Podcasts about Social engineering

  • 1,064PODCASTS
  • 2,767EPISODES
  • 52mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Dec 11, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Social engineering

Show all podcasts related to social engineering

Latest podcast episodes about Social engineering

The Jordan Harbinger Show
1255: Abbie Maroño | Mastering Persuasion with Social Engineering

The Jordan Harbinger Show

Play Episode Listen Later Dec 11, 2025 87:35


The same tactics that con artists use to manipulate you can be used to build trust. Dr. Abbie Maroño explains the psychology of ethical social engineering. Full show notes and resources can be found here: jordanharbinger.com/1255What We Discuss with Dr. Abbie Maroño:Manipulation vs. Influence: It's all about intention. The same psychological tactics can be used for good or evil. The difference? Manipulation disregards harm to others and exploits fear, while influence builds mutual benefit and makes people want to collaborate with you. Con artists use manipulation because it's faster — but ethical influence wins every time over the long term.Scammers weaponize your emotions to bypass critical thinking. When emotions are activated, your prefrontal cortex — the brain's logic center — gets overridden. That's why con artists use artificial urgency ("only 24 hours left!") and exclusivity ("just for you"). They only need to appear trustworthy, not actually be it, because you'll act before you can verify.Shame is the silent weapon that keeps victims quiet. The reason so many scam victims never report what happened isn't denial, it's embarrassment. Shame becomes its own prison, preventing people from seeking help or warning others. This silence protects predators and perpetuates cycles of exploitation.Short-term thinking is the con artist's best friend. Manipulators prey on our psychological bias toward immediate rewards. Getting $100 now feels more valuable than $150 later — even when it isn't. This "survival mode" mentality keeps people chasing quick wins rather than building something sustainable.To protect yourself, remember that other people's emotions usually have nothing to do with you. When someone pushes your buttons or creates pressure, pause and recognize it for what it is: a tactic, not a personal attack. Shelving your emotional reaction keeps your critical thinking intact — and that's your best defense against manipulation and your greatest asset in any negotiation.And much more...And if you're still game to support us, please leave a review here — even one sentence helps! Sign up for Six-Minute Networking — our free networking and relationship development mini course — at jordanharbinger.com/course!Subscribe to our once-a-week Wee Bit Wiser newsletter today and start filling your Wednesdays with wisdom!Do you even Reddit, bro? Join us at r/JordanHarbinger!This Episode Is Brought To You By Our Fine Sponsors: Function Health: $100 credit: functionhealth.com/jordan, code JORDAN100LinkedIn: Post your job for free: linkedin.com/jordanProgressive Insurance: Free online quote: progressive.comLand Rover Defender: landroverusa.comHomes.com: Find your home: homes.comSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Putting the AP in hAPpy
Episode 367: Top 5 Things to Know or Do Now for 1099-NEC/MISC and 1042-S Tax Reporting for TY 2025

Putting the AP in hAPpy

Play Episode Listen Later Dec 11, 2025 22:29


If you are getting ready for tax reporting for Tax Year 2025 and need the important things to know or do regarding the 1099-NEC, the 1099-MISC and the 1042-S – this podcast episode is for you! Starting with two that you don't have to worry about (yet) then three that you do.  Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    IRS Draft Forms:  https://www.irs.gov/draft-tax-formsIRS Published Forms:  https://www.irs.gov/forms-instructions-and-publications IRS Publication 5903: IRIS App for TCC Tutorial and IRIS Application for TCCIRS Publication 5911: IR App for TCC Tutorial and IR Application for TCCCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download:  Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

On the Schmooze Podcast: Leadership | Strategic Networking | Relationship Building

I'm pleased to interview one of our Biz Book Pub Hub Partners. Our Hub Partners are experts who support entrepreneurs along their author journey.  Today's guest is a powerhouse in the world of thought leadership and publishing—a true connector who helps experts transform their ideas into influential books that make a real difference. She's built an extraordinary career as both an author and strategist, earning six traditional publishing deals, ten thought leader titles, a New York agent, and even a feature on Oprah. She's also a Wall Street Journal bestselling author whose award-winning networking books were licensed by major brands like Motorola and Yale's Graduate School of Business. She founded Networlding Publishing, where she's guided more than 175 thought leaders through every stage of writing and launching their first books. Along the way, she's helped global companies like Cisco, Office Depot, and American Express build powerful leadership networks—and even created a thought leader podcast to amplify her authors' visibility and success. Her passion is helping authors leverage both their books and their relationships to create meaningful impact and lasting influence. Please join me in welcoming Melissa G. Wilson.  In this episode, we discuss the following:

ITSPmagazine | Technology. Cybersecurity. Society
Nothing Has Changed in Cybersecurity Since the 80s — And That's the Real Problem | A Conversation with Steve Mancini | Redefining Society and Technology with Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 7, 2025 43:03


Dr. Steve Mancini: https://www.linkedin.com/in/dr-steve-m-b59a525/Marco Ciappelli: https://www.marcociappelli.com/Nothing Has Changed in Cybersecurity Since War Games — And That's Why We're in Trouble"Nothing has changed."That's not what you expect to hear from someone with four decades in cybersecurity. The industry thrives on selling the next revolution, the newest threat, the latest solution. But Dr. Steve Mancini—cybersecurity professor, Homeland Security veteran, and Italy's Honorary Consul in Pittsburgh—wasn't buying any of it. And honestly? Neither was I.He took me back to his Commodore 64 days, writing basic war dialers after watching War Games. The method? Dial numbers, find an open line, try passwords until one works. Translate that to today: run an Nmap scan, find an open port, brute force your way in. The principle is identical. Only the speed has changed.This resonated deeply with how I think about our Hybrid Analog Digital Society. We're so consumed with the digital evolution—the folding screens, the AI assistants, the cloud computing—that we forget the human vulnerabilities underneath remain stubbornly analog. Social engineering worked in the 1930s, it worked when I was a kid in Florence, and it works today in your inbox.Steve shared a story about a family member who received a scam call. The caller asked if their social security number "had a six in it." A one-in-nine guess. Yet that simple psychological trick led to remote software being installed on their computer. Technology gets smarter; human psychology stays the same.What struck me most was his observation about his students—a generation so immersed in technology that they've become numb to breaches. "So what?" has become the default response. The data sells, the breaches happen, you get two years of free credit monitoring, and life goes on. Groundhog Day.But the deeper concern isn't the breaches. It's what this technological immersion is doing to our capacity for critical thinking, for human instinct. Steve pointed out something that should unsettle us: the algorithms feeding content to young minds are designed for addiction, manipulating brain chemistry with endorphin kicks from endless scrolling. We won't know the full effects of a generation raised on smartphones until they're forty, having scrolled through social media for thirty years.I asked what we can do. His answer was simple but profound: humans need to decide how much they want technology in their lives. Parents putting smartphones in six-year-olds' hands might want to reconsider. Schools clinging to the idea that they're "teaching technology" miss the point—students already know the apps better than their professors. What they don't know is how to think without them.He's gone back to paper and pencil tests. Old school. Because when the power goes out—literally or metaphorically—you need a brain that works independently.Ancient cultures, Steve reminded me, built civilizations with nothing but their minds, parchment, and each other. They were, in many ways, a thousand times smarter than us because they had no crutches. Now we call our smartphones "smart" while they make us incrementally dumber.This isn't anti-technology doom-saying. Neither Steve nor I oppose technological progress. The conversation acknowledged AI's genuine benefits in medicine, in solving specific problems. But this relentless push for the "easy button"—the promise that you don't have to think, just click—that's where we lose something essential.The ultimate breach, we concluded, isn't someone stealing your data. It's breaching the mind itself. When we can no longer think, reason, or function without the device in our pocket, the hackers have already won—and they didn't need to write a single line of code.Subscribe to the Redefining Society and Technology podcast. Stay curious. Stay human.My Newsletter? Yes, of course, it is here: https://www.linkedin.com/newsletters/7079849705156870144/ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Cyber Security Today
Cybersecurity Today Month In Review - December 5th, 2025

Cyber Security Today

Play Episode Listen Later Dec 6, 2025 54:06


Cybersecurity Today: The Rise of Living Off the Land Strategies & More In this episode of Cybersecurity Today's Month in Review, host Jim Love is joined by Laura Payne from White Tuque and David Shipley from Beauceron Security. They discuss several pressing cybersecurity issues, including the growing threat of 'living off the land' strategies where attackers use legitimate software to stay undetected, the risks associated with public Wi-Fi and QR codes, and the recent breaches involving Oracle's E-Business Suite and SonicWall's management devices. The panel also reflects on the often conflicting cybersecurity advice circulating today and emphasizes the importance of nuanced communication in security practices. Plus, find out who wins the 'Stinky' award for cybersecurity blunders and what you can do to stay safe. Special thanks to Meter for supporting this podcast. Tune in for a deep dive into these crucial cybersecurity topics and more. 00:00 Introduction and Sponsor Message 00:19 Welcome and Guest Introductions 00:50 Unique Coffee Partnership 02:27 Living Off the Land: Cybersecurity Tactics 04:33 Social Engineering and AI Threats 13:51 The Role of Social Media in Cyber Fraud 20:05 Microsoft's New Teams Feature: A Security Risk? 26:39 Oracle Vulnerability and Enterprise Security 27:26 Patching Core Systems: Challenges and Necessities 28:12 Clop Ransomware: A Persistent Threat 29:09 University Data Breaches: The Case of U Penn 30:18 Security Culture and Leadership Accountability 33:49 Debunking Security Myths: Juice Jacking and QR Codes 39:15 Public WiFi and VPNs: Proceed with Caution 41:18 The Importance of Effective Cybersecurity Communication 48:33 SonicWall Security Concerns and the Stinkies Awards 51:13 Wrapping Up: Reflections and Future Episodes

Fringe Radio Network
A.I. Genesis Mission and Narrative Warfare with Cultural Intelligence Expert Scott Keterson - Sarah Westall

Fringe Radio Network

Play Episode Listen Later Dec 6, 2025 66:24 Transcription Available


Cultural intelligence strategist Scott Ketterson joins me for a high-level conversation about the information war reshaping modern society. Drawing on his background in cultural analysis, narrative design, and influence architecture, we explore how power now operates through perception, belief, and meaning. Together, we map out the mechanics of narrative warfare — how institutions, platforms, and state actors engineer stories, shape cultural identity, and compete for cognitive territory in ways the public rarely sees but constantly experiences.We also break down the newly announced AI Genesis Mission — the executive order issued by President Trump to accelerate national AI deployment. Ketterson and I discuss what this move signals, how rapid integration of AI into government and industry will reshape human society and reshape the relationship between humans and machines. This is an advanced, practitioner-level conversation about power, culture, and the technologies now steering both.See part 2 on Substack at https://SarahWestall.Substack.com

Putting the AP in hAPpy
Episode 366: Reduce Payment Fraud Risk By Outsourcing Your Vendor Payments

Putting the AP in hAPpy

Play Episode Listen Later Dec 4, 2025 19:39


As you are busy with year-end and increased volumes of vendor adds and changes – you may be ready to reduce your vendor process activities by outsourcing your vendor payments next year, with a bonus of reducing payment fraud risk.  How?Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download:  Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

The Underclass Podcast
Already Dead: D.C. National Guard Shooting, Venezuela Regime Change, TPUSA Sex Crimes, & More

The Underclass Podcast

Play Episode Listen Later Dec 3, 2025 118:52


Time Stamps: 3:27 - D.C. National Guard Shooting15:52 - Venezuela Regime Change & The Somali Conflict34:55 - (First Caller) Influencer Industrial Complex - "All the world's a stage"50:57 - Postmortem/Call-in Portion57:57 - TPUSA Sex Crimes1:06:42 - Haitian Island Sex Slave Conspiracy1:24:50 - The New Poverty Line & the "American Nightmare"1:32:03 - TSA Announces $45 Fee for Passengers with no REAL ID1:32:45 - Indiana Pastor's Son Charged with Child Sex CrimesVenture into the shadowy realms of power and secrecy with Already Dead, where hosts Jose Galison (@towergangjose) and Austin Picard (@theatrethugawp) dissect the intricate web of conspiracy, covert operations, and the underlying political machinations that might just be pulling the strings of our society.What to Expect: Live Listener Interaction: Call in to share your theories, ask burning questions, or discuss personal experiences related to the topics at hand. In-Depth Explorations: Each episode focuses on a different conspiracy or hidden aspect of political history, offering a platform to question and analyze what's often left unsaid. Thought-Provoking Guests: We invite individuals with insider knowledge or those who've taken the red pill to discuss topics that range from the fringe to the forefront of conspiracy culture. Critical Analysis of Current Affairs: We don't just report on events; we interpret them through the lens of parapolitics, looking for patterns and hidden agendas.Join Us: Every Tuesday at 9:30 PM ET, dive into the depths of the unknown with us. Subscribe, participate in our live call-ins, and be part of a community that seeks to understand the world beyond the surface narrative.Disclaimer: This podcast thrives on speculation, hypothesis, and the examination of alternative theories. It's meant to provoke thought and encourage personal research. Not all discussed is proven fact, but rather a call to question, explore, and understand.Warning: For those not ready to challenge their worldview, tread carefully. Once you enter the world of Already Dead, you might find that the truth is often already dead to the uninitiated. Welcome aboard, where curiosity is your guide.Please consider supporting our work-Austin's Patreon: https://www.patreon.com/c/TheUnderclassPodcastAustin's Spreaker: https://www.spreaker.com/podcast/the-underclass-podcast--6511540Austin's Rumble: https://rumble.com/user/TheUnderclassPodcastAustin's YouTube: https://www.youtube.com/@TheUnderclassPodcast#DCNationalGuardShooting #ModernGladio #AfghanPhoenixProgram #VenezuelaRegimeChange #TheSomaliConflict #ImmigrationCrisis #InfluencerIndustrialComplex #InfluenceOperation #SocialEngineering #IdeologicalSubversion #TavistockInstitute #Committeeof300 #ClubofRome #TPUSASexCrimes #HaitianIslandSexSlavePlot #TheAmericanNightmare #TSARealID #IndianaChildSexCrimes #DelphiMurders #PedophileOccupiedGovernmentBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-underclass-podcast--6511540/support.

The InfoQ Podcast
GenAI Security: Defending Against Deepfakes and Automated Social Engineering

The InfoQ Podcast

Play Episode Listen Later Dec 3, 2025 46:31


In this episode, QCon AI New York 2025 Chair Wes Reisz speaks with Reken CEO and Google Trust & Safety founder Shuman Ghosemajumder about the erosion of digital trust. They explore how deepfakes and automated social engineering are scaling cybercrime. Shuman argues defenders must move beyond default trust, utilizing behavioral telemetry and game theory to counter attacks that simulate human behavior. Read a transcript of this interview: https://bit.ly/4p7zX9z Subscribe to the Software Architects' Newsletter for your monthly guide to the essential news and experience from industry peers on emerging patterns and technologies: https://www.infoq.com/software-architects-newsletter Upcoming Events: QCon AI New York 2025 (December 16-17, 2025) https://ai.qconferences.com/ QCon London 2026 (March 16-19, 2026) QCon London equips senior engineers, architects, and technical leaders with trusted, practical insights to lead the change in software development. Get real-world solutions and leadership strategies from senior software practitioners defining current trends and solving today's toughest software challenges. https://qconlondon.com/ QCon AI Boston 2026 (June 1-2, 2026) Learn how real teams are accelerating the entire software lifecycle with AI. https://boston.qcon.ai The InfoQ Podcasts: Weekly inspiration to drive innovation and build great teams from senior software leaders. Listen to all our podcasts and read interview transcripts: - The InfoQ Podcast https://www.infoq.com/podcasts/ - Engineering Culture Podcast by InfoQ https://www.infoq.com/podcasts/#engineering_culture - Generally AI: https://www.infoq.com/generally-ai-podcast/ Follow InfoQ: - Mastodon: https://techhub.social/@infoq - X: https://x.com/InfoQ?from=@ - LinkedIn: https://www.linkedin.com/company/infoq/ - Facebook: https://www.facebook.com/InfoQdotcom# - Instagram: https://www.instagram.com/infoqdotcom/?hl=en - Youtube: https://www.youtube.com/infoq - Bluesky: https://bsky.app/profile/infoq.com Write for InfoQ: Learn and share the changes and innovations in professional software development. - Join a community of experts. - Increase your visibility. - Grow your career. https://www.infoq.com/write-for-infoq

No Way, Jose!
NWJ704- Already Dead: D.C. National Guard Shooting, Venezuela Regime Change, TPUSA Sex Crimes & More

No Way, Jose!

Play Episode Listen Later Dec 3, 2025 118:52 Transcription Available


Time Stamps:3:27 - D.C. National Guard Shooting15:52 - Venezuela Regime Change & The Somali Conflict34:55 - (First Caller) Influencer Industrial Complex - "All the world's a stage"50:57 - Postmortem/Call-in Portion57:57 - TPUSA Sex Crimes1:06:42 - Haitian Island Sex Slave Conspiracy1:24:50 - The New Poverty Line & the "American Nightmare"1:32:03 - TSA Announces $45 Fee for Passengers with no REAL ID1:32:45 - Indiana Pastor's Son Charged with Child Sex CrimesVenture into the shadowy realms of power and secrecy with Already Dead, where hosts Jose Galison (@towergangjose) and Austin Picard (@theatrethugawp) dissect the intricate web of conspiracy, covert operations, and the underlying political machinations that might just be pulling the strings of our society.What to Expect:Live Listener Interaction: Call in to share your theories, ask burning questions, or discuss personal experiences related to the topics at hand.In-Depth Explorations: Each episode focuses on a different conspiracy or hidden aspect of political history, offering a platform to question and analyze what's often left unsaid.Thought-Provoking Guests: We invite individuals with insider knowledge or those who've taken the red pill to discuss topics that range from the fringe to the forefront of conspiracy culture.Critical Analysis of Current Affairs: We don't just report on events; we interpret them through the lens of parapolitics, looking for patterns and hidden agendas.Join Us: Every Tuesday at 9:30 PM ET, dive into the depths of the unknown with us. Subscribe, participate in our live call-ins, and be part of a community that seeks to understand the world beyond the surface narrative.Disclaimer: This podcast thrives on speculation, hypothesis, and the examination of alternative theories. It's meant to provoke thought and encourage personal research. Not all discussed is proven fact, but rather a call to question, explore, and understand. Warning: For those not ready to challenge their worldview, tread carefully. Once you enter the world of Already Dead, you might find that the truth is often already dead to the uninitiated. Welcome aboard, where curiosity is your guide.Please consider supporting my work- Patreon- https://www.patreon.com/nowayjose2020Only costs $2/month and will get you access to episodes earlier than the public No Way, Jose! Rumble Channel- https://rumble.com/c/c-3379274 No Way, Jose! YouTube Channel- https://youtube.com/channel/UCzyrpy3eo37eiRTq0cXff0gMy Podcast Host- https://redcircle.com/shows/no-way-joseApple podcasts- https://podcasts.apple.com/us/podcast/no-way-jose/id1546040443Spotify- https://open.spotify.com/show/0xUIH4pZ0tM1UxARxPe6ThStitcher- https://www.stitcher.com/show/no-way-jose-2Amazon Music- https://music.amazon.com/podcasts/41237e28-c365-491c-9a31-2c6ef874d89d/No-Way-JoseGoogle Podcasts- https://www.google.com/podcasts?feed=aHR0cHM6Ly9mZWVkcy5yZWRjaXJjbGUuY29tL2ZkM2JkYTE3LTg2OTEtNDc5Ny05Mzc2LTc1M2ExZTE4NGQ5Yw%3D%3DRadioPublic- https://radiopublic.com/no-way-jose-6p1BAO Vurbl- https://vurbl.com/station/4qHi6pyWP9B/Feel free to contact me at thelibertymovementglobal@gmail.com#DCNationalGuardShooting #ModernGladio #AfghanPhoenixProgram #VenezuelaRegimeChange #TheSomaliConflict #ImmigrationCrisis #InfluencerIndustrialComplex #InfluenceOperation #SocialEngineering #IdeologicalSubversion #TavistockInstitute #Committeeof300 #ClubofRome #TPUSASexCrimes #HaitianIslandSexSlavePlot #TheAmericanNightmare #TSARealID #IndianaChildSexCrimes #DelphiMurders #PedophileOccupiedGovernment

IIoT Use Case Podcast | Industrie
#197 | Passives OT-Monitoring: Angriffe erkennen, bevor es kritisch wird | Rhebo

IIoT Use Case Podcast | Industrie

Play Episode Listen Later Dec 3, 2025 35:32


www.iotusecase.com#OTMonitoring #OTCybersecurity #Anomalieerkennung In Episode 197 des IoT Use Case Podcasts spricht Co-Host Dr. Peter Schopf mit Jan Fischer, Head of Sales bei Rhebo aus Leipzig. Im Mittelpunkt stehen OT-Cybersecurity und der Schutz industrieller Netze in kritischen Infrastrukturen, der Fertigung und der Logistik. Jan erklärt, wie Rhebo Brownfield-Umgebungen passiv überwacht, Anomalien sichtbar macht und warum IT/OT-Konvergenz nicht automatisch bedeutet, beide Welten vollständig zu verheiraten. Es geht um reale Vorfälle aus der Praxis, Social Engineering über LinkedIn, vergessene Assets im Netz und die Frage, welche Rolle KI heute tatsächlich in der OT-Security spielt.Folge 197 auf einen Blick (und Klick):(04:26) Herausforderungen, Potenziale und Status quo – So sieht der Use Case in der Praxis aus(10:01) Lösungen, Angebote und Services – Ein Blick auf die eingesetzten Technologien(27:46) Übertragbarkeit, Skalierung und nächste Schritte – So könnt ihr diesen Use Case nutzenPodcast ZusammenfassungOT-Cybersecurity im Brownfield. Wie Rhebo industrielle Netze passiv absichertIn dieser Folge zeigt Jan Fischer, wie Unternehmen ihre OT-Security pragmatisch auf ein neues Niveau heben, ohne Produktionsnetze oder kritische Infrastrukturen zu gefährden. Die Ausgangslage sind historisch gewachsene Brownfield-Netzwerke mit alten Protokollen wie Profibus oder Modbus, unverschlüsselter HTTP-Kommunikation, vergessenen Druckern oder Raspberry Pis im Netz und verschleppten Updates auf Security-Komponenten.Die Lösung von Rhebo basiert auf passivem Monitoring. Die Software schneidet den OT-Netzwerkverkehr mit, trennt typische von atypischen Musterbildern und meldet Anomalien frühzeitig. Im Rahmen eines Assessments wird die bestehende Infrastruktur durchleuchtet. Auffällig sind etwa ungeplante DHCP-Server, neue Protokolle, Datenströme ins Ausland oder kompromittierte Systeme nach Social-Engineering-Angriffen. Ein Forensik- und Diagnose-Team bewertet die Funde und leitet konkrete Maßnahmen ab, vom Schließen von Einfallstoren bis zum gezielten Nachrüsten von Security.Jan ordnet außerdem aktuelle Entwicklungen wie NIS2, den Cyber Resilience Act und den Wunsch nach europäischen On-Prem-Lösungen ein und erklärt die Grenzen von KI in der OT-Security. Die Episode richtet sich an Betreiber kritischer Infrastrukturen, Fertigungs- und Logistikunternehmen sowie OT-Verantwortliche, die ihre Netze härten und reale Angriffe früh erkennen möchten.-----Relevante Folgenlinks:Peter (https://www.linkedin.com/in/peter-schopf/)Jan (https://www.linkedin.com/in/jan-fischer-a4552b103/)Rhebo Homepage (https://rhebo.com/de/)Jetzt IoT Use Case auf LinkedIn folgen1x monatlich IoT Use Case Update erhalten

The Underclass Podcast
NDS: The Columbine Massacre Part 2 w/ Austin Wade Picard

The Underclass Podcast

Play Episode Listen Later Dec 2, 2025 181:27


This week, I had the privilege of sitting down yet again with the one and only TopLobsta, and David L Corbo (AKA The Raven) of "Nephilim Death Squad". Enjoy this conversation as we delve into the proverbial deep end of conspiracy and parapolitics dissecting the anatomy of a school shooting through the untold story of the Columbine massacre, following the echoes of this tragedy to a much more plausible alternative conclusion.Through objectively reexamining the details of this case we pry back the curtain yet again, ultimately revealing the all too familiar hidden hand responsible for guiding these chaotic events into place. The facade of virtue drenched in moral corruption reflects the cunning nature of our unending adversary, spotlighting the manipulative tactics of these engineers of outcome.Please consider supporting our work- Austin's Patreon: https://www.patreon.com/c/TheUnderclassPodcastAustin's Spreaker: https://www.spreaker.com/podcast/the-underclass-podcast--6511540Austin's Rumble: https://rumble.com/user/TheUnderclassPodcastAustin's YouTube: https://www.youtube.com/@TheUnderclassPodcast☠️ NEPHILIM DEATH SQUAD Skip the ads. Get early access. Tap into the hive mind of dangerous RTRDs in our private Telegram channel — only on Patreon:

AI + a16z
Why Social Engineering Now Works on Machines

AI + a16z

Play Episode Listen Later Dec 2, 2025 25:14


Ian Webster built PromptFoo after watching 200 million Discord users systematically dismantle his AI agent—now Fortune 10 companies pay him to break theirs before customers do. The "lethal trifecta" sounds academic until you realize it's already happening: untrusted input plus sensitive data plus an exfiltration channel equals the security incident that just cost a SaaS company its multi-tenancy guarantees. Webster's red-teaming agents don't use signatures—they have 30,000 conversations with your system, socially engineering their way past guardrails the same way a teenager with emojis convinced ChatGPT to leak data, except his tools find the vulnerability before your users become the pen testers.Follow Ian Webster on X: https://x.com/iwebstFollow Joel on LinkedIn: https://www.linkedin.com/in/3448827723723234/ Check out everything a16z is doing with artificial intelligence here, including articles, projects, and more podcasts. Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Cyber Security Today
Espionage and Intelligence - What Cybersecurity Professionals Can Learn

Cyber Security Today

Play Episode Listen Later Nov 28, 2025 47:41


The Intersection of Espionage Techniques and Cybersecurity Threats This episode explores the parallels between espionage and cybersecurity, particularly focusing on social engineering tactics used in both domains. Hosted by Jim Love, the podcast features insights from Neil Bisson, a retired intelligence officer from CSIS, and David Shipley, CEO of Beauceron Security. They discuss the vulnerabilities in human behavior that can be exploited, the similarity between human intelligence operations and phishing attacks, and how AI is transforming the landscape of social engineering. Practical advice on recognizing and mitigating these threats is also provided. The episode underscores the importance of empathy, skepticism, and continuous education in defending against sophisticated cyber threats. 00:00 Introduction and Sponsor Message 00:25 Linking Espionage and Cybersecurity 01:06 The Role of Social Engineering in Cyber Attacks 02:25 Guest Introductions: Neil Bisson and David Shipley 03:24 Recruitment Tactics in Intelligence 05:56 Phishing vs. Intelligence Recruitment 07:48 AI's Role in Modern Social Engineering 10:45 Building Trust and Rapport in Intelligence 16:19 Ethical Considerations in Intelligence Work 20:01 Future of Cybersecurity and Social Engineering 24:31 The Art of Subtle Manipulation 26:01 Clandestine Tactics and Voluntary Information 26:24 Incremental Trust Building 26:46 Psychological Manipulation and Cult Recruitment 27:34 Human Connection and Vulnerability 28:53 AI and Social Engineering 30:25 The Threat of AI in Recruitment 33:20 Emotional Manipulation in Espionage 36:19 Defending Against Manipulation 38:12 Empathy and Information as Defense 45:49 Final Thoughts and Audience Engagement

Fringe Radio Network
The Total Enslavement of All Humanity: Happening Right Now! - A Minute To Midnite

Fringe Radio Network

Play Episode Listen Later Nov 25, 2025 48:01 Transcription Available


Episode 592: Whether or not you realize it, powerful globalist forces are using whatever means they can to enslave all of humanity. Using technology that is rapidly developing, they are creating a digital panopticon in which everyone and everything, will be tracked and traced. This is how they are doing it…

Scam Rangers
Breaking the Scam Spell: From Grooming to Intervention with Martina Dove, Scam psychology expert

Scam Rangers

Play Episode Listen Later Nov 25, 2025 47:03


In this powerful episode of Scam Rangers, Ayelet Biger-Levin sits down with scam psychology expert Martina Dove to dive deep into the psychology of scams. Martina shares her insights on the psychological tactics used by scammers and the most effective methods for prevention and intervention.The conversation dives deep into the origins of Martina's research, which began with her interest in the Barnum effect , a phenomenon where people accept vague feedback as true when it applies to everyone. Barnum, an 1800s magician, even wrote a book on scams that are still in operation today, like romance scams and lotteries. Martina emphasizes that scams are now a "product that caters for everyone", as vulnerability depends on individual circumstances and personality, not IQ.Key Takeaways: The Scam Lifecycle and Psychology The Scammer's Hook: Scams, which now feature excellent grammar due to AI, prey on either opportunity (like job or romance scams) or fear (like sextortion). Once a victim responds to the initial communication, it's difficult to stop engaging. Grooming: A "Wear-Down" Process: Scams that go on for a long time—like pig butchering—evoke multiple visceral influences, starting with excitement and then inducing anxiety and fear of loss. The scammer will subtly withdraw or use verbal abuse if the victim does not comply. This wear-down period, which can last months, can cause victims to lose executive functions, affecting their memory and decision-making. Targeting Trust: Scammers groom victims to distrust their bank by teaching them that the bank will try to stop them, or by creating elaborate stories, such as a regulator investigating internal fraud. By the time the bank intervenes, the victim is a "worn out person" who truly believes the scammer's narrative. Effective Intervention: Empathy is Key: Authoritarian warnings, like "Don't panic" or "Never click links," are proven not to work, as they trigger a physiological reaction and make people switch off. Instead, interventions—especially from "Break the Spell" teams—need to be conversational and empathetic. Martina suggests asking the victim to simply "stall" the transfer, which often causes the scammer to escalate pressure, providing a warning sign to the victim.You can find more about Martina on LinkedIn: https://www.linkedin.com/in/martina-dove/A link to her book: https://www.routledge.com/The-Psychology-of-Fraud-Persuasion-and-Scam-Techniques-Understanding-What-Makes-Us-Vulnerable/Dove/p/book/9781032953908This podcast is hosted by Ayelet Biger-Levin, who has spent the last 15 years building technology to help financial institutions authenticate their customers and identify fraud. She believes that when it comes to scams, the story starts well before the transaction. Ayelet created this podcast to talk about the human side of scams and to learn from those dedicated to advocating for scam victims and taking action against fraud. Be sure to follow Ayelet on LinkedIn: https://www.linkedin.com/in/ayelet-biger-levin/Learn More: https://www.rangersai.com/

Putting the AP in hAPpy
Episode 365: Build Your Checklist to Avoid Global Payment Fraud At Busy Year-End - In 5 Steps

Putting the AP in hAPpy

Play Episode Listen Later Nov 20, 2025 33:27


Get ready for busy year end by building a checklist to avoid global payment fraud.  Don't forget to download your free checklist template!Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    On-Demand Webinar to Get Checklist:  Build Your Checklist to Avoid Global Payment Fraud At Busy Year-End - In 5 StepsCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download:  Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

The Social-Engineer Podcast
Ep. 329 - Security Awareness Series - Mistakes, AI and Empathy: Being a Powerful Leader with Michelle Li

The Social-Engineer Podcast

Play Episode Listen Later Nov 17, 2025 39:54


Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Michelle Li. Chris and Michelle delve into the transformative role of AI in social engineering, highlighting both its potential and pitfalls. Their conversation emphasizes the critical need for empathy in leadership and the importance of maintaining human-centric processes in an increasingly automated world. [Nov 17, 2025]   00:00 - Intro 00:27 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Offensive Security Vishing Services - https://www.social-engineer.com/offensive-security/vishing/ -          Offensive Security SMiShing Services - https://www.social-engineer.com/offensive-security/smishing/ -          Offensive Security Phishing Services - https://www.social-engineer.com/offensive-security/smishing/ -          Call Back Phishing - https://www.social-engineer.com/offensive-security/call-back-phishing/ -          Adversarial Simulation Services - https://www.social-engineer.com/offensive-security/adversarial-simulation/ -          Social Engineering Risk Assessments - https://www.social-engineer.com/offensive-security/social-engineering-risk-assessment/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                 02:34 - Michelle Li Intro 03:14 - A Roundabout Journey 05:40 - The Importance of Legacy 07:26 - Using AI Honorably 10:00 - The Effects of AI on Social Engineering 11:52 - AI for Protection 13:47 - Still About the Human Role 14:49 - Masterclass Ad 16:27 - Origins of FASE 20:01 - Reflection of Self 25:52 - The Role of Core Principles 30:15 - New Kid in Town 34:08 - Find Michelle Li Online -          LinkedIn: https://www.linkedin.com/in/michelle-li-mba-ssbb-0850b975/ -          Website: https://www.bisblox.com/ 34:47 - Book Recommendations -          Blink - Malcolm Gladwell -          The Book of Forgiving - Desmond Tutu 36:11 - Mentors 38:52 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

Cyber Crime Junkies
Spies, Lies & Cybercrime--Treason from Inside The FBI

Cyber Crime Junkies

Play Episode Listen Later Nov 16, 2025 42:56 Transcription Available


A young undercover FBI operative risks everything to expose America's most devastating traitor — revealing how Cold-War spycraft evolved into today's cybercrime economy.The shocking true story of Robert Hanssen — the FBI mole who sold America's deepest secrets to Russia for over 20 years, leading to the execution of multiple double agents and triggering the worst intelligence breach in U.S. history.

Putting the AP in hAPpy
Episode 364: Question From A Vendor Process Team Member > What Are the Best Ways To Verify Email Addresses?

Putting the AP in hAPpy

Play Episode Listen Later Nov 13, 2025 27:17


As Accounts Payable or Vendor team members we know that fraud risk is high in email.  Is there a way that you can tell which email addresses are risky? And is that sufficient to manage fraud risk?Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    AVM Framework:  3 Step Vendor Setup and Maintenance Process Workshop https://training.debrarrichardson.com/course/vendoronboardingworkshopFree Training:  Plug Up the Gaps in Your Vendor Process https://training.debrarrichardson.com/course/gapsImprove the Confirmation Call:  Vendor Callback Confirmation Toolkit(TM)https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download:  Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

The Underclass Podcast
Already Dead: Al-Qaeda's White House Tour, J6 Pipe Bomber, Mamdani's False Flag, & More

The Underclass Podcast

Play Episode Listen Later Nov 12, 2025 131:59


Time Stamps:2:30 - Happy Veterans Day! -- Al-Qaeda's White House Tour3:47 - Archive.is down following a subpoena from the FBI5:11 - J6 Pipe Bomber Allegedly Identified22:51 - Mamdani's Antisemitic False flag30:36 - (First Caller): J6 Psychosis & the David movie41:17 - Trump's Crucifixion Free Masonic Artwork46:48 - The Kansas City Butcher's Satanic Art collection1:03:18 - Postmortem/Call-in Portion1:19:00 - Adam Fitzgerald joins the show1:48:11 - Lauren Boebert's Halloween Costume1:51:01 - Kanye's public humiliation ritual with corrupt Zionist Kabbalistic Moroccan RabbiVenture into the shadowy realms of power and secrecy with Already Dead, where hosts Jose Galison (@towergangjose) and Austin Picard (@theatrethugawp) dissect the intricate web of conspiracy, covert operations, and the underlying political machinations that might just be pulling the strings of our society.What to Expect: Live Listener Interaction: Call in to share your theories, ask burning questions, or discuss personal experiences related to the topics at hand. In-Depth Explorations: Each episode focuses on a different conspiracy or hidden aspect of political history, offering a platform to question and analyze what's often left unsaid. Thought-Provoking Guests: We invite individuals with insider knowledge or those who've taken the red pill to discuss topics that range from the fringe to the forefront of conspiracy culture. Critical Analysis of Current Affairs: We don't just report on events; we interpret them through the lens of parapolitics, looking for patterns and hidden agendas.Join Us: Every Tuesday at 9:30 PM ET, dive into the depths of the unknown with us. Subscribe, participate in our live call-ins, and be part of a community that seeks to understand the world beyond the surface narrative.Disclaimer: This podcast thrives on speculation, hypothesis, and the examination of alternative theories. It's meant to provoke thought and encourage personal research. Not all discussed is proven fact, but rather a call to question, explore, and understand.Warning: For those not ready to challenge their worldview, tread carefully. Once you enter the world of Already Dead, you might find that the truth is often already dead to the uninitiated. Welcome aboard, where curiosity is your guide.Please consider supporting our work- Austin's Patreon: https://www.patreon.com/c/TheUnderclassPodcastAustin's Spreaker: https://www.spreaker.com/podcast/the-underclass-podcast--6511540Austin's Rumble: https://rumble.com/user/TheUnderclassPodcastAustin's YouTube: https://www.youtube.com/@TheUnderclassPodcast#VeteransDay #AlqaedasWhiteHouseTour #ArchiveDown #FBISubpoena #J6PipeBomber #MamdanisFalseFlag #AntisemitismFalseFlag #J6Psychosis #DavidMovie #SocialEngineering #TrumpCrucifixionArtwork #FreeMasonicArt #DomesticSleeperCells #GazaGenocide #NetanyahusPowerStruggle #October7KnessetAllegations #LaurenBoebertsHalloweenCostume #KanyesHumiliationRitual #VirginiaGovernor #CIASpanbergerBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-underclass-podcast--6511540/support.

Trust Issues
EP 19 - Trust under attack: Spies, lies, and the new face of cybercrime

Trust Issues

Play Episode Listen Later Nov 12, 2025 54:18


Eric O'Neill, former FBI ghost and author of “Spies, Lies & Cybercrime,” joins host David Puner to take a deep dive into the mindset and tactics needed to defend against today's sophisticated cyber threats. Drawing on O'Neill's experience catching spies and investigating cybercriminals, the conversation explains how thinking like an attacker can help organizations and individuals stay ahead. The episode covers actionable frameworks, real-world stories, and practical advice for building cyber resilience in an age of AI-driven scams and industrialized ransomware.

Shift AI Podcast
Protecting the Cloud Against AI Threats with Google Cloud Cyber-security Expert Dr. Andre Alfred

Shift AI Podcast

Play Episode Listen Later Nov 12, 2025 41:22


In this special live episode of the Shift AI Podcast recorded at Seattle AI Week, Dr. Andre Alfred, who leads threat operations and security for Google Cloud's Fortune 500 customers, joins host Boaz Ashkenazy for an eye-opening conversation about the intersection of AI and cybersecurity. With his remarkable journey from high school help desk operator to earning his PhD and leading security operations at Microsoft, Oracle, and Google, Andre brings a unique perspective on protecting critical infrastructure in an era where adversaries have access to the same powerful AI tools as defenders.From data poisoning threats that could compromise healthcare diagnostics to the challenges of securing physical infrastructure like water systems and power grids, Andre shares what keeps him up at night and why two-factor authentication isn't optional anymore. The conversation explores how AI is transforming both offensive and defensive capabilities in cybersecurity, why the next generation of jobs will be defined by leaders rather than technology, and Andre's commitment to visibility as an African American leader in tech. Through his scholarship program at Western Governors University, Andre is opening pathways for the next generation of cybersecurity and healthcare professionals. If you're wondering about the real security threats we're not thinking about—and why the future of work requires "more focus"—this conversation offers crucial insights from someone defending some of the world's most critical systems.Chapters[00:00] Introduction and Boaz's Journey to the Shift AI Podcast [02:37] Andre's Background and Role at Google Cloud Security [03:44] The Non-Traditional Path: From Help Desk to PhD [06:25] The Decision to Return to College and Transform Your Career [08:41] From Capital One to Microsoft to Google [12:03] What It's Like to Wake Up Every Morning in Threat Operations [14:21] The Bittersweet Reality: When Innovation Can Be Weaponized [15:31] Data Poisoning and Healthcare: The Threat We're Not Thinking About [18:37] Teaching Kids to Question What They See Online [20:06] Physical Infrastructure Vulnerabilities and Social Engineering [24:09] The Future of AI and Cybersecurity in 2030 [26:24] Creating Jobs of the Future Through Education [29:41] The Intersection of Cybersecurity and Healthcare [32:29] Leaders Must Define the Next Jobs, Not Let Technology Define Them [33:36] Being Visible as an African American in Tech [36:11] Two Words for the Future: "More Focus"Connect with Dr. Andre Alfred LinkedIn: https://www.linkedin.com/in/aoalfred/Connect with Boaz Ashkenazy LinkedIn: https://linkedin.com/in/boazashkenazy Email: info@shiftai.fmSpecial thank you to Western Governers University for hosting and sponsoring this live episode at the Labor Temple in Seattle WA during AI Week.

Fringe Radio Network
Digital ID is Here: Welcome to the Nightmare! - NWCZ Radio's Down The Rabbit Hole

Fringe Radio Network

Play Episode Listen Later Nov 10, 2025 55:20 Transcription Available


With Mexico and the U.K. being the latest countries to roll out mandatory digital ID's the conspiracy has once again become a reality! Many people who have not heeded the warnings or passed them off as a conspiracy theory are now realizing the warnings were real. Let's look at how we got here, what the future plans are and the end goal of digital ID's. This is just another step in the nightmare to come!Email us at: downtherh@protonmail.com

Cyber Crime Junkies
This New Rule Can DESTROY Your Sales Overnight: CMMC's Wide Reach

Cyber Crime Junkies

Play Episode Listen Later Nov 10, 2025 39:41 Transcription Available


CMMC 2.0 explained in plain English — what it means for small businesses, defense contractors, and vendors across the DoD supply chain. Learn about Level 1 vs Level 2, self-attestation risks, C3PAO shortages, compliance deadlines, and how to stay audit-ready before 2025.Don't miss out on crucial information about the CMMC 2025 deadline. The Cybersecurity Maturity Model Certification is a vital requirement for businesses dealing with the Department of Defense. If you miss the deadline, you risk losing contracts and facing severe penalties. In this video, we'll explore the consequences of missing the CMMC 2025 deadline and provide valuable insights on how to prepare and stay compliant. Stay ahead of the game and ensure your business is CMMC-ready. Find out what happens if you missed the deadline and learn how to avoid costly mistakes. Tune in now and take the first step towards CMMC compliance. CHAPTERS00:00 – The 4 Letters That Can End Your Business00:15 – CMMC 2.0: Why November 10, 2025 Changes Everything01:35 – Meet the Expert: Frontline View from a CMMC Assessor02:59 – What Is CMMC (In Plain English)?04:20 – FCI vs CUI: The Data That Decides Your Level07:05 – Are You Level 1 or Level 2? How the Flow-Down Really Work10:05 – Why the DoD Stopped “Trusting” Small Contractors11:40 – Supply-Chain Breaches: How Third Parties Take You Down13:00 – Level 1: The 17 “Basic” Controls Everyone Ignores17:00 – The Dangerous Game of Fudging Your Self-Attestation21:15 – Level 2: 110 Controls, SSPs, and the Reality of NIST 800-17123:40 – C3PAO Bottleneck: Why Waiting Means Losing Contracts26:30 – POA&M and the 180-Day “Grace” Trap32:05 – Surprise: Printers, MSPs, and “Non-Defense” Vendors in the Blast Radius35:15 – CMMC Is Not Going Away (And Other Hard Truths)37:05 – Countdown to FallSend us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show

Putting the AP in hAPpy
Episode 363: 4 Tasks To Do Now To Get Your Vendor Data Ready For Tax Reporting Season

Putting the AP in hAPpy

Play Episode Listen Later Nov 6, 2025 14:58


It's time to start vendor data tasks that will make tax reporting season easier if you do them now!  What are they? And listen to the end for a bonus task that may reduce your vendor inquiries…..Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    AP Tax Reporting - TY 2025 - Training Pass - From an AP Perspective! 4 Training Sessions to Get You Ready for Reporting Tax Year 2025 https://training.debrarrichardson.com/bundle/ap-tax-reporting-tax-year-2025Get the Vendor Callback Confirmation Toolkit(TM) Today: https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download:  Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

No Password Required
No Password Required Podcast Episode 65 — Steve Orrin

No Password Required

Play Episode Listen Later Nov 4, 2025 44:51


Keywordscybersecurity, technology, AI, IoT, Intel, startups, security culture, talent development, career advice  SummaryIn this episode of No Password Required, host Jack Clabby and Kayleigh Melton engage with Steve Orrin, the federal CTO at Intel, discussing the evolving landscape of cybersecurity, the importance of diverse teams, and the intersection of technology and security. Steve shares insights from his extensive career, including his experiences in the startup scene, the significance of AI and IoT, and the critical blind spots in cybersecurity practices. The conversation also touches on nurturing talent in technology and offers valuable advice for young professionals entering the field.  TakeawaysIoT is now referred to as the Edge in technology.Diverse teams bring unique perspectives and solutions.Experience in cybersecurity is crucial for effective team building.The startup scene in the 90s was vibrant and innovative.Understanding both biology and technology can lead to unique career paths.AI and IoT are integral to modern cybersecurity solutions.Organizations often overlook the importance of security in early project stages.Nurturing talent involves giving them interesting projects and autonomy.Young professionals should understand the hacker mentality to succeed in cybersecurity.Customer feedback is essential for developing effective security solutions.  TitlesThe Edge of Cybersecurity: Insights from Steve OrrinNavigating the Intersection of Technology and Security  Sound bites"IoT is officially called the Edge.""We're making mainframe sexy again.""Surround yourself with people smarter than you."  Chapters00:00 Introduction to Cybersecurity and the Edge01:48 Steve Orrin's Role at Intel04:51 The Evolution of Security Technology09:07 The Startup Scene in the 90s13:00 The Intersection of Biology and Technology15:52 The Importance of AI and IoT20:30 Blind Spots in Cybersecurity25:38 Nurturing Talent in Technology28:57 Advice for Young Cybersecurity Professionals32:10 Lifestyle Polygraph: Fun Questions with Steve

ai technology advice young innovation evolution startups artificial intelligence collaboration networking mentorship cybersecurity biology intel cto organizations compliance intersection required diverse governance machine learning nurturing misinformation iot surround homeland security poker lovecraft autonomy team building passwords internet of things deepfakes federal government community engagement critical thinking hellraiser blind spots body language collectibles phishing emerging technologies cloud computing hackathons jim collins hands on learning scalability encryption defcon call of cthulhu career journey data protection good to great team dynamics social engineering built to last leadership roles world series of poker zero trust summaryin ai ethics pinhead cryptography predictive analytics intelligence community experiential learning firmware veterans administration edge computing department of defense intel corporation learning from failure threat intelligence pattern recognition orrin startup culture bruce schneier creative collaboration human psychology ethical hacking ai security customer focus physical security performance optimization technology leadership applied ai innovation culture fedramp capture the flag behavioral analysis web security kali linux federal programs cybersecurity insights government technology puzzle box pathfinding continuous monitoring nurturing talent reliability engineering failure analysis buffer overflow poker tells quality of service
Tin Foil Hat With Sam Tripoli
#938 Social Engineering by Catastrophism with Mark Windows

Tin Foil Hat With Sam Tripoli

Play Episode Listen Later Nov 1, 2025 110:43


In the latest Tin Foil Hat episode, Sam Tripoli and guest Mark Waters explore the Age of Un-Enlightenment, suggesting modern society is drifting into darkness despite all its progress. They dive into theories linking Britain to the Lost Tribe of Judah and discuss a hidden clash between a Black Magic Temple and a mysterious counter force. It's a wild ride through history, spirituality, and the unseen powers shaping our world.   This episode is lovingly dedicated to the memory of Pollyanna, the most devoted and joyful companion, fondly remembered as Stinkbutt. Check out Sam Tripoli's premium content at SamTripoli.com! Please subscribe to the new Tin Foil Hat youtube channel:  https://www.youtube.com/@TinFoilHatYoutube Check out Sam Tripoli's 4th Crowd Work Special "Deep Dish: Live From Chicago" Oct 4th on Youtube.com/SamTripoliComedy Grab your copy of the 2nd issue of the Chaos Twins now and join the Army Of Chaos: https://bit.ly/415fDfY Check out Sam "DoomScrollin with Sam Tripoli and Midnight Mike" Every Tuesday At 4pm pst on Youtube, X Twitter, Rumble and Rokfin! Join the WolfPack at Wise Wolf Gold and Silver and start hedging your financial position by investing in precious metals now!  Go to samtripoli.gold and use the promo code "TinFoil" and we thank Tony for supporting our show. CopyMyCrypto.com: The 'Copy my Crypto' membership site shows you the coins that the youtuber 'James McMahon' personally holds - and allows you to copy him. So if you'd like to join the 1300 members who copy James, then stop what you're doing and head over to: https://copymycrypto.com/tinfoilhat/ You'll not only find proof of everything I've said - but my listeners get full access for just $1 LiveLongerFormula.com: Check out https://www.livelongerformula.com/sam — Christian is a longevity author and functional health expert who helps you fix your gut, detox, boost testosterone, and sleep better so you can thrive, not just survive. Watch his free masterclass on the 7 Deadly Health Fads, and if it clicks, book a free Metabolic Function Assessment to get to the root of your health issues. Want to see Sam Tripoli live?  Get tickets at SamTripoli.com:  Las Vegas, NV:  Tin Foil Hat Comedy Live At The Virgin Hotel Nov 21st https://www.etix.com/ticket/p/95279813/tin-foil-hat-comedy-with-sam-tripoli-and-eddie-bravo-las-vegas-24-oxford   Minneapolis: Headlining The House Of Comedy Dec 11th-13th https://samtripoli.com/events/?paged=3   Morris Plains, NJ: New Year's Eve At The Dojo Of Comedy Dec 31st https://www.tiffscomedy.com/events/121228   Please Check Out Mark Waters's internet: Website: https://windowsontheworld.net Youtube: https://www.youtube.com/@markwindowsontheworld    Please check out Sam Tripoli's internet: Linktree: https://linktr.ee/samtripoli Please Follow Sam Tripoli's Stand Up Youtube Page: https://www.youtube.com/@SamTripoliComedy Please Follow Sam Tripoli's Comedy Instagram:  https://www.instagram.com/samtripolicomedy/ Please Follow Sam Tripoli's Podcast Clip Instagram: https://www.instagram.com/samtripolispodcastclips/    Huge Thank You To Our Sponsor: Home Chef: Home Chef delivers fresh ingredients and chef-designed recipes, conveniently to your doorstep to simplify your cooking experience.  Users of leading meal kits have rated Home Chef #1 in quality, convenience, value, taste, AND recipe ease. For a limited time, Home Chef is offering my listeners FIFTY PERCENT OFF and free shipping for your first box PLUS free dessert for life! Go to Home Chef dot com slash TINFOIL. Cornbread Hemp: If you're looking for a healthier way to enjoy a carefree moment, you have to give Cornbread Hemp a try! They've created the first-ever USDA Organic THC gummy that's 100% legal. As a special offer for Tin Foil Hat listeners, you can get 30% off your first order! Just visit cornbreadhemp.com/TinFoil and use promo code TinFoil at checkout. Again that's cornbreadhemp.com/TinFoil and use code TinFoil for 30% off your first order. Cheers to a healthier happy hour!  

Defense in Depth
How Do We Measure Our Defenses Against Social Engineering Attacks?

Defense in Depth

Play Episode Listen Later Oct 30, 2025 32:55


All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Mike Johnson, CISO, Rivian. Joining them is their sponsored guest Bobby Ford, chief strategy and experience officer, Doppel. In this episode: Beyond the click High-risk users demand different metrics Building engagement over punishment Creating a security culture through community Huge thanks to our sponsor, Doppel Doppel is protecting the world's digital integrity. Impersonators adapt fast — but so does Doppel. By pairing AI with expert analysis, we don't just detect deception; we dismantle it. Our platform learns from every attack, expands its reach across digital channels, and disrupts threats before they cause harm. The result? Impersonators lose. Businesses become too costly to attack. And trust stays intact. Learn more at https://www.doppel.com/

Putting the AP in hAPpy
Episode 362: 6 Ways The IRS Can Reach Out To You and How To Tell It's Not A Fraudster

Putting the AP in hAPpy

Play Episode Listen Later Oct 30, 2025 25:26


When will the IRS contact you?  How will they contact you? Is it really them?  To hear how and when they will reach out and how you can tell if you are communicating with a fraudster….Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    Free Download:   IRS Authentication Checklist IRS Page:  Search IRS Notices and Letters Get the Vendor Callback Confirmation Toolkit(TM) Today: https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download:  Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Security Now (MP3)
SN 1049: DNS Cache Poisoning Returns - Ransomware Payments Plummet

Security Now (MP3)

Play Episode Listen Later Oct 29, 2025 191:25 Transcription Available


Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security

All TWiT.tv Shows (MP3)
Security Now 1049: DNS Cache Poisoning Returns

All TWiT.tv Shows (MP3)

Play Episode Listen Later Oct 29, 2025 191:25 Transcription Available


Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security

Security Now (Video HD)
SN 1049: DNS Cache Poisoning Returns - Ransomware Payments Plummet

Security Now (Video HD)

Play Episode Listen Later Oct 29, 2025 175:51 Transcription Available


Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security

Security Now (Video HI)
SN 1049: DNS Cache Poisoning Returns - Ransomware Payments Plummet

Security Now (Video HI)

Play Episode Listen Later Oct 29, 2025 175:51 Transcription Available


Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security

Radio Leo (Audio)
Security Now 1049: DNS Cache Poisoning Returns

Radio Leo (Audio)

Play Episode Listen Later Oct 29, 2025 176:22 Transcription Available


Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security

Security Now (Video LO)
SN 1049: DNS Cache Poisoning Returns - Ransomware Payments Plummet

Security Now (Video LO)

Play Episode Listen Later Oct 29, 2025 175:51 Transcription Available


Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security

Identity At The Center
#382 - Sponsor Spotlight - HYPR

Identity At The Center

Play Episode Listen Later Oct 29, 2025 48:22


This episode is sponsored by HYPR. Visit hypr.com/idac to learn more.In this episode from Authenticate 2025, Jim McDonald and Jeff Steadman are joined by Bojan Simic, Co-Founder and CEO of HYPR, for a sponsored discussion on the evolving landscape of identity and security.Bojan shares his journey from software engineer to cybersecurity leader and dives into the core mission of HYPR: providing fast, consistent, and secure identity controls that complement existing investments. The conversation explores the major themes from the conference, including the push for passkey adoption at scale and the challenge of securely authenticating AI agents.A key focus of the discussion is the concept of "Know Your Employee" (KYE) in a continuous manner, a critical strategy for today's remote and hybrid workforces. Bojan explains how the old paradigm of one-time verification is failing, especially in the face of sophisticated, AI-powered social engineering attacks like those used by Scattered Spider. They discuss the issue of "identity sprawl" across multiple IDPs and why consolidation isn't always the answer. Instead, Bojan advocates for a flexible, best-of-breed approach that provides a consistent authentication experience and leverages existing security tools.Connect with Bojan: https://www.linkedin.com/in/bojansimic/Learn more about HYPR: https://www.hypr.com/idacConnect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at idacpodcast.comChapter Timestamps:00:00 - Introduction at Authenticate 202500:23 - Sponsored Episode Welcome: Bojan Simic, CEO of HYPR01:11 - How Bojan Simic Got into Identity and Cybersecurity02:10 - The Elevator Pitch for HYPR04:03 - The Buzz at Authenticate 2025: Passkeys and Securing AI Agents05:29 - The Trend of Continuous "Know Your Employee" (KYE)07:33 - Is Your MFA Program Enough Anymore?09:44 - Hackers Don't Break In, They Log In: The Scattered Spider Threat11:19 - How AI is Scaling Social Engineering Attacks Globally13:08 - When a Breach Happens, Who's on the Hook? IT, Security, or HR?16:23 - What is the Right Solution for Identity Practitioners?17:05 - The Critical Role of Internal Marketing for Technology Adoption22:27 - The Problem with Identity Sprawl and the Fallacy of IDP Consolidation25:47 - When is it Time to Move On From Your Existing Identity Tools?28:16 - The Role of Document-Based Identity Verification in the Enterprise32:31 - What Makes HYPR's Approach Unique?35:33 - How Do You Measure the Success of an Identity Solution?36:39 - HYPR's Philosophy: Never Leave a User Stranded39:00 - Authentication as a Tier Zero, Always-On Capability40:05 - Is Identity Part of Your Disaster Recovery Plan?41:36 - From the Ring to the C-Suite: Bojan's Past as a Competitive Boxer47:03 - How to Learn More About HYPRKeywords:IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Bojan Simic, HYPR, Passkeys, Know Your Employee, KYE, Continuous Identity, Identity Verification, Authenticate 2025, Phishing Resistant, Social Engineering, Scattered Spider, AI Security, Identity Sprawl, Passwordless Authentication, FIDO, MFA, IDP Consolidation, Zero Trust, Cybersecurity, IAM, Identity and Access Management, Enterprise Security

All TWiT.tv Shows (Video LO)
Security Now 1049: DNS Cache Poisoning Returns

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Oct 29, 2025 175:51 Transcription Available


Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security

Fringe Radio Network
A.I., Social Media and Brain Atrophy: Destroying Human Capacity to Think with Rob Smith - Sarah Westall

Fringe Radio Network

Play Episode Listen Later Oct 26, 2025 50:43 Transcription Available


Rob Smith, a Black and gay conservative, shares his unfiltered take on navigating today's polarized political landscape. A combat veteran and marketing expert, Rob discusses how AI is transforming marketing and social media, from smarter campaigns to the risks of deepfakes. We dive into AI's threat to critical thinking, especially how it's eroding kids' ability to reason independently in a world of algorithms and instant answers. Get practical insights on fighting back.Follow Rob Smith on X @ https://x.com/robsmithonline

Fringe Radio Network
The Dark Side of Cults: The Process Church - Truth & Shadow

Fringe Radio Network

Play Episode Listen Later Oct 24, 2025 69:39 Transcription Available


This conversation delves into the enigmatic world of the Process Church of the Final Judgment, exploring its origins, beliefs, and connections to various cults and intelligence operations. The discussion highlights the church's apocalyptic views, its chaotic nature, and its influence on social engineering and control. The conversation also touches on the broader context of ancient alien cargo cults and their shared characteristics with the Process Church. In this conversation, JJ and BT dive into the intricate connections between various cults, particularly the Process Church, and their historical and contemporary implications. He discusses the Luciferian belief system, the criminal activities associated with these organizations, and the influence of the Process Church on modern movements and individuals in the music industry. The conversation also touches on the evolution of the Process Church, its ties to transhumanism, and the ongoing impact of these cults in today's society.

TrustedSec Security Podcast
8.4 - CON Men: Wild West Hackin' Fest + GrrCON

TrustedSec Security Podcast

Play Episode Listen Later Oct 24, 2025 26:23


On this special Friday Edition of Security Noise, Geoff lets Skyler out of the sound booth and sends him to Deadwood, South Dakota to attend (and speak at) Wild West Hackin' Fest! Skyler also interviews TrustedSec's Senior Security Consultant David Boyd on his WWHF talk on Social Engineering and Principal Security Consultant Adam Compton's GrrCON talk titled "An Old Hillbilly's Guide to BASH for Pentests...". Listen in as Skyler takes over the show to talk with the "CON Men of TrustedSec!" About this podcast: Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Find more cybersecurity resources on our website at https://trustedsec.com/resources.

Putting the AP in hAPpy
Episode 361: Kubikle - Cybercrime's Office Life

Putting the AP in hAPpy

Play Episode Listen Later Oct 23, 2025 12:22


It's almost the end of the 25th annual October Cybersecurity Awareness Month and if you haven't heard of or watched the cybercriminal version of “The Office” it's time! Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team.  Links mentioned in the podcast + other helpful resources:     National Cybersecurity Alliance:   Cybersecurity Awareness Month Kubikle Videos Get the Vendor Callback Confirmation Toolkit(TM) Today: https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download:  Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

The Dallas Morning News
Cross-Examining History: Malcolm Gladwell

The Dallas Morning News

Play Episode Listen Later Oct 21, 2025 67:47


From the archives: Host Talmage Boston interviews Malcolm Gladwell, author of seven New York Times bestsellers, about his book Revenge of the Tipping Point: Overstories, Superspreaders, and the Rise of Social Engineering. (Recorded December 2024 in Dallas.) Learn more about your ad choices. Visit podcastchoices.com/adchoices

The Social-Engineer Podcast
Ep. 325 - Security Awareness Series - A Crystal Ball for Mitigating Threats With Chris and Carter

The Social-Engineer Podcast

Play Episode Listen Later Oct 20, 2025 32:02


Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Carter Zupancich. Chris and Carter explore the evolving landscape of social engineering threats, focusing on the rise of vishing attacks and the role of AI in enhancing these tactics. Their discussion underscores the importance of empowering employees as a human firewall and the need for continuous education and testing to strengthen organizational security. [Oct 20, 2025]   00:00 - Intro 00:31 - Carter Zupancich Intro -          Website: https://carterzupancich.com/ 01:30 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                03:35 - Tools, Tactics and Procedures 05:19 - Tech Advances 08:16 - The Classics 10:01 - The Need for Testing 12:16 - Callback Phishing 17:26 - Setting Expectations 21:56 - Approved Language 23:56 - Verify! 25:16 - Empowerment 26:17 - And Now a Horrible Story 28:47 - Investing In Employees 31:19 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

StarTalk Radio
Deepfakes and the War on Truth with Bogdan Botezatu

StarTalk Radio

Play Episode Listen Later Oct 17, 2025 63:53


Is there anything real left on the internet? Neil deGrasse Tyson and co-hosts Chuck Nice and Gary O'Reilly explore deepfakes, scams, and cybercrime with the Director of Threat Research at Bitdefender, Bogdan Botezatu. ​​Scams are a trillion-dollar industry; keep your loved ones safe with Bitdefender: https://bitdefend.me/90-StarTalkNOTE: StarTalk+ Patrons can listen to this entire episode commercial-free here: https://startalkmedia.com/show/deepfakes-and-the-war-on-truth-with-bogdan-botezatu/Thanks to our Patrons Bubbalotski, Oskar Yazan Mellemsether, Craig A, Andrew, Liagadd, William ROberts, Pratiksha, Corey Williams, Keith, anirao, matthew, Cody T, Janna Ladd, Jen Richardson, Elizaveta Nikitenko, James Quagliariello, LA Stritt, Rocco Ciccolini, Kyle Jones, Jeremy Jones, Micheal Fiebelkorn, Erik the Nerd, Debbie Gloom, Adam Tobias Lofton, Chad Stewart, Christy Bradford, David Jirel, e4e5Nf3, John Rost, cluckaizo, Diane Féve, Conny Vigström, Julian Farr, karl Lebeau, AnnElizabeth, p johnson, Jarvis, Charles Bouril, Kevin Salam, Alex Rzem, Joseph Strolin, Madelaine Bertelsen, noel jimenez, Arham Jain, Tim Manzer, Alex, Ray Weikal, Kevin O'Reilly, Mila Love, Mert Durak, Scrubbing Bubblez, Lili Rose, Ram Zaidenvorm, Sammy Aleksov, Carter Lampe, Tom Andrusyna, Raghvendra Singh Bais, ramenbrownie, cap kay, B Rhodes, Chrissi Vergoglini, Micheal Reilly, Mone, Brendan D., Mung, J Ram, Katie Holliday, Nico R, Riven, lanagoeh, Shashank, Bradley Andrews, Jeff Raimer, Angel velez, Sara, Timothy Criss, Katy Boyer, Jesse Hausner, Blue Cardinal, Benjamin Kedwards, Dave, Wen Wei LOKE, Micheal Sacher, Lucas, Ken Kuipers, Alex Marks, Amanda Morrison, Gary Ritter Jr, Bushmaster, thomas hennigan, Erin Flynn, Chad F, fro drick, Ben Speire, Sanjiv VIJ, Sam B, BriarPatch, and Mario Boutet for supporting us this week. Subscribe to SiriusXM Podcasts+ to listen to new episodes of StarTalk Radio ad-free and a whole week early.Start a free trial now on Apple Podcasts or by visiting siriusxm.com/podcastsplus. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Invest Like the Best with Patrick O'Shaughnessy
Dan Wang - The US vs China In The 21st Century - [Invest Like the Best, EP.444]

Invest Like the Best with Patrick O'Shaughnessy

Play Episode Listen Later Oct 16, 2025 95:07


My guest today is Dan Wang. Dan is a technology analyst and author who spent six years living in China studying its manufacturing ecosystem and tech development, best known for his new book Breakneck. Dan offers the most nuanced framework I've encountered for understanding US-China competition.  We explore a critical asymmetry: it's far harder for the US to rebuild manufacturing capacity than for China to improve scientific research, with profound implications for AI, national security, and investment returns. For investors, Dan explains the "ByteDance problem"—why exceptional Chinese companies trade at massive discounts due to Communist Party unpredictability and geopolitical risks. He argues China is a "high agency" society that executes relentlessly while America deliberates endlessly, yet also reveals the societal cost. We discuss innovation, state capacity, and investing across both superpowers. Please enjoy my conversation with Dan Wang. For the full show notes, transcript, and links to mentioned content, check out the episode page ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠here⁠⁠⁠⁠⁠⁠⁠.⁠⁠⁠⁠⁠⁠⁠⁠ ----- This episode is brought to you by⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Ramp⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠. Ramp's mission is to help companies manage their spend in a way that reduces expenses and frees up time for teams to work on more valuable projects. Go to⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Ramp.com/invest⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ to sign up for free and get a $250 welcome bonus. – This episode is brought to you by⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Ridgeline⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠. Ridgeline has built a complete, real-time, modern operating system for investment managers. It handles trading, portfolio management, compliance, customer reporting, and much more through an all-in-one real-time cloud platform. Head to⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ridgelineapps.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ to learn more about the platform. – This episode is brought to you by⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ AlphaSense⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠. AlphaSense has completely transformed the research process with cutting-edge AI technology and a vast collection of top-tier, reliable business content. Invest Like the Best listeners can get a free trial now at⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Alpha-Sense.com/Invest⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and experience firsthand how AlphaSense and Tegus help you make smarter decisions faster. ----- Editing and post-production work for this episode was provided by The Podcast Consultant (⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://thepodcastconsultant.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠). Show Notes: (00:00:00) Welcome to Invest Like the Best (00:05:55) China's Engineering State and Social Engineering (00:12:15) US-China Competition: Innovation and Manufacturing (00:19:41) The Future of US and China: Technological and Economic Perspectives (00:25:22) Cultural and Work Ethic Comparisons (00:39:09) Investing in China: Opportunities and Risks (00:44:43) Future Equilibrium States Between US and China (00:48:32) China's High Agency and Infrastructure (00:49:58) Lawyerly Tendencies in US Society (00:53:41) Comparing US and Chinese Societal Structures (00:57:59) China's Historical Lessons and Future Prospects (01:10:39) AI and Technological Competition (01:15:30) Vertical Integration in Chinese Companies (01:26:39) The Kindest Thing

Stand Up For The Truth Podcast
Dr. Richard Schmidt: Lawlessness, Victory Laps and Social Engineering

Stand Up For The Truth Podcast

Play Episode Listen Later Oct 14, 2025 56:10


Mary welcomes first time guest to the podcast Pastor/Dr. Richard Schmidt to discuss current events. Richard has been an avid student of the Word of God for over 45 years. After giving his life to Christ during a Chicago revival meeting, he immediately immersed himself into evangelism and the study of Scripture, graduating with both a B.S. and M.A. in Pastoral Theology/Christian Education. Early in his ministry, Rich traveled with Evangelist Joe Boyd and preached in various churches and venues, including Chicago's Pacific Garden Mission. Upon college graduation and ordination, Rich and his wife, Valori, moved to Milwaukee, WI to church plant. After the church plant was successfully merged with another, Rich joined the Milwaukee County Sheriff's Office to support his young family, while simultaneously serving as an Assistant Pastor. He is currently the pastor of Union Grove Baptist Church just south of Milwaukee and an in-demand speaker. Today we chat about the rampant lawlessness in our nation and how we got here politically and prophetically. We also look at the current peace initiative in Israel, and what are we to expect when there's a victory lap going on, but we all know that Israel's enemies haven't truly had a change of heart. We talk about AI, and its troubling encroachment into Europe. China we expect to be a police state, but why are other nations looking so similar? A full hour with a very sharp brother in Christ.   Stand Up For The Truth Videos: https://rumble.com/user/CTRNOnline & https://www.youtube.com/channel/UCgQQSvKiMcglId7oGc5c46A

Stand Up For The Truth Podcast
Dr. Richard Schmidt: Lawlessness, Victory Laps and Social Engineering

Stand Up For The Truth Podcast

Play Episode Listen Later Oct 14, 2025 56:10


Mary welcomes first time guest to the podcast Pastor/Dr. Richard Schmidt to discuss current events. Richard has been an avid student of the Word of God for over 45 years. After giving his life to Christ during a Chicago revival meeting, he immediately immersed himself into evangelism and the study of Scripture, graduating with both a B.S. and M.A. in Pastoral Theology/Christian Education. Early in his ministry, Rich traveled with Evangelist Joe Boyd and preached in various churches and venues, including Chicago's Pacific Garden Mission. Upon college graduation and ordination, Rich and his wife, Valori, moved to Milwaukee, WI to church plant. After the church plant was successfully merged with another, Rich joined the Milwaukee County Sheriff's Office to support his young family, while simultaneously serving as an Assistant Pastor. He is currently the pastor of Union Grove Baptist Church just south of Milwaukee and an in-demand speaker. Today we chat about the rampant lawlessness in our nation and how we got here politically and prophetically. We also look at the current peace initiative in Israel, and what are we to expect when there's a victory lap going on, but we all know that Israel's enemies haven't truly had a change of heart. We talk about AI, and its troubling encroachment into Europe. China we expect to be a police state, but why are other nations looking so similar? A full hour with a very sharp brother in Christ.   Stand Up For The Truth Videos: https://rumble.com/user/CTRNOnline & https://www.youtube.com/channel/UCgQQSvKiMcglId7oGc5c46A

Joey Pinz Discipline Conversations
#752 MSP Summit 2025-Paul Mander: Paul Mander on Fighting Social Engineering: A Proactive Path for MSPs

Joey Pinz Discipline Conversations

Play Episode Listen Later Oct 8, 2025 24:58


a16z
Can the US Beat China's Engineering State?

a16z

Play Episode Listen Later Oct 6, 2025 63:10


From high-speed rail to electric cars to batteries to AI, it's clear that China can operate with incredible speed at massive scale. Can the US still compete?We sat down with Dan Wang, a Research Fellow at the Hoover Institution and the author of “Breakneck: China's Quest to Engineer the Future” to discuss. Timecodes: 0:00  Introduction1:36   Lawyers vs. Engineers: Cultural and Economic Differences4:06  Urban and Rural Life: Comparing Infrastructure7:20  Barriers to Progress: Regulation and Governance11:00  Industrial Policy and Public-Private Partnerships14:20  The Double-Edged Sword of Legal and Engineering Mindsets16:50  Social Engineering and Policy in China23:00  Competition, Intellectual Property, and Business Culture27:10  Manufacturing, Scale, and Global Supply Chains36:00  Lessons from Japan and Korea41:30  Complacency, Quality, and the Future of Competition48:45  Strategic Resources and Industrial Policy54:00  Foreign Policy: Engineering Diplomacy vs. Alliances59:00  Taiwan, Demographics, and the Future of US-China Relations Resources:Follow Dan on X: https://x.com/danwwangRead Dan's blog: https://danwang.co/Buy Breakneck on Amazon: https://www.amazon.com/dp/1324106034/Follow Steven on X: https://x.com/stevesi Stay Updated:Find a16z on XFind a16z on LinkedInListen to the a16z Podcast on SpotifyListen to the a16z Podcast on Apple PodcastsFollow our host: https://twitter.com/eriktorenberg Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.