Podcasts about Social engineering

  • 1,035PODCASTS
  • 2,676EPISODES
  • 52mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Sep 11, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Social engineering

Show all podcasts related to social engineering

Latest podcast episodes about Social engineering

Putting the AP in hAPpy
Episode 355: Before Allowing Non-Vendor Team Members to Make Confirmation Calls, Put These Steps in Place

Putting the AP in hAPpy

Play Episode Listen Later Sep 11, 2025 26:46


Do you have a non-vendor team member performing the confirmation call?  I don't recommend that certain steps are put into place to reduce the potential for both internal and external fraud.  What are they?Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    Get the Vendor Callback Confirmation Toolkit(TM) Today: https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download:  Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

David Bombal
#510: 20–30% Of Attacks Use AI: John Hammond details today's hybrid attacks

David Bombal

Play Episode Listen Later Sep 11, 2025 31:31


To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You'll also get 20% off an annual premium subscription. In this 2025 deep-dive, David Bombal sits down with John Hammond to map the real state of hacking: classic ransomware/infostealers meet AI-assisted malware (including code that leverages LLMs). We unpack the ClickFix and FileFix social-engineering patterns, fake CAPTCHA and “save/upload” flows that trick users into running payloads, and the practical Windows mitigations (policy/registry ideas) you should know. John shares why he estimates 20–30% of attacks now have some AI touch, how social engineering scales, and where defenders can push back. For your career, he argues opportunities are expanding: use CTFs, show your work on GitHub/video, and consider OSCP for signaling. He also introduces Just Hacking Training (JHT), handson hack-alongs, archived CTFs, free upskill challenges, and pay-what-you-want courses with industry all-stars. What you'll learn: • How ClickFix/FileFix actually trick users • Realistic mitigation tactics you can apply • The current role of AI in malware • Career roadmap: CTFs → OSCP → portfolio • Where to get hands-on: JHT resources // John Hammond's SOCIALS // YouTube: / @_johnhammond X: https://x.com/_johnhammond LinkedIn: / johnhammond010 Discord: / discord Instagram: / _johnhammond TikTok: / johnhammond010 GitHub: https://github.com/JohnHammond Humble Bundle: https://www.humblebundle.com/?partner... Just Hacking Training: https://www.justhacking.com/ ClickFix Website: https://clickfix-wiki.github.io/ // YouTube video REFERENCE // Linux got hacked with this AI Image: • Linux got Hacked with this AI image! Hackers trick everyone to run malware (FileFix): • hackers trick everyone to run malware (Fil... OSINT Tools to track you down: • OSINT tools to track you down. You cannot ... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:58 - Intro & Current State of Hacking 03:42 - Brilliant Advert 05:14 - The Wave of AI Attacks 07:43 - Click(Fix) Hack 10:10 - FileFix: The Future Hacks 11:14 - Current Affairs & Social Engineering 15:17 - Raising Awareness 19:18 - Security Research 20:51 - Is There a Future for Younger People in This Industry? 22:54 - What Should I Do to Get There? 24:11 - Recommended Certifications 26:34 - Where Do I Start? 28:26 - About John Hammond's Work 31:12 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

THE Bitcoin Podcast
BITCOIN CORE VS KNOTS, SPAM VS FILTERS, QUANTUM THREATS, & SOCIAL ENGINEERING | Jameson Lopp

THE Bitcoin Podcast

Play Episode Listen Later Sep 9, 2025 93:54


"If we ever get to the point where nobody's arguing about Bitcoin, I would be afraid that that's because nobody cares anymore and Bitcoin is actually dead or dying." In this episode of THE Bitcoin Podcast, Bitcoin technologist Jameson Lopp (Casa co-founder & CSO) joins Walker America to cut through today's Bitcoin noise: filter wars, spam on Bitcoin, standardness vs. consensus, the real risks (social engineering vs wrench attacks), and how to actually secure generational wealth with family multi-sig. We also dive into the quantum computing threat—timelines, soft-fork options, migration game theory, and why coordination (not cryptography alone) will be the hard part. Plus: culture/politics, ossification, and how debates keep Bitcoin antifragile. FOLLOW JAMESON: NOSTR: https://primal.net/lopp X: https://x.com/lopp WEB: https://www.lopp.net/ If you enjoy THE Bitcoin Podcast you can help support the show by doing the following: FOLLOW ME (Walker) on @WalkerAmerica on X | @TitcoinPodcast on X | Nostr Personal (walker) | Nostr Podcast (Titcoin) | Instagram Subscribe to THE Bitcoin Podcast (and leave a review) on Fountain | YouTube | Spotify | Rumble | EVERYWHERE ELSE ***** THE Bitcoin Podcast Partners: > http://bitbox.swiss/walker -- use promo code WALKER for 5% off the Bitcoin-only Bitbox02 hardware wallet. > GET FOLD ($10 in bitcoin): https://use.foldapp.com/r/WALKER

Brain in a Vat
Using AI to Fight Crime | David Boonin (Rebroadcast)

Brain in a Vat

Play Episode Listen Later Sep 7, 2025 74:07


Is racial profiling always wrong, even if used by an AI to decrease crime? Should we use AI to judge criminal cases, recommend sentences for the guilty, or decide parole for prisoners?Chapters:[00:00] Introduction to AI in Crime Fighting[00:12] Thought Experiment: The Looting Scenario[06:32] Predictive Policing and AI[10:13] Debating the Ethics of AI in Law Enforcement[23:26] Affirmative Action and Racial Profiling[37:51] Balancing Crime Reduction and Social Engineering[39:00] AI in Sentencing: Benefits and Challenges[40:08] Algorithmic Transparency and Legal Implications[43:15] The Opaque Jury Argument[47:44] Fairness vs. Accuracy in Legal Decisions[57:25] Philosophical Implications of Opaque Decision-Making

Fringe Radio Network
Strength and Courage Needed to Fight for Free-Speech with BitChute Founder Ray Vahey - Sarah Westall

Fringe Radio Network

Play Episode Listen Later Sep 4, 2025 67:55 Transcription Available


Free speech is under attack in almost every country on the planet. Google, YouTube, and Big Tech are working with powerful figures behind the scenes to limit what you can see, hear, and read—an attempt to steer your thoughts, your spending, and your sovereignty. Tech entrepreneur Ray Vahey, founder of BitChute, joins me to share his journey fighting to keep the internet free for your children and mine.You can support his misstion at https://Bitchute.com

Putting the AP in hAPpy
Episode 354: Tariffs May Affect Your Vendor Validations

Putting the AP in hAPpy

Play Episode Listen Later Sep 4, 2025 29:36


Tariffs are here and many vendor team members may be busier than ever with how they have caused changes in the vendor process.  There may be additional validations involved in four areas…Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:     Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Cyber Crime Junkies
AI Risks EXPOSED--How Hackers Use AI Today

Cyber Crime Junkies

Play Episode Listen Later Sep 4, 2025 65:02 Transcription Available


Don't let your small business fall victim to devastating cyber attacks! Expert     joins us t discuss AI Risks exposed. We explore how hackers use AI to target small businesses. From AI Social engineering to data theft, learn what you need to know to protect your business from cyber threats. Send us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show

Cyber Security Today
Cybersecurity Today: Month In Review Panel for August 2025

Cyber Security Today

Play Episode Listen Later Aug 30, 2025 67:32 Transcription Available


Cybersecurity Today: Navigating AI Advancements and Future Trends In this episode of 'Cybersecurity Today,' host Jim Love and panelists Tammy Harper, Laura Payne, and David Shipley discuss recent developments in cybersecurity, shifting focus to AI's impact on the industry. They explore emerging threats such as AI-generated ransomware and the efficiency of exploiting vulnerabilities using AI. The conversation emphasizes the need for improved policy and regulation, the role of MFA in safeguarding systems, and the implications of youth unemployment due to AI disruption. Predictions for the coming year include the necessity for better legislation, ethical considerations in AI deployment, and the continued importance of maintaining fundamental cybersecurity measures amidst rapid technological advances. 00:00 Introduction and Overview 00:36 Meet the Panelists 02:32 New Cybersecurity Awareness Platform 05:07 Biometric Guidance and Privacy 13:04 AI-Driven Exploits and Security Challenges 22:21 Hack Back Legislation Debate 30:21 MFA Implementation and Insurance Implications 36:30 Understanding the Role of Underwriting in Insurance 36:58 The Importance of Cybersecurity in Insurance 37:43 Scenarios and Broker Consultations 38:57 The Scattered Spiders and Cybersecurity Threats 43:07 Youth Unemployment and Cybersecurity 44:43 The Rise of Social Engineering 47:47 AI and Its Implications 49:28 The Future of AI and Cybersecurity 50:45 Challenges and Solutions in AI Security 51:09 Final Thoughts and Recommendations

American Education FM
EP. 793 – The case of Dr. Joseph Hall; Minneapolis False Flag; Social Engineering and more.

American Education FM

Play Episode Listen Later Aug 29, 2025 111:48


I discuss the hiring practices of the Talawanda School District and their failure to engage in proper background checks and how this led to the hiring of a sexual deviant named Joseph Hall, to be the director of student services.  I also discuss the Minneapolis False Flag and the actors present, the social engineering of the week and other education news.   Book Websites: https://www.moneytreepublishing.com/shop PROMO CODE: “AEFM” for 10% OFF https://armreg.co.uk PROMO CODE: "americaneducationfm" for 15% off all books and products. (I receive no kickbacks). Q posts book: https://drive.proton.me/urls/JJ78RV1QP8#yCO0wENuJQPH

Hacking Humans
Social engineering served sunny-side up.

Hacking Humans

Play Episode Listen Later Aug 28, 2025 48:57


This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up, this time involving a surprising new flock of chickens and a listener note from Belgium. Via Peter Janssen, as he's seen the same fake “employee discount” scams we covered, only this time targeting backpacks and other products. Dave's story is on a new “podcast imposter” scam, where fake invites trick business owners and influencers into giving remote access so attackers can hijack their accounts. Joe's got a story on Workday disclosing a breach after attackers used social engineering to infiltrate a third-party CRM system, and why this matters given Workday's wide use as the front end for so many companies' HR departments. Maria brings two quick hits this week: a fake FedEx text scam making the rounds, and a look at whether covering kids' faces with emojis in photos really protects their privacy — or if it's more illusion than protection. On today's catch of the day, Dave got a text claiming he's been recommended for a high-paying, no-experience-needed YouTube job—classic signs of a scam promising easy money and “free training.” Complete our annual ⁠⁠⁠⁠⁠⁠⁠⁠audience survey⁠⁠⁠⁠⁠⁠⁠⁠ before August 31. Resources and links to stories: ⁠⁠Dumbest Friend Just Bought 20 Chickens Executives Warned About Celebrity Podcast Scams Workday Discloses Data Breach Following CRM-Targeted Social Engineering Attack Will covering your child's face with an emoji actually protect their privacy? ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.

Putting the AP in hAPpy
Episode 353: Low-Cost But High-Impact Vendor Validation Step to Prevent Fraud

Putting the AP in hAPpy

Play Episode Listen Later Aug 28, 2025 15:33


If you're looking for a low-cost vendor validation step to deter fraud – I have one for you in today's episode. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    Article:  How to Vet Suppliers and Avoid Fake Vendor Scams https://www.bitdefender.com/en-gb/blog/hotforsecurity/how-to-vet-suppliers-and-avoid-fake-vendor-scamsCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Conspiracy Theory Or Not?
HyperNormalisation Is Reality Is A Lie?: The Hyper-Normal Matrix

Conspiracy Theory Or Not?

Play Episode Listen Later Aug 24, 2025 166:32 Transcription Available


Prepare to have your perception of reality shattered as we dive deep into Adam Curtis's mind-bending revelation about how power structures have created a fake world. Through classified documents, whistleblower testimonies, and hidden historical connections, we expose how banks, politicians, and tech giants have constructed an artificial reality to maintain control. From the rise of algorithmic manipulation to the manufactured consent of modern media, discover how society has been deliberately pushed into accepting a fabricated version of truth. This explosive episode reveals the hidden architects behind our synthetic reality, the psychological warfare being waged on global consciousness, and how the very fabric of our perceived world has been carefully engineered to keep humanity in a perpetual state of confusion and compliance.

American Education FM
EP. 790 – NATO false flag? More Declass; Tax exemptions, Yonder Pouches and social engineering.

American Education FM

Play Episode Listen Later Aug 22, 2025 64:48


NATO wants to add “security forces in Ukraine.  Why?  For a false flag to then attack Russia?  Time will tell.  Also, more declasses are coming.  I also talk tax exemptions, schools use of Yonder pouches for cell phones, the money that is wasted and how it's larger-scale social engineering.  New Substack article too.   Book Websites: https://www.moneytreepublishing.com/shop PROMO CODE: “AEFM” for 10% OFF https://armreg.co.uk PROMO CODE: "americaneducationfm" for 15% off all books and products. (I receive no kickbacks). Q posts book: https://drive.proton.me/urls/JJ78RV1QP8#yCO0wENuJQPH

Putting the AP in hAPpy
Episode 352: Recurring Vendor Validations: Ensure Post-Onboarding Compliance – In 5 Steps

Putting the AP in hAPpy

Play Episode Listen Later Aug 21, 2025 33:35


Validating vendor information and checking that they are not on any applicable sanction lists is a part of your vendor on-boarding process, but what about after the on-boarding process? Today's episode is a webinar that not only has a five-step process for recurring vendor validations, but lots of five downloads to help you get started.  Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    On-Demand Webinar:  Recurring Vendor Validations: Ensure Post-Onboarding Compliance https://training.debrarrichardson.com/course/september2024Free Download:  Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

What the Hack with Adam Levin
Episode 213: Inside DEF CON's Social Engineering Village

What the Hack with Adam Levin

Play Episode Listen Later Aug 19, 2025 41:34


At DEF CON's Social Engineering Village, contestants have 22 minutes to charm real employees at real companies into revealing real details that could lead to a breach. We step inside the booth to see how persuasion, improv, and psychology fuel both ethical hacking and the rise of cybercrime worldwide. Learn more about your ad choices. Visit megaphone.fm/adchoices

Fringe Radio Network
By Design or Organic? Profound Culture Change Accelerating with Dr. Drew - Sarah Westall

Fringe Radio Network

Play Episode Listen Later Aug 17, 2025 66:39 Transcription Available


Dr Drew, coming-of-age icon for Generation X, joins the program to examine the profound cultural changes shaping our world. We discuss what these shifts mean for our future—and how they're fundamentally impacting young people in ways that cannot be ignored. From the crushing economic conditions facing the younger generation to the unrealistic expectations society places on them, Dr. Drew breaks down the cultural and financial pressures fueling today's mental health crisis. This is a powerful, insightful conversation you won't want to miss.Follow Dr. Drew at https://DrDrew.com

Fringe Radio Network
The Big Fat Red Line: Removing Free Will by Eliminating Options and Knowledge with Glenn and Eric Meder - Sarah Westall

Fringe Radio Network

Play Episode Listen Later Aug 16, 2025 66:24 Transcription Available


Glenn and Eric Meder return for another powerful and eye-opening conversation—this time diving into one of the most fundamental freedoms under attack: your free will. In this episode, we break down how manipulation of the masses—through propaganda, surveillance, engineered scarcity, and social conditioning—is being used to strip you of your options. And when your options are taken away, your free agency disappears. Free will cannot exist without choice.We also explore how modern social constructs, from gender ideology to algorithmic censorship and digital nudging, are being used to reshape the minds of children and adults alike. It's all part of a broader plan to fragment identity, dissolve autonomy, and normalize submission to centralized control. Glenn and Eric—two deeply knowledgeable experts on the weaponization of the surveillance state—lay out how this system was built, how it's being deployed, and what you can do to reclaim your sovereignty. This is not just about technology. It's about you, your children, and the future of human freedom.Sign up for the FREE “Exit the Surveillance State” Webinar:https://event.webinarjam.com/register/306/8yo53fqk

Putting the AP in hAPpy
Episode 351: What To Do When Your Company Wants to Do Business With An Inactive Vendor

Putting the AP in hAPpy

Play Episode Listen Later Aug 14, 2025 31:26


A vendor in your vendor master file is inactive – and for good reason, because the last time your company paid that vendor was four years ago.  Now your company wants to use that vendor again – don't just change the status that can lead to failed payments and bad vendor data.  Why and what should you do instead? `Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team.  Links mentioned in the podcast + other helpful resources:    Training Session:  Build a Substitute W-9 Form to Combine Your Vendor Setup Form and IRS Form W-9 https://training.debrarrichardson.com/course/substitute-irs-w9Training Session:  Build a Substitute W-8BEN and W-8BEN-E FormFree On-Demand Webinar:  8 Steps to Clean Your Vendor Master File https://training.debrarrichardson.com/course/cleanupFree Download:  Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Backup Central's Restore it All
Social Engineering Attacks: Lessons from Mr. Robot Episode 3

Backup Central's Restore it All

Play Episode Listen Later Aug 11, 2025 25:39 Transcription Available


Social engineering attacks are becoming more sophisticated, and this episode of The Backup Wrap-up explores real-world tactics through our Mr. Robot series analysis. Curtis and Prasanna examine how social engineering works, from Instagram stalking to phone compromise, and discuss actual ransomware groups like Scattered Spider who use social engineering to impersonate employees and reset passwords. We break down the hospital hacking scene, revealing how underfunded IT departments create vulnerabilities that social engineering attacks exploit. The episode also covers email security, backup system risks, and the Sony hack parallels shown in the series. Learn how to protect your organization from social engineering by understanding what information to keep private, how to properly fund cybersecurity, and why your backup systems need protection from social engineering tactics.

Putting the AP in hAPpy
Episode 350: 3 Things I Learned From Attending the IRIS Working Group Meeting – And How You Can Attend the Next One

Putting the AP in hAPpy

Play Episode Listen Later Aug 7, 2025 13:57


Did you know that the IRS has working group meetings for the Information Returns Intake System (IRIS)?  To find out three things I learned when I attended, what the IRS says FIRE users should do now and how you can attend the next one..Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:     YouTube Video:  Demo of the IRS e-News Subscriptions IRS: IRIS working group meetings and notes Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

On the Schmooze Podcast: Leadership | Strategic Networking | Relationship Building

I'm pleased to interview one of our Biz Book Pub Hub Partners. Our Hub Partners are experts who support entrepreneurs along their author journey.  Today's guest is a book marketing strategist. If book marketing feels like a never-ending to-do list, you're not alone. She works with nonfiction authors—especially business owners, coaches, and consultants—who want to grow their impact and income through their books without feeling like they've sold their soul to sales. Instead of chasing short-term accolades like bestseller status, she helps authors shift toward strategies that feel good and build long-term results: clarifying their message, deepening reader relationships, and building community around their ideas. Through her Buzzworthy Book Experience and signature BEES Marketing Method, she helps authors create visibility, authority, and income, with strategies that feel authentic, not exhausting. Her approach centers on simplicity and alignment with your values, whether you're launching your first book or reimagining your next move. Please join me in welcoming Judy Baker.  In this episode, we discuss the following:

Paymentandbanking FinTech Podcast
Alles Legal #107: PSD3 & PSR: Haftung, Betrugsprävention und der Streit um die Autorisierung

Paymentandbanking FinTech Podcast

Play Episode Listen Later Aug 5, 2025 25:10


In der neuen Podcastfolge spricht Peter Frey über Haftung, Social Engineering und neue EU-Vorgaben.

The Social-Engineer Podcast
Ep. 315 - The Doctor Is In Series - Love at First Sight, Is it Possible?

The Social-Engineer Podcast

Play Episode Listen Later Aug 4, 2025 33:54


Welcome to the Social-Engineer Podcast: The Doctor Is In Series – where we will discuss understandings and developments in the field of psychology.   In today's episode, Chris and Abbie explore the complexities of attraction and the concept of love at first sight. They discuss the biochemical responses associated with attraction, the importance of understanding cognitive biases, and the role of familiarity in relationships. [Aug 4, 2025]   00:00 - Intro 00:35 - Dr. Abbie Maroño Intro 01:15 - Intro Links -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                 03:14 - The Topic of the Day: Love at First Sight 03:22 - Pulling Apart the Fairy Tale 04:26 - Knowledge is Power 05:49 - Why Can't This Be Love? 07:12 - More Than a Feeling 09:28 - May Impair Your Ability 10:59 - The Rickety Bridge Study 13:20 - Head or Heart? 15:04 - Cognitive Biases 16:16 - The Halo Effect 17:19 - Prototypical Matching 18:51 - I Want You to Want Me 21:54 - Retrospective Bias 23:34 - Feels Like Home 28:44 - Keep One Eye Open 30:32 - A Responsibility to Self-Awareness 32:53 - Wrap Up 33:11 - Next Month: Intuition 33:31 - Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org   Find us online: -          LinkedIn: linkedin.com/in/dr-abbie-maroño-phd -          Instagram: @DoctorAbbieofficial -          LinkedIn: linkedin.com/in/christopherhadnagy     References: Dutton, D. G., & Aron, A. P. (1974). Some evidence for heightened sexual attraction under conditions of high anxiety. Journal of Personality and Social Psychology, 30(4), 510–517. Fisher, H. E., Aron, A., & Brown, L. L. (2006). Romantic love: A mammalian brain system for mate choice. Philosophical Transactions of the Royal Society B: Biological Sciences, 361(1476), 2173–2186. Fletcher, G. J. O., Simpson, J. A., & Thomas, G. (2000). The measurement of perceived relationship quality components: A confirmatory factor analytic approach. Personality and Social Psychology Bulletin, 26(3), 340–354. Hazan, C., & Shaver, P. (1987). Romantic love conceptualized as an attachment process. Journal of Personality and Social Psychology, 52(3), 511–524. Marazziti, D., & Canale, D. (2004). Hormonal changes when falling in love. Psychoneuroendocrinology, 29(7), 931–936.  Nisbett, R. E., & Wilson, T. D. (1977). The halo effect: Evidence for unconscious alteration of judgments. Journal of Personality and Social Psychology, 35(4), 250–256. Sprecher, S., & Metts, S. (1989). Development of the "Romantic Beliefs Scale" and examination of the effects of gender and gender-role orientation. Journal of Social and Personal Relationships, 6(4), 387–411. Sternberg, R. J. (1986). A triangular theory of love. Psychological Review, 93(2), 119–135. Zeki, S. (2007). The neurobiology of love. FEBS Letters, 581(14), 2575–2579. Zsok, F., Haucke, M., De Wit, C., & Barelds, D. P. (2017). What kind of love is love at first sight? An empirical investigation. Personal Relationships, 24(4), 869–885.

Turtlezone Tiny Talks - 20 Minuten Zeitgeist-Debatten mit Gebert und Schwartz
Turtlezone Tiny Talks - Top-Risiko oder vermeidbar?

Turtlezone Tiny Talks - 20 Minuten Zeitgeist-Debatten mit Gebert und Schwartz

Play Episode Listen Later Aug 1, 2025 33:20


Das Hacker-Kollektiv „Scattered Spider“ nutzt es und viele andere Cyberkriminelle auch: „Social Engineering“. Die Angreifer erschleichen das Vertrauen ihrer Opfer und bringen Sie dazu, vertrauliche Informationen preiszugeben. Oft mündet das dann bei Unternehmen in Datendiebstahl großen Umfangs oder in einer Erpressung mit Hilfe gekaperter IT- und Datenstrukturen. Wie alle Kriminellen, nutzen auch solche Hacker gerne die Möglichkeiten der Künstlichen Intelligenz. Nicht um technologisch Schutzmechanismen zu überwinden, sondern vor allem um Identitätsdiebstahl und Phishing-Mail-Kampagnen täuschend echt zu gestalten. Cybercrime-Experten warnen vor den Gefahren von Angriffen auf die Firmen- und Kunden-Daten und das Allianz Risk Barometer benennt Hackerangriffe seit Jahren als das Top-Risiko für Unternehmen. Das mußte kürzlich auch die Konzerntochter Allianz Life, ein namhafter Versicherer in den USA, erleben. Kurz nachdem es bereits den Wettbewerber Aflac getroffen hatte. In beiden Fällen wird „Scattered Spider“ hinter den Angriffen vermutet. In der neuen Episode 184 der Turtlezone Tiny Talks beleuchten Dr. Michael Gebert und Oliver Schwartz die Vorgehensweise der Cyberkriminellen und den Umfang der Bedrohung. Und sie thematisieren, wie Unternehmen sich besser wappnen können. Denn bei „Social Engineering“ stehen vor allem Mitarbeiterinnen und Mitarbeiter im Mittelpunkt. Spannende 33 Podcast-Minuten zum Wochenende.

Putting the AP in hAPpy
Episode 349: Is That Your Co-Worker or Colleague Contacting You On Social Media - Or Is It a Fraudster?

Putting the AP in hAPpy

Play Episode Listen Later Jul 31, 2025 18:28


If a co-worker or colleague contacted you on social media – how do you tell if it's them or not?Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    Free Authentication Training:  3 Step Vendor Setup & Maintenance Process WorkshopBloomberg Article:  ‘I Need to Identify You':  How One Question Saved Ferrari From a Deepfake Scam Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Backup Central's Restore it All
Social Engineering Lessons from Mr. Robot Episode 1

Backup Central's Restore it All

Play Episode Listen Later Jul 28, 2025 44:15 Transcription Available


Learn how social engineering attacks really work by analyzing the cybersecurity lessons from Mr. Robot's pilot episode. Curtis Preston and Prasanna Malaiyandi break down real-world social engineering tactics used by cybercriminals to manipulate victims into revealing sensitive information.This episode covers social engineering phone scams targeting even cybersecurity professionals, the dangers of AI-powered voice cloning in modern attacks, and practical defense strategies. Discover why security questions should never be answered truthfully, how to verify suspicious calls claiming to be from banks or family members, and the importance of "trust but verify" principles.The hosts also examine insider threats in cybersecurity firms, discuss the role of OSINT (Open Source Intelligence) in attacks, and explain honeypot detection systems. Plus, learn about proper backup storage security and why offsite, air-gapped backups remain critical for ransomware protection. Get actionable tips to protect yourself and your organization from increasingly sophisticated social engineering schemes.Disclaimer: The Backup Wrap-up is not affiliated with the Mr. Robot show nor the network on which it airs. But we think you should go watch it!

Cyber Security Today
The Evolution and Defense Against Advanced Phishing Attacks

Cyber Security Today

Play Episode Listen Later Jul 26, 2025 49:32


This is repeat of a broadcast from last October, still relevant, especially in the light of so many current breaches which have begun not with technical weaknesses but with phishing and social engineering.   In this deeper dive episode of 'Cybersecurity Today,' hosts Jim Love and David Shipley, a top cybersecurity expert from Beauceron Security, explore the evolution, intricacies, and impact of phishing attacks. They highlight recent sophisticated phishing strategies that combine AI, complex setups, and psychological manipulation to deceive even the most knowledgeable individuals. The discussion covers various types of phishing including spearphishing, whaling, sharking, QR phishing, and the emotional and psychological tactics employed by attackers. They also delve into practical defense mechanisms such as Multi-Factor Authentication (MFA), passkeys, and the importance of fostering a security-conscious workplace culture. The episode emphasizes the need for a diversified security approach involving technology, training, and emotional intelligence, while encouraging assertiveness in questioning potentially fraudulent communication. 00:00 Introduction to Cybersecurity Today 00:40 The Evolution of Phishing Attacks 01:44 Deep Dive into Phishing Techniques 03:31 History of Phishing 06:04 Types of Phishing: From Email to Whaling 10:06 Advanced Phishing Tactics 19:25 The Psychology Behind Phishing 26:03 Phishing Tactics: Free Gift Card Scams 26:33 The Power of Scarcity in Phishing 28:27 Authority and Phishing: Impersonation Tactics 29:11 Consistency: Small Requests Leading to Big Scams 30:14 Liking and Social Proof in Social Engineering 32:15 The Evolution of Phishing Techniques 35:31 The Role of MFA in Enhancing Security 38:35 Passkeys and the Future of Authentication 44:57 Building a Security-Conscious Workplace Culture 48:47 Conclusion and Final Thoughts

Putting the AP in hAPpy
Episode 348: Converting Vendors From Check to ACH Payment? Five Do's and One Big Don't Before You Start

Putting the AP in hAPpy

Play Episode Listen Later Jul 24, 2025 28:35


Check fraud is increasing, they take longer to settle, and they cost more in supplies and manpower.  All great reasons to convert your check payment vendors to ACH payment.  But don't use that as a way to clean your vendor master file, that task needs to be done first.  Here are five do's and one big don't that you need to think about before you get started.  Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    Digital Product:  Vendor Banking Form Template  On-Demand Webinar:  8 Steps to Clean Your Vendor Master File Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

The Social-Engineer Podcast
Ep. 313 - Security Awareness Series - The Importance of Securing Virtual Events With Trent Waterhouse

The Social-Engineer Podcast

Play Episode Listen Later Jul 21, 2025 27:56


Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Trent Waterhouse. Trent is the CMO of GlobalMeet, a leading virtual event technology company with a scalable, flexible, and secure hybrid event streaming platform built and supported by experienced event experts. Trent has a proven track record of driving growth and innovation with 35 years of expertise leveraging a field sales marketing model that aligns sales, marketing, and R&D to think like a customer, act like a partner, and measure success through customer satisfaction and net promoters. Built for growth, Trent's unique blend of technology understanding and B2B marketing skills have been proven to help companies grow revenue profitably, improve customer experiences, build new partnerships, and expand opportunity pipelines. [July 21, 2025]   00:00 - Intro 00:50 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                02:30 - Trent Waterhouse Intro 03:11 - Starting Out Pre-Video 04:53 - A Brave New World 08:07 - Going Public 10:21 - Rise of the DeepFakes 13:03 - Video Watermarking 15:23 - A Simple Warning Will Do 19:11 - Staying Up to Date 21:22 - Insider Threat 23:42 - Find Trent Waterhouse Online    -          Website: https://www.globalmeet.com/ -          Instagram: https://www.instagram.com/globalmeet/ -          LinkedIn: https://www.linkedin.com/in/trentonwaterhouse/ 24:44 - Book Recommendations -          Pattern Breakers - Mike Maples, Jr, Peter Ziebelman 27:16 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

Cyber Security Today
NPM Linter Packages Hijacked, Microsoft's China Issue, and AI in Phishing Attacks: Cybersecurity Today:

Cyber Security Today

Play Episode Listen Later Jul 21, 2025 17:06 Transcription Available


In this episode of Cybersecurity Today, host David Shipley discusses several pressing cybersecurity issues. First, popular NPM Linter packages were hijacked via phishing to spread malware, affecting millions of downloads.  Concurrently, Ukrainian CERT uncovers new phishing campaigns tied to APT28 using large language models for command and control. Microsoft discontinues the use of China-based engineers for US Department of Defense systems following a controversial report. Lastly, social engineering, facilitated by AI, becomes a greater threat than zero-day exploits. The episode emphasizes the need for stronger maintainer security, multifactor authentication, and a comprehensive understanding of social engineering risks.  00:00 Introduction - 10 Million Downloads 01:30 NPM Linter Packages Hijacked 05:05 Social Engineering and AI in Cybersecurity 08:57 Microsoft's China-Based Engineers Controversy 12:15 The Real Threat: Social Engineering 16:39 Conclusion and Call to Action

Dangerous INFO podcast with Jesse Jaymz
*The Interview* 93 featuring Patrick Wood, Technocracy, Agenda 2030, Sustainable Development, United Nations, war against humanity, social engineering

Dangerous INFO podcast with Jesse Jaymz

Play Episode Listen Later Jul 19, 2025 114:41


Send us a textThis is the interview only portion of our original episode #93 .Patrick Wood is a leading and critical expert on Sustainable Development, Green Economy, Agenda 21, 2030 Agenda and historic Technocracy.He is the author of Technocracy Rising: The Trojan Horse of Global Transformation (2015) and co-author of Trilaterals Over Washington, Volumes I and II (1978-1980) with the late Antony C. Sutton.Wood remains a leading expert on the elitist Trilateral Commission, their policies and achievements in creating their self-proclaimed “New International Economic Order” which is the essence of Sustainable Development on a global scale.An economist by education, a financial analyst and writer by profession and an American Constitutionalist by choice, Wood maintains a Biblical world view and has deep historical insights into the modern attacks on sovereignty, property rights and personal freedom. Such attacks are epitomized by the implementation of U.N. policies such as Agenda 21, Sustainable Development, Smart Growth and in education, the widespread adoption of Common Core State Standards.Wood is a frequent speaker and guest on radio shows around the nation. His current research builds on Trilateral Commission hegemony, focusing on Technocracy, Transhumanism and Scientism, and how these are transforming global economics, politics and religion.Patrick's website https://www.technocracy.news/SUPPORT THE SHOWBuy Me A Coffee http://buymeacoffee.com/DangerousinfopodcastSubscribeStar http://bit.ly/42Y0qM8Super Chat Tip https://bit.ly/42W7iZHBuzzsprout https://bit.ly/3m50hFTPaypal http://bit.ly/3Gv3ZjpPatreon http://bit.ly/3G3 SMART is the acronym that was created by technocrats that have setup the "internet of things" that will eventually enslave humanity to their needs. Support the showCONNECT WITH USWebsite https://www.dangerousinfopodcast.com/Guilded Chatroom http://bit.ly/42OayqyEmail the show dangerousinfopodcast@protonmail.comJoin mailing list http://bit.ly/3Kku5YtSOCIALSInstagram https://www.instagram.com/dangerousinfo/Twitter https://twitter.com/jaymz_jesseGab https://gab.com/JessejaymzTruth Social https://truthsocial.com/@jessejaymzWATCH LIVE YouTube https://www.youtube.com/@DANGEROUSINFOPODCASTRumble https://rumble.com/c/DangerousInfoPodcast Twitch https://www.twitch.tv/dangerousinfopodcastPilled https://pilled.net/profile/144176Facebook https://www.facebook.com/DangerousInfoPodcast/BitChute: https://www.bitchute.com/channel/egnticQyZgxDCloutHub https://clouthub.com/DangerousINFOpodcastDLive https://...

Cloud Accounting Podcast
The Losers of AI & What CPAs Need to Know About OBBBA

Cloud Accounting Podcast

Play Episode Listen Later Jul 17, 2025 75:24


Why is AI failing at basic accounting tasks while claiming to outsmart PhD students? Blake and David dive into the stark reality of AI implementation in accounting, from Ramp's promising new expense management agents to QuickBooks' baffling suggestion to credit and debit the same account. You'll discover the critical security vulnerabilities in AI systems and learn why clients are increasingly using AI to fact-check their accountants' advice. Plus, get a comprehensive breakdown of the top 10 tax planning opportunities in the One Big, Beautiful Bill Act—from permanent 100% bonus depreciation to Trump accounts for children. The hosts also explore which companies will be AI's biggest losers and why the future of accounting lies in financial management, not advisory services.SponsorsOnPay - http://accountingpodcast.promo/onpayCloud Accountant Staffing - http://accountingpodcast.promo/casChapters(00:30) - The Big Beautiful Bill: Tax Provisions Overview (01:53) - AI in Accounting: RAMP's New AI Agents (02:56) - QuickBooks AI Agents: Frustrations and Feedback (06:05) - RAMP's AI Agents: Features and Benefits (14:38) - AI's Impact on Employment: Winners and Losers (20:54) - Grok 4: The Future of AI in Accounting (36:53) - Juno and Tax Prep Automation (37:52) - The Rise of AI in Cyber Attacks (38:26) - Social Engineering and AI (39:18) - Hidden AI Prompts in Academic Papers (41:25) - AI Security Risks and Internal Controls (45:45) - The Accountant's Labor Shortage (46:59) - Tax Planning Opportunities in the New Bill (56:29) - The Impact of the New Tax Bill (01:00:45) - Final Thoughts and Wrap-Up  Show NotesRamp agents: Let finance teams do finance https://ramp.com/blog/ramp-agents-announcementMicrosoft shares $500M in AI savings internally days after cutting 9,000 jobshttps://techcrunch.com/2025/07/09/microsoft-shares-500m-in-ai-savings-internally-days-after-cutting-9000-jobs/Indeed, Glassdoor to lay off 1300 staff amid AI pushhttps://techcrunch.com/2025/07/11/indeed-glassdoor-to-lay-off-1300-staff/Workday Stock Takes A Hit After Piper Sandler Survey Flags AI-Driven Headwinds, But Retail's Optimistic https://stocktwits.com/news-articles/markets/equity/workday-stock-takes-a-hit-after-piper-sandler-survey-flags-ai-driven-headwinds/ch8GfqaR5kYElon Musk's xAI launches Grok 4 alongside a $300 monthly subscription https://techcrunch.com/2025/07/09/elon-musks-xai-launches-grok-4-alongside-a-300-monthly-subscription/Hidden AI prompts in academic papers spark concern about research integrity https://www.japantimes.co.jp/news/2025/07/04/japan/ai-research-prompt-injection/Tax provisions in the One Big Beautiful Bill Act https://www.journalofaccountancy.com/news/2025/jun/tax-changes-in-senate-budget-reconciliation-bill/Need CPE?Get CPE for listening to podcasts with Earmark: https://earmarkcpe.comSubscribe to the Earmark Podcast: https://podcast.earmarkcpe.comGet in TouchThanks for listening and the great reviews! We appreciate you! Follow and tweet @BlakeTOliver and @DavidLeary. Find us on Facebook and Instagram. If you like what you hear, please do us a favor and write a review on Apple Podcasts or Podchaser. Call us and leave a voicemail; maybe we'll play it on the show. DIAL (202) 695-1040.SponsorshipsAre you interested in sponsoring The Accounting Podcast? For details, read the prospectus.Need Accounting Conference Info? Check out our new website - accountingconferences.comLimited edition shirts, stickers, and other necessitiesTeePublic Store: http://cloudacctpod.link/merchSubscribeApple Podcasts: http://cloudacctpod.link/ApplePodcastsYouTube: https://www.youtube.com/@TheAccountingPodcastSpotify: http://cloudacctpod.link/SpotifyPodchaser: http://cloudacctpod.link/podchaserStitcher: http://cloudacctpod.link/StitcherOvercast: http://cloudacctpod.link/OvercastClassifiedsREFRAME 2025 - http://accountingpodcast.promo/reframe2025Want to get the word out about your newsletter, webinar, party, Facebook group, podcast, e-book, job posting, or that fancy Excel macro you just created? Let the listeners of The Accounting Podcast know by running a classified ad. Go here to create your classified ad: https://cloudacctpod.link/RunClassifiedAdTranscriptsThe full transcript for this episode is available by clicking on the Transcript tab at the top of this page

Putting the AP in hAPpy
Episode 347: Access Gone Wrong - 4 Times When Employees Exploited Their Access And Colluded With Fraudsters

Putting the AP in hAPpy

Play Episode Listen Later Jul 17, 2025 21:25


Are you performing security audits, so you know who has access to your systems?  Listen to today's episode to for 4 scenarios when employees or contractors used their system access for fraudulent purposes.  Then see how you can get a 5-step plan to perform a system audit.Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    Webinars: A Security Audit to Protect Vendor Data and Avoid Fraud  Prevent Payments to Internal Fraudsters - Stopping Bad Actors in Your Organization Collusion CasesTD Bank Employee's Bribery Scheme: A $37,000 Fraud That Cost the Bank $72,000  Postal Service says many checks stolen through the mail are done by its own employees  Brazilian police arrest IT worker over $100 million cyber theft Former Banker Arrested for Allegedly Obtaining $2.7 Million in COVID Business-Relief Funds Using Stolen IDs of Disabled Persons Vendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Vendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Cyber Crime Junkies
AI Is Attacking Healthcare—Social Engineering EXPOSED. (Dr Sergio Sanchez)

Cyber Crime Junkies

Play Episode Listen Later Jul 15, 2025 63:10


Dr. Sergio Sanchez—former leader and advisor at Apple, The Vatican, Activision and medical doctor—exposes how cybercriminals are using AI in healthcare and AI Social Engineering to clone voices, fake identities, and empty your savings without a trace. But that's just the beginning…In this mind-blowing episode, we dive into:·       The dark side of AI (you won't believe how easily your identity can be stolen)·       How a medical doctor broke into cybersecurity leadership·       Why the best leaders aren't always the loudest·       Apple's secret to perfect customer experience·       Mental health, tech burnout, and protecting your team in the digital ageThis isn't a sci-fi thriller—it's your new survival guide.

Audio Mises Wire
Social Engineering under the Fourteenth Amendment

Audio Mises Wire

Play Episode Listen Later Jul 12, 2025


Murray Rothbard called egalitarianism a "revolt against nature," and he believed that the egalitarianism inherent in the Fourteenth Amendment was socially harmful. Social engineering never turns out well, but that doesn't discourage progressives from engaging in it.Original article: https://mises.org/mises-wire/social-engineering-under-fourteenth-amendment

Mises Media
Social Engineering under the Fourteenth Amendment

Mises Media

Play Episode Listen Later Jul 12, 2025


Murray Rothbard called egalitarianism a "revolt against nature," and he believed that the egalitarianism inherent in the Fourteenth Amendment was socially harmful. Social engineering never turns out well, but that doesn't discourage progressives from engaging in it.Original article: https://mises.org/mises-wire/social-engineering-under-fourteenth-amendment

CS Joseph Podcast
Social Responsibility and Social Engineering | Cutting Edge | CS Joseph

CS Joseph Podcast

Play Episode Listen Later Jul 11, 2025 44:27


Become Part of our Community or Take our Free Personality Test!: https://linktr.ee/csjosephCS Joseph discusses Social Responsibility and Social Engineering in this previously unreleased Cutting Edge Conference, enjoy!

How to Be Awesome at Your Job
1074: How to Improve Negotiations–without Compromising–with Dr. Joshua N. Weiss

How to Be Awesome at Your Job

Play Episode Listen Later Jul 10, 2025 44:19


Dr. Joshua N. Weiss discusses the major misconceptions surrounding negotiations—and offers five steps to build your confidence and resilience as a negotiator.— YOU'LL LEARN — 1) The big negotiation mistake most people make2) The mental reframe that helps you negotiate better3) The five-step strategy to reviving stalled negotiationsSubscribe or visit AwesomeAtYourJob.com/ep1074 for clickable versions of the links below. — ABOUT JOSH — Dr. Joshua N. Weiss is a renowned negotiation and conflict resolution and leadership expert. As a Senior Fellow at the Harvard Negotiation Project and co-founder of the Global Negotiation Initiative at Harvard University, Dr. Weiss brings unparalleled expertise to his field. He also directs the MS in Leadership and Negotiation program at Bay Path University and runs a private consulting firm, offering tailored negotiation and conflict resolution, and leadership solutions for businesses, organizations, international entities, governments, and individuals. • Book: Getting Back to the Table: 5 Steps to Reviving Stalled Negotiations• Book: The Book of Real-World Negotiations: Successful Strategies From Business, Government, and Daily Life• Study: “Trajectories Toward Peace: Mediator Sequencing Strategies in Intractable Communal Conflicts”• Website: JoshuaNWeiss.com — RESOURCES MENTIONED IN THE SHOW — • Book: Getting to Yes: Negotiating Agreement Without Giving In by William Ury and Robert Fisher• Book: Negotiating the Nonnegotiable: How to Resolve Your Most Emotionally Charged Conflicts by Daniel Shapiro• Book: The Tipping Point: How Little Things Can Make a Big Difference by Malcolm Gladwell • Book: Blink: The Power of Thinking Without Thinking by Malcolm Gladwell • Book: David and Goliath: Underdogs, Misfits, and the Art of Battling Giants by Malcolm Gladwell • Book: Revenge of the Tipping Point: Overstories, Superspreaders, and the Rise of Social Engineering by Malcolm Gladwell— THANK YOU SPONSORS! — • Strawberry.me. Claim your $50 credit and build momentum in your career with Strawberry.me/Awesome• Plaud.ai. Use the code AWESOME and get a discount on your order• Rula. Connect with quality therapists and mental health experts who specialize in you at Rula.com/AwesomeSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Friendship IRL
Social Engineering Your Way Into Friendship, From Picnics to the Six Points of Connection, with Charlotte Massey

Friendship IRL

Play Episode Listen Later Jul 10, 2025 63:24


Have you ever moved somewhere new and felt like you were on the outside looking in?This was Charlotte Massey when she moved to Seattle in the midst of the pandemic, when making friends was borderline impossible. Instead of accepting isolation, she got strategic about it. We're taking friend-dating spreadsheets and sales funnel approaches.Charlotte is the executive director for the Seattle chapter of the U.S. Chamber of Connection, a new civic organization tackling the loneliness epidemic, and founder of the Seattle Picnic Society. In this episode, she offers so much inspiration and great advice for those not feeling connected where they're at.Whether you're new to your city or you've been there for years, the principles are the same. Get specific about your invites. Show up consistently. Don't be afraid to follow up multiple times. Most importantly, if the community you want doesn't exist, create it.In this episode you'll hear about:Charlotte's move in 2021 and the challenges she faced, from the pandemic to the “Seattle freeze”How Charlotte used a sales funnel approach, “friend dating,” and intentional invites to connect new peopleThe Seattle Picnic Society – picnics that grew from five to one hundred attendees, and how you could create something similar in your communityBeing bold and persistent in reaching out to potential friends and looking at how you can improve on the Six Points of Connection Resources & LinksLearn more about the Seattle Picnic Society and the Six Points of Connection on the U.S. Chamber of Connection website.Like what you hear? Visit my website, leave me a voicemail, and follow me on Instagram and TikTok!Want to take this conversation a step further? Send this episode to a friend. Tell them you found it interesting and use what we just talked about as a conversation starter the next time you and your friend hang out!

Putting the AP in hAPpy
Episode 346: A Big IRS Tax Reporting Change Effective For Tax Year 2026 That Can Help Your Team – But Don't Forget About This

Putting the AP in hAPpy

Play Episode Listen Later Jul 10, 2025 14:39


After last week's episode revealing an IRS announcement, once the big, beautiful tax bill was passed there is at least more tax reporting change for Tax Year 2026 that can reduce a huge burden, but there is one more factor to keep in mind.  Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:   Vendor Master File Tip of the Week - IRS 1099-MISC/NEC and 1042-S 2026 Due Dates For TY 2025 Journal of Accountancy - Tax provisions in the One Big Beautiful Bill Act Journal of Accountancy – IRS Staffing, Budget Cuts Threaten 2026 Filing Season, Taxpayer Advocate Says Taxes For Expats – One Big Beautiful Bill – and What it Means for Your Business Vendor Process Training Center > Resource Library for State Research https://training.debrarrichardson.com/resources Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

No Password Required
On No Password Required Podcast Episode 61 — Kathy Collins

No Password Required

Play Episode Listen Later Jul 9, 2025 40:15


keywordscybersecurity, culinary arts, penetration testing, career transition, high-pressure situations, horror films, IT, social engineering, cooking, cybersecurity horror, dark web, pen testing, B-Sides community, cybersecurity, lifestyle polygraph, music, childhood memories, culinary skills, competition takeawaysKathy Collins transitioned from IT to culinary arts and back to cybersecurity.Her journey highlights the transferable skills between cooking and cybersecurity.Physical penetration testing involves unpredictable human elements.High-pressure situations in cooking can prepare one for cybersecurity challenges.Unexpected challenges can arise in both culinary events and cybersecurity tests.The importance of communication in cybersecurity engagements is crucial.Kathy's experience in cooking for large groups parallels the complexities of cybersecurity.The need for proper notification in penetration testing to avoid misunderstandings.Kathy's culinary background influences her approach to problem-solving in cybersecurity.There is a lack of big-budget horror films focused on cybersecurity. Going with the correct skeptical mindset is crucial.Using tools like Flare helps in dark web monitoring.B-Sides events are affordable and beneficial for newcomers.Engaging with the community fosters excitement and learning.Hannibal Lecter would be an interesting pen test partner.The Jaws soundtrack sets a perfect mood for stealth.Bonding over music can strengthen family relationships.Childhood toys can reveal early hacker tendencies.Culinary skills can be approached with a hacker mindset.Competition in cooking shows often emphasizes drama over skill. summaryIn this episode of the No Password Required podcast, host Jack Clabby and co-host Kaylee Melton welcome Kathy Collins, a security consultant at Secure Ideas. Kathy shares her unique journey from working in IT to pursuing a culinary career, and then back to cybersecurity. The conversation explores the transferable skills between cooking and cybersecurity, the unpredictability of physical penetration testing, and the high-pressure situations faced in both fields. Kathy also recounts memorable experiences from her culinary career and discusses the lack of horror films centered around cybersecurity. In this engaging conversation, the speakers delve into various aspects of cybersecurity, including the use of the dark web in penetration testing, the importance of community events like B-Sides, and the fun of the Lifestyle Polygraph segment. They also share personal anecdotes about music, childhood memories, and culinary skills, creating a rich tapestry of insights and experiences in the cybersecurity field. titlesFrom Chef to Cybersecurity: A Unique JourneyThe Culinary Path to CybersecurityHigh Stakes: Cooking and Cybersecurity Under PressurePenetration Testing: The Culinary Connection Sound Bites"I had to do some soul searching.""I was like, what if I have to do...""It's disturbingly easy.""There are so many opportunities there.""Going with the correct skeptical mindset.""We have a tool that we use called Flare.""They should attend them, first of all.""I had an Easy Bake Oven and took it apart." Chapters00:00 Introduction to Cybersecurity and Culinary Journeys02:46 From IT to Culinary Arts: A Unique Transition06:02 The Shift Back to Cybersecurity09:00 Experiences in Physical Penetration Testing11:48 High-Pressure Situations: Cooking vs. Cybersecurity15:02 Unexpected Challenges in Culinary Events17:54 The Intersection of Horror and Cybersecurity23:32 Exploring the Dark Web in Pen Testing25:34 Engaging with the B-Sides Community27:09 The Lifestyle Polygraph: Fun and Games 31:09 Bonding Over Music and Childhood Memories34:17 Culinary Skills and Competition Insights

Title Agents Podcast
It's Not If, It's When: Title Agents vs. Cybercrime

Title Agents Podcast

Play Episode Listen Later Jul 8, 2025 27:10


Wire fraud is no longer a distant threat, it's a daily risk for title professionals across the country. In this special deep-dive edition, Zina and Crosby explore the rise of social engineering in real estate transactions and how fraudsters are exploiting urgency, trust, and technology to steal millions. Backed by 2024 FBI data and real-world case studies, this episode breaks down the new fraud playbook and equips listeners with six actionable strategies to protect their clients, their closings, and their companies.   What you'll learn from this episode How social engineering scams are evolving with AI voice fakes, spoofed emails, and seller impersonation The financial and legal risks of wire fraud Six critical actions every title company should implement today to strengthen its fraud defenses How to use tools like Closinglock, CertifID, and TrueWire to verify identities and prevent fund redirection What to do in the first 72 hours after a suspected attack   Resources mentioned in this episode Internet Crime Complaint Center CISA FinCEN American Land Title Association National Association of REALTORS® Closinglock TrueWire™ Wire Fraud Software CertifID   Connect With UsLove what you're hearing? Don't miss an episode! Follow us on our social media channels and stay connected. Explore more on our website: www.alltechnational.com/podcast Stay updated with our newsletter: www.mochoumil.com Follow Mo on LinkedIn: Mo Choumil Stop waiting on underwriter emails or callbacks—TitleGPT.ai gives you instant, reliable answers to your title questions. Whether it's underwriting, compliance, or tricky closings, the information you need is just a click away. No more delays—work smarter, close faster. Try it now at www.TitleGPT.ai. Closing more deals starts with more appointments. At Alltech National Title, our inside sales team works behind the scenes to fill your pipeline, so you can focus on building relationships and closing business. No more cold calling—just real opportunities. Get started at AlltechNationalTitle.com. Extra hands without extra overhead—that's Safi Virtual. Our trained virtual assistants specialize in the title industry, handling admin work, client communication, and data entry so you can stay focused on closing deals. Scale smarter and work faster at SafiVirtual.com.

Paul's Security Weekly
North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran - SWN #491

Paul's Security Weekly

Play Episode Listen Later Jul 4, 2025 28:50


North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran on this edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-491

Paul's Security Weekly TV
North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran - SWN #491

Paul's Security Weekly TV

Play Episode Listen Later Jul 4, 2025 28:50


North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran on this edition of the Security Weekly News! Show Notes: https://securityweekly.com/swn-491

Putting the AP in hAPpy
Episode 345: What The IRS Just Announced About The FIRE System

Putting the AP in hAPpy

Play Episode Listen Later Jul 3, 2025 7:36


Check out the IRS's announcement about changes to e-filing just before the July 4th holiday! Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:   Vendor Master File Tip of the Week - Demo of the IRS e-News Subscriptions https://youtu.be/Cwy9QDYX-ZM Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

The Social-Engineer Podcast
Ep. 250 - Human Element Series - Rationalize Minimalize and Project with Agent Brad Beeler REPLAY

The Social-Engineer Podcast

Play Episode Listen Later Jun 30, 2025 43:45


REPLAY (Original Air Date March 11, 2024)   Today we are joined by Agent Brad Beeler. Assistant to the Special Agent in Charge Brad Beeler has been with the United States Secret Service for the past 25 years. He currently serves as instructor and Secret Service liaison at the National Center for Credibility Assessment (NCCA) at Fort Jackson, South Carolina. Over the past 8 years in this role, he has trained agents throughout the federal law enforcement and intelligence community in credibility assessment and elicitation techniques.   Prior to arriving at NCCA, he was a polygraph examiner in the Chicago and St. Louis Field Offices and served on the permanent protection detail of former President George HW Bush and numerous foreign heads of state. Over the past 17 years as a federal polygraph examiner Special Agent Beeler has secured hundreds of confessions on high-profile investigations, often leading to the identification of previously unknown victims of serial offenders of both child exploitation and homicide investigations. Agent Beeler holds a master's degree in criminology and was previously selected as the U.S. Secret Service - Special Agent of the Year for his involvement in combating crimes against children.   Widely considered a communications expert in the U.S. federal law enforcement community, Agent Beeler has provided countless domestic and international presentations to law enforcement and intelligence agencies seeking to enhance their interviewing programs. [March 11, 2024]   00:00 - Intro 00:21 - Intro Links -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 03:05 - Agent Brad Beeler Intro 05:05 - Part of a Team 07:58 - One of Lincoln's Final Acts 08:52 - Dual Mission 11:45 - The Broadband Effect 14:38 - Team Effort 17:35 - Worst of the Worst 21:13 - Common Ground 23:36 - Letting Them Be Heard 25:51 - Lyrics, Songs and Dance 28:49 - Mental Health Mandates 35:11 - Mentors -          Mrs. Bertran - Teacher -          Brian Leary - DHS Program Manager 37:21 - Book Recommendations -          The Interrogator - Hanns Scharff -          Spy the Lie - Philip Houston -          Captivate & Cues - Vanessa Van Edwards 39:24 - Find Agent Brad Beeler online -          Website: www.usajobs.gov -          Website: www.secretservice.gov -          LinkedIn: linkedin.com/in/bradbeeler1865/ 40:47 - Guest Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Jun 20, 2025 5:46


How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.sans.edu/diary/How%20Long%20Until%20the%20Phishing%20Starts%3F%20About%20Two%20Weeks/32052 Scammers hijack websites of Bank of America, Netflix, Microsoft, and more to insert fake phone numbers Scammers are placing Google ads that point to legitimate companies sites, but are injecting malicious text into the page advertising fake tech support numbers https://www.malwarebytes.com/blog/news/2025/06/scammers-hijack-websites-of-bank-of-america-netflix-microsoft-and-more-to-insert-fake-phone-number What s in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia Targeted attacks are tricking victims into creating app-specific passwords to Google resources. https://cloud.google.com/blog/topics/threat-intelligence/creative-phishing-academics-critics-of-russia

Something You Should Know
Effective Strategies to Be More Persuasive & Genetics, Evolution and Why We Get Sick

Something You Should Know

Play Episode Listen Later Jun 9, 2025 52:51


The next time you or your kids get a shot at the doctor's office or face anything that you know is going to be painful, there is a little trick you can use that should reduce the pain substantially. Listen as I explain what it is. https://www.newscientist.com/article/dn27514-hold-your-breath-to-dampen-the-pain-of-an-injection/#.VVTKyZO_Heb What is it about persuasive people? They just have that “something” that makes us want to listen, to be around them, and in many cases, do what they ask. Why are some people more persuasive than others? What strategies can we all use to be more influential and persuasive. Here to offer some great insight into the workings of persuasion is Abbie Maroño. She is a scientist and a practitioner in the field of human behavior and is recognized by the US Department of State as being in the top 1% of behavior analysis experts. She has delivered specialized behavioral analysis training to the U.S. Secret Service, FBI, Department of Homeland Security, and local law enforcement agencies. She is author of the book The Upper Hand: Mastering Persuasion and Getting What You Want with the Science of Social Engineering (https://amzn.to/4jwGF59) Did you know that compared to many other species, humans have a high rate of genetic diseases. Wouldn't you think by now that evolution and "survival of the fittest" would've weeded those out? What science has recently discovered, about DNA and genetics is astonishing and is helping us understand how genetics work, how diseases are passed on, how genes can mutate and make us sick, why we have such a high rate of genetic diseases and how we may soon be able to fix or prevent some of it. Joining me to discuss this is Lawrence Hurst. He is a professor of evolutionary genetics at the Milner Centre for Evolution at the University of Bath and author of the book, The Evolution of Imperfection: The Science of Why We Aren't and Can't Be Perfect (https://amzn.to/3ZgOjJS) There are things in your kitchen you need to get rid of. Over time we bring things into the kitchen that we never need, never use that take up a lot of valuable space. Listen as I offer some suggestions on what you can get rid of right now with no regret whatsoever. https://www.delish.com/food/a63527523/6-things-you-should-never-keep-on-your-kitchen-counter-according-to-organizational-experts/ PLEASE SUPPORT OUR SPONSORS!!! MINT MOBILE: Get your summer savings and shop premium wireless plans at ⁠⁠⁠⁠⁠⁠⁠⁠https://MintMobile.com/something⁠⁠⁠⁠⁠⁠⁠⁠ ! FACTOR: Factor meals arrive fresh and ready to eat, perfect for your summer lifestyle! Get 50% off at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://FactorMeals.com/something50off⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ROCKET MONEY: Cancel your unwanted subscriptions and reach your financial goals faster! Go to ⁠⁠⁠⁠⁠https://RocketMoney.com/SOMETHING⁠⁠⁠⁠⁠ QUINCE: Stick to the staples that last, with elevated essentials from Quince! Go to ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://Quince.com/sysk⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ for free shipping on your order and 365 day returns! INDEED: Get a $75 sponsored job credit to get your jobs more visibility at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://Indeed.com/SOMETHING⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ right now! DELL: Introducing the new Dell AI PC . It's not just an AI computer, it's a computer built for AI to help do your busywork for you! Get a new Dell AI PC at⁠ https://Dell.com/ai-pc⁠ Learn more about your ad choices. Visit megaphone.fm/adchoices

a16z
Chris Dixon: Stablecoins, Startups, and the Crypto Stack

a16z

Play Episode Listen Later Jun 9, 2025 29:26


What if crypto isn't just a speculative asset class—but the next foundational layer of the internet?In this episode, Chris Dixon, founding partner of a16z crypto and one of the earliest, most forward-thinking investors in the space, joins TBPN for a wide-ranging conversation on the real, long-term promise of crypto—and why we're still early.He unpacks:Why stablecoins are already functioning as internet-native moneyHow blockchains can serve as global, programmable financial infrastructureWhy programmability, not just low fees, is the real unlockThe evolving regulatory landscape and new bipartisan momentumThe rise of AI agents, decentralized platforms, and real-world crypto use casesThis episode is about long-term thinking, technical optimism, and building open infrastructure for the future of the internet.Resources: Find Chris on X: https://x.com/cdixonWatch TBPN: https://www.tbpn.com/ Timecodes:00:00 Meet Chris Dixon: Crypto Visionary00:26 The Evolution of Stable Coins02:49 The Future of Stable Coins and Global Payments06:04 Lobbying Efforts and Legislative Impact09:01 Adoption Across Different Sectors11:53 Competitive Forces in the Crypto Market14:37 The Crypto Talent Shortage15:05 Opportunities in the Crypto Space17:08 Crypto Fund Performance19:04 Venture Capital in Crypto23:30 Real World Assets on Blockchain26:34 Social Engineering and Proof of Humanity29:10 Conclusion and Final Thoughts Stay Updated: Let us know what you think: https://ratethispodcast.com/a16zFind a16z on Twitter: https://twitter.com/a16zFind a16z on LinkedIn: https://www.linkedin.com/company/a16zSubscribe on your favorite podcast app: https://a16z.simplecast.com/Follow our host: https://x.com/eriktorenbergPlease note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.