POPULARITY
Categories
Tech Bullion has highlighted the top 10 most common social engineering attacks that small businesses should know, including phishing emails and spear phishing. In this episode, host Paul John Spaulding is joined by Steve Morgan, Founder of Cybersecurity Ventures and Editor-in-Chief at Cybercrime Magazine, to discuss. The Cybercrime Magazine Update airs weekly and covers the latest news, interviews, podcasts, reports, videos, and special productions from Cybercrime Magazine, published by Cybersecurity Ventures. For more on cybersecurity, visit us at https://cybersecurityventures.com.
LINKS: https://distrust.co/software.html - Software page with OSS software Linux distro: https://codeberg.org/stagex/stagex Milksad vulnerability: https://milksad.info/ In this episode of Cybersecurity Today on the Weekend, host Jim Love engages in a captivating discussion with Anton Livaja from Distrust. Anton shares his unique career transition from obtaining a BA in English literature at York University to delving into cybersecurity and tech. Anton recounts how he initially entered the tech field through a startup and quickly embraced programming and automation. The conversation covers Anton's interest in Bitcoin and blockchain technology, including the importance of stablecoins, and the frequent hacking incidents in the crypto space. Anton explains the intricacies of blockchain security, emphasizing the critical role of managing cryptographic keys. The dialogue also explores advanced security methodologies like full source bootstrapping and deterministic builds, and Anton elaborates on the significance of creating open-source software for enhanced security. As the discussion concludes, Anton highlights the need for continual curiosity, teamwork, and purpose-driven work in the cybersecurity field. 00:00 Introduction to Cybersecurity Today 00:17 Anton's Journey from Literature to Cybersecurity 01:08 First Foray into Programming and Automation 02:35 Blockchain and Its Real-World Applications 04:36 Security Challenges in Blockchain and Cryptocurrency 13:21 The Rise of Insider Threats and Social Engineering 16:40 Advanced Security Measures and Supply Chain Attacks 22:36 The Importance of Deterministic Builds and Full Source Bootstrapping 29:35 Making Open Source Software Accessible 31:29 Blockchain and Supply Chain Traceability 33:34 Ensuring Software Integrity and Security 38:20 The Role of AI in Code Review 40:37 The Milksad Incident 46:33 Introducing Distrust and Its Mission 52:23 Final Thoughts and Encouragement
Did you know you can find lots of fraud prevention resources from the Better Business Bureau? In this episode, Troy Baker from the Michigan Better Business Bureau talks about fraud, using the BBB for validations and what we both think is the best thing to do that will keep your company protected from fraud. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Better Business Bureau Links: Main Webpage: https://www.bbb.org Scam Tracker: https://www.bbb.org/scamtracker Scam News/Tips: https://www.bbb.org/all/scamtips Sign-Up for Scam Alerts: https://signup.e2ma.net/signup/1900156/1902645/ Michigan Better Business Bureau: https://www.bbb.org/miprograms Validate Charities: https://www.give.org Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Grok erzählt zusammenhangslos Verschwörungstheorie über weißen Genozid in Südafrika. Trumps Zölle könnten die US-Konsumlaune ins Wanken bringe. Cohere verfehlt seine Umsatzerwartungen drastisch. CoreWeave übertrifft Erwartungen. Microsofts KI-gestützte Einsparungen werfen Fragen zur Zukunft der Softwareentwicklung auf. Coinbase wurde Opfer von Social Engineering. Unterstütze unseren Podcast und entdecke die Angebote unserer Werbepartner auf doppelgaenger.io/werbung. Vielen Dank! Philipp Glöckler und Philipp Klöckner sprechen heute über: (00:00:00) Intro (00:01:50) Reddit Google (00:08:15) Youtube Podcast Charts (00:12:15) US Verbraucherbelastung (00:18:45) xAI Systemprompt Genozid Südafrika (00:32:00) Cohere (00:38:30) CoreWeave (00:45:20) AirBnb & Booking (00:56:00) TikTok (00:58:00) Microsoft Entlassungen Softwareentwickler (01:01:20) Coinbase Hack (01:06:15) Trump Apple Indienple Shownotes YouTube veröffentlicht Ranking der Top-Podcasts in den USA – nytimes.com Verbraucher unter Druck durch Trumps Zölle – nytimes.com Grok „weißer Völkermord“ in Südafrika - pivot-to-ai.com, axios.com Grok System Prompt – x.com Sam Altman Tweet – x.com Warum Cohere seine Umsatzprognose um 85% verfehlte – theinformation.com Warum ein KI-Datenzentrum auf der Prärie leer steht – theinformation.com CoreWeave übertrifft Erwartungen – ft.com Airbnb: Köche und Massagen in neuer App – bbc.com EU gegen TikTok wegen Online-Inhaltsregeln – ft.com Microsoft-Entlassungen treffen Softwareingenieure, AI-Einsparungen – bloomberg.com Cyberangriff auf Kryptobörse: Kopfgeld auf Hacker ausgesetzt – manager-magazin.de Trump Apple Indien – ft.com Apple warnt vor EU-Apps ohne App-Store-Zahlungen – theverge.com
Is your vendor master file and customer master file the same? Don't miss taking advantage of these key benefits when they are one in the same. What are they? Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Customer Master File Training (50% off Through 6/15/25): 3 Step Customer Setup & Maintenance Process Workshop Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Video - https://youtu.be/OpOAoPUMfoUEver get that weird feeling when someone rushes you for sensitive info or tries a little too hard to be helpful? You might be facing a social engineering attack—and not the phishing kind. In this video, we break down the 3 biggest red flags you need to spot before it's too late. Don't get played—get prepared. I used ChatGPT-4o, ScreenPal, and Pictory.ai to put this information together.If you're interested in trying Pictory.ai please use the following link. https://pictory.ai?ref=t015o
Cybercriminals are sliding into Microsoft Teams chats—and they're not who they say they are. In this episode of Darnley's Cyber Cafe, we uncover a clever new attack targeting businesses from the inside out. From fake IT support to sneaky malware that hides in plain sight, this is one you don't want to ignore. Grab a coffee and learn how to spot the warning signs, protect your systems, and stay one step ahead.
Of course – the IRS has updated the 1099-MISC and 1099-NEC again effective for reporting Tax Year 2025 payments to your vendors. It's not that bad though….Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Training: From an Accounts Payable Perspective: Year-End Checklist for 1099-MISC, 1099-NEC and 1042-S Reporting IRS: Instructions for Forms 1099-MISC and 1099-NEC (Rev. April 2025) IRS: Form 1099-MISC (Rev. April 2025) https://www.irs.gov/pub/irs-pdf/f1099msc.pdf IRS: Form 1099-NEC (Rev. April 2025) https://www.irs.gov/pub/irs-pdf/f1099nec.pdf Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
An email from Google. A law enforcement warning. Everything looks legit—until it isn't. In this episode of Darnley's Cyber Cafe, we uncover a shockingly convincing phishing scam and explore how trust can be weaponized in your inbox. Click play... but think twice before you click anything else!Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.
In this episode of Security Matters, host David Puner, dives into the world of evolving cyberthreats with Bryan Murphy, Senior Director of CyberArk's Incident Response Team. Imagine a scenario where an attacker uses AI-generated deepfakes to impersonate your company's VP of finance, gaining unauthorized access to your environment. Bryan Murphy shares insights on how these sophisticated attacks are turning identity into the attack surface and why your first line of defense might be as simple as a video call. Learn about the latest trends in social engineering, credential tiering and the importance of visual verification in incident response. Don't miss this eye-opening discussion on how to protect your organization from the ever-evolving threat landscape.
Episode 14 | The Effortless PodcastIn this episode of The Effortless Podcast, hosts Dheeraj Pandey and Amit Prakash sit down with Harpinder "Happy" Singh, AI/ML Engineer at DevRev, to explore the future of AI and machine learning in business automation. Happy, who joined DevRev in 2021, shares his journey from computer science to AI, discussing how DevRev is leveraging cutting-edge technologies like large language models (LLMs) and function calling to streamline enterprise workflows.Happy breaks down the key concepts of AI-driven workflows, the debate between federated and integrated systems, and the growing importance of Python in AI. He also shares insights from the CodeAct paper, which proposes using Python code execution for more efficient and flexible LLMs. The conversation highlights the transformative potential of AI in enterprise automation and how it is reshaping industries.They also cover:The evolution of AI at DevRev: From workflows to AI-driven automationThe role of Python in executing complex tasks for LLMsUnderstanding the user-agent-environment model in AI systemsHow federated vs. integrated systems impact AI performanceThe future of AI in enterprise automation and DevRev's innovationsHappy's decision to stay in India and the growing tech ecosystem in IndiaThis episode provides valuable insights into how AI is transforming business operations, making complex workflows more efficient and accessible. Whether you're an AI enthusiast, a developer, or a business leader, this conversation is a must-listen for anyone interested in the next wave of AI-driven innovation.Key Topics & Timestamps:00:00 – Introduction to Harpinder "Happy" Singh & His Journey into AI03:00 – Happy's Early Background: From Shahjahanpur to BITS Pilani06:30 – Transition to AI at DevRev09:30 – Bangalore Life and Growing with DevRev13:00 – AI in India vs. the US18:00 – Federated vs. Integrated Systems: Which Approach Works Best for AI?25:00 – The Role of Python in AI32:00 – User, Agent, and Environment Model in AI39:30 – The CodeAct Paper: Replacing Tool Calls with Python Code Execution47:00 – AI in Enterprise Automation: How DevRev Uses AI to Streamline Workflows54:00 – Looking Ahead at DevRev's AI Innovations1:00:00 – Final Reflections: The Future of AI in Business and AutomationHosts:Dheeraj Pandey: Co-founder and CEO at DevRev, formerly CEO of Nutanix, a tech visionary passionate about AI and systems thinking.Amit Prakash: Co-founder and CTO at ThoughtSpot, former engineer at Google and Microsoft, and expert in distributed systems and machine learning.Guest:Harpinder Jot Singh: AI/ML Engineer at DevRev, working on the cutting edge of large language models (LLMs), AI-driven workflows, and integrating AI into enterprise systems.Follow the Host and the Guest:Dheeraj Pandey: LinkedIn | XAmit Prakash: LinkedIn | XHarpinder Singh: LinkedInHave questions or thoughts on AI? Drop us a mail at effortlesspodcasthq@gmail.comDon't forget to like, comment, and subscribe for more insights into the future of AI, business automation, and enterprise technology!
// GUEST //Website: https://nci.university/X: https://x.com/nciuniversityYoutube: https://www.youtube.com/@chasehughesofficialBook: https://www.amazon.com/dp/173514164XInstagram: https://www.instagram.com/chasehughesofficialFacebook: https://www.facebook.com/chasehughesofficial/ // SPONSORS //The Farm at Okefenokee: https://okefarm.com/iCoin: https://icointechnology.com/breedloveHeart and Soil Supplements (use discount code BREEDLOVE): https://heartandsoil.co/In Wolf's Clothing: https://wolfnyc.com/Revero: https://www.revero.com/breedloveBlockware Solutions: https://mining.blockwaresolutions.com/breedloveOn Ramp: https://onrampbitcoin.com/?grsf=breedloveMindlab Pro: https://www.mindlabpro.com/breedloveCoinbits: https://coinbits.app/breedlove // PRODUCTS I ENDORSE //Protect your mobile phone from SIM swap attacks: https://www.efani.com/breedloveNoble Protein (discount code BREEDLOVE for 15% off): https://nobleorigins.com/Lineage Provisions (use discount code BREEDLOVE): https://lineageprovisions.com/?ref=breedlove_22Colorado Craft Beef (use discount code BREEDLOVE): https://coloradocraftbeef.com/ // SUBSCRIBE TO THE CLIPS CHANNEL //https://www.youtube.com/@robertbreedloveclips2996/videos // OUTLINE //0:00 - WiM Episode Trailer1:40 - From the Navy to Behavioral Science6:10 - The Origins of Social Anxiety12:34 - Dealing with Social Anxiety19:10 - Fake it Till You Make It?26:14 - The Farm at Okefenokee27:40 - iCoin Technology29:10 - The Power of Focusing on Others32:10 - Intuition and Incongruent Behavior37:12 - Dealing With Online Criticism39:58 - Behavior Science 10150:55 - Carrying Concealed Shame56:42 - Heart and Soil Supplements57:42 - Helping Lightning Startups with In Wolf's Clothing58:34 - Personalize Your Health with Revero59:37 - Radical Truth and Forgiving Yourself1:08:33 - Handling Manipulation1:16:45 - Concealment of Intent1:24:50 - Mine Bitcoin with Blockware Solutions1:26:16 - Onramp Bitcoin Custody1:27:39 - Money Printing is Mind Control1:37:01 - The History of Propaganda1:53:22 - Mind Lab Pro Supplements1:54:32 - Buy Bitcoin with Coinbits1:55:43 - Waking Up to Manipulation and Propaganda2:00:14 - Empathy and Rationality2:09:11 - The Psychopath Checklist2:17:22 - Interrogation 1012:28:20 - Seeing Behind People's Mask2:32:27 - Closing Thoughts and Where to Find Chase Hughes // PODCAST //Podcast Website: https://whatismoneypodcast.com/Apple Podcast: https://podcasts.apple.com/us/podcast/the-what-is-money-show/id1541404400Spotify: https://open.spotify.com/show/25LPvm8EewBGyfQQ1abIsERSS Feed: https://feeds.simplecast.com/MLdpYXYI // SUPPORT THIS CHANNEL //Bitcoin: 3D1gfxKZKMtfWaD1bkwiR6JsDzu6e9bZQ7Sats via Strike: https://strike.me/breedlove22Dollars via Paypal: https://www.paypal.com/paypalme/RBreedloveDollars via Venmo: https://account.venmo.com/u/Robert-Breedlove-2 // SOCIAL //Breedlove X: https://x.com/Breedlove22WiM? X: https://x.com/WhatisMoneyShowLinkedin: https://www.linkedin.com/in/breedlove22/Instagram: https://www.instagram.com/breedlove_22/TikTok: https://www.tiktok.com/@breedlove22Substack: https://breedlove22.substack.com/All My Current Work: https://linktr.ee/robertbreedlove
Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today Chris and Mike are joined by Kayla Lussier. Kayla is the co-founder of Money Match, a platform championing financial wellness by connecting real estate investors and small businesses with the capital they need to thrive. Her 15 years in healthcare as a nurse practitioner have instilled in her a deep understanding of holistic well-being – mind, body, and wallet. [April 28, 2025] 00:00 - Intro 00:16 - Mike Holfeld Intro 00:47 - Today's Guest: Kayla Lussier 01:53 - Jumping In Too Quickly 03:22 - Getting Burned 07:35 - Don't Mess with Kayla! 09:07 - Making a Match 13:21 - Play is the Way 15:17 - Mitigating the Risks 18:26 - Digital Nomads Welcome 21:25 - Find Kayla Lussier Online - Website: moneymatchapp.com 22:30 - Silver Tsunami 24:26 - Wrap Up 24:40 - Next Month: Baseball Technology 24:50 - Outro - www.social-engineer.com - www.innocentlivesfoundation.org Find us online: - Chris Hadnagy - Twitter: @humanhacker - LinkedIn: linkedin.com/in/christopherhadnagy
Invoice automation is great for invoice processing and even has artificial intelligence tools that can help spot attempted fraud – but it's really the vendor setup and maintenance process that will save you from making fraudulent electronic and check payments. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Training: The BANK of AP: An Internal Control System to Combat Business Email Compromise Training: AVM 3 Step Vendor Setup & Maintenance process Workshop Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Welcome to the Financial Freedom & Wealth Trailblazers Podcast! In today's episode, we'll dive into how strategic social engineering can make a tangible difference in community development.Andrea Kanaris is a social scientist, social impact professional, and founder of All Things Social Impact—a platform that equips businesses and professionals with practical strategies to embed social responsibility and drive long-term value. With over 20 years' experience across Australia and internationally, Andrea has worked with government regulators, engineering and environmental firms, and project proponents to navigate complex social risks and support sustainable development.She is the author of A Practical Guide to Social Impact Assessment for the Real World, a hands-on manual that reframes social impact assessment as a strategic business asset rather than a compliance exercise.Andrea also hosts a YouTube channel featuring honest conversations with early career professionals and experienced practitioners, exploring their challenges, insights, and pathways to purpose-driven work. Her mission is to make social impact work accessible, actionable, and empowering for those committed to creating meaningful change for people and the planet.Connect with Andrea Here: Website: https://www.allthingssocialimpact.com/ YouTube: www.youtube.com/@AllThingsSocialImpactSpotify: https://open.spotify.com/show/4RLkmfuAUYC8XVoeISCzKv?si=-THRxKW8QJ--7Vhhlh2sfgLinkedIn: https://www.linkedin.com/in/andreakanaris/Facebook: https://www.facebook.com/share/p/18UieS5Lbf/TikTok: https://www.tiktok.com/@all.things.social12Instagram: https://www.instagram.com/allthingssocialimpact/ X: https://x.com/AllThingsSI===================================If you enjoyed this episode, remember to hit the like button and subscribe. Then share this episode with your friends.Thanks for watching the Financial Freedom & Wealth Trailblazers Podcast. This podcast is part of the Digital Trailblazer family of podcasts. To learn more about Digital Trailblazer and what we do to help entrepreneurs, go to DigitalTrailblazer.com.Are you a coach, consultant, expert, or online course creator? Then we'd love to invite you to our FREE Facebook Group where you can learn the best strategies to land more high-ticket clients and customers. QUICK LINKS: APPLY TO BE FEATURED: https://app.digitaltrailblazer.com/podcast-guest-applicationDIGITAL TRAILBLAZER: https://digitaltrailblazer.com/
Guest: Dr. Bruce Y LeeSenior Contributor @Forbes | Professor | CEO | Writer/Journalist | Entrepreneur | Digital & Computational Health | #AI | bruceylee.substack.com | bruceylee.com Bruce Y. Lee, MD, MBA is a writer, journalist, systems modeler, AI, computational and digital health expert, professor, physician, entrepreneur, and avocado-eater, not always in that order.Executive Director of PHICOR (Public Health Informatics, Computational, and Operations Research) [@PHICORteam]On LinkedIn | https://www.linkedin.com/in/bruce-y-lee-68a6834/Website | https://www.bruceylee.com/_____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastVisit Marco's website
Vendor team members need to be vigilant when collecting and confirming bank account information. Now, some vendors are doing the same. If you want to hear what tactics the vendors are using to secure their banking information and how it benefits vendor teams….Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Authentication Training (Free): AVM 3 Step Vendor Setup & Maintenance process Workshop Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Today we are celebrating our 300th episode! Chris will be joined by some friends as he discusses how the podcast got started - back in 2009, how it has evolved, including the creation of multiple series, and the direction for the future. [April 14, 2025] 00:00 - Intro 00:22 - Intro Links - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 02:45 - Social-Engineer Origin Story 03:59 - The Human Element Series 05:34 - The Security Awareness Series 06:03 - The Doctor Is In Series 06:12 - The SE ETC. Series 06:28 - The 4th Monday Series 07:05 - The Future 07:43 - Amanda Drops By 08:35 - Ooof! 09:12 - SE Trivia 13:17 - A Video Celebration! 21:16 - Neil Fallon Drops By 52:50 - Wrap Up 53:56 - Outro - www.social-engineer.com - www.innocentlivesfoundation.org
- Trump's Geopolitical Illiteracy and Flu Vaccine Effectiveness (0:10) - RFK Jr.'s Advocacy and Measles Outbreak (3:23) - Trump's International Diplomacy and Economic Impact (8:55) - Trump's Economic Idiocy and Military Incompetence (20:07) - The Role of Vaccines in Autism and Infant Formula Testing (33:46) - The Influence of Zionism in America and the Deep State (52:03) - The Role of Tavistock Institute in Social Engineering (57:25) - The Cognition Race and the Depopulation Agenda (1:05:27) - The Role of Gold and Silver in Economic Stability (1:06:41) - The Future of Human Cognition and Machine Cognition (1:09:32) - Energy Consumption and Data Centers (1:18:51) - Competition for Resources (1:21:43) - Impact of Automation on Jobs (1:23:57) - Human Genius and AI Tools (1:26:49) - Homegrown Food and Seed Kits (1:30:47) - Interview with Dane Wigington (1:33:52) - Geoengineering and Weather Control (1:40:08) - Health and Environmental Impact (1:57:09) - Legislation and Public Awareness (2:22:20) - Future Prospects and Call to Action (2:23:00) For more updates, visit: http://www.brighteon.com/channel/hrreport NaturalNews videos would not be possible without you, as always we remain passionately dedicated to our mission of educating people all over the world on the subject of natural healing remedies and personal liberty (food freedom, medical freedom, the freedom of speech, etc.). Together, we're helping create a better world, with more honest food labeling, reduced chemical contamination, the avoidance of toxic heavy metals and vastly increased scientific transparency. ▶️ Every dollar you spend at the Health Ranger Store goes toward helping us achieve important science and content goals for humanity: https://www.healthrangerstore.com/ ▶️ Sign Up For Our Newsletter: https://www.naturalnews.com/Readerregistration.html ▶️ Brighteon: https://www.brighteon.com/channels/hrreport ▶️ Join Our Social Network: https://brighteon.social/@HealthRanger ▶️ Check In Stock Products at: https://PrepWithMike.com
If you perform a web search and use the results to find your vendor contact information or to confirm their information – you might want to hear what the Federal Trade Commission (FTC) warns against. Plus what you can do instead. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: FTC Article: Online search results: The good, the bad, and the scammyAVM Toolkit – Internal Vendor Request Form Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Click here to see MORE!In this episode of FinTech Confidential Uncut, host Tedd Huff talks with Jeff Scheidel, VP of Operations at AuthID, about the rise of AI-driven fraud targeting financial institutions. They explore how deepfakes, voice cloning, and large language models are enabling scammers to impersonate executives, create synthetic identities, and build fake websites and phishing emails with alarming accuracy. Real cases include a $25 million loss from a deepfake video call and voice cloning scams using only seconds of audio.The episode highlights the limitations of current security tools, such as facial recognition failing due to minor appearance changes, and the inefficiency of manual fraud reviews. Jeff explains how biometric systems using passive liveness detection and cryptographic keys offer stronger protection without storing facial data. The discussion makes clear that financial organizations must quickly adopt smarter authentication methods and better user education to stay ahead of rapidly advancing threats.Takeaways 1️⃣ Stop Falling for Fake Customer Support2️⃣ Watch How One Photo Fakes a Live Identity3️⃣ Use Biometrics to Expose Deepfake Lies4️⃣ Catch Scammers Building Fake Credit Profiles5️⃣ Block Voice Scams Made in Under 5 SecondsLinks: Jeff Scheidel LinkedIn: https://www.linkedin.com/in/jeffscheidel/authID Website: https://www.authid.ai LinkedIn: https://www.linkedin.com/company/authid Twitter: https://twitter.com/authIDai Facebook: https://www.facebook.com/authidai/ Instagram: https://www.instagram.com/authid.ai/ YouTube Channel: https://www.youtube.com/@authID-we-are-digital-identityFintech ConfidentialPodcast: https://fintechconfidential.com/listenNewsletter: https://fintechconfidential.comLinkedIn: https://www.linkedin.com/company/fintechconfidentialX: https://x.com/FTconfidentialInstagram: https://www.instagram.com/fintechconfidentialFacebook: https://www.facebook.com/fintechconfidentialSupportersSkyflow – A zero trust data privacy vault API for secure data collection and compliance: www.skyflowsecure.comSolvpath – AI-powered platform that reduces support tickets and guides users in real time: www.solvpath.comClearingworks – Unified accounts receivable platform for streamlined financial workflows: www.clearingworks.comHawk AI –...
Fraudsters are using snail mail to deliver scams – watch out for this one reported by the US Postal Inspection Service. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: New Scam Alert: Ransomware Scam Letters Training: Frauds and New Scam Alerts + How To Prevent Them On-Demand Webinar: Vendor Validations Recommended for Compliance - Manual vs Automated https://training.debrarrichardson.com/course/june2024-2Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
REPLAY (Original Air Date May 27, 2024) *Please note that this episode contains discussions regarding abuse that some may find disturbing. Welcome to the Social-Engineer Podcast: The SE Etc. Series. This series will be hosted by Chris Hadnagy, CEO of Social-Engineer LLC, and The Innocent Lives Foundation, as well as Social-Engineer.Org and The Institute for Social Engineering. Join Chris as he discusses topics and news pertaining to the world of Social Engineering. Today, Chris is joined by Nadja El Fertasi. Nadja is a leading figure in fostering emotional resilience within the digital age. Her comprehensive expertise spans crisis management, strategic stakeholder communication, and emotional intelligence, creating a unified approach to enhance the human side of digital advancements. Having spent nearly two decades at NATO, including a significant role in the NATO Communications and Information Agency focusing on Digital Transformation & Cybersecurity, Nadja has been a pivotal figure in strategic engagement and communications. This role highlighted her commitment to navigating and leading through the complexities of cybersecurity and digital transformation. With over 15 years dedicated to cybersecurity at NATO, Nadja has emerged as a respected expert in her field. Her contribution to the cybersecurity community was acknowledged in "Hacking Gender Barriers: Europe's Top Cyberwomen," by the Women4Cyber foundation, which recognized her as one of Europe's influential figures in cybersecurity. Today, Nadja is the voice behind the EQ Elevator Podcast, where she assists businesses in cultivating leadership that's resilient and equipped for the digital age's challenges. Her work is dedicated to shaping a safer, more emotionally intelligent digital landscape, where individuals and organizations can thrive amidst technological disruptions. [May 27, 2024] 00:00 - Intro 00:19 - 2024 State of Vishing Report 01:01 - Intro Links - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 03:11 - Nadja El Fertasi Intro 05:02 - The Importance of Sharing 07:14 - Romance Scam: Nadja's Story 13:51 - The Other Side 15:59 - The Red Flags 19:13 - A Gift and a Curse 23:22 - Taking Responsibility 25:24 - Love, Not Romance 27:05 - Navigating the Apps 32:28 - Reality Check 37:27 - Being Human 39:39 - Learning From "No" 41:28 - Where to Report 42:25 - Wrap Up 43:58 - Find Nadja El Fertasi Online - LinkedIn: in/nadja-elfertasi - Instagram: @nadjafertasi 45:17 - Outro - www.social-engineer.com - www.innocentlivesfoundation.org Find us online - Chris Hadnagy - Twitter: @humanhacker - LinkedIn: linkedin.com/in/christopherhadnagy
➡️ Like The Podcast? Leave A Rating: https://ratethispodcast.com/successstory In this "Lessons" episode, Theresa Payton, former White House CIO, shares how predictable human behavior creates vulnerabilities in cybersecurity and why conventional defenses often fall short. Learn why routine security measures are exploited by sophisticated social engineering and how designing innovative, personalized protocols can disrupt attackers and strengthen digital defenses. ➡️ Show Linkshttps://successstorypodcast.com YouTube: https://youtu.be/bH8DwhGUg0cApple: https://podcasts.apple.com/us/podcast/theresa-payton-cybersecurity-expert-author-former-white/id1484783544Spotify: https://open.spotify.com/episode/5DLZKqN89CTRVXW2Hi3Pq5➡️ Watch the Podcast on YouTubehttps://www.youtube.com/c/scottdclary
Today, we're going over your questions. You guys had some follow-ups about my stalker, Timothy C., and I'll be giving you a few more details on that situation. We're also unpacking the RFK Jr. sex scandal—what's real, what's spin, and what it all means. Plus, the government's leaked text messages have been making waves, and I'll be breaking down what they reveal and why you should (and shouldn't) care.—https://policecoffee.com/?gad_source=1&gbraid=0AAAAACG7qmI1dmMkruwgp8vA8w0oECKla&gclid=Cj0KCQjwtJ6_BhDWARIsAGanmKfdkRQ1M1sighZQ-PGpEpsCjrZ8fCigidnvH55bfBUNMa56-yoy_A8aAv34EALw_wcB—https://open.spotify.com/episode/7CcmZWvQEaLTQAQRAFy2BQ?si=FgeO4b9QSi-5eB2cqX2XHw
BONUS: AI and Cybersecurity - An Introduction to The Hidden Threats in Our Connected World with Dr. Eric Cole In this BONUS episode, we explore the evolving landscape of cybersecurity in the age of artificial intelligence. Dr. Eric Cole, a renowned cybersecurity expert and author of Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World, shares critical insights about how AI is transforming security strategies. From the privacy concerns of our always-connected devices to practical tips for protecting your business and personal information, this conversation offers essential knowledge for navigating our increasingly digital world. The Double-Edged Sword of AI in Cybersecurity "We are giving away our IP, our data, and our privacy. The data set is what gives value to AI." The rise of artificial intelligence presents both opportunities and serious risks in the cybersecurity landscape. Dr. Cole emphasizes that while many focus solely on AI's benefits, we often overlook the fact that we're surrendering vast amounts of our sensitive information, intellectual property, and private data to AI providers. This data becomes the foundation of AI's value and capabilities, creating a significant privacy concern that many organizations fail to properly address. As we embrace these new technologies, we must carefully consider what information we're willing to share and what safeguards should be in place. Modern Attack Vectors: The Human Element "Attacks today are mostly social engineering. We end up having to retrain people to not trust their email." Today's cybersecurity threats have evolved beyond traditional technical exploits to focus primarily on social engineering—manipulating people into compromising their own security. Dr. Cole explains that modern attackers increasingly target the human element, requiring organizations to fundamentally retrain employees to approach communications with healthy skepticism. Particularly concerning are mobile threats, as our phones constantly record audio and other personal data. Dr. Cole warns that "free" apps often come with a hidden price: your privacy and security. Understanding these attack vectors is essential for developing effective defense strategies in both personal and professional contexts. Cybersecurity as a Business Enabler "Security is not a barrier, not an obstacle. Cybersecurity is a business enabler." Dr. Cole challenges the common perception that security measures primarily restrict functionality and impede business operations. Instead, he reframes cybersecurity as a critical business enabler that should be integrated into strategic decision-making. Organizations need to make deliberate decisions about the tradeoffs between security and functionality, understanding that proper security measures protect business continuity and reputation. Dr. Cole particularly warns about supply chain attacks, which have become increasingly prevalent, and emphasizes that awareness is the foundation of any effective protection strategy. He recommends centralizing data for easier security management and advises that client devices should minimize storing sensitive data. Mobile Phones: The Ultimate Tracking Device "You don't go anywhere without your cell phone. Your cell phone is never more than a foot from you it's with you wherever you go... which means if somebody wants to track and monitor you they can." We often worry about theoretical tracking technologies while overlooking the sophisticated tracking device we voluntarily carry everywhere—our mobile phones. Dr. Cole points out the irony that people who would never accept being "chipped" for tracking purposes willingly keep their phones within arm's reach at all times. These devices record our locations, conversations, messages, and activities, creating a comprehensive digital trail of our lives. With access to someone's phone, anyone can trace their movements for months and access an alarming amount of personal information. This risk is compounded when we back up this data to cloud services, effectively giving third parties access to our most sensitive information. Understanding these vulnerabilities is the first step toward more mindful mobile security practices. Business Opportunities in the Security Space "We have too much information, too much data. How can we use that data effectively?" The cybersecurity landscape presents significant business opportunities, particularly in making sense of the overwhelming amount of security data organizations collect. Dr. Cole identifies data correlation and effective data utilization as key investment areas. Modern security systems generate vast quantities of logs and alerts, but transforming this raw information into actionable intelligence remains a challenge. Companies that can develop solutions to effectively analyze, correlate, and extract meaningful insights from security data will find substantial opportunities in the market, helping organizations strengthen their security posture while managing the complexity of modern threats. Essential Training for Security-Conscious Developers "Go for secure coding courses. This helps us understand how software can be exploited." For software developers looking to build more secure applications, Dr. Cole recommends focusing on penetration testing skills and secure coding practices. Understanding how software can be exploited from an attacker's perspective provides invaluable insights for designing more robust systems. By learning the methodologies and techniques used by malicious actors, developers can anticipate potential vulnerabilities and incorporate appropriate safeguards from the beginning of the development process. This proactive approach to security helps create applications that are inherently more resistant to attacks rather than requiring extensive security patches and updates after deployment. About Dr. Eric Cole Dr. Eric Cole is the author of "Cyber Crisis, Protecting Your Business from Real Threats in the Virtual World." He is a renowned cybersecurity expert with over 20 years of experience helping organizations identify vulnerabilities and build robust defense solutions against advanced threats. He has trained over 65,000 professionals worldwide through his best-selling cybersecurity courses and is dedicated to making cyberspace a safe place for all. You can link with Dr. Eric Cole on LinkedIn, or visit his company's website Secure-Anchor.com.
Are you performing all required vendor validations to avoid non-compliance fines and penalties? Identify non-compliance risks, and get vendor validation recommendations for regulatory, watchlist, and electronic payment compliance.Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: On-Demand Webinar: Vendor Validations Recommended for Compliance - Manual vs Automated Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Send us a text"True mastery is found in the details. The way you handle the little things defines the way you handle everything."
Time Stamps:2:40 - "Suicidal Empathy"7:56 - The Kosher Mafia18:50 - Gad Saad = Mossad Agent?38:30 - Israel Targets Journalists43:27 - Google buys Cybersecurity Company 'Wiz' for $32 Billion1:09:24 - Israel Established New Office Dedicated to Ethnic Cleansing1:18:20 - Genocidal Intent1:22:47 - The Wider Regional ConflictWelcome to The Morning Dump, where we dive headfirst into the deep end of the pool of current events, conspiracy, and everything in between. Join us for a no-holds-barred look at the week's hottest topics, where we flush away the fluff and get straight to the substance.Please consider supporting our work-Austin's Patreon: https://www.patreon.com/c/TheUnderclassPodcastAustin's Spreaker: https://www.spreaker.com/podcast/the-underclass-podcast--6511540Austin's Rumble: https://rumble.com/user/TheUnderclassPodcastAustin's YouTube: https://www.youtube.com/@TheUnderclassPodcastCheck out nadeaushaveco.com today & use code Jose for 10% off your entire order!!!Jose's Patreon- https://www.patreon.com/nowayjose2020 Only costs $2/month and will get you access to episodes earlier than the public Check out TopLobsta's kickass threads- toplobsta.com Use JOSE at checkout for 10% off Get No Way, Jose! merch- https://www.toplobsta.com/pages/no-way-joseNo Way, Jose! Rumble Channel- https://rumble.com/c/c-3379274 No Way, Jose! Odysee Channel- https://odysee.com/@NoWayJose:7?r=JChxx9RMmW9PuL49z3PvTq4sxE2GjJrpNo Way, Jose! YouTube Channel- https://youtube.com/channel/UCzyrpy3eo37eiRTq0cXff0gJose's Podcast Host- https://redcircle.com/shows/no-way-joseApple podcasts- https://podcasts.apple.com/us/podcast/no-way-jose/id1546040443Spotify- https://open.spotify.com/show/0xUIH4pZ0tM1UxARxPe6ThStitcher- https://www.stitcher.com/show/no-way-jose-2Amazon Music- https://music.amazon.com/podcasts/41237e28-c365-491c-9a31-2c6ef874d89d/No-Way-JoseGoogle Podcasts- https://www.google.com/podcasts?feed=aHR0cHM6Ly9mZWVkcy5yZWRjaXJjbGUuY29tL2ZkM2JkYTE3LTg2OTEtNDc5Ny05Mzc2LTc1M2ExZTE4NGQ5Yw%3D%3DRadioPublic- https://radiopublic.com/no-way-jose-6p1BAOVurbl- https://vurbl.com/station/4qHi6pyWP9B/#SuicidalEmpathy #JewishMobInfluence #GadSaadMossad #IsraelTargetsPress #JournalistsUnderFire #GoogleWizDeal #MossadCybersecurity #IsraelEthnicCleansing #NewEthnicCleansingOffice #GenocidalIntent #IntentToDestroy #RegionalConflict #WiderEscalation #MossadStartups #WizAcquisition #SocialContagion #SocialEngineering #SocialContagionPsychologyBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-underclass-podcast--6511540/support.
Today, I'm sharing something deeply personal and serious—my stalker story. For over a year, Timothy C. (we can share his full name soon if need be) has been physically stalking me, and his digital harassment goes back even further. Law enforcement is now involved, but I wanted to update you all in case anything happens to me—so there's no question about who did it. This episode isn't just about my experience; it's also about the reality of stalking, the dangers of obsession, and the importance of taking threats seriously. Stay aware, stay safe, and let's talk about it all, shall we?—https://noblegoldinvestments.com
The FBI issued a Public Service Announcement that check theft via mail is increasing. See five ways they say criminals are stealing your vendor checks from the mail, and some resources to prevent check fraud. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: On-Demand Webinar: Avoid Paper Check Fraud When Paying Your Vendors – In 5 StepsNew Scam Alert: FBI Issues PSA On Check FraudVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
“Understanding the ways humans make decisions is integral in everything we do from maintaining security to communicating with the people in your life. Social engineering skills, when used properly, can make your life so much better.” – Chris Hadnagy Welcome back to Turmeric & Tequila with your host, Kristen Olson, where we dive into the delicate balance of disruption and dialogue in pursuit of a better way. In this episode, we're thrilled to have Chris Hadnagy, a distinguished leader in the field of social engineering. Kristen and Chris explore the complexities of human behavior, uncovering the motives behind our actions and the profound influence of ethical social engineering. From Chris's diverse career path to his work in cybersecurity and his nonprofit organization, the Innocent Lives Foundation, this conversation is rich with insights on communication, ethical influence, and the intersection of human connection with modern technology. Tune in as we discuss the importance of emotional intelligence, the evolving landscape of AI, and the ways we can use social engineering practices for the greater good. If you're passionate about understanding and improving human interactions, this episode is a must-listen. Time Stamps: 00:00 Sponsors Shoutout and Highlights 05:48 Ethical Hacking Framework Development 09:22 Creative Pretexts for Infiltration 11:01 Cybersecurity: Protecting, Educating, Enhancing Lives 14:47 Geolocating Dark Web Exploiters 17:22 Addressing Digital Sextortion Challenges 19:54 Supportive Parenting Through Mistakes 23:09 Instant Gratification's Hidden Costs 28:28 Podcaster on Human Stories & Challenges 30:48 Workshops on Elicitation and Non-verbals 34:12 Parental Safety Advice Scenario 36:28 Apologizing Builds Respect 40:00 AI: A Double-Edged Sword 43:30 Connect with Me on LinkedIn 47:10 Family Over Fortune 49:39 "Life Skills Through Sports" Chris Hadnagy: Chris Hadnagy is the Founder and CEO of Social-Engineer, LLC. During Chris' 19 years in information security, he created the world's first social engineering framework and newsletter. He has also hosted the first social engineering-based podcast. Chris is the Founder, Executive Director, and Board Member, for the Innocent Lives Foundation, a nonprofit organization that identifies anonymous child predators and helps bring them to justice. Having written five books on social engineering, Chris is also a well-known author. His most recent book, “Human Hacking: Win Friends, Influence People and Leave Them Better Off for Having Met You,” was released January 5, 2021. Chris leads the way in educating people about social engineering. He created the world's first Social Engineering Capture the Flag (SECTF) to raise awareness of this serious threat. Chris is also an Adjunct Professor of Social Engineering for the University of Arizona's NSA designated Center of Academic Excellence in Cyber Operations (CAE-CO). And he also lectures and teaches about social engineering around the globe. Moreover, he was invited to speak at the Pentagon and other high-security facilities. Chris works with some of the world's leaders in scientific research for the purpose of acquiring a deeper understanding of social engineering. Notably, Chris authored a book with Dr. Paul Ekman regarding the use of nonverbal communication by social engineers. Chris is certified as an Offensive Security Certified Professional (OSCP), as well as an Offensive Security Wireless Professional (OSWP). He is also the creator of the Social Engineering Pentest Professional (SEPP), Certified Ethical Social Engineer (CESE), and Master's Level Social Engineering (MLSE), certifications. Chris' published books include: – Social Engineering: The Art of Human Hacking – Unmasking the Social Engineer: The Human Element of Security – Phishing Dark Waters: The Offensive and Defensive Sides of Malicious E-mails – Social Engineering: The Science of Human Hacking 2nd Edition – Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You https://www.facebook.com/socialengineerllc/ https://www.instagram.com/socialengineerllc https://www.linkedin.com/in/christopherhadnagy/ Connect with T&T: IG: @TurmericTequila Facebook: @TurmericAndTequila Website: www.TurmericAndTequila.com Host: Kristen Olson IG: @Madonnashero Tik Tok: @Madonnashero Website: www.KOAlliance.com WATCH HERE MORE LIKE THIS: https://youtu.be/ZCFQSpFoAgI?si=Erg8_2eH8uyEgYZF https://youtu.be/piCU9JboWuY?si=qLdhFKCGdBzuAeuI https://youtu.be/9Vs2JDzJJXk?si=dpjV31GDqTroUKWH
In this eye-opening episode, I dive deep into the Tavistock Institute – the secretive organization behind some of the most profound shifts in modern society. Founded in the aftermath of World War I, the Tavistock Institute has played a pivotal role in shaping public opinion, social norms, and even political movements through psychological research and mass manipulation techniques. From media influence to behavioral conditioning, discover how Tavistock's methods have quietly shaped the way we think, act, and engage with the world around us. Are we truly thinking for ourselves, or have our thoughts and beliefs been engineered? Tune in as we uncover the hidden hand of social engineering and its far-reaching effects on society.Linksemail:beyondtheparadigm@yahoo.com(2) Beyond the Paradigm - YouTubeinstagram.com/paradigm1979twitter.com/paradigm_79(1) FacebookSupport The Showpatreon.com/BeyondTheParadigmbuymeacoffee.com/beyondthep5
Well, here we are—the final episode of Informatics in the Round (we think!). After five incredible years, 38 episodes, and thousands of listeners, we've decided it's time to wrap up this journey. But first, we're taking a minute (or maybe two hours) to reflect on this wild ride—and we've brought some people you might recognize! In this episode, we pull some clips from the archive to help us look back at our best moments, favorite topics, and silliest slip-ups over the years. We take you through our “Top 5” topics that we loved to talk about the most: electronic health records, patient privacy, public health, health equity, and AI. We will also share some stories you didn't hear (like that time we forgot to hit records—oops), how the pandemic reshaped our personal and professional lives, and the lessons that will stick with us. To lead us through our Top 5, we invited back some of our favorite guests to reflect and discuss the future of the field: Dr. Yaa Kumah-Crystal, MD, MPH, MS, is an Associate Professor of Biomedical Informatics and Pediatric Endocrinology at Vanderbilt University Medical Center whose research focuses on documentation in healthcare communication. Dr. Ellen Wright Clayton, JD, MD, is a professor of Pediatrics, Law, and Health Policy at Vanderbilt University Law School and Vanderbilt University Medical Center. Her research focuses on the ethical, legal, and social implications of genomics research. Dr. Melissa McPheeters, PhD, MPH, is the Senior Director for Analytics at RTI International, as well as an esteemed epidemiologist and public health informatician. Her work focuses on building interdisciplinary teams to address complex problems across health, public health, and data modernization processes. Dr. Consuelo H. Wilkins, MD, is the Senior Vice President and Senior Associate Dean of Health Equity at Vanderbilt University Medical Center and the Associate Director of the Vanderbilt Institute for Clinical and Translational Research. Her work attempts to bring together community stakeholders and create collaboration initiatives to improve community health and biomedical research. Dr. Chris Callison-Burch, PhD, MS, is a Professor of Computer and Information Science at the University of Pennsylvania. His research focuses on natural language processing and generative AI. So, is this really goodbye? Maybe, maybe not. We can never sit still for long. But for now, let's raise a glass, share a few laughs, and remember the good ol' times! We can't leave without saying thank you to all of you for being part of the ride, for listening to us on your jog or your commute, and for engaging critically with all we've had to say. It's been an honor. Thank you to all the guests who have joined us throughout the last five years. Thank you for contributing your expertise, your lived experiences, and your unfiltered thoughts. Thank you to the musicians who bravely stepped into conversations about topics they knew little about and for offering up their questions. You ensured we spoke to everyone, and your music said the rest of what our words couldn't convey. To all our guests, your generosity with your time and your knowledge is what made this podcast what it was. Our mission was always to make informatics intelligible so that you and all your friends and family can engage confidently with the topic. We hope you now have the language to feel empowered navigating this crazy, awesome, flawed, fascinating healthcare system. For now, this is Kevin Johnson, Harris Bland, and Ellie Shuert signing off! Mentioned in the episode: -Hidden Brain podcast -Scott Scovill and Moo TV, plus his appearance on episode 4: “Automated Resilience: Biomedical Informatics as a Safety Net for Life” -Nancy Lorenzi in “Informatics and Anti-Black Racism: What We Need to Do” (Jun. 2020) -Trent Rosenbloom in “21st Century Cures: Curing our Anxiety or Causing It?” (May 2021) -Hey Epic! -Brad Malin in “Data Privacy: Possible, Impossible, or Somewhere In Between?” (Aug. 2020) -Moore v. Regents of the University of California (1990) -”Learning Health Care and the Obligation to Participate in Research” by Ruth R. Faden and Nancy E. Kass (Hastings Center Report) -”The Right to Privacy” by Samuel D. Warren II and Louis Brandeis (Harvard Law Review) -Revenge of the Tipping Point: Overstories, Superspreaders, and the Rise of Social Engineering by Malcolm Gladwell -Colin Walsh in “COVID and the Hidden Data Gap” (Feb. 2021) -Bryant Thomas Karras in “Get Your Dose of Data! An Introduction to Public Health Informatics” (Jul. 2024) STE and public health highway? -Consuelo Wilkins in “Clinical Trials: Are We Whitewashing the Data?” (Nov. 2023) -Where Do We Go from Here: Chaos or Community? by Martin Luther King Jr. -Michael Matheny and Tom Lasko in “AI and Medicine: The Slippery Slope to an Uncertain Future” (Feb. 2020) -Lyle Ungar and Angela Bradbury in “Chatbots in Healthcare: The Ultimate Turing Test” (Aug. 2024) -“A Textbook Remedy for Domain Shifts: Knowledge Priors for Medical Image Analysis” by Yue Yang, Mona Gandhi, Yufei Wang, Yifan Wu, Michael S. Yao, Chris Callison-Burch, James C. Gee, Mark Yatskar (NeurIPS) -Google DeepMind -OpenAI's Deep Research -The Thinking Game (2024) dir. by Greg Kohs -“Dolly the Sheep: A Cautionary Tale” by Robin Feldman and Vern Norviel (Yale Journal of Law & Technology) -Who, Me? Children's book series -The Influencers Substack Follow our social media platforms to stay up to date on our new projects!
We are all familiar with phishing tests to test our ability to identify a fraudulent email – but what about a test to see if a fraudulent vendor request to change vendor remittance details can be leaked or changed? Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Free Training Sessions: https://training.debrarrichardson.com/free-training-sessions Plug Up the Gaps in Your Vendor Process to Avoid fraud, Fines and Bad Vendor DataAuthentication (Includes a Free Authentication Reference Template)Pressure Testing 101: How to Stress-Test AP Fraud Controls: https://www.iofm.com/ap/whitepapers/pressure-testing-101-how-to-stress-test-ap-fraud-controls Vendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
// GUEST //X: https://x.com/noahkaufmanmdInstagram: https://www.instagram.com/noahkaufmanmdWebsite: https://selfbitcoinization.com/ // SPONSORS //The Farm at Okefenokee: https://okefarm.com/iCoin: https://icointechnology.com/breedloveHeart and Soil Supplements (use discount code BREEDLOVE): https://heartandsoil.co/In Wolf's Clothing: https://wolfnyc.com/Blockware Solutions: https://mining.blockwaresolutions.com/breedloveOn Ramp: https://onrampbitcoin.com/?grsf=breedloveMindlab Pro: https://www.mindlabpro.com/breedloveCoinbits: https://coinbits.app/breedlove // PRODUCTS I ENDORSE //Protect your mobile phone from SIM swap attacks: https://www.efani.com/breedloveNoble Protein (discount code BREEDLOVE for 15% off): https://nobleorigins.com/Lineage Provisions (use discount code BREEDLOVE): https://lineageprovisions.com/?ref=breedlove_22Colorado Craft Beef (use discount code BREEDLOVE): https://coloradocraftbeef.com/ // SUBSCRIBE TO THE CLIPS CHANNEL //https://www.youtube.com/@robertbreedloveclips2996/videos // OUTLINE //0:00 - WiM Episode Trailer1:04 - Myers-Briggs Personality Type of Bitcoiners7:28 - Bitcoin as a Moral Force for Good16:13 - Human Evolution and Monetary Evolution23:24 - Technology's Effect on Purpose and Self-Actualization28:34 - The Farm at Okefenokee30:00 - iCoin Bitcoin Wallet31:30 - Economic Progress and Maslow's Hierarchy of Needs39:25 - Broken Money and Moral Corruption of the Healthcare System47:40 - Bitcoin as an Organism53:54 - Privacy is an Aspect of Freedom56:18 - Heart and Soil Supplements57:18 - Helping Lightning Startups with In Wolf's Clothing58:10 - Life Reversing the Flow of Entropy1:10:30 - The Death of Money and Importance of Energy1:25:21 - The Connection Between the Monetary Standard and the Moral Standard1:30:52 - Mine Bitcoin with Blockware Solutions1:32:15 - OnRamp Bitcoin Custody1:34:11 - The Connection Between the Monetary Standard and the Moral Standard (contd)1:46:11 - The Complexity of Applied Morality1:56:38 - Shitcoins and Continued Bitcoin Education2:01:41 - Mind Lab Pro Supplements2:02:52 - Buy Bitcoin with Coinbits2:04:02 - The Bridge Between the Fiat to Bitcoin Paradigms2:38:20 - The End of an Inflationary Monetary System2:42:20 - An Intellectual Gold Rush and New PhDs2:47:09 - Managing the Ego for Learning2:56:55 - Bitcoin as a Moral Imperative3:00:58 - Bitcoin is More American than the Constitution3:04:05 - Dealing with Toxic Maximalism3:06:33 - Remedying Corruption in Medicine and Money3:16:45 - Aligning the Incentives of the Individual and the Collective3:25:30 - The Altcoin Market as a Bitcoin Testnet3:30:56 - How to Connect with Noah // PODCAST //Podcast Website: https://whatismoneypodcast.com/Apple Podcast: https://podcasts.apple.com/us/podcast/the-what-is-money-show/id1541404400Spotify: https://open.spotify.com/show/25LPvm8EewBGyfQQ1abIsERSS Feed: https://feeds.simplecast.com/MLdpYXYI // SUPPORT THIS CHANNEL //Bitcoin: 3D1gfxKZKMtfWaD1bkwiR6JsDzu6e9bZQ7Sats via Strike: https://strike.me/breedlove22Dollars via Paypal: https://www.paypal.com/paypalme/RBreedloveDollars via Venmo: https://account.venmo.com/u/Robert-Breedlove-2 // SOCIAL //Breedlove X: https://x.com/Breedlove22WiM? X: https://x.com/WhatisMoneyShowLinkedin: https://www.linkedin.com/in/breedlove22/Instagram: https://www.instagram.com/breedlove_22/TikTok: https://www.tiktok.com/@breedlove22Substack: https://breedlove22.substack.com/All My Current Work: https://linktr.ee/robertbreedlove
This week, we're joined by the great William Ramsey of 'William Ramsey Investigates' to discuss the controversial novel written by J.D. Salinger known as 'The Catcher in the Rye'...Join us at the intersection of culture creation, social engineering, behavioral modification, and pop culture symbolism in our effort to peel back these complicated layers of deceit imbued with sophisticated methods of mind control and psychological warfare techniques.Please consider supporting our work-https://www.spreaker.com/podcast/william-ramsey-investigates--1898073https://www.patreon.com/williamramseyinvestigateshttps://www.williamramseyinvestigates.com/https://www.patreon.com/c/TheUnderclassPodcasthttps://www.spreaker.com/podcast/the-underclass-podcast--6511540https://www.youtube.com/@TheUnderclassPodcasthttps://rumble.com/user/TheUnderclassPodcast#CatcherInTheRye #CultureCreation #SocialEngineering #BehavioralModification #PopCultureSymbolism #HypnoProgrammed #ManchurianCandidates #MindControlPatsy #TedKaczynski #LuigiMangione #RyanRouth #SirhanSirhan #MarkDavidChapman #JohnHinckleyJr #CharlesManson #PsychologicalWarfare #HoldenCaulfield #SalingerUnraveled #LiteraryMindGames #ControlThroughArtBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-underclass-podcast--6511540/support.
What if creating frictionless digital experiences isn't just about making things easier, but finding the perfect balance between ease and profitability?Join hosts Chuck Moxley and Nick Paladino as they talk with Adam Candela, former Director of Digital Retail and Digital Marketing at Dunkin' Brands. With over 25 years of digital experience including roles at BJ's Wholesale Club and Staples, Adam shares insights on balancing frictionless experiences with business objectives, building effective digital teams, and avoiding the pitfalls of over-automation.Lessons from this episode:1. Balance customer convenience with profitability by maintaining strategic friction points that create opportunities for additional value and sales.2. Encourage innovation within teams by practicing humility as a leader and creating safe spaces for all team members to contribute ideas.3. When implementing digital initiatives, focus first on solving the right problem rather than rushing to quick solutions that might miss the mark with customers.Want more tips and strategies to create frictionless user experiences? Subscribe to our newsletter!https://www.thefrictionlessexperience.com/frictionless—Adam's LinkedIn: https://www.linkedin.com/in/adamcandela/Chuck's LinkedIn: https://www.linkedin.com/in/chuckmoxley/Nick's LinkedIn: https://www.linkedin.com/in/npaladino/Chapters:(00:00) Introduction(02:15) Defining Frictionless Digital Experiences(04:45) Challenges of Order-Ahead Technology(07:15) Balancing Convenience with Business Needs(08:45) Location-Based Notifications and Personalization(12:15) Social Engineering in Digital Design(15:45) When Frictionless Hurts Profitability(21:15) Balancing Automation and Personalization(27:00) Internal Friction and Team Dynamics(32:00) Avoiding the "Hippo" Effect in Meetings(35:00) Common Misconceptions About Digital Experiences(38:30) Conclusion
If you still receive vendor supporting documentation via email and process vendor adds and changes manually - this topic is for you, though, it may surprise some of you since I routinely say that confirmation calls are not the silver bullet to avoid fraud. What can 3 confirmation calls do? Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Vendor Master File Tip of the Week > New Best Practice To Avoid Fraud When Making That Confirmation Call: https://youtu.be/4Yv_D2hv76E Vendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
The intersection of cybersecurity and healthcare is more critical than ever, as technology continues to shape the way patient care is delivered. At HIMSS 2025 in Las Vegas, we sat down with Lee Kim, Senior Principal of Cybersecurity and Privacy at HIMSS, to discuss the pressing security challenges facing healthcare organizations, the role of artificial intelligence, and the balance between innovation and risk.AI in Healthcare: Promise and PerilArtificial intelligence is rapidly being adopted across the healthcare sector, yet many organizations still lack structured governance around its use. Kim highlights the “wild west” nature of AI adoption, where policies are either non-existent or underdeveloped, creating risks related to privacy, data security, and patient outcomes. While AI-powered diagnostic tools, like those used in radiology, have the potential to improve patient care by identifying critical conditions early, blind trust in AI-generated results presents serious risks. Without proper oversight, reliance on AI could lead to incorrect medical decisions, putting patient safety in jeopardy.Cybersecurity Gaps in Healthcare OrganizationsOne of the biggest concerns in healthcare cybersecurity is the over-reliance on security tools without a clear strategy. Many organizations invest in the latest technology but neglect foundational security practices, such as governance, policy development, and staff training. Kim points out that less than half of cybersecurity budgets are allocated to governance, leading to disorganized security programs.Another persistent challenge is the human factor. Social engineering and phishing attacks remain the top attack vectors, exploiting the inherent culture of healthcare professionals who are trained to help and trust others. Organizations must focus on proactive security measures, such as regular training and simulated attacks, to reduce human error and strengthen defenses.The Financial and Operational RealityBudget constraints continue to be a challenge, particularly for smaller hospitals and community healthcare providers. While larger organizations may have more resources, cybersecurity spending often focuses on acquiring new tools rather than optimizing existing defenses. Kim stresses the importance of a balanced approach—investing in both technology and governance to ensure long-term resilience.Another concern is the increasing dependence on third-party services and cloud-based AI tools. If these services become too expensive or go offline, healthcare organizations may face operational disruptions. The lack of contingency planning, such as backup vendors or alternative systems, leaves many institutions vulnerable to supply chain risks.Building a More Resilient Healthcare Security ModelAs technology continues to drive innovation in healthcare, organizations must adopt a proactive cybersecurity stance. Business impact analyses, vendor risk assessments, and tabletop exercises should be standard practice to prepare for disruptions. Kim also raises the idea of cyber mutual aid—a model similar to emergency medical mutual aid, where healthcare organizations collaborate to support each other in times of crisis.HIMSS 2025 provides a forum for these critical conversations, bringing together global healthcare leaders to share insights, challenges, and solutions. For those interested in diving deeper, the HIMSS Cybersecurity Survey is available online, offering a comprehensive look at the current state of healthcare security.To hear the full discussion on these topics and more, listen to the episode featuring Lee Kim, Sean Martin, and Marco Ciappelli from HIMSS 2025 On Location.Guest: Lee Kim, Senior Principal of Cybersecurity and Privacy at HIMSS | On LinkedIn: https://www.linkedin.com/in/leekim/Hosts:Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsHITRUST: https://itspm.ag/itsphitweb____________________________ResourcesLearn more and catch more stories from HIMSS 2025 coverage: https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegasHIMSS 2024 Cybersecurity Report: https://www.himss.org/resources/himss-healthcare-cybersecurity-survey/____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More
// GUEST //Off the Chain Capital: https://offthechain.capital/X: https://x.com/briandixon06?lang=enLinkedIn: https://www.linkedin.com/in/briandixon06 // SPONSORS //The Farm at Okefenokee: https://okefarm.com/Heart and Soil Supplements (use discount code BREEDLOVE): https://heartandsoil.co/In Wolf's Clothing: https://wolfnyc.com/Blockware Solutions: https://mining.blockwaresolutions.com/breedloveNetSuite: https://netsuite.com/whatismoneyOn Ramp: https://onrampbitcoin.com/?grsf=breedloveMindlab Pro: https://www.mindlabpro.com/breedloveCoinbits: https://coinbits.app/breedlove // PRODUCTS I ENDORSE //Protect your mobile phone from SIM swap attacks: https://www.efani.com/breedloveNoble Protein (discount code BREEDLOVE for 15% off): https://nobleorigins.com/Lineage Provisions (use discount code BREEDLOVE): https://lineageprovisions.com/?ref=breedlove_22Colorado Craft Beef (use discount code BREEDLOVE): https://coloradocraftbeef.com/ // SUBSCRIBE TO THE CLIPS CHANNEL //https://www.youtube.com/@robertbreedloveclips2996/videos // OUTLINE //0:00 - WiM Episode Trailer1:39 - Brian Dixon's Near-Death Experience8:00 - Law School and Discovering Bitcoin14:27 - How Brian Met His Wife16:38 - From Law to Entrepreneurship23:21 - Early Bitcoin Education26:13 - The Farm at Okefenokee27:33 - Heart and Soil Supplements28:32 - Off the Chain Investment Strategy33:44 - Human Consciousness and the Philosophy of Bitcoin41:43 - Bitcoin's Connection to Spirituality and Religion48:21 - Politics, Money, and Religion54:30 - Seen vs. Unseen Realm1:01:43 - Helping Lightning Startups with In Wolf's Clothing1:02:37 - Mine Bitcoin with Blockware Solutions1:03:59 - What Is Reality?1:14:06 - Balance, Love, and the Imitation of Christ1:24:11 - On-Ramp Bitcoin Custody1:26:07 - NetSuite: Business Software1:27:25 - Ancient Egypt and Related Mysteries1:45:55 - MindLab Pro Supplements1:47:07 - Buy Bitcoin with Coinbits1:48:35 - Past Life Readings1:53:30 - Dreams, DMT, and Astrology2:02:19 - Ancient & Secret Technology and UFOs2:13:03 - Electromagnetism and the Pyramids2:16:20 - Connections Between Physiology, Psychology, and Spirituality2:21:17 - Free Will vs. Determinism2:29:39 - Brian's Health and Fitness Protocol2:40:22 - Nutrient-Rich Food and The Farm at Okefenokee2:44:31 - The Simplest Answer Is the Best Answer2:46:00 - The Future of Technology and Societal Control2:55:15 - Censorship and the Effects of AI on Communication3:01:30 - Social Engineering and De-Population Theories3:09:12 - What's Next for Brian Dixon3:12:19 - Where to Find Brian & Closing Thoughts // PODCAST //Podcast Website: https://whatismoneypodcast.com/Apple Podcast: https://podcasts.apple.com/us/podcast/the-what-is-money-show/id1541404400Spotify: https://open.spotify.com/show/25LPvm8EewBGyfQQ1abIsERSS Feed: https://feeds.simplecast.com/MLdpYXYI // SUPPORT THIS CHANNEL //Bitcoin: 3D1gfxKZKMtfWaD1bkwiR6JsDzu6e9bZQ7Sats via Strike: https://strike.me/breedlove22Dollars via Paypal: https://www.paypal.com/paypalme/RBreedloveDollars via Venmo: https://account.venmo.com/u/Robert-Breedlove-2 // SOCIAL //Breedlove X: https://x.com/Breedlove22WiM? X: https://x.com/WhatisMoneyShowLinkedin: https://www.linkedin.com/in/breedlove22/Instagram: https://www.instagram.com/breedlove_22/TikTok: https://www.tiktok.com/@breedlove22Substack: https://breedlove22.substack.com/All My Current Work: https://linktr.ee/robertbreedlove
Several listeners have requested we explain what psyops and their characteristics look like. How to detect them, how to recognize them and how to avoid being caught up in them. Today we look at the ins and outs of psyops and get to the bottom of what is going on.Email us at: downtherh@protonmail.com
7:12 TOM MYERS PITS WATP VS BMP35:09 BERT KREISHCER AND MARC MARON MAKE FRIENDS56:53 ROAST BATTLE - DONNELL RAWLINGS CRASHOUT1:24:06 CUMIA PUTS OPIE IN HIS PLACE2:07:16 OWEN BENJAMIN GOES AT SHANE GILLIS2:38:56 GOAL TIME WITH STEEL TOEFOR ALL THINGS BLIND MIKEhttp://blindmike.netFOR ALL THINGS CRAIGGERShttp://www.verygoodshow.orgFOR ALL THINGS HACKRIDEhttp://hackridethedemon.comFOR ALL THINGS DJ ELECTRA FRYhttp://djelectrafry.com
If you haven't changed your mind on anything in the past two decades, you should reconsider your beliefs. Malcolm Gladwell's latest book is Revenge of the Tipping Point: Overstories, Superspreaders, and the Rise of Social Engineering and he is the host of the podcast Revisionist History. Dylan Lewis caught up with Gladwell for a conversation about: - How social engineering effects your life. - Why real diversity can prevent leaders from doing stupid things. - The demand to return to more in-person experiences. Host: Dylan Lewis Guest: Malcolm Gladwell Producer:Ricky Mulvey Engineer: Rick Engdahl Learn more about your ad choices. Visit megaphone.fm/adchoices
The Green Room - https://rumble.com/playlists/aa56qw_g-j0 BUY CAST BREW COFFEE TO FIGHT BACK - https://castbrew.com/ Join The Discord Server - https://timcast.com/join-us/ Hang Out With Tim Pool & Crew LIVE At - http://Youtube.com/TimcastIRL Elon's DOGE EXPOSES US Funding Liberal Press MASS SOCIAL ENGINEERING, Trump FURIOUS | Timcast LIVE Learn more about your ad choices. Visit megaphone.fm/adchoices
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
An Ontology for Threats: Cybercrime and Digital Forensic Investigation on Smart City Infrastructure Smart cities is a big topic for many local governments. With building these complex systems, attacks will follow. https://isc.sans.edu/diary/An%20ontology%20for%20threats%2C%20cybercrime%20and%20digital%20forensic%20investigation%20on%20Smart%20City%20Infrastructure/31676 North Korean state actor tricking admins into executing PowerShell North Korean state actors are spending quite a bit of effort setting up relationships with South Korean system administrators, culminating in them getting tricked into executing malicious PowerShell scripts. https://x.com/MsftSecIntel/status/1889407814604296490 Wazuh Vulnerability A deserialization vulnerability in Wazuh may lead to an unauthenticated remote code execution vulnerability https://github.com/wazuh/wazuh/security/advisories/GHSA-hcrc-79hj-m3qh PAM PKCS11 Vulnerablity Several vulnerabilities in the Linux PAM module processing smart card authentication can be used to bypass authentication https://github.com/OpenSC/pam_pkcs11/releases/tag/pam_pkcs11-0.6.13 Ivanti Patches Ivanti released its monhtly update, fixing a number of critical vulnerabilities in Connect Secure and other prodcuts https://forums.ivanti.com/s/article/February-Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-and-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs?language=en_US