Degree of resistance to, or protection from, harm
POPULARITY
Send us a textWe've all heard the euphemism about knowledge being power. But perhaps the more accurate assessment comes from my favorite childhood cartoon. Yes, I've referenced it before, but when GI Joe signed off each episode by letting us know that “Knowing is Half the Battle”, Duke and his crew were echoing the same sentiment as our guest for today's episode.Evan Dornbush is the CEO of Desired Effect. A former DoD-trained state hacker, he's now working with cyber researchers to help promote their findings and get the vulnerabilities they detect into the hands of the software, network or equipment suppliers before hackers can leverage these findings, and wreak havoc on industrial control systems and production workflows. Listen as we discuss this strategy, as well:How to define roles and responsibilities in pushing Secure-by-Design initiatives forward.Why manufactures shouldn't look to out-tech the hacker.Strategies to help defenders from having to keep playing catch-up.How cybersecurity can be utilized as an operational tool.The ongoing challenges created by Zero Day vulnerabilities.Creating a culture that goes beyond just "spending for the cyber nerd."New ways to calculate ROI in advancing cybersecurity priorities.The cost benefits of investing in cyber talent.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.
Send us a textPerhaps you're familiar with the quote, “The greatest trick the Devil ever pulled was convincing the world he didn't exist.” While its use in the movie The Usual Suspects might resonate with most, the original attribution goes to French poet Charles Baudelaire.The quote came to mind in preparing for my conversation with Tim Chase, Principal Technical Evangelist for Orca Security. I knew we were going to be discussing topics where the biggest implementation challenges typically resonate from OT asset owners who don't see the need to address these topics.Or, with all due respect to Baudelaire, the greatest trick hackers ever pulled was convincing the industrial sector that they didn't care.The good news is that folks like Tim are aware of these situations, and working to offer some new solutions. Watch/listen as we discuss:How vital it is to define security responsibilities.The growing need for cloud security education.Why a top-down approach is vital for creating a security-focused culture.The benefits of creating internal security champions.The annoying, but growing significance of SBOMs.Combatting alert fatigue.The biggest challenges AI is creating for cybersecurity.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.
Steve Waterhouse, Cybersecurity expert
For the first time since its founding in 1978, Community Beyond Violence is getting their own emergency shelter in Western Nevada County. The nonprofit organization works to end domestic violence and sexual assault. KVMR News speaks with Executive Director Allison Bischoffberger about the newly acquired space which will act as an emergency shelter for people who are actively fleeing a domestic violence situation or are in danger and looking for shelter. Last week, CodeRED, a system used to send emergency alerts to residents who have opted in, reported an outage which affected six cities and twelve counties in California, including Nevada County. Now, CodeRED has notified Nevada County of a cybersecurity breach associated with the outage. For nearly 40 years the Nevada Union High School Chamber Choir has organized a fundraiser in the form of a Renaissance celebration.The fully immersive experience includes students dressed in period-appropriate attire, live renditions of Renaissance era songs and, even, a comedy sketch. The event is known as the Madrigal Dinner.
Hello hello, listeners. On this episode, we are coming to you straight from Freddie Fazbear's Pizza Plex where Josh and local FNAF expert, Kade (GreenGorillaGamer) are going to take you on a very special journey. Join the boys as they discuss the development of the game and a story discussion for both the base game and "Ruin" DLC. Additionally, you will need your tin-foil hat as Kade walks us through the many theories & mysterious lore for a second time on this show. It's especially interesting to see how much his thoughts have changed on the overall FNAF universe due to the ramifications from this game. So climb into your Freddy suit, throw on your favorite earbuds, and join us for this awesome and informative episode.
Send us a textWhile I'll resist drawing comparisons about industrial cybersecurity to butterflies and bees, producing this episode did remind me of another great Muhammad Ali quote: "The hands can't hit what the eyes can't see.”This could provide an easy segue into the ongoing challenges about asset visibility, but really, it goes a bit deeper than that. In addition to being able to see all the things we need to defend against, we also have to understand what to look for in establishing those defenses. In this episode, we discuss these challenges and solutions with Bryson Bort, the founder and CEO of SCYTHE, a leading provider of Adversarial Exposure Validation (AEV) solutions. Watch/listen as we also discuss:The increasing impact of hacktivists.The rise of ransomware gangs.What AEV is all about.Why there is no such thing as an accidental hack.The human impact on cybersecurity and why it is rarely the human's fault.How his former military life has impacted his cybersecurity career.Why supply chains could be the most important threat landscape going forward.To check out the work he and his colleagues are up to, you can go to scythe.io, as well as icsvillage.com.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifyTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Send us a textUptime. It's the lifeblood of manufacturing and the precise target of industrial sector hackers. By knocking systems offline, stealing credentials, holding data for ransom, or crippling supply chains, the bad guys know their ultimate goals of disruption or extortion will be realized.And as we've discussed numerous times here on Security Breach, keeping these bad actors out has become more and more difficult as new technology, connectivity and endpoints are added to the OT landscape.Hackers are getting smarter and more complex, but the good news is so are the tools and strategies for the good guys. Here to offer some perspective on dealing with the leading threats targeting the people, systems and data of the industrial sector is a collection of experts focused on minimizing disruptions and preparing you to react and respond to cyberattacks.Watch/listen as:Max Clausen, senior VP of Network Connectivity at Zayo dives into the factors and strategies driving DDoS or distributed denial of service attacks.John Carse, Field CISO at SquareX discusses the ongoing impact of developing and legacy vulnerabilities, as well as some of the novel strategies hackers are using to introduce new strands of highly disruptive malware.Amit Hammer, CEO of Salvador Tech talks about lessons learned from the recent Jaguar Land Rover attack and how response strategies will continue to play a key role in minimizing attack-related downtime.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifyTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.
Welcome to Spitting Nonsense—where two self-proclaimed amateurs, Jasmine and Zach, chat about all things nerdy (and plenty that's not). None of this is fact, but it's definitely our brand of nonsense! We're still recording regularly—no promises on hitting exact days anymore—but you can always count on us for plenty of off-the-wall commentary. And now, you can leave comments on Spotify! Tell us what's on your mind; we see every comment and might even respond on the show. Thanks for listening, and enjoy the nonsense!
The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive for federal agencies to update their F5 products following a significant breach where hackers accessed source code and undisclosed vulnerabilities. This incident, discovered in August, poses a serious risk to federal networks, as the threat actor could exploit these vulnerabilities to gain unauthorized access and exfiltrate sensitive data. Agencies are required to apply the latest updates by October 22nd and report their F5 deployments by October 29th, highlighting the urgency of addressing these security concerns.In a related development, the National Institute of Standards and Technology (NIST) is encouraging federal agencies to take calculated risks with artificial intelligence (AI) under new federal guidance. Martin Stanley, an AI and cybersecurity researcher, emphasized the importance of risk management in AI deployment, particularly in comparison to more established sectors like financial services. As agencies adapt to this guidance, they must identify high-impact AI applications that require thorough risk management to ensure both innovation and safety.A report from Cork Protection underscores the need for small and medium-sized businesses (SMBs) to adopt a security-first approach in light of evolving cyber threats. Many SMBs remain complacent, mistakenly believing they are not targets for cybercriminals. The report warns that this mindset, combined with the rising financial risks associated with breaches, necessitates a shift towards a security-centric operational model. The cybersecurity services market is projected to grow significantly, presenting opportunities for IT service providers that prioritize security.Apple has announced a substantial increase in its bug bounty program, now offering up to $5 million for critical vulnerabilities. This move reflects the growing importance of addressing security challenges within its ecosystem, which includes over 2.35 billion active devices. The company has previously awarded millions to security researchers, emphasizing its commitment to user privacy and security. As the landscape of cybersecurity evolves, managed service providers (MSPs) are urged to tighten vendor monitoring, incorporate AI risk assessments, and focus on continuous assurance to meet the increasing demands for security. Three things to know today00:00 Cybersecurity Crossroads: F5 Breach, AI Risk, and Apple's $5M Bug Bounty Signal Security Accountability06:44 Nearly a Third of MSPs Admit to Preventable Microsoft 365 Data Loss, Syncro Survey Finds09:22 AI Reality Check: Workers' Overconfidence, Cheaper Models, and Microsoft's Scientific Breakthrough Signal Maturity in the Market This is the Business of Tech. Supported by: https://mailprotector.com/mspradio/
Send us a textWhile there are plenty to pick from, one of the biggest challenges for cybersecurity professionals in the industrial realm can be getting financial support. In manufacturing there are always a number of viable spending options, and working to make cybersecurity a priority can be tough, especially when enterprises are faced with initiatives seen as more fundamental to the core mission of getting finished product out the door.However, a couple of recent reports could help connect the dots between production and security, and the need to fund both.First, there's Adaptiva's State of Patch Management Report that found 75 percent of manufacturing companies have critical vulnerabilities with a CVSS score of 8 or higher, and 65 percent have at least one vulnerability listed in the CISA Known Exploited Vulnerabilities Catalog. So, hackers know about these weaknesses and they're taking advantage of them.And, according to Black Kite's 2025 Manufacturing Report, 51 percent of those surveyed indicate that patching has become a bigger challenge than intrusion detection, and more than 75 percent indicate that both IT and security must approve patches before deployment.Reading between the lines – patching takes too long and is too complicated, so the vulnerabilities persist and the hackers keep winning.Watch/listen as we discuss these and other topics with Chaz Spahn, the Director of Product Management at Adaptiva. As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifyTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.
Plus: Bank of America highlights continued momentum from tech and artificial intelligence investments. And ASML logs better-than-expected orders amid continued AI frenzy. Finally, Workday plans to set up an AI-focused research center in Ireland. Julie Chang hosts. Learn more about your ad choices. Visit megaphone.fm/adchoices
How do you know if one of your accounts has been part of a security breach? Richard chats with Troy Hunt about HaveIBeenPwned, a free service that allows individuals to receive notifications when their accounts appear in a security breach. Troy discusses other services available alongside HaveIBeenPwned for sysadmins, including password checking, identifying accounts associated with a specific domain, and more. When considering the cost of managing a customer with an exploited account, being able to prevent or mitigate potential risk is highly valuable. LinksHaveIBeenPwnedPark Mobile SettlementSnowflake Data BreachRecorded September 25, 2025
Clement speaks to Vicki Turner for a global snapshot of the stories making headlines. In Paris, French President Emmanuel Macron has announced that 26 countries — dubbed the “Coalition of the Willing” — have pledged to send land, air, and sea troops to Ukraine as part of a reassurance force, but only after a peace deal is signed with Russia. Meanwhile, tributes are pouring in from around the world following the death of legendary fashion designer Giorgio Armani, who passed away at the age of 91. And in the UK, chaos erupted in the House of Commons after a mobile phone playing sex noises was planted near the front bench during Prime Minister’s Questions — a stunt now under serious security investigation. 702 Breakfast with Bongani Bingwa is broadcast on 702, a Johannesburg based talk radio station. Bongani makes sense of the news, interviews the key newsmakers of the day, and holds those in power to account on your behalf. The team bring you all you need to know to start your day Thank you for listening to a podcast from 702 Breakfast with Bongani Bingwa Listen live on Primedia+ weekdays from 06:00 and 09:00 (SA Time) to Breakfast with Bongani Bingwa broadcast on 702: https://buff.ly/gk3y0Kj For more from the show go to https://buff.ly/36edSLV or find all the catch-up podcasts here https://buff.ly/zEcM35T Subscribe to the 702 Daily and Weekly Newsletters https://buff.ly/v5mfetc Follow us on social media: 702 on Facebook: https://www.facebook.com/TalkRadio702 702 on TikTok: https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/Radio702 702 on YouTube: https://www.youtube.com/@radio702 See omnystudio.com/listener for privacy information.
Clement speaks to Vicki Turner for a global snapshot of the stories making headlines. In Paris, French President Emmanuel Macron has announced that 26 countries — dubbed the “Coalition of the Willing” — have pledged to send land, air, and sea troops to Ukraine as part of a reassurance force, but only after a peace deal is signed with Russia. Meanwhile, tributes are pouring in from around the world following the death of legendary fashion designer Giorgio Armani, who passed away at the age of 91. And in the UK, chaos erupted in the House of Commons after a mobile phone playing sex noises was planted near the front bench during Prime Minister’s Questions — a stunt now under serious security investigation. 702 Breakfast with Bongani Bingwa is broadcast on 702, a Johannesburg based talk radio station. Bongani makes sense of the news, interviews the key newsmakers of the day, and holds those in power to account on your behalf. The team bring you all you need to know to start your day Thank you for listening to a podcast from 702 Breakfast with Bongani Bingwa Listen live on Primedia+ weekdays from 06:00 and 09:00 (SA Time) to Breakfast with Bongani Bingwa broadcast on 702: https://buff.ly/gk3y0Kj For more from the show go to https://buff.ly/36edSLV or find all the catch-up podcasts here https://buff.ly/zEcM35T Subscribe to the 702 Daily and Weekly Newsletters https://buff.ly/v5mfetc Follow us on social media: 702 on Facebook: https://www.facebook.com/TalkRadio702 702 on TikTok: https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/Radio702 702 on YouTube: https://www.youtube.com/@radio702 See omnystudio.com/listener for privacy information.
Now that we have a definitive backstory for the Mimic, we now have the answers we've been dying to understand for years. What is the Mimic's goal? What is the deal with MXES? Why was the lore of Security Breach so confusing in the first place? Join Game Theory Host Tom as he plummets down into the depths of Murray's Costume Manor to discover the REAL Secret of the Mimic!
The Rich Zeoli Show- Hour 3: 5:05pm- Susan Crabtree—RealClearPolitics National Political Correspondent & Author of the book, “Fools Gold: The Radicals, Con Artists, and Traitors Who Killed the California Dream and Now Threaten Us All”—joins The Rich Zeoli Show to discuss her latest report of a security breach on President Donald Trump's Scotland trip. Crabtree writes, “A Dallas USSS special agent tried to smuggle his wife on a Secret Service car plane accompanying President Trump's security detail to Scotland.” 5:20pm- While speaking in Canton, Ohio, Vice President JD Vance addressed a viral video clip featuring several people being beaten by mobs during a Cincinnati music festival. Vance stated: "Take the thugs who engaged in that violence and throw their asses in prison." 5:40pm- Is Matt a coward for not showing the entire Cincy fight on YouTube? The audience votes “yes!”
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
In today's episode, we're answering as many questions as possible in the lead-up to the release of Secret of the Mimic. -------------------------------------------------------------------------------------------Use code RYETOAST at https://gamersupps.gg/ryetoast for 10% off your WHOLE ORDER!!!------------------------------------------------------------------------------------------To submit questions, theories, and creator collab requests, email at: FreddyFazbearPizzaPodcast@gmail.com --------------------------------------------------------------------------------------------------Intro/Outro music by: @Miri789 Thumbnail template by BarBADroid!https://barbadroid.carrd.coFreddy Fazbear Pizza Podcast is YOUR premiere FNAF podcast available everywhere!Youtube: https://youtube.com/playlist?list=PLlGAFKgA2Ax_6MKnuaq5ApBgC8osKW4Dx&si=jB2ja5c4k_OnCZQQSpotify: https://open.spotify.com/show/1a65iwRRAQylxb9EtRWmsdApple Music: https://podcasts.apple.com/us/podcast/freddy-fazbear-pizza-podcast/id1705899138Amazon Music: https://music.amazon.com/podcasts/4c77d1d8-077d-463d-b48e-21280279e281/freddy-fazbear-pizza-podcast--------------------------------------------------------------------------------------------------Wanna get me something? https://throne.com/ryetoastHere are all my socials and ways to support the channel!https://ryetoast.carrd.coJoin our growing community on discord! https://discord.gg/azPjrGGdBY-----------------------------------------------------------------------------------------------------------------------For Brand Deals and Sponsorships, contact: ryetoast@apollomgmt.co-------------------------------------------------------------------------------------------------Timestamps:00:00 Cold Open and Housekeeping05:21 Question: Could Fazbear have created the Murray Co inventions?09:39 Question: What would your hopes for a Nintendo Mascot Horror game be?12:20 Question: What's the deal with Shadow Freddy and RWQ?17:06 Question: Why are Fredbear and a Blue Bonnie together on the MCM mural?20:25 Question: What's the deal with the Security Breach silo?23:40 Question: Was the Mask Roxy has the real security node?26:26 Question: How important are Sun and Moon?28:23 Question: Were the springlock suits originally made to be worn by the mimic?30:00 Question: Why is Pigpatch in Help Wanted 2?32:20 Reminiscing
Chilling Tales for Dark Nights: A Horror Anthology and Scary Stories Series Podcast
When the doors close and the night shift begins, who's really keeping watch? In this unnerving new episode of Chilling Tales for Dark Nights, host Steve Taylor beckons you past the flickering lights of a shuttered shopping mall, into a world where silence isn't empty—and routine is anything but safe. Featuring the return of acclaimed narrator Dr. Creepen, “Security Breach” is a descent into fluorescent purgatory, where identity frays, shadows lie, and something with your face may be waiting just beyond the next security feed. Step inside for a tale that haunts by degrees—quietly at first, then all at once. Just be sure to remember the way out. You may need it. To watch the podcast on YouTube: http://bit.ly/ChillingEntertainmentYT Don't forget to subscribe to the podcast for free wherever you're listening or by using this link: http://bit.ly/ChillingTalesPod If you like the show, telling a friend about it would be amazing! You can text, email, Tweet, or send this link to a friend: http://bit.ly/ChillingTalesPod Learn more about your ad choices. Visit podcastchoices.com/adchoices
Browny’s souvlaki scoffing world record, Rhino's investigation: Can Stevie J become a quiz master? | Footy Rhino's Footy News: Carlton mess, Brad Lloyd, Dean Cox & the new Lions ruckman? | Crows assistant coach Nathan Van Berlo | Gold Coast skipper Noah Anderson joins us | Daisy breaches Triple M security | The Random Top 5 - Stevie J's best moments of 2025 | Richmond's Jayden Short live in studio: his piercings, calf injury & looking good | Hitch Your Caravan - Trumps classic F-bomb | All the Good, Bad & Ugly from round 16 | Stevie J caught telling porky pies on airSee omnystudio.com/listener for privacy information.
In this episode of 'Cybersecurity Today,' host Jim Love discusses several alarming cybersecurity developments. A recent Washington Post breach raises critical questions about Microsoft 365's enterprise security as foreign government hackers compromised the email accounts of journalists. Additionally, a critical Linux flaw allows attackers to gain root access, making millions of systems vulnerable. Upgraded Godfather malware now creates virtual banking apps on infected Android devices to steal credentials in real-time. Moreover, a record-breaking data breach has exposed 16 billion logins, including Apple accounts, underscoring the fundamental flaws of password-based security. Finally, the episode addresses the systemic vulnerabilities of SMS-based two-factor authentication, advocating for a transition to app-based or hardware key solutions. 00:00 Introduction and Major Headlines 00:24 Microsoft 365 Security Breach 03:19 Critical Linux Vulnerabilities 05:59 Godfather Malware Evolution 08:18 Massive Data Breach Exposed 11:30 The Fall of SMS Two-Factor Authentication 13:21 Conclusion and Final Thoughts
In today's episode, we cover UK MPs approving assisted dying legislation, Europe pushing for diplomacy with Iran, a security breach at the UK's largest air base, and divisions over a new NATO spending targetWatch TLDR's latest videos here (YouTube):https://www.youtube.com/watch?v=k7KavbLybKYhttps://www.youtube.com/watch?v=6lTs4S3PXBUWatch TLDR's latest videos here (Nebula):https://nebula.tv/videos/tldrnewsglobal-could-a-secret-nuclear-deal-bring-peace-to-iranhttps://nebula.tv/videos/tldrnewseu-why-czechias-government-is-doomedTLDR's Daily Briefing is a roundup of the day's most important news stories from around the world. But we don't just tell you what's happening, we explain it: making complex topics simple to understand. Listen to the Daily Briefing for your global news bulletin every weekday.Pre-order the next edition of Too Long, TLDR's print magazine, here: https://toolong.news/dailyProduced and edited by Scarlett WatchornHosted byWritten by Ben Blissett and Rory TaylorMusic by Epidemic Sound: http://epidemicsound.com/creator//////////////////////////////Sources:✍️ Britain Approves Assisted Dyinghttps://www.bbc.co.uk/news/live/cg4ry0pge4kt?page=3https://www.telegraph.co.uk/politics/2025/06/20/assisted-dying-terminally-ill-adults-bill-house-of-commons/✍️ Europe Pushes for Diplomacy with Iranhttps://www.reuters.com/world/europe/europeans-try-coax-iran-back-diplomacy-trump-considers-strikes-2025-06-20/ https://apnews.com/article/israel-palestinians-iran-war-latest-06-20-2025-7c3307c446da24fb8f8ac038e93b9b85 ✍️ Security Breach at UK's Largest Air Basehttps://www.theguardian.com/world/2025/jun/20/pro-palestine-protesters-deface-two-aircraft-raf-brize-nortonhttps://www.bbc.co.uk/news/articles/cx24nppdx0lo ✍️ Upcoming NATO Summithttps://apnews.com/article/nato-defense-spending-budgets-trump-summit-2be81058f43461cb431747d2b964a8f0https://www.euronews.com/my-europe/2025/06/19/spains-pm-pedro-sanchez-rejects-natos-5-of-gdp-spending-plan-as-unreasonable See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
In this episode of 'Cybersecurity Today', host Jim Love is joined by panelists Laura Payne from White Tuque and David Shipley from Beauceron Security to review significant cybersecurity events over the past month. The discussion covers various impactful stories such as the disappearance of a professor, a data breach at Hertz, and government officials using a commercial app during a conflict. They dive deep into the ransomware attack on PowerSchool and its implications for K-12 schools in North America. The conversation also highlights the vulnerability of critical infrastructures, including the food supply chain and the importance of robust cybersecurity measures. Finally, the panel touches upon the progression towards post-quantum encryption by major tech companies like AWS and Google, signaling advancements in securing future technologies. 00:00 Introduction and Panelist Welcome 00:20 Major Cybersecurity Incidents of the Month 02:04 PowerSchool Data Breach Analysis 04:11 Ransomware and Double Extortion Tactics 12:20 4chan Security Breach and Its Implications 16:31 Hertz Data Loss and Retail Cybersecurity 17:44 Critical Infrastructure and Cyber Regulation 27:03 The Importance of CVE Database 27:54 Debate on Vulnerability Scoring 30:17 Open Source Software and Geopolitical Risks 31:43 The Evolution and Challenges of Open Source 37:17 The Need for Software Regulation 46:50 Signal Gate and Compliance Issues 54:08 Post-Quantum Cryptography 56:10 Conclusion and Final Thoughts
The National Labor Relations Board protects workers' right to organize and investigates unfair labor practices. A whistleblower complaint filed by an IT staffer claims Elon Musk and his DOGE team gained access to sensitive data that could have led directly to a “significant cybersecurity breach.” Amna Nawaz discussed more with NLRB whistleblower Daniel Berulis and attorney Andrew Bakaj. PBS News is supported by - https://www.pbs.org/newshour/about/funders
This Week's Guests: MSNBC Legal Analyst - Danny Cevallos Episode 353 Danny Cevallos is an MSNBC legal analyst who practices in the areas of personal injury, wrongful conviction and criminal defense in Pennsylvania, New York and the U.S. Virgin Islands at the law firms of Cevallos & Wong in Pennsylvania and Edelman & Edelman in New York, where he is of counsel. "Rethink Production presents "Live From America Podcast" - a weekly show that combines political commentary with humor. Hosted by the comedy cellar owner Noam Dworman and producer Hatem Gabr, the show features expert guests discussing news, culture, and politics with a blend of knowledge and laughter. Follow Live From America YouTube @livefromamericapodcast twitter.com/AmericasPodcast www.LiveFromAmericaPodcast.com LiveFromAmericapodcast@gmail.com Follow Hatem Twitter.com/HatemNYC Instagram.com/hatemnyc/ Follow Noam Twitter.com/noam_dworman #DOGE #SignaLeak #Deportation
Tonight's rundown: Hey BillOReilly.com Premium and Concierge Members, welcome to the No Spin News for Wednesday, March 26, 2025. Stand Up for Your Country. Talking Points Memo: The latest on National Security Advisor Mike Waltz accidentally letting liberal journalist Jeffrey Goldberg into a meeting about the Houthis. Professor Roy Gutterman, Director of the Tully Center for Free Speech, joins No Spin News to discuss whether the security breach should be considered a scandal and give his views on the current state of the media. President Trump signs an executive order to change election rules, focusing on citizenship and mail-in voting. Bill looks at the recent outrageous things said by Democratic Representatives Maxine Waters and Jasmine Crockett. Final Thought: Bill's appearance on The Stephen A. Smith Show. In Case You Missed It: Read Bill's latest column, Frankie and Donnie Stand out from the crowd with our NEW Not Woke baseball cap for just $28.95! For a limited time, get Bill O'Reilly's bestselling The United States of Trump and a No Spin Mug for only $39.95. Get Bill's latest book, CONFRONTING THE PRESIDENTS, out NOW! Now's the time to get a Premium or Concierge Membership to BillOReilly.com, the only place for honest news analysis. Learn more about your ad choices. Visit megaphone.fm/adchoices
President Trump now says his defense secretary had nothing to do with the major security breach where highly sensitive details about United States military strikes were shared in a group chat with a journalist. New details have been reported by the journalist who first published the story. Learn more about your ad choices. Visit podcastchoices.com/adchoices
First the good news: we might just manage to build a lot of new houses. And the bad news? Millions of people will be worse off and about fifty thousand children will be pushed into poverty by welfare reform.Nish and Coco unpack Rachel Reeves' Spring Statement with the help of economist James Meadway, former advisor to John McDonnell. It was pretty bleak stuff from Reeves: the world is scary, growth is low, and cuts are coming. All with a strong whiff of austerity 2.0.The Chancellor says her fiscal rules are “non-negotiable”. But James has an alternative Spring Statement to banish the gloom and challenge the way we think about growth.Plus, as the great Signal security cock up rumbles on in the US, Nish and Coco wonder why they've never been included in a top-secret military chat. It's just not fair.And it's got the UK talking, but will the Netflix drama ‘Adolescence' make a difference in the real world?CHECK OUT THESE DEALS FROM OUR SPONSORS SKY SPORTS F1 https://www.sky.com/tv/sports Guests:James Meadway Audio CreditsParliament TV Pod Save the UK is a Reduced Listening production for Crooked Media.Contact us via email: PSUK@reducedlistening.co.ukInsta: https://instagram.com/podsavetheukTwitter: https://twitter.com/podsavetheukTikTok: https://www.tiktok.com/@podsavetheukFacebook: https://facebook.com/podsavetheukYoutube: https://www.youtube.com/@PodSavetheUK
Several of President Donald Trump's top national security officials, at times with assistance from a top Senate Republican, shifted responsibility to Secretary of Defense Pete Hegseth for sending potentially classified information that appeared in a group chat about US military strikes in Yemen that a journalist was included in. Under sharp questioning from outraged Democrats on the Senate Intelligence Committee, CIA Director John Ratcliffe and Director of National Intelligence Tulsi Gabbard repeatedly denied that the chat contained classified information. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Original link to the Will Cain Show: https://www.foxnews.com/video/6370597588112 _______________________________________ If you appreciate my work and would like to support it: https://subscribestar.com/the-saad-truth https://patreon.com/GadSaad https://paypal.me/GadSaad To subscribe to my exclusive content on Twitter, please visit my bio at https://twitter.com/GadSaad _______________________________________ This clip was posted on March 26, 2025 on my YouTube channel as THE SAAD TRUTH_1828: https://youtu.be/l_4XFRR8nqk _______________________________________ Please visit my website gadsaad.com, and sign up for alerts. If you appreciate my content, click on the "Support My Work" button. I count on my fans to support my efforts. You can donate via Patreon, PayPal, and/or SubscribeStar. _______________________________________ Dr. Gad Saad is a professor, evolutionary behavioral scientist, and author who pioneered the use of evolutionary psychology in marketing and consumer behavior. In addition to his scientific work, Dr. Saad is a leading public intellectual who often writes and speaks about idea pathogens that are destroying logic, science, reason, and common sense. _______________________________________
Details about U.S. military strikes being discussed on Signal have shocked many in the national security community. But President Trump called the whole episode a "witch hunt" and said Defense Secretary Hegseth "had nothing to do with this." Geoff Bennett discussed more with Jeffrey Goldberg, editor-in-chief of the Atlantic and moderator of Washington Week. PBS News is supported by - https://www.pbs.org/newshour/about/funders
3.25.2025 #RolandMartinUnfiltered: Signal security breach fallout, Bondi demands Crockett apology, MAGA judiciary attack, 14th amendment center opens Senators questioned Intel officials about how the Atlantic's editor-in-chief "mistakenly" got added to a group chat with top security officials discussing war plans. We'll show you how the Trump administration dodges accountability for this massive security breach. We'll show you how Fox is fumbled to tell the story while defending their former co-worker, Defense Secretary Pete Hegseth. I also have some thoughts for DJ Envy and his Breakfast Club co-hosts, who claim that the Atlantic editor-in-chief was wrong to disclose that he was included in a top-secret group chat. Attorney General Pam Bondi says that Congresswoman Jasmine Crockett owes Elon Musk and Telsa shareholders an apology. On Friday, Howard University's 14th Amendment Center will officially open. Founder Sherrilyn Ifill will explain why this center is more crucial now than ever. #BlackStarNetwork partner: Fanbasehttps://www.startengine.com/offering/fanbase This Reg A+ offering is made available through StartEngine Primary, LLC, member FINRA/SIPC. This investment is speculative, illiquid, and involves a high degree of risk, including the possible loss of your entire investment. You should read the Offering Circular (https://bit.ly/3VDPKjD) and Risks (https://bit.ly/3ZQzHl0) related to this offering before investing. Download the #BlackStarNetwork app on iOS, AppleTV, Android, Android TV, Roku, FireTV, SamsungTV and XBox http://www.blackstarnetwork.com The #BlackStarNetwork is a news reporting platform covered under Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research.See omnystudio.com/listener for privacy information.
Top intel officials have shifted responsibility on to Defense Secretary Pete Hegseth for sending potentially classified info to Yemen strike Signal group chat. Join this channel for exclusive access and bonus content: https://www.youtube.com/channel/UCkbwLFZhawBqK2b9gW08z3g/join Five Minute News with Anthony Davis is an Evergreen Podcast, covering politics, inequality, health and climate - delivering independent, unbiased and essential news for the US and across the world. Visit us online at http://www.fiveminute.news Follow us on Bluesky https://bsky.app/profile/fiveminutenews.bsky.social Follow us on Instagram http://instagram.com/fiveminnews Support us on Patreon http://www.patreon.com/fiveminutenews You can subscribe to Five Minute News with your preferred podcast app, ask your smart speaker, or enable Five Minute News as your Amazon Alexa Flash Briefing skill. Please subscribe HERE https://www.youtube.com/channel/UCkbwLFZhawBqK2b9gW08z3g?sub_confirmation=1 CONTENT DISCLAIMER The views and opinions expressed on this channel are those of the guests and authors and do not necessarily reflect the official policy or position of Anthony Davis or Five Minute News LLC. Any content provided by our hosts, guests or authors are of their opinion and are not intended to malign any religion, ethnic group, club, organization, company, individual or anyone or anything, in line with the 1st Amendment right to free speech. Learn more about your ad choices. Visit megaphone.fm/adchoices
The latest fallout from the leaked Trump administration war plans that were sent to a group chat, which included a journalist from The Atlantic. Also, an exposure on an Amtrak train in Washington, D.C., adds to the nation's growing measles crisis. Plus, Luigi Mangione asks the court for access to a laptop as he awaits trial for the shooting death of UnitedHealth Care CEO Brian Thompson. And, a closer look at deepfake AI as a fraudulent video of our own Al Roker selling a blood pressure device hits the internet.
In this episode of the National Crawford Roundtable podcast the guys talk about the Signal App security breach, Federal funding being pulled from Columbia University, and the sudden interest by China and Russia regarding ownership of Greenland.
Security Breach Allegations: The report discusses claims that Trump administration officials accidentally included journalist Jeffrey Goldberg in a Signal group chat discussing secret US military plans to strike Houthi targets in Yemen. High-level officials like Defense Secretary Pete Headseth, Vice President Jedi Vance, and Secretary of State Marco Rubio were allegedly involved. Pete Headseth denies the allegations, calling Goldberg a discredited journalist known for spreading hoaxes. Trump's Economic Policies: President Trump estimates that $4 trillion worth of companies are moving back to the US due to tariffs. He highlights the return of high-paying jobs and investments in the US, including a significant investment from Hyundai in a new steel plant in Louisiana. Elon Musk's Media Coverage: The report criticizes the media's coordinated attacks on Elon Musk, portraying him as a disruptive force in government efficiency. It includes a montage of media references to Musk's "chainsaw" approach to federal workforce reduction. Please Hit Subscribe to this podcast Right Now. Also Please Subscribe to the Ben Ferguson Show Podcast and Verdict with Ted Cruz Wherever You get You're Podcasts. Thanks for Listening #seanhannity #hannity #marklevin #levin #charliekirk #megynkelly #tucker #tuckercarlson #glennbeck #benshapiro #shapiro #trump #sexton #bucksexton#rushlimbaugh #limbaugh #whitehouse #senate #congress #thehouse #democrats#republicans #conservative #senator #congressman #congressmen #congresswoman #capitol #president #vicepresident #POTUS #presidentoftheunitedstatesofamerica#SCOTUS #Supremecourt #DonaldTrump #PresidentDonaldTrump #DT #TedCruz #Benferguson #Verdict #maga #presidenttrump #47 #the47morningupdate #donaldtrump #trump #news #trumpnews #Benferguson #breaking #breakingnews #morningupdateYouTube: https://www.youtube.com/@VerdictwithTedCruzSee omnystudio.com/listener for privacy information.
MSNBC's Jason Johnson hosts "The Beat" on Tuesday, March 25, and reports on the fallout from the Trump war plan “group chat” scandal, turmoil surrounding Social Security, and Trump's push for retribution. Rachel Cohen, Barbara McQuade, April Ryan, Rep. André Carson, Sabrina Singh, and Mark Leibovich join.
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.”See omnystudio.com/listener for privacy information.
Questions grow surrounding a shocking security breach after Trump administration officials mistakenly include a journalist to a text chain about secret U.S. military strikes in Yemen. Plus, a judicial clash over the President's deportation flights and use of the Alien Enemies Act. And, the US and Russia begin talks on a partial ceasefire in Ukraine while the Kremlin orders more drone strikes. Susan Glasser, David Drucker, Barbara McQuade, Eric Swalwell, William Taylor, Joel Payne, and Charlie Sykes join as Charles Coleman Jr. hosts The 11th Hour this Monday.
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.”See omnystudio.com/listener for privacy information.
The new JOHN ROSS coffee is here! I've teamed up with Frontier Coffee Company to bring you a funny bled of your favorite flavors of coffee. Check them out here: John Ross's Coffee in Color – Frontier Coffee Company
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.”See omnystudio.com/listener for privacy information.
Jen Psaki speaks to Jeffrey Goldberg, editor in chief of The Atlantic, about how he was mistakenly included on a group chat of high-ranking Trump officials discussing secret war plans. Goldberg reflects on being a firsthand witness such an unprecedented leak and reacts to the backlash from Secretary Pete Hegseth. Later, Senator Adam Schiff gives insight into how Congress is reacting to Goldberg's revelation and how both Republicans and Democrats are ready to hold the administration accountable. Next, Jen highlights on the growing unpopularity of Elon Musk after he trashed social security and threatened its elimination, and why it is a political gift to Democrats. Jen talks to Governor JB Pritzker about Musk's sweeping layoffs and their impact on Illinois, and Former Senator Sherrod Brown reflects on how he is stepping up to address the struggles of American workers. Check out our social pages below:https://twitter.com/InsideWithPsakihttps://www.instagram.com/InsideWithPsaki/https://www.tiktok.com/@insidewithpsakihttps://www.msnbc.com/jen-psakihttps://bsky.app/profile/insidewithpsaki.msnbc.com
MSNBC's Michael Steele hosts "The Beat" on Monday, March 24, and reports on legal battles over Donald Trump's controversial deportation efforts, the future of the Democratic Party, and mounting concerns over Elon Musk's government conflicts of interest. Plus, Steele reports on rising national security fears after a leaked war plan from top U.S. officials. Ankush Khardori, Libby Casey, Eugene Robinson, Alencia Johnson, Rep. Joe Crowley, and Larry Pfeiffer join.
National security officials discussed military plans in a Signal group chat that mistakenly included The Atlantic editor-in-chief Jeffrey Goldberg, according to a report published on Monday. To discuss the revelation and the national security implications, Geoff Bennett spoke with Leon Panetta, the former defense secretary and director of the Central Intelligence Agency. PBS News is supported by - https://www.pbs.org/newshour/about/funders
The Guy Benson Show 03-24-2025 Learn more about your ad choices. Visit podcastchoices.com/adchoices
Sandra Smith, co-anchor of America Reports with Sandra Smith & John Roberts (weekdays 1-3pm ET), joined The Guy Benson Show to discuss the shocking national security leak involving a messaging chain between high-ranking Trump officials that revealed details of a classified military strike plan. Smith and Benson discussed the significance of The Atlantic's editor being accidentally included in the chain, raising serious questions about security protocols amongst the Trump team. They also covered reports that Trump may slow-walk the implementation of some tariffs set to go into effect on April 1st, signaling a potential policy shift. You can listen to the full interview below! Learn more about your ad choices. Visit podcastchoices.com/adchoices