Podcasts about Social engineering

  • 1,081PODCASTS
  • 2,824EPISODES
  • 52mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Feb 24, 2026LATEST

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about Social engineering

Show all podcasts related to social engineering

Latest podcast episodes about Social engineering

Ich glaube, es hackt!
Das Pentagon will auch KI. Aber bitte ohne Moral!

Ich glaube, es hackt!

Play Episode Listen Later Feb 24, 2026 49:40


Rolex im Champagner, KI-Influencerinnen mit Zahnspange, smarte Unterhosen und das Pentagon ohne Guardrails – was für eine Folge. Diese Episode startet dekadent im Männergruppen-Chat und endet beim selbstfahrenden Taxi mit offener Tür. Dazwischen geht's um: - Eine brisante Klage gegen Meta wegen angeblich nicht wirklich Ende-zu-Ende-verschlüsselter WhatsApp-Chats - Die Frage, warum man Nachrichten „nur für mich“ löscht - KI, die in deinem Namen Social-Media-Posts erstellt – sogar nach deinem Tod - Die KI-Influencerin „Juna“, die in Uniformen von Edeka, Deutsche Bahn & Co. auftritt – und was das für Marken bedeutet - Abmahnanwälte wie Löschkönig, die Google-Bewertungen entfernen lassen - Eine Unterhose mit Sensor zur Messung der täglichen „Wind-Ereignisse“ - Die Übernahme von OpenClaw durch OpenAI - Social Engineering für KI-Agents - Das US-Verteidigungsministerium vs. Anthropic - On-Device-KI bei Apple und die „Sensitive Content Warning“ bei FaceTime - Smarte Getränkeautomaten & Datenauswertung bei Five Guys - Selbstfahrende Taxis von Waymo - Und warum Barilla Spotify-Playlists nach Kochzeit baut Kurz gesagt: Das Internet ist kaputt. Aber unterhaltsam kaputt. -- Links zur Folge immer auf https://podcast.ichglaubeeshackt.de/ Wenn Euch unser Podcast gefallen hat, freuen wir uns über eine Bewertung! Feedback wie z.B. Themenwünsche könnt Ihr uns über sämtliche Kanäle zukommen lassen: Email: podcast@ichglaubeeshackt.de Web: podcast.ichglaubeeshackt.de Instagram: http://instagram.com/igehpodcast

Boiler Room
Disclose, Distract, Deploy

Boiler Room

Play Episode Listen Later Feb 23, 2026 114:26 Transcription Available


Alternate Current Radio Presents - Boiler Room - Learn to protect yourself from predatory mass media Boiler Room — Disclose, Distract, Deploy (Feb 22, 2026)

Putting the AP in hAPpy
Episode 375: A Factor in Reducing IRS Penalties - Handling Returned 1099's and 1042's

Putting the AP in hAPpy

Play Episode Listen Later Feb 19, 2026 15:48


So you sent recipient statements to your vendors for Tax Year 2025 – and some came back.  Here is how to handle them to reduce penalties from the IRS. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to reduce the potential for fraudulent payments, compliance fines or bad vendor data. Check out the Vendor Process Training Center for 173+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download:  Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

The Bottom Line Pharmacy Podcast: Sykes & Company, P.A.
Protecting Pharmacy Data in the Age of Social Engineering with Chris Sykes, IT Director, MCSA, MS

The Bottom Line Pharmacy Podcast: Sykes & Company, P.A.

Play Episode Listen Later Feb 19, 2026 21:27


Send a textSchedule an Rx AssessmentWith cybercriminal activity accelerating and AI making scams more sophisticated by the day, one of the greatest threats facing pharmacies is through social engineering. Not by hacking systems, but by manipulating people.In this episode, Austin Murray and Scotty Sykes are joined by Chris Sykes, IT Director at Sykes & Company, to break down what social engineering really is, why pharmacies are prime targets, and how these attacks are evolving through email, phone calls, text messages, and even deep-fake technology.We cover:What social engineering is and how pharmacies are being targeted todayCommon pharmacy-specific scams, including fake refill notices, insurance requests, and ACH change attemptsHow AI and deep-fake voices are raising the stakesPractical steps pharmacies can take to slow down, verify requests, and protect PHIAnd more!More About Our Guest:Chris Sykes is the Director of IT at Sykes & Company, P.A., where he has been a key part of the team since 2006. With nearly 25 years in the IT industry, Chris combines deep technical expertise with a passion for helping both the firm and its clients become more efficient, secure, and technology-driven. Chris holds a Bachelor of Science in Business Administration with a concentration in Management Information Systems and a Master of Science in Technology Systems, both from East Carolina University. Outside of work, Chris enjoys running marathons, fishing and hunting with his boys, and spending quality time with his family at the beach.Learn more about Chris Sykes:Chris Sykes LinkedInCheck out all our social media:FacebookTwitterLinkedInScotty Sykes – CPA, CFP LinkedInScotty Sykes – CPA, CFP TwitterMore resources on this topic:Podcast - AI, Audits, & Advocacy: The Pharmacy Survival Guide with Trenton TheidePodcast - Navigating Cybersecurity, NIST and HIPAABlog - Technology, Security and Your PharmacyBlog - Protect You and Your Pharmacy: The Growing Threat of RansomwareBlog - Backing Up Your Business DataBlog - Spot a Hacked Email or Bad WebsiteBlog - Protect Your Pharmacy Data from Hackers

Fringe Radio Network
Nephilim Religion Propaganda - Fire Theft Radio

Fringe Radio Network

Play Episode Listen Later Feb 16, 2026 38:55 Transcription Available


In this episode, we take a closer look at how modern films like Sinners and Marvel's Black Panther draw heavily from ancient and indigenous religious traditions, often positioning them as morally superior or more "authentic" than Christianity. Chuck explores the symbolism, storytelling choices and cultural messaging behind these movies and asks, what does it mean when Christianity is sidelined or reframed in popular entertainment? Is this just creative world-building, or does it reflect a deeper shift in spiritual values being promoted on screen?

No Password Required
No Password Required Podcast Episode 69 - Sue Serna

No Password Required

Play Episode Listen Later Feb 16, 2026 44:39


Sue Serna - Social Media Security and Governance Leader and Lover of All BeaglesNo Password Required Season 7: Episode 2 - Sue SernaSue Serna is the CEO and Founder of Serna Social and the former head of global social media at Cargill. She brings more than two decades of experience at the intersection of storytelling, strategy, and security.In this episode, she shares her journey from business reporter to leading her own consultancy serving companies around the world on social media strategy.Jack Clabby of Carlton Fields, P.A, joined by guest co-host Rex Wilson of Cyber Florida, welcomes Sue for a candid discussion about the realities of enterprise social media. From managing more than 150 Facebook pages for a single company, to navigating internal politics, agency relationships, and regulatory pressure, Sue explains why social media is far from “free” and why most organizations still under-resource it.Sue dives deep into the gap between social media teams and cybersecurity departments. She outlines how personal account compromises can escalate into enterprise-level incidents, why governance frameworks matter, and how large organizations can regain control of sprawling digital footprints. Drawing from real-world examples, she argues that social media must be treated like finance or HR, a core business function requiring structure, ownership, and accountability.The episode wraps with the Lifestyle Polygraph, where Sue reveals her love of Apollo-era space history, debates iconic Philadelphia traditions, and imagines what magical talent her beagle would bring to Hogwarts.Follow Sue at SernaSocial.com or connect with her on LinkedIn: https://www.linkedin.com/in/sueserna/ Chapters: 00:00 Introduction and First Impressions   02:45 The Evolving Role of Social Media in Corporations   04:58 Transitioning from Journalism to Social Media  11:11 Building Social Media from Scratch   13:00 Becoming a CEO and Founder   16:28 The Importance of Networking   16:54 Bridging the Gap Between Social Media and Cybersecurity  20:51 Real-World Social Media Security Incidents  28:35 Navigating Internal Conflicts in Social Media  30:32 The Lifestyle Polygraph Begins   31:17 Nerd Things That Expose Sue: Space and Harry Potter!  35:16 Sue's Love For Beagles  37:50 Wreckless Intern or Overconfident Executive?  40:42 Hogwarts and Magical Beagles 

Cyber Security Today
The Dark Side of Valentine's Day: AI Romance Scams | Cybersecurity Today

Cyber Security Today

Play Episode Listen Later Feb 15, 2026 70:12


This special Valentine's Day episode of Cybersecurity Today examines romance scams (often called pig butchering) and how fraudsters exploit trust, vulnerability, and loneliness.  Host Jim Love speaks with McAfee Head of Threat Research Abhishek Karnik  about new findings showing the scale and demographics of these scams, including widespread encounters with fake or AI-generated profiles, frequent financial solicitations, and that men are also heavily impacted.  Cybersecurity Today  would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale.  You can find them at Meter.com/cst The episode features survivor Beth Highland's detailed account of being manipulated via Tinder through long-term messaging, an AI video call, forged documents, and a crypto payout scheme that led her to send about $26,000 via Bitcoin ATMs before her financial advisor—trained in romance fraud—helped her recognize the scam and stop further losses, including a demanded $50,000 "activation fee." Beth discusses emotional aftereffects, stigma, reporting, red flags, and her book, "Diary of a Romance Scam:  When Swiping Right Goes Wrong," along with her advocacy work. The conversation broadens to the role of AI in making scams more realistic (deepfakes, voice/video, document generation), the importance of privacy and not overposting, involving trusted family/advisors, institutional training and intervention points along the fraud "kill chain," and using technology and education to detect and reduce scams. LINKS  Beth Hyland's Book - Diary of a Romance Scam: When Swiping Right Goes Wrong https://www.amazon.com/Diary-Romance-Scam-Swiping-Right/dp/1662962843 00:00 Sponsor: Meter's all-in-one networking stack 00:18 Valentine's Day on the dark side: heartbreak meets cybercrime 02:15 Romance scams ("pig butchering") are everywhere—who gets targeted 04:15 McAfee research: fake profiles, AI, and the real victim demographics 07:07 How scammers hook you: profiling, psychology, and long-game manipulation 09:01 Beth's story begins: post-divorce, isolation, and trying Tinder 10:36 The perfect match: mirroring, fast intimacy, and early red flags 14:32 AI video call + the push-pull breakup: emotional control tactics 17:09 The money trap: Qatar story, bank access, and Bitcoin ATM payments 23:34 The $50K "activation fee" and the wake-up call from a financial advisor 26:25 Cutting him off—and getting pulled back in by guilt and gaslighting 30:18 How to help victims: listening, tools, and where to get support 33:17 Turning pain into purpose: Beth's book and grieving a romance scam 34:47 Turning Pain Into Purpose: Supporting Romance-Scam Survivors 35:56 Stop Blaming Victims: Changing the Language Around Scams 38:38 "It Can Happen to Anybody": Why Smart People Get Hooked 40:58 Social Engineering 101: How Scams Exploit Different Emotions 42:14 Why McAfee Is Focusing on Consumer Scams (and the AI Factor) 45:43 AI Deepfakes & Low-Cost Tools: The New Scam Industrialization 49:19 Oversharing, Spearphishing & Replay Attacks: How Victims Get Retargeted 53:24 Practical Red Flags: Meeting in Person, Isolation Tactics, Family Checks 57:08 Training the "Kill Chain": Banks, Cashiers, Advisors & Early Intervention 01:00:33 Tech Fighting Tech: Detection, Identity Protection & Digital Assistants 01:02:57 What's Next: Agentic AI, Bigger Attack Surfaces & Trust-and-Safety by Design 01:08:03 Wrap-Up: Start the Conversation, Resources, and Final Thanks

Cyber Security Today
The Dark Side of Valentine's Day: AI Romance Scams | Cybersecurity Today

Cyber Security Today

Play Episode Listen Later Feb 14, 2026 70:12


This special Valentine's Day episode of Cybersecurity Today examines romance scams (often called pig butchering) and how fraudsters exploit trust, vulnerability, and loneliness.  Host Jim Love speaks with McAfee Head of Threat Research Abhishek Karnik  about new findings showing the scale and demographics of these scams, including widespread encounters with fake or AI-generated profiles, frequent financial solicitations, and that men are also heavily impacted.  Cybersecurity Today  would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale.  You can find them at Meter.com/cst The episode features survivor Beth Highland's detailed account of being manipulated via Tinder through long-term messaging, an AI video call, forged documents, and a crypto payout scheme that led her to send about $26,000 via Bitcoin ATMs before her financial advisor—trained in romance fraud—helped her recognize the scam and stop further losses, including a demanded $50,000 "activation fee." Beth discusses emotional aftereffects, stigma, reporting, red flags, and her book, "Diary of a Romance Scam:  When Swiping Right Goes Wrong," along with her advocacy work. The conversation broadens to the role of AI in making scams more realistic (deepfakes, voice/video, document generation), the importance of privacy and not overposting, involving trusted family/advisors, institutional training and intervention points along the fraud "kill chain," and using technology and education to detect and reduce scams. LINKS  Beth Hyland's Book - Diary of a Romance Scam: When Swiping Right Goes Wrong https://www.amazon.com/Diary-Romance-Scam-Swiping-Right/dp/1662962843 00:00 Sponsor: Meter's all-in-one networking stack 00:18 Valentine's Day on the dark side: heartbreak meets cybercrime 02:15 Romance scams ("pig butchering") are everywhere—who gets targeted 04:15 McAfee research: fake profiles, AI, and the real victim demographics 07:07 How scammers hook you: profiling, psychology, and long-game manipulation 09:01 Beth's story begins: post-divorce, isolation, and trying Tinder 10:36 The perfect match: mirroring, fast intimacy, and early red flags 14:32 AI video call + the push-pull breakup: emotional control tactics 17:09 The money trap: Qatar story, bank access, and Bitcoin ATM payments 23:34 The $50K "activation fee" and the wake-up call from a financial advisor 26:25 Cutting him off—and getting pulled back in by guilt and gaslighting 30:18 How to help victims: listening, tools, and where to get support 33:17 Turning pain into purpose: Beth's book and grieving a romance scam 34:47 Turning Pain Into Purpose: Supporting Romance-Scam Survivors 35:56 Stop Blaming Victims: Changing the Language Around Scams 38:38 "It Can Happen to Anybody": Why Smart People Get Hooked 40:58 Social Engineering 101: How Scams Exploit Different Emotions 42:14 Why McAfee Is Focusing on Consumer Scams (and the AI Factor) 45:43 AI Deepfakes & Low-Cost Tools: The New Scam Industrialization 49:19 Oversharing, Spearphishing & Replay Attacks: How Victims Get Retargeted 53:24 Practical Red Flags: Meeting in Person, Isolation Tactics, Family Checks 57:08 Training the "Kill Chain": Banks, Cashiers, Advisors & Early Intervention 01:00:33 Tech Fighting Tech: Detection, Identity Protection & Digital Assistants 01:02:57 What's Next: Agentic AI, Bigger Attack Surfaces & Trust-and-Safety by Design 01:08:03 Wrap-Up: Start the Conversation, Resources, and Final Thanks

Café Weltschmerz
Geheime Diensten ontwikkelden Woke-Wapen | Rypke Zeilmaker | Boekbespreking

Café Weltschmerz

Play Episode Listen Later Feb 13, 2026 14:25


Waardeer je onze video's? Steun dan Café Weltschmerz, het podium voor het vrije woord: https://www.cafeweltschmerz.nl/doneren/Academische denktanks en geheime diensten ontwikkelden na de Tweede Wereld Oorlog het neomarxistische ‘woke'-denken van de Frankfurter Schule. Die linkse agitprop injecteerden ze in de samenleving samen met drugsgebruik om de moraal van de eigen bevolking te verzwakken, zodat die geen machtsbedreiging word. Deze keer het werk van complotonderzoeker Daniel Estulin in de cursus “Complotdenken doe je Zo!”Boek van de week: Daniel Estuin (2015) Tavistock Institute, Social Engineering the Masses, Independent Publishers GroupHoe je weer nuchter en normaal wordt? Wortel in de Friese Klei met ‘Liever dood dan Slaaf', Rypke's meisterwerkhttps://www.lieverdooddanslaaf.com/---Deze video is geproduceerd door Café Weltschmerz. Café Weltschmerz gelooft in de kracht van het gesprek en zendt interviews uit over actuele maatschappelijke thema's. Wij bieden een hoogwaardig alternatief voor de mainstream media. Café Weltschmerz is onafhankelijk en niet verbonden aan politieke, religieuze of commerciële partijen.Wil je meer video's bekijken en op de hoogte blijven via onze nieuwsbrief? Ga dan naar: https://www.cafeweltschmerz.nl/videos/Wil je op de hoogte worden gebracht van onze nieuwe video's? Klik dan op deze link: https://bit.ly/3XweTO0

Putting the AP in hAPpy
Episode 374: 3 Reasons Why It's Better to Use IRIS and Not FIRE for 1042-S Forms For TY 2025

Putting the AP in hAPpy

Play Episode Listen Later Feb 12, 2026 19:07


If you paid foreign vendors reportable income in TY 2025 and want to file the 1042-S forms using one of the two IRS free e-Filing tools – this episode will break down three differences between the FIRE and IRIS that might make your decision easier. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to reduce the potential for fraudulent payments, compliance fines or bad vendor data. Check out the Vendor Process Training Center for 173+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    IRS IRIS Page: https://www.irs.gov/filing/e-file-information-returns-with-iris IRS FIRE Page:  https://www.irs.gov/e-file-providers/filing-information-returns-electronically-fire IRS Modernized eFile: https://www.irs.gov/e-file-providers/modernized-e-file-program-information Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download:  Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Breach FM - der Infosec Podcast
Flurfunk - Salt Typhoon in Europa, Microsoft unter Druck, Dänemarks Cyber-Offensive, Azure Front Door & Signal-Phishing

Breach FM - der Infosec Podcast

Play Episode Listen Later Feb 11, 2026 66:30


In der aktuellen Folge von Breach FM sprechen Robert und Max über neue Erkenntnisse zu Salt Typhoon und dessen Aktivitäten in europäischen Telekommunikationsnetzen – mit besonderem Blick auf Norwegen und die geopolitischen Implikationen langfristiger Spionagekampagnen. Wir diskutieren den kritischen Bericht des US Cyber Safety Review Board zur Sicherheitskultur bei Microsoft und fragen, was „Security Governance“ bei einem der wichtigsten Tech-Konzerne der Welt wirklich bedeutet.Außerdem schauen wir auf Dänemarks ungewöhnlich offene Rekrutierungsoffensive für offensive Cyber-Operationen und ordnen ein, was das über aktuelle Bedrohungslagen und staatliche Cyberstrategien verrät. Mit dabei ist auch eine schwere Schwachstelle in Azure Front Door und warum „Patch your stuff“ weiterhin keine Floskel ist. Zum Abschluss geht es um gezielte Phishing-Kampagnen gegen Signal-Nutzer, die besonders Journalisten, Politiker und Militärs ins Visier nehmen – und warum hier weniger Technik als vielmehr Social Engineering das eigentliche Risiko ist.Norwegian intelligence discloses country hit by Salt Typhoon campaignhttps://therecord.media/norawy-intelligence-discloses-salt-typhoon-attacks Denmark's military intelligence service has launched a campaign to recruit cybersecurity specialists for offensive cyber operationshttps://www.fe-ddis.dk/da/nyheder/2026/fe-soger-landets-skarpeste-hoveder-til-hackerakademi/Gemeinsamer Sicherheitshinweis (BfV und BSI) - Phishing über Messengerdienstehttps://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2026/202602_BfV_BSI.htmlCSRB Slams Microsoft for ‘Inadequate' Security Culture, Calls for Overhaulhttps://www.meritalk.com/articles/csrb-slams-microsoft-for-inadequate-security-culture-calls-for-overhaulCVE-2026-24300https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-24300The Technological Republic (Buch von Alex Karp)https://www.m-vg.de/finanzbuchverlag/shop/article/25367-the-technological-republic/Careless Peoplehttps://www.thalia.de/shop/home/artikeldetails/A1074309386

New Thinking Allowed Audio Podcast
A Traditionalist Perspective on Gnosticism with Charles Upton

New Thinking Allowed Audio Podcast

Play Episode Listen Later Feb 10, 2026 61:50


A Traditionalist Perspective on Gnosticism with Charles Upton Charles Upton’s first books of poetry were published in 1968 and 1969 by Lawrence Ferlinghetti of City Light Books in San Francisco. He was then considered the youngest member of the “beat generation” as he was still in high school. He has subsequently written many books associated with the traditionalist school of spirituality including What Poets Used to Know, The Science of the Greater Jihad, Folk Metaphysics, Alien Disclosure Deception: The Metaphysics of Social Engineering, Day and Night on the Sufi Path, Dugin Against Dugin: A Traditionalist Critique of the Fourth Political Theory, The System of the Antichrist, and Vectors of the Counter-Initiation. His most recent book of poetry is The Wars of Love and Other Poems. Charles Upton offers a traditionalist critique of Gnosticism, examining its metaphysical assumptions about evil, transcendence, and the nature of the cosmos. Charles explores why Gnostic ideas resonate so strongly in modern culture, particularly feelings of alienation, simulation, and entrapment in an unjust world. From a traditionalist standpoint, Upton reframes Gnosticism as a symbolic diagnosis of ego and spiritual imbalance rather than a literal account of reality. 00:00:01 Introduction: a traditionalist view of Gnosticism 00:04:38 What traditionalism means and where it came from 00:07:58 The primordial tradition and unity of religions 00:15:30 Why Gnosticism is considered heresy 00:17:44 The Gnostic idea of a false universe 00:20:39 The Demiurge reinterpreted as the ego 00:22:31 Four Archons as spiritual distortions 00:30:18 Law, selfhood, chaos, and fate explained 00:39:28 How the Archons reinforce each other 00:59:06 Conclusion New Thinking Allowed host, Jeffrey Mishlove, PhD, is author of The Roots of Consciousness, Psi Development Systems, and The PK Man. Between 1986 and 2002 he hosted and co-produced the original Thinking Allowed public television series. He is the recipient of the only doctoral diploma in “parapsychology” ever awarded by an accredited university (University of California, Berkeley, 1980). He is also the Grand Prize winner of the 2021 Bigelow Institute essay competition regarding the best evidence for survival of human consciousness after permanent bodily death. He is Co-Director of Parapsychology Education at the California Institute for Human Science. (Recorded on January 29, 2025) For a short video on How to Get the Most From New Thinking Allowed, go to https://youtu.be/aVbfPFGxv9o For a complete, updated list with links to all of our videos, see https://newthinkingallowed.com/Listings.htm. Check out the New Thinking Allowed Foundation website at http://www.newthinkingallowed.org. There you will find our incredible, searchable database as well as opportunities to shop and to support our video productions – plus, this is where people can subscribe to our FREE, weekly Newsletter and can download a FREE .pdf copy of our quarterly magazine. To order high-quality, printed copies of our quarterly magazine: NTA-Magazine.MagCloud.com Check out New Thinking Allowed’s AI chatbot. You can create a free account at awakin.ai/open/jeffreymishlove. When you enter the space, you will see that our chatbot is one of several you can interact with. While it is still a work in progress, it has been trained on 1,600 NTA transcripts. It can provide intelligent answers about the contents of our interviews. It’s almost like having a conversation with Jeffrey Mishlove. His website is https://glennaparicioparry.com/ If you would like to join our team of volunteers, helping to promote the New Thinking Allowed YouTube channel on social media, editing and translating videos, creating short video trailers based on our interviews, helping to upgrade our website, or contributing in other ways (we may not even have thought of), please send an email to friends@newthinkingallowed.com. To join the NTA Psi Experience Community on Facebook, see https://www.facebook.com/groups/1953031791426543/ To download and listen to audio versions of the New Thinking Allowed videos, please visit our new podcast at https://itunes.apple.com/us/podcast/new-thinking-allowed-audio-podcast/id1435178031. Download and read Jeffrey Mishlove’s Grand Prize essay in the Bigelow Institute competition, Beyond the Brain: The Survival of Human Consciousness After Permanent Bodily Death, go to https://www.bigelowinstitute.org/docs/1st.pdf. You can help support our video productions while enjoying a good book. To order a copy of New Thinking Allowed Dialogues: Is There Life After Death? click on https://amzn.to/3LzLA7Y (As an Amazon Associate we earn from qualifying purchases.) To order Russell Targ: Ninety Years of ESP, Remote Viewing, and Timeless Awareness, go to https://amzn.to/4aw2iyr To order a copy of New Thinking Allowed Dialogues: UFOs and UAP – Are We Really Alone?, go to https://amzn.to/3Y0VOVh

Cyber Crime Junkies
Your Boss's Voice is an AI Clone Now | Latest Social Engineering Risks Exposed

Cyber Crime Junkies

Play Episode Listen Later Feb 6, 2026 51:38 Transcription Available


WeTalkSecurity
Cyberversicherung - Schutzschild für Unternehmen im digitalen Zeitalter | Folge 39

WeTalkSecurity

Play Episode Listen Later Feb 6, 2026 37:14


In dieser Folge von „WeTalkSecurity“ geht es um Cyberversicherungen: warum sie für Unternehmen immer relevanter werden, was sie tatsächlich leisten, wo typische Ausschlüsse liegen und weshalb es im Schadenfall häufig zu Streit kommt. Christian Lueg spricht mit Dr. Jens Eckhardt über die aktuelle Bedrohungslage durch Cyberkriminalität, die wirtschaftlichen Risiken von Cyberangriffen, rechtliche Rahmenbedingungen wie BSI-Gesetz, DSGVO und DORA sowie darüber, worauf Unternehmen beim Abschluss und bei der Prüfung bestehender Policen unbedingt achten sollten. Darüber hinaus sprechen die beiden über Anforderungen der Versicherer an die IT-Sicherheit, Erfahrungen aus der Schadenpraxis, Ransomware, Social Engineering und die Frage, wie sich der Markt für Cyberversicherungen weiterentwickeln wird.

Putting the AP in hAPpy
Episode 373: TY 2025 Handling Corrections For IRS Forms 1099-NEC, 1099-MISC and 1042-S

Putting the AP in hAPpy

Play Episode Listen Later Feb 5, 2026 33:26


Congrats!  You made the deadline for sending 1099-NEC and 1099-MISC recipient statements to your vendors and the related IRS tax filing deadline for the 1099-NEC.  Then your phone starts ringing with vendors, and now you have corrections to what you reported.  Or your organization has multiple entities and you realized income was reported for vendors using the wrong organization.  Or that file in IRIS or FIRE has an error status…. Now what? Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to reduce the potential for fraudulent payments, compliance fines or bad vendor data. Check out the Vendor Process Training Center for 173+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    IRS Publications: IRIS:  Publication 5717 (Rev. 1-2026) https://www.irs.gov/pub/irs-pdf/p5717.pdfFIRE: Publication 1220 (Rev. 9-2025) https://www.irs.gov/pub/irs-pdf/p1220.pdfFIRE (1042-S):  Publication 1187 (Rev. 9-2025) https://www.irs.gov/pub/irs-pdf/p1187.pdfIRS Page:  Information Return Penalty Chart https://www.irs.gov/payments/information-return-penalties Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download:  Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Explaining East Europe's Age of Empires

Play Episode Listen Later Feb 2, 2026 116:59


In this episode of History 102, 'WhatIfAltHist' creator Rudyard Lynch and co-host Austin Padgett analyze the structural evolution of Eastern European empires from the 17th century to World War I , examining how imperial elites managed multiethnic, multicultural societies. -- FOLLOW ON X: @whatifalthist (Rudyard) @LudwigNverMises (Austin) @TurpentineMedia -- TIMESTAMPS: (00:00) Intro (00:16) Age of Empires and Personal Anecdotes (03:23) The East Europe Run and the Bloodlands (05:06) Ruling Philosophies of European Dynasties (06:09) Industrialization and the Origins of World War I (09:51) Three Conflicts that Formed the Era (11:10) The Expansion of the Austrian Empire (13:35) Imperial Identity vs National Identity (20:18) Religious Unification and Catholicism (22:38) Ottoman Resilience and Decadence (24:26) Hungarian Governance and the Steppe Frontier (31:28) Multiculturalism and Merchant Ethnicities (38:41) Modern Greek Identity and the Ottoman Elite (41:38) Trust and Honor Culture (46:34) The Balkans under Turkish Rule (52:10) Religion and Social Engineering (55:03) The Austrian Idea and Intellectual Legacy (01:03:07) Culture vs Civilization (01:08:25) The German Nobility of Europe (01:10:03) Enlightened Absolutism and Serfdom (01:15:43) The Great Northern War and the Rise of Russia (01:21:44) The Shift to Mass Mobilization and Drill (01:26:43) The Russian Menace and Power Politics (01:39:53) Prussian Excellence and the Yoker Nobility (01:48:34) Napoleon in Eastern Europe (01:54:40) Wrap Learn more about your ad choices. Visit megaphone.fm/adchoices

Cyber Crime Junkies
AI Changed Social Engineering. New Verification Rules to Know TODAY!

Cyber Crime Junkies

Play Episode Listen Later Jan 31, 2026 1:56


AI Changed Social Engineering. New Verification Rules to Know TODAY!If you didn't independently confirm the human using a channel you know is legitimate, you didn't verify anything.You placed your trust in whatever entity controls that communication channel. And there's an increasing chance that entity is a criminal enterprise with better AI tools than your security team.Stop checking emails. Start checking humans.The difference could be your career—or your company's survival.Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us.Support the show

Putting the AP in hAPpy
Episode 372: Running Late on 1099-NEC or 1099-MISC Reporting? File These IRS Extensions To Prevent Penalties

Putting the AP in hAPpy

Play Episode Listen Later Jan 29, 2026 21:08


What do you do if it's getting down to the wire to be in compliance with the IRS deadlines for sending vendors their 1099-NEC or 1099-MISC or filing both with the IRS, and you know you are going to be late.Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to reduce the potential for fraudulent payments, compliance fines or bad vendor data. Check out the Vendor Process Training Center for 173+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    IRS Extension Form:  Form 8809, Application for Extension of Time to File Information Returns  https://www.irs.gov/forms-pubs/about-form-8809IRS Extension Form:  Form 15397 Application For Extension of Time to Furnish Recipient Statements  https://www.irs.gov/forms-pubs/extension-of-time-to-furnish-statements-to-recipientsIRS Page:  Information Return Penalty Charthttps://www.irs.gov/payments/information-return-penalties Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download:  Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Speak Up! Virginia
The Great VA Social Engineering Project: Schools, Crime & Taxes | Ep. 261

Speak Up! Virginia

Play Episode Listen Later Jan 28, 2026 39:46


Candi and Victoria bring you important updates about the list of radical bills currently making their way through our General Assembly. Spanberger's administration has already proven she's a far cry from her moderate marketing campaign.Visit familyfoundation.org to sign up for our Don't Tread on Parents Day and make your voice heard in Richmond!

FULL COMP: The Voice of the Restaurant Industry Revolution
It's Not About the Food: John Terzian & Brian Toll on Why the Most Powerful Hospitality Brands Are Built on Social Engineering

FULL COMP: The Voice of the Restaurant Industry Revolution

Play Episode Listen Later Jan 27, 2026 39:35


What if your entire career started with being told you were too nice to succeed?For John Terzian and Brian Toll, that's exactly how it began. These are the minds behind The h.wood Group: an empire born from rejection, reinvention, and the refusal to follow the rules.In this episode, they share how protecting guests instead of exploiting them became their superpower, why aesthetics matter more than you think, and how they transitioned from bottle service to building culture through culinary. We get into the painful leap from nightlife to fine dining, how they designed demand instead of chasing it, and the operational discipline required to stay profitable 10 years in.This isn't just about cool venues, it's about what it takes to last in an industry designed to burn you out.To learn more about The h.wood Group and their concepts, visit hwoodgroup.com._________________________________________________________Today's episode was brought to you by Square. If you want restaurant tech that actually supports how you run your restaurant, find out how Square can help at square.com/goodstuff.Free 5-Day Restaurant Marketing Masterclass – This is a live training where you'll learn the exact campaigns Josh has built and tested in real restaurants to attract new guests, increase visit frequency, and generate sales on demand. Save your spot at restaurantbusinessschool.com

Masters of Privacy
Sam Kaplan: Cybersecurity in the age of agentic AI, deep fakes, and social engineering

Masters of Privacy

Play Episode Listen Later Jan 25, 2026 35:46


Can AI agents be deployed for enhanced protection? What is a “triple extortion”? How is ransomware evolving? Is there hope for SMEs?Sam Kaplan is a policy, legal, and national security professional with over eighteen years of experience across the public and private sectors. He is currently the Assistant General Counsel for Public Policy & Government Affairs at Palo Alto Networks, providing legal guidance on domestic and international legislative, regulatory, and policy matters, with a focus on cybersecurity, AI governance, privacy, data security, international data flows, and public-private capacity building.Before Palo Alto Networks, Sam led the global product policy team for Facebook's News Feed and News Tab at Meta Platforms, addressing issues like AI/ML fairness, algorithmic transparency, platform integrity, election security, misinformation, and harmful content.Prior to his private sector roles, Sam spent over thirteen years in the Federal Government. He held senior leadership positions at the U.S. Department of Homeland Security, including Assistant Secretary for Cyber, Infrastructure, Risk and Resilience Policy and Chief Privacy Officer. Earlier government roles included work at the U.S. Department of Justice (Office of Legal Policy, Bureau of Alcohol, Tobacco, Firearms and Explosives, and U.S. Attorney's Office for the Eastern District of Virginia) and as Counselor to a member of the Privacy and Civil Liberties Oversight Board, focusing on the U.S. Intelligence Community.References:* Sam Kaplan on LinkedIn* Palo Alto Networks* Unit 42 Research (Palo Alto Networks)* Cyber Information Sharing and Collaboration Program (CISCP) at CISA (Cybersecurity and Infrastructure Security Agency) This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.mastersofprivacy.com/subscribe

Putting the AP in hAPpy
Episode 371: TY 2025: CF/SF Participation? 2 Reasons You Still Check State Requirements & A Process to Perform

Putting the AP in hAPpy

Play Episode Listen Later Jan 22, 2026 28:42


Don't forget to still do your tax reporting research at the State level, even if that State participates in the Combined Federal/State Filing (CF/SF) Program.  For two reasons you still need to check and a process to do it….Keep listening.Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to reduce the potential for fraudulent payments, compliance fines or bad vendor data. Check out the Vendor Process Training Center for 173+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    IRS Publication 1220: Specifications for Electronic Filing of Forms 1097, 1098, 1099, 3921, 3922, 5498,IRS Publication 5717: Information Returns Intake System (IRIS) Taxpayer Portal User Guide Vendor Process Training Center > Resource Library: State Sites for Business/Tax ResearchCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download:  Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Joey Pinz Discipline Conversations
#806 MSSP Alert Live - Caroline Wong:

Joey Pinz Discipline Conversations

Play Episode Listen Later Jan 21, 2026 43:25


Send us a textIn this captivating and wide-ranging conversation, Joey Pinz welcomes cybersecurity executive, author, and Brazilian jiu-jitsu enthusiast Caroline Wong. What begins with jiu-jitsu quickly expands into a profound dialogue about humility, body awareness, emotional regulation, and the unexpected personal growth that comes from combat sports—especially as an adult beginner.Caroline opens up about her upcoming book on AI and cybersecurity, explaining how AI isn't just another shift—it's redefining the entire security landscape. She outlines how to evaluate real AI solutions, why transparency matters, and how LLMs make modern social engineering nearly indistinguishable from authentic communication.She also reflects on tech's wobbly job market, why global talent has reshaped the industry, and which cybersecurity markets AI will completely replace in the years ahead. The conversation deepens as Caroline shares her journey through sobriety, the discipline instilled by her Chinese immigrant parents, the challenges of raising resilient kids in a privileged world, and why joy, peace, and positive impact—not titles—define success.

The Social-Engineer Podcast
Ep. 337 - Security Awareness Series - Using Social Engineering on Yourself with Rosa Rowles

The Social-Engineer Podcast

Play Episode Listen Later Jan 19, 2026 30:54


Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Rosa Rowles. Together, they explore the nuances of social engineering, focusing on the critical role of pretexting and impersonation in security assessments. Their conversation underscores the significance of preparation and adaptability, highlighting how embodying different personas can enhance the effectiveness of security operations. [Jan 19, 2026]   00:00 - Intro 00:27 - Rosa Rowles Intro -          LinkedIn: https://www.linkedin.com/in/shelbydacko/ 00:55 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Offensive Security Vishing Services - https://www.social-engineer.com/offensive-security/vishing/ -          Offensive Security SMiShing Services - https://www.social-engineer.com/offensive-security/smishing/ -          Offensive Security Phishing Services - https://www.social-engineer.com/offensive-security/smishing/ -          Call Back Phishing - https://www.social-engineer.com/offensive-security/call-back-phishing/ -          Adversarial Simulation Services - https://www.social-engineer.com/offensive-security/adversarial-simulation/ -          Social Engineering Risk Assessments - https://www.social-engineer.com/offensive-security/social-engineering-risk-assessment/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - https://www.clutchmerch.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                 02:54 - Long Time Listener... 05:24 - Pretexting and Impersonation 10:06 - Becoming the Part 12:04 - An Actor Prepares 13:54 - Sponsor 15:18 - SE for Yourself 23:25 - Saving FASE 25:46 - Principles in Action 29:34 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

AMERICA OUT LOUD PODCAST NETWORK
The nocebo effect: Jonathan Engler on malevolent psycho-social engineering

AMERICA OUT LOUD PODCAST NETWORK

Play Episode Listen Later Jan 17, 2026 57:43 Transcription Available


America Out Loud PULSE with Dr. Randall Bock – The turning point came when government announced a suppression strategy tied explicitly to vaccination. Engler called the plan “completely insane” and began examining the assumptions beneath it. What he found, he said, was “a huge amount of faulty assumptions and junk science,” paired with a rising hysteria that crowded out dissent...

BarCode
Trespass

BarCode

Play Episode Listen Later Jan 17, 2026 42:13


In this episode, Corey LeBleu, a veteran penetration tester, shares a raw and intense story from his early days in offensive security. Corey walks through a social engineering engagement that took a sharp turn, from being closely watched by a security guard to receiving the call that changed everything. What followed was a confrontation with authority, handcuffs, and a moment that forced him to confront the legal and emotional consequences of impersonation.Through honest storytelling, Corey reflects on the pressure of physical security testing, the thin line between authorization and trouble, and the lessons he carried forward in his career. This episode serves as a cautionary tale about understanding boundaries, respecting authority, and the unseen risks behind revealing what's hidden.00:00 Introduction to Corey LeBleu and His Journey03:34 Corey's Early Career and Learning Path06:34 The Role of Mentorship in Pen Testing09:19 Experiences in Social Engineering and Physical Pen Testing12:22 The Handcuff Incident: A Lesson in Risk15:12 Transitioning to Web Application Pen Testing18:01 The Evolution of Pen Testing Practices20:48 The Impact of AI on Pen Testing23:42 The Future of Pen Testing and Learning for Beginners26:28 Navigating Active Directory and Pen Testing Tools27:35 Essential Training for Web App Pen Testing30:34 Advice for Aspiring Pen Testers32:30 Exploring AI and Learning Resources37:05 Personal Interests and Hobbies39:17 Living in Austin and Local Music SceneSYMLINKS[LinkedIn] – https://www.linkedin.com/in/coreylebleu/Primary platform Corey recommends for connecting with him professionally.[Relic Security] – https://www.relixsecurity.com/Cybersecurity consulting firm founded and run by Corey LeBleu, focused primarily on web application penetration testing and offensive security work.[PortSwigger Academy] – https://portswigger.net/web-securityA free and advanced online training platform for web application security, created by the makers of Burp Suite. Recommended by Corey as one of the best learning resources for modern web app pentesting.[Burp Suite] – https://portswigger.net/burpA widely used web application security testing tool. Corey emphasizes learning Burp Suite as a core skill for anyone entering web app penetration testing.[OWASP Juice Shop] – https://owasp.org/www-project-juice-shop/An intentionally vulnerable web application created by OWASP for learning and practicing web security testing.[OWASP – Open Web Application Security Project] – https://owasp.orgA global nonprofit organization focused on improving software security. Corey previously ran an OWASP project and references OWASP tools and resources throughout his career.[SANS Institute] – https://www.sans.orgA major cybersecurity training and certification organization, referenced in relation to early penetration testing education and the high cost of formal training.[Hack The Box] – https://www.hackthebox.comAn online platform for practicing penetration testing skills in simulated environments.[PromptFoo] – https://promptfoo.devA tool for testing, evaluating, and securing LLM prompts. Mentioned in the context of prompt injection and AI security experimentation.[PyTorch] – https://pytorch.orgAn open-source machine learning framework widely used for deep learning and AI research. Corey mentions it as part of his learning path for understanding how LLMs work.[Hugging Face] – https://huggingface.coAn AI platform providing open-source models, datasets, and tools for machine learning and LLM experimentation.

America Out Loud PULSE
The nocebo effect: Jonathan Engler on malevolent psycho-social engineering

America Out Loud PULSE

Play Episode Listen Later Jan 17, 2026 57:43 Transcription Available


America Out Loud PULSE with Dr. Randall Bock – The turning point came when government announced a suppression strategy tied explicitly to vaccination. Engler called the plan “completely insane” and began examining the assumptions beneath it. What he found, he said, was “a huge amount of faulty assumptions and junk science,” paired with a rising hysteria that crowded out dissent...

Putting the AP in hAPpy
Episode 370: At Least 5 Questions to Ask Now In Preparation for the Publication of the IRS Draft Form W-9

Putting the AP in hAPpy

Play Episode Listen Later Jan 15, 2026 32:14


My head is starting to hurt as clients, subscribers and others reach out to ask about the impact of the IRS draft form W-9.  More and more questions are arising and I have 5 that you should start thinking about….Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to reduce the potential for fraudulent payments, compliance fines or bad vendor data. Check out the Vendor Process Training Center for 173+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    IRS Form W-9:  https://www.irs.gov/pub/irs-pdf/fw9.pdf Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download:  Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com 

Crrow777Radio.com
662- Marketing/News/Entertainment = Social Engineering – You E-Motional Human Resource (Free)

Crrow777Radio.com

Play Episode Listen Later Jan 14, 2026 52:07


Crrow777 Children knew what reverence meant – paid the rent – No tips under 12% – Those were the days – Hair was short and skirts were long – Kate Smith sure could sell a song – You tell me just what went wrong – Those were the days Is there a difference between marketing, (more...)

BTC Sessions
Social Engineering: They Can't Hack Your Bitcoin BUT They Can Hack You!

BTC Sessions

Play Episode Listen Later Jan 13, 2026 65:43


Mentor Sessions Ep. 047: Human Hacking Bitcoin Wallets, Deadly Social Engineering Scams & Nuclear Breaches | Christopher HadnagyWhat if one phone call could drain your Bitcoin wallet like MGM's $190M ransomware nightmare, or social engineering tricks from Jamaican bank heists expose why Bitcoin's human element is your biggest security flaw? In this episode of BTC Sessions, world-renowned human hacking expert Christopher Hadnagy reveals how AI-fueled scams like sextortion are exploding, and targeting Bitcoin holders with FOMO, romance frauds, and voice phishing that bypasses security. He breaks down wild stories of tailgating, breaking into nuclear facilities and owning bank servers with just a clipboard, proving no system is safe from psychological manipulation. Chris warns of dark web guides and shares pro defenses like code words, MFA, and OSINT to hack-proof your sats. From QR phishing to AI accent-erasing vishing, he exposes how hackers spoof LinkedIn for $250K Bitcoin thefts. As founder of Innocent Lives Foundation, Chris flips his skills to hunt predators worldwide, rescuing kids from exploitation rings. If you're self-custodying BTC, this is your must-watch guide to human hacking threats, social engineering secrets, and Bitcoin security mastery—don't let hackers own you!About Christopher HadnagyWebsite: https://www.social-engineer.com/Podcast: https://www.social-engineer.org/podcast/X: @humanhackerInnocent Lives Foundation: https://www.innocentlivesfoundation.org/Chapters:00:00:00 Teaser & Intro00:01:35 Guest Intro & Social Engineering Definition00:02:58 Jamaican Bank Heist00:09:21 Heist Reflections00:10:19 Tactics: OSINT, Pretexts & Influence00:14:51 Bitcoin's Human Flaw00:16:31 Common Pretexts & LinkedIn Scams00:20:57 Scam Losses & Global Impact00:22:55 Motivations: FOMO, Romance & Sextortion00:28:42 AI's Role in Scams00:32:35 Vectors: Phishing, Vishing & MGM00:35:17 Generational Shifts: Smishing/QR00:38:53 Defenses: Verification, Code Words & MFA00:42:19 Breaches & Security Failures00:45:51 Sovereign Computing & Nostr00:47:22 Nuclear Facility Stories00:53:57 Innocent Lives Foundation Origins00:58:06 ILF Mission, Impact & Resources01:02:46 Podcast, Class & ClosingPrevious Episode:Mentor Sessions Ep. 046: Bitcoin 2026 Bull Run, TradFi Myths & Fed Liquidity Secrets | Joe Consorti: https://youtu.be/7p16VXpyEpU⚡ POWERED by Abundant Mines: Fully managed Bitcoin mining. Learn more at https://qrco.de/bgYKPB

Cybercrime Magazine Podcast
Cybercrime Wire For Jan. 13, 2026. Fintech Betterment Hit By Social Engineering. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 13, 2026 1:23


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cyber Crime Junkies
Deepfake Attacks, Voice Cloning, and Why AI Social Engineering Works

Cyber Crime Junkies

Play Episode Listen Later Jan 10, 2026 48:46 Transcription Available


Why modern cybercrime targets trust, urgency, and decision-making instead of systemsDeepfake Attacks, Voice Cloning, and Why AI Social Engineering WorksTraditional fraud used to feel obvious: misspellings, odd links, weird emails. Now? Deepfakes embed perfectly familiar voices and faces into your feed — or your inbox.Listen to Perry Carpenter on this. If you love this topic as much as we do grab Perry's incredible book FAIK available everywhere. Here's a non-affiliated link: https://www.barnesandnoble.com/w/faik-perry-carpenter/1145888787?ean=2940190971293Don't Miss the Deepfake Webinar coming up! You WIll See how you can test out your own deepfake to better understand them.  https://info.knowbe4.com/new-deepfake-training-na?partnerref=blogChapters 00:00 Why the Next Breach Won't Look Like the Last One01:44 Welcome to America in 202603:00 Why Deepfakes Are Exploding Right Now05:20 Yes — A Voice Can Be Cloned in Seconds07:30 What Deepfakes Actually Are (No Hype)09:35 Legitimate Uses vs Weaponized Intent12:45 Why Deepfake Companies Stay Quiet17:05 Faces and Voices Are the New Attack Surface18:30 Stop Asking “Is This Real?” Ask This Instead20:55 Why Spotting Artifacts No Longer Works23:45 The One Question That Cuts Through Deepfakes25:50 What Leaders Should Actually Do Today27:45 Old-School Security Still Wins30:05 Why Detection Tools Are Losing the Race33:10 Romance Scams, HR Fraud, and Deepfake Hiring35:45 10 of 15 Job Candidates Were Fake — Here's Why38:40 Fake Workers, Real Access, Real Damage42:20 Deepfakes as Multi-Stage AttackQuestion? Text our Studio direct.Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show

Cloud Accounting Podcast
Can AI Replace “Thought Leaders”? A 2026 Reality Check

Cloud Accounting Podcast

Play Episode Listen Later Jan 8, 2026 50:33


Think AI will free you from ‘mundane bookkeeping' so you can do advisory? Blake and David say it's the opposite. Hear how owners already use AI as a de facto CFO, why drafting narratives—not matching bank feeds—is the real win, what the ‘AI premium' means in a billable-hour world, and the two numbers firm owners should track in 2026: monthly recurring revenue and bottom-line profit.SponsorsUNC - http://accountingpodcast.promo/uncOnPay - http://accountingpodcast.promo/onpayTaxBandits - http://accountingpodcast.promo/taxbanditsChapters(01:35) - News Highlights and Sponsor Acknowledgements (03:56) - AI in Small Business Accounting (07:04) - AI's Impact on Accounting Tasks (10:01) - Thought Leader Survey on AI in Accounting (19:56) - AI Premium and Job Automation (25:27) - Survey Answers from Accounting Thought Leaders (25:54) - AI's Role in Strategy and Decision Making (28:24) - Impact of AI on Competitive Landscape (30:50) - AI's Effect on Costs in Accounting Firms (31:54) - AI Replacing Staff Accountants (33:24) - Personal Job Security and AI (41:05) - AI Influencers and Future Experiments (49:24) - Conclusion and CPE Information  Show NotesThese Small-Business Owners Are Putting AI to Good Use https://www.wsj.com/tech/ai/small-business-ai-chatgpt-prompts-0c9a95c4 AI Thought Leaders Survey 2026: Process Predictions https://www.accountingtoday.com/list/ai-thought-leaders-survey-2026-process-predictions Tech Spending Outpacing People Spending as Firms Adopt AI https://www.accountingtoday.com/list/tech-spending-outpacing-people-spending-as-firms-adopt-ai How Much is the 'AI Premium?' https://www.accountingtoday.com/list/how-much-is-the-ai-premium AI Can't Replace Accountants. When Could It? https://www.accountingtoday.com/list/ai-cant-replace-accountants-when-could-it Accounting in 2026: The Year Ahead in Numbers https://www.accountingtoday.com/list/accounting-in-2026-the-year-ahead-in-numbers AI Vending Machine Lost $1,000 to Social Engineering https://www.wsj.com/tech/ai/anthropic-ai-claude-vending-machine-c7baef6f Anthropic's Project Vend Phase 2 https://www.anthropic.com/research/project-vend-2 Trump Commutes Sentence of Private Equity CEO Convicted of Fraud https://www.cnn.com/2025/12/01/politics/david-gentile-trump-pardon Trump Commutes 7-Year Prison Sentence of Former Private Equity CEO David Gentile https://www.nbcnews.com/politics/white-house/trump-commutes-7-year-prison-sentence-former-private-equity-ceo-david-rcna246744 California's Controversial Wealth Tax Proposal Leaves Billionaires With Little Way Out https://www.cnbc.com/2026/01/08/california-wealth-tax-proposal-leaves-billionaires-with-little-way-out.html California Could Impose a Billionaire Tax. Here's How It Would Work https://www.cbsnews.com/news/california-billionaire-tax-ballot-initiative-how-it-works/ New Tax on the Wealth of Billionaires https://lao.ca.gov/BallotAnalysis/Initiative/2025-024Need CPE?Get CPE for listening to podcasts with Earmark: https://earmarkcpe.comSubscribe to the Earmark Podcast: https://podcast.earmarkcpe.comGet in TouchThanks for listening and the great reviews! We appreciate you! Follow and tweet @BlakeTOliver and @DavidLeary. Find us on Facebook and Instagram. If you like what you hear, please do us a favor and write a review on Apple Podcasts or Podchaser. Call us and leave a voicemail; maybe we'll play it on the show. DIAL (202) 695-1040.SponsorshipsAre you interested in sponsoring The Accounting Podcast? For details, read the prospectus.Need Accounting Conference Info? Check out our new website - accountingconferences.comLimited edition shirts, stickers, and other necessitiesTeePublic Store: http://cloudacctpod.link/merchSubscribeApple Podcasts: http://cloudacctpod.link/ApplePodcastsYouTube: https://www.youtube.com/@TheAccountingPodcastSpotify: http://cloudacctpod.link/SpotifyPodchaser: http://cloudacctpod.link/podchaserStitcher: http://cloudacctpod.link/StitcherOvercast: http://cloudacctpod.link/OvercastWant to get the word out about your newsletter, webinar, party, Facebook group, podcast, e-book, job posting, or that fancy Excel macro you just created? Let the listeners of The Accounting Podcast know by running a classified ad. Go here to create your classified ad: https://cloudacctpod.link/RunClassifiedAdTranscriptsThe full transcript for this episode is available by clicking on the Transcript tab at the top of this page

Putting the AP in hAPpy
Episode 369: Debra R Richardson and Jason Dinesen Discuss the Draft Version of the IRS Form W-9 And What It May Require for Vendor Teams

Putting the AP in hAPpy

Play Episode Listen Later Jan 8, 2026 36:37


My guest is Jason Dinesen, and he and I discuss the IRS draft version of the IRS Form W9 with a revision date of January 2026.  We address questions such as will it really be published in January? What you should do before it's published, what you should do after, including why this revision may require action for the vendor team that was not required with recent revisions….  Keep listening.  Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to reduce the potential for fraudulent payments, compliance fines or bad vendor data. Check out the Vendor Process Training Center for 173+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    Jason Dinesen YouTube Channel:  Accounting in the Wild Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download:  Vendor Validation Reference List with Resource Links Vendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Cybercrime Magazine Podcast
AI Security Podcast. Social Engineering. Teresa Zielinski, GE Vernova & Brian Long, Adaptive.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 7, 2026 15:10


Brian Long is the CEO & Co-Founder at Adaptive Security. In this episode, he joins host Paul John Spaulding and Teresa Zielinski, Vice President and Global CISO at GE Vernova, to discuss social engineering and how it is evolving in light of artificial intelligence advancements. The AI Security Podcast is brought to you by Adaptive Security, the leading provider of AI-powered social engineering prevention solutions, and OpenAI's first and only cybersecurity investment. To learn more about our sponsor, visit https://AdaptiveSecurity.com

On the Schmooze Podcast: Leadership | Strategic Networking | Relationship Building
HUB 486: AUTHOR PANEL - Antonio Valles and Kathy Sparrow

On the Schmooze Podcast: Leadership | Strategic Networking | Relationship Building

Play Episode Listen Later Jan 6, 2026 45:17


When you write a book, you're not just sharing your knowledge, you're planting the seeds for long-term growth. Your book can open unexpected doors: attracting ideal clients, boosting your visibility, and positioning you as a trusted authority in your space. But to make that kind of impact, you need more than a finished manuscript—you need a strategy that helps your book connect with the right people and lead them back to your business. That's exactly why I started the Biz Book Pub Hub. It's a free resource where experts, authors, and writers come together to support each other through every stage of the book journey—from blank page to book launch and beyond. You can explore all of it at www.BizBookPubHub.com . Today, I'm excited to introduce two incredible authors: Antonio Valles wrote “Empower Your Presentation Skills: The Confident Entrepreneur's Guide to Grow Your Business,” a hands-on guide for professionals ready to level up their speaking skills and use presentations as a tool for building authority and closing more business. Kathy Sparrow is the author of “Ignite Your Leadership: Proven Tools to Energize Teams, Fuel Momentum, and Accelerate Results,” a book packed with powerful tools and insights to help leaders inspire their teams and create lasting organizational success. Please join me in welcoming Antonio and Kathy.  In this episode, we discuss the following:

Cyber Security Today
Inside the Dark Web: Exploring Cybercrime with Expert David Décary-Hétu

Cyber Security Today

Play Episode Listen Later Dec 31, 2025 53:02


In this episode, the host shares a pre-recorded favorite interview with David Decary-Hetu, a criminologist at the University of Montreal. They discuss the dark web, its technology, and its role in cybercrime. Decary-Hetu explains how the dark web operates, its users, and the dynamics between researchers and law enforcement in tackling cyber threats. Key topics include the economics of illicit markets, the cat-and-mouse game between law enforcement and criminals, the role of cryptocurrencies, and the evolution of cyber threats. The episode offers insights into the social aspects of cybercrime and the measures being taken to combat it. 00:00 Introduction and Sponsor Message 00:52 Understanding the Dark Web 02:16 Interview with David Decary-Hetu 05:10 The Basics of the Dark Web 06:27 Technology Behind the Dark Web 14:49 Law Enforcement Challenges 21:50 Trust and Transactions on the Dark Web 23:45 Recruitment and Structure of Cybercriminals 26:42 Cultural Dynamics in Hacking Communities 27:32 Researching the Impact of Technology on Crime 29:01 Challenges in Policing the Dark Web 30:12 The Role of Social Engineering in Cybercrime 31:18 Law Enforcement Strategies and Conditional Deterrence 32:09 The Evolution of Cybercrime and Cryptocurrency 41:24 Legal and Ethical Considerations in Cybercrime 43:47 Advice for Policymakers and Corporations 48:44 Educational Resources and Conferences 50:57 Conclusion and Final Thoughts

Hashtag Trending
Best of 2025 Encore: Inside the Dark Web: Exploring Cybercrime with Expert David Décary-Hétu

Hashtag Trending

Play Episode Listen Later Dec 31, 2025 53:02


In this episode, the host shares a pre-recorded favorite interview with David Decary-Hetu, a criminologist at the University of Montreal. They discuss the dark web, its technology, and its role in cybercrime. Decary-Hetu explains how the dark web operates, its users, and the dynamics between researchers and law enforcement in tackling cyber threats. Key topics include the economics of illicit markets, the cat-and-mouse game between law enforcement and criminals, the role of cryptocurrencies, and the evolution of cyber threats. The episode offers insights into the social aspects of cybercrime and the measures being taken to combat it. 00:00 Introduction and Sponsor Message 00:52 Understanding the Dark Web 02:16 Interview with David Decary-Hetu 05:10 The Basics of the Dark Web 06:27 Technology Behind the Dark Web 14:49 Law Enforcement Challenges 21:50 Trust and Transactions on the Dark Web 23:45 Recruitment and Structure of Cybercriminals 26:42 Cultural Dynamics in Hacking Communities 27:32 Researching the Impact of Technology on Crime 29:01 Challenges in Policing the Dark Web 30:12 The Role of Social Engineering in Cybercrime 31:18 Law Enforcement Strategies and Conditional Deterrence 32:09 The Evolution of Cybercrime and Cryptocurrency 41:24 Legal and Ethical Considerations in Cybercrime 43:47 Advice for Policymakers and Corporations 48:44 Educational Resources and Conferences 50:57 Conclusion and Final Thoughts

Fringe Radio Network
History of the Committee on Public Information (Part 1) - The Odd Man Out

Fringe Radio Network

Play Episode Listen Later Dec 29, 2025 50:30 Transcription Available


This week's show is sixth in a series called Democracy Propaganda, and it focuses on the techniques and tactics developed from the work of Sigmund Freud, his nephew, the father of Public Relations Edward Bernays, and Walter Lippmann and proceeding Psychoanalysts and PR Propagandists. It will show how the Wilson administration formed a group called The Committee On Public Information to trick the non-interventionist American public into their sacrifice in a war that had nothing to do with them. This domestic propaganda dept used every means necessary, and hired big business PR men to form various ways to essentially brain wash the minds of the public and so, the war to end all wars, became the war that began eternal war. As Lippman put it, the quest for "World Democracy" began and its all been downhill ever since. We'll also look at numerous authors along the way, and talk about the study of group behaviors, psychological warfare, and the quest to learn how to control the minds of the masses. Join me as we go down the rabbit hole once again, far beyond the mainstream! Cheers and Blessings Support My Work: https://www.patreon.com/theoddmanout Buy Me A Coffee! https://buymeacoffee.com/theoddmanoutVenmo Tips - @theoddmanoutCash App Tips - https://cash.app/$theoddmanout   The Odd Man Out Merch Store At Bonfire: https://www.bonfire.com/store/the-odd-man-out/ TeeSpring: https://theoddmanout.creator-spring.com/All Links: https://linktr.ee/_theoddmanoutOddman Rumble: https://rumble.com/user/TheOddManOut

Unspoken Security
Can We Social Engineer the Bad Guys to Shut Them Down? (Encore of Ep 32)

Unspoken Security

Play Episode Listen Later Dec 25, 2025 66:54 Transcription Available


In this encore presentation of Unspoken Security Episode 32 (originally published on 3 April 2025), host AJ Nash sits down with Chris Birch, an intelligence practitioner with nearly 30 years of experience, to discuss the ever-evolving landscape of social engineering. Chris's unique perspective comes from leading teams that actively engage with threat actors, turning the tables on those who typically exploit vulnerabilities.Chris details how social engineering is simply human manipulation, a skill honed from birth. He explains how attackers leverage fear and greed, the fastest and cheapest ways to manipulate individuals. He also dives into how attacks have evolved, highlighting the dangers of increasingly sophisticated tactics like deepfakes and the blurring lines between legal and illegal applications of social engineering.The conversation also explores the crucial role of organizational culture in cybersecurity. Chris emphasizes that awareness, not just education, is key to defense. He advocates for sharing threat intelligence widely within organizations and across industries, empowering everyone to become a sensor against social engineering attempts. Chris also shares a surprising personal fear, offering a lighthearted end to a serious discussion.Send us a textSupport the show

No Password Required
No Password Required Podcast Episode 67 — Gina Yacone

No Password Required

Play Episode Listen Later Dec 21, 2025 40:17


Gina Yacone — Virtual CISO at Trace3 and Roller Derby Penalty Box VisitorLive from B-Sides Jacksonville, No Password Required welcomes Gina Yacone, Virtual CISO at Trace3. Jack Clabby of Carlton Fields, P.A. and Sarina Gandy, host and producer of the CyberBay Podcast, host a conversation on Gina's unconventional career path, leadership under pressure, and the power of community in cybersecurity. With career stops in private investigation, digital forensics, and executive security, Gina brings a people-first, purpose-driven perspective to complex cyber risk.Gina shares how her early work as a private investigator on high-profile criminal defense cases laid the foundation for her success in cybersecurity. She also reflects on raising her hand for big challenges, the rewards and risks of always saying yes, and how authenticity has guided her. She offers insight on why conference hallway conversations can be just as impactful as keynote sessions.A visible advocate for the cybersecurity community, Gina speaks openly about setting healthy mentorship boundaries and building resilient professional networks.The episode wraps with the Lifestyle Polygraph, where Gina lightens the mood with stories from her roller derby days, dream Amazing Race partners, and why John Wick might just be the ultimate executive assistant.Follow Gina on LinkedIn: https://www.linkedin.com/in/ginayacone/ Chapters:00:00 Introduction to Cybersecurity and B-Sides Jacksonville01:16 Gina Yacone's Unique Journey to Cybersecurity06:22 Navigating Burnout in Cybersecurity08:06 The Importance of Raising Your Hand10:04 Adapting Leadership Styles in Different Roles 14:03 Being a Role Model for Women in Cybersecurity16:34 How to Establish a Good Mentee and Mentor Relationship18:50 Feedback and Constructive Criticism22:55  The Value of Hallway Conversations26:19 The Lifestyle Polygraph: Fun and Insights38:54 Conclusion and Future Connections

The Underclass Podcast
The Influencer Industrial Complex w/ Dana DooDah

The Underclass Podcast

Play Episode Listen Later Dec 20, 2025 178:43


This week, special guest Dana DooDah of the "Rotting Jewels" podcast and What Is "The Process"? joins us in the trenches on the frontlines of the MindWar. As we draw back the curtain yet again, we're forced to bear witness to the inauthentic, yet affective emotional appeals of these political actors tasked with doing the bidding of special interest groups who inherently obstruct the natural order of society.From PSYOP to MindWar: The Psychology of Victory, to the Influencer Industrial Complex and the TPUSA conspiracy, the age-old playbook and recognizable patters begin to take form. Psychological operations and socially engineered contagion are the sophisticated weapons of war, manipulating emotions and social behavioral patterns to spread the mind virus within any given group, often relying on advanced psychological tactics while perfectly orchestrating social influence to achieve specific outcomes.Please consider supporting our work- Dana's YouTube: https://www.youtube.com/@UCuOZzdUe7DPzqqoelyHn-agDana on X: https://x.com/DanaDooDahDana's Patreon: https://www.patreon.com/rottingjewelsDana's PayPal: https://www.paypal.com/paypalme/rottingxjewelsAustin's Patreon: https://www.patreon.com/c/TheUnderclassPodcastAustin's Spreaker: https://www.spreaker.com/podcast/the-underclass-podcast--6511540Austin's Rumble: https://rumble.com/user/TheUnderclassPodcastAustin's YouTube: https://www.youtube.com/@TheUnderclassPodcast#MindWar #PaulVallely #WomenDefendingAmerica #FeministFascistBrigade #MichaelAquino #InfluencerIndustrialComplex #SocialEngineering #TavistockInstitute #CandaceOwens #CharlieKirk #ErikaKirk #PragerU #TPAC #GeorgeFarmer #LordMichaelFarmer #TPUSASexCrimes #CHILDHELPINC #OperationBabylift #FriendsOfChildrenFoundation #TheDelphiMurdersBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-underclass-podcast--6511540/support.

Cyber Security Today
Year-End Review: The Highs and Lows of Cybersecurity in 2025

Cyber Security Today

Play Episode Listen Later Dec 20, 2025 55:25


Cybersecurity Today brings you a special year-end episode, featuring noteworthy guests Tammy Harper from Flare, Laura Payne from White Tuque, David Shipley from Beauceron Security, and John Pinard, co-host of Project Synapse. This episode delves into the pivotal cybersecurity stories of 2025, including a detailed discussion on MFA phishing attacks, the effectiveness of cybersecurity training, and the troubling trends in ransomware payments. Also covered are the evolving roles of AI in both defending and perpetrating cyber crimes. The guests share their insights, hopes, and concerns for the industry's future, emphasizing the importance of awareness, empathy, and community. Tune in as they reflect on the past year's challenges and successes, and look forward to more resilient and innovative cybersecurity practices in 2026. 00:00 Introduction and Sponsor Message 00:20 Meet the Panelists 01:30 Reflecting on the Year: Achievements and Goals 02:08 Naughty and Nice: Cybersecurity Challenges 03:44 The Rise of Fake Torrents and Piracy 07:07 Ransomware and Data Extortion Trends 18:00 The Importance of Multi-Factor Authentication (MFA) 26:15 The Persistent Threat of Email Phishing 27:24 AI Vulnerabilities and Security Concerns 28:18 The Role of AI in Social Engineering 29:07 The Impact of AI on Cybersecurity 31:15 The Future of AI and Security Measures 34:40 The Human Element in Cybersecurity 39:49 Hopes and Predictions for the Future 45:33 Final Thoughts and Reflections

Putting the AP in hAPpy
Episode 368: Holiday Out-of-Office Messages - A Fraudster's Favorite Gift – Get 4 Best Practices to Avoid Payment Fraud When You're Out

Putting the AP in hAPpy

Play Episode Listen Later Dec 18, 2025 18:25


Holidays are the best times for cybercriminals – they know we are busy trying to get out of the office and all they need is the information we typically include in an Out of Office automated email reply.  Don't give it to them – use these best practices to not let your absence lead to payment fraud. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:     Mailguard Article: 

Trust Issues
EP 21 - When attackers log in: Pausing for perspective in the age of instant answers

Trust Issues

Play Episode Listen Later Dec 16, 2025 43:50


In this episode of Security Matters, host David Puner welcomes back David Higgins, senior director in CyberArk's Field Technology Office, for a timely conversation about the evolving cyber threat landscape. Higgins explains why today's attackers aren't breaking in—they're logging in—using stolen credentials, AI-powered social engineering, and deepfakes to bypass traditional defenses and exploit trust.The discussion explores how the rise of AI is eroding critical thinking, making it easier for even seasoned professionals to fall for convincing scams. Higgins and Puner break down the dangers of instant answers, the importance of “never trust, always verify,” and why zero standing privilege is essential for defending against insider threats. They also tackle the risks of shadow AI, the growing challenge of misinformation, and how organizations can build a culture of vigilance without creating a climate of mistrust.Whether you're a security leader, IT professional, or just curious about the future of digital trust, this episode delivers actionable insights on identity security, cyber hygiene, and the basics that matter more than ever in 2026 and beyond.

The Jordan Harbinger Show
1255: Abbie Maroño | Mastering Persuasion with Social Engineering

The Jordan Harbinger Show

Play Episode Listen Later Dec 11, 2025 87:35


The same tactics that con artists use to manipulate you can be used to build trust. Dr. Abbie Maroño explains the psychology of ethical social engineering. Full show notes and resources can be found here: jordanharbinger.com/1255What We Discuss with Dr. Abbie Maroño:Manipulation vs. Influence: It's all about intention. The same psychological tactics can be used for good or evil. The difference? Manipulation disregards harm to others and exploits fear, while influence builds mutual benefit and makes people want to collaborate with you. Con artists use manipulation because it's faster — but ethical influence wins every time over the long term.Scammers weaponize your emotions to bypass critical thinking. When emotions are activated, your prefrontal cortex — the brain's logic center — gets overridden. That's why con artists use artificial urgency ("only 24 hours left!") and exclusivity ("just for you"). They only need to appear trustworthy, not actually be it, because you'll act before you can verify.Shame is the silent weapon that keeps victims quiet. The reason so many scam victims never report what happened isn't denial, it's embarrassment. Shame becomes its own prison, preventing people from seeking help or warning others. This silence protects predators and perpetuates cycles of exploitation.Short-term thinking is the con artist's best friend. Manipulators prey on our psychological bias toward immediate rewards. Getting $100 now feels more valuable than $150 later — even when it isn't. This "survival mode" mentality keeps people chasing quick wins rather than building something sustainable.To protect yourself, remember that other people's emotions usually have nothing to do with you. When someone pushes your buttons or creates pressure, pause and recognize it for what it is: a tactic, not a personal attack. Shelving your emotional reaction keeps your critical thinking intact — and that's your best defense against manipulation and your greatest asset in any negotiation.And much more...And if you're still game to support us, please leave a review here — even one sentence helps! Sign up for Six-Minute Networking — our free networking and relationship development mini course — at jordanharbinger.com/course!Subscribe to our once-a-week Wee Bit Wiser newsletter today and start filling your Wednesdays with wisdom!Do you even Reddit, bro? Join us at r/JordanHarbinger!This Episode Is Brought To You By Our Fine Sponsors: Function Health: $100 credit: functionhealth.com/jordan, code JORDAN100LinkedIn: Post your job for free: linkedin.com/jordanProgressive Insurance: Free online quote: progressive.comLand Rover Defender: landroverusa.comHomes.com: Find your home: homes.comSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

On the Schmooze Podcast: Leadership | Strategic Networking | Relationship Building

I'm pleased to interview one of our Biz Book Pub Hub Partners. Our Hub Partners are experts who support entrepreneurs along their author journey.  Today's guest is a powerhouse in the world of thought leadership and publishing—a true connector who helps experts transform their ideas into influential books that make a real difference. She's built an extraordinary career as both an author and strategist, earning six traditional publishing deals, ten thought leader titles, a New York agent, and even a feature on Oprah. She's also a Wall Street Journal bestselling author whose award-winning networking books were licensed by major brands like Motorola and Yale's Graduate School of Business. She founded Networlding Publishing, where she's guided more than 175 thought leaders through every stage of writing and launching their first books. Along the way, she's helped global companies like Cisco, Office Depot, and American Express build powerful leadership networks—and even created a thought leader podcast to amplify her authors' visibility and success. Her passion is helping authors leverage both their books and their relationships to create meaningful impact and lasting influence. Please join me in welcoming Melissa G. Wilson.  In this episode, we discuss the following:

ITSPmagazine | Technology. Cybersecurity. Society
Nothing Has Changed in Cybersecurity Since the 80s — And That's the Real Problem | A Conversation with Steve Mancini | Redefining Society and Technology with Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 7, 2025 43:03


Dr. Steve Mancini: https://www.linkedin.com/in/dr-steve-m-b59a525/Marco Ciappelli: https://www.marcociappelli.com/Nothing Has Changed in Cybersecurity Since War Games — And That's Why We're in Trouble"Nothing has changed."That's not what you expect to hear from someone with four decades in cybersecurity. The industry thrives on selling the next revolution, the newest threat, the latest solution. But Dr. Steve Mancini—cybersecurity professor, Homeland Security veteran, and Italy's Honorary Consul in Pittsburgh—wasn't buying any of it. And honestly? Neither was I.He took me back to his Commodore 64 days, writing basic war dialers after watching War Games. The method? Dial numbers, find an open line, try passwords until one works. Translate that to today: run an Nmap scan, find an open port, brute force your way in. The principle is identical. Only the speed has changed.This resonated deeply with how I think about our Hybrid Analog Digital Society. We're so consumed with the digital evolution—the folding screens, the AI assistants, the cloud computing—that we forget the human vulnerabilities underneath remain stubbornly analog. Social engineering worked in the 1930s, it worked when I was a kid in Florence, and it works today in your inbox.Steve shared a story about a family member who received a scam call. The caller asked if their social security number "had a six in it." A one-in-nine guess. Yet that simple psychological trick led to remote software being installed on their computer. Technology gets smarter; human psychology stays the same.What struck me most was his observation about his students—a generation so immersed in technology that they've become numb to breaches. "So what?" has become the default response. The data sells, the breaches happen, you get two years of free credit monitoring, and life goes on. Groundhog Day.But the deeper concern isn't the breaches. It's what this technological immersion is doing to our capacity for critical thinking, for human instinct. Steve pointed out something that should unsettle us: the algorithms feeding content to young minds are designed for addiction, manipulating brain chemistry with endorphin kicks from endless scrolling. We won't know the full effects of a generation raised on smartphones until they're forty, having scrolled through social media for thirty years.I asked what we can do. His answer was simple but profound: humans need to decide how much they want technology in their lives. Parents putting smartphones in six-year-olds' hands might want to reconsider. Schools clinging to the idea that they're "teaching technology" miss the point—students already know the apps better than their professors. What they don't know is how to think without them.He's gone back to paper and pencil tests. Old school. Because when the power goes out—literally or metaphorically—you need a brain that works independently.Ancient cultures, Steve reminded me, built civilizations with nothing but their minds, parchment, and each other. They were, in many ways, a thousand times smarter than us because they had no crutches. Now we call our smartphones "smart" while they make us incrementally dumber.This isn't anti-technology doom-saying. Neither Steve nor I oppose technological progress. The conversation acknowledged AI's genuine benefits in medicine, in solving specific problems. But this relentless push for the "easy button"—the promise that you don't have to think, just click—that's where we lose something essential.The ultimate breach, we concluded, isn't someone stealing your data. It's breaching the mind itself. When we can no longer think, reason, or function without the device in our pocket, the hackers have already won—and they didn't need to write a single line of code.Subscribe to the Redefining Society and Technology podcast. Stay curious. Stay human.My Newsletter? Yes, of course, it is here: https://www.linkedin.com/newsletters/7079849705156870144/ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

The Underclass Podcast
Already Dead: D.C. National Guard Shooting, Venezuela Regime Change, TPUSA Sex Crimes, & More

The Underclass Podcast

Play Episode Listen Later Dec 3, 2025 118:52


Time Stamps: 3:27 - D.C. National Guard Shooting15:52 - Venezuela Regime Change & The Somali Conflict34:55 - (First Caller) Influencer Industrial Complex - "All the world's a stage"50:57 - Postmortem/Call-in Portion57:57 - TPUSA Sex Crimes1:06:42 - Haitian Island Sex Slave Conspiracy1:24:50 - The New Poverty Line & the "American Nightmare"1:32:03 - TSA Announces $45 Fee for Passengers with no REAL ID1:32:45 - Indiana Pastor's Son Charged with Child Sex CrimesVenture into the shadowy realms of power and secrecy with Already Dead, where hosts Jose Galison (@towergangjose) and Austin Picard (@theatrethugawp) dissect the intricate web of conspiracy, covert operations, and the underlying political machinations that might just be pulling the strings of our society.What to Expect: Live Listener Interaction: Call in to share your theories, ask burning questions, or discuss personal experiences related to the topics at hand. In-Depth Explorations: Each episode focuses on a different conspiracy or hidden aspect of political history, offering a platform to question and analyze what's often left unsaid. Thought-Provoking Guests: We invite individuals with insider knowledge or those who've taken the red pill to discuss topics that range from the fringe to the forefront of conspiracy culture. Critical Analysis of Current Affairs: We don't just report on events; we interpret them through the lens of parapolitics, looking for patterns and hidden agendas.Join Us: Every Tuesday at 9:30 PM ET, dive into the depths of the unknown with us. Subscribe, participate in our live call-ins, and be part of a community that seeks to understand the world beyond the surface narrative.Disclaimer: This podcast thrives on speculation, hypothesis, and the examination of alternative theories. It's meant to provoke thought and encourage personal research. Not all discussed is proven fact, but rather a call to question, explore, and understand.Warning: For those not ready to challenge their worldview, tread carefully. Once you enter the world of Already Dead, you might find that the truth is often already dead to the uninitiated. Welcome aboard, where curiosity is your guide.Please consider supporting our work-Austin's Patreon: https://www.patreon.com/c/TheUnderclassPodcastAustin's Spreaker: https://www.spreaker.com/podcast/the-underclass-podcast--6511540Austin's Rumble: https://rumble.com/user/TheUnderclassPodcastAustin's YouTube: https://www.youtube.com/@TheUnderclassPodcast#DCNationalGuardShooting #ModernGladio #AfghanPhoenixProgram #VenezuelaRegimeChange #TheSomaliConflict #ImmigrationCrisis #InfluencerIndustrialComplex #InfluenceOperation #SocialEngineering #IdeologicalSubversion #TavistockInstitute #Committeeof300 #ClubofRome #TPUSASexCrimes #HaitianIslandSexSlavePlot #TheAmericanNightmare #TSARealID #IndianaChildSexCrimes #DelphiMurders #PedophileOccupiedGovernmentBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-underclass-podcast--6511540/support.

Tin Foil Hat With Sam Tripoli
#938 Social Engineering by Catastrophism with Mark Windows

Tin Foil Hat With Sam Tripoli

Play Episode Listen Later Nov 1, 2025 110:43


In the latest Tin Foil Hat episode, Sam Tripoli and guest Mark Waters explore the Age of Un-Enlightenment, suggesting modern society is drifting into darkness despite all its progress. They dive into theories linking Britain to the Lost Tribe of Judah and discuss a hidden clash between a Black Magic Temple and a mysterious counter force. It's a wild ride through history, spirituality, and the unseen powers shaping our world.   This episode is lovingly dedicated to the memory of Pollyanna, the most devoted and joyful companion, fondly remembered as Stinkbutt. Check out Sam Tripoli's premium content at SamTripoli.com! Please subscribe to the new Tin Foil Hat youtube channel:  https://www.youtube.com/@TinFoilHatYoutube Check out Sam Tripoli's 4th Crowd Work Special "Deep Dish: Live From Chicago" Oct 4th on Youtube.com/SamTripoliComedy Grab your copy of the 2nd issue of the Chaos Twins now and join the Army Of Chaos: https://bit.ly/415fDfY Check out Sam "DoomScrollin with Sam Tripoli and Midnight Mike" Every Tuesday At 4pm pst on Youtube, X Twitter, Rumble and Rokfin! Join the WolfPack at Wise Wolf Gold and Silver and start hedging your financial position by investing in precious metals now!  Go to samtripoli.gold and use the promo code "TinFoil" and we thank Tony for supporting our show. CopyMyCrypto.com: The 'Copy my Crypto' membership site shows you the coins that the youtuber 'James McMahon' personally holds - and allows you to copy him. So if you'd like to join the 1300 members who copy James, then stop what you're doing and head over to: https://copymycrypto.com/tinfoilhat/ You'll not only find proof of everything I've said - but my listeners get full access for just $1 LiveLongerFormula.com: Check out https://www.livelongerformula.com/sam — Christian is a longevity author and functional health expert who helps you fix your gut, detox, boost testosterone, and sleep better so you can thrive, not just survive. Watch his free masterclass on the 7 Deadly Health Fads, and if it clicks, book a free Metabolic Function Assessment to get to the root of your health issues. Want to see Sam Tripoli live?  Get tickets at SamTripoli.com:  Las Vegas, NV:  Tin Foil Hat Comedy Live At The Virgin Hotel Nov 21st https://www.etix.com/ticket/p/95279813/tin-foil-hat-comedy-with-sam-tripoli-and-eddie-bravo-las-vegas-24-oxford   Minneapolis: Headlining The House Of Comedy Dec 11th-13th https://samtripoli.com/events/?paged=3   Morris Plains, NJ: New Year's Eve At The Dojo Of Comedy Dec 31st https://www.tiffscomedy.com/events/121228   Please Check Out Mark Waters's internet: Website: https://windowsontheworld.net Youtube: https://www.youtube.com/@markwindowsontheworld    Please check out Sam Tripoli's internet: Linktree: https://linktr.ee/samtripoli Please Follow Sam Tripoli's Stand Up Youtube Page: https://www.youtube.com/@SamTripoliComedy Please Follow Sam Tripoli's Comedy Instagram:  https://www.instagram.com/samtripolicomedy/ Please Follow Sam Tripoli's Podcast Clip Instagram: https://www.instagram.com/samtripolispodcastclips/    Huge Thank You To Our Sponsor: Home Chef: Home Chef delivers fresh ingredients and chef-designed recipes, conveniently to your doorstep to simplify your cooking experience.  Users of leading meal kits have rated Home Chef #1 in quality, convenience, value, taste, AND recipe ease. For a limited time, Home Chef is offering my listeners FIFTY PERCENT OFF and free shipping for your first box PLUS free dessert for life! Go to Home Chef dot com slash TINFOIL. Cornbread Hemp: If you're looking for a healthier way to enjoy a carefree moment, you have to give Cornbread Hemp a try! They've created the first-ever USDA Organic THC gummy that's 100% legal. As a special offer for Tin Foil Hat listeners, you can get 30% off your first order! Just visit cornbreadhemp.com/TinFoil and use promo code TinFoil at checkout. Again that's cornbreadhemp.com/TinFoil and use code TinFoil for 30% off your first order. Cheers to a healthier happy hour!