POPULARITY
Categories
Send us a textIn this captivating and wide-ranging conversation, Joey Pinz welcomes cybersecurity executive, author, and Brazilian jiu-jitsu enthusiast Caroline Wong. What begins with jiu-jitsu quickly expands into a profound dialogue about humility, body awareness, emotional regulation, and the unexpected personal growth that comes from combat sports—especially as an adult beginner.Caroline opens up about her upcoming book on AI and cybersecurity, explaining how AI isn't just another shift—it's redefining the entire security landscape. She outlines how to evaluate real AI solutions, why transparency matters, and how LLMs make modern social engineering nearly indistinguishable from authentic communication.She also reflects on tech's wobbly job market, why global talent has reshaped the industry, and which cybersecurity markets AI will completely replace in the years ahead. The conversation deepens as Caroline shares her journey through sobriety, the discipline instilled by her Chinese immigrant parents, the challenges of raising resilient kids in a privileged world, and why joy, peace, and positive impact—not titles—define success.
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Rosa Rowles. Together, they explore the nuances of social engineering, focusing on the critical role of pretexting and impersonation in security assessments. Their conversation underscores the significance of preparation and adaptability, highlighting how embodying different personas can enhance the effectiveness of security operations. [Jan 19, 2026] 00:00 - Intro 00:27 - Rosa Rowles Intro - LinkedIn: https://www.linkedin.com/in/shelbydacko/ 00:55 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Offensive Security Vishing Services - https://www.social-engineer.com/offensive-security/vishing/ - Offensive Security SMiShing Services - https://www.social-engineer.com/offensive-security/smishing/ - Offensive Security Phishing Services - https://www.social-engineer.com/offensive-security/smishing/ - Call Back Phishing - https://www.social-engineer.com/offensive-security/call-back-phishing/ - Adversarial Simulation Services - https://www.social-engineer.com/offensive-security/adversarial-simulation/ - Social Engineering Risk Assessments - https://www.social-engineer.com/offensive-security/social-engineering-risk-assessment/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - https://www.clutchmerch.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 02:54 - Long Time Listener... 05:24 - Pretexting and Impersonation 10:06 - Becoming the Part 12:04 - An Actor Prepares 13:54 - Sponsor 15:18 - SE for Yourself 23:25 - Saving FASE 25:46 - Principles in Action 29:34 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
America Out Loud PULSE with Dr. Randall Bock – The turning point came when government announced a suppression strategy tied explicitly to vaccination. Engler called the plan “completely insane” and began examining the assumptions beneath it. What he found, he said, was “a huge amount of faulty assumptions and junk science,” paired with a rising hysteria that crowded out dissent...
In this episode, Corey LeBleu, a veteran penetration tester, shares a raw and intense story from his early days in offensive security. Corey walks through a social engineering engagement that took a sharp turn, from being closely watched by a security guard to receiving the call that changed everything. What followed was a confrontation with authority, handcuffs, and a moment that forced him to confront the legal and emotional consequences of impersonation.Through honest storytelling, Corey reflects on the pressure of physical security testing, the thin line between authorization and trouble, and the lessons he carried forward in his career. This episode serves as a cautionary tale about understanding boundaries, respecting authority, and the unseen risks behind revealing what's hidden.00:00 Introduction to Corey LeBleu and His Journey03:34 Corey's Early Career and Learning Path06:34 The Role of Mentorship in Pen Testing09:19 Experiences in Social Engineering and Physical Pen Testing12:22 The Handcuff Incident: A Lesson in Risk15:12 Transitioning to Web Application Pen Testing18:01 The Evolution of Pen Testing Practices20:48 The Impact of AI on Pen Testing23:42 The Future of Pen Testing and Learning for Beginners26:28 Navigating Active Directory and Pen Testing Tools27:35 Essential Training for Web App Pen Testing30:34 Advice for Aspiring Pen Testers32:30 Exploring AI and Learning Resources37:05 Personal Interests and Hobbies39:17 Living in Austin and Local Music SceneSYMLINKS[LinkedIn] – https://www.linkedin.com/in/coreylebleu/Primary platform Corey recommends for connecting with him professionally.[Relic Security] – https://www.relixsecurity.com/Cybersecurity consulting firm founded and run by Corey LeBleu, focused primarily on web application penetration testing and offensive security work.[PortSwigger Academy] – https://portswigger.net/web-securityA free and advanced online training platform for web application security, created by the makers of Burp Suite. Recommended by Corey as one of the best learning resources for modern web app pentesting.[Burp Suite] – https://portswigger.net/burpA widely used web application security testing tool. Corey emphasizes learning Burp Suite as a core skill for anyone entering web app penetration testing.[OWASP Juice Shop] – https://owasp.org/www-project-juice-shop/An intentionally vulnerable web application created by OWASP for learning and practicing web security testing.[OWASP – Open Web Application Security Project] – https://owasp.orgA global nonprofit organization focused on improving software security. Corey previously ran an OWASP project and references OWASP tools and resources throughout his career.[SANS Institute] – https://www.sans.orgA major cybersecurity training and certification organization, referenced in relation to early penetration testing education and the high cost of formal training.[Hack The Box] – https://www.hackthebox.comAn online platform for practicing penetration testing skills in simulated environments.[PromptFoo] – https://promptfoo.devA tool for testing, evaluating, and securing LLM prompts. Mentioned in the context of prompt injection and AI security experimentation.[PyTorch] – https://pytorch.orgAn open-source machine learning framework widely used for deep learning and AI research. Corey mentions it as part of his learning path for understanding how LLMs work.[Hugging Face] – https://huggingface.coAn AI platform providing open-source models, datasets, and tools for machine learning and LLM experimentation.
America Out Loud PULSE with Dr. Randall Bock – The turning point came when government announced a suppression strategy tied explicitly to vaccination. Engler called the plan “completely insane” and began examining the assumptions beneath it. What he found, he said, was “a huge amount of faulty assumptions and junk science,” paired with a rising hysteria that crowded out dissent...
Crrow777 Children knew what reverence meant – paid the rent – No tips under 12% – Those were the days – Hair was short and skirts were long – Kate Smith sure could sell a song – You tell me just what went wrong – Those were the days Is there a difference between marketing, (more...)
Mentor Sessions Ep. 047: Human Hacking Bitcoin Wallets, Deadly Social Engineering Scams & Nuclear Breaches | Christopher HadnagyWhat if one phone call could drain your Bitcoin wallet like MGM's $190M ransomware nightmare, or social engineering tricks from Jamaican bank heists expose why Bitcoin's human element is your biggest security flaw? In this episode of BTC Sessions, world-renowned human hacking expert Christopher Hadnagy reveals how AI-fueled scams like sextortion are exploding, and targeting Bitcoin holders with FOMO, romance frauds, and voice phishing that bypasses security. He breaks down wild stories of tailgating, breaking into nuclear facilities and owning bank servers with just a clipboard, proving no system is safe from psychological manipulation. Chris warns of dark web guides and shares pro defenses like code words, MFA, and OSINT to hack-proof your sats. From QR phishing to AI accent-erasing vishing, he exposes how hackers spoof LinkedIn for $250K Bitcoin thefts. As founder of Innocent Lives Foundation, Chris flips his skills to hunt predators worldwide, rescuing kids from exploitation rings. If you're self-custodying BTC, this is your must-watch guide to human hacking threats, social engineering secrets, and Bitcoin security mastery—don't let hackers own you!About Christopher HadnagyWebsite: https://www.social-engineer.com/Podcast: https://www.social-engineer.org/podcast/X: @humanhackerInnocent Lives Foundation: https://www.innocentlivesfoundation.org/Chapters:00:00:00 Teaser & Intro00:01:35 Guest Intro & Social Engineering Definition00:02:58 Jamaican Bank Heist00:09:21 Heist Reflections00:10:19 Tactics: OSINT, Pretexts & Influence00:14:51 Bitcoin's Human Flaw00:16:31 Common Pretexts & LinkedIn Scams00:20:57 Scam Losses & Global Impact00:22:55 Motivations: FOMO, Romance & Sextortion00:28:42 AI's Role in Scams00:32:35 Vectors: Phishing, Vishing & MGM00:35:17 Generational Shifts: Smishing/QR00:38:53 Defenses: Verification, Code Words & MFA00:42:19 Breaches & Security Failures00:45:51 Sovereign Computing & Nostr00:47:22 Nuclear Facility Stories00:53:57 Innocent Lives Foundation Origins00:58:06 ILF Mission, Impact & Resources01:02:46 Podcast, Class & ClosingPrevious Episode:Mentor Sessions Ep. 046: Bitcoin 2026 Bull Run, TradFi Myths & Fed Liquidity Secrets | Joe Consorti: https://youtu.be/7p16VXpyEpU⚡ POWERED by Abundant Mines: Fully managed Bitcoin mining. Learn more at https://qrco.de/bgYKPB
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Why modern cybercrime targets trust, urgency, and decision-making instead of systemsDeepfake Attacks, Voice Cloning, and Why AI Social Engineering WorksTraditional fraud used to feel obvious: misspellings, odd links, weird emails. Now? Deepfakes embed perfectly familiar voices and faces into your feed — or your inbox.Listen to Perry Carpenter on this. If you love this topic as much as we do grab Perry's incredible book FAIK available everywhere. Here's a non-affiliated link: https://www.barnesandnoble.com/w/faik-perry-carpenter/1145888787?ean=2940190971293Don't Miss the Deepfake Webinar coming up! You WIll See how you can test out your own deepfake to better understand them. https://info.knowbe4.com/new-deepfake-training-na?partnerref=blogChapters 00:00 Why the Next Breach Won't Look Like the Last One01:44 Welcome to America in 202603:00 Why Deepfakes Are Exploding Right Now05:20 Yes — A Voice Can Be Cloned in Seconds07:30 What Deepfakes Actually Are (No Hype)09:35 Legitimate Uses vs Weaponized Intent12:45 Why Deepfake Companies Stay Quiet17:05 Faces and Voices Are the New Attack Surface18:30 Stop Asking “Is This Real?” Ask This Instead20:55 Why Spotting Artifacts No Longer Works23:45 The One Question That Cuts Through Deepfakes25:50 What Leaders Should Actually Do Today27:45 Old-School Security Still Wins30:05 Why Detection Tools Are Losing the Race33:10 Romance Scams, HR Fraud, and Deepfake Hiring35:45 10 of 15 Job Candidates Were Fake — Here's Why38:40 Fake Workers, Real Access, Real Damage42:20 Deepfakes as Multi-Stage AttackQuestion? Text our Studio direct.Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
Think AI will free you from ‘mundane bookkeeping' so you can do advisory? Blake and David say it's the opposite. Hear how owners already use AI as a de facto CFO, why drafting narratives—not matching bank feeds—is the real win, what the ‘AI premium' means in a billable-hour world, and the two numbers firm owners should track in 2026: monthly recurring revenue and bottom-line profit.SponsorsUNC - http://accountingpodcast.promo/uncOnPay - http://accountingpodcast.promo/onpayTaxBandits - http://accountingpodcast.promo/taxbanditsChapters(01:35) - News Highlights and Sponsor Acknowledgements (03:56) - AI in Small Business Accounting (07:04) - AI's Impact on Accounting Tasks (10:01) - Thought Leader Survey on AI in Accounting (19:56) - AI Premium and Job Automation (25:27) - Survey Answers from Accounting Thought Leaders (25:54) - AI's Role in Strategy and Decision Making (28:24) - Impact of AI on Competitive Landscape (30:50) - AI's Effect on Costs in Accounting Firms (31:54) - AI Replacing Staff Accountants (33:24) - Personal Job Security and AI (41:05) - AI Influencers and Future Experiments (49:24) - Conclusion and CPE Information Show NotesThese Small-Business Owners Are Putting AI to Good Use https://www.wsj.com/tech/ai/small-business-ai-chatgpt-prompts-0c9a95c4 AI Thought Leaders Survey 2026: Process Predictions https://www.accountingtoday.com/list/ai-thought-leaders-survey-2026-process-predictions Tech Spending Outpacing People Spending as Firms Adopt AI https://www.accountingtoday.com/list/tech-spending-outpacing-people-spending-as-firms-adopt-ai How Much is the 'AI Premium?' https://www.accountingtoday.com/list/how-much-is-the-ai-premium AI Can't Replace Accountants. When Could It? https://www.accountingtoday.com/list/ai-cant-replace-accountants-when-could-it Accounting in 2026: The Year Ahead in Numbers https://www.accountingtoday.com/list/accounting-in-2026-the-year-ahead-in-numbers AI Vending Machine Lost $1,000 to Social Engineering https://www.wsj.com/tech/ai/anthropic-ai-claude-vending-machine-c7baef6f Anthropic's Project Vend Phase 2 https://www.anthropic.com/research/project-vend-2 Trump Commutes Sentence of Private Equity CEO Convicted of Fraud https://www.cnn.com/2025/12/01/politics/david-gentile-trump-pardon Trump Commutes 7-Year Prison Sentence of Former Private Equity CEO David Gentile https://www.nbcnews.com/politics/white-house/trump-commutes-7-year-prison-sentence-former-private-equity-ceo-david-rcna246744 California's Controversial Wealth Tax Proposal Leaves Billionaires With Little Way Out https://www.cnbc.com/2026/01/08/california-wealth-tax-proposal-leaves-billionaires-with-little-way-out.html California Could Impose a Billionaire Tax. Here's How It Would Work https://www.cbsnews.com/news/california-billionaire-tax-ballot-initiative-how-it-works/ New Tax on the Wealth of Billionaires https://lao.ca.gov/BallotAnalysis/Initiative/2025-024Need CPE?Get CPE for listening to podcasts with Earmark: https://earmarkcpe.comSubscribe to the Earmark Podcast: https://podcast.earmarkcpe.comGet in TouchThanks for listening and the great reviews! We appreciate you! Follow and tweet @BlakeTOliver and @DavidLeary. Find us on Facebook and Instagram. If you like what you hear, please do us a favor and write a review on Apple Podcasts or Podchaser. Call us and leave a voicemail; maybe we'll play it on the show. DIAL (202) 695-1040.SponsorshipsAre you interested in sponsoring The Accounting Podcast? For details, read the prospectus.Need Accounting Conference Info? Check out our new website - accountingconferences.comLimited edition shirts, stickers, and other necessitiesTeePublic Store: http://cloudacctpod.link/merchSubscribeApple Podcasts: http://cloudacctpod.link/ApplePodcastsYouTube: https://www.youtube.com/@TheAccountingPodcastSpotify: http://cloudacctpod.link/SpotifyPodchaser: http://cloudacctpod.link/podchaserStitcher: http://cloudacctpod.link/StitcherOvercast: http://cloudacctpod.link/OvercastWant to get the word out about your newsletter, webinar, party, Facebook group, podcast, e-book, job posting, or that fancy Excel macro you just created? Let the listeners of The Accounting Podcast know by running a classified ad. Go here to create your classified ad: https://cloudacctpod.link/RunClassifiedAdTranscriptsThe full transcript for this episode is available by clicking on the Transcript tab at the top of this page
My guest is Jason Dinesen, and he and I discuss the IRS draft version of the IRS Form W9 with a revision date of January 2026. We address questions such as will it really be published in January? What you should do before it's published, what you should do after, including why this revision may require action for the vendor team that was not required with recent revisions…. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to reduce the potential for fraudulent payments, compliance fines or bad vendor data. Check out the Vendor Process Training Center for 173+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Jason Dinesen YouTube Channel: Accounting in the Wild Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download: Vendor Validation Reference List with Resource Links Vendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Brian Long is the CEO & Co-Founder at Adaptive Security. In this episode, he joins host Paul John Spaulding and Teresa Zielinski, Vice President and Global CISO at GE Vernova, to discuss social engineering and how it is evolving in light of artificial intelligence advancements. The AI Security Podcast is brought to you by Adaptive Security, the leading provider of AI-powered social engineering prevention solutions, and OpenAI's first and only cybersecurity investment. To learn more about our sponsor, visit https://AdaptiveSecurity.com
On the Schmooze Podcast: Leadership | Strategic Networking | Relationship Building
When you write a book, you're not just sharing your knowledge, you're planting the seeds for long-term growth. Your book can open unexpected doors: attracting ideal clients, boosting your visibility, and positioning you as a trusted authority in your space. But to make that kind of impact, you need more than a finished manuscript—you need a strategy that helps your book connect with the right people and lead them back to your business. That's exactly why I started the Biz Book Pub Hub. It's a free resource where experts, authors, and writers come together to support each other through every stage of the book journey—from blank page to book launch and beyond. You can explore all of it at www.BizBookPubHub.com . Today, I'm excited to introduce two incredible authors: Antonio Valles wrote “Empower Your Presentation Skills: The Confident Entrepreneur's Guide to Grow Your Business,” a hands-on guide for professionals ready to level up their speaking skills and use presentations as a tool for building authority and closing more business. Kathy Sparrow is the author of “Ignite Your Leadership: Proven Tools to Energize Teams, Fuel Momentum, and Accelerate Results,” a book packed with powerful tools and insights to help leaders inspire their teams and create lasting organizational success. Please join me in welcoming Antonio and Kathy. In this episode, we discuss the following:
In this episode, the host shares a pre-recorded favorite interview with David Decary-Hetu, a criminologist at the University of Montreal. They discuss the dark web, its technology, and its role in cybercrime. Decary-Hetu explains how the dark web operates, its users, and the dynamics between researchers and law enforcement in tackling cyber threats. Key topics include the economics of illicit markets, the cat-and-mouse game between law enforcement and criminals, the role of cryptocurrencies, and the evolution of cyber threats. The episode offers insights into the social aspects of cybercrime and the measures being taken to combat it. 00:00 Introduction and Sponsor Message 00:52 Understanding the Dark Web 02:16 Interview with David Decary-Hetu 05:10 The Basics of the Dark Web 06:27 Technology Behind the Dark Web 14:49 Law Enforcement Challenges 21:50 Trust and Transactions on the Dark Web 23:45 Recruitment and Structure of Cybercriminals 26:42 Cultural Dynamics in Hacking Communities 27:32 Researching the Impact of Technology on Crime 29:01 Challenges in Policing the Dark Web 30:12 The Role of Social Engineering in Cybercrime 31:18 Law Enforcement Strategies and Conditional Deterrence 32:09 The Evolution of Cybercrime and Cryptocurrency 41:24 Legal and Ethical Considerations in Cybercrime 43:47 Advice for Policymakers and Corporations 48:44 Educational Resources and Conferences 50:57 Conclusion and Final Thoughts
In this episode, the host shares a pre-recorded favorite interview with David Decary-Hetu, a criminologist at the University of Montreal. They discuss the dark web, its technology, and its role in cybercrime. Decary-Hetu explains how the dark web operates, its users, and the dynamics between researchers and law enforcement in tackling cyber threats. Key topics include the economics of illicit markets, the cat-and-mouse game between law enforcement and criminals, the role of cryptocurrencies, and the evolution of cyber threats. The episode offers insights into the social aspects of cybercrime and the measures being taken to combat it. 00:00 Introduction and Sponsor Message 00:52 Understanding the Dark Web 02:16 Interview with David Decary-Hetu 05:10 The Basics of the Dark Web 06:27 Technology Behind the Dark Web 14:49 Law Enforcement Challenges 21:50 Trust and Transactions on the Dark Web 23:45 Recruitment and Structure of Cybercriminals 26:42 Cultural Dynamics in Hacking Communities 27:32 Researching the Impact of Technology on Crime 29:01 Challenges in Policing the Dark Web 30:12 The Role of Social Engineering in Cybercrime 31:18 Law Enforcement Strategies and Conditional Deterrence 32:09 The Evolution of Cybercrime and Cryptocurrency 41:24 Legal and Ethical Considerations in Cybercrime 43:47 Advice for Policymakers and Corporations 48:44 Educational Resources and Conferences 50:57 Conclusion and Final Thoughts
This week's show is sixth in a series called Democracy Propaganda, and it focuses on the techniques and tactics developed from the work of Sigmund Freud, his nephew, the father of Public Relations Edward Bernays, and Walter Lippmann and proceeding Psychoanalysts and PR Propagandists. It will show how the Wilson administration formed a group called The Committee On Public Information to trick the non-interventionist American public into their sacrifice in a war that had nothing to do with them. This domestic propaganda dept used every means necessary, and hired big business PR men to form various ways to essentially brain wash the minds of the public and so, the war to end all wars, became the war that began eternal war. As Lippman put it, the quest for "World Democracy" began and its all been downhill ever since. We'll also look at numerous authors along the way, and talk about the study of group behaviors, psychological warfare, and the quest to learn how to control the minds of the masses. Join me as we go down the rabbit hole once again, far beyond the mainstream! Cheers and Blessings Support My Work: https://www.patreon.com/theoddmanout Buy Me A Coffee! https://buymeacoffee.com/theoddmanoutVenmo Tips - @theoddmanoutCash App Tips - https://cash.app/$theoddmanout The Odd Man Out Merch Store At Bonfire: https://www.bonfire.com/store/the-odd-man-out/ TeeSpring: https://theoddmanout.creator-spring.com/All Links: https://linktr.ee/_theoddmanoutOddman Rumble: https://rumble.com/user/TheOddManOut
In this encore presentation of Unspoken Security Episode 32 (originally published on 3 April 2025), host AJ Nash sits down with Chris Birch, an intelligence practitioner with nearly 30 years of experience, to discuss the ever-evolving landscape of social engineering. Chris's unique perspective comes from leading teams that actively engage with threat actors, turning the tables on those who typically exploit vulnerabilities.Chris details how social engineering is simply human manipulation, a skill honed from birth. He explains how attackers leverage fear and greed, the fastest and cheapest ways to manipulate individuals. He also dives into how attacks have evolved, highlighting the dangers of increasingly sophisticated tactics like deepfakes and the blurring lines between legal and illegal applications of social engineering.The conversation also explores the crucial role of organizational culture in cybersecurity. Chris emphasizes that awareness, not just education, is key to defense. He advocates for sharing threat intelligence widely within organizations and across industries, empowering everyone to become a sensor against social engineering attempts. Chris also shares a surprising personal fear, offering a lighthearted end to a serious discussion.Send us a textSupport the show
Gina Yacone — Virtual CISO at Trace3 and Roller Derby Penalty Box VisitorLive from B-Sides Jacksonville, No Password Required welcomes Gina Yacone, Virtual CISO at Trace3. Jack Clabby of Carlton Fields, P.A. and Sarina Gandy, host and producer of the CyberBay Podcast, host a conversation on Gina's unconventional career path, leadership under pressure, and the power of community in cybersecurity. With career stops in private investigation, digital forensics, and executive security, Gina brings a people-first, purpose-driven perspective to complex cyber risk.Gina shares how her early work as a private investigator on high-profile criminal defense cases laid the foundation for her success in cybersecurity. She also reflects on raising her hand for big challenges, the rewards and risks of always saying yes, and how authenticity has guided her. She offers insight on why conference hallway conversations can be just as impactful as keynote sessions.A visible advocate for the cybersecurity community, Gina speaks openly about setting healthy mentorship boundaries and building resilient professional networks.The episode wraps with the Lifestyle Polygraph, where Gina lightens the mood with stories from her roller derby days, dream Amazing Race partners, and why John Wick might just be the ultimate executive assistant.Follow Gina on LinkedIn: https://www.linkedin.com/in/ginayacone/ Chapters:00:00 Introduction to Cybersecurity and B-Sides Jacksonville01:16 Gina Yacone's Unique Journey to Cybersecurity06:22 Navigating Burnout in Cybersecurity08:06 The Importance of Raising Your Hand10:04 Adapting Leadership Styles in Different Roles 14:03 Being a Role Model for Women in Cybersecurity16:34 How to Establish a Good Mentee and Mentor Relationship18:50 Feedback and Constructive Criticism22:55 The Value of Hallway Conversations26:19 The Lifestyle Polygraph: Fun and Insights38:54 Conclusion and Future Connections
This week, special guest Dana DooDah of the "Rotting Jewels" podcast and What Is "The Process"? joins us in the trenches on the frontlines of the MindWar. As we draw back the curtain yet again, we're forced to bear witness to the inauthentic, yet affective emotional appeals of these political actors tasked with doing the bidding of special interest groups who inherently obstruct the natural order of society.From PSYOP to MindWar: The Psychology of Victory, to the Influencer Industrial Complex and the TPUSA conspiracy, the age-old playbook and recognizable patters begin to take form. Psychological operations and socially engineered contagion are the sophisticated weapons of war, manipulating emotions and social behavioral patterns to spread the mind virus within any given group, often relying on advanced psychological tactics while perfectly orchestrating social influence to achieve specific outcomes.Please consider supporting our work- Dana's YouTube: https://www.youtube.com/@UCuOZzdUe7DPzqqoelyHn-agDana on X: https://x.com/DanaDooDahDana's Patreon: https://www.patreon.com/rottingjewelsDana's PayPal: https://www.paypal.com/paypalme/rottingxjewelsAustin's Patreon: https://www.patreon.com/c/TheUnderclassPodcastAustin's Spreaker: https://www.spreaker.com/podcast/the-underclass-podcast--6511540Austin's Rumble: https://rumble.com/user/TheUnderclassPodcastAustin's YouTube: https://www.youtube.com/@TheUnderclassPodcast#MindWar #PaulVallely #WomenDefendingAmerica #FeministFascistBrigade #MichaelAquino #InfluencerIndustrialComplex #SocialEngineering #TavistockInstitute #CandaceOwens #CharlieKirk #ErikaKirk #PragerU #TPAC #GeorgeFarmer #LordMichaelFarmer #TPUSASexCrimes #CHILDHELPINC #OperationBabylift #FriendsOfChildrenFoundation #TheDelphiMurdersBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-underclass-podcast--6511540/support.
Cybersecurity Today brings you a special year-end episode, featuring noteworthy guests Tammy Harper from Flare, Laura Payne from White Tuque, David Shipley from Beauceron Security, and John Pinard, co-host of Project Synapse. This episode delves into the pivotal cybersecurity stories of 2025, including a detailed discussion on MFA phishing attacks, the effectiveness of cybersecurity training, and the troubling trends in ransomware payments. Also covered are the evolving roles of AI in both defending and perpetrating cyber crimes. The guests share their insights, hopes, and concerns for the industry's future, emphasizing the importance of awareness, empathy, and community. Tune in as they reflect on the past year's challenges and successes, and look forward to more resilient and innovative cybersecurity practices in 2026. 00:00 Introduction and Sponsor Message 00:20 Meet the Panelists 01:30 Reflecting on the Year: Achievements and Goals 02:08 Naughty and Nice: Cybersecurity Challenges 03:44 The Rise of Fake Torrents and Piracy 07:07 Ransomware and Data Extortion Trends 18:00 The Importance of Multi-Factor Authentication (MFA) 26:15 The Persistent Threat of Email Phishing 27:24 AI Vulnerabilities and Security Concerns 28:18 The Role of AI in Social Engineering 29:07 The Impact of AI on Cybersecurity 31:15 The Future of AI and Security Measures 34:40 The Human Element in Cybersecurity 39:49 Hopes and Predictions for the Future 45:33 Final Thoughts and Reflections
Holidays are the best times for cybercriminals – they know we are busy trying to get out of the office and all they need is the information we typically include in an Out of Office automated email reply. Don't give it to them – use these best practices to not let your absence lead to payment fraud. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Mailguard Article:
Streamed live on Oct 23, 2025 Contact Dr. Natalie Atwell: mentalwarriorconsulting.com She is on IG and FB at Mentalwarriorconsulting MEET HUNTER TYLO! Discord Invite Link: / discord Contact: noelhadley@yahoo.com Support TUC Ministry 2025: https://gofund.me/553bccb2 https://www.gofundme.com/f/support-tu... Patreon: / membership PayPal: paypal.me/noeljoshuahadley Venmo: https://account.venmo.com/u/Noel-Hadley TUC Store: https://store.theunexpectedcosmology.... 2025 TUC Catalogue: https://unexpected-cosmology.nyc3.dig...
In this episode of Security Matters, host David Puner welcomes back David Higgins, senior director in CyberArk's Field Technology Office, for a timely conversation about the evolving cyber threat landscape. Higgins explains why today's attackers aren't breaking in—they're logging in—using stolen credentials, AI-powered social engineering, and deepfakes to bypass traditional defenses and exploit trust.The discussion explores how the rise of AI is eroding critical thinking, making it easier for even seasoned professionals to fall for convincing scams. Higgins and Puner break down the dangers of instant answers, the importance of “never trust, always verify,” and why zero standing privilege is essential for defending against insider threats. They also tackle the risks of shadow AI, the growing challenge of misinformation, and how organizations can build a culture of vigilance without creating a climate of mistrust.Whether you're a security leader, IT professional, or just curious about the future of digital trust, this episode delivers actionable insights on identity security, cyber hygiene, and the basics that matter more than ever in 2026 and beyond.
The same tactics that con artists use to manipulate you can be used to build trust. Dr. Abbie Maroño explains the psychology of ethical social engineering. Full show notes and resources can be found here: jordanharbinger.com/1255What We Discuss with Dr. Abbie Maroño:Manipulation vs. Influence: It's all about intention. The same psychological tactics can be used for good or evil. The difference? Manipulation disregards harm to others and exploits fear, while influence builds mutual benefit and makes people want to collaborate with you. Con artists use manipulation because it's faster — but ethical influence wins every time over the long term.Scammers weaponize your emotions to bypass critical thinking. When emotions are activated, your prefrontal cortex — the brain's logic center — gets overridden. That's why con artists use artificial urgency ("only 24 hours left!") and exclusivity ("just for you"). They only need to appear trustworthy, not actually be it, because you'll act before you can verify.Shame is the silent weapon that keeps victims quiet. The reason so many scam victims never report what happened isn't denial, it's embarrassment. Shame becomes its own prison, preventing people from seeking help or warning others. This silence protects predators and perpetuates cycles of exploitation.Short-term thinking is the con artist's best friend. Manipulators prey on our psychological bias toward immediate rewards. Getting $100 now feels more valuable than $150 later — even when it isn't. This "survival mode" mentality keeps people chasing quick wins rather than building something sustainable.To protect yourself, remember that other people's emotions usually have nothing to do with you. When someone pushes your buttons or creates pressure, pause and recognize it for what it is: a tactic, not a personal attack. Shelving your emotional reaction keeps your critical thinking intact — and that's your best defense against manipulation and your greatest asset in any negotiation.And much more...And if you're still game to support us, please leave a review here — even one sentence helps! Sign up for Six-Minute Networking — our free networking and relationship development mini course — at jordanharbinger.com/course!Subscribe to our once-a-week Wee Bit Wiser newsletter today and start filling your Wednesdays with wisdom!Do you even Reddit, bro? Join us at r/JordanHarbinger!This Episode Is Brought To You By Our Fine Sponsors: Function Health: $100 credit: functionhealth.com/jordan, code JORDAN100LinkedIn: Post your job for free: linkedin.com/jordanProgressive Insurance: Free online quote: progressive.comLand Rover Defender: landroverusa.comHomes.com: Find your home: homes.comSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
If you are getting ready for tax reporting for Tax Year 2025 and need the important things to know or do regarding the 1099-NEC, the 1099-MISC and the 1042-S – this podcast episode is for you! Starting with two that you don't have to worry about (yet) then three that you do. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: IRS Draft Forms: https://www.irs.gov/draft-tax-formsIRS Published Forms: https://www.irs.gov/forms-instructions-and-publications IRS Publication 5903: IRIS App for TCC Tutorial and IRIS Application for TCCIRS Publication 5911: IR App for TCC Tutorial and IR Application for TCCCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
On the Schmooze Podcast: Leadership | Strategic Networking | Relationship Building
I'm pleased to interview one of our Biz Book Pub Hub Partners. Our Hub Partners are experts who support entrepreneurs along their author journey. Today's guest is a powerhouse in the world of thought leadership and publishing—a true connector who helps experts transform their ideas into influential books that make a real difference. She's built an extraordinary career as both an author and strategist, earning six traditional publishing deals, ten thought leader titles, a New York agent, and even a feature on Oprah. She's also a Wall Street Journal bestselling author whose award-winning networking books were licensed by major brands like Motorola and Yale's Graduate School of Business. She founded Networlding Publishing, where she's guided more than 175 thought leaders through every stage of writing and launching their first books. Along the way, she's helped global companies like Cisco, Office Depot, and American Express build powerful leadership networks—and even created a thought leader podcast to amplify her authors' visibility and success. Her passion is helping authors leverage both their books and their relationships to create meaningful impact and lasting influence. Please join me in welcoming Melissa G. Wilson. In this episode, we discuss the following:
Dr. Steve Mancini: https://www.linkedin.com/in/dr-steve-m-b59a525/Marco Ciappelli: https://www.marcociappelli.com/Nothing Has Changed in Cybersecurity Since War Games — And That's Why We're in Trouble"Nothing has changed."That's not what you expect to hear from someone with four decades in cybersecurity. The industry thrives on selling the next revolution, the newest threat, the latest solution. But Dr. Steve Mancini—cybersecurity professor, Homeland Security veteran, and Italy's Honorary Consul in Pittsburgh—wasn't buying any of it. And honestly? Neither was I.He took me back to his Commodore 64 days, writing basic war dialers after watching War Games. The method? Dial numbers, find an open line, try passwords until one works. Translate that to today: run an Nmap scan, find an open port, brute force your way in. The principle is identical. Only the speed has changed.This resonated deeply with how I think about our Hybrid Analog Digital Society. We're so consumed with the digital evolution—the folding screens, the AI assistants, the cloud computing—that we forget the human vulnerabilities underneath remain stubbornly analog. Social engineering worked in the 1930s, it worked when I was a kid in Florence, and it works today in your inbox.Steve shared a story about a family member who received a scam call. The caller asked if their social security number "had a six in it." A one-in-nine guess. Yet that simple psychological trick led to remote software being installed on their computer. Technology gets smarter; human psychology stays the same.What struck me most was his observation about his students—a generation so immersed in technology that they've become numb to breaches. "So what?" has become the default response. The data sells, the breaches happen, you get two years of free credit monitoring, and life goes on. Groundhog Day.But the deeper concern isn't the breaches. It's what this technological immersion is doing to our capacity for critical thinking, for human instinct. Steve pointed out something that should unsettle us: the algorithms feeding content to young minds are designed for addiction, manipulating brain chemistry with endorphin kicks from endless scrolling. We won't know the full effects of a generation raised on smartphones until they're forty, having scrolled through social media for thirty years.I asked what we can do. His answer was simple but profound: humans need to decide how much they want technology in their lives. Parents putting smartphones in six-year-olds' hands might want to reconsider. Schools clinging to the idea that they're "teaching technology" miss the point—students already know the apps better than their professors. What they don't know is how to think without them.He's gone back to paper and pencil tests. Old school. Because when the power goes out—literally or metaphorically—you need a brain that works independently.Ancient cultures, Steve reminded me, built civilizations with nothing but their minds, parchment, and each other. They were, in many ways, a thousand times smarter than us because they had no crutches. Now we call our smartphones "smart" while they make us incrementally dumber.This isn't anti-technology doom-saying. Neither Steve nor I oppose technological progress. The conversation acknowledged AI's genuine benefits in medicine, in solving specific problems. But this relentless push for the "easy button"—the promise that you don't have to think, just click—that's where we lose something essential.The ultimate breach, we concluded, isn't someone stealing your data. It's breaching the mind itself. When we can no longer think, reason, or function without the device in our pocket, the hackers have already won—and they didn't need to write a single line of code.Subscribe to the Redefining Society and Technology podcast. Stay curious. Stay human.My Newsletter? Yes, of course, it is here: https://www.linkedin.com/newsletters/7079849705156870144/ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Cybersecurity Today: The Rise of Living Off the Land Strategies & More In this episode of Cybersecurity Today's Month in Review, host Jim Love is joined by Laura Payne from White Tuque and David Shipley from Beauceron Security. They discuss several pressing cybersecurity issues, including the growing threat of 'living off the land' strategies where attackers use legitimate software to stay undetected, the risks associated with public Wi-Fi and QR codes, and the recent breaches involving Oracle's E-Business Suite and SonicWall's management devices. The panel also reflects on the often conflicting cybersecurity advice circulating today and emphasizes the importance of nuanced communication in security practices. Plus, find out who wins the 'Stinky' award for cybersecurity blunders and what you can do to stay safe. Special thanks to Meter for supporting this podcast. Tune in for a deep dive into these crucial cybersecurity topics and more. 00:00 Introduction and Sponsor Message 00:19 Welcome and Guest Introductions 00:50 Unique Coffee Partnership 02:27 Living Off the Land: Cybersecurity Tactics 04:33 Social Engineering and AI Threats 13:51 The Role of Social Media in Cyber Fraud 20:05 Microsoft's New Teams Feature: A Security Risk? 26:39 Oracle Vulnerability and Enterprise Security 27:26 Patching Core Systems: Challenges and Necessities 28:12 Clop Ransomware: A Persistent Threat 29:09 University Data Breaches: The Case of U Penn 30:18 Security Culture and Leadership Accountability 33:49 Debunking Security Myths: Juice Jacking and QR Codes 39:15 Public WiFi and VPNs: Proceed with Caution 41:18 The Importance of Effective Cybersecurity Communication 48:33 SonicWall Security Concerns and the Stinkies Awards 51:13 Wrapping Up: Reflections and Future Episodes
Cultural intelligence strategist Scott Ketterson joins me for a high-level conversation about the information war reshaping modern society. Drawing on his background in cultural analysis, narrative design, and influence architecture, we explore how power now operates through perception, belief, and meaning. Together, we map out the mechanics of narrative warfare — how institutions, platforms, and state actors engineer stories, shape cultural identity, and compete for cognitive territory in ways the public rarely sees but constantly experiences.We also break down the newly announced AI Genesis Mission — the executive order issued by President Trump to accelerate national AI deployment. Ketterson and I discuss what this move signals, how rapid integration of AI into government and industry will reshape human society and reshape the relationship between humans and machines. This is an advanced, practitioner-level conversation about power, culture, and the technologies now steering both.See part 2 on Substack at https://SarahWestall.Substack.com
As you are busy with year-end and increased volumes of vendor adds and changes – you may be ready to reduce your vendor process activities by outsourcing your vendor payments next year, with a bonus of reducing payment fraud risk. How?Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Time Stamps: 3:27 - D.C. National Guard Shooting15:52 - Venezuela Regime Change & The Somali Conflict34:55 - (First Caller) Influencer Industrial Complex - "All the world's a stage"50:57 - Postmortem/Call-in Portion57:57 - TPUSA Sex Crimes1:06:42 - Haitian Island Sex Slave Conspiracy1:24:50 - The New Poverty Line & the "American Nightmare"1:32:03 - TSA Announces $45 Fee for Passengers with no REAL ID1:32:45 - Indiana Pastor's Son Charged with Child Sex CrimesVenture into the shadowy realms of power and secrecy with Already Dead, where hosts Jose Galison (@towergangjose) and Austin Picard (@theatrethugawp) dissect the intricate web of conspiracy, covert operations, and the underlying political machinations that might just be pulling the strings of our society.What to Expect: Live Listener Interaction: Call in to share your theories, ask burning questions, or discuss personal experiences related to the topics at hand. In-Depth Explorations: Each episode focuses on a different conspiracy or hidden aspect of political history, offering a platform to question and analyze what's often left unsaid. Thought-Provoking Guests: We invite individuals with insider knowledge or those who've taken the red pill to discuss topics that range from the fringe to the forefront of conspiracy culture. Critical Analysis of Current Affairs: We don't just report on events; we interpret them through the lens of parapolitics, looking for patterns and hidden agendas.Join Us: Every Tuesday at 9:30 PM ET, dive into the depths of the unknown with us. Subscribe, participate in our live call-ins, and be part of a community that seeks to understand the world beyond the surface narrative.Disclaimer: This podcast thrives on speculation, hypothesis, and the examination of alternative theories. It's meant to provoke thought and encourage personal research. Not all discussed is proven fact, but rather a call to question, explore, and understand.Warning: For those not ready to challenge their worldview, tread carefully. Once you enter the world of Already Dead, you might find that the truth is often already dead to the uninitiated. Welcome aboard, where curiosity is your guide.Please consider supporting our work-Austin's Patreon: https://www.patreon.com/c/TheUnderclassPodcastAustin's Spreaker: https://www.spreaker.com/podcast/the-underclass-podcast--6511540Austin's Rumble: https://rumble.com/user/TheUnderclassPodcastAustin's YouTube: https://www.youtube.com/@TheUnderclassPodcast#DCNationalGuardShooting #ModernGladio #AfghanPhoenixProgram #VenezuelaRegimeChange #TheSomaliConflict #ImmigrationCrisis #InfluencerIndustrialComplex #InfluenceOperation #SocialEngineering #IdeologicalSubversion #TavistockInstitute #Committeeof300 #ClubofRome #TPUSASexCrimes #HaitianIslandSexSlavePlot #TheAmericanNightmare #TSARealID #IndianaChildSexCrimes #DelphiMurders #PedophileOccupiedGovernmentBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-underclass-podcast--6511540/support.
In this episode, QCon AI New York 2025 Chair Wes Reisz speaks with Reken CEO and Google Trust & Safety founder Shuman Ghosemajumder about the erosion of digital trust. They explore how deepfakes and automated social engineering are scaling cybercrime. Shuman argues defenders must move beyond default trust, utilizing behavioral telemetry and game theory to counter attacks that simulate human behavior. Read a transcript of this interview: https://bit.ly/4p7zX9z Subscribe to the Software Architects' Newsletter for your monthly guide to the essential news and experience from industry peers on emerging patterns and technologies: https://www.infoq.com/software-architects-newsletter Upcoming Events: QCon AI New York 2025 (December 16-17, 2025) https://ai.qconferences.com/ QCon London 2026 (March 16-19, 2026) QCon London equips senior engineers, architects, and technical leaders with trusted, practical insights to lead the change in software development. Get real-world solutions and leadership strategies from senior software practitioners defining current trends and solving today's toughest software challenges. https://qconlondon.com/ QCon AI Boston 2026 (June 1-2, 2026) Learn how real teams are accelerating the entire software lifecycle with AI. https://boston.qcon.ai The InfoQ Podcasts: Weekly inspiration to drive innovation and build great teams from senior software leaders. Listen to all our podcasts and read interview transcripts: - The InfoQ Podcast https://www.infoq.com/podcasts/ - Engineering Culture Podcast by InfoQ https://www.infoq.com/podcasts/#engineering_culture - Generally AI: https://www.infoq.com/generally-ai-podcast/ Follow InfoQ: - Mastodon: https://techhub.social/@infoq - X: https://x.com/InfoQ?from=@ - LinkedIn: https://www.linkedin.com/company/infoq/ - Facebook: https://www.facebook.com/InfoQdotcom# - Instagram: https://www.instagram.com/infoqdotcom/?hl=en - Youtube: https://www.youtube.com/infoq - Bluesky: https://bsky.app/profile/infoq.com Write for InfoQ: Learn and share the changes and innovations in professional software development. - Join a community of experts. - Increase your visibility. - Grow your career. https://www.infoq.com/write-for-infoq
Time Stamps:3:27 - D.C. National Guard Shooting15:52 - Venezuela Regime Change & The Somali Conflict34:55 - (First Caller) Influencer Industrial Complex - "All the world's a stage"50:57 - Postmortem/Call-in Portion57:57 - TPUSA Sex Crimes1:06:42 - Haitian Island Sex Slave Conspiracy1:24:50 - The New Poverty Line & the "American Nightmare"1:32:03 - TSA Announces $45 Fee for Passengers with no REAL ID1:32:45 - Indiana Pastor's Son Charged with Child Sex CrimesVenture into the shadowy realms of power and secrecy with Already Dead, where hosts Jose Galison (@towergangjose) and Austin Picard (@theatrethugawp) dissect the intricate web of conspiracy, covert operations, and the underlying political machinations that might just be pulling the strings of our society.What to Expect:Live Listener Interaction: Call in to share your theories, ask burning questions, or discuss personal experiences related to the topics at hand.In-Depth Explorations: Each episode focuses on a different conspiracy or hidden aspect of political history, offering a platform to question and analyze what's often left unsaid.Thought-Provoking Guests: We invite individuals with insider knowledge or those who've taken the red pill to discuss topics that range from the fringe to the forefront of conspiracy culture.Critical Analysis of Current Affairs: We don't just report on events; we interpret them through the lens of parapolitics, looking for patterns and hidden agendas.Join Us: Every Tuesday at 9:30 PM ET, dive into the depths of the unknown with us. Subscribe, participate in our live call-ins, and be part of a community that seeks to understand the world beyond the surface narrative.Disclaimer: This podcast thrives on speculation, hypothesis, and the examination of alternative theories. It's meant to provoke thought and encourage personal research. Not all discussed is proven fact, but rather a call to question, explore, and understand. Warning: For those not ready to challenge their worldview, tread carefully. Once you enter the world of Already Dead, you might find that the truth is often already dead to the uninitiated. Welcome aboard, where curiosity is your guide.Please consider supporting my work- Patreon- https://www.patreon.com/nowayjose2020Only costs $2/month and will get you access to episodes earlier than the public No Way, Jose! Rumble Channel- https://rumble.com/c/c-3379274 No Way, Jose! YouTube Channel- https://youtube.com/channel/UCzyrpy3eo37eiRTq0cXff0gMy Podcast Host- https://redcircle.com/shows/no-way-joseApple podcasts- https://podcasts.apple.com/us/podcast/no-way-jose/id1546040443Spotify- https://open.spotify.com/show/0xUIH4pZ0tM1UxARxPe6ThStitcher- https://www.stitcher.com/show/no-way-jose-2Amazon Music- https://music.amazon.com/podcasts/41237e28-c365-491c-9a31-2c6ef874d89d/No-Way-JoseGoogle Podcasts- https://www.google.com/podcasts?feed=aHR0cHM6Ly9mZWVkcy5yZWRjaXJjbGUuY29tL2ZkM2JkYTE3LTg2OTEtNDc5Ny05Mzc2LTc1M2ExZTE4NGQ5Yw%3D%3DRadioPublic- https://radiopublic.com/no-way-jose-6p1BAO Vurbl- https://vurbl.com/station/4qHi6pyWP9B/Feel free to contact me at thelibertymovementglobal@gmail.com#DCNationalGuardShooting #ModernGladio #AfghanPhoenixProgram #VenezuelaRegimeChange #TheSomaliConflict #ImmigrationCrisis #InfluencerIndustrialComplex #InfluenceOperation #SocialEngineering #IdeologicalSubversion #TavistockInstitute #Committeeof300 #ClubofRome #TPUSASexCrimes #HaitianIslandSexSlavePlot #TheAmericanNightmare #TSARealID #IndianaChildSexCrimes #DelphiMurders #PedophileOccupiedGovernment
This week, I had the privilege of sitting down yet again with the one and only TopLobsta, and David L Corbo (AKA The Raven) of "Nephilim Death Squad". Enjoy this conversation as we delve into the proverbial deep end of conspiracy and parapolitics dissecting the anatomy of a school shooting through the untold story of the Columbine massacre, following the echoes of this tragedy to a much more plausible alternative conclusion.Through objectively reexamining the details of this case we pry back the curtain yet again, ultimately revealing the all too familiar hidden hand responsible for guiding these chaotic events into place. The facade of virtue drenched in moral corruption reflects the cunning nature of our unending adversary, spotlighting the manipulative tactics of these engineers of outcome.Please consider supporting our work- Austin's Patreon: https://www.patreon.com/c/TheUnderclassPodcastAustin's Spreaker: https://www.spreaker.com/podcast/the-underclass-podcast--6511540Austin's Rumble: https://rumble.com/user/TheUnderclassPodcastAustin's YouTube: https://www.youtube.com/@TheUnderclassPodcast☠️ NEPHILIM DEATH SQUAD Skip the ads. Get early access. Tap into the hive mind of dangerous RTRDs in our private Telegram channel — only on Patreon:
Ian Webster built PromptFoo after watching 200 million Discord users systematically dismantle his AI agent—now Fortune 10 companies pay him to break theirs before customers do. The "lethal trifecta" sounds academic until you realize it's already happening: untrusted input plus sensitive data plus an exfiltration channel equals the security incident that just cost a SaaS company its multi-tenancy guarantees. Webster's red-teaming agents don't use signatures—they have 30,000 conversations with your system, socially engineering their way past guardrails the same way a teenager with emojis convinced ChatGPT to leak data, except his tools find the vulnerability before your users become the pen testers.Follow Ian Webster on X: https://x.com/iwebstFollow Joel on LinkedIn: https://www.linkedin.com/in/3448827723723234/ Check out everything a16z is doing with artificial intelligence here, including articles, projects, and more podcasts. Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
The Intersection of Espionage Techniques and Cybersecurity Threats This episode explores the parallels between espionage and cybersecurity, particularly focusing on social engineering tactics used in both domains. Hosted by Jim Love, the podcast features insights from Neil Bisson, a retired intelligence officer from CSIS, and David Shipley, CEO of Beauceron Security. They discuss the vulnerabilities in human behavior that can be exploited, the similarity between human intelligence operations and phishing attacks, and how AI is transforming the landscape of social engineering. Practical advice on recognizing and mitigating these threats is also provided. The episode underscores the importance of empathy, skepticism, and continuous education in defending against sophisticated cyber threats. 00:00 Introduction and Sponsor Message 00:25 Linking Espionage and Cybersecurity 01:06 The Role of Social Engineering in Cyber Attacks 02:25 Guest Introductions: Neil Bisson and David Shipley 03:24 Recruitment Tactics in Intelligence 05:56 Phishing vs. Intelligence Recruitment 07:48 AI's Role in Modern Social Engineering 10:45 Building Trust and Rapport in Intelligence 16:19 Ethical Considerations in Intelligence Work 20:01 Future of Cybersecurity and Social Engineering 24:31 The Art of Subtle Manipulation 26:01 Clandestine Tactics and Voluntary Information 26:24 Incremental Trust Building 26:46 Psychological Manipulation and Cult Recruitment 27:34 Human Connection and Vulnerability 28:53 AI and Social Engineering 30:25 The Threat of AI in Recruitment 33:20 Emotional Manipulation in Espionage 36:19 Defending Against Manipulation 38:12 Empathy and Information as Defense 45:49 Final Thoughts and Audience Engagement
Episode 592: Whether or not you realize it, powerful globalist forces are using whatever means they can to enslave all of humanity. Using technology that is rapidly developing, they are creating a digital panopticon in which everyone and everything, will be tracked and traced. This is how they are doing it…
In this powerful episode of Scam Rangers, Ayelet Biger-Levin sits down with scam psychology expert Martina Dove to dive deep into the psychology of scams. Martina shares her insights on the psychological tactics used by scammers and the most effective methods for prevention and intervention.The conversation dives deep into the origins of Martina's research, which began with her interest in the Barnum effect , a phenomenon where people accept vague feedback as true when it applies to everyone. Barnum, an 1800s magician, even wrote a book on scams that are still in operation today, like romance scams and lotteries. Martina emphasizes that scams are now a "product that caters for everyone", as vulnerability depends on individual circumstances and personality, not IQ.Key Takeaways: The Scam Lifecycle and Psychology The Scammer's Hook: Scams, which now feature excellent grammar due to AI, prey on either opportunity (like job or romance scams) or fear (like sextortion). Once a victim responds to the initial communication, it's difficult to stop engaging. Grooming: A "Wear-Down" Process: Scams that go on for a long time—like pig butchering—evoke multiple visceral influences, starting with excitement and then inducing anxiety and fear of loss. The scammer will subtly withdraw or use verbal abuse if the victim does not comply. This wear-down period, which can last months, can cause victims to lose executive functions, affecting their memory and decision-making. Targeting Trust: Scammers groom victims to distrust their bank by teaching them that the bank will try to stop them, or by creating elaborate stories, such as a regulator investigating internal fraud. By the time the bank intervenes, the victim is a "worn out person" who truly believes the scammer's narrative. Effective Intervention: Empathy is Key: Authoritarian warnings, like "Don't panic" or "Never click links," are proven not to work, as they trigger a physiological reaction and make people switch off. Instead, interventions—especially from "Break the Spell" teams—need to be conversational and empathetic. Martina suggests asking the victim to simply "stall" the transfer, which often causes the scammer to escalate pressure, providing a warning sign to the victim.You can find more about Martina on LinkedIn: https://www.linkedin.com/in/martina-dove/A link to her book: https://www.routledge.com/The-Psychology-of-Fraud-Persuasion-and-Scam-Techniques-Understanding-What-Makes-Us-Vulnerable/Dove/p/book/9781032953908This podcast is hosted by Ayelet Biger-Levin, who has spent the last 15 years building technology to help financial institutions authenticate their customers and identify fraud. She believes that when it comes to scams, the story starts well before the transaction. Ayelet created this podcast to talk about the human side of scams and to learn from those dedicated to advocating for scam victims and taking action against fraud. Be sure to follow Ayelet on LinkedIn: https://www.linkedin.com/in/ayelet-biger-levin/Learn More: https://www.rangersai.com/
Get ready for busy year end by building a checklist to avoid global payment fraud. Don't forget to download your free checklist template!Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: On-Demand Webinar to Get Checklist: Build Your Checklist to Avoid Global Payment Fraud At Busy Year-End - In 5 StepsCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Michelle Li. Chris and Michelle delve into the transformative role of AI in social engineering, highlighting both its potential and pitfalls. Their conversation emphasizes the critical need for empathy in leadership and the importance of maintaining human-centric processes in an increasingly automated world. [Nov 17, 2025] 00:00 - Intro 00:27 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Offensive Security Vishing Services - https://www.social-engineer.com/offensive-security/vishing/ - Offensive Security SMiShing Services - https://www.social-engineer.com/offensive-security/smishing/ - Offensive Security Phishing Services - https://www.social-engineer.com/offensive-security/smishing/ - Call Back Phishing - https://www.social-engineer.com/offensive-security/call-back-phishing/ - Adversarial Simulation Services - https://www.social-engineer.com/offensive-security/adversarial-simulation/ - Social Engineering Risk Assessments - https://www.social-engineer.com/offensive-security/social-engineering-risk-assessment/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 02:34 - Michelle Li Intro 03:14 - A Roundabout Journey 05:40 - The Importance of Legacy 07:26 - Using AI Honorably 10:00 - The Effects of AI on Social Engineering 11:52 - AI for Protection 13:47 - Still About the Human Role 14:49 - Masterclass Ad 16:27 - Origins of FASE 20:01 - Reflection of Self 25:52 - The Role of Core Principles 30:15 - New Kid in Town 34:08 - Find Michelle Li Online - LinkedIn: https://www.linkedin.com/in/michelle-li-mba-ssbb-0850b975/ - Website: https://www.bisblox.com/ 34:47 - Book Recommendations - Blink - Malcolm Gladwell - The Book of Forgiving - Desmond Tutu 36:11 - Mentors 38:52 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
Time Stamps:2:30 - Happy Veterans Day! -- Al-Qaeda's White House Tour3:47 - Archive.is down following a subpoena from the FBI5:11 - J6 Pipe Bomber Allegedly Identified22:51 - Mamdani's Antisemitic False flag30:36 - (First Caller): J6 Psychosis & the David movie41:17 - Trump's Crucifixion Free Masonic Artwork46:48 - The Kansas City Butcher's Satanic Art collection1:03:18 - Postmortem/Call-in Portion1:19:00 - Adam Fitzgerald joins the show1:48:11 - Lauren Boebert's Halloween Costume1:51:01 - Kanye's public humiliation ritual with corrupt Zionist Kabbalistic Moroccan RabbiVenture into the shadowy realms of power and secrecy with Already Dead, where hosts Jose Galison (@towergangjose) and Austin Picard (@theatrethugawp) dissect the intricate web of conspiracy, covert operations, and the underlying political machinations that might just be pulling the strings of our society.What to Expect: Live Listener Interaction: Call in to share your theories, ask burning questions, or discuss personal experiences related to the topics at hand. In-Depth Explorations: Each episode focuses on a different conspiracy or hidden aspect of political history, offering a platform to question and analyze what's often left unsaid. Thought-Provoking Guests: We invite individuals with insider knowledge or those who've taken the red pill to discuss topics that range from the fringe to the forefront of conspiracy culture. Critical Analysis of Current Affairs: We don't just report on events; we interpret them through the lens of parapolitics, looking for patterns and hidden agendas.Join Us: Every Tuesday at 9:30 PM ET, dive into the depths of the unknown with us. Subscribe, participate in our live call-ins, and be part of a community that seeks to understand the world beyond the surface narrative.Disclaimer: This podcast thrives on speculation, hypothesis, and the examination of alternative theories. It's meant to provoke thought and encourage personal research. Not all discussed is proven fact, but rather a call to question, explore, and understand.Warning: For those not ready to challenge their worldview, tread carefully. Once you enter the world of Already Dead, you might find that the truth is often already dead to the uninitiated. Welcome aboard, where curiosity is your guide.Please consider supporting our work- Austin's Patreon: https://www.patreon.com/c/TheUnderclassPodcastAustin's Spreaker: https://www.spreaker.com/podcast/the-underclass-podcast--6511540Austin's Rumble: https://rumble.com/user/TheUnderclassPodcastAustin's YouTube: https://www.youtube.com/@TheUnderclassPodcast#VeteransDay #AlqaedasWhiteHouseTour #ArchiveDown #FBISubpoena #J6PipeBomber #MamdanisFalseFlag #AntisemitismFalseFlag #J6Psychosis #DavidMovie #SocialEngineering #TrumpCrucifixionArtwork #FreeMasonicArt #DomesticSleeperCells #GazaGenocide #NetanyahusPowerStruggle #October7KnessetAllegations #LaurenBoebertsHalloweenCostume #KanyesHumiliationRitual #VirginiaGovernor #CIASpanbergerBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-underclass-podcast--6511540/support.
Eric O'Neill, former FBI ghost and author of “Spies, Lies & Cybercrime,” joins host David Puner to take a deep dive into the mindset and tactics needed to defend against today's sophisticated cyber threats. Drawing on O'Neill's experience catching spies and investigating cybercriminals, the conversation explains how thinking like an attacker can help organizations and individuals stay ahead. The episode covers actionable frameworks, real-world stories, and practical advice for building cyber resilience in an age of AI-driven scams and industrialized ransomware.
With Mexico and the U.K. being the latest countries to roll out mandatory digital ID's the conspiracy has once again become a reality! Many people who have not heeded the warnings or passed them off as a conspiracy theory are now realizing the warnings were real. Let's look at how we got here, what the future plans are and the end goal of digital ID's. This is just another step in the nightmare to come!Email us at: downtherh@protonmail.com
In the latest Tin Foil Hat episode, Sam Tripoli and guest Mark Waters explore the Age of Un-Enlightenment, suggesting modern society is drifting into darkness despite all its progress. They dive into theories linking Britain to the Lost Tribe of Judah and discuss a hidden clash between a Black Magic Temple and a mysterious counter force. It's a wild ride through history, spirituality, and the unseen powers shaping our world. This episode is lovingly dedicated to the memory of Pollyanna, the most devoted and joyful companion, fondly remembered as Stinkbutt. Check out Sam Tripoli's premium content at SamTripoli.com! Please subscribe to the new Tin Foil Hat youtube channel: https://www.youtube.com/@TinFoilHatYoutube Check out Sam Tripoli's 4th Crowd Work Special "Deep Dish: Live From Chicago" Oct 4th on Youtube.com/SamTripoliComedy Grab your copy of the 2nd issue of the Chaos Twins now and join the Army Of Chaos: https://bit.ly/415fDfY Check out Sam "DoomScrollin with Sam Tripoli and Midnight Mike" Every Tuesday At 4pm pst on Youtube, X Twitter, Rumble and Rokfin! Join the WolfPack at Wise Wolf Gold and Silver and start hedging your financial position by investing in precious metals now! Go to samtripoli.gold and use the promo code "TinFoil" and we thank Tony for supporting our show. CopyMyCrypto.com: The 'Copy my Crypto' membership site shows you the coins that the youtuber 'James McMahon' personally holds - and allows you to copy him. So if you'd like to join the 1300 members who copy James, then stop what you're doing and head over to: https://copymycrypto.com/tinfoilhat/ You'll not only find proof of everything I've said - but my listeners get full access for just $1 LiveLongerFormula.com: Check out https://www.livelongerformula.com/sam — Christian is a longevity author and functional health expert who helps you fix your gut, detox, boost testosterone, and sleep better so you can thrive, not just survive. Watch his free masterclass on the 7 Deadly Health Fads, and if it clicks, book a free Metabolic Function Assessment to get to the root of your health issues. Want to see Sam Tripoli live? Get tickets at SamTripoli.com: Las Vegas, NV: Tin Foil Hat Comedy Live At The Virgin Hotel Nov 21st https://www.etix.com/ticket/p/95279813/tin-foil-hat-comedy-with-sam-tripoli-and-eddie-bravo-las-vegas-24-oxford Minneapolis: Headlining The House Of Comedy Dec 11th-13th https://samtripoli.com/events/?paged=3 Morris Plains, NJ: New Year's Eve At The Dojo Of Comedy Dec 31st https://www.tiffscomedy.com/events/121228 Please Check Out Mark Waters's internet: Website: https://windowsontheworld.net Youtube: https://www.youtube.com/@markwindowsontheworld Please check out Sam Tripoli's internet: Linktree: https://linktr.ee/samtripoli Please Follow Sam Tripoli's Stand Up Youtube Page: https://www.youtube.com/@SamTripoliComedy Please Follow Sam Tripoli's Comedy Instagram: https://www.instagram.com/samtripolicomedy/ Please Follow Sam Tripoli's Podcast Clip Instagram: https://www.instagram.com/samtripolispodcastclips/ Huge Thank You To Our Sponsor: Home Chef: Home Chef delivers fresh ingredients and chef-designed recipes, conveniently to your doorstep to simplify your cooking experience. Users of leading meal kits have rated Home Chef #1 in quality, convenience, value, taste, AND recipe ease. For a limited time, Home Chef is offering my listeners FIFTY PERCENT OFF and free shipping for your first box PLUS free dessert for life! Go to Home Chef dot com slash TINFOIL. Cornbread Hemp: If you're looking for a healthier way to enjoy a carefree moment, you have to give Cornbread Hemp a try! They've created the first-ever USDA Organic THC gummy that's 100% legal. As a special offer for Tin Foil Hat listeners, you can get 30% off your first order! Just visit cornbreadhemp.com/TinFoil and use promo code TinFoil at checkout. Again that's cornbreadhemp.com/TinFoil and use code TinFoil for 30% off your first order. Cheers to a healthier happy hour!
Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security
Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security
Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security
Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security
Is there anything real left on the internet? Neil deGrasse Tyson and co-hosts Chuck Nice and Gary O'Reilly explore deepfakes, scams, and cybercrime with the Director of Threat Research at Bitdefender, Bogdan Botezatu. Scams are a trillion-dollar industry; keep your loved ones safe with Bitdefender: https://bitdefend.me/90-StarTalkNOTE: StarTalk+ Patrons can listen to this entire episode commercial-free here: https://startalkmedia.com/show/deepfakes-and-the-war-on-truth-with-bogdan-botezatu/Thanks to our Patrons Bubbalotski, Oskar Yazan Mellemsether, Craig A, Andrew, Liagadd, William ROberts, Pratiksha, Corey Williams, Keith, anirao, matthew, Cody T, Janna Ladd, Jen Richardson, Elizaveta Nikitenko, James Quagliariello, LA Stritt, Rocco Ciccolini, Kyle Jones, Jeremy Jones, Micheal Fiebelkorn, Erik the Nerd, Debbie Gloom, Adam Tobias Lofton, Chad Stewart, Christy Bradford, David Jirel, e4e5Nf3, John Rost, cluckaizo, Diane Féve, Conny Vigström, Julian Farr, karl Lebeau, AnnElizabeth, p johnson, Jarvis, Charles Bouril, Kevin Salam, Alex Rzem, Joseph Strolin, Madelaine Bertelsen, noel jimenez, Arham Jain, Tim Manzer, Alex, Ray Weikal, Kevin O'Reilly, Mila Love, Mert Durak, Scrubbing Bubblez, Lili Rose, Ram Zaidenvorm, Sammy Aleksov, Carter Lampe, Tom Andrusyna, Raghvendra Singh Bais, ramenbrownie, cap kay, B Rhodes, Chrissi Vergoglini, Micheal Reilly, Mone, Brendan D., Mung, J Ram, Katie Holliday, Nico R, Riven, lanagoeh, Shashank, Bradley Andrews, Jeff Raimer, Angel velez, Sara, Timothy Criss, Katy Boyer, Jesse Hausner, Blue Cardinal, Benjamin Kedwards, Dave, Wen Wei LOKE, Micheal Sacher, Lucas, Ken Kuipers, Alex Marks, Amanda Morrison, Gary Ritter Jr, Bushmaster, thomas hennigan, Erin Flynn, Chad F, fro drick, Ben Speire, Sanjiv VIJ, Sam B, BriarPatch, and Mario Boutet for supporting us this week. Subscribe to SiriusXM Podcasts+ to listen to new episodes of StarTalk Radio ad-free and a whole week early.Start a free trial now on Apple Podcasts or by visiting siriusxm.com/podcastsplus. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
My guest today is Dan Wang. Dan is a technology analyst and author who spent six years living in China studying its manufacturing ecosystem and tech development, best known for his new book Breakneck. Dan offers the most nuanced framework I've encountered for understanding US-China competition. We explore a critical asymmetry: it's far harder for the US to rebuild manufacturing capacity than for China to improve scientific research, with profound implications for AI, national security, and investment returns. For investors, Dan explains the "ByteDance problem"—why exceptional Chinese companies trade at massive discounts due to Communist Party unpredictability and geopolitical risks. He argues China is a "high agency" society that executes relentlessly while America deliberates endlessly, yet also reveals the societal cost. We discuss innovation, state capacity, and investing across both superpowers. Please enjoy my conversation with Dan Wang. For the full show notes, transcript, and links to mentioned content, check out the episode page here. ----- This episode is brought to you by Ramp. Ramp's mission is to help companies manage their spend in a way that reduces expenses and frees up time for teams to work on more valuable projects. Go to Ramp.com/invest to sign up for free and get a $250 welcome bonus. – This episode is brought to you by Ridgeline. Ridgeline has built a complete, real-time, modern operating system for investment managers. It handles trading, portfolio management, compliance, customer reporting, and much more through an all-in-one real-time cloud platform. Head to ridgelineapps.com to learn more about the platform. – This episode is brought to you by AlphaSense. AlphaSense has completely transformed the research process with cutting-edge AI technology and a vast collection of top-tier, reliable business content. Invest Like the Best listeners can get a free trial now at Alpha-Sense.com/Invest and experience firsthand how AlphaSense and Tegus help you make smarter decisions faster. ----- Editing and post-production work for this episode was provided by The Podcast Consultant (https://thepodcastconsultant.com). Show Notes: (00:00:00) Welcome to Invest Like the Best (00:05:55) China's Engineering State and Social Engineering (00:12:15) US-China Competition: Innovation and Manufacturing (00:19:41) The Future of US and China: Technological and Economic Perspectives (00:25:22) Cultural and Work Ethic Comparisons (00:39:09) Investing in China: Opportunities and Risks (00:44:43) Future Equilibrium States Between US and China (00:48:32) China's High Agency and Infrastructure (00:49:58) Lawyerly Tendencies in US Society (00:53:41) Comparing US and Chinese Societal Structures (00:57:59) China's Historical Lessons and Future Prospects (01:10:39) AI and Technological Competition (01:15:30) Vertical Integration in Chinese Companies (01:26:39) The Kindest Thing