Podcasts about Social engineering

  • 1,026PODCASTS
  • 2,626EPISODES
  • 52mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jul 29, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Social engineering

Show all podcasts related to social engineering

Latest podcast episodes about Social engineering

Versicherungsfunk
Versicherungsfunk Update 29.07.2025

Versicherungsfunk

Play Episode Listen Later Jul 29, 2025 3:16


Die Themen im heutigen Versicherungsfunk Update sind: Allianz bestätigt Hackerangriff – 1,4 Millionen Datensätze kompromittiert Die US-Tochter Allianz Life bestätigte, dass am 16. Juli 2025 Hacker Zugriff auf persönliche Daten erlangten und den Großteil der rund 1,4 Millionen Kundendatensätze kompromittierten – darunter auch Daten von Finanzberater*innen und Mitarbeitenden. Der Angriff wurde durch Social Engineering durchgeführt, bei dem menschliche Schwachstellen gezielt ausgenutzt wurden, etwa durch gefälschte Hilfetelefonate oder legitime Anfragen. Die betroffenen Personen sollen ab dem 1. August benachrichtigt werden und erhalten Angebote zu Identitätsdiebstahlschutz und Kreditüberwachung, während die Untersuchung weiterhin läuft. Mehr dazu >>> Deutsche Ärzte Finanz und apoFinanz fusionieren Die Deutsche Ärzte Finanz (DÄF) und apoFinanz bündeln ab August 2025 ihre Kräfte. Die neue Vertriebseinheit firmiert unter dem Namen „Deutsche Ärzte Finanz“ und wird mit rund 500 selbstständigen Berater über 320.000 Kunden betreuen. Die apoBank erhöht dafür ihren Anteil an der DÄF auf 49 %, AXA bleibt Mehrheitsgesellschafterin. Ziel ist ein umfassender Allfinanzvertrieb für akademische Heilberufe – mit starker mobiler Beratung und neuen Karriereperspektiven. HanseMerkur wird zur SE – Weichenstellung für internationales Wachstum Die HanseMerkur Holding AG firmiert seit dem 24. Juli 2025 als europäische Aktiengesellschaft (SE). Der Schritt erfolgt im Jubiläumsjahr und soll vor allem die Expansion im Bereich Reiseversicherung innerhalb der EU unterstützen. Für Kunden und Partner ändert sich nichts. Getsafe plant Zusammenarbeit mit Provinzial als neuem Risikoträger Die Provinzial soll künftig als Risikoträger für die Policen der Getsafe Insurance AG fungieren. Das bestätigte Getsafe-Gründer Christian Wiens gegenüber procontra. Eine entsprechende Kooperation sei geplant, für Kunden ändere sich dadurch nichts. Aktuell prüft das Bundeskartellamt das Vorhaben – dabei gehe es laut Wiens nicht um einen Bestandskauf, sondern um eine reine Risikoübernahme im Hintergrund. Private Kleinvermieter bleiben stabilisierender Faktor am Wohnungsmarkt Trotz steigender Anforderungen und politischer Unsicherheit zeigen sich private Kleinvermieter*innen in Deutschland weiterhin investitionsbereit und zurückhaltend bei Mieterhöhungen. Laut einer neuen Analyse der DI Deutschland.Immobilien AG verfügen sie über rund 60 % des Mietwohnungsangebots und vermieten meist langfristig im Rahmen ihrer Altersvorsorge. Zwar ist der Wille zur energetischen Sanierung vorhanden, doch fehlt es vielen an Informationen über politische Vorgaben – nur 17 % der Befragten haben sich intensiv mit den Klimazielen bis 2045 beschäftigt. Die Zufriedenheit mit der eigenen Vermietung bleibt hoch, die mit der Wohnungspolitik hingegen gering. Private Haushalte stemmen Großteil der Gesundheitskosten Im Jahr 2023 trugen private Haushalte über 53 % zur Finanzierung der laufenden Gesundheitsausgaben in Deutschland bei – das entspricht 262,5 Milliarden Euro. Der Staat übernahm nur noch rund 15 %, ein Drittel weniger als 2022. Grund: auslaufende Corona-Sondermaßnahmen. Auch Unternehmen zahlten deutlich mehr.

Cyber Security Today
The Evolution and Defense Against Advanced Phishing Attacks

Cyber Security Today

Play Episode Listen Later Jul 26, 2025 49:32


This is repeat of a broadcast from last October, still relevant, especially in the light of so many current breaches which have begun not with technical weaknesses but with phishing and social engineering.   In this deeper dive episode of 'Cybersecurity Today,' hosts Jim Love and David Shipley, a top cybersecurity expert from Beauceron Security, explore the evolution, intricacies, and impact of phishing attacks. They highlight recent sophisticated phishing strategies that combine AI, complex setups, and psychological manipulation to deceive even the most knowledgeable individuals. The discussion covers various types of phishing including spearphishing, whaling, sharking, QR phishing, and the emotional and psychological tactics employed by attackers. They also delve into practical defense mechanisms such as Multi-Factor Authentication (MFA), passkeys, and the importance of fostering a security-conscious workplace culture. The episode emphasizes the need for a diversified security approach involving technology, training, and emotional intelligence, while encouraging assertiveness in questioning potentially fraudulent communication. 00:00 Introduction to Cybersecurity Today 00:40 The Evolution of Phishing Attacks 01:44 Deep Dive into Phishing Techniques 03:31 History of Phishing 06:04 Types of Phishing: From Email to Whaling 10:06 Advanced Phishing Tactics 19:25 The Psychology Behind Phishing 26:03 Phishing Tactics: Free Gift Card Scams 26:33 The Power of Scarcity in Phishing 28:27 Authority and Phishing: Impersonation Tactics 29:11 Consistency: Small Requests Leading to Big Scams 30:14 Liking and Social Proof in Social Engineering 32:15 The Evolution of Phishing Techniques 35:31 The Role of MFA in Enhancing Security 38:35 Passkeys and the Future of Authentication 44:57 Building a Security-Conscious Workplace Culture 48:47 Conclusion and Final Thoughts

Putting the AP in hAPpy
Episode 348: Converting Vendors From Check to ACH Payment? Five Do's and One Big Don't Before You Start

Putting the AP in hAPpy

Play Episode Listen Later Jul 24, 2025 28:35


Check fraud is increasing, they take longer to settle, and they cost more in supplies and manpower.  All great reasons to convert your check payment vendors to ACH payment.  But don't use that as a way to clean your vendor master file, that task needs to be done first.  Here are five do's and one big don't that you need to think about before you get started.  Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    Digital Product:  Vendor Banking Form Template  On-Demand Webinar:  8 Steps to Clean Your Vendor Master File Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

The Social-Engineer Podcast
Ep. 313 - Security Awareness Series - The Importance of Securing Virtual Events With Trent Waterhouse

The Social-Engineer Podcast

Play Episode Listen Later Jul 21, 2025 27:56


Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Trent Waterhouse. Trent is the CMO of GlobalMeet, a leading virtual event technology company with a scalable, flexible, and secure hybrid event streaming platform built and supported by experienced event experts. Trent has a proven track record of driving growth and innovation with 35 years of expertise leveraging a field sales marketing model that aligns sales, marketing, and R&D to think like a customer, act like a partner, and measure success through customer satisfaction and net promoters. Built for growth, Trent's unique blend of technology understanding and B2B marketing skills have been proven to help companies grow revenue profitably, improve customer experiences, build new partnerships, and expand opportunity pipelines. [July 21, 2025]   00:00 - Intro 00:50 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                02:30 - Trent Waterhouse Intro 03:11 - Starting Out Pre-Video 04:53 - A Brave New World 08:07 - Going Public 10:21 - Rise of the DeepFakes 13:03 - Video Watermarking 15:23 - A Simple Warning Will Do 19:11 - Staying Up to Date 21:22 - Insider Threat 23:42 - Find Trent Waterhouse Online    -          Website: https://www.globalmeet.com/ -          Instagram: https://www.instagram.com/globalmeet/ -          LinkedIn: https://www.linkedin.com/in/trentonwaterhouse/ 24:44 - Book Recommendations -          Pattern Breakers - Mike Maples, Jr, Peter Ziebelman 27:16 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

Cyber Security Today
NPM Linter Packages Hijacked, Microsoft's China Issue, and AI in Phishing Attacks: Cybersecurity Today:

Cyber Security Today

Play Episode Listen Later Jul 21, 2025 17:06 Transcription Available


In this episode of Cybersecurity Today, host David Shipley discusses several pressing cybersecurity issues. First, popular NPM Linter packages were hijacked via phishing to spread malware, affecting millions of downloads.  Concurrently, Ukrainian CERT uncovers new phishing campaigns tied to APT28 using large language models for command and control. Microsoft discontinues the use of China-based engineers for US Department of Defense systems following a controversial report. Lastly, social engineering, facilitated by AI, becomes a greater threat than zero-day exploits. The episode emphasizes the need for stronger maintainer security, multifactor authentication, and a comprehensive understanding of social engineering risks.  00:00 Introduction - 10 Million Downloads 01:30 NPM Linter Packages Hijacked 05:05 Social Engineering and AI in Cybersecurity 08:57 Microsoft's China-Based Engineers Controversy 12:15 The Real Threat: Social Engineering 16:39 Conclusion and Call to Action

Dangerous INFO podcast with Jesse Jaymz
*The Interview* 93 featuring Patrick Wood, Technocracy, Agenda 2030, Sustainable Development, United Nations, war against humanity, social engineering

Dangerous INFO podcast with Jesse Jaymz

Play Episode Listen Later Jul 19, 2025 114:41


Send us a textThis is the interview only portion of our original episode #93 .Patrick Wood is a leading and critical expert on Sustainable Development, Green Economy, Agenda 21, 2030 Agenda and historic Technocracy.He is the author of Technocracy Rising: The Trojan Horse of Global Transformation (2015) and co-author of Trilaterals Over Washington, Volumes I and II (1978-1980) with the late Antony C. Sutton.Wood remains a leading expert on the elitist Trilateral Commission, their policies and achievements in creating their self-proclaimed “New International Economic Order” which is the essence of Sustainable Development on a global scale.An economist by education, a financial analyst and writer by profession and an American Constitutionalist by choice, Wood maintains a Biblical world view and has deep historical insights into the modern attacks on sovereignty, property rights and personal freedom. Such attacks are epitomized by the implementation of U.N. policies such as Agenda 21, Sustainable Development, Smart Growth and in education, the widespread adoption of Common Core State Standards.Wood is a frequent speaker and guest on radio shows around the nation. His current research builds on Trilateral Commission hegemony, focusing on Technocracy, Transhumanism and Scientism, and how these are transforming global economics, politics and religion.Patrick's website https://www.technocracy.news/SUPPORT THE SHOWBuy Me A Coffee http://buymeacoffee.com/DangerousinfopodcastSubscribeStar http://bit.ly/42Y0qM8Super Chat Tip https://bit.ly/42W7iZHBuzzsprout https://bit.ly/3m50hFTPaypal http://bit.ly/3Gv3ZjpPatreon http://bit.ly/3G3 SMART is the acronym that was created by technocrats that have setup the "internet of things" that will eventually enslave humanity to their needs. Support the showCONNECT WITH USWebsite https://www.dangerousinfopodcast.com/Guilded Chatroom http://bit.ly/42OayqyEmail the show dangerousinfopodcast@protonmail.comJoin mailing list http://bit.ly/3Kku5YtSOCIALSInstagram https://www.instagram.com/dangerousinfo/Twitter https://twitter.com/jaymz_jesseGab https://gab.com/JessejaymzTruth Social https://truthsocial.com/@jessejaymzWATCH LIVE YouTube https://www.youtube.com/@DANGEROUSINFOPODCASTRumble https://rumble.com/c/DangerousInfoPodcast Twitch https://www.twitch.tv/dangerousinfopodcastPilled https://pilled.net/profile/144176Facebook https://www.facebook.com/DangerousInfoPodcast/BitChute: https://www.bitchute.com/channel/egnticQyZgxDCloutHub https://clouthub.com/DangerousINFOpodcastDLive https://...

Cloud Accounting Podcast
The Losers of AI & What CPAs Need to Know About OBBBA

Cloud Accounting Podcast

Play Episode Listen Later Jul 17, 2025 75:24


Why is AI failing at basic accounting tasks while claiming to outsmart PhD students? Blake and David dive into the stark reality of AI implementation in accounting, from Ramp's promising new expense management agents to QuickBooks' baffling suggestion to credit and debit the same account. You'll discover the critical security vulnerabilities in AI systems and learn why clients are increasingly using AI to fact-check their accountants' advice. Plus, get a comprehensive breakdown of the top 10 tax planning opportunities in the One Big, Beautiful Bill Act—from permanent 100% bonus depreciation to Trump accounts for children. The hosts also explore which companies will be AI's biggest losers and why the future of accounting lies in financial management, not advisory services.SponsorsOnPay - http://accountingpodcast.promo/onpayCloud Accountant Staffing - http://accountingpodcast.promo/casChapters(00:30) - The Big Beautiful Bill: Tax Provisions Overview (01:53) - AI in Accounting: RAMP's New AI Agents (02:56) - QuickBooks AI Agents: Frustrations and Feedback (06:05) - RAMP's AI Agents: Features and Benefits (14:38) - AI's Impact on Employment: Winners and Losers (20:54) - Grok 4: The Future of AI in Accounting (36:53) - Juno and Tax Prep Automation (37:52) - The Rise of AI in Cyber Attacks (38:26) - Social Engineering and AI (39:18) - Hidden AI Prompts in Academic Papers (41:25) - AI Security Risks and Internal Controls (45:45) - The Accountant's Labor Shortage (46:59) - Tax Planning Opportunities in the New Bill (56:29) - The Impact of the New Tax Bill (01:00:45) - Final Thoughts and Wrap-Up  Show NotesRamp agents: Let finance teams do finance https://ramp.com/blog/ramp-agents-announcementMicrosoft shares $500M in AI savings internally days after cutting 9,000 jobshttps://techcrunch.com/2025/07/09/microsoft-shares-500m-in-ai-savings-internally-days-after-cutting-9000-jobs/Indeed, Glassdoor to lay off 1300 staff amid AI pushhttps://techcrunch.com/2025/07/11/indeed-glassdoor-to-lay-off-1300-staff/Workday Stock Takes A Hit After Piper Sandler Survey Flags AI-Driven Headwinds, But Retail's Optimistic https://stocktwits.com/news-articles/markets/equity/workday-stock-takes-a-hit-after-piper-sandler-survey-flags-ai-driven-headwinds/ch8GfqaR5kYElon Musk's xAI launches Grok 4 alongside a $300 monthly subscription https://techcrunch.com/2025/07/09/elon-musks-xai-launches-grok-4-alongside-a-300-monthly-subscription/Hidden AI prompts in academic papers spark concern about research integrity https://www.japantimes.co.jp/news/2025/07/04/japan/ai-research-prompt-injection/Tax provisions in the One Big Beautiful Bill Act https://www.journalofaccountancy.com/news/2025/jun/tax-changes-in-senate-budget-reconciliation-bill/Need CPE?Get CPE for listening to podcasts with Earmark: https://earmarkcpe.comSubscribe to the Earmark Podcast: https://podcast.earmarkcpe.comGet in TouchThanks for listening and the great reviews! We appreciate you! Follow and tweet @BlakeTOliver and @DavidLeary. Find us on Facebook and Instagram. If you like what you hear, please do us a favor and write a review on Apple Podcasts or Podchaser. Call us and leave a voicemail; maybe we'll play it on the show. DIAL (202) 695-1040.SponsorshipsAre you interested in sponsoring The Accounting Podcast? For details, read the prospectus.Need Accounting Conference Info? Check out our new website - accountingconferences.comLimited edition shirts, stickers, and other necessitiesTeePublic Store: http://cloudacctpod.link/merchSubscribeApple Podcasts: http://cloudacctpod.link/ApplePodcastsYouTube: https://www.youtube.com/@TheAccountingPodcastSpotify: http://cloudacctpod.link/SpotifyPodchaser: http://cloudacctpod.link/podchaserStitcher: http://cloudacctpod.link/StitcherOvercast: http://cloudacctpod.link/OvercastClassifiedsREFRAME 2025 - http://accountingpodcast.promo/reframe2025Want to get the word out about your newsletter, webinar, party, Facebook group, podcast, e-book, job posting, or that fancy Excel macro you just created? Let the listeners of The Accounting Podcast know by running a classified ad. Go here to create your classified ad: https://cloudacctpod.link/RunClassifiedAdTranscriptsThe full transcript for this episode is available by clicking on the Transcript tab at the top of this page

Putting the AP in hAPpy
Episode 347: Access Gone Wrong - 4 Times When Employees Exploited Their Access And Colluded With Fraudsters

Putting the AP in hAPpy

Play Episode Listen Later Jul 17, 2025 21:25


Are you performing security audits, so you know who has access to your systems?  Listen to today's episode to for 4 scenarios when employees or contractors used their system access for fraudulent purposes.  Then see how you can get a 5-step plan to perform a system audit.Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    Webinars: A Security Audit to Protect Vendor Data and Avoid Fraud  Prevent Payments to Internal Fraudsters - Stopping Bad Actors in Your Organization Collusion CasesTD Bank Employee's Bribery Scheme: A $37,000 Fraud That Cost the Bank $72,000  Postal Service says many checks stolen through the mail are done by its own employees  Brazilian police arrest IT worker over $100 million cyber theft Former Banker Arrested for Allegedly Obtaining $2.7 Million in COVID Business-Relief Funds Using Stolen IDs of Disabled Persons Vendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Vendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Cyber Crime Junkies
AI Is Attacking Healthcare—Social Engineering EXPOSED. (Dr Sergio Sanchez)

Cyber Crime Junkies

Play Episode Listen Later Jul 15, 2025 63:10


Dr. Sergio Sanchez—former leader and advisor at Apple, The Vatican, Activision and medical doctor—exposes how cybercriminals are using AI in healthcare and AI Social Engineering to clone voices, fake identities, and empty your savings without a trace. But that's just the beginning…In this mind-blowing episode, we dive into:·       The dark side of AI (you won't believe how easily your identity can be stolen)·       How a medical doctor broke into cybersecurity leadership·       Why the best leaders aren't always the loudest·       Apple's secret to perfect customer experience·       Mental health, tech burnout, and protecting your team in the digital ageThis isn't a sci-fi thriller—it's your new survival guide.

Greg & Dan Show Interviews
Social Engineering at Scale

Greg & Dan Show Interviews

Play Episode Listen Later Jul 14, 2025 5:16


Greg and Dan talk with Dave Johnson, at Pearl Technology, about the emergence of a new ransomware group known as SafePay and its recent cyberattack on Ingram Micro, a global leader in IT distribution and supply chain services. Ingram Micro, which generates over $48 billion in annual revenue and employs tens of thousands of people worldwide, fell victim to a major breach despite its vast resources and robust infrastructure. The situation highlights the growing sophistication of cybercriminals and the reality that no organization is immune to cyberattacks, regardless of size or budget. SafePay, the ransomware group behind the attack, has reportedly deployed over 220 ransomware payloads to date. Previously known for targeting organizations in the legal sector, the group appears to be expanding its focus to global enterprise-level targets, with Ingram Micro now in their crosshairs.See omnystudio.com/listener for privacy information.

Audio Mises Wire
Social Engineering under the Fourteenth Amendment

Audio Mises Wire

Play Episode Listen Later Jul 12, 2025


Murray Rothbard called egalitarianism a "revolt against nature," and he believed that the egalitarianism inherent in the Fourteenth Amendment was socially harmful. Social engineering never turns out well, but that doesn't discourage progressives from engaging in it.Original article: https://mises.org/mises-wire/social-engineering-under-fourteenth-amendment

Mises Media
Social Engineering under the Fourteenth Amendment

Mises Media

Play Episode Listen Later Jul 12, 2025


Murray Rothbard called egalitarianism a "revolt against nature," and he believed that the egalitarianism inherent in the Fourteenth Amendment was socially harmful. Social engineering never turns out well, but that doesn't discourage progressives from engaging in it.Original article: https://mises.org/mises-wire/social-engineering-under-fourteenth-amendment

CS Joseph Podcast
Social Responsibility and Social Engineering | Cutting Edge | CS Joseph

CS Joseph Podcast

Play Episode Listen Later Jul 11, 2025 44:27


Become Part of our Community or Take our Free Personality Test!: https://linktr.ee/csjosephCS Joseph discusses Social Responsibility and Social Engineering in this previously unreleased Cutting Edge Conference, enjoy!

Drowning Verdict
Understanding Deepfakes and Digital Fraud: Insights from Aaron Painter, CEO of Nametag

Drowning Verdict

Play Episode Listen Later Jul 11, 2025 27:45


Get your Magic Mind here: https://magicmind.com/CHIPM20You get 20% off a one-time purchase and up to 48% off subscriptions with my code: CHIPM20In this episode, we dive into the rising threats of digital fraud and how emerging technology like deepfakes is reshaping our digital identity landscape. Joining me is Aaron Painter, CEO of Nametag, as we discuss innovative ways to verify real identities in an age where fakes become increasingly convincing. Tune in to understand how to protect yourself and your business from the evolving landscape of fraud. This is essential listening for anyone looking to stay ahead in the digital era.Learn more about Nametag at Getnametag.com Front Run The Week: Want to catch the next big crypto move before it hits the headlines? Get my free newsletter at tokentrust.substack.com for exclusive early insights.The Chip Mahoney Show is a Big Pond production. This podcast is for entertainment and educational purposes only.For media inquiries or guest bookings, please contact:DV Collective at dvpodcastshow@gmail.comMusic licensed via Spotify Creator tools.

How to Be Awesome at Your Job
1074: How to Improve Negotiations–without Compromising–with Dr. Joshua N. Weiss

How to Be Awesome at Your Job

Play Episode Listen Later Jul 10, 2025 44:19


Dr. Joshua N. Weiss discusses the major misconceptions surrounding negotiations—and offers five steps to build your confidence and resilience as a negotiator.— YOU'LL LEARN — 1) The big negotiation mistake most people make2) The mental reframe that helps you negotiate better3) The five-step strategy to reviving stalled negotiationsSubscribe or visit AwesomeAtYourJob.com/ep1074 for clickable versions of the links below. — ABOUT JOSH — Dr. Joshua N. Weiss is a renowned negotiation and conflict resolution and leadership expert. As a Senior Fellow at the Harvard Negotiation Project and co-founder of the Global Negotiation Initiative at Harvard University, Dr. Weiss brings unparalleled expertise to his field. He also directs the MS in Leadership and Negotiation program at Bay Path University and runs a private consulting firm, offering tailored negotiation and conflict resolution, and leadership solutions for businesses, organizations, international entities, governments, and individuals. • Book: Getting Back to the Table: 5 Steps to Reviving Stalled Negotiations• Book: The Book of Real-World Negotiations: Successful Strategies From Business, Government, and Daily Life• Study: “Trajectories Toward Peace: Mediator Sequencing Strategies in Intractable Communal Conflicts”• Website: JoshuaNWeiss.com — RESOURCES MENTIONED IN THE SHOW — • Book: Getting to Yes: Negotiating Agreement Without Giving In by William Ury and Robert Fisher• Book: Negotiating the Nonnegotiable: How to Resolve Your Most Emotionally Charged Conflicts by Daniel Shapiro• Book: The Tipping Point: How Little Things Can Make a Big Difference by Malcolm Gladwell • Book: Blink: The Power of Thinking Without Thinking by Malcolm Gladwell • Book: David and Goliath: Underdogs, Misfits, and the Art of Battling Giants by Malcolm Gladwell • Book: Revenge of the Tipping Point: Overstories, Superspreaders, and the Rise of Social Engineering by Malcolm Gladwell— THANK YOU SPONSORS! — • Strawberry.me. Claim your $50 credit and build momentum in your career with Strawberry.me/Awesome• Plaud.ai. Use the code AWESOME and get a discount on your order• Rula. Connect with quality therapists and mental health experts who specialize in you at Rula.com/AwesomeSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Friendship IRL
Social Engineering Your Way Into Friendship, From Picnics to the Six Points of Connection, with Charlotte Massey

Friendship IRL

Play Episode Listen Later Jul 10, 2025 63:24


Have you ever moved somewhere new and felt like you were on the outside looking in?This was Charlotte Massey when she moved to Seattle in the midst of the pandemic, when making friends was borderline impossible. Instead of accepting isolation, she got strategic about it. We're taking friend-dating spreadsheets and sales funnel approaches.Charlotte is the executive director for the Seattle chapter of the U.S. Chamber of Connection, a new civic organization tackling the loneliness epidemic, and founder of the Seattle Picnic Society. In this episode, she offers so much inspiration and great advice for those not feeling connected where they're at.Whether you're new to your city or you've been there for years, the principles are the same. Get specific about your invites. Show up consistently. Don't be afraid to follow up multiple times. Most importantly, if the community you want doesn't exist, create it.In this episode you'll hear about:Charlotte's move in 2021 and the challenges she faced, from the pandemic to the “Seattle freeze”How Charlotte used a sales funnel approach, “friend dating,” and intentional invites to connect new peopleThe Seattle Picnic Society – picnics that grew from five to one hundred attendees, and how you could create something similar in your communityBeing bold and persistent in reaching out to potential friends and looking at how you can improve on the Six Points of Connection Resources & LinksLearn more about the Seattle Picnic Society and the Six Points of Connection on the U.S. Chamber of Connection website.Like what you hear? Visit my website, leave me a voicemail, and follow me on Instagram and TikTok!Want to take this conversation a step further? Send this episode to a friend. Tell them you found it interesting and use what we just talked about as a conversation starter the next time you and your friend hang out!

Putting the AP in hAPpy
Episode 346: A Big IRS Tax Reporting Change Effective For Tax Year 2026 That Can Help Your Team – But Don't Forget About This

Putting the AP in hAPpy

Play Episode Listen Later Jul 10, 2025 14:39


After last week's episode revealing an IRS announcement, once the big, beautiful tax bill was passed there is at least more tax reporting change for Tax Year 2026 that can reduce a huge burden, but there is one more factor to keep in mind.  Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:   Vendor Master File Tip of the Week - IRS 1099-MISC/NEC and 1042-S 2026 Due Dates For TY 2025 Journal of Accountancy - Tax provisions in the One Big Beautiful Bill Act Journal of Accountancy – IRS Staffing, Budget Cuts Threaten 2026 Filing Season, Taxpayer Advocate Says Taxes For Expats – One Big Beautiful Bill – and What it Means for Your Business Vendor Process Training Center > Resource Library for State Research https://training.debrarrichardson.com/resources Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

No Password Required
On No Password Required Podcast Episode 61 — Kathy Collins

No Password Required

Play Episode Listen Later Jul 9, 2025 40:15


keywordscybersecurity, culinary arts, penetration testing, career transition, high-pressure situations, horror films, IT, social engineering, cooking, cybersecurity horror, dark web, pen testing, B-Sides community, cybersecurity, lifestyle polygraph, music, childhood memories, culinary skills, competition takeawaysKathy Collins transitioned from IT to culinary arts and back to cybersecurity.Her journey highlights the transferable skills between cooking and cybersecurity.Physical penetration testing involves unpredictable human elements.High-pressure situations in cooking can prepare one for cybersecurity challenges.Unexpected challenges can arise in both culinary events and cybersecurity tests.The importance of communication in cybersecurity engagements is crucial.Kathy's experience in cooking for large groups parallels the complexities of cybersecurity.The need for proper notification in penetration testing to avoid misunderstandings.Kathy's culinary background influences her approach to problem-solving in cybersecurity.There is a lack of big-budget horror films focused on cybersecurity. Going with the correct skeptical mindset is crucial.Using tools like Flare helps in dark web monitoring.B-Sides events are affordable and beneficial for newcomers.Engaging with the community fosters excitement and learning.Hannibal Lecter would be an interesting pen test partner.The Jaws soundtrack sets a perfect mood for stealth.Bonding over music can strengthen family relationships.Childhood toys can reveal early hacker tendencies.Culinary skills can be approached with a hacker mindset.Competition in cooking shows often emphasizes drama over skill. summaryIn this episode of the No Password Required podcast, host Jack Clabby and co-host Kaylee Melton welcome Kathy Collins, a security consultant at Secure Ideas. Kathy shares her unique journey from working in IT to pursuing a culinary career, and then back to cybersecurity. The conversation explores the transferable skills between cooking and cybersecurity, the unpredictability of physical penetration testing, and the high-pressure situations faced in both fields. Kathy also recounts memorable experiences from her culinary career and discusses the lack of horror films centered around cybersecurity. In this engaging conversation, the speakers delve into various aspects of cybersecurity, including the use of the dark web in penetration testing, the importance of community events like B-Sides, and the fun of the Lifestyle Polygraph segment. They also share personal anecdotes about music, childhood memories, and culinary skills, creating a rich tapestry of insights and experiences in the cybersecurity field. titlesFrom Chef to Cybersecurity: A Unique JourneyThe Culinary Path to CybersecurityHigh Stakes: Cooking and Cybersecurity Under PressurePenetration Testing: The Culinary Connection Sound Bites"I had to do some soul searching.""I was like, what if I have to do...""It's disturbingly easy.""There are so many opportunities there.""Going with the correct skeptical mindset.""We have a tool that we use called Flare.""They should attend them, first of all.""I had an Easy Bake Oven and took it apart." Chapters00:00 Introduction to Cybersecurity and Culinary Journeys02:46 From IT to Culinary Arts: A Unique Transition06:02 The Shift Back to Cybersecurity09:00 Experiences in Physical Penetration Testing11:48 High-Pressure Situations: Cooking vs. Cybersecurity15:02 Unexpected Challenges in Culinary Events17:54 The Intersection of Horror and Cybersecurity23:32 Exploring the Dark Web in Pen Testing25:34 Engaging with the B-Sides Community27:09 The Lifestyle Polygraph: Fun and Games 31:09 Bonding Over Music and Childhood Memories34:17 Culinary Skills and Competition Insights

Title Agents Podcast
It's Not If, It's When: Title Agents vs. Cybercrime

Title Agents Podcast

Play Episode Listen Later Jul 8, 2025 27:10


Wire fraud is no longer a distant threat, it's a daily risk for title professionals across the country. In this special deep-dive edition, Zina and Crosby explore the rise of social engineering in real estate transactions and how fraudsters are exploiting urgency, trust, and technology to steal millions. Backed by 2024 FBI data and real-world case studies, this episode breaks down the new fraud playbook and equips listeners with six actionable strategies to protect their clients, their closings, and their companies.   What you'll learn from this episode How social engineering scams are evolving with AI voice fakes, spoofed emails, and seller impersonation The financial and legal risks of wire fraud Six critical actions every title company should implement today to strengthen its fraud defenses How to use tools like Closinglock, CertifID, and TrueWire to verify identities and prevent fund redirection What to do in the first 72 hours after a suspected attack   Resources mentioned in this episode Internet Crime Complaint Center CISA FinCEN American Land Title Association National Association of REALTORS® Closinglock TrueWire™ Wire Fraud Software CertifID   Connect With UsLove what you're hearing? Don't miss an episode! Follow us on our social media channels and stay connected. Explore more on our website: www.alltechnational.com/podcast Stay updated with our newsletter: www.mochoumil.com Follow Mo on LinkedIn: Mo Choumil Stop waiting on underwriter emails or callbacks—TitleGPT.ai gives you instant, reliable answers to your title questions. Whether it's underwriting, compliance, or tricky closings, the information you need is just a click away. No more delays—work smarter, close faster. Try it now at www.TitleGPT.ai. Closing more deals starts with more appointments. At Alltech National Title, our inside sales team works behind the scenes to fill your pipeline, so you can focus on building relationships and closing business. No more cold calling—just real opportunities. Get started at AlltechNationalTitle.com. Extra hands without extra overhead—that's Safi Virtual. Our trained virtual assistants specialize in the title industry, handling admin work, client communication, and data entry so you can stay focused on closing deals. Scale smarter and work faster at SafiVirtual.com.

Paul's Security Weekly
North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran - SWN #491

Paul's Security Weekly

Play Episode Listen Later Jul 4, 2025 28:50


North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran on this edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-491

Jungunternehmer Podcast
Andrej Safundzic: Von Tech4Germany zum 65-Millionen-Dollar-Startup - Wie Lumos die Zukunft der Cyber-Security gestaltet

Jungunternehmer Podcast

Play Episode Listen Later Jul 4, 2025 49:37


Andrej Safundzic, Gründer von Lumos, spricht mit Mike Mahlkow über seinen beeindruckenden Weg von Social Enterprises in Uganda über die deutsche Bundesregierung bis hin zum Silicon Valley. Mit 65 Millionen Dollar Funding baut er heute eine der innovativsten Cyber-Security-Lösungen. Andrej teilt tiefe Einblicke in die Zukunft der Cyber-Security, die Bedeutung von AI-Agents und warum Deutschland der beste zweite Standort für Tech-Unternehmen werden sollte. Was du lernst: Von Deutschland in die Welt: Wie Andrej erst Social Enterprises in Uganda gründete Warum er Tech4Germany aufbaute und vom Bundeskanzleramt übernommen wurde Cyber-Security und AI: Warum Identity & Access Management durch AI-Agents wichtiger wird Wie sich Cyber-Angriffe durch Voice-AI und Social Engineering verändern Deutschland vs. Silicon Valley: Warum Deutschland der beste zweite Standort für Tech-Unternehmen werden sollte Die Bedeutung von Qualität und Nachhaltigkeit im deutschen Markt Story-Led Companies: Wie Lumos durch eine klare Vision und Story Mitarbeiter begeistert Warum Cyber-Security der neue "Polizist" der digitalen Welt ist AI-Transformation: Wie Unternehmen sich auf die AI-Revolution vorbereiten sollten Die Bedeutung von frühem Experimentieren mit neuen Technologien ALLES ZU UNICORN BAKERY: https://zez.am/unicornbakery  Mehr zu Andrej: LinkedIn: https://www.linkedin.com/in/andrejsafundzic/  Website: https://www.lumos.com/  Mehr zum Co-Host Mike: LinkedIn: https://www.linkedin.com/in/mikemahlkow/  Website: https://fastgen.com Join our Founder Tactics Newsletter: 2x die Woche bekommst du die Taktiken der besten Gründer der Welt direkt ins Postfach: https://www.tactics.unicornbakery.de/  Kapitel: (00:00:00) Wer ist Andrej Safundzic? (00:01:17) Warum gründet man ein Startup in Uganda? (00:03:36) Vom Bundeskanzleramt gekauft (00:11:27) Von Deutschland in die USA: Warum San Francisco? (00:21:30) Die Gefahr von Voice-Agents & Cyber-Angriffen (00:29:52) Bis zu welcher Gefahr deckt Lumos die Sicherheit ab? (00:36:00) Die nächste Stufe der Sicherheit (00:40:33) Lumos als Story-led Company

Hack Naked News (Audio)
North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran - SWN #491

Hack Naked News (Audio)

Play Episode Listen Later Jul 4, 2025 28:50


North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran on this edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-491

Hack Naked News (Video)
North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran - SWN #491

Hack Naked News (Video)

Play Episode Listen Later Jul 4, 2025 28:50


North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran on this edition of the Security Weekly News! Show Notes: https://securityweekly.com/swn-491

Putting the AP in hAPpy
Episode 345: What The IRS Just Announced About The FIRE System

Putting the AP in hAPpy

Play Episode Listen Later Jul 3, 2025 7:36


Check out the IRS's announcement about changes to e-filing just before the July 4th holiday! Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:   Vendor Master File Tip of the Week - Demo of the IRS e-News Subscriptions https://youtu.be/Cwy9QDYX-ZM Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

The Social-Engineer Podcast
Ep. 250 - Human Element Series - Rationalize Minimalize and Project with Agent Brad Beeler REPLAY

The Social-Engineer Podcast

Play Episode Listen Later Jun 30, 2025 43:45


REPLAY (Original Air Date March 11, 2024)   Today we are joined by Agent Brad Beeler. Assistant to the Special Agent in Charge Brad Beeler has been with the United States Secret Service for the past 25 years. He currently serves as instructor and Secret Service liaison at the National Center for Credibility Assessment (NCCA) at Fort Jackson, South Carolina. Over the past 8 years in this role, he has trained agents throughout the federal law enforcement and intelligence community in credibility assessment and elicitation techniques.   Prior to arriving at NCCA, he was a polygraph examiner in the Chicago and St. Louis Field Offices and served on the permanent protection detail of former President George HW Bush and numerous foreign heads of state. Over the past 17 years as a federal polygraph examiner Special Agent Beeler has secured hundreds of confessions on high-profile investigations, often leading to the identification of previously unknown victims of serial offenders of both child exploitation and homicide investigations. Agent Beeler holds a master's degree in criminology and was previously selected as the U.S. Secret Service - Special Agent of the Year for his involvement in combating crimes against children.   Widely considered a communications expert in the U.S. federal law enforcement community, Agent Beeler has provided countless domestic and international presentations to law enforcement and intelligence agencies seeking to enhance their interviewing programs. [March 11, 2024]   00:00 - Intro 00:21 - Intro Links -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 03:05 - Agent Brad Beeler Intro 05:05 - Part of a Team 07:58 - One of Lincoln's Final Acts 08:52 - Dual Mission 11:45 - The Broadband Effect 14:38 - Team Effort 17:35 - Worst of the Worst 21:13 - Common Ground 23:36 - Letting Them Be Heard 25:51 - Lyrics, Songs and Dance 28:49 - Mental Health Mandates 35:11 - Mentors -          Mrs. Bertran - Teacher -          Brian Leary - DHS Program Manager 37:21 - Book Recommendations -          The Interrogator - Hanns Scharff -          Spy the Lie - Philip Houston -          Captivate & Cues - Vanessa Van Edwards 39:24 - Find Agent Brad Beeler online -          Website: www.usajobs.gov -          Website: www.secretservice.gov -          LinkedIn: linkedin.com/in/bradbeeler1865/ 40:47 - Guest Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

Risky Women Radio
Evolving Nature of Corporate Fraud: Zoë Newman

Risky Women Radio

Play Episode Listen Later Jun 30, 2025 36:19 Transcription Available


Zoe Newman, Regional Managing Director and Global Co-Head of Financial Investigations at Kroll, discussed her 25-year career at the firm, focusing on complex fraud investigations in emerging markets. She highlighted the rise of organized crime using AI and social engineering to target corporates, emphasizing the need for better employee training and data monitoring. Newman noted the growing importance of supply chain risk, bribery and corruption, and culture investigations. SHOW NOTES 01:16 Career Journey 14:40 Evolution & Challenges in Corporate Fraud 25:45 Trends & Opportunities in Corporate Investigations 30:48 Final Thoughts and Recommendations

Putting the AP in hAPpy
Episode 344: Another Fraudulent Payment After A BEC Scam Goes to Court – Who Won?

Putting the AP in hAPpy

Play Episode Listen Later Jun 26, 2025 18:23


When it comes to the vendor and buyer and who is responsible when there is a fraudulent payment can depend on the country.  Here is what happened in another court case….Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:   Article:  EFT payments and cybercrime: Court says car buyer is liable to ensure money is paid into the correct account Authentication Free Training Section:  3 Step Vendor Setup & Maintenance Process Workshop Vendor Banking Form Template:  https://debrarrichardson.com/store/vendor-banking-form-template Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Jun 20, 2025 5:46


How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.sans.edu/diary/How%20Long%20Until%20the%20Phishing%20Starts%3F%20About%20Two%20Weeks/32052 Scammers hijack websites of Bank of America, Netflix, Microsoft, and more to insert fake phone numbers Scammers are placing Google ads that point to legitimate companies sites, but are injecting malicious text into the page advertising fake tech support numbers https://www.malwarebytes.com/blog/news/2025/06/scammers-hijack-websites-of-bank-of-america-netflix-microsoft-and-more-to-insert-fake-phone-number What s in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia Targeted attacks are tricking victims into creating app-specific passwords to Google resources. https://cloud.google.com/blog/topics/threat-intelligence/creative-phishing-academics-critics-of-russia

Cyber Crime Junkies
Why Hackers Target YOU. Dark Web EXPOSED.

Cyber Crime Junkies

Play Episode Listen Later Jun 20, 2025 58:40 Transcription Available


Host David Mauro interviews Jeremy Samide, CEO of Blackwired, about why hackers target you. We expose the latest dark web secrets, and the latest social engineering risks.  Find more about Blackwired here: https://www.blackwired.com/Send us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466

Putting the AP in hAPpy
Episode 343: Bank Account Ownership Validation Issues > What About Vendors With Different Names?

Putting the AP in hAPpy

Play Episode Listen Later Jun 19, 2025 29:30


There is a common scenario for those Accounts Payable or Vendor teams that can do bank account ownership validations when setting up or changing vendor data: many vendors have legitimate reasons why their bank account holder names do not match their legal name.  So, how are you supposed to know whether this is legitimate or fraudulent?Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:   AVM: 3-Step Vendor Setup and Maintenance Framework to Avoid Fraud, Fines and Bad Vendor Data: https://youtu.be/prvHJ6_Rf58 D&B Business Directory:  https://www.dnb.com OpenCorporates:  https://opencorporates.com/ SEC > EDGAR Database: https://www.sec.gov/edgar/search/#/entityName=USERFUL%2520CORPORATION State Registration Sites:   Vendor Process Training Center > Resource Library Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

The Social-Engineer Podcast
Ep. 279 - Security Awareness Series - Dodging Turkeys and Security Awareness with Stacey Edmonds REPLAY

The Social-Engineer Podcast

Play Episode Listen Later Jun 16, 2025 36:52


REPLAY (Original Air Date Oct 21, 2024)   Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Stacey Edmonds. Stacey is a multi-disciplinary EdTech innovator and Digital Safety Pioneer, driven by a commitment to democratizing knowledge. Stacey's expertise, encompassing social science, education, EdTech, and multi-platform screen production, culminated in the founding of Lively, which we will hear all about on this podcast. Since 2002, Stacey has been designing and delivering enterprise-wide cyber safety upskilling programs. In 2023, embodying her mission to make knowledge accessible, Stacey launched 'Dodgy or Not?' – a social enterprise offering an engaging approach to digital safety education.   She continues to bridge the gap between emerging technologies and practical education, driving innovation in AI ethics and digital literacy - she is also known for deepfaking herself. [Oct 21, 2024]   00:00 - Intro 00:19 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                03:00 - Stacey Edmonds Intro 04:18 - Teaching, Trains & Turkeys 08:43 - Toilets vs Videos 11:16 - Dodgy or Not? 15:15 - Social Engineering for Good! 17:46 - Pause for the Cause 20:17 - Training in Real Time 24:11 - Real Time Threat Detection 27:49 - Culture is Everything 30:33 - Find Stacey Edmonds online -          LinkedIn: in/staceyedmonds/ 31:28 – Mentors -          Carolyn Breeze -          Chris Hadnagy -          Janine Thompson -          Steve Rowe -          Shane Bell 33:58 - Book Recommendations -          Feel The Fear and Do It Anyway - Susan Jeffers -          The Hitchhiker's Guide to the Galaxy - Douglas Adams -          1984 - George Orwell -          Man-Made – Tracey Spicer 35:51 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

Putting the AP in hAPpy
Episode 342: Top 2 Reasons Vendors Reach Out to Me About You!

Putting the AP in hAPpy

Play Episode Listen Later Jun 12, 2025 26:10


You may be listening to this podcast to find out what your vendors are doing, but guess what?  Your vendors are reaching out to me to understand what you are doing!  If you want to know the top 2 reasons vendors reach out to me about you (and what you can do to avoid this), then…Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:   IRS W-9 Examples by Tax Classification - What To Look For When Accepting From Your Vendor:  https://training.debrarrichardson.com/course/w9 Do IRS Form W-9s Expire? When Should You Collect a New One? https://debrarrichardson.com/blog/do-irs-form-w-9s-expire-when-should-you-collect-a-new-one?rq=expire Do You Need to Collect the California 587 or 590 Forms When Setting Up New Vendors? https://debrarrichardson.com/blog/do-you-need-to-collect-the-california-587-or-590-forms-when-setting-up-new-vendors?rq=587 Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Risk Management: Brick by Brick
Wire Fraud and Social Engineering: Protecting Against Million-Dollar Scams with David Finz of Alliant Insurance

Risk Management: Brick by Brick

Play Episode Listen Later Jun 11, 2025 16:43


We're coming to you LIVE from Riskworld 2025! Join Jason Reichl on Risk Management: Brick by Brick as he sits down with David Finz, Senior Vice President at Alliant Insurance Services, to discuss the cyber threats costing businesses millions right now. From the $20 million voice phishing scam in Hong Kong to the everyday email that could drain your bank account, David reveals how criminals are using AI to impersonate executives and why your current defenses might not be enough. Don't miss this eye-opening conversation about the scams happening today and the practical steps that could save your company tomorrow!

Dangerous INFO podcast with Jesse Jaymz
211 "Octopus of Global Control" ft. Charlie Robinson, psychological operations, LA riots, social engineering

Dangerous INFO podcast with Jesse Jaymz

Play Episode Listen Later Jun 10, 2025 133:27


Send us a textEver get the feeling that your government is out to get you? They are, and tonight our guest Charlie Robinson is set about to uncover the century's long plan for world domination by the psychopaths that are running the world. Like us, he laughs at how insane it all is but he has ideas on how to foil their plans on his podcast, Macroaggresions with Charlie Robinson.  https://podcasts.apple.com/us/podcast/macroaggressions/id1501964274Charlie is also an author, The Octopus of Global Control is a controversial, nonfiction book detailing how those in positions of power are able to manipulate society for their benefit, why they believe that they are entitled to impose their warped world view of reality on mankind, and how we can break free from their grip. The book tackles topics such as uncovering the Deep State, false flag terror events, the media's role in manufacturing wars, the 9/11 deception, the fraud of central banking, our broken education system, the use of religion to shape society, and the corrupted medical industry. https://a.co/d/dTOwHdxSUPPORT THE SHOWBuy Me A Coffee http://buymeacoffee.com/DangerousinfopodcastSubscribeStar http://bit.ly/42Y0qM8Super Chat Tip https://bit.ly/42W7iZHBuzzsprout https://bit.ly/3m50hFTPaypal http://bit.ly/3Gv3ZjpPatreon http://bit.ly/3G37AVx SMART is the acronym that was created by technocrats that have setup the "internet of things" that will eventually enslave humanity to their needs. Support the showCONNECT WITH USWebsite https://www.dangerousinfopodcast.com/Guilded Chatroom http://bit.ly/42OayqyEmail the show dangerousinfopodcast@protonmail.comJoin mailing list http://bit.ly/3Kku5YtSOCIALSInstagram https://www.instagram.com/dangerousinfo/Twitter https://twitter.com/jaymz_jesseGab https://gab.com/JessejaymzTruth Social https://truthsocial.com/@jessejaymzWATCH LIVE YouTube https://www.youtube.com/@DANGEROUSINFOPODCASTRumble https://rumble.com/c/DangerousInfoPodcast Twitch https://www.twitch.tv/dangerousinfopodcastPilled https://pilled.net/profile/144176Facebook https://www.facebook.com/DangerousInfoPodcast/BitChute: https://www.bitchute.com/channel/egnticQyZgxDCloutHub https://clouthub.com/DangerousINFOpodcastDLive https://...

ITSPmagazine | Technology. Cybersecurity. Society
Understanding Cybersecurity Behavior: From Social Engineering to Shadow AI | An Infosecurity Europe 2025 Conversation with Jason Nurse | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 10, 2025 15:21


Dr. Jason Nurse, academic and cybersecurity behavior researcher, joins Marco Ciappelli at Infosecurity Europe to unpack the shift in cybersecurity thinking—away from purely technical measures and toward a deeper understanding of human behavior and psychology. Nurse focuses his work on why people act the way they do when it comes to security decisions, and how culture, community, and workplace influences shape those actions.Behavior is increasingly taking center stage in security conversations, and for good reason. Nurse points to recent attacks that succeed not because of flaws in technology but due to the manipulation of individuals—such as social engineering tactics that target help desk personnel. These incidents highlight how behavioral cues and psychological triggers are weaponized, making it critical for organizations to address not just systems, but the people using them.The conversation then shifts to artificial intelligence, particularly the growing issue of “shadow AI” in corporate settings. Nurse cites research from the National Cybersecurity Alliance's Behavior Report, revealing that approximately 40% of employees who use AI admit to sharing sensitive corporate information with these tools—often without their employer's awareness. Even more concerning, over half of those organizations offer no training on safe or responsible AI use.Rather than banning AI outright, Nurse advocates for responsible use grounded in training and transparency. He acknowledges that some companies attempt to enforce boundaries by deploying internal AI systems, but these are often limited in capability. Others are exploring solutions to filter or sanitize inputs, though achieving a practical balance remains elusive.The conversation also touches on the emotional and psychological bonds forming between individuals and AI. Nurse notes that users increasingly treat AI like a companion, trusting it with personal information and seeking advice, even in sensitive contexts such as mental health. That trust, while understandable, opens new avenues for misuse and misjudgment—especially when users forget AI lacks genuine understanding.This episode prompts an important question: as AI becomes part of our daily routines, how do we maintain control, context, and caution in our interactions with it—and what does that mean for the future of security?___________Guest: Dr. Jason R.C. Nurse, Associate Professor in Cybersecurity at the University of Kent | https://www.linkedin.com/in/jasonrcnurse/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974___________ResourcesLearn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Something You Should Know
Effective Strategies to Be More Persuasive & Genetics, Evolution and Why We Get Sick

Something You Should Know

Play Episode Listen Later Jun 9, 2025 52:51


The next time you or your kids get a shot at the doctor's office or face anything that you know is going to be painful, there is a little trick you can use that should reduce the pain substantially. Listen as I explain what it is. https://www.newscientist.com/article/dn27514-hold-your-breath-to-dampen-the-pain-of-an-injection/#.VVTKyZO_Heb What is it about persuasive people? They just have that “something” that makes us want to listen, to be around them, and in many cases, do what they ask. Why are some people more persuasive than others? What strategies can we all use to be more influential and persuasive. Here to offer some great insight into the workings of persuasion is Abbie Maroño. She is a scientist and a practitioner in the field of human behavior and is recognized by the US Department of State as being in the top 1% of behavior analysis experts. She has delivered specialized behavioral analysis training to the U.S. Secret Service, FBI, Department of Homeland Security, and local law enforcement agencies. She is author of the book The Upper Hand: Mastering Persuasion and Getting What You Want with the Science of Social Engineering (https://amzn.to/4jwGF59) Did you know that compared to many other species, humans have a high rate of genetic diseases. Wouldn't you think by now that evolution and "survival of the fittest" would've weeded those out? What science has recently discovered, about DNA and genetics is astonishing and is helping us understand how genetics work, how diseases are passed on, how genes can mutate and make us sick, why we have such a high rate of genetic diseases and how we may soon be able to fix or prevent some of it. Joining me to discuss this is Lawrence Hurst. He is a professor of evolutionary genetics at the Milner Centre for Evolution at the University of Bath and author of the book, The Evolution of Imperfection: The Science of Why We Aren't and Can't Be Perfect (https://amzn.to/3ZgOjJS) There are things in your kitchen you need to get rid of. Over time we bring things into the kitchen that we never need, never use that take up a lot of valuable space. Listen as I offer some suggestions on what you can get rid of right now with no regret whatsoever. https://www.delish.com/food/a63527523/6-things-you-should-never-keep-on-your-kitchen-counter-according-to-organizational-experts/ PLEASE SUPPORT OUR SPONSORS!!! MINT MOBILE: Get your summer savings and shop premium wireless plans at ⁠⁠⁠⁠⁠⁠⁠⁠https://MintMobile.com/something⁠⁠⁠⁠⁠⁠⁠⁠ ! FACTOR: Factor meals arrive fresh and ready to eat, perfect for your summer lifestyle! Get 50% off at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://FactorMeals.com/something50off⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ROCKET MONEY: Cancel your unwanted subscriptions and reach your financial goals faster! Go to ⁠⁠⁠⁠⁠https://RocketMoney.com/SOMETHING⁠⁠⁠⁠⁠ QUINCE: Stick to the staples that last, with elevated essentials from Quince! Go to ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://Quince.com/sysk⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ for free shipping on your order and 365 day returns! INDEED: Get a $75 sponsored job credit to get your jobs more visibility at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://Indeed.com/SOMETHING⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ right now! DELL: Introducing the new Dell AI PC . It's not just an AI computer, it's a computer built for AI to help do your busywork for you! Get a new Dell AI PC at⁠ https://Dell.com/ai-pc⁠ Learn more about your ad choices. Visit megaphone.fm/adchoices

a16z
Chris Dixon: Stablecoins, Startups, and the Crypto Stack

a16z

Play Episode Listen Later Jun 9, 2025 29:26


What if crypto isn't just a speculative asset class—but the next foundational layer of the internet?In this episode, Chris Dixon, founding partner of a16z crypto and one of the earliest, most forward-thinking investors in the space, joins TBPN for a wide-ranging conversation on the real, long-term promise of crypto—and why we're still early.He unpacks:Why stablecoins are already functioning as internet-native moneyHow blockchains can serve as global, programmable financial infrastructureWhy programmability, not just low fees, is the real unlockThe evolving regulatory landscape and new bipartisan momentumThe rise of AI agents, decentralized platforms, and real-world crypto use casesThis episode is about long-term thinking, technical optimism, and building open infrastructure for the future of the internet.Resources: Find Chris on X: https://x.com/cdixonWatch TBPN: https://www.tbpn.com/ Timecodes:00:00 Meet Chris Dixon: Crypto Visionary00:26 The Evolution of Stable Coins02:49 The Future of Stable Coins and Global Payments06:04 Lobbying Efforts and Legislative Impact09:01 Adoption Across Different Sectors11:53 Competitive Forces in the Crypto Market14:37 The Crypto Talent Shortage15:05 Opportunities in the Crypto Space17:08 Crypto Fund Performance19:04 Venture Capital in Crypto23:30 Real World Assets on Blockchain26:34 Social Engineering and Proof of Humanity29:10 Conclusion and Final Thoughts Stay Updated: Let us know what you think: https://ratethispodcast.com/a16zFind a16z on Twitter: https://twitter.com/a16zFind a16z on LinkedIn: https://www.linkedin.com/company/a16zSubscribe on your favorite podcast app: https://a16z.simplecast.com/Follow our host: https://x.com/eriktorenbergPlease note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.

Putting the AP in hAPpy
Episode 341: Why the Vendor Confirmation Call is Not A Silver Bullet to Avoid Payment Fraud

Putting the AP in hAPpy

Play Episode Listen Later Jun 5, 2025 23:01


The  confirmation call has long been hailed as a safeguard against fraud. But it's not.  Let's delve into why and what can improve the process.Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:   Get the Vendor Callback Confirmation Toolkit(TM) Today: https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Daily Crypto News
June 4: Watch Your Back! Social Engineering Attacks on The Rise

Daily Crypto News

Play Episode Listen Later Jun 4, 2025 19:37


TODAY'S HEADLINES - JUNE 4MoonPay to offer direct crypto services in all 50 US states after obtaining New York's BitLicense.Pump.Fun, reportedly, is raising $1 billion for a token sale at a $4 billion valuation.MARA hits monthly mining milestone, holds all 950 BTC to grow second-largest public crypto treasury.An unofficial Trump Wallet hits the market, according to Bitcoin Magazine. Don Jr. and Eric Trump have denied any involvement.Finally, 2.1B crypto stolen in 2025 as hackers shift focus from code to users, according to a recent CertiK report.Show SponsorsGear.ExeThis episode is brought to you by Gear.Exe. Supercharge Ethereum. Build on Ethereum but Experience Solana. There is no need for L2s and bridging your assets anymore because Gear.Exe is a bridgeless rollup and execution layer. Imagine a world where Ethereum has Web2-grade UX, less than one-second transaction latency, a 90–99% reduction in gas fee, and up to 1000x more compute capacity. If you want to scale your existing ETH mainnet, Dapp, visit Gear.Exe.C3The C3 team has more than 20 years of experience in journalism, including leading the editorial and content side of a major Web3 news publication. They are also experienced AI and Web3 PR professionals, regularly placing content in leading web3 and AI publications. C3's members previously co-founded the PR department at SCRIB3, and have experience with clients such as EigenLayer, VanEck, Monad, SKALE Network, LEVR Bet, Symmio, Camp Network, Evmos, Avail, Moonbeam, and others.WHERE TO FIND DCNdailycryptonews.nethttps://twitter.com/DCNDailyCryptoEMAIL or FOLLOW the HostsEmail: kyle@dailycryptonews.net——————————————————————***NOT FINANCIAL, LEGAL, OR TAX ADVICE! JUST OPINION! WE ARE NOT EXPERTS! WE DO NOT GUARANTEE A PARTICULAR OUTCOME. WE HAVE NO INSIDE KNOWLEDGE! YOU NEED TO DO YOUR OWN RESEARCH AND MAKE YOUR OWN DECISIONS! THIS IS JUST EDUCATION & ENTERTAINMENT! Hosted on Acast. See acast.com/privacy for more information.

The Social-Engineer Podcast
Ep. 307 - The Doctor Is In Series - Why is the Road to Self-Betterment So Lonely

The Social-Engineer Podcast

Play Episode Listen Later Jun 2, 2025 35:16


Welcome to the Social-Engineer Podcast: The Doctor Is In Series – where we will discuss understandings and developments in the field of psychology.   In today's episode, Chris and Abbie are discussing why change can feel so lonely? They will talk about what triggers growth in people, the amount a person can actually change and how loneliness plays a role in this growth. [June 2, 2025]   00:00 - Intro 00:47 - Dr. Abbie Maroño Intro 01:06 - Intro Links -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                 02:23 - Dr. Abbie Announcement 03:30 - The Topic of the Day: The Lonely Chapter 04:38 - Triggering Change 06:00 - People Don't Change? 11:30 - All Change Isn't Growth 13:15 - Why Growth Can Be Lonely 15:56 - What About Love? 17:16 - New You, Who Dis? 21:19 - Feelings Can REALLY Hurt! 22:15 - Choosing Who You Are 24:36 - Syncing Up 27:43 - A Constant Evolution 30:17 - Search For Meaning 32:31 - Making Connections 33:12 - Wrap Up 33:56 - Next Month: Love At First Sight 34:42 - Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org   Find us online: -          LinkedIn: linkedin.com/in/dr-abbie-maroño-phd -          Instagram: @DoctorAbbieofficial -          LinkedIn: linkedin.com/in/christopherhadnagy     References: Eisenberger, N. I., Lieberman, M. D., & Williams, K. D. (2003). Does rejection hurt? An fMRI study of social exclusion. Science, 302(5643), 290–292. https://doi.org/10.1126/science.1089134 Ebaugh, H. R. F. (1988). Becoming an ex: The process of role exit. University of Chicago Press. Festinger, L. (1957). A theory of cognitive dissonance. Stanford University Press. Frankl, V. E. (1963). Man's search for meaning: An introduction to logotherapy. Beacon Press. Higgins, E. T. (1987). Self-discrepancy: A theory relating self and affect. Psychological Review, 94(3), 319–340. https://doi.org/10.1037/0033-295X.94.3.319 Mass, M. (1991). The theory of "identity dissonance": Mass. Dissertation Abstracts International, 52(1), 577B. Sandstrom, G. M., & Dunn, E. W. (2014). Social interactions and well-being: The surprising power of weak ties. Personality and Social Psychology Bulletin, 40(7), 910–922. https://doi.org/10.1177/0146167214529799 Uvnäs-Moberg, K., Arn, I., & Magnusson, D. (2005). The psychobiology of oxytocin: An integrative review. Psychoneuroendocrinology, 30(7), 610–626. https://doi.org/10.1016/j.psyneuen.2005.02.008

Fringe Radio Network
Who Really Runs Hollywood? Crime and Soulless Messaging with Counterculture Mom Tina Griffin - Sarah Westall

Fringe Radio Network

Play Episode Listen Later Jun 1, 2025 46:35


Former Hollywood actress and Counterculture Mom, Tina Griffin, joins the show to expose the dark underbelly of the entertainment industry. Drawing from her firsthand experience, she reveals how pop culture is deliberately glamorizing destructive behaviors, normalizing crime, and accelerating the moral decay of our nation. Tina breaks down how this cultural manipulation is targeting our youth—undermining their values, identity, and future.To follow Tina Griffin or book her for a speaking event, visit: https://counterculturemom.com/ 

More or Less with the Morins and the Lessins
#101: The Business of OnlyFans, Future of Identity, and Navigating Privacy in the AI Age

More or Less with the Morins and the Lessins

Play Episode Listen Later May 30, 2025 56:06


This week on More or Less: Investors too squeamish for OnlyFans, AI makes the creator economy weirder (and richer), and why your next ETF might be Mormon. Plus, the real reason nobody watches your full podcast, and a healthy dose of tech industry self-roasting. TakeawaysOnlyFans presents a unique investment opportunity despite its controversial nature.Market dynamics in the sex work industry are shifting due to platforms like OnlyFans.Investment perspectives on controversial industries are evolving with societal changes.Digital identity verification is becoming increasingly important in the tech landscape.AI is transforming content creation and user interaction on platforms like OnlyFans.The need for robust age verification systems is critical for online safety.Social engineering poses significant risks to digital security and identity verification.The intersection of technology and privacy raises important ethical questions.New technologies are emerging to address identity verification challenges. Cybersecurity is a growing concern in today's digital age.Personal security measures are becoming increasingly important.The evolution of media is leading to new forms of content consumption.Platforms like TBPN are disrupting traditional media models.Cultural shifts are changing the landscape of digital content.Celebrity ventures are becoming significant players in the market.The importance of remembering complex passwords cannot be overstated.Media companies must adapt to the soundbite era to stay relevant.Tech hiring is experiencing a downturn post-pandemic.The de-stigmatization of platforms like OnlyFans is creating new opportunities.We're also on ↓X: https://twitter.com/moreorlesspodInstagram: https://instagram.com/moreorlessConnect with us here:Sam Lessin: https://x.com/lessinDave Morin: https://x.com/davemorinJessica Lessin: https://x.com/JessicalessinBrit Morin: https://x.com/britChapters00:00 Celebrating Milestones and Listener Engagement03:00 The Business of OnlyFans and Its Market Dynamics05:58 Investment Perspectives on Controversial Industries09:04 The Evolution of Digital Identity and Security12:00 The Intersection of Technology and Privacy14:59 The Future of Age Verification and Digital Safety17:53 The Role of AI in Content Creation and Interaction20:59 Exploring New Technologies for Identity Verification24:06 The Implications of Social Engineering and Security Risks34:00 Navigating Cybersecurity Challenges36:55 The Importance of Personal Security39:57 Media Evolution and Disruption44:03 The Future of Tech and Media49:57 Cultural Shifts in Digital Content53:58 Celebrity Ventures and Market Trends

Putting the AP in hAPpy
Episode 340: Part 2 with Troy Baker of the BBB: Is Your Company an SMB? You're At Risk for Fraud and the Better Business Bureau's Resources Can Help

Putting the AP in hAPpy

Play Episode Listen Later May 29, 2025 29:06


If you're company is a small or medium sized business, don't get comfortable about fraud – you're being targeted too.  Troy Baker is back to talk fraud and how the fraud prevention resources at the Better Business Bureau can help you protect your payments from fraudsters.Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:   Better Business Bureau Links:  Main Webpage:  https://www.bbb.org Scam Tracker:  https://www.bbb.org/scamtracker Scam News/Tips:  https://www.bbb.org/all/scamtips Sign-Up for Scam Alerts: https://signup.e2ma.net/signup/1900156/1902645/ Michigan Better Business Bureau:  https://www.bbb.org/miprograms Validate Charities:  https://www.give.org Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Cybercrime Magazine Podcast
Cybercrime Magazine Update: Small Business Alert. Top 10 Most Common Social Engineering Attacks.

Cybercrime Magazine Podcast

Play Episode Listen Later May 27, 2025 4:20


Tech Bullion has highlighted the top 10 most common social engineering attacks that small businesses should know, including phishing emails and spear phishing. In this episode, host Paul John Spaulding is joined by Steve Morgan, Founder of Cybersecurity Ventures and Editor-in-Chief at Cybercrime Magazine, to discuss. The Cybercrime Magazine Update airs weekly and covers the latest news, interviews, podcasts, reports, videos, and special productions from Cybercrime Magazine, published by Cybersecurity Ventures. For more on cybersecurity, visit us at https://cybersecurityventures.com.

Cyber Security Today
From English Literature to Cybersecurity: A Journey Through Blockchain and Security

Cyber Security Today

Play Episode Listen Later May 24, 2025 54:36 Transcription Available


LINKS:  https://distrust.co/software.html - Software page with OSS software Linux distro: https://codeberg.org/stagex/stagex Milksad vulnerability:  https://milksad.info/ In this episode of Cybersecurity Today on the Weekend, host Jim Love engages in a captivating discussion with Anton Livaja  from Distrust. Anton shares his unique career transition from obtaining a BA in English literature at York University to delving into cybersecurity and tech. Anton recounts how he initially entered the tech field through a startup and quickly embraced programming and automation. The conversation covers Anton's interest in Bitcoin and blockchain technology, including the importance of stablecoins, and the frequent hacking incidents in the crypto space. Anton explains the intricacies of blockchain security, emphasizing the critical role of managing cryptographic keys. The dialogue also explores advanced security methodologies like full source bootstrapping and deterministic builds, and Anton elaborates on the significance of creating open-source software for enhanced security. As the discussion concludes, Anton highlights the need for continual curiosity, teamwork, and purpose-driven work in the cybersecurity field. 00:00 Introduction to Cybersecurity Today 00:17 Anton's Journey from Literature to Cybersecurity 01:08 First Foray into Programming and Automation 02:35 Blockchain and Its Real-World Applications 04:36 Security Challenges in Blockchain and Cryptocurrency 13:21 The Rise of Insider Threats and Social Engineering 16:40 Advanced Security Measures and Supply Chain Attacks 22:36 The Importance of Deterministic Builds and Full Source Bootstrapping 29:35 Making Open Source Software Accessible 31:29 Blockchain and Supply Chain Traceability 33:34 Ensuring Software Integrity and Security 38:20 The Role of AI in Code Review 40:37 The Milksad Incident 46:33 Introducing Distrust and Its Mission 52:23 Final Thoughts and Encouragement

Putting the AP in hAPpy
Episode 339: The Better Business Bureau's Troy Baker on How to Shield Your Business From Fraud Using BBB Resources

Putting the AP in hAPpy

Play Episode Listen Later May 22, 2025 47:29


Did you know you can find lots of fraud prevention resources from the Better Business Bureau?  In this episode, Troy Baker from the Michigan Better Business Bureau talks about fraud, using the BBB for validations and what we both think is the best thing to do that will keep your company protected from fraud.   Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:   Better Business Bureau Links:  Main Webpage:  https://www.bbb.org Scam Tracker:  https://www.bbb.org/scamtracker Scam News/Tips:  https://www.bbb.org/all/scamtips Sign-Up for Scam Alerts: https://signup.e2ma.net/signup/1900156/1902645/ Michigan Better Business Bureau:  https://www.bbb.org/miprograms Validate Charities:  https://www.give.org Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

The
How to Instantly Read People & Protect Yourself from Manipulation w/ Chase Hughes (WiM577)

The "What is Money?" Show

Play Episode Listen Later Apr 28, 2025 154:04


// GUEST //Website: https://nci.university/X: https://x.com/nciuniversityYoutube: https://www.youtube.com/@chasehughesofficialBook: https://www.amazon.com/dp/173514164XInstagram: https://www.instagram.com/chasehughesofficialFacebook: https://www.facebook.com/chasehughesofficial/ // SPONSORS //The Farm at Okefenokee: https://okefarm.com/iCoin: https://icointechnology.com/breedloveHeart and Soil Supplements (use discount code BREEDLOVE): https://heartandsoil.co/In Wolf's Clothing: https://wolfnyc.com/Revero: https://www.revero.com/breedloveBlockware Solutions: https://mining.blockwaresolutions.com/breedloveOn Ramp: https://onrampbitcoin.com/?grsf=breedloveMindlab Pro: https://www.mindlabpro.com/breedloveCoinbits: https://coinbits.app/breedlove // PRODUCTS I ENDORSE //Protect your mobile phone from SIM swap attacks: https://www.efani.com/breedloveNoble Protein (discount code BREEDLOVE for 15% off): https://nobleorigins.com/Lineage Provisions (use discount code BREEDLOVE): https://lineageprovisions.com/?ref=breedlove_22Colorado Craft Beef (use discount code BREEDLOVE): https://coloradocraftbeef.com/ // SUBSCRIBE TO THE CLIPS CHANNEL //https://www.youtube.com/@robertbreedloveclips2996/videos // OUTLINE //0:00 - WiM Episode Trailer1:40 - From the Navy to Behavioral Science6:10 - The Origins of Social Anxiety12:34 - Dealing with Social Anxiety19:10 - Fake it Till You Make It?26:14 - The Farm at Okefenokee27:40 - iCoin Technology29:10 - The Power of Focusing on Others32:10 - Intuition and Incongruent Behavior37:12 - Dealing With Online Criticism39:58 - Behavior Science 10150:55 - Carrying Concealed Shame56:42 - Heart and Soil Supplements57:42 - Helping Lightning Startups with In Wolf's Clothing58:34 - Personalize Your Health with Revero59:37 - Radical Truth and Forgiving Yourself1:08:33 - Handling Manipulation1:16:45 - Concealment of Intent1:24:50 - Mine Bitcoin with Blockware Solutions1:26:16 - Onramp Bitcoin Custody1:27:39 - Money Printing is Mind Control1:37:01 - The History of Propaganda1:53:22 - Mind Lab Pro Supplements1:54:32 - Buy Bitcoin with Coinbits1:55:43 - Waking Up to Manipulation and Propaganda2:00:14 - Empathy and Rationality2:09:11 - The Psychopath Checklist2:17:22 - Interrogation 1012:28:20 - Seeing Behind People's Mask2:32:27 - Closing Thoughts and Where to Find Chase Hughes // PODCAST //Podcast Website: https://whatismoneypodcast.com/Apple Podcast: https://podcasts.apple.com/us/podcast/the-what-is-money-show/id1541404400Spotify: https://open.spotify.com/show/25LPvm8EewBGyfQQ1abIsERSS Feed: https://feeds.simplecast.com/MLdpYXYI // SUPPORT THIS CHANNEL //Bitcoin: 3D1gfxKZKMtfWaD1bkwiR6JsDzu6e9bZQ7Sats via Strike: https://strike.me/breedlove22Dollars via Paypal: https://www.paypal.com/paypalme/RBreedloveDollars via Venmo: https://account.venmo.com/u/Robert-Breedlove-2 // SOCIAL //Breedlove X: https://x.com/Breedlove22WiM? X: https://x.com/WhatisMoneyShowLinkedin: https://www.linkedin.com/in/breedlove22/Instagram: https://www.instagram.com/breedlove_22/TikTok: https://www.tiktok.com/@breedlove22Substack: https://breedlove22.substack.com/All My Current Work: https://linktr.ee/robertbreedlove

The Health Ranger Report
Brighteon Broadcast News, Apr 11, 2025 – END OF EMPIRE: Trump disses the entire world while the dollar collapses and GOLD SKYROCKETS

The Health Ranger Report

Play Episode Listen Later Apr 11, 2025 144:04


- Trump's Geopolitical Illiteracy and Flu Vaccine Effectiveness (0:10) - RFK Jr.'s Advocacy and Measles Outbreak (3:23) - Trump's International Diplomacy and Economic Impact (8:55) - Trump's Economic Idiocy and Military Incompetence (20:07) - The Role of Vaccines in Autism and Infant Formula Testing (33:46) - The Influence of Zionism in America and the Deep State (52:03) - The Role of Tavistock Institute in Social Engineering (57:25) - The Cognition Race and the Depopulation Agenda (1:05:27) - The Role of Gold and Silver in Economic Stability (1:06:41) - The Future of Human Cognition and Machine Cognition (1:09:32) - Energy Consumption and Data Centers (1:18:51) - Competition for Resources (1:21:43) - Impact of Automation on Jobs (1:23:57) - Human Genius and AI Tools (1:26:49) - Homegrown Food and Seed Kits (1:30:47) - Interview with Dane Wigington (1:33:52) - Geoengineering and Weather Control (1:40:08) - Health and Environmental Impact (1:57:09) - Legislation and Public Awareness (2:22:20) - Future Prospects and Call to Action (2:23:00) For more updates, visit: http://www.brighteon.com/channel/hrreport NaturalNews videos would not be possible without you, as always we remain passionately dedicated to our mission of educating people all over the world on the subject of natural healing remedies and personal liberty (food freedom, medical freedom, the freedom of speech, etc.). Together, we're helping create a better world, with more honest food labeling, reduced chemical contamination, the avoidance of toxic heavy metals and vastly increased scientific transparency. ▶️ Every dollar you spend at the Health Ranger Store goes toward helping us achieve important science and content goals for humanity: https://www.healthrangerstore.com/ ▶️ Sign Up For Our Newsletter: https://www.naturalnews.com/Readerregistration.html ▶️ Brighteon: https://www.brighteon.com/channels/hrreport ▶️ Join Our Social Network: https://brighteon.social/@HealthRanger ▶️ Check In Stock Products at: https://PrepWithMike.com

Sales vs. Marketing
Lessons - Fixing Human Error in Cybersecurity | Theresa Payton - Former White House CIO

Sales vs. Marketing

Play Episode Listen Later Mar 30, 2025 11:29


➡️ Like The Podcast? Leave A Rating: https://ratethispodcast.com/successstory  In this "Lessons" episode, Theresa Payton, former White House CIO, shares how predictable human behavior creates vulnerabilities in cybersecurity and why conventional defenses often fall short. Learn why routine security measures are exploited by sophisticated social engineering and how designing innovative, personalized protocols can disrupt attackers and strengthen digital defenses. ➡️ Show Linkshttps://successstorypodcast.com  YouTube: https://youtu.be/bH8DwhGUg0cApple: https://podcasts.apple.com/us/podcast/theresa-payton-cybersecurity-expert-author-former-white/id1484783544Spotify: https://open.spotify.com/episode/5DLZKqN89CTRVXW2Hi3Pq5➡️ Watch the Podcast on YouTubehttps://www.youtube.com/c/scottdclary