POPULARITY
AI Changed Social Engineering. New Verification Rules to Know TODAY!If you didn't independently confirm the human using a channel you know is legitimate, you didn't verify anything.You placed your trust in whatever entity controls that communication channel. And there's an increasing chance that entity is a criminal enterprise with better AI tools than your security team.Stop checking emails. Start checking humans.The difference could be your career—or your company's survival.Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us.Support the show
Jake and Michael discuss all the latest Laravel releases, tutorials, and happenings in the community.Show linksLaravel Boost v1.8.10 Released With New AI Prompts and Livewire v4 SupportAsync Request Cancellation Updates in Inertia v2.3.10Docker Support in Laravel VS Code Extension v1.4.2Query Builder Expression Aliases in Laravel 12.48Livewire 4 Support in Laravel VS Code Extension v1.4.3Laravel Boost v2.0 Released with Skills SupportEverything new in Livewire 4Statamic 6 Beta Now AvailableFilament v5 Released With Livewire v4 Support and a New Blueprint ToolLaravel News Is the Live Stream Partner for Laracon EU 2026Migrating Laravel News from Laravel Forge to CloudLaravel Debugbar v4.0.0 is releasedAutomate Laravel Herd Worktrees with This Claude Code SkillFluentVox: AI Text-to-Speech for Laravel with Voice Cloning and GPU AccelerationLaravel Deadlock: Manage Technical Debt with Expiring Code MarkersLaravel Invite Only Adds a Full User Invitation System with Tokens, Events, and RemindersRestrict User Actions with Time-Based Sanctions Using Laravel ProhibitionsRadiance: Generate Deterministic Mesh Gradient Avatars in PHPFair Queue Distribution with Laravel Balanced QueueTutorialsSpeeding Up Laravel News With Cloudflare
New Episode
New Episode
Have you ever noticed how we keep telling ourselves cyber risk is a “future problem” right up until it walks in the front door wearing a name badge?Because in this episode, we're not talking about Hollywood hackers or hoodie clichés. We're talking about how attacks actually happen now. We interview global vCISO Dan Elliott from Recorded Future all about it. Question? Text our Studio direct.Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
Why modern cybercrime targets trust, urgency, and decision-making instead of systemsDeepfake Attacks, Voice Cloning, and Why AI Social Engineering WorksTraditional fraud used to feel obvious: misspellings, odd links, weird emails. Now? Deepfakes embed perfectly familiar voices and faces into your feed — or your inbox.Listen to Perry Carpenter on this. If you love this topic as much as we do grab Perry's incredible book FAIK available everywhere. Here's a non-affiliated link: https://www.barnesandnoble.com/w/faik-perry-carpenter/1145888787?ean=2940190971293Don't Miss the Deepfake Webinar coming up! You WIll See how you can test out your own deepfake to better understand them. https://info.knowbe4.com/new-deepfake-training-na?partnerref=blogChapters 00:00 Why the Next Breach Won't Look Like the Last One01:44 Welcome to America in 202603:00 Why Deepfakes Are Exploding Right Now05:20 Yes — A Voice Can Be Cloned in Seconds07:30 What Deepfakes Actually Are (No Hype)09:35 Legitimate Uses vs Weaponized Intent12:45 Why Deepfake Companies Stay Quiet17:05 Faces and Voices Are the New Attack Surface18:30 Stop Asking “Is This Real?” Ask This Instead20:55 Why Spotting Artifacts No Longer Works23:45 The One Question That Cuts Through Deepfakes25:50 What Leaders Should Actually Do Today27:45 Old-School Security Still Wins30:05 Why Detection Tools Are Losing the Race33:10 Romance Scams, HR Fraud, and Deepfake Hiring35:45 10 of 15 Job Candidates Were Fake — Here's Why38:40 Fake Workers, Real Access, Real Damage42:20 Deepfakes as Multi-Stage AttackQuestion? Text our Studio direct.Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
Question? Text our Studio direct.Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
Most cybercrime doesn't start with genius hackers. It starts on a Tuesday. Someone's busy. An email feels urgent. And a decision gets made five seconds too fast. Fear-based cybersecurity training hasn't made people safer. It's made them tired.Most cyber attacks don't start with genius hackers. They start with rushed decisions, social engineering, and skipped updates.This short breaks down ai explained in plain English, why cybersecurity for beginners often gets taught the wrong way, and how cyber security and cybersecurity really fail in the real world.From ethical hacking myths to a realistic cybersecurity roadmap, this blends true crime stories, true crime, and modern AI threats to explain what actually puts people and companies at risk.If you care about small business cyber security and understanding how attacks really happen, this one matters.We've been trained to panic about rare, cinematic attacks… while leaving the front door unlocked every single day.The boring truth that actually works: • Don't get tricked • Patch your systemsThat's it. Not sexy. Not cinematic. But it works.Full breakdown in Chaos Brief and on the Cyber Crime Junkies channel.Question? Text our Studio direct.Support the show
We've trained people to fear nation-state hackers…while getting breached by rushed clicks and skipped updates.Cybercrime doesn't win because it's smart. It wins because people are tired. We've been trained to panic about rare, cinematic attacks… while leaving the front door unlocked every single day.The boring truth that actually works: • Don't get tricked • Patch your systemsThat's it. Not sexy. Not cinematic. But it works.Question? Text our Studio direct.Support the show
Question? Text our Studio direct.New Episode
Question? Text our Studio direct.New Episode
Question? Text our Studio direct.
Question? Text our Studio direct.New Episode
Question? Text our Studio direct.Today we're talking about AI-powered cybercrime—a phrase that sounds like a marketing stunt but is, unfortunately, very real. Cybercriminals basically got a software update, and now they're running their operations with more automation, more scale, and — let's just say it — better customer service than half the vendors in your tech stack.Season 8 is officially here — and it's the most unhinged, hilarious, and dangerously educational season we've ever done with full cyber chaos:
Question? Text our Studio direct.The Supreme Court is hearing a billion-dollar piracy case that could literally change how the entire internet works. Sony says Cox Communications should be liable for customers illegally downloading music — including 10,017 songs in dispute.Cox argues: “We didn't do it.” Leaked email: “F the DMCA!!!” Yeah… this case is pure chaos.Season 8 is officially here — and it's the most unhinged, hilarious, and dangerously educational season we've ever done with full cyber chaos:
Question? Text our Studio direct.In this shocking monthly cyber update, the Cyber Crime Junkies (David, Dr. Sergio E. Sanchez, and Zack Moscow) expose the craziest, must-know stories in tech and security.What's Inside This Episode:The AI Threat is Real: Dr. Sergio reveals how Chinese threat actors manipulated Anthropic's Claude AI system to stage cyber attacks against nearly 30 companies globally. Learn how powerful Large Language Models (LLMs) are leveling the field for malicious coders.The Casino Fish Tank Hack (True Story!): David tells the unbelievable story of how hackers breached a casino's main network by exploiting a smart thermostat inside an exotic fish tank, accessing high-roller financials. This proves critical network segmentation is non-negotiable.The New Scam: ClickFix: David breaks down the terrifying new ClickFix attack, where hackers trick you into literally copying and pasting malicious code into your own computer. Learn the golden rule to protect yourself from this massive, 500% spike in attacks.The Cloudflare Outage: Zack discusses the massive Cloudflare outage that took down major services like ChatGPT, revealing how a seemingly minor configuration error caused massive ripple effects across the entire internet.The iPhone Scam Laundry: Dr. Sergio shares a wild anecdote from his time at Apple about a global scammer laundering stolen or damaged iPhones for new ones, using a loophole caused by a business decision.
Heute zu Gast in der Show: Thilo Masuth (SAE Berlin). Thilo ist ein erfahrener Tontechniker und Audioengineer sowie COO des Hörspielstudio Xberg GmbH. Wir sprechen mit ihm über seine Reise in die Audioproduktion, die Herausforderungen und Entwicklungen im Hörspiel- und Hörbuchmarkt sowie die Auswirkungen von Künstlicher Intelligenz und Voice Cloning auf die Branche. Thilo teilt seine Erfahrungen im Schnitt von Hörbüchern, die Teamleitung in einem wachsenden Studio und die Herausforderungen der Atmos-Mischung. Zudem gibt er Einblicke in zukünftige Projekte und die Bedeutung von Leidenschaft in der Audioproduktion.LinedIn:https://www.linkedin.com/in/thilo-masuth-b453b41b2/Elgato BLACK FRIDAY DEALS:https://e.lga.to/p/black-friday-2025Life After SAE auf Instagram: https://www.instagram.com/lifeaftersae/Mehr zu Kurt gibt's hier:https://www.instagram.com/kurt_jonathan_engert/Mehr zu Glen gibt's hier:https://glenschaele.com/linktree
Question? Text our Studio direct.
A young undercover FBI operative risks everything to expose America's most devastating traitor — revealing how Cold-War spycraft evolved into today's cybercrime economy.The shocking true story of Robert Hanssen — the FBI mole who sold America's deepest secrets to Russia for over 20 years, leading to the execution of multiple double agents and triggering the worst intelligence breach in U.S. history.
What really happens during a cyber attack? Not the Hollywood version — the real one. The kind businesses experience every single day when a single compromised password, phishing email, or zero-day vulnerability ignites a full-scale crisis.In this full episode, we take you inside the anatomy of a real data breach with digital first responders from NetGain Technologies — the cybersecurity professionals who live inside ransomware events, Business Email Compromise (BEC) incidents, and wire-fraud attacks every week.You'll see how attacks start, how fast they spread, what attackers do once they're inside your email, and the exact steps that decide whether a company recovers… or collapses.What You'll Learn: • How a phishing email turns into credential theft and internal compromise • Why Business Email Compromise (BEC) is now the #2 most expensive breach type • The tricks attackers use to hide inside inboxes and impersonate executives • How wire transfer fraud really happens — and how the 2-person rule stops it • What zero-days look like in the wild (and why patches aren't enough) • The role of MFA, phishing-resistant MFA, email controls, and layered security • Why backups must be immutable, air-gapped, and isolated • How incident response teams contain malware without destroying evidence • When to call cyber insurance, law enforcement, and breach counsel • The IR playbook: detection → containment → communication → forensics → recovery • Why every business — no matter how small — IS a target⌚ CHAPTERS 00:00 – Intro: What BEC Really Looks Like Today 03:42 – How One Email Starts the Attack Chain 11:20 – Why Finance Teams Are Target #1 19:05 – The Social Engineering Playbook 27:48 – Live Breakdown of a Real BEC Incident 38:22 – What Happens During Wire Fraud Recovery 46:10 – Technical Controls That Actually Work 55:36 – How to Build a No-NonsSend us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
Discover the cutting-edge technology of CYBER EAGLE, a revolutionary system designed to defend against the threats of quantum warfare. As the world enters a new era of cybersecurity challenges, CYBER EAGLE is poised to be at the forefront of protecting sensitive information and national security.In this conversation, host David Mauro engages with Carlo Tortora Brayda and Michael Tiesemer, leaders of the Cyber Eagle Project, to discuss the future of AI in Cybersecurity and global protection of critical infrastructure. Chapters 00:00 Introduction to Cyber Eagle Project02:33 The Genesis of Cyber Eagle and Its Vision05:31 Understanding Critical Infrastructure Vulnerabilities08:00 The Age of Compression in Cybersecurity10:42 Building Resilience in Cyber Defense13:44 Dynamic Defense Strategies Against Evolving Threats16:19 Polymorphic AI Defense: Adapting to Attacks19:19 The Future of Cyber Eagle and Its Innovations25:25 Cyber Eagle's Global Deployment Strategy27:56 Building a Compliant Cybersecurity Channel30:40 Innovative Partnerships and Global Reach31:42 Quantum Safety and Cybersecurity Innovations36:58 The Future of Cyber Eagle and Its Mission Send us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
CMMC 2.0 explained in plain English — what it means for small businesses, defense contractors, and vendors across the DoD supply chain. Learn about Level 1 vs Level 2, self-attestation risks, C3PAO shortages, compliance deadlines, and how to stay audit-ready before 2025.Don't miss out on crucial information about the CMMC 2025 deadline. The Cybersecurity Maturity Model Certification is a vital requirement for businesses dealing with the Department of Defense. If you miss the deadline, you risk losing contracts and facing severe penalties. In this video, we'll explore the consequences of missing the CMMC 2025 deadline and provide valuable insights on how to prepare and stay compliant. Stay ahead of the game and ensure your business is CMMC-ready. Find out what happens if you missed the deadline and learn how to avoid costly mistakes. Tune in now and take the first step towards CMMC compliance. CHAPTERS00:00 – The 4 Letters That Can End Your Business00:15 – CMMC 2.0: Why November 10, 2025 Changes Everything01:35 – Meet the Expert: Frontline View from a CMMC Assessor02:59 – What Is CMMC (In Plain English)?04:20 – FCI vs CUI: The Data That Decides Your Level07:05 – Are You Level 1 or Level 2? How the Flow-Down Really Work10:05 – Why the DoD Stopped “Trusting” Small Contractors11:40 – Supply-Chain Breaches: How Third Parties Take You Down13:00 – Level 1: The 17 “Basic” Controls Everyone Ignores17:00 – The Dangerous Game of Fudging Your Self-Attestation21:15 – Level 2: 110 Controls, SSPs, and the Reality of NIST 800-17123:40 – C3PAO Bottleneck: Why Waiting Means Losing Contracts26:30 – POA&M and the 180-Day “Grace” Trap32:05 – Surprise: Printers, MSPs, and “Non-Defense” Vendors in the Blast Radius35:15 – CMMC Is Not Going Away (And Other Hard Truths)37:05 – Countdown to FallSend us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
When Amazon AWS and Microsoft Azure crashed, half a billion dollars vanished overnight. In this episode, David Mauro, Dr. Sergio Sanchez, and Zack Moscow uncover the ethics surrounding AI and the need for tech awareness, highlighting the importance of digital detox in maintaining a healthy balance.We break down:
Not long ago, faking someone's voice took real effort. Time's changed. Hear about a new system that allows anyone to mimic your voice in an instant. Learn more about your ad choices. Visit megaphone.fm/adchoices
Is there anything real left on the internet? Neil deGrasse Tyson and co-hosts Chuck Nice and Gary O'Reilly explore deepfakes, scams, and cybercrime with the Director of Threat Research at Bitdefender, Bogdan Botezatu. Scams are a trillion-dollar industry; keep your loved ones safe with Bitdefender: https://bitdefend.me/90-StarTalkNOTE: StarTalk+ Patrons can listen to this entire episode commercial-free here: https://startalkmedia.com/show/deepfakes-and-the-war-on-truth-with-bogdan-botezatu/Thanks to our Patrons Bubbalotski, Oskar Yazan Mellemsether, Craig A, Andrew, Liagadd, William ROberts, Pratiksha, Corey Williams, Keith, anirao, matthew, Cody T, Janna Ladd, Jen Richardson, Elizaveta Nikitenko, James Quagliariello, LA Stritt, Rocco Ciccolini, Kyle Jones, Jeremy Jones, Micheal Fiebelkorn, Erik the Nerd, Debbie Gloom, Adam Tobias Lofton, Chad Stewart, Christy Bradford, David Jirel, e4e5Nf3, John Rost, cluckaizo, Diane Féve, Conny Vigström, Julian Farr, karl Lebeau, AnnElizabeth, p johnson, Jarvis, Charles Bouril, Kevin Salam, Alex Rzem, Joseph Strolin, Madelaine Bertelsen, noel jimenez, Arham Jain, Tim Manzer, Alex, Ray Weikal, Kevin O'Reilly, Mila Love, Mert Durak, Scrubbing Bubblez, Lili Rose, Ram Zaidenvorm, Sammy Aleksov, Carter Lampe, Tom Andrusyna, Raghvendra Singh Bais, ramenbrownie, cap kay, B Rhodes, Chrissi Vergoglini, Micheal Reilly, Mone, Brendan D., Mung, J Ram, Katie Holliday, Nico R, Riven, lanagoeh, Shashank, Bradley Andrews, Jeff Raimer, Angel velez, Sara, Timothy Criss, Katy Boyer, Jesse Hausner, Blue Cardinal, Benjamin Kedwards, Dave, Wen Wei LOKE, Micheal Sacher, Lucas, Ken Kuipers, Alex Marks, Amanda Morrison, Gary Ritter Jr, Bushmaster, thomas hennigan, Erin Flynn, Chad F, fro drick, Ben Speire, Sanjiv VIJ, Sam B, BriarPatch, and Mario Boutet for supporting us this week. Subscribe to SiriusXM Podcasts+ to listen to new episodes of StarTalk Radio ad-free and a whole week early.Start a free trial now on Apple Podcasts or by visiting siriusxm.com/podcastsplus. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Unlocking Online Safety for Families in an AI WorldThis conversation delves into the critical intersection of child safety and artificial intelligence in today's digital landscape. The speakers discuss the importance of teaching children to navigate online spaces safely, the risks associated with social media, and the evolving nature of AI technology. They emphasize the need for common sense guardrails, the implications of identity theft, and the spread of misinformation. The discussion also touches on the future of AI regulation and the importance of education in safeguarding against cyber threats.Chapters00:00 Navigating Online Safety in an AI World02:35 The Intersection of AI and Child Safety05:29 Guardrails for Social Media and Parenting08:24 The Digital Footprint of Future Generations11:20 The Role of Social Media Companies14:18 The Risks of Identity Theft and Cybersecurity19:11 The Evolution of AI and Its Implications21:48 Jailbreaking AI: A New Frontier24:52 The Spread of Misinformation28:57 The Future of AI Regulation31:49 Preparing for an AI-Driven World34:43 AI and Cybersecurity35:30 AI, Cybersecurity, & Family Safety42:00 social media safetySend us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.A newly disclosed vulnerability in Redis, dubbed RediShell and tracked as CVE-2025-49844, affects all Redis versions and carries a maximum CVSS score of 10.0.Cisco has disclosed a critical zero-day vulnerability—CVE-2025-20352—affecting its widely deployed IOS and IOS XE software, confirming active exploitation in the wild.Researchers at NCC Group have found that voice cloning technology has reached a level where just five minutes of recorded audio is enough to generate convincing voice clones in real time.A China-linked cyber-espionage group, tracked as UNC5221, has been systematically targeting network infrastructure appliances that lack standard endpoint detection and response (EDR) support.Dutch authorities have arrested two 17-year-old boys suspected of being recruited by pro-Russian hackers to carry out surveillance activities.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform.This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.
In the world of cybersecurity, there are big lies that have been perpetuated about compliance, fixability and communication--and it's time to burn it all down and start over. Many experts see one main cybersecurity truth, especially about AI, SIEM, EDR and related business technology. By examining the intersection of AI, cybersecurity, and compliance, we can gain a deeper understanding of the lies that have been told about the state of cybersecurity and work towards a more secure future. Tune in to this thought-provoking Send us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
Content marketer and video lead Emily Kensley (Fellow) walks through a near-zero-friction workflow for creating polished product videos fast. She records clean, auto-animated screen demos with Screen Studio, fixes (or replaces) audio with Podcastle (Magic Dust + AI voices), and drafts scripts by riffing into a Fellow meeting then refining the transcript in ChatGPT. The result: 11-minute, brand-consistent tutorials produced in hours instead of days—repeatable by any team (marketing, CS, product, sales).Timestamps01:19 — Daily use of AI; from occasional to constant over last 6 months01:53 — What you'll learn: a minimal-human, video-centric content workflow03:41 — Tool #1 intro: Screen Studio for screen recordings05:27 — Live capture of an AI meeting recap demo (click-through highlights, actions, decisions)06:23 — Raw → instant output: auto-smoothing cursor paths & smart zooms (no manual keyframes)07:23 — Host example: using Screen Studio for a Zapier + Fellow automation video07:44 — “Done is better than perfect”: quick crop fixes, branded backgrounds, cursor presets08:24 — Team presets = consistent brand across departments09:44 — Tool #2 intro & story: Podcastle rescues a day of bad mic audio10:59 — Podcastle audio editor: noise reduction, levelling, silence removal12:10 — Magic Dust AI demo: echoey room → studio-quality voice13:38 — AI Voices in Podcastle: when to clone vs. pick a preset (e.g., “Abigail”)16:12 — Long-form scripts → generated narration in minutes; edit/regenerate on typos17:54 — Brand consistency: shared voice so any team can ship VO18:29 — Putting it together: Screen Studio video + Podcastle narration19:24 — Finished example: Fellow YouTube settings walkthrough (11-minute tutorial)21:06 — Syncing visuals to VO: record screen while listening to the generated narration22:59 — Script creation workflow: Fellow call → transcript → ChatGPT → clean script23:34 — Full recap of the end-to-end pipeline25:01 — Repurposing: scripts → blogs, help center, CS clips; scale breadth of tutorials26:28 — Looking ahead: excitement about fast-evolving AI agentsTools & Technologies Mentioned (with quick notes)Screen Studio — Smart screen recorder that auto-smooths mouse movement, adds tasteful zoom/pan animations, and supports brand presets for consistent output.Podcastle — Audio suite used here to edit audio clipsMagic Dust AI: one-click studio-quality enhancement (denoise, de-reverb, leveling).AI Voices & Voice Cloning: generate narration from text; keep brand-consistent VO.Fellow — AI Meeting assistant used to host a solo “idea dump,” generate transcripts, AI recaps, chapters, and action items; doubles as the seed for scripts.ChatGPT — Refines raw Fellow transcript into a clean, concise voiceover script.YouTube — Publishing destination for finished tutorials.Zapier — Example in host's Screen Studio demo (automation with Fellow).Google Meet / Zoom — Where the solo Fellow “recording” session can happen.Adobe (Premiere/After Effects) — Old manual workflow stand-ins (contrast to auto animations).Subscribe at thisnewway.com to get the step-by-step playbooks, tools, and workflows.
Amanda Cupido doesn't speak Spanish or French. But using AI, she and her team helped a global nonprofit make their internal podcast more accessible to as many employees as possible. Amanda is an audio producer and the founder of a production company called Lead Podcasting. One of her clients is a global nonprofit with over 35,000 employees—and not all of them speak English. So she made them a pitch: what if they added AI into the mix? They would make the podcast in English, and then use generative AI voice tools to translate it into Spanish and French—with a lot of human oversight, of course. Driven by a desire to use these tools for good, the goal was never to replace people, but to reach more people, and it worked.On this episode, Amanda shows what it's like—and what it sounds like—to make a podcast with AI that's still human at its core.You can learn more about Lead Podcasting at leadpodcasting.com~ ~ ~Working Smarter is brought to you by Dropbox Dash—the AI universal search and knowledge management tool from Dropbox. Learn more at workingsmarter.ai/dashYou can listen to more episodes of Working Smarter on Apple Podcasts, Spotify, YouTube Music, Amazon Music, or wherever you get your podcasts. To read more stories and past interviews, visit workingsmarter.aiThis show would not be possible without the talented team at Cosmic Standard: producer Dominic Girard, sound engineer Aja Simpson, technical director Jacob Winik, and executive producer Eliza Smith. Special thanks to our illustrators Justin Tran and Fanny Luor, marketing consultant Meggan Ellingboe, and editorial support from Catie Keck. Our theme song was composed by Doug Stuart. Working Smarter is hosted by Matthew Braga. Thanks for listening!
New Episode! Tell us your feedback! Is Your Company Safe From AI Attacks?This episode covers the intersection of artificial intelligence and cybersecurity, exploring how AI can be used for both protection and malicious purposes. We examine how AI is used to create advanced ai cybercrime and deep fakes, and the rising threat of social engineering attacks. Learn how ai cybersecurity can help defend against ai hackers and other emerging threats. Feeling Kind? Consider Supporting Our Channel by subscribing! Over 84% of viewers do not subscribe to our channel!
This conversation explores the rapid advancements of AI in healthcare, emphasizing the importance of compliance and the risks associated with shadow AI. It discusses the necessity of prompt training for safe AI usage, the evolving threats of ransomware and social engineering, and the implications of deepfakes in cybersecurity. The conversation concludes with a focus on emerging threats like prompt injection and QR code risks, highlighting the need for awareness and proactive measures in the healthcare sector.Send us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
Don't let your small business fall victim to devastating cyber attacks! Expert joins us t discuss AI Risks exposed. We explore how hackers use AI to target small businesses. From AI Social engineering to data theft, learn what you need to know to protect your business from cyber threats. Send us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
Unser heutiger Gast ist seit über zwei Jahrzehnten als Schauspielerin auf der Bühne, vor der Kamera und am Mikrofon zu Hause. Sie hat in zahlreichen Film-, Fernseh- und Kinoproduktionen mitgewirkt, Hörbücher eingesprochen und stand auf den Theaterbühnen dieses Landes. Darüber hinaus hat sie vor gut einem Jahr ihr Schaffen um eine neue Dimension erweitert. Als zertifizierter Coach für das international anerkannte CliftonStrengths-Modell bringt sie zusammen, was auf den ersten Blick vielleicht ungewöhnlich erscheint: Schauspiel und Stärkenorientierung. In dieser Verbindung liegt jedoch genau das, was sie auszeichnet und im beruflichen Kontext besondere Wirkung entfaltet: die Fähigkeit, Menschen zu ermutigen, ihren individuellen Ausdruck zu finden, ihre Stimme zu nutzen und sich in ihrer ganzen Persönlichkeit zu zeigen. Ihr Engagement gilt dabei nicht nur Einzelpersonen, sondern auch der nachhaltigen Transformation ihrer Branche: als Mitgründerin der Greenactorslounge, als Regionalpatin im Bundesverband Schauspiel, wo sie seit über zwölf Jahren die filmpolitische Arbeit aktiv mitprägt und die Interessen der Schauspielenden im Norden vernetzt und vertritt – sowie als Gestalterin eines Berufsbilds, das sich im Wandel befindet. Seit über acht Jahren beschäftigen wir uns in diesem Podcast mit der Frage, wie Arbeit den Menschen stärkt, statt ihn zu schwächen. In über 500 Gesprächen mit mehr als 600 Gästen haben wir darüber gesprochen, was sich für sie verändert hat, und was sich noch verändern muss. Wie verändert sich der Beruf der Schauspielerin in Zeiten von KI, Voice Cloning und synthetischem Bildmaterial? Was können Menschen in der heutigen Arbeitswelt von Schauspieler:innen lernen, wenn es um authentische Kommunikation, Präsenz und Wirkung in Meetings, auf Bühnen oder im Video-Call geht? Und wie hilft der Blick auf die eigenen Stärken dabei, sich beruflich klarer zu positionieren und überzeugender aufzutreten, gerade dann, wenn es darauf ankommt? Fest steht: Für die Lösung unserer aktuellen Herausforderungen brauchen wir neue Impulse. Daher suchen wir weiter nach Methoden, Vorbildern, Erfahrungen, Tools und Ideen, die uns dem Kern von New Work näherbringen. Darüber hinaus beschäftigt uns von Anfang an die Frage, ob wirklich alle Menschen das finden und leben können, was sie im Innersten wirklich, wirklich wollen Ihr seid bei ‘On the Way to New Work', heute mit Esther Roling. [Hier](https://linktr.ee/onthewaytonewwork) findet ihr alle Links zum Podcast und unseren aktuellen Werbepartnern
David Mauro and co-host Zach Moskow engage with Kevin McGrew, author of 'The New Rules of Marketing Warfare.' They discuss the intersection of marketing and leadership, emphasizing the importance of frameworks in business strategy. Kevin shares insights on the SMAC framework (Shoot, Move, Adapt, Communicate) and how it can help businesses navigate challenges. The conversation also explores the impact of AI on marketing, the necessity of adaptability, and the future of business leadership in a rapidly changing landscape.You can grab a copy of Kevin's new book here: https://a.co/d/9bGjIBf Send us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
Kurtis Minder, seasoned ransomware negotiator, shares insights into the complex world of cybercrime negotiations. He discusses the psychological aspects of negotiating with cybercriminals, the role of AI in both offense and defense, and the importance of understanding the motivations behind cybercrime. The conversation also touches on the evolving landscape of ransomware as a service and the implications for businesses and national security.Send us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
They thought they found love… Instead, they walked straight into a digital slaughterhouse.In this shocking episode of Cyber Crime Junkies, host Dean Mauro and Dr. Sergio Sanchez expose the dark world of pig butchering scams — where victims are “fattened up” with trust before being bled dry financially and emotionally.We reveal:· The $1M “Brad Pitt” romance scam that fooled a highly educated professional.· How AI deepfakes and voice cloning make fraudsters nearly impossible to spot.· Crypto investment cons promising 80% annual returns that vanish overnight.
In this exclusive interview, a former ransomware hacker reveals the shocking truth behind a devastating supply chain attack that brought a major organization to its knees. From the initial breach to the final ransom demand, our insider shares never-before-heard secrets about the tactics, techniques, and procedures used to pull off the heist. You won't want to miss this rare glimpse into the dark world of cybercrime.Send us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
In this episode, Ryan Williams Sr. and Shannon Tynes discuss the latest trends in cybersecurity, focusing on the implications of AI in vishing attacks, the vulnerabilities in Microsoft Exchange servers, and the ongoing debate about ransomware payments in the public sector. They emphasize the importance of cyber hygiene, patch management, and the need for organizations to adopt robust security measures to protect against evolving threats. The conversation also touches on personal experiences and reflections on the state of cybersecurity today. Article: Here's how deepfake vishing attacks work, and why they can be hard to detect https://arstechnica.com/security/2025/08/heres-how-deepfake-vishing-attacks-work-and-why-they-can-be-hard-to-detect/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExdDQybE5Id0ExYVFlR2IyagEexeDDO4ZorrMuIbaYyZNnc2rZ_ZrFaJc2vwRExV9NWq0M5X3PJD_yG64dlCA_aem_R6pY2OGsflXM303gkkbTkw CISA, Microsoft warn about new Microsoft Exchange server vulnerability https://www.cybersecuritydive.com/news/cisa-microsoft-warn-about-new-microsoft-exchange-server-vulnerability/757022/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExdDQybE5Id0ExYVFlR2IyagEe1cBUbEPFo3sT-iA3VjfJzFY1_2kwO149KK7-smha5_GY7D3ZtLwZ610k6-M_aem_sXH-f5fGN_d3r6sjc7BWYQ Ransomware payment ban: Public sector currently pays out more than anyone else https://www.thinkdigitalpartners.com/news/2025/08/07/ransomware-payment-ban-public-sector-currently-pays-out-more-than-anyone-else/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExdDQybE5Id0ExYVFlR2IyagEeSCrxfMllZGSW_y6XZS3o0kUjyX43jLC92sYm8b1xr9bB8PdScUHrqeB7JQQ_aem_4OkxBy39eqUCqhksF6lF7w Please LISTEN
In today's fast-paced and ever-changing world, leadership is more crucial than ever. But what makes a GREAT leader in this new era? Is it their ability to adapt to change, their capacity to inspire and motivate their team, or their willingness to take calculated risks?We'll explore the key characteristics and qualities that define a GREAT leader in today's fast-changing world. From effective communication and strategic thinking to emotional intelligence and resilience, we'll delve into the essential skills and traits that set exceptional leaders apart from the rest. Join us as we uncover the secrets to successful leadership and discover how you can develop the skills needed to thrive in today's fast-paced business environment.Chapters00:00 The Heart of Leadership: A New Perspective01:46 From Humble Beginnings to HR Leadership05:39 The Journey to People Management09:55 Lessons from Sales: Tenacity and Teamwork12:34 Core Values and Leadership Insights17:14 Curiosity and Empathy in Leadership20:27 The Importance of Clarity and Kindness23:37 Generational Shifts in the Workforce26:55 Navigating AI and Leadership31:50 The Role of Trust in Transformation41:58 Re-Recruiting: Keeping Talent EngagedSend us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
Host Dean Mauro interviews Amy Cappellanti-Wolf, CHRO with Dayforce, an experienced Chief Human Resources Officer, discussing the importance of AI in HR, HR Technology, Human Resource Strategy and Leadership Skills.Send us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
Welcome to Cyber Crime Junkies—where cybersecurity finally meets binge-worthy storytelling.Join Our Community. Choose a PLAYLIST!Protect your personal data and online identity from cyber threats with this comprehensive guide to cybersecurity 101! In today's digital age, it's crucial to prioritize internet safety and secure browsing habits to avoid falling victim to identity theft and other malicious attacks. By adopting good cyber hygiene practices, you can significantly reduce the risk of being hacked and protect your sensitive information from prying eyes. In this video, we'll cover the essential tips and best practices to ensure your online safety and data security. From password management to safe online transactions, we've got you covered. Stay ahead of hackers and take control of your online security today!CHAPTERS00:00 Welcome to Cyber Crime Junkies00:11 Cybersecurity Made Simple00:22 How To Break into Cybersecurity00:33 Cybersecurity For Beginners00:44 Cybersecurity Training For Beginners00:55 How To Protect Yourself Online01:16 Cyber Security Awareness01:27 Digital Safety Tips01:38 Cybersecurity For Non-TechiesSend us a textSupport the show
What if your voice could be stolen? In Part Two, Dr. Tanusree Sharma reveals the hidden risks behind voice AI: how the same recordings that powered tools like Siri and Alexa are now being cloned, weaponized, and monetized without consent. She introduces PRAC3-a bold new framework blending privacy, reputation, and accountability with traditional consent models-and calls AI leaders to rethink how they handle voice data before trust is lost for good. From creative rights to biometric identity, this conversation is a must-listen for anyone shaping the future of synthetic speech. Join us and explore why voice governance can't wait.
AI Chat: ChatGPT & AI News, Artificial Intelligence, OpenAI, Machine Learning
In this episode, Jaeden breaks down the biggest announcements from the Google I/O conference, including the launch of his own AI Box Playground and Google's latest AI-powered tools. He explores the game-changing potential of Google's AI Try-On for online shopping, the new AI Mode designed to supercharge search, and the deeper personalization coming to search with contextual understanding. The conversation highlights how these innovations could reshape user experience and the future of online discovery.Chapters00:00 Introduction to Google I.O. Highlights01:50 AI Box Playground Launch03:36 Google Meet's Voice Cloning and Translation05:27 Innovations in Video AI Technology06:54 Google's User Engagement and Future DirectionsTry AI Box: https://AIBox.ai/AI Chat YouTube Channel: https://www.youtube.com/@JaedenSchaferJoin my AI Hustle Community: https://www.skool.com/aihustle/about
In this episode, we're diving into the world of Name, Image, and Likeness (NIL) rights—what they are, why they matter, and how they're shaping everything from college sports to social media and AI. Whether you're an athlete, influencer, entrepreneur, or just someone with a digital presence, your identity has value—and the law is catching up to protect it. We'll break down real cases, and give practical tips on how to safeguard your personal brand in a world where your face can go viral without your permission. Connect with Adam Diament E-mail: adiament@nolanheimann.com Website: https://www.nolanheimann.com/legal-team/adam-diament Phone/Text: (424)281-0162 YouTube: https://www.youtube.com/channel/UC5cTADZzJfPoyQMjnW-rtRw Instagram: https://www.instagram.com/trademarkpatentlaw/ LinkedIn: https://www.linkedin.com/in/adam-diament-j-d-ph-d-180a005/ Amazon Book Page: https://www.amazon.com/stores/author/B005SV2RZC/allbooks?ingress=0&visitId=831aff71-513b-4158-ad73-386ede491e93
Courtroom battles are reshaping the film industry in ways that affect everyone from A-list stars to streaming subscribers. When Scarlett Johansson sued Disney over Black Widow's simultaneous streaming release, she wasn't just fighting for her paycheck—she was challenging how talent gets compensated in the digital age. The resulting alleged $40 million settlement forced studios everywhere to rewrite contracts with streaming contingencies.Meanwhile, across the globe, Nigerian filmmaker Femi Adebayo made history with a judgment against digital pirates who cleverly misused his film's promotional materials. His three-year legal fight established crucial precedent for Nollywood creators and signaled that copyright protection extends beyond Hollywood's borders.Technology continues to create fascinating legal disruptions. When Quentin Tarantino announced plans to auction Pulp Fiction NFTs, Miramax quickly filed suit, arguing his 1993 contract never contemplated blockchain tokens. Though they settled privately, the dispute highlighted how decades-old agreements struggle to address technologies that didn't exist when the ink dried.The most provocative developments involve artificial intelligence. Buenos Aires prosecutors are challenging their own government for failing to regulate AI systems that clone faces and voices without consent, framing digital identity as a constitutional right. Simultaneously, Chinese courts ruled that images created with AI tools can receive copyright protection—but only when significant human creativity guides the process.From Japanese courts imposing record penalties against "fast movie" channels that condense films into unauthorized summaries to European judges limiting what information YouTube must share about copyright infringers, these cases collectively demonstrate that intellectual property law isn't just legal background noise—it's the script determining who controls the stories we love.Whether you're creating content, distributing it, or simply enjoying it as a fan, understanding these shifting legal frameworks provides a fascinating new lens through which to view your favorite films. Subscribe now to explore more intersections of creativity and the fine print that governs it.Send us a text
THIS EPISODE BROUGHT TO YOU BY: You'll notice that there's no sponsor in this episode. We'd love it if you'd consider supporting on Patreon. PATREON - patreon.com/nodumbquestions STUFF IN THIS EPISODE: An Early Edison Wax Cylinder Home Recording Over There Irish Eyes Swiper No Swiping - Dora the Explorer B.F. Skinner Pavlov's Dog Freedom app Definition of Virile HGModernism - You're Not Addicted to tiktoks… Algorithms are breaking how we think When Helping Hurts by Steve Corbett and Brian Fikkert Percy Jackson (Lotus Casino Scene) The dark side of AI voice cloning - Jeff Geerling CONNECT WITH NO DUMB QUESTIONS: Support No Dumb Questions on Patreon if that sounds good to you Discuss this episode here NDQ Subreddit Our podcast YouTube channel Our website is nodumbquestions.fm No Dumb Questions Twitter Matt's Twitter Destin's Twitter SUBSCRIBE LINKS: Subscribe on iTunes Subscribe on Android OUR YOUTUBE CHANNELS ARE ALSO FUN: Matt's YouTube Channel (The Ten Minute Bible Hour) Destin's YouTube Channel (Smarter Every Day)