will act as an emergency shelter for people who are actively fleeing a domestic violence situation or are in danger and looking for shelter. Last week, CodeRED, a system used to send emergency alerts to residents who have opted in, reported an outage which affected six cities and twelve counties in California, including Nevada County. Now, CodeRED has notified Nevada County of a cybersecurity breach associated with the outage. For nearly 40 years the Nevada Union High School Chamber Choir has organized a fundraiser in the form of a Renaissance celebration.The fully immersive experience includes students dressed in period-appropriate attire, live renditions of Renaissance era songs and, even, a comedy sketch. The event is known as the Madrigal Dinner.
Hello hello, listeners. On this episode, we are coming to you straight from Freddie Fazbear's Pizza Plex where Josh and local FNAF expert, Kade (GreenGorillaGamer) are going to take you on a very special journey. Join the boys as they discuss the development of the game and a story discussion for both the base game and "Ruin" DLC. Additionally, you will need your tin-foil hat as Kade walks us through the many theories & mysterious lore for a second time on this show. It's especially interesting to see how much his thoughts have changed on the overall FNAF universe due to the ramifications from this game. So climb into your Freddy suit, throw on your favorite earbuds, and join us for this awesome and informative episode.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Welcome to Spitting Nonsense—where two self-proclaimed amateurs, Jasmine and Zach, chat about all things nerdy (and plenty that's not). None of this is fact, but it's definitely our brand of nonsense! We're still recording regularly—no promises on hitting exact days anymore—but you can always count on us for plenty of off-the-wall commentary. And now, you can leave comments on Spotify! Tell us what's on your mind; we see every comment and might even respond on the show. Thanks for listening, and enjoy the nonsense!
The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive for federal agencies to update their F5 products following a significant breach where hackers accessed source code and undisclosed vulnerabilities. This incident, discovered in August, poses a serious risk to federal networks, as the threat actor could exploit these vulnerabilities to gain unauthorized access and exfiltrate sensitive data. Agencies are required to apply the latest updates by October 22nd and report their F5 deployments by October 29th, highlighting the urgency of addressing these security concerns.In a related development, the National Institute of Standards and Technology (NIST) is encouraging federal agencies to take calculated risks with artificial intelligence (AI) under new federal guidance. Martin Stanley, an AI and cybersecurity researcher, emphasized the importance of risk management in AI deployment, particularly in comparison to more established sectors like financial services. As agencies adapt to this guidance, they must identify high-impact AI applications that require thorough risk management to ensure both innovation and safety.A report from Cork Protection underscores the need for small and medium-sized businesses (SMBs) to adopt a security-first approach in light of evolving cyber threats. Many SMBs remain complacent, mistakenly believing they are not targets for cybercriminals. The report warns that this mindset, combined with the rising financial risks associated with breaches, necessitates a shift towards a security-centric operational model. The cybersecurity services market is projected to grow significantly, presenting opportunities for IT service providers that prioritize security.Apple has announced a substantial increase in its bug bounty program, now offering up to $5 million for critical vulnerabilities. This move reflects the growing importance of addressing security challenges within its ecosystem, which includes over 2.35 billion active devices. The company has previously awarded millions to security researchers, emphasizing its commitment to user privacy and security. As the landscape of cybersecurity evolves, managed service providers (MSPs) are urged to tighten vendor monitoring, incorporate AI risk assessments, and focus on continuous assurance to meet the increasing demands for security. Three things to know today00:00 Cybersecurity Crossroads: F5 Breach, AI Risk, and Apple's $5M Bug Bounty Signal Security Accountability06:44 Nearly a Third of MSPs Admit to Preventable Microsoft 365 Data Loss, Syncro Survey Finds09:22 AI Reality Check: Workers' Overconfidence, Cheaper Models, and Microsoft's Scientific Breakthrough Signal Maturity in the Market This is the Business of Tech. Supported by: https://mailprotector.com/mspradio/
Plus: Bank of America highlights continued momentum from tech and artificial intelligence investments. And ASML logs better-than-expected orders amid continued AI frenzy. Finally, Workday plans to set up an AI-focused research center in Ireland. Julie Chang hosts. Learn more about your ad choices. Visit megaphone.fm/adchoices
How do you know if one of your accounts has been part of a security breach? Richard chats with Troy Hunt about HaveIBeenPwned, a free service that allows individuals to receive notifications when their accounts appear in a security breach. Troy discusses other services available alongside HaveIBeenPwned for sysadmins, including password checking, identifying accounts associated with a specific domain, and more. When considering the cost of managing a customer with an exploited account, being able to prevent or mitigate potential risk is highly valuable. LinksHaveIBeenPwnedPark Mobile SettlementSnowflake Data BreachRecorded September 25, 2025
Clement speaks to Vicki Turner for a global snapshot of the stories making headlines. In Paris, French President Emmanuel Macron has announced that 26 countries — dubbed the “Coalition of the Willing” — have pledged to send land, air, and sea troops to Ukraine as part of a reassurance force, but only after a peace deal is signed with Russia. Meanwhile, tributes are pouring in from around the world following the death of legendary fashion designer Giorgio Armani, who passed away at the age of 91. And in the UK, chaos erupted in the House of Commons after a mobile phone playing sex noises was planted near the front bench during Prime Minister’s Questions — a stunt now under serious security investigation. 702 Breakfast with Bongani Bingwa is broadcast on 702, a Johannesburg based talk radio station. Bongani makes sense of the news, interviews the key newsmakers of the day, and holds those in power to account on your behalf. The team bring you all you need to know to start your day Thank you for listening to a podcast from 702 Breakfast with Bongani Bingwa Listen live on Primedia+ weekdays from 06:00 and 09:00 (SA Time) to Breakfast with Bongani Bingwa broadcast on 702: https://buff.ly/gk3y0Kj For more from the show go to https://buff.ly/36edSLV or find all the catch-up podcasts here https://buff.ly/zEcM35T Subscribe to the 702 Daily and Weekly Newsletters https://buff.ly/v5mfetc Follow us on social media: 702 on Facebook: https://www.facebook.com/TalkRadio702 702 on TikTok: https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/Radio702 702 on YouTube: https://www.youtube.com/@radio702 See omnystudio.com/listener for privacy information.
Now that we have a definitive backstory for the Mimic, we now have the answers we've been dying to understand for years. What is the Mimic's goal? What is the deal with MXES? Why was the lore of Security Breach so confusing in the first place? Join Game Theory Host Tom as he plummets down into the depths of Murray's Costume Manor to discover the REAL Secret of the Mimic!
The Rich Zeoli Show- Hour 3: 5:05pm- Susan Crabtree—RealClearPolitics National Political Correspondent & Author of the book, “Fools Gold: The Radicals, Con Artists, and Traitors Who Killed the California Dream and Now Threaten Us All”—joins The Rich Zeoli Show to discuss her latest report of a security breach on President Donald Trump's Scotland trip. Crabtree writes, “A Dallas USSS special agent tried to smuggle his wife on a Secret Service car plane accompanying President Trump's security detail to Scotland.” 5:20pm- While speaking in Canton, Ohio, Vice President JD Vance addressed a viral video clip featuring several people being beaten by mobs during a Cincinnati music festival. Vance stated: "Take the thugs who engaged in that violence and throw their asses in prison." 5:40pm- Is Matt a coward for not showing the entire Cincy fight on YouTube? The audience votes “yes!”
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
In today's episode, we're answering as many questions as possible in the lead-up to the release of Secret of the Mimic. -------------------------------------------------------------------------------------------Use code RYETOAST at https://gamersupps.gg/ryetoast for 10% off your WHOLE ORDER!!!------------------------------------------------------------------------------------------To submit questions, theories, and creator collab requests, email at: FreddyFazbearPizzaPodcast@gmail.com --------------------------------------------------------------------------------------------------Intro/Outro music by: @Miri789 Thumbnail template by BarBADroid!https://barbadroid.carrd.coFreddy Fazbear Pizza Podcast is YOUR premiere FNAF podcast available everywhere!Youtube: https://youtube.com/playlist?list=PLlGAFKgA2Ax_6MKnuaq5ApBgC8osKW4Dx&si=jB2ja5c4k_OnCZQQSpotify: https://open.spotify.com/show/1a65iwRRAQylxb9EtRWmsdApple Music: https://podcasts.apple.com/us/podcast/freddy-fazbear-pizza-podcast/id1705899138Amazon Music: https://music.amazon.com/podcasts/4c77d1d8-077d-463d-b48e-21280279e281/freddy-fazbear-pizza-podcast--------------------------------------------------------------------------------------------------Wanna get me something? https://throne.com/ryetoastHere are all my socials and ways to support the channel!https://ryetoast.carrd.coJoin our growing community on discord! https://discord.gg/azPjrGGdBY-----------------------------------------------------------------------------------------------------------------------For Brand Deals and Sponsorships, contact: ryetoast@apollomgmt.co-------------------------------------------------------------------------------------------------Timestamps:00:00 Cold Open and Housekeeping05:21 Question: Could Fazbear have created the Murray Co inventions?09:39 Question: What would your hopes for a Nintendo Mascot Horror game be?12:20 Question: What's the deal with Shadow Freddy and RWQ?17:06 Question: Why are Fredbear and a Blue Bonnie together on the MCM mural?20:25 Question: What's the deal with the Security Breach silo?23:40 Question: Was the Mask Roxy has the real security node?26:26 Question: How important are Sun and Moon?28:23 Question: Were the springlock suits originally made to be worn by the mimic?30:00 Question: Why is Pigpatch in Help Wanted 2?32:20 Reminiscing
Chilling Tales for Dark Nights: A Horror Anthology and Scary Stories Series Podcast
When the doors close and the night shift begins, who's really keeping watch? In this unnerving new episode of Chilling Tales for Dark Nights, host Steve Taylor beckons you past the flickering lights of a shuttered shopping mall, into a world where silence isn't empty—and routine is anything but safe. Featuring the return of acclaimed narrator Dr. Creepen, “Security Breach” is a descent into fluorescent purgatory, where identity frays, shadows lie, and something with your face may be waiting just beyond the next security feed. Step inside for a tale that haunts by degrees—quietly at first, then all at once. Just be sure to remember the way out. You may need it. To watch the podcast on YouTube: http://bit.ly/ChillingEntertainmentYT Don't forget to subscribe to the podcast for free wherever you're listening or by using this link: http://bit.ly/ChillingTalesPod If you like the show, telling a friend about it would be amazing! You can text, email, Tweet, or send this link to a friend: http://bit.ly/ChillingTalesPod Learn more about your ad choices. Visit podcastchoices.com/adchoices
Browny’s souvlaki scoffing world record, Rhino's investigation: Can Stevie J become a quiz master? | Footy Rhino's Footy News: Carlton mess, Brad Lloyd, Dean Cox & the new Lions ruckman? | Crows assistant coach Nathan Van Berlo | Gold Coast skipper Noah Anderson joins us | Daisy breaches Triple M security | The Random Top 5 - Stevie J's best moments of 2025 | Richmond's Jayden Short live in studio: his piercings, calf injury & looking good | Hitch Your Caravan - Trumps classic F-bomb | All the Good, Bad & Ugly from round 16 | Stevie J caught telling porky pies on airSee omnystudio.com/listener for privacy information.
In this episode of 'Cybersecurity Today,' host Jim Love discusses several alarming cybersecurity developments. A recent Washington Post breach raises critical questions about Microsoft 365's enterprise security as foreign government hackers compromised the email accounts of journalists. Additionally, a critical Linux flaw allows attackers to gain root access, making millions of systems vulnerable. Upgraded Godfather malware now creates virtual banking apps on infected Android devices to steal credentials in real-time. Moreover, a record-breaking data breach has exposed 16 billion logins, including Apple accounts, underscoring the fundamental flaws of password-based security. Finally, the episode addresses the systemic vulnerabilities of SMS-based two-factor authentication, advocating for a transition to app-based or hardware key solutions. 00:00 Introduction and Major Headlines 00:24 Microsoft 365 Security Breach 03:19 Critical Linux Vulnerabilities 05:59 Godfather Malware Evolution 08:18 Massive Data Breach Exposed 11:30 The Fall of SMS Two-Factor Authentication 13:21 Conclusion and Final Thoughts
In today's episode, we cover UK MPs approving assisted dying legislation, Europe pushing for diplomacy with Iran, a security breach at the UK's largest air base, and divisions over a new NATO spending targetWatch TLDR's latest videos here (YouTube):https://www.youtube.com/watch?v=k7KavbLybKYhttps://www.youtube.com/watch?v=6lTs4S3PXBUWatch TLDR's latest videos here (Nebula):https://nebula.tv/videos/tldrnewsglobal-could-a-secret-nuclear-deal-bring-peace-to-iranhttps://nebula.tv/videos/tldrnewseu-why-czechias-government-is-doomedTLDR's Daily Briefing is a roundup of the day's most important news stories from around the world. But we don't just tell you what's happening, we explain it: making complex topics simple to understand. Listen to the Daily Briefing for your global news bulletin every weekday.Pre-order the next edition of Too Long, TLDR's print magazine, here: https://toolong.news/dailyProduced and edited by Scarlett WatchornHosted byWritten by Ben Blissett and Rory TaylorMusic by Epidemic Sound: http://epidemicsound.com/creator//////////////////////////////Sources:✍️ Britain Approves Assisted Dyinghttps://www.bbc.co.uk/news/live/cg4ry0pge4kt?page=3https://www.telegraph.co.uk/politics/2025/06/20/assisted-dying-terminally-ill-adults-bill-house-of-commons/✍️ Europe Pushes for Diplomacy with Iranhttps://www.reuters.com/world/europe/europeans-try-coax-iran-back-diplomacy-trump-considers-strikes-2025-06-20/ https://apnews.com/article/israel-palestinians-iran-war-latest-06-20-2025-7c3307c446da24fb8f8ac038e93b9b85 ✍️ Security Breach at UK's Largest Air Basehttps://www.theguardian.com/world/2025/jun/20/pro-palestine-protesters-deface-two-aircraft-raf-brize-nortonhttps://www.bbc.co.uk/news/articles/cx24nppdx0lo ✍️ Upcoming NATO Summithttps://apnews.com/article/nato-defense-spending-budgets-trump-summit-2be81058f43461cb431747d2b964a8f0https://www.euronews.com/my-europe/2025/06/19/spains-pm-pedro-sanchez-rejects-natos-5-of-gdp-spending-plan-as-unreasonable See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
The National Labor Relations Board protects workers' right to organize and investigates unfair labor practices. A whistleblower complaint filed by an IT staffer claims Elon Musk and his DOGE team gained access to sensitive data that could have led directly to a “significant cybersecurity breach.” Amna Nawaz discussed more with NLRB whistleblower Daniel Berulis and attorney Andrew Bakaj. PBS News is supported by - https://www.pbs.org/newshour/about/funders
Tonight's rundown: Hey BillOReilly.com Premium and Concierge Members, welcome to the No Spin News for Wednesday, March 26, 2025. Stand Up for Your Country. Talking Points Memo: The latest on National Security Advisor Mike Waltz accidentally letting liberal journalist Jeffrey Goldberg into a meeting about the Houthis. Professor Roy Gutterman, Director of the Tully Center for Free Speech, joins No Spin News to discuss whether the security breach should be considered a scandal and give his views on the current state of the media. President Trump signs an executive order to change election rules, focusing on citizenship and mail-in voting. Bill looks at the recent outrageous things said by Democratic Representatives Maxine Waters and Jasmine Crockett. Final Thought: Bill's appearance on The Stephen A. Smith Show. In Case You Missed It: Read Bill's latest column, Frankie and Donnie Stand out from the crowd with our NEW Not Woke baseball cap for just $28.95! For a limited time, get Bill O'Reilly's bestselling The United States of Trump and a No Spin Mug for only $39.95. Get Bill's latest book, CONFRONTING THE PRESIDENTS, out NOW! Now's the time to get a Premium or Concierge Membership to BillOReilly.com, the only place for honest news analysis. Learn more about your ad choices. Visit megaphone.fm/adchoices
President Trump now says his defense secretary had nothing to do with the major security breach where highly sensitive details about United States military strikes were shared in a group chat with a journalist. New details have been reported by the journalist who first published the story. Learn more about your ad choices. Visit podcastchoices.com/adchoices
First the good news: we might just manage to build a lot of new houses. And the bad news? Millions of people will be worse off and about fifty thousand children will be pushed into poverty by welfare reform.Nish and Coco unpack Rachel Reeves' Spring Statement with the help of economist James Meadway, former advisor to John McDonnell. It was pretty bleak stuff from Reeves: the world is scary, growth is low, and cuts are coming. All with a strong whiff of austerity 2.0.The Chancellor says her fiscal rules are “non-negotiable”. But James has an alternative Spring Statement to banish the gloom and challenge the way we think about growth.Plus, as the great Signal security cock up rumbles on in the US, Nish and Coco wonder why they've never been included in a top-secret military chat. It's just not fair.And it's got the UK talking, but will the Netflix drama ‘Adolescence' make a difference in the real world?CHECK OUT THESE DEALS FROM OUR SPONSORS SKY SPORTS F1 https://www.sky.com/tv/sports Guests:James Meadway Audio CreditsParliament TV Pod Save the UK is a Reduced Listening production for Crooked Media.Contact us via email: PSUK@reducedlistening.co.ukInsta: https://instagram.com/podsavetheukTwitter: https://twitter.com/podsavetheukTikTok: https://www.tiktok.com/@podsavetheukFacebook: https://facebook.com/podsavetheukYoutube: https://www.youtube.com/@PodSavetheUK
Several of President Donald Trump's top national security officials, at times with assistance from a top Senate Republican, shifted responsibility to Secretary of Defense Pete Hegseth for sending potentially classified information that appeared in a group chat about US military strikes in Yemen that a journalist was included in. Under sharp questioning from outraged Democrats on the Senate Intelligence Committee, CIA Director John Ratcliffe and Director of National Intelligence Tulsi Gabbard repeatedly denied that the chat contained classified information. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Original link to the Will Cain Show: https://www.foxnews.com/video/6370597588112 _______________________________________ If you appreciate my work and would like to support it: https://subscribestar.com/the-saad-truth https://patreon.com/GadSaad https://paypal.me/GadSaad To subscribe to my exclusive content on Twitter, please visit my bio at https://twitter.com/GadSaad _______________________________________ This clip was posted on March 26, 2025 on my YouTube channel as THE SAAD TRUTH_1828: https://youtu.be/l_4XFRR8nqk _______________________________________ Please visit my website gadsaad.com, and sign up for alerts. If you appreciate my content, click on the "Support My Work" button. I count on my fans to support my efforts. You can donate via Patreon, PayPal, and/or SubscribeStar. _______________________________________ Dr. Gad Saad is a professor, evolutionary behavioral scientist, and author who pioneered the use of evolutionary psychology in marketing and consumer behavior. In addition to his scientific work, Dr. Saad is a leading public intellectual who often writes and speaks about idea pathogens that are destroying logic, science, reason, and common sense. _______________________________________
Details about U.S. military strikes being discussed on Signal have shocked many in the national security community. But President Trump called the whole episode a "witch hunt" and said Defense Secretary Hegseth "had nothing to do with this." Geoff Bennett discussed more with Jeffrey Goldberg, editor-in-chief of the Atlantic and moderator of Washington Week. PBS News is supported by - https://www.pbs.org/newshour/about/funders
3.25.2025 #RolandMartinUnfiltered: Signal security breach fallout, Bondi demands Crockett apology, MAGA judiciary attack, 14th amendment center opens Senators questioned Intel officials about how the Atlantic's editor-in-chief "mistakenly" got added to a group chat with top security officials discussing war plans. We'll show you how the Trump administration dodges accountability for this massive security breach. We'll show you how Fox is fumbled to tell the story while defending their former co-worker, Defense Secretary Pete Hegseth. I also have some thoughts for DJ Envy and his Breakfast Club co-hosts, who claim that the Atlantic editor-in-chief was wrong to disclose that he was included in a top-secret group chat. Attorney General Pam Bondi says that Congresswoman Jasmine Crockett owes Elon Musk and Telsa shareholders an apology. On Friday, Howard University's 14th Amendment Center will officially open. Founder Sherrilyn Ifill will explain why this center is more crucial now than ever. #BlackStarNetwork partner: Fanbasehttps://www.startengine.com/offering/fanbase This Reg A+ offering is made available through StartEngine Primary, LLC, member FINRA/SIPC. This investment is speculative, illiquid, and involves a high degree of risk, including the possible loss of your entire investment. You should read the Offering Circular (https://bit.ly/3VDPKjD) and Risks (https://bit.ly/3ZQzHl0) related to this offering before investing. Download the #BlackStarNetwork app on iOS, AppleTV, Android, Android TV, Roku, FireTV, SamsungTV and XBox http://www.blackstarnetwork.com The #BlackStarNetwork is a news reporting platform covered under Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research.See omnystudio.com/listener for privacy information.
Top intel officials have shifted responsibility on to Defense Secretary Pete Hegseth for sending potentially classified info to Yemen strike Signal group chat. Join this channel for exclusive access and bonus content: https://www.youtube.com/channel/UCkbwLFZhawBqK2b9gW08z3g/join Five Minute News with Anthony Davis is an Evergreen Podcast, covering politics, inequality, health and climate - delivering independent, unbiased and essential news for the US and across the world. Visit us online at http://www.fiveminute.news Follow us on Bluesky https://bsky.app/profile/fiveminutenews.bsky.social Follow us on Instagram http://instagram.com/fiveminnews Support us on Patreon http://www.patreon.com/fiveminutenews You can subscribe to Five Minute News with your preferred podcast app, ask your smart speaker, or enable Five Minute News as your Amazon Alexa Flash Briefing skill. Please subscribe HERE https://www.youtube.com/channel/UCkbwLFZhawBqK2b9gW08z3g?sub_confirmation=1 CONTENT DISCLAIMER The views and opinions expressed on this channel are those of the guests and authors and do not necessarily reflect the official policy or position of Anthony Davis or Five Minute News LLC. Any content provided by our hosts, guests or authors are of their opinion and are not intended to malign any religion, ethnic group, club, organization, company, individual or anyone or anything, in line with the 1st Amendment right to free speech. Learn more about your ad choices. Visit megaphone.fm/adchoices
Security Breach Allegations: The report discusses claims that Trump administration officials accidentally included journalist Jeffrey Goldberg in a Signal group chat discussing secret US military plans to strike Houthi targets in Yemen. High-level officials like Defense Secretary Pete Headseth, Vice President Jedi Vance, and Secretary of State Marco Rubio were allegedly involved. Pete Headseth denies the allegations, calling Goldberg a discredited journalist known for spreading hoaxes. Trump's Economic Policies: President Trump estimates that $4 trillion worth of companies are moving back to the US due to tariffs. He highlights the return of high-paying jobs and investments in the US, including a significant investment from Hyundai in a new steel plant in Louisiana. Elon Musk's Media Coverage: The report criticizes the media's coordinated attacks on Elon Musk, portraying him as a disruptive force in government efficiency. It includes a montage of media references to Musk's "chainsaw" approach to federal workforce reduction. Please Hit Subscribe to this podcast Right Now. Also Please Subscribe to the Ben Ferguson Show Podcast and Verdict with Ted Cruz Wherever You get You're Podcasts. Thanks for Listening #seanhannity #hannity #marklevin #levin #charliekirk #megynkelly #tucker #tuckercarlson #glennbeck #benshapiro #shapiro #trump #sexton #bucksexton#rushlimbaugh #limbaugh #whitehouse #senate #congress #thehouse #democrats#republicans #conservative #senator #congressman #congressmen #congresswoman #capitol #president #vicepresident #POTUS #presidentoftheunitedstatesofamerica#SCOTUS #Supremecourt #DonaldTrump #PresidentDonaldTrump #DT #TedCruz #Benferguson #Verdict #maga #presidenttrump #47 #the47morningupdate #donaldtrump #trump #news #trumpnews #Benferguson #breaking #breakingnews #morningupdateYouTube: https://www.youtube.com/@VerdictwithTedCruzSee omnystudio.com/listener for privacy information.
MSNBC's Jason Johnson hosts "The Beat" on Tuesday, March 25, and reports on the fallout from the Trump war plan “group chat” scandal, turmoil surrounding Social Security, and Trump's push for retribution. Rachel Cohen, Barbara McQuade, April Ryan, Rep. André Carson, Sabrina Singh, and Mark Leibovich join.
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.”See omnystudio.com/listener for privacy information.
Questions grow surrounding a shocking security breach after Trump administration officials mistakenly include a journalist to a text chain about secret U.S. military strikes in Yemen. Plus, a judicial clash over the President's deportation flights and use of the Alien Enemies Act. And, the US and Russia begin talks on a partial ceasefire in Ukraine while the Kremlin orders more drone strikes. Susan Glasser, David Drucker, Barbara McQuade, Eric Swalwell, William Taylor, Joel Payne, and Charlie Sykes join as Charles Coleman Jr. hosts The 11th Hour this Monday.
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.”See omnystudio.com/listener for privacy information.
The new JOHN ROSS coffee is here! I've teamed up with Frontier Coffee Company to bring you a funny bled of your favorite flavors of coffee. Check them out here: John Ross's Coffee in Color – Frontier Coffee Company
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.”See omnystudio.com/listener for privacy information.
Jen Psaki speaks to Jeffrey Goldberg, editor in chief of The Atlantic, about how he was mistakenly included on a group chat of high-ranking Trump officials discussing secret war plans. Goldberg reflects on being a firsthand witness such an unprecedented leak and reacts to the backlash from Secretary Pete Hegseth. Later, Senator Adam Schiff gives insight into how Congress is reacting to Goldberg's revelation and how both Republicans and Democrats are ready to hold the administration accountable. Next, Jen highlights on the growing unpopularity of Elon Musk after he trashed social security and threatened its elimination, and why it is a political gift to Democrats. Jen talks to Governor JB Pritzker about Musk's sweeping layoffs and their impact on Illinois, and Former Senator Sherrod Brown reflects on how he is stepping up to address the struggles of American workers. Check out our social pages below:https://twitter.com/InsideWithPsakihttps://www.instagram.com/InsideWithPsaki/https://www.tiktok.com/@insidewithpsakihttps://www.msnbc.com/jen-psakihttps://bsky.app/profile/insidewithpsaki.msnbc.com
MSNBC's Michael Steele hosts "The Beat" on Monday, March 24, and reports on legal battles over Donald Trump's controversial deportation efforts, the future of the Democratic Party, and mounting concerns over Elon Musk's government conflicts of interest. Plus, Steele reports on rising national security fears after a leaked war plan from top U.S. officials. Ankush Khardori, Libby Casey, Eugene Robinson, Alencia Johnson, Rep. Joe Crowley, and Larry Pfeiffer join.
National security officials discussed military plans in a Signal group chat that mistakenly included The Atlantic editor-in-chief Jeffrey Goldberg, according to a report published on Monday. To discuss the revelation and the national security implications, Geoff Bennett spoke with Leon Panetta, the former defense secretary and director of the Central Intelligence Agency. PBS News is supported by - https://www.pbs.org/newshour/about/funders
Sandra Smith, co-anchor of America Reports with Sandra Smith & John Roberts (weekdays 1-3pm ET), joined The Guy Benson Show to discuss the shocking national security leak involving a messaging chain between high-ranking Trump officials that revealed details of a classified military strike plan. Smith and Benson discussed the significance of The Atlantic's editor being accidentally included in the chain, raising serious questions about security protocols amongst the Trump team. They also covered reports that Trump may slow-walk the implementation of some tariffs set to go into effect on April 1st, signaling a potential policy shift. You can listen to the full interview below! Learn more about your ad choices. Visit podcastchoices.com/adchoices
The Guy Benson Show 03-24-2025 Learn more about your ad choices. Visit podcastchoices.com/adchoices
Alaska Airlines we need your help. Episode 15 coming this Thursday 9/19 To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices