Podcasts about Social engineering

  • 1,020PODCASTS
  • 2,606EPISODES
  • 52mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jul 10, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Social engineering

Show all podcasts related to social engineering

Latest podcast episodes about Social engineering

How to Be Awesome at Your Job
1074: How to Improve Negotiations–without Compromising–with Dr. Joshua N. Weiss

How to Be Awesome at Your Job

Play Episode Listen Later Jul 10, 2025 44:19


Dr. Joshua N. Weiss discusses the major misconceptions surrounding negotiations—and offers five steps to build your confidence and resilience as a negotiator.— YOU'LL LEARN — 1) The big negotiation mistake most people make2) The mental reframe that helps you negotiate better3) The five-step strategy to reviving stalled negotiationsSubscribe or visit AwesomeAtYourJob.com/ep1074 for clickable versions of the links below. — ABOUT JOSH — Dr. Joshua N. Weiss is a renowned negotiation and conflict resolution and leadership expert. As a Senior Fellow at the Harvard Negotiation Project and co-founder of the Global Negotiation Initiative at Harvard University, Dr. Weiss brings unparalleled expertise to his field. He also directs the MS in Leadership and Negotiation program at Bay Path University and runs a private consulting firm, offering tailored negotiation and conflict resolution, and leadership solutions for businesses, organizations, international entities, governments, and individuals. • Book: Getting Back to the Table: 5 Steps to Reviving Stalled Negotiations• Book: The Book of Real-World Negotiations: Successful Strategies From Business, Government, and Daily Life• Study: “Trajectories Toward Peace: Mediator Sequencing Strategies in Intractable Communal Conflicts”• Website: JoshuaNWeiss.com — RESOURCES MENTIONED IN THE SHOW — • Book: Getting to Yes: Negotiating Agreement Without Giving In by William Ury and Robert Fisher• Book: Negotiating the Nonnegotiable: How to Resolve Your Most Emotionally Charged Conflicts by Daniel Shapiro• Book: The Tipping Point: How Little Things Can Make a Big Difference by Malcolm Gladwell • Book: Blink: The Power of Thinking Without Thinking by Malcolm Gladwell • Book: David and Goliath: Underdogs, Misfits, and the Art of Battling Giants by Malcolm Gladwell • Book: Revenge of the Tipping Point: Overstories, Superspreaders, and the Rise of Social Engineering by Malcolm Gladwell— THANK YOU SPONSORS! — • Strawberry.me. Claim your $50 credit and build momentum in your career with Strawberry.me/Awesome• Plaud.ai. Use the code AWESOME and get a discount on your order• Rula. Connect with quality therapists and mental health experts who specialize in you at Rula.com/AwesomeSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Friendship IRL
Social Engineering Your Way Into Friendship, From Picnics to the Six Points of Connection, with Charlotte Massey

Friendship IRL

Play Episode Listen Later Jul 10, 2025 63:24


Have you ever moved somewhere new and felt like you were on the outside looking in?This was Charlotte Massey when she moved to Seattle in the midst of the pandemic, when making friends was borderline impossible. Instead of accepting isolation, she got strategic about it. We're taking friend-dating spreadsheets and sales funnel approaches.Charlotte is the executive director for the Seattle chapter of the U.S. Chamber of Connection, a new civic organization tackling the loneliness epidemic, and founder of the Seattle Picnic Society. In this episode, she offers so much inspiration and great advice for those not feeling connected where they're at.Whether you're new to your city or you've been there for years, the principles are the same. Get specific about your invites. Show up consistently. Don't be afraid to follow up multiple times. Most importantly, if the community you want doesn't exist, create it.In this episode you'll hear about:Charlotte's move in 2021 and the challenges she faced, from the pandemic to the “Seattle freeze”How Charlotte used a sales funnel approach, “friend dating,” and intentional invites to connect new peopleThe Seattle Picnic Society – picnics that grew from five to one hundred attendees, and how you could create something similar in your communityBeing bold and persistent in reaching out to potential friends and looking at how you can improve on the Six Points of Connection Resources & LinksLearn more about the Seattle Picnic Society and the Six Points of Connection on the U.S. Chamber of Connection website.Like what you hear? Visit my website, leave me a voicemail, and follow me on Instagram and TikTok!Want to take this conversation a step further? Send this episode to a friend. Tell them you found it interesting and use what we just talked about as a conversation starter the next time you and your friend hang out!

Putting the AP in hAPpy
Episode 346: A Big IRS Tax Reporting Change Effective For Tax Year 2026 That Can Help Your Team – But Don't Forget About This

Putting the AP in hAPpy

Play Episode Listen Later Jul 10, 2025 14:39


After last week's episode revealing an IRS announcement, once the big, beautiful tax bill was passed there is at least more tax reporting change for Tax Year 2026 that can reduce a huge burden, but there is one more factor to keep in mind.  Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:   Vendor Master File Tip of the Week - IRS 1099-MISC/NEC and 1042-S 2026 Due Dates For TY 2025 Journal of Accountancy - Tax provisions in the One Big Beautiful Bill Act Journal of Accountancy – IRS Staffing, Budget Cuts Threaten 2026 Filing Season, Taxpayer Advocate Says Taxes For Expats – One Big Beautiful Bill – and What it Means for Your Business Vendor Process Training Center > Resource Library for State Research https://training.debrarrichardson.com/resources Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Paul's Security Weekly
North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran - SWN #491

Paul's Security Weekly

Play Episode Listen Later Jul 4, 2025 28:50


North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran on this edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-491

Jungunternehmer Podcast
Andrej Safundzic: Von Tech4Germany zum 65-Millionen-Dollar-Startup - Wie Lumos die Zukunft der Cyber-Security gestaltet

Jungunternehmer Podcast

Play Episode Listen Later Jul 4, 2025 49:37


Andrej Safundzic, Gründer von Lumos, spricht mit Mike Mahlkow über seinen beeindruckenden Weg von Social Enterprises in Uganda über die deutsche Bundesregierung bis hin zum Silicon Valley. Mit 65 Millionen Dollar Funding baut er heute eine der innovativsten Cyber-Security-Lösungen. Andrej teilt tiefe Einblicke in die Zukunft der Cyber-Security, die Bedeutung von AI-Agents und warum Deutschland der beste zweite Standort für Tech-Unternehmen werden sollte. Was du lernst: Von Deutschland in die Welt: Wie Andrej erst Social Enterprises in Uganda gründete Warum er Tech4Germany aufbaute und vom Bundeskanzleramt übernommen wurde Cyber-Security und AI: Warum Identity & Access Management durch AI-Agents wichtiger wird Wie sich Cyber-Angriffe durch Voice-AI und Social Engineering verändern Deutschland vs. Silicon Valley: Warum Deutschland der beste zweite Standort für Tech-Unternehmen werden sollte Die Bedeutung von Qualität und Nachhaltigkeit im deutschen Markt Story-Led Companies: Wie Lumos durch eine klare Vision und Story Mitarbeiter begeistert Warum Cyber-Security der neue "Polizist" der digitalen Welt ist AI-Transformation: Wie Unternehmen sich auf die AI-Revolution vorbereiten sollten Die Bedeutung von frühem Experimentieren mit neuen Technologien ALLES ZU UNICORN BAKERY: https://zez.am/unicornbakery  Mehr zu Andrej: LinkedIn: https://www.linkedin.com/in/andrejsafundzic/  Website: https://www.lumos.com/  Mehr zum Co-Host Mike: LinkedIn: https://www.linkedin.com/in/mikemahlkow/  Website: https://fastgen.com Join our Founder Tactics Newsletter: 2x die Woche bekommst du die Taktiken der besten Gründer der Welt direkt ins Postfach: https://www.tactics.unicornbakery.de/  Kapitel: (00:00:00) Wer ist Andrej Safundzic? (00:01:17) Warum gründet man ein Startup in Uganda? (00:03:36) Vom Bundeskanzleramt gekauft (00:11:27) Von Deutschland in die USA: Warum San Francisco? (00:21:30) Die Gefahr von Voice-Agents & Cyber-Angriffen (00:29:52) Bis zu welcher Gefahr deckt Lumos die Sicherheit ab? (00:36:00) Die nächste Stufe der Sicherheit (00:40:33) Lumos als Story-led Company

Hack Naked News (Audio)
North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran - SWN #491

Hack Naked News (Audio)

Play Episode Listen Later Jul 4, 2025 28:50


North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran on this edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-491

Putting the AP in hAPpy
Episode 345: What The IRS Just Announced About The FIRE System

Putting the AP in hAPpy

Play Episode Listen Later Jul 3, 2025 7:36


Check out the IRS's announcement about changes to e-filing just before the July 4th holiday! Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:   Vendor Master File Tip of the Week - Demo of the IRS e-News Subscriptions https://youtu.be/Cwy9QDYX-ZM Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

The Social-Engineer Podcast
Ep. 250 - Human Element Series - Rationalize Minimalize and Project with Agent Brad Beeler REPLAY

The Social-Engineer Podcast

Play Episode Listen Later Jun 30, 2025 43:45


REPLAY (Original Air Date March 11, 2024)   Today we are joined by Agent Brad Beeler. Assistant to the Special Agent in Charge Brad Beeler has been with the United States Secret Service for the past 25 years. He currently serves as instructor and Secret Service liaison at the National Center for Credibility Assessment (NCCA) at Fort Jackson, South Carolina. Over the past 8 years in this role, he has trained agents throughout the federal law enforcement and intelligence community in credibility assessment and elicitation techniques.   Prior to arriving at NCCA, he was a polygraph examiner in the Chicago and St. Louis Field Offices and served on the permanent protection detail of former President George HW Bush and numerous foreign heads of state. Over the past 17 years as a federal polygraph examiner Special Agent Beeler has secured hundreds of confessions on high-profile investigations, often leading to the identification of previously unknown victims of serial offenders of both child exploitation and homicide investigations. Agent Beeler holds a master's degree in criminology and was previously selected as the U.S. Secret Service - Special Agent of the Year for his involvement in combating crimes against children.   Widely considered a communications expert in the U.S. federal law enforcement community, Agent Beeler has provided countless domestic and international presentations to law enforcement and intelligence agencies seeking to enhance their interviewing programs. [March 11, 2024]   00:00 - Intro 00:21 - Intro Links -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 03:05 - Agent Brad Beeler Intro 05:05 - Part of a Team 07:58 - One of Lincoln's Final Acts 08:52 - Dual Mission 11:45 - The Broadband Effect 14:38 - Team Effort 17:35 - Worst of the Worst 21:13 - Common Ground 23:36 - Letting Them Be Heard 25:51 - Lyrics, Songs and Dance 28:49 - Mental Health Mandates 35:11 - Mentors -          Mrs. Bertran - Teacher -          Brian Leary - DHS Program Manager 37:21 - Book Recommendations -          The Interrogator - Hanns Scharff -          Spy the Lie - Philip Houston -          Captivate & Cues - Vanessa Van Edwards 39:24 - Find Agent Brad Beeler online -          Website: www.usajobs.gov -          Website: www.secretservice.gov -          LinkedIn: linkedin.com/in/bradbeeler1865/ 40:47 - Guest Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

Risky Women Radio
Evolving Nature of Corporate Fraud: Zoë Newman

Risky Women Radio

Play Episode Listen Later Jun 30, 2025 36:19 Transcription Available


Zoe Newman, Regional Managing Director and Global Co-Head of Financial Investigations at Kroll, discussed her 25-year career at the firm, focusing on complex fraud investigations in emerging markets. She highlighted the rise of organized crime using AI and social engineering to target corporates, emphasizing the need for better employee training and data monitoring. Newman noted the growing importance of supply chain risk, bribery and corruption, and culture investigations. SHOW NOTES 01:16 Career Journey 14:40 Evolution & Challenges in Corporate Fraud 25:45 Trends & Opportunities in Corporate Investigations 30:48 Final Thoughts and Recommendations

Putting the AP in hAPpy
Episode 344: Another Fraudulent Payment After A BEC Scam Goes to Court – Who Won?

Putting the AP in hAPpy

Play Episode Listen Later Jun 26, 2025 18:23


When it comes to the vendor and buyer and who is responsible when there is a fraudulent payment can depend on the country.  Here is what happened in another court case….Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:   Article:  EFT payments and cybercrime: Court says car buyer is liable to ensure money is paid into the correct account Authentication Free Training Section:  3 Step Vendor Setup & Maintenance Process Workshop Vendor Banking Form Template:  https://debrarrichardson.com/store/vendor-banking-form-template Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

The Friendly Futurist: Towards Society 5.0
What is Social Engineering? And why you should be concerned? Interview with JJ from SoSafe

The Friendly Futurist: Towards Society 5.0

Play Episode Listen Later Jun 25, 2025 24:40


Joining us on deck this week on the Goodship SS Tomorrow is JJ from SoSafe In this episode, Dave and JJ discuss the evolving landscape of cybersecurity as we approach the midpoint of 2025 and the end of the financial year here in Australia. JJ shares insights from her extensive experience in the field, emphasising the importance of human behaviour in cybersecurity and the need for organisations to foster a culture of security awareness. They explore the current state of cyber threats, particularly the rise of AI-driven attacks and social engineering tactics. JJ provides practical tips for improving cyber hygiene and envisions a future where cybersecurity is recognised as a vital life skill. Keywords cybersecurity, human error, social engineering, AI threats, SoSafe, cyber hygiene, online safety, digital resilience, security awareness, future of cybersecurity Takeaways JJ has dedicated 25 years to bridging the divide between people and technology. SoSafe aims to create a culture of security awareness among organisations. Cyber threats are increasingly sophisticated, especially with AI. Everyone is a target for cyberattacks, regardless of their background. Fear can lead individuals to fall for scams, even when they know better. Two-factor authentication is a crucial step for online security. Cyber safety should be viewed as a life skill, not just a workplace issue. Misinformation online is becoming more prevalent and harder to detect. Password management tools are essential for maintaining security. Always verify the source of incoming communications before responding.

Ich glaube, es hackt!
Was Facebook kann, kann ein Virus schon lange

Ich glaube, es hackt!

Play Episode Listen Later Jun 25, 2025 50:55


In dieser gewohnt unterhaltsamen Folge plaudern Rüdiger und Tobias über ein Konzert mit fragwürdigem Sound, Meta als neuen Virenschleuder, Leaks mit 16 Milliarden Passwörtern und bizarre Browser-Dating-Konzepte. Dazu: Warum Google Maps Hinweise auf US-Militärschläge liefert, WhatsApp jetzt Werbung schalten wollte und die neue Apple-Clipboard-Hölle kommt. -- Wenn Euch unser Podcast gefallen hat, freuen wir uns über eine Bewertung! Feedback wie z.B. Themenwünsche könnt Ihr uns über sämtliche Kanäle zukommen lassen: Email: podcast@ichglaubeeshackt.de Web: podcast.ichglaubeeshackt.de Instagram: http://instagram.com/igehpodcast

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Jun 20, 2025 5:46


How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.sans.edu/diary/How%20Long%20Until%20the%20Phishing%20Starts%3F%20About%20Two%20Weeks/32052 Scammers hijack websites of Bank of America, Netflix, Microsoft, and more to insert fake phone numbers Scammers are placing Google ads that point to legitimate companies sites, but are injecting malicious text into the page advertising fake tech support numbers https://www.malwarebytes.com/blog/news/2025/06/scammers-hijack-websites-of-bank-of-america-netflix-microsoft-and-more-to-insert-fake-phone-number What s in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia Targeted attacks are tricking victims into creating app-specific passwords to Google resources. https://cloud.google.com/blog/topics/threat-intelligence/creative-phishing-academics-critics-of-russia

Cyber Crime Junkies
Why Hackers Target YOU. Dark Web EXPOSED.

Cyber Crime Junkies

Play Episode Listen Later Jun 20, 2025 58:40 Transcription Available


Host David Mauro interviews Jeremy Samide, CEO of Blackwired, about why hackers target you. We expose the latest dark web secrets, and the latest social engineering risks.  Find more about Blackwired here: https://www.blackwired.com/Send us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466

Putting the AP in hAPpy
Episode 343: Bank Account Ownership Validation Issues > What About Vendors With Different Names?

Putting the AP in hAPpy

Play Episode Listen Later Jun 19, 2025 29:30


There is a common scenario for those Accounts Payable or Vendor teams that can do bank account ownership validations when setting up or changing vendor data: many vendors have legitimate reasons why their bank account holder names do not match their legal name.  So, how are you supposed to know whether this is legitimate or fraudulent?Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:   AVM: 3-Step Vendor Setup and Maintenance Framework to Avoid Fraud, Fines and Bad Vendor Data: https://youtu.be/prvHJ6_Rf58 D&B Business Directory:  https://www.dnb.com OpenCorporates:  https://opencorporates.com/ SEC > EDGAR Database: https://www.sec.gov/edgar/search/#/entityName=USERFUL%2520CORPORATION State Registration Sites:   Vendor Process Training Center > Resource Library Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

The Social-Engineer Podcast
Ep. 279 - Security Awareness Series - Dodging Turkeys and Security Awareness with Stacey Edmonds REPLAY

The Social-Engineer Podcast

Play Episode Listen Later Jun 16, 2025 36:52


REPLAY (Original Air Date Oct 21, 2024)   Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Stacey Edmonds. Stacey is a multi-disciplinary EdTech innovator and Digital Safety Pioneer, driven by a commitment to democratizing knowledge. Stacey's expertise, encompassing social science, education, EdTech, and multi-platform screen production, culminated in the founding of Lively, which we will hear all about on this podcast. Since 2002, Stacey has been designing and delivering enterprise-wide cyber safety upskilling programs. In 2023, embodying her mission to make knowledge accessible, Stacey launched 'Dodgy or Not?' – a social enterprise offering an engaging approach to digital safety education.   She continues to bridge the gap between emerging technologies and practical education, driving innovation in AI ethics and digital literacy - she is also known for deepfaking herself. [Oct 21, 2024]   00:00 - Intro 00:19 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                03:00 - Stacey Edmonds Intro 04:18 - Teaching, Trains & Turkeys 08:43 - Toilets vs Videos 11:16 - Dodgy or Not? 15:15 - Social Engineering for Good! 17:46 - Pause for the Cause 20:17 - Training in Real Time 24:11 - Real Time Threat Detection 27:49 - Culture is Everything 30:33 - Find Stacey Edmonds online -          LinkedIn: in/staceyedmonds/ 31:28 – Mentors -          Carolyn Breeze -          Chris Hadnagy -          Janine Thompson -          Steve Rowe -          Shane Bell 33:58 - Book Recommendations -          Feel The Fear and Do It Anyway - Susan Jeffers -          The Hitchhiker's Guide to the Galaxy - Douglas Adams -          1984 - George Orwell -          Man-Made – Tracey Spicer 35:51 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

Putting the AP in hAPpy
Episode 342: Top 2 Reasons Vendors Reach Out to Me About You!

Putting the AP in hAPpy

Play Episode Listen Later Jun 12, 2025 26:10


You may be listening to this podcast to find out what your vendors are doing, but guess what?  Your vendors are reaching out to me to understand what you are doing!  If you want to know the top 2 reasons vendors reach out to me about you (and what you can do to avoid this), then…Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:   IRS W-9 Examples by Tax Classification - What To Look For When Accepting From Your Vendor:  https://training.debrarrichardson.com/course/w9 Do IRS Form W-9s Expire? When Should You Collect a New One? https://debrarrichardson.com/blog/do-irs-form-w-9s-expire-when-should-you-collect-a-new-one?rq=expire Do You Need to Collect the California 587 or 590 Forms When Setting Up New Vendors? https://debrarrichardson.com/blog/do-you-need-to-collect-the-california-587-or-590-forms-when-setting-up-new-vendors?rq=587 Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Risk Management: Brick by Brick
Wire Fraud and Social Engineering: Protecting Against Million-Dollar Scams with David Finz of Alliant Insurance

Risk Management: Brick by Brick

Play Episode Listen Later Jun 11, 2025 16:43


We're coming to you LIVE from Riskworld 2025! Join Jason Reichl on Risk Management: Brick by Brick as he sits down with David Finz, Senior Vice President at Alliant Insurance Services, to discuss the cyber threats costing businesses millions right now. From the $20 million voice phishing scam in Hong Kong to the everyday email that could drain your bank account, David reveals how criminals are using AI to impersonate executives and why your current defenses might not be enough. Don't miss this eye-opening conversation about the scams happening today and the practical steps that could save your company tomorrow!

Dangerous INFO podcast with Jesse Jaymz
211 "Octopus of Global Control" ft. Charlie Robinson, psychological operations, LA riots, social engineering

Dangerous INFO podcast with Jesse Jaymz

Play Episode Listen Later Jun 10, 2025 133:27


Send us a textEver get the feeling that your government is out to get you? They are, and tonight our guest Charlie Robinson is set about to uncover the century's long plan for world domination by the psychopaths that are running the world. Like us, he laughs at how insane it all is but he has ideas on how to foil their plans on his podcast, Macroaggresions with Charlie Robinson.  https://podcasts.apple.com/us/podcast/macroaggressions/id1501964274Charlie is also an author, The Octopus of Global Control is a controversial, nonfiction book detailing how those in positions of power are able to manipulate society for their benefit, why they believe that they are entitled to impose their warped world view of reality on mankind, and how we can break free from their grip. The book tackles topics such as uncovering the Deep State, false flag terror events, the media's role in manufacturing wars, the 9/11 deception, the fraud of central banking, our broken education system, the use of religion to shape society, and the corrupted medical industry. https://a.co/d/dTOwHdxSUPPORT THE SHOWBuy Me A Coffee http://buymeacoffee.com/DangerousinfopodcastSubscribeStar http://bit.ly/42Y0qM8Super Chat Tip https://bit.ly/42W7iZHBuzzsprout https://bit.ly/3m50hFTPaypal http://bit.ly/3Gv3ZjpPatreon http://bit.ly/3G37AVx SMART is the acronym that was created by technocrats that have setup the "internet of things" that will eventually enslave humanity to their needs. Support the showCONNECT WITH USWebsite https://www.dangerousinfopodcast.com/Guilded Chatroom http://bit.ly/42OayqyEmail the show dangerousinfopodcast@protonmail.comJoin mailing list http://bit.ly/3Kku5YtSOCIALSInstagram https://www.instagram.com/dangerousinfo/Twitter https://twitter.com/jaymz_jesseGab https://gab.com/JessejaymzTruth Social https://truthsocial.com/@jessejaymzWATCH LIVE YouTube https://www.youtube.com/@DANGEROUSINFOPODCASTRumble https://rumble.com/c/DangerousInfoPodcast Twitch https://www.twitch.tv/dangerousinfopodcastPilled https://pilled.net/profile/144176Facebook https://www.facebook.com/DangerousInfoPodcast/BitChute: https://www.bitchute.com/channel/egnticQyZgxDCloutHub https://clouthub.com/DangerousINFOpodcastDLive https://...

ITSPmagazine | Technology. Cybersecurity. Society
Understanding Cybersecurity Behavior: From Social Engineering to Shadow AI | An Infosecurity Europe 2025 Conversation with Jason Nurse | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 10, 2025 15:21


Dr. Jason Nurse, academic and cybersecurity behavior researcher, joins Marco Ciappelli at Infosecurity Europe to unpack the shift in cybersecurity thinking—away from purely technical measures and toward a deeper understanding of human behavior and psychology. Nurse focuses his work on why people act the way they do when it comes to security decisions, and how culture, community, and workplace influences shape those actions.Behavior is increasingly taking center stage in security conversations, and for good reason. Nurse points to recent attacks that succeed not because of flaws in technology but due to the manipulation of individuals—such as social engineering tactics that target help desk personnel. These incidents highlight how behavioral cues and psychological triggers are weaponized, making it critical for organizations to address not just systems, but the people using them.The conversation then shifts to artificial intelligence, particularly the growing issue of “shadow AI” in corporate settings. Nurse cites research from the National Cybersecurity Alliance's Behavior Report, revealing that approximately 40% of employees who use AI admit to sharing sensitive corporate information with these tools—often without their employer's awareness. Even more concerning, over half of those organizations offer no training on safe or responsible AI use.Rather than banning AI outright, Nurse advocates for responsible use grounded in training and transparency. He acknowledges that some companies attempt to enforce boundaries by deploying internal AI systems, but these are often limited in capability. Others are exploring solutions to filter or sanitize inputs, though achieving a practical balance remains elusive.The conversation also touches on the emotional and psychological bonds forming between individuals and AI. Nurse notes that users increasingly treat AI like a companion, trusting it with personal information and seeking advice, even in sensitive contexts such as mental health. That trust, while understandable, opens new avenues for misuse and misjudgment—especially when users forget AI lacks genuine understanding.This episode prompts an important question: as AI becomes part of our daily routines, how do we maintain control, context, and caution in our interactions with it—and what does that mean for the future of security?___________Guest: Dr. Jason R.C. Nurse, Associate Professor in Cybersecurity at the University of Kent | https://www.linkedin.com/in/jasonrcnurse/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974___________ResourcesLearn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Something You Should Know
Effective Strategies to Be More Persuasive & Genetics, Evolution and Why We Get Sick

Something You Should Know

Play Episode Listen Later Jun 9, 2025 52:51


The next time you or your kids get a shot at the doctor's office or face anything that you know is going to be painful, there is a little trick you can use that should reduce the pain substantially. Listen as I explain what it is. https://www.newscientist.com/article/dn27514-hold-your-breath-to-dampen-the-pain-of-an-injection/#.VVTKyZO_Heb What is it about persuasive people? They just have that “something” that makes us want to listen, to be around them, and in many cases, do what they ask. Why are some people more persuasive than others? What strategies can we all use to be more influential and persuasive. Here to offer some great insight into the workings of persuasion is Abbie Maroño. She is a scientist and a practitioner in the field of human behavior and is recognized by the US Department of State as being in the top 1% of behavior analysis experts. She has delivered specialized behavioral analysis training to the U.S. Secret Service, FBI, Department of Homeland Security, and local law enforcement agencies. She is author of the book The Upper Hand: Mastering Persuasion and Getting What You Want with the Science of Social Engineering (https://amzn.to/4jwGF59) Did you know that compared to many other species, humans have a high rate of genetic diseases. Wouldn't you think by now that evolution and "survival of the fittest" would've weeded those out? What science has recently discovered, about DNA and genetics is astonishing and is helping us understand how genetics work, how diseases are passed on, how genes can mutate and make us sick, why we have such a high rate of genetic diseases and how we may soon be able to fix or prevent some of it. Joining me to discuss this is Lawrence Hurst. He is a professor of evolutionary genetics at the Milner Centre for Evolution at the University of Bath and author of the book, The Evolution of Imperfection: The Science of Why We Aren't and Can't Be Perfect (https://amzn.to/3ZgOjJS) There are things in your kitchen you need to get rid of. Over time we bring things into the kitchen that we never need, never use that take up a lot of valuable space. Listen as I offer some suggestions on what you can get rid of right now with no regret whatsoever. https://www.delish.com/food/a63527523/6-things-you-should-never-keep-on-your-kitchen-counter-according-to-organizational-experts/ PLEASE SUPPORT OUR SPONSORS!!! MINT MOBILE: Get your summer savings and shop premium wireless plans at ⁠⁠⁠⁠⁠⁠⁠⁠https://MintMobile.com/something⁠⁠⁠⁠⁠⁠⁠⁠ ! FACTOR: Factor meals arrive fresh and ready to eat, perfect for your summer lifestyle! Get 50% off at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://FactorMeals.com/something50off⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ROCKET MONEY: Cancel your unwanted subscriptions and reach your financial goals faster! Go to ⁠⁠⁠⁠⁠https://RocketMoney.com/SOMETHING⁠⁠⁠⁠⁠ QUINCE: Stick to the staples that last, with elevated essentials from Quince! Go to ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://Quince.com/sysk⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ for free shipping on your order and 365 day returns! INDEED: Get a $75 sponsored job credit to get your jobs more visibility at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://Indeed.com/SOMETHING⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ right now! DELL: Introducing the new Dell AI PC . It's not just an AI computer, it's a computer built for AI to help do your busywork for you! Get a new Dell AI PC at⁠ https://Dell.com/ai-pc⁠ Learn more about your ad choices. Visit megaphone.fm/adchoices

a16z
Chris Dixon: Stablecoins, Startups, and the Crypto Stack

a16z

Play Episode Listen Later Jun 9, 2025 29:26


What if crypto isn't just a speculative asset class—but the next foundational layer of the internet?In this episode, Chris Dixon, founding partner of a16z crypto and one of the earliest, most forward-thinking investors in the space, joins TBPN for a wide-ranging conversation on the real, long-term promise of crypto—and why we're still early.He unpacks:Why stablecoins are already functioning as internet-native moneyHow blockchains can serve as global, programmable financial infrastructureWhy programmability, not just low fees, is the real unlockThe evolving regulatory landscape and new bipartisan momentumThe rise of AI agents, decentralized platforms, and real-world crypto use casesThis episode is about long-term thinking, technical optimism, and building open infrastructure for the future of the internet.Resources: Find Chris on X: https://x.com/cdixonWatch TBPN: https://www.tbpn.com/ Timecodes:00:00 Meet Chris Dixon: Crypto Visionary00:26 The Evolution of Stable Coins02:49 The Future of Stable Coins and Global Payments06:04 Lobbying Efforts and Legislative Impact09:01 Adoption Across Different Sectors11:53 Competitive Forces in the Crypto Market14:37 The Crypto Talent Shortage15:05 Opportunities in the Crypto Space17:08 Crypto Fund Performance19:04 Venture Capital in Crypto23:30 Real World Assets on Blockchain26:34 Social Engineering and Proof of Humanity29:10 Conclusion and Final Thoughts Stay Updated: Let us know what you think: https://ratethispodcast.com/a16zFind a16z on Twitter: https://twitter.com/a16zFind a16z on LinkedIn: https://www.linkedin.com/company/a16zSubscribe on your favorite podcast app: https://a16z.simplecast.com/Follow our host: https://x.com/eriktorenbergPlease note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.

Putting the AP in hAPpy
Episode 341: Why the Vendor Confirmation Call is Not A Silver Bullet to Avoid Payment Fraud

Putting the AP in hAPpy

Play Episode Listen Later Jun 5, 2025 23:01


The  confirmation call has long been hailed as a safeguard against fraud. But it's not.  Let's delve into why and what can improve the process.Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:   Get the Vendor Callback Confirmation Toolkit(TM) Today: https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Daily Crypto News
June 4: Watch Your Back! Social Engineering Attacks on The Rise

Daily Crypto News

Play Episode Listen Later Jun 4, 2025 19:37


TODAY'S HEADLINES - JUNE 4MoonPay to offer direct crypto services in all 50 US states after obtaining New York's BitLicense.Pump.Fun, reportedly, is raising $1 billion for a token sale at a $4 billion valuation.MARA hits monthly mining milestone, holds all 950 BTC to grow second-largest public crypto treasury.An unofficial Trump Wallet hits the market, according to Bitcoin Magazine. Don Jr. and Eric Trump have denied any involvement.Finally, 2.1B crypto stolen in 2025 as hackers shift focus from code to users, according to a recent CertiK report.Show SponsorsGear.ExeThis episode is brought to you by Gear.Exe. Supercharge Ethereum. Build on Ethereum but Experience Solana. There is no need for L2s and bridging your assets anymore because Gear.Exe is a bridgeless rollup and execution layer. Imagine a world where Ethereum has Web2-grade UX, less than one-second transaction latency, a 90–99% reduction in gas fee, and up to 1000x more compute capacity. If you want to scale your existing ETH mainnet, Dapp, visit Gear.Exe.C3The C3 team has more than 20 years of experience in journalism, including leading the editorial and content side of a major Web3 news publication. They are also experienced AI and Web3 PR professionals, regularly placing content in leading web3 and AI publications. C3's members previously co-founded the PR department at SCRIB3, and have experience with clients such as EigenLayer, VanEck, Monad, SKALE Network, LEVR Bet, Symmio, Camp Network, Evmos, Avail, Moonbeam, and others.WHERE TO FIND DCNdailycryptonews.nethttps://twitter.com/DCNDailyCryptoEMAIL or FOLLOW the HostsEmail: kyle@dailycryptonews.net——————————————————————***NOT FINANCIAL, LEGAL, OR TAX ADVICE! JUST OPINION! WE ARE NOT EXPERTS! WE DO NOT GUARANTEE A PARTICULAR OUTCOME. WE HAVE NO INSIDE KNOWLEDGE! YOU NEED TO DO YOUR OWN RESEARCH AND MAKE YOUR OWN DECISIONS! THIS IS JUST EDUCATION & ENTERTAINMENT! Hosted on Acast. See acast.com/privacy for more information.

The Social-Engineer Podcast
Ep. 307 - The Doctor Is In Series - Why is the Road to Self-Betterment So Lonely

The Social-Engineer Podcast

Play Episode Listen Later Jun 2, 2025 35:16


Welcome to the Social-Engineer Podcast: The Doctor Is In Series – where we will discuss understandings and developments in the field of psychology.   In today's episode, Chris and Abbie are discussing why change can feel so lonely? They will talk about what triggers growth in people, the amount a person can actually change and how loneliness plays a role in this growth. [June 2, 2025]   00:00 - Intro 00:47 - Dr. Abbie Maroño Intro 01:06 - Intro Links -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                 02:23 - Dr. Abbie Announcement 03:30 - The Topic of the Day: The Lonely Chapter 04:38 - Triggering Change 06:00 - People Don't Change? 11:30 - All Change Isn't Growth 13:15 - Why Growth Can Be Lonely 15:56 - What About Love? 17:16 - New You, Who Dis? 21:19 - Feelings Can REALLY Hurt! 22:15 - Choosing Who You Are 24:36 - Syncing Up 27:43 - A Constant Evolution 30:17 - Search For Meaning 32:31 - Making Connections 33:12 - Wrap Up 33:56 - Next Month: Love At First Sight 34:42 - Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org   Find us online: -          LinkedIn: linkedin.com/in/dr-abbie-maroño-phd -          Instagram: @DoctorAbbieofficial -          LinkedIn: linkedin.com/in/christopherhadnagy     References: Eisenberger, N. I., Lieberman, M. D., & Williams, K. D. (2003). Does rejection hurt? An fMRI study of social exclusion. Science, 302(5643), 290–292. https://doi.org/10.1126/science.1089134 Ebaugh, H. R. F. (1988). Becoming an ex: The process of role exit. University of Chicago Press. Festinger, L. (1957). A theory of cognitive dissonance. Stanford University Press. Frankl, V. E. (1963). Man's search for meaning: An introduction to logotherapy. Beacon Press. Higgins, E. T. (1987). Self-discrepancy: A theory relating self and affect. Psychological Review, 94(3), 319–340. https://doi.org/10.1037/0033-295X.94.3.319 Mass, M. (1991). The theory of "identity dissonance": Mass. Dissertation Abstracts International, 52(1), 577B. Sandstrom, G. M., & Dunn, E. W. (2014). Social interactions and well-being: The surprising power of weak ties. Personality and Social Psychology Bulletin, 40(7), 910–922. https://doi.org/10.1177/0146167214529799 Uvnäs-Moberg, K., Arn, I., & Magnusson, D. (2005). The psychobiology of oxytocin: An integrative review. Psychoneuroendocrinology, 30(7), 610–626. https://doi.org/10.1016/j.psyneuen.2005.02.008

Fringe Radio Network
Who Really Runs Hollywood? Crime and Soulless Messaging with Counterculture Mom Tina Griffin - Sarah Westall

Fringe Radio Network

Play Episode Listen Later Jun 1, 2025 46:35


Former Hollywood actress and Counterculture Mom, Tina Griffin, joins the show to expose the dark underbelly of the entertainment industry. Drawing from her firsthand experience, she reveals how pop culture is deliberately glamorizing destructive behaviors, normalizing crime, and accelerating the moral decay of our nation. Tina breaks down how this cultural manipulation is targeting our youth—undermining their values, identity, and future.To follow Tina Griffin or book her for a speaking event, visit: https://counterculturemom.com/ 

More or Less with the Morins and the Lessins
#101: The Business of OnlyFans, Future of Identity, and Navigating Privacy in the AI Age

More or Less with the Morins and the Lessins

Play Episode Listen Later May 30, 2025 56:06


This week on More or Less: Investors too squeamish for OnlyFans, AI makes the creator economy weirder (and richer), and why your next ETF might be Mormon. Plus, the real reason nobody watches your full podcast, and a healthy dose of tech industry self-roasting. TakeawaysOnlyFans presents a unique investment opportunity despite its controversial nature.Market dynamics in the sex work industry are shifting due to platforms like OnlyFans.Investment perspectives on controversial industries are evolving with societal changes.Digital identity verification is becoming increasingly important in the tech landscape.AI is transforming content creation and user interaction on platforms like OnlyFans.The need for robust age verification systems is critical for online safety.Social engineering poses significant risks to digital security and identity verification.The intersection of technology and privacy raises important ethical questions.New technologies are emerging to address identity verification challenges. Cybersecurity is a growing concern in today's digital age.Personal security measures are becoming increasingly important.The evolution of media is leading to new forms of content consumption.Platforms like TBPN are disrupting traditional media models.Cultural shifts are changing the landscape of digital content.Celebrity ventures are becoming significant players in the market.The importance of remembering complex passwords cannot be overstated.Media companies must adapt to the soundbite era to stay relevant.Tech hiring is experiencing a downturn post-pandemic.The de-stigmatization of platforms like OnlyFans is creating new opportunities.We're also on ↓X: https://twitter.com/moreorlesspodInstagram: https://instagram.com/moreorlessConnect with us here:Sam Lessin: https://x.com/lessinDave Morin: https://x.com/davemorinJessica Lessin: https://x.com/JessicalessinBrit Morin: https://x.com/britChapters00:00 Celebrating Milestones and Listener Engagement03:00 The Business of OnlyFans and Its Market Dynamics05:58 Investment Perspectives on Controversial Industries09:04 The Evolution of Digital Identity and Security12:00 The Intersection of Technology and Privacy14:59 The Future of Age Verification and Digital Safety17:53 The Role of AI in Content Creation and Interaction20:59 Exploring New Technologies for Identity Verification24:06 The Implications of Social Engineering and Security Risks34:00 Navigating Cybersecurity Challenges36:55 The Importance of Personal Security39:57 Media Evolution and Disruption44:03 The Future of Tech and Media49:57 Cultural Shifts in Digital Content53:58 Celebrity Ventures and Market Trends

Putting the AP in hAPpy
Episode 340: Part 2 with Troy Baker of the BBB: Is Your Company an SMB? You're At Risk for Fraud and the Better Business Bureau's Resources Can Help

Putting the AP in hAPpy

Play Episode Listen Later May 29, 2025 29:06


If you're company is a small or medium sized business, don't get comfortable about fraud – you're being targeted too.  Troy Baker is back to talk fraud and how the fraud prevention resources at the Better Business Bureau can help you protect your payments from fraudsters.Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:   Better Business Bureau Links:  Main Webpage:  https://www.bbb.org Scam Tracker:  https://www.bbb.org/scamtracker Scam News/Tips:  https://www.bbb.org/all/scamtips Sign-Up for Scam Alerts: https://signup.e2ma.net/signup/1900156/1902645/ Michigan Better Business Bureau:  https://www.bbb.org/miprograms Validate Charities:  https://www.give.org Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Cybercrime Magazine Podcast
Cybercrime Magazine Update: Small Business Alert. Top 10 Most Common Social Engineering Attacks.

Cybercrime Magazine Podcast

Play Episode Listen Later May 27, 2025 4:20


Tech Bullion has highlighted the top 10 most common social engineering attacks that small businesses should know, including phishing emails and spear phishing. In this episode, host Paul John Spaulding is joined by Steve Morgan, Founder of Cybersecurity Ventures and Editor-in-Chief at Cybercrime Magazine, to discuss. The Cybercrime Magazine Update airs weekly and covers the latest news, interviews, podcasts, reports, videos, and special productions from Cybercrime Magazine, published by Cybersecurity Ventures. For more on cybersecurity, visit us at https://cybersecurityventures.com.

Cyber Security Today
From English Literature to Cybersecurity: A Journey Through Blockchain and Security

Cyber Security Today

Play Episode Listen Later May 24, 2025 54:36 Transcription Available


LINKS:  https://distrust.co/software.html - Software page with OSS software Linux distro: https://codeberg.org/stagex/stagex Milksad vulnerability:  https://milksad.info/ In this episode of Cybersecurity Today on the Weekend, host Jim Love engages in a captivating discussion with Anton Livaja  from Distrust. Anton shares his unique career transition from obtaining a BA in English literature at York University to delving into cybersecurity and tech. Anton recounts how he initially entered the tech field through a startup and quickly embraced programming and automation. The conversation covers Anton's interest in Bitcoin and blockchain technology, including the importance of stablecoins, and the frequent hacking incidents in the crypto space. Anton explains the intricacies of blockchain security, emphasizing the critical role of managing cryptographic keys. The dialogue also explores advanced security methodologies like full source bootstrapping and deterministic builds, and Anton elaborates on the significance of creating open-source software for enhanced security. As the discussion concludes, Anton highlights the need for continual curiosity, teamwork, and purpose-driven work in the cybersecurity field. 00:00 Introduction to Cybersecurity Today 00:17 Anton's Journey from Literature to Cybersecurity 01:08 First Foray into Programming and Automation 02:35 Blockchain and Its Real-World Applications 04:36 Security Challenges in Blockchain and Cryptocurrency 13:21 The Rise of Insider Threats and Social Engineering 16:40 Advanced Security Measures and Supply Chain Attacks 22:36 The Importance of Deterministic Builds and Full Source Bootstrapping 29:35 Making Open Source Software Accessible 31:29 Blockchain and Supply Chain Traceability 33:34 Ensuring Software Integrity and Security 38:20 The Role of AI in Code Review 40:37 The Milksad Incident 46:33 Introducing Distrust and Its Mission 52:23 Final Thoughts and Encouragement

Putting the AP in hAPpy
Episode 339: The Better Business Bureau's Troy Baker on How to Shield Your Business From Fraud Using BBB Resources

Putting the AP in hAPpy

Play Episode Listen Later May 22, 2025 47:29


Did you know you can find lots of fraud prevention resources from the Better Business Bureau?  In this episode, Troy Baker from the Michigan Better Business Bureau talks about fraud, using the BBB for validations and what we both think is the best thing to do that will keep your company protected from fraud.   Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:   Better Business Bureau Links:  Main Webpage:  https://www.bbb.org Scam Tracker:  https://www.bbb.org/scamtracker Scam News/Tips:  https://www.bbb.org/all/scamtips Sign-Up for Scam Alerts: https://signup.e2ma.net/signup/1900156/1902645/ Michigan Better Business Bureau:  https://www.bbb.org/miprograms Validate Charities:  https://www.give.org Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Human Elevation
#372 - So fängt jede Diktatur an - was wir aus der Geschichte nicht lernen // Dr. Dr. Zitelmann

Human Elevation

Play Episode Listen Later May 16, 2025 101:29


Was, wenn Schönheit zur Bedrohung wird?In dieser provokanten Folge spricht Patrick Reiser mit dem Historiker, Soziologen und Unternehmer Dr. Dr. Rainer Zitelmann über sein dystopisches Buch 2075 – Wenn Schönheit zum Verbrechen wird.Ein Gespräch über Cancel Culture, Gleichheitswahn, Kapitalismus, Freiheit, Social Engineering – und warum uns die Geschichte lehren sollte, aufmerksamer zu sein.Zitelmann zeigt auf, wie Ideologien entstehen, warum radikale Ideen oft von Intellektuellen kommen – und was wir heute tun können, um unsere Freiheit zu bewahren.Eine Folge, die herausfordert. Und dich zum Nachdenken bringt._____► Jetzt Patricks neues Buch versandkostenfrei bestellen

Doppelgänger Tech Talk
xAI Propaganda-Panne | Reddit Google-Sichtbarkeit | Booking | Cohere #458

Doppelgänger Tech Talk

Play Episode Listen Later May 16, 2025 70:56


Grok erzählt zusammenhangslos Verschwörungstheorie über weißen Genozid in Südafrika. Trumps Zölle könnten die US-Konsumlaune ins Wanken bringe. Cohere verfehlt seine Umsatzerwartungen drastisch. CoreWeave übertrifft Erwartungen. Microsofts KI-gestützte Einsparungen werfen Fragen zur Zukunft der Softwareentwicklung auf. Coinbase wurde Opfer von Social Engineering. Unterstütze unseren Podcast und entdecke die Angebote unserer Werbepartner auf ⁠⁠⁠⁠⁠doppelgaenger.io/werbung⁠⁠⁠⁠⁠. Vielen Dank!  Philipp Glöckler und Philipp Klöckner sprechen heute über: (00:00:00) Intro (00:01:50) Reddit Google (00:08:15) Youtube Podcast Charts (00:12:15) US Verbraucherbelastung (00:18:45) xAI Systemprompt Genozid Südafrika (00:32:00) Cohere  (00:38:30) CoreWeave  (00:45:20) AirBnb & Booking (00:56:00) TikTok (00:58:00) Microsoft Entlassungen Softwareentwickler (01:01:20) Coinbase Hack (01:06:15) Trump Apple Indienple Shownotes YouTube veröffentlicht Ranking der Top-Podcasts in den USA – nytimes.com Verbraucher unter Druck durch Trumps Zölle – nytimes.com Grok „weißer Völkermord“ in Südafrika - pivot-to-ai.com, axios.com Grok System Prompt – x.com Sam Altman Tweet – x.com Warum Cohere seine Umsatzprognose um 85% verfehlte – theinformation.com Warum ein KI-Datenzentrum auf der Prärie leer steht – theinformation.com CoreWeave übertrifft Erwartungen – ft.com Airbnb: Köche und Massagen in neuer App – bbc.com EU gegen TikTok wegen Online-Inhaltsregeln – ft.com Microsoft-Entlassungen treffen Softwareingenieure, AI-Einsparungen – bloomberg.com Cyberangriff auf Kryptobörse: Kopfgeld auf Hacker ausgesetzt – manager-magazin.de Trump Apple Indien – ft.com Apple warnt vor EU-Apps ohne App-Store-Zahlungen – theverge.com

Putting the AP in hAPpy
Episode 338: 3 Benefits When the Customer Master File is Also the Vendor Master File

Putting the AP in hAPpy

Play Episode Listen Later May 15, 2025 20:58


Is your vendor master file and customer master file the same?  Don't miss taking advantage of these key benefits when they are one in the same.  What are they?  Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:   Customer Master File Training (50% off Through 6/15/25):  3 Step Customer Setup & Maintenance Process Workshop Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Disruption / Interruption
Disrupting Commercial Real Estate: Josef Pipoly's AI Eliminates the Industry's Biggest Bottleneck

Disruption / Interruption

Play Episode Listen Later May 15, 2025 36:10


Josef is the founder of BrikMate, a company using AI to transform how commercial real estate teams manage, analyze, and extract insights from complex lease data. In this episode, KJ and Josef delve into the importance of confidence and curiosity for innovators and the potential of AI to revolutionize the service industry. Key Takeaways: 05:41 Evolution of Cybersecurity Threats 08:14 Modern Phishing and Social Engineering Tactics 10:32 Deepfake and Advanced Cyber Attacks 19:50 AI in Cybercrime: The Nigerian Email Scam 26:19 Future of Cybersecurity: AI vs. Human Quote of the Show (19:00): “The customer doesn't always know what they want. It takes someone who's confident, curious, and willing to take action" – Josef Pipoly Join our Anti-PR newsletter where we’re keeping a watchful and clever eye on PR trends, PR fails, and interesting news in tech so you don't have to. You're welcome. Want PR that actually matters? Get 30 minutes of expert advice in a fast-paced, zero-nonsense session from Karla Jo Helms, a veteran Crisis PR and Anti-PR Strategist who knows how to tell your story in the best possible light and get the exposure you need to disrupt your industry. Click here to book your call: https://info.jotopr.com/free-anti-pr-eval Ways to connect with Josef Pipoly: LinkedIn: https://www.linkedin.com/in/josefpipoly Company LinkedIn: https://www.brikmate.com/ How to get more Disruption/Interruption: Amazon Music - https://music.amazon.com/podcasts/eccda84d-4d5b-4c52-ba54-7fd8af3cbe87/disruption-interruption Apple Podcast - https://podcasts.apple.com/us/podcast/disruption-interruption/id1581985755 Spotify - https://open.spotify.com/show/6yGSwcSp8J354awJkCmJlDSee omnystudio.com/listener for privacy information.

Putting the AP in hAPpy
Episode 337: April 2025 Changes to the 1099-MISC and 1099-NEC

Putting the AP in hAPpy

Play Episode Listen Later May 8, 2025 16:26


Of course – the IRS has updated the 1099-MISC and 1099-NEC again effective for reporting Tax Year 2025 payments to your vendors.  It's not that bad though….Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team.  Links mentioned in the podcast + other helpful resources:   Training:  From an Accounts Payable Perspective:  Year-End Checklist for 1099-MISC, 1099-NEC and 1042-S Reporting IRS:  Instructions for Forms 1099-MISC and 1099-NEC (Rev. April 2025) IRS:  Form 1099-MISC (Rev. April 2025)  https://www.irs.gov/pub/irs-pdf/f1099msc.pdf IRS:  Form 1099-NEC (Rev. April 2025) https://www.irs.gov/pub/irs-pdf/f1099nec.pdf Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Disruption / Interruption
Disrupting Fear: Weaponizing AI to Beat Cybercriminals at Their Own Game with Ross Lazer

Disruption / Interruption

Play Episode Listen Later May 8, 2025 37:34


Ross Lazer is the Co-Founder and CEO of Mirage Security, a company using AI to simulate realistic spear-phishing attacks, including voice-based simulations using deepfakes, to train employees to recognize and resist social engineering tactics. In this episode, KJ and Ross uncover the evolving landscape of cybersecurity where attackers are increasingly targeting human weaknesses using sophisticated AI techniques. Ross reveals how Mirage Security is utilizing AI to simulate realistic phishing attacks, including voice and video deepfakes, to train employees and outsmart potential threats. They discuss the rapid advancements in social engineering tactics, the importance of contrarian thinking in innovation, and the future of cybersecurity training. Key Takeaways: 05:41 Evolution of Cybersecurity Threats 08:14 Modern Phishing and Social Engineering Tactics 10:32 Deepfake and Advanced Cyber Attacks 19:50 AI in Cybercrime: The Nigerian Email Scam 26:19 Future of Cybersecurity: AI vs. Human Quote of the Show (16:00): “In cybersecurity, the real challenge isn't just the technology; it's transforming the human side from our greatest vulnerability into our strongest defense." – Ross Lazer Join our Anti-PR newsletter where we’re keeping a watchful and clever eye on PR trends, PR fails, and interesting news in tech so you don't have to. You're welcome. Want PR that actually matters? Get 30 minutes of expert advice in a fast-paced, zero-nonsense session from Karla Jo Helms, a veteran Crisis PR and Anti-PR Strategist who knows how to tell your story in the best possible light and get the exposure you need to disrupt your industry. Click here to book your call: https://info.jotopr.com/free-anti-pr-eval Ways to connect with Ross Lazer: LinkedIn: https://www.linkedin.com/in/rosslazer/ Company LinkedIn: https://www.linkedin.com/company/miragesecurity/ How to get more Disruption/Interruption: Amazon Music - https://music.amazon.com/podcasts/eccda84d-4d5b-4c52-ba54-7fd8af3cbe87/disruption-interruption Apple Podcast - https://podcasts.apple.com/us/podcast/disruption-interruption/id1581985755 Spotify - https://open.spotify.com/show/6yGSwcSp8J354awJkCmJlDSee omnystudio.com/listener for privacy information.

Communism Exposed:East and West
The Root of Totalitarianism Is Social Engineering

Communism Exposed:East and West

Play Episode Listen Later May 4, 2025 6:31


Trust Issues
EP 6 - Incident Response POV: 2025 Emerging Threats

Trust Issues

Play Episode Listen Later Apr 30, 2025 36:41


In this episode of Security Matters, host David Puner, dives into the world of evolving cyberthreats with Bryan Murphy, Senior Director of CyberArk's Incident Response Team. Imagine a scenario where an attacker uses AI-generated deepfakes to impersonate your company's VP of finance, gaining unauthorized access to your environment. Bryan Murphy shares insights on how these sophisticated attacks are turning identity into the attack surface and why your first line of defense might be as simple as a video call. Learn about the latest trends in social engineering, credential tiering and the importance of visual verification in incident response. Don't miss this eye-opening discussion on how to protect your organization from the ever-evolving threat landscape.

The Effortless Podcast
MCP Is Less Software Engineering And More Social Engineering Ft. Harpinder Singh- Episode 14: The Effortless Podcast

The Effortless Podcast

Play Episode Listen Later Apr 30, 2025 79:03


Episode 14 | The Effortless PodcastIn this episode of The Effortless Podcast, hosts Dheeraj Pandey and Amit Prakash sit down with Harpinder "Happy" Singh, AI/ML Engineer at DevRev, to explore the future of AI and machine learning in business automation. Happy, who joined DevRev in 2021, shares his journey from computer science to AI, discussing how DevRev is leveraging cutting-edge technologies like large language models (LLMs) and function calling to streamline enterprise workflows.Happy breaks down the key concepts of AI-driven workflows, the debate between federated and integrated systems, and the growing importance of Python in AI. He also shares insights from the CodeAct paper, which proposes using Python code execution for more efficient and flexible LLMs. The conversation highlights the transformative potential of AI in enterprise automation and how it is reshaping industries.They also cover:The evolution of AI at DevRev: From workflows to AI-driven automationThe role of Python in executing complex tasks for LLMsUnderstanding the user-agent-environment model in AI systemsHow federated vs. integrated systems impact AI performanceThe future of AI in enterprise automation and DevRev's innovationsHappy's decision to stay in India and the growing tech ecosystem in IndiaThis episode provides valuable insights into how AI is transforming business operations, making complex workflows more efficient and accessible. Whether you're an AI enthusiast, a developer, or a business leader, this conversation is a must-listen for anyone interested in the next wave of AI-driven innovation.Key Topics & Timestamps:00:00 – Introduction to Harpinder "Happy" Singh & His Journey into AI03:00 – Happy's Early Background: From Shahjahanpur to BITS Pilani06:30 – Transition to AI at DevRev09:30 – Bangalore Life and Growing with DevRev13:00 – AI in India vs. the US18:00 – Federated vs. Integrated Systems: Which Approach Works Best for AI?25:00 – The Role of Python in AI32:00 – User, Agent, and Environment Model in AI39:30 – The CodeAct Paper: Replacing Tool Calls with Python Code Execution47:00 – AI in Enterprise Automation: How DevRev Uses AI to Streamline Workflows54:00 – Looking Ahead at DevRev's AI Innovations1:00:00 – Final Reflections: The Future of AI in Business and AutomationHosts:Dheeraj Pandey: Co-founder and CEO at DevRev, formerly CEO of Nutanix, a tech visionary passionate about AI and systems thinking.Amit Prakash: Co-founder and CTO at ThoughtSpot, former engineer at Google and Microsoft, and expert in distributed systems and machine learning.Guest:Harpinder Jot Singh: AI/ML Engineer at DevRev, working on the cutting edge of large language models (LLMs), AI-driven workflows, and integrating AI into enterprise systems.Follow the Host and the Guest:Dheeraj Pandey: LinkedIn | XAmit Prakash: LinkedIn | XHarpinder Singh: LinkedInHave questions or thoughts on AI? Drop us a mail at effortlesspodcasthq@gmail.comDon't forget to like, comment, and subscribe for more insights into the future of AI, business automation, and enterprise technology!

The
How to Instantly Read People & Protect Yourself from Manipulation w/ Chase Hughes (WiM577)

The "What is Money?" Show

Play Episode Listen Later Apr 28, 2025 154:04


// GUEST //Website: https://nci.university/X: https://x.com/nciuniversityYoutube: https://www.youtube.com/@chasehughesofficialBook: https://www.amazon.com/dp/173514164XInstagram: https://www.instagram.com/chasehughesofficialFacebook: https://www.facebook.com/chasehughesofficial/ // SPONSORS //The Farm at Okefenokee: https://okefarm.com/iCoin: https://icointechnology.com/breedloveHeart and Soil Supplements (use discount code BREEDLOVE): https://heartandsoil.co/In Wolf's Clothing: https://wolfnyc.com/Revero: https://www.revero.com/breedloveBlockware Solutions: https://mining.blockwaresolutions.com/breedloveOn Ramp: https://onrampbitcoin.com/?grsf=breedloveMindlab Pro: https://www.mindlabpro.com/breedloveCoinbits: https://coinbits.app/breedlove // PRODUCTS I ENDORSE //Protect your mobile phone from SIM swap attacks: https://www.efani.com/breedloveNoble Protein (discount code BREEDLOVE for 15% off): https://nobleorigins.com/Lineage Provisions (use discount code BREEDLOVE): https://lineageprovisions.com/?ref=breedlove_22Colorado Craft Beef (use discount code BREEDLOVE): https://coloradocraftbeef.com/ // SUBSCRIBE TO THE CLIPS CHANNEL //https://www.youtube.com/@robertbreedloveclips2996/videos // OUTLINE //0:00 - WiM Episode Trailer1:40 - From the Navy to Behavioral Science6:10 - The Origins of Social Anxiety12:34 - Dealing with Social Anxiety19:10 - Fake it Till You Make It?26:14 - The Farm at Okefenokee27:40 - iCoin Technology29:10 - The Power of Focusing on Others32:10 - Intuition and Incongruent Behavior37:12 - Dealing With Online Criticism39:58 - Behavior Science 10150:55 - Carrying Concealed Shame56:42 - Heart and Soil Supplements57:42 - Helping Lightning Startups with In Wolf's Clothing58:34 - Personalize Your Health with Revero59:37 - Radical Truth and Forgiving Yourself1:08:33 - Handling Manipulation1:16:45 - Concealment of Intent1:24:50 - Mine Bitcoin with Blockware Solutions1:26:16 - Onramp Bitcoin Custody1:27:39 - Money Printing is Mind Control1:37:01 - The History of Propaganda1:53:22 - Mind Lab Pro Supplements1:54:32 - Buy Bitcoin with Coinbits1:55:43 - Waking Up to Manipulation and Propaganda2:00:14 - Empathy and Rationality2:09:11 - The Psychopath Checklist2:17:22 - Interrogation 1012:28:20 - Seeing Behind People's Mask2:32:27 - Closing Thoughts and Where to Find Chase Hughes // PODCAST //Podcast Website: https://whatismoneypodcast.com/Apple Podcast: https://podcasts.apple.com/us/podcast/the-what-is-money-show/id1541404400Spotify: https://open.spotify.com/show/25LPvm8EewBGyfQQ1abIsERSS Feed: https://feeds.simplecast.com/MLdpYXYI // SUPPORT THIS CHANNEL //Bitcoin: 3D1gfxKZKMtfWaD1bkwiR6JsDzu6e9bZQ7Sats via Strike: https://strike.me/breedlove22Dollars via Paypal: https://www.paypal.com/paypalme/RBreedloveDollars via Venmo: https://account.venmo.com/u/Robert-Breedlove-2 // SOCIAL //Breedlove X: https://x.com/Breedlove22WiM? X: https://x.com/WhatisMoneyShowLinkedin: https://www.linkedin.com/in/breedlove22/Instagram: https://www.instagram.com/breedlove_22/TikTok: https://www.tiktok.com/@breedlove22Substack: https://breedlove22.substack.com/All My Current Work: https://linktr.ee/robertbreedlove

The Social-Engineer Podcast
Ep. 302 - The 4th Monday Series - From Scam Victim to Investment Guru with Kayla Lussier

The Social-Engineer Podcast

Play Episode Listen Later Apr 28, 2025 25:06


Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news.   Today Chris and Mike are joined by Kayla Lussier. Kayla is the co-founder of Money Match, a platform championing financial wellness by connecting real estate investors and small businesses with the capital they need to thrive. Her 15 years in healthcare as a nurse practitioner have instilled in her a deep understanding of holistic well-being – mind, body, and wallet. [April 28, 2025]   00:00 - Intro 00:16 - Mike Holfeld Intro 00:47 - Today's Guest: Kayla Lussier 01:53 - Jumping In Too Quickly 03:22 - Getting Burned 07:35 - Don't Mess with Kayla! 09:07 - Making a Match 13:21 - Play is the Way 15:17 - Mitigating the Risks 18:26 - Digital Nomads Welcome 21:25 - Find Kayla Lussier Online -          Website: moneymatchapp.com 22:30 - Silver Tsunami 24:26 - Wrap Up 24:40 - Next Month: Baseball Technology 24:50 - Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org   Find us online: -          Chris Hadnagy -          Twitter: @humanhacker -          LinkedIn: linkedin.com/in/christopherhadnagy

Putting the AP in hAPpy
Episode 335: Why the Vendor Process Is Key to Preventing ACH, Wire and Check Payment Fraud

Putting the AP in hAPpy

Play Episode Listen Later Apr 24, 2025 25:20


Invoice automation is great for invoice processing and even has artificial intelligence tools that can help spot attempted fraud – but it's really the vendor setup and maintenance process that will save you from making fraudulent electronic and check payments. Keep listening.  Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team.  Links mentioned in the podcast + other helpful resources:    Training: The BANK of AP: An Internal Control System to Combat Business Email Compromise Training: AVM 3 Step Vendor Setup & Maintenance process Workshop Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

ITSPmagazine | Technology. Cybersecurity. Society
Living Forever (Sort Of): AI Clones, Digital Ghosts, and the Problem with Perfection | A Carbon, a Silicon, and a Cell walk into a bar... | A Redefining Society Podcast Series With Recurring Guest Dr. Bruce Y. Lee

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 17, 2025 43:23


Guest: Dr. Bruce Y LeeSenior Contributor @Forbes | Professor | CEO | Writer/Journalist | Entrepreneur | Digital & Computational Health | #AI | bruceylee.substack.com | bruceylee.com Bruce Y. Lee, MD, MBA is a writer, journalist, systems modeler, AI, computational and digital health expert, professor, physician, entrepreneur, and avocado-eater, not always in that order.Executive Director of PHICOR (Public Health Informatics, Computational, and Operations Research) [@PHICORteam]On LinkedIn | https://www.linkedin.com/in/bruce-y-lee-68a6834/Website | https://www.bruceylee.com/_____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastVisit Marco's website

The Social-Engineer Podcast
Ep. 300 - Human Element Series - Celebrating 300 Episodes of The Social Engineer Podcast

The Social-Engineer Podcast

Play Episode Listen Later Apr 14, 2025 54:23


Today we are celebrating our 300th episode! Chris will be joined by some friends as he discusses how the podcast got started - back in 2009, how it has evolved, including the creation of multiple series, and the direction for the future. [April 14, 2025]   00:00 - Intro 00:22 - Intro Links -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                02:45 - Social-Engineer Origin Story 03:59 - The Human Element Series 05:34 - The Security Awareness Series 06:03 - The Doctor Is In Series 06:12 - The SE ETC. Series 06:28 - The 4th Monday Series 07:05 - The Future 07:43 - Amanda Drops By 08:35 - Ooof! 09:12 - SE Trivia 13:17 - A Video Celebration! 21:16 - Neil Fallon Drops By 52:50 - Wrap Up 53:56 - Outro -           www.social-engineer.com -          www.innocentlivesfoundation.org

The Health Ranger Report
Brighteon Broadcast News, Apr 11, 2025 – END OF EMPIRE: Trump disses the entire world while the dollar collapses and GOLD SKYROCKETS

The Health Ranger Report

Play Episode Listen Later Apr 11, 2025 144:04


- Trump's Geopolitical Illiteracy and Flu Vaccine Effectiveness (0:10) - RFK Jr.'s Advocacy and Measles Outbreak (3:23) - Trump's International Diplomacy and Economic Impact (8:55) - Trump's Economic Idiocy and Military Incompetence (20:07) - The Role of Vaccines in Autism and Infant Formula Testing (33:46) - The Influence of Zionism in America and the Deep State (52:03) - The Role of Tavistock Institute in Social Engineering (57:25) - The Cognition Race and the Depopulation Agenda (1:05:27) - The Role of Gold and Silver in Economic Stability (1:06:41) - The Future of Human Cognition and Machine Cognition (1:09:32) - Energy Consumption and Data Centers (1:18:51) - Competition for Resources (1:21:43) - Impact of Automation on Jobs (1:23:57) - Human Genius and AI Tools (1:26:49) - Homegrown Food and Seed Kits (1:30:47) - Interview with Dane Wigington (1:33:52) - Geoengineering and Weather Control (1:40:08) - Health and Environmental Impact (1:57:09) - Legislation and Public Awareness (2:22:20) - Future Prospects and Call to Action (2:23:00) For more updates, visit: http://www.brighteon.com/channel/hrreport NaturalNews videos would not be possible without you, as always we remain passionately dedicated to our mission of educating people all over the world on the subject of natural healing remedies and personal liberty (food freedom, medical freedom, the freedom of speech, etc.). Together, we're helping create a better world, with more honest food labeling, reduced chemical contamination, the avoidance of toxic heavy metals and vastly increased scientific transparency. ▶️ Every dollar you spend at the Health Ranger Store goes toward helping us achieve important science and content goals for humanity: https://www.healthrangerstore.com/ ▶️ Sign Up For Our Newsletter: https://www.naturalnews.com/Readerregistration.html ▶️ Brighteon: https://www.brighteon.com/channels/hrreport ▶️ Join Our Social Network: https://brighteon.social/@HealthRanger ▶️ Check In Stock Products at: https://PrepWithMike.com

Sales vs. Marketing
Lessons - Fixing Human Error in Cybersecurity | Theresa Payton - Former White House CIO

Sales vs. Marketing

Play Episode Listen Later Mar 30, 2025 11:29


➡️ Like The Podcast? Leave A Rating: https://ratethispodcast.com/successstory  In this "Lessons" episode, Theresa Payton, former White House CIO, shares how predictable human behavior creates vulnerabilities in cybersecurity and why conventional defenses often fall short. Learn why routine security measures are exploited by sophisticated social engineering and how designing innovative, personalized protocols can disrupt attackers and strengthen digital defenses. ➡️ Show Linkshttps://successstorypodcast.com  YouTube: https://youtu.be/bH8DwhGUg0cApple: https://podcasts.apple.com/us/podcast/theresa-payton-cybersecurity-expert-author-former-white/id1484783544Spotify: https://open.spotify.com/episode/5DLZKqN89CTRVXW2Hi3Pq5➡️ Watch the Podcast on YouTubehttps://www.youtube.com/c/scottdclary 

Scrum Master Toolbox Podcast
AI and Cybersecurity - An Introduction to The Hidden Threats in Our Connected World | Dr. Eric Cole

Scrum Master Toolbox Podcast

Play Episode Listen Later Mar 29, 2025 37:46


BONUS: AI and Cybersecurity - An Introduction to The Hidden Threats in Our Connected World with Dr. Eric Cole In this BONUS episode, we explore the evolving landscape of cybersecurity in the age of artificial intelligence. Dr. Eric Cole, a renowned cybersecurity expert and author of Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World, shares critical insights about how AI is transforming security strategies. From the privacy concerns of our always-connected devices to practical tips for protecting your business and personal information, this conversation offers essential knowledge for navigating our increasingly digital world. The Double-Edged Sword of AI in Cybersecurity "We are giving away our IP, our data, and our privacy. The data set is what gives value to AI." The rise of artificial intelligence presents both opportunities and serious risks in the cybersecurity landscape. Dr. Cole emphasizes that while many focus solely on AI's benefits, we often overlook the fact that we're surrendering vast amounts of our sensitive information, intellectual property, and private data to AI providers. This data becomes the foundation of AI's value and capabilities, creating a significant privacy concern that many organizations fail to properly address. As we embrace these new technologies, we must carefully consider what information we're willing to share and what safeguards should be in place. Modern Attack Vectors: The Human Element "Attacks today are mostly social engineering. We end up having to retrain people to not trust their email." Today's cybersecurity threats have evolved beyond traditional technical exploits to focus primarily on social engineering—manipulating people into compromising their own security. Dr. Cole explains that modern attackers increasingly target the human element, requiring organizations to fundamentally retrain employees to approach communications with healthy skepticism. Particularly concerning are mobile threats, as our phones constantly record audio and other personal data. Dr. Cole warns that "free" apps often come with a hidden price: your privacy and security. Understanding these attack vectors is essential for developing effective defense strategies in both personal and professional contexts. Cybersecurity as a Business Enabler "Security is not a barrier, not an obstacle. Cybersecurity is a business enabler." Dr. Cole challenges the common perception that security measures primarily restrict functionality and impede business operations. Instead, he reframes cybersecurity as a critical business enabler that should be integrated into strategic decision-making. Organizations need to make deliberate decisions about the tradeoffs between security and functionality, understanding that proper security measures protect business continuity and reputation. Dr. Cole particularly warns about supply chain attacks, which have become increasingly prevalent, and emphasizes that awareness is the foundation of any effective protection strategy. He recommends centralizing data for easier security management and advises that client devices should minimize storing sensitive data. Mobile Phones: The Ultimate Tracking Device "You don't go anywhere without your cell phone. Your cell phone is never more than a foot from you it's with you wherever you go... which means if somebody wants to track and monitor you they can." We often worry about theoretical tracking technologies while overlooking the sophisticated tracking device we voluntarily carry everywhere—our mobile phones. Dr. Cole points out the irony that people who would never accept being "chipped" for tracking purposes willingly keep their phones within arm's reach at all times. These devices record our locations, conversations, messages, and activities, creating a comprehensive digital trail of our lives. With access to someone's phone, anyone can trace their movements for months and access an alarming amount of personal information. This risk is compounded when we back up this data to cloud services, effectively giving third parties access to our most sensitive information. Understanding these vulnerabilities is the first step toward more mindful mobile security practices. Business Opportunities in the Security Space "We have too much information, too much data. How can we use that data effectively?" The cybersecurity landscape presents significant business opportunities, particularly in making sense of the overwhelming amount of security data organizations collect. Dr. Cole identifies data correlation and effective data utilization as key investment areas. Modern security systems generate vast quantities of logs and alerts, but transforming this raw information into actionable intelligence remains a challenge. Companies that can develop solutions to effectively analyze, correlate, and extract meaningful insights from security data will find substantial opportunities in the market, helping organizations strengthen their security posture while managing the complexity of modern threats. Essential Training for Security-Conscious Developers "Go for secure coding courses. This helps us understand how software can be exploited." For software developers looking to build more secure applications, Dr. Cole recommends focusing on penetration testing skills and secure coding practices. Understanding how software can be exploited from an attacker's perspective provides invaluable insights for designing more robust systems. By learning the methodologies and techniques used by malicious actors, developers can anticipate potential vulnerabilities and incorporate appropriate safeguards from the beginning of the development process. This proactive approach to security helps create applications that are inherently more resistant to attacks rather than requiring extensive security patches and updates after deployment. About Dr. Eric Cole Dr. Eric Cole is the author of "Cyber Crisis, Protecting Your Business from Real Threats in the Virtual World." He is a renowned cybersecurity expert with over 20 years of experience helping organizations identify vulnerabilities and build robust defense solutions against advanced threats. He has trained over 65,000 professionals worldwide through his best-selling cybersecurity courses and is dedicated to making cyberspace a safe place for all. You can link with Dr. Eric Cole on LinkedIn, or visit his company's website Secure-Anchor.com. 

Tim Pool Daily Show
Elon's DOGE EXPOSES US Funding Liberal Press MASS SOCIAL ENGINEERING, Trump FURIOUS

Tim Pool Daily Show

Play Episode Listen Later Feb 13, 2025 146:40


The Green Room - https://rumble.com/playlists/aa56qw_g-j0 BUY CAST BREW COFFEE TO FIGHT BACK - https://castbrew.com/ Join The Discord Server - https://timcast.com/join-us/ Hang Out With Tim Pool & Crew LIVE At - http://Youtube.com/TimcastIRL Elon's DOGE EXPOSES US Funding Liberal Press MASS SOCIAL ENGINEERING, Trump FURIOUS | Timcast LIVE Learn more about your ad choices. Visit megaphone.fm/adchoices