Act of taking another's property without permission or consent
POPULARITY
Today we have Ziv Mador, VP of Security Research from LevelBlue SpiderLabs discussing their work on "SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp." Researchers at LevelBlue SpiderLabs have identified a new Brazilian banking Trojan dubbed Eternidade Stealer, spread through WhatsApp hijacking and social engineering campaigns that use a Python-based worm to steal contacts and distribute malicious MSI installers. The Delphi-compiled malware targets Brazilian victims, profiles infected systems, dynamically retrieves its command-and-control server via IMAP email, and deploys banking overlays to harvest credentials from financial institutions and cryptocurrency platforms. The campaign reflects the continued evolution of Brazil's cybercrime ecosystem, combining WhatsApp propagation, geofencing, encrypted C2 communications, and process injection to maintain stealth and persistence. The research can be found here: SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp Learn more about your ad choices. Visit megaphone.fm/adchoices
Today we have Ziv Mador, VP of Security Research from LevelBlue SpiderLabs discussing their work on "SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp." Researchers at LevelBlue SpiderLabs have identified a new Brazilian banking Trojan dubbed Eternidade Stealer, spread through WhatsApp hijacking and social engineering campaigns that use a Python-based worm to steal contacts and distribute malicious MSI installers. The Delphi-compiled malware targets Brazilian victims, profiles infected systems, dynamically retrieves its command-and-control server via IMAP email, and deploys banking overlays to harvest credentials from financial institutions and cryptocurrency platforms. The campaign reflects the continued evolution of Brazil's cybercrime ecosystem, combining WhatsApp propagation, geofencing, encrypted C2 communications, and process injection to maintain stealth and persistence. The research can be found here: SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp Learn more about your ad choices. Visit megaphone.fm/adchoices
We've gone through the archives and stitched together every break around the infamous drink stealer at the Triple MCG as Spud and Saturday Rub team are threatened with litigation suppressing the journo's name!See omnystudio.com/listener for privacy information.
We're chillin' like Dylan this week as we talk about the only Stealer's Wheel song. Covers by: Susanna Hoffs, Frantic Flintstones, Louise, Michael Bublé, Tim Timebomb, Scary Pockets ft. Lauren Ruth Ward, Jaylee Roberts Tidal playlist here
Kidnapped: Elizabeth Smart on Netflix, Timothy Busfield released, Nick Reiner rehab roommate speaks, Killer Casanova Chris Watts, Brooklyn Beckham's estrangement, and Corey Feldman unleashed. There is a killer snowstorm on the way. Timothy Busfield has a major win in court and is released from jail. Carlos Beltran and Andruw Jones to the MLB HOF. When will there be the Steroid Hall of Fame? The 2026 Razzie Nominations revealed. He-Man is back with a new Masters of the Universe film. Remember if you call Legacy Partner's and mention us, you're entered to win a $50 gift card. Congrats to our 2 most recent winners _________ and __________. Golden Voice Ted Williams is still seeking $150,000.00. Nick Reiner's former rehab roommate is sounding off. We speak to him, but he's not in the mood to share his story with a lowly podcast. Brooklyn Beckham's family drama is making all the news. Children estranged from their parents is the hot new trend. Taylor Swift has taught Annie and Charlotte a valuable lesson. There is a fantastic new Elizabeth Smart documentary out starring Ed Smart on Netflix. Chris Watts is a Casanova in prison. Trent Bolte is MIA. Alix Earle is bawling her eyes out online after her recent split with her boyfriend. Amanda Bynes has emerged in 2026.She is shifting her career to EDM music. Hey Kelly Osbourne… why you look different AGAIN? Lizzo is sizzling. We find and watch another Corey Feldman gem in the wild. Stuttering John hates a potato. Merch remains available. Click here to see what we have to offer for a limited time. If you'd like to help support the show… consider subscribing to our YouTube Channel, Facebook, Instagram and Twitter (Drew Lane, Marc Fellhauer, Trudi Daniels, Jim Bentley and BranDon)
Referências do EpisódioFrom Extension to Infection: An In-Depth Analysis of the Evelyn Stealer Campaign Targeting Software DevelopersPDFSIDER Malware - Exploitation of DLL Side-Loading for AV and EDR EvasionVoidLink threat analysis: Sysdig discovers C2-compiled kernel rootkitsUnveiling VoidLink – A Stealthy, Cloud-Native Linux Malware FrameworkRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Dave talks about Buster being mischievous.
Creator of Millennium, Blizzard, and Code Genie. Despite facing relentless criticism and accusations of code theft, his software gained widespread use. He remains active in coding today, applying lessons from the AOL scene to modern projects like his mobile wagering game, rockshotrush.com.Highlights Include:Origin of the handle "BoFeN" and his other alias "Nova". He was also known as TRiPP. Creation of Code Genie, a tool that automatically generated VB code for AOL interaction via the Windows APIUse of a "poser check" in his software to expose imposters claiming to be himDevelopment of a password-stealing executable disguised as a "Punter that Finally Works"Evolution from copying interfaces to building original, widely-used programs like BlizzardCurrent project: Rock Shop Rush, a mobile game with anti-cheat design rooted in his AOL experiences. rockshotrush.comGuest: BoFeNHost: Steve StonebrakerAudio Editor: Sam Fox (sam.fox.london@gmail.com)CoverArt: Created by Broast (https://broast.org), original idea by LampGold.--AOL Underground PodcastFollow us ontwitter - @AOLUnderground, @brakertechReddit -https://www.reddit.com/r/AOLUnderground/Youtube-https://www.youtube.com/@AOLUndergroundPodcastMerch -https://www.redbubble.com/people/AOL-Underground/shopDonate -https://www.buymeacoffee.com/AOLUndergroundContact the Host - https://aolunderground.com/contact-host/ReAOL Discord -https://discord.gg/p3olPodcast Community Page -https://aolunderground.com/community/AOL 4.0 is working! -https://nina.chat/connect/aol/Check out my wife's Etsy shop -https://www.etsy.com/shop/Snowbraker
Are you aware of what really steals your happiness? Moonwater reveals how a hidden pattern of thinking destroys the feeling of joy and fulfillment you could experience! Learn a powerful prayer to invite the Goddess to release you from the shackles of a hidden poisoner of your happiness. With the Goddess's support, you can rise above in 2026! For more on how to deal with disruption and chaos, see Moonwater's new book, World On Fire. Check it out with the link below. For more from Moonwater, get one of her books: #witch, #Wiccan, #Goddess, #God, #TheCraft, #witchcraft, #friend, #love, #support, #MoonwaterSilverClaw, #WorldOnFire, #hope, #grow, #gratitude, #2026, #Happiness, #newyear, #newyearsresolution, #delight, #surprise, #heal,
If your brain feels like a browser with 47 tabs open before you've even had your coffee, you're not losing your mind, you're digitally fried. High-performing women are quietly drained by the invisible chaos of their digital world: endless notifications, unread emails, scattered apps, and unfinished mental loops that never stop.In this episode, I explain why it's not your fault and why digital clutter isn't laziness—it's a system problem. Your phone and digital life have become your second brain, silently siphoning your energy and reducing your focus.You'll discover:Why digital overload hits women harder than anyone elseHow endless apps, notifications, and half-finished tasks create cognitive fatigueThe difference between busyness and real digital overloadA simple 5-minute reset to reclaim your mental space immediatelyWhy structure, flow, and design matter more than discipline when it comes to your digital lifeThis episode is about seeing the architecture behind your digital chaos so you can finally stop compensating with effort and start experiencing a phone and digital world that works for you.Your next step:Take the free LUX Time Stealer quiz to uncover which time leaks are silently draining your energyTry the 5-minute Digital Reset: pick one app and turn off all notifications except what's essentialBegin designing your digital life for flow, clarity, and calm—not perfectionResources & Links:Free LUX Time Stealer Quiz: https://www.declutterluxdesign.com/quizLearn more about the LUX Methodhttps://www.declutterluxdesign.com
ServiceNow to acquire cybersecurity startup Armis MacSync Stealer adopts quieter installation Nissan customer data stolen in Red Hat raid Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us March 4–6 in Orlando, plus a live CISO Series episode on March 6. Get $200 off with ZTWCISO26 at ztw.com.
US turns to private firms in cyber offensive Microsoft updates cause queuing failures Phishing campaign delivers Phantom stealer Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Attackers don't need malware anymore; they need trust. Tip: set a simple passphrase for high-risk actions, like wire requests or "urgent" account recovery – especially within finance teams and families. If the caller can't answer it, pause and verify. Adaptive runs deepfake and vishing simulations so employees practice this before it's real. Learn more at adaptivesecurity.com.
Tens of thousands of New Zealanders have been sent an unprecedented email from our National Cyber Security Centre. It's emailed 26,000 addresses warning malicious software, called Lumma Stealer, could have infected their devices. It's designed to steal sensitive information - and some stolen passwords are connected to Government agency systems and bank accounts. Aura Information Manager, Patrick Sharp, says international partners revealed the threat to our cyber security centre. He explained that presumably means an agency's uncovered a trove of stolen data and alerted the NCSC about the email addresses of concern. LISTEN ABOVESee omnystudio.com/listener for privacy information.
If your brain feels like a browser with 47 tabs open before you've even had your coffee, you're not losing your mind—you're digitally fried. High-performing women are quietly drained by the invisible chaos of their digital world: endless notifications, unread emails, scattered apps, and unfinished mental loops that never stop.In this episode, I explain why it's not your fault and why digital clutter isn't laziness—it's a system problem. Your phone and digital life have become your second brain, silently siphoning your energy and reducing your focus.You'll discover:Why digital overload hits women harder than anyone elseHow endless apps, notifications, and half-finished tasks create cognitive fatigueThe difference between busyness and real digital overloadA simple 5-minute reset to reclaim your mental space immediatelyWhy structure, flow, and design matter more than discipline when it comes to your digital lifeThis episode is about seeing the architecture behind your digital chaos so you can finally stop compensating with effort and start experiencing a phone and digital world that works for you.Your next step:Take the free LUX Time Stealer quiz to uncover which time leaks are silently draining your energyTry the 5-minute Digital Reset: pick one app and turn off all notifications except what's essentialBegin designing your digital life for flow, clarity, and calm—not perfectionResources & Links:Free LUX Time Stealer Quiz: https://www.declutterluxdesign.com/quizLearn more about the LUX Digital Reset: https://www.declutterluxdesign.com
Running a boutique audiophile label is not easy, as Shane Buettner has learned in the 10 years since he founded Intervention Records. There are licensing agreements to be negotiated, artists to please, mastering engineers and pressing plants to be engaged, vinyl formulation and cover design to be arranged, plus marketplace changes and ever-increasing competition to be navigated. The label's first release was Stealer's Wheel's debut, with standout pressings featuring Joe Jackson, Judee Sill, Matthew Sweet, the Flying Burrito Brothers, Peter Frampton, Everclear and others to follow. With so many labels jumping into the audiophile pool, has licensing recordings become harder? What dictates pricing? Do Buettner's customers care more about 180-gram vinyl or tip-on jackets? And how did he land Intervention's new Sun Records deal, with Kevin Gray-mastered 45 RPM releases from Carl Perkins and Johnny Cash on the way?
In this episode of Casual Chats, Arun looks back at one of the movies from his childhood he grew up watching which is the 1985 animated film Rainbow Brite and the Star Stealer based on the 1984 Hallmark cards and animated series. Rainbow Brite is trying to bring spring all over the world, but her rainbow powers aren't working. It turns out that an evil princess is attempting to steal a planet sized diamond called Spectra to keep it for herself. Together with a boy named Krys and his robotic horse On-X, Rainbow Brite travels to the princess' palace to prevent her from stealing Spectra.When the film premiered in theaters, it made $4.9 million dollars in the box office with mixed to negative reviews from critics. Today, Rainbow Brite is seen as a forgotten part of 1980s pop culture that has been overshadowed by its contemporaries. How well does the film hold up 40 years later?
Referências do EpisódioImperioShell e PolyjuiceCookie: Backdoor e cookie stealer miram empresas no BrasilUnraveling Water Saci's New Multi-Format, AI-Enhanced Attacks Propagated via WhatsAppDo Coyote ao Astaroth: o abuso do WhatsApp se consolida como método de infecção do cibercrime brasileiroVídeo sobre os recentes ataques via WhatsApp Unraveling Water Saci's New Multi-Format, AI-Enhanced Attacks Propagated via WhatsApp4.3 Million Browsers Infected: Inside ShadyPanda's 7-Year Malware Campaign | Koi BlogGoogle Patches 107 Android Flaws, Including Two Framework Bugs Exploited in the WildRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
What happens when our most personal expressions collide with algorithms capable of generating art, music, and literature? In this electrifying episode, we dissect the paradox of AI as both a muse and a potential usurper of human creativity. Are we crafting masterpieces with our digital companions, or are we unwittingly surrendering the essence of our artistic souls? Join us as we unravel the intricate threads between humanity and technology, questioning whether AI is a groundbreaking collaborator or a thief in the night, reshaping the very definition of what it means to create.
Please enjoy this encore of Research Saturday. This week, we are joined by Michael Gorelik, Chief Technology Officer from Morphisec, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as fake AI video generation platforms, luring users into uploading media in exchange for malware-laced downloads. Distributed through convincing Facebook groups and viral campaigns, the malware steals browser credentials, cryptocurrency wallets, and can deploy a remote access trojan like XWorm. The campaign uses a layered, obfuscated delivery chain disguised as legitimate video editing software, making it both deceptive and difficult to detect. The research can be found here: New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms Learn more about your ad choices. Visit megaphone.fm/adchoices
Please enjoy this encore of Research Saturday. This week, we are joined by Michael Gorelik, Chief Technology Officer from Morphisec, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as fake AI video generation platforms, luring users into uploading media in exchange for malware-laced downloads. Distributed through convincing Facebook groups and viral campaigns, the malware steals browser credentials, cryptocurrency wallets, and can deploy a remote access trojan like XWorm. The campaign uses a layered, obfuscated delivery chain disguised as legitimate video editing software, making it both deceptive and difficult to detect. The research can be found here: New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms Learn more about your ad choices. Visit megaphone.fm/adchoices
Often actors will surprise us and appear in a single scene in a film. In this episode, we decide the definitive top ten.
Russian police arrest the Meduza-Stealer trio, a Former L-3Harris manager pleads guilty to selling exploits to Russia, the US hacked Venezuela in 2020, and Windows 11 Administrator Protection goes live. Show notes Risky Bulletin: Russia arrests Meduza Stealer group
THIS WEEKS WRAP UP: 00:00:00 Introduction 00:01:35:16 Louvre heist 00:11:58:10 Julia Lemigova unhinged at live show 00:20:38:28 MJ and Tommy divorce 00:31:14:51 Aaron Phypers arrested in the courthouse 00:42:38:41 RHOSLC season 6 episode 6 recap SPONSOR: Factor Eat smart at https://factormeals.com/shespeaks50off and use code SHESPEAKS50OFF to get 50% off your first box, plus Free Breakfast for 1 Year SPONSOR: Fabletics My favorite active wear ever! Go to https://fabletics.com/shespeaks and sign up as a VIP because you get 80% off everything! JOIN THE SHE'S SPEAKING PATREON! https://www.patreon.com/shesspeaking Summer House, Southern Charm, and more exclusive content! SUBSCRIBE TO MY YOUTUBE CHANNEL - https://www.youtube.com/channel/UCxspMsBruMQjN265ZGNoV1A BUY ME A COFFEE - https://www.buymeacoffee.com/shesspeaking FOLLOW ME ON SOCIAL: @shesspeakingwithemilyhanks Instagram - https://www.instagram.com/shesspeakingwithemilyhanks TikTok - https://www.tiktok.com/@shesspeakingwithemily Threads - https://www.threads.net/@shesspeakingwithemilyhanks I Ken Not with Kendrick Tucker available everywhere you listen https://podcasts.apple.com/us/podcast/i-ken-not-with-kendrick-tucker/id1525311067?i=1000653884007 Follow Kendrick on IG and Threads - @withkendricktucker https://www.instagram.com/withkendricktucker/ Buy Kendrick a Beer - https://buymeacoffee.com/realitycomics2 Learn more about your ad choices. Visit megaphone.fm/adchoices
Welcome to the courtroom episode here on Off Duty. Imagine you see a video where someone is trying to rescue or help an animal and you instantly say to yourself... "Stop filming and help the animal."You're not wrong, and I would say the same thing until now.Tune in so you see why I would change my mind if this specific situation.xx Deana
Author : Madhu Campbell Narrator : Suna Dasi Host : Kat Day Audio Producer : Graeme Dunlop PseudoPod 998: The Story-Stealer's Night is a PseudoPod original. C/Ws from author: Body horror, creature horror, brief suicidal ideation, cancer, child abuse, child death and parent death The Story-Stealer's Night by Madhu Campbell Story-teller, Story-screamer Tell your tales […]
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Clipboard Image Stealer Xavier presents an infostealer in Python that steals images from the clipboard. https://isc.sans.edu/diary/Clipboard%20Pictures%20Exfiltration%20in%20Python%20Infostealer/32372 F5 Compromise F5 announced a wide-ranging compromise today. Source code and information about unpatched vulnerabilities were stolen. https://my.f5.com/manage/s/article/K000157005 https://my.f5.com/manage/s/article/K000156572 https://my.f5.com/manage/s/article/K000154696 Adobe Updates Adobe updated 12 different products yesterday. https://helpx.adobe.com/security.html SAP Patchday Among the critical vulnerabilities patched in SAP s products are two deserialization vulnerabilities with a CVSS score of 10.0 https://support.sap.com/en/my-support/knowledge-base/security-notes-news/october-2025.html https://onapsis.com/blog/sap-security-patch-day-october-2025/
Hi Everyone, Happy Tuesday! Today's guest is none other than Steven Ogg. Steven has created a niche playing characters that are a little (or a LOT) unhinged. He is best known for playing Trevor in Grand Theft Auto. He played Simon in Walking Dead, Pike in Snowpiercer, Rebus on Westworld, Sobchak on Better Caul Saul and many, many others. People see Steven and they think— whoa, this guy's a little crazy. But the truth is, he is also a super sensitive artist and a real actor's actor. I had so much fun getting into the weeds and sharing stories about working with directors and his philosophy of how to stick around as an actor when a show is being written week to week. Steven is a total character and it was such a pleasure to get to know him a little bit better! Be sure to stick around this week for the Hindsight, where my producer Jeph and I talk about the conversation with Steven and our love (okay, Jeph's love) of Grand Theft Auto. Send me an email thesackhoffshow@gmail.com Produced by Rabbit Grin Productions Mail Sack Song by Nicolas @producer_sniffles Join us on Patreon! http://patreon.com/thesackhoffshow
Let's run through the stereotypes. The weekly Torah portion includes far more depth than what appears in a quick review of its passages. Each week in Beyond the Letter of the Law, Harry Rothenberg, Esq. (Rothenberg Law Firm LLP, https://injurylawyer.com) provides interesting insights and take-away lessons from the Torah portion and the Jewish holidays. Subscribe to enjoy his unique blend of analysis, passion, and humor. A Project Of Ohr.Edu Questions? Comments? We'd Love To Hear From You: Podcasts@Ohr.Edu https://podcasts.ohr.edu/
Chris and Amy talk about the viral video of the Phillies fan stealing a home run baseball; Chris laments his Bears loss; Amy may have a Hoosier car; What are some of your Hoosier activities?
Mayor Rudy Giuliani Hurt in Crash, Major Earthquake in Afghanistan, J'Ouvert, Rabies Outbreak, US Open Hat Stealer, Cop Cars Torched in Hackensack, Trump Executive Order Will Require Voter ID Learn more about your ad choices. Visit megaphone.fm/adchoices
The moral high ground? To advertise on our podcast, please reach out to sales@advertisecast.com or visit https://www.advertisecast.com/TheJeffWardShow
On the latest episode of Cinematic Underdogs, we step back into the huddle and open our third eye—waxing philosophic about the NFL's most enigmatic, mystical quarterback: Aaron Rodgers.Enigma isn't your average sports doc. It's a new age headtrip wrapped in a spiral. One-part ayahuasca retreat, one-part playoff heartbreak, and all parts quarterback controversy. From MVP highs to media feuds, darkness retreats to Jets dreams, Rodgers' career plays out like a Greek tragedy—if Zeus could break defenses with clever snap counts and throw a 50-yard dime off his back foot.Although we've been overloaded with Rodgers lately, Enigmaoffers some new insights into the man behind the immunized mythos. This isn't just another look at Rodgers, the football player (even if it does chronicle his uprising from a Christian/conservative Central California town to a small JUCO to Cal to Green Bay). It's a psychological expedition into the mind of a man who can read defenses and sense your aura.If you've ever wondered what happens when NFL talent meets psychedelic introspection and a slight distrust of modern science—this is the documentary and episode for you. Join us as we take a deep, groovy dive into the most mysterious franchise superstar in the NFL. Along with our talk on Enigma, we also enter anotherjungle—known as the AFC North, where rivalries are meaner, weather is colder, and playoff hopes get smashed like a quarterback on third and long. As Jordan breaks it down, this iteration of Hard Knocks offered an all-access pass to the NFL's grittiest division, and let's just say—it doesn't disappoint.We're talking about bad blood, big hits, primetime snowballclassics, and preacher-boy charisma that could motivate a scarecrow. Bengals, Ravens, Steelers, Browns—these teams are more than a rivalry. They are rivals with immense tradition, hostility, and attrition. Every play is personal. Every postgame quip comes wrapped in barbed wire. And every team is dealing with a completely unique position amid the midseason chaos. Last but not least, we cover Untold: The Sign Stealer—pullingback the curtain on Conner Stallions, Michigan football's most mysterious “analyst.” It's a wild episode of collegiate spy games, sideline disguises, and a sign-stealing scandal that rocked college football harder than a Big Ten rivalry game.Now hit play and prepare for impact.
In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Richard Boscovich and Derek Richardson from Microsoft's Digital Crimes Unit to unpack the global takedown of Lumma Stealer, one of the world's largest infostealer malware operations. They discuss how creative legal tools like RICO and centuries-old trespass laws, deep collaboration with global partners, and innovative technical strategies came together to seize 2,300 domains and protect nearly 400,000 victims. The episode explores how the DCU is shifting toward persistent, cost-imposing disruption of cybercrime as a service, and what this means for defenders everywhere. In this episode you'll learn: How Microsoft took down one of the world's largest infostealer malware operations The global partnerships with Europol, Japan, and private companies in cyber takedowns What happens to stolen victim data during a takedown operation Some questions we ask: How did you first identify Lumma as a high-priority threat? Is persistent disruption now the new normal for DCU operations? Do you see more operations like this coming from DCU in the future? Resources: View Richard Boscovich on LinkedIn View Sherrod DeGrippo on LinkedIn Disrupting Lumma Stealer: Microsoft Leads Global Action Against Favored Cybercrime Tool Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Uncovering Hidden Risks Discover and follow other Microsoft podcasts at microsoft.com/podcasts Get the latest threat intelligence insights and guidance at Microsoft Security Insider The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.
Something stalked a small quiet neighborhood and turned one childhood into a living nightmare. Become an Eeriecast PLUS Member! https://eeriecast.com/plus Background from this music comes from: Myuu https://www.youtube.com/@Myuu CO.AG Darkness Prevails Epidemic Sound LXZURAY GIMU SCARY STORIES TIMESTAMPS 0:00 INTRO 0:45 Desert Walks from Puyu 12:53 Still Not As Scary As Working Retail from Bob Bingi 17:10 When I Was a Kid, A Werewolf Was Killed in my Town from DownADirtPath 28:47 This Man Ruined My Life from 88DairyGirl 41:56 The Night I Wasn't Alone from anonymous 51:41 Right in the Thrift from Jozzy GET MY WIFE'S ADORABLE STICKERS!!! https://ko-fi.com/ruffledragons/shop ORDER PHANTOM PHENOMENA: https://a.co/d/3hQAV7e ORDER APPALCHIAN FOLKLORE UNVEILED: https://a.co/d/iteR5xZ Get CRYPTID: The Creepy Card Battling Game https://cryptidcardgame.com/ Read our new wendigo horror novel https://eeriecast.com/lore Sign up for Eeriecast PLUS for bonus content and more https://eeriecast.com/plus Get our merch http://eeriecast.store/ Join my Discord! https://discord.gg/3YVN4twrD8 Follow the Unexplained Encounters podcast! https://pod.link/1152248491 Follow and review Tales from the Break Room on Spotify and Apple Podcasts! https://pod.link/1621075170 Submit Your Story Here: https://www.darkstories.org/ Subscribe on YouTube for More Stories! https://www.youtube.com/channel/UCh_VbMnoL4nuxX_3HYanJbA?sub_confirmation=1 Learn more about your ad choices. Visit podcastchoices.com/adchoices
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
What s My File Name Malware may use the GetModuleFileName API to detect if it was renamed to a name typical for analysis, like sample.exe or malware.exe https://isc.sans.edu/diary/What%27s%20My%20%28File%29Name%3F/32084 Atomic macOS infostealer adds backdoor for persistent attacks Malware analyst discovered a new version of the Atomic macOS info-stealer (also known as 'AMOS') that comes with a backdoor, to attackers persistent access to compromised systems. https://moonlock.com/amos-backdoor-persistent-access HOUKEN SEEKING A PATH BY LIVING ON THE EDGE WITH ZERO-DAYS At the beginning of September 2024, an attacker repeatedly exploited vulnerabilities CVE-2024- 8190, CVE-2024-8963, and CVE-2024-9380 vulnerabilities to remotely execute arbitrary code on vulnerable Ivanti Cloud Service Appliance devices. https://www.cert.ssi.gouv.fr/uploads/CERTFR-2025-CTI-009.pdf SEO Scams Targeting Putty, WinSCP, and AI Tools Paid Google ads are advertising trojaned versions of popuplar tools like ssh and winscp https://arcticwolf.com/resources/blog-uk/malvertising-campaign-delivers-oyster-broomstick-backdoor-via-seo-poisoning-and-trojanized-tools/
June 23, 2025Paranormal Mysteries PodcastEpisode 439Calling From the Basement, Ouija Board Impostor & The Spirit StealerCONTACT MEWebsiteTell Your StorySocial MediaPodcast SourceSUPPORT THE SHOWPatreonBuyMeACoffeePayPalOTHER LINKSMy Wife's Podcast
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Katz Stealer in JPG Xavier found some multistage malware that uses an Excel Spreadsheet and an HTA file to load an image that includes embeded a copy of Katz stealer. https://isc.sans.edu/diary/More+Steganography/32044 https://unit42.paloaltonetworks.com/malicious-javascript-using-jsfiretruck-as-obfuscation/ JavaScript obfuscated with JSF*CK is being used on over 200,000 websites to direct victims to malware Expired Discord Invite Links Used for Malware Distribution Expired discord invite links are revived as vanity links to direct victims to malware sites https://research.checkpoint.com/2025/from-trust-to-threat-hijacked-discord-invites-used-for-multi-stage-malware-delivery/
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Extracting With pngdump.py Didier extended his pngdump.py script to make it easier to extract additional data appended to the end of the image file. https://isc.sans.edu/diary/Extracting%20With%20pngdump.py/32022 16 React Native Packages for GlueStack Backdoored Overnight 16 npm packages with over a million weekly downloads between them were compromised. The compromised packages include a remote admin tool that was seen before in similar attacks. https://www.aikido.dev/blog/supply-chain-attack-on-react-native-aria-ecosystem Atomic MacOS Stealer Exploits Clickfix MacOS users are now also targeted by fake captchas, tricking users into running exploit code. https://www.cloudsek.com/blog/amos-variant-distributed-via-clickfix-in-spectrum-themed-dynamic-delivery-campaign-by-russian-speaking-hackers Microsoft INETPUB Script Microsoft published a simple PowerShell script to restore the inetpub folder in case you removed it by mistake. https://www.powershellgallery.com/packages/Set-InetpubFolderAcl/1.0
This week, we are joined by Michael Gorelik, Chief Technology Officer from Morphisec, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as fake AI video generation platforms, luring users into uploading media in exchange for malware-laced downloads. Distributed through convincing Facebook groups and viral campaigns, the malware steals browser credentials, cryptocurrency wallets, and can deploy a remote access trojan like XWorm. The campaign uses a layered, obfuscated delivery chain disguised as legitimate video editing software, making it both deceptive and difficult to detect. The research can be found here: New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms Learn more about your ad choices. Visit megaphone.fm/adchoices
This week, we are joined by Michael Gorelik, Chief Technology Officer from Morphisec, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as fake AI video generation platforms, luring users into uploading media in exchange for malware-laced downloads. Distributed through convincing Facebook groups and viral campaigns, the malware steals browser credentials, cryptocurrency wallets, and can deploy a remote access trojan like XWorm. The campaign uses a layered, obfuscated delivery chain disguised as legitimate video editing software, making it both deceptive and difficult to detect. The research can be found here: New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms Learn more about your ad choices. Visit megaphone.fm/adchoices
Kaotic, Silver and Ruby talk about the boogie man from Puerto Rico and other Spanish speaking country's he goes by a variety of names such as el cucuy and el cocoPodcast Links Discordhttps://discord.gg/F9wtSUYzANTwitterhttps://twitter.com/MmMayhemPodcast TwitterPatreonhttps://www.patreon.com/MonstersMythsMayhemTwitchhttps://www.twitch.tv/kaoticleighWebsitehttps://monstersmythsmayhe.wixsite.com/mmmp
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Microsoft says it's working to take down malware that steals personal information like credit card numbers and crypto wallets. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Meta's advanced AI technologies are not only enhancing user experiences across platforms like Facebook, Instagram, and Threads, but also unlocking new opportunities for businesses and content creators. From strategic planning support to boosting creativity and engagement, Meta AI is becoming an indispensable part of various industries—delivering practical value across many aspects of life.In Episode 49 of the Vietnam Innovators podcast (English edition) this week, we sit down with Revie Sylviana, Director of Global Partnerships, SEA & Emerging Markets at Meta. She currently leads a dynamic team across countries including Indonesia, Malaysia, Pakistan, the Philippines, Thailand, and Vietnam—driving the growth and adoption of Meta's products among creators, public figures, athletes, and media professionals.With over 20 years of experience in telecommunications, technology, and social media, Revie has played a key role in shaping effective content and partnership strategies. Her insights promise valuable lessons and compelling perspectives on the future of technology and creativity.—Thank you Meta for accompanying Vietnam Innovators. Meta builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps like Messenger, Instagram and WhatsApp further empowered billions around the world. Now, Meta is moving beyond 2D screens toward immersive experiences like augmented and virtual reality to help build the next evolution in social technology.Listen to this episode on YoutubeAnd explore many amazing articles about the pioneers at: https://vietcetera.com/vn/bo-suu-tap/vietnam-innovatorFeel free to leave any questions or invitations for business cooperation at hello@vietnaminnovators.com
Did Paul technically STEAL food on this date?! Hosted on Acast. See acast.com/privacy for more information.
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.Researchers at Trend Micro have uncovered a new campaign by the Fog ransomware group, notable for its use of DOGE-themed ransom notes aimed at mocking victims rather than just extorting them.In the wake of May 2024's Operation Endgame, which dismantled some of the most prominent malware droppers such as IcedID, Pikabot, SystemBC, Smokeloader, and Bumblebee, law enforcement agencies across Europe and North America have moved into a new phase targeting end users of these platforms.Zscaler researchers have recently observed Mustang Panda—also known by aliases like Bronze President, Stately Taurus, and TA416—upgrading its toolset as part of an ongoing espionage campaign, with a recent operation targeting an organization in Myanmar. Atomic macOS Stealer (AMOS), identified as one of the most impactful macOS-targeting infostealers of 2024, leverages deceptive application installers and phishing tactics to gain access to victim machines.
Today we have the incredible Kim Coates joining us for an in-depth conversation about his remarkable career. From his early days on Broadway to becoming a fixture in 90s blockbuster films like The Last Boy Scout, Kim shares fascinating audition stories, including the time he landed a role in The Wonder Cabinet by auditioning with his back to the room. He delves into his transition to television, most notably his iconic role as Tig Trager in the groundbreaking series Sons of Anarchy, revealing the unexpected way he was offered the part. Kim also offers invaluable insights into the acting business, discussing typecasting, the audition process in the self-tape era, and the importance of making bold choices. He reflects on navigating career lulls and the significance of having a strong support system. Finally, Kim shares details about some of his favorite projects, including King of Sorrow, and exciting upcoming roles in The Walking Dead: Dead City and a romantic comedy called Solo Mio. These are the unforgettable stories that landed Kim Coates right here. CREDITS: Sons of Anarchy The Walking Dead: Dead City American Primeval Black Hawk Down Pearl Harbor White House Plumbers Mayans M.C. Resident Evil: Afterlife Goon Godless Bad Blood Entourage Prison Break Waterworld The Island Open Range GUEST LINKS: IMDB: Kim Coates, Actor, Producer THAT ONE AUDITION'S LINKS: For exclusive content surrounding this and all podcast episodes, sign up for our amazing newsletter at AlyshiaOchse.com. And don't forget to snap and post a photo while listening to the show and tag me: @alyshiaochse & @thatoneaudition SELF-TAPE MAY: Starting May 1st, 2025: Sign Up HERE ($88) THE BRIDGE FOR ACTORS: Become a WORKING ACTOR THE PRACTICE TRACK: Membership to Practice Weekly PATREON: @thatoneaudition CONSULTING: Get 1-on-1 advice for your acting career from Alyshia Ochse COACHING: Get personalized coaching from Alyshia on your next audition or role INSTAGRAM: @alyshiaochse INSTAGRAM: @thatoneaudition WEBSITE: AlyshiaOchse.com ITUNES: Subscribe to That One Audition on iTunes SPOTIFY: Subscribe to That One Audition on Spotify STITCHER: Subscribe to That One Audition on Stitcher EPISODE CREDITS: WRITER: Erin McCluskey WEBSITE & GRAPHICS: Chase Jennings ASSISTANT: Elle Powell SOCIAL OUTREACH: Alara Ceri
This week, in Middlebury, Indiana, a mother does not approve of her teen daughter's choice in boyfriends, causing tension & fighting in the home. It also leads to the mother's disappearance, but luckily there's some evidence that leads to a suspect, whoo spills the whole plan. It's a terrifyingly cold blooded plot, that ends in murder, but definitely didn't have to. Plus, one of the killers says he "just wanted to kill" in a letter to the judge!!Along the way, we find out that a band might be hard to hear over a tractor pull, that teen love is never worth throwing your entire future in the garbage, and that if someone really wants to kill, it's not very easy to stop them!!New episodes every Thursday!Donate at: patreon.com/crimeinsports or go to paypal.com and use our email: crimeinsports@gmail.comGo to shutupandgivememurder.com for all things Small Town Murder & Crime In Sports!Follow us on...twitter.com/@murdersmallfacebook.com/smalltownpodinstagram.com/smalltownmurderAlso, check out James & Jimmie's other show, Crime In Sports! On Apple Podcasts, Spotify, Amazon Music, Wondery, Wondery+, Stitcher, or wherever you listen to podcasts!See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Learn about fileless crypto stealers written in Python, the ongoing exploitation of recent SimpleHelp vulnerablities, new Apple Silicon Sidechannel attacks a Team Viewer Vulnerablity and an odd QR Code Fileless Python InfoStealer Targeting Exodus This Python script targets Exodus crypto wallet and password managers to steal crypto currencies. It does not save exfiltrated data in files, but keeps it in memory for exfiltration https://isc.sans.edu/diary/Fileless%20Python%20InfoStealer%20Targeting%20Exodus/31630 Campaign Exploiting SimpleHelp Vulnerablity Arcticwolf observed attacks exploiting SimpleHelp for initial access to networks. It has not been verified, but is assumed that vulnerabilities made public about a week ago are being exploited. https://arcticwolf.com/resources/blog-uk/arctic-wolf-observes-campaign-exploiting-simplehelp-rmm-software-initial-access/ Two new Side Channel Vulnerabilities in Apple Silicon SLAP (Data Speculation Attacks via Load Address Prediction): This attack exploits the Load Address Predictor in Apple CPUs starting with the M2/A15, allowing unauthorized access to sensitive data by mispredicting memory addresses. FLOP (Breaking the Apple M3 CPU via False Load Output Predictions): This attack targets the Load Value Predictor in Apple's M3/A17 CPUs, enabling attackers to execute arbitrary computations on incorrect data, potentially leaking sensitive information. https://predictors.fail/ Teamviewer Security Bulletin Teamviewer patched a privilege escalation vulnerability CVE-2025-0065 https://www.teamviewer.com/en-us/resources/trust-center/security-bulletins/tv-2025-1001/ Odd QR Code A QR code may resolve to a different URL if looked at at an angle. https://mstdn.social/@isziaui/113874436953157913 Limited Discount for SANS Baltimore https://sans.org/u/1zQd