POPULARITY
New Episode
Mark Zuckerberg took the stand as did the head of Instagram in a landmark decision. Their own internal documents are damning and the allegations can change the face of social media forever. This is Social Media's Tobacco Lawsuit moment. Chapters00:00 Meta's Legal Battle: A New Era for Big Tech Accountability02:45 The Impact of Social Media on Youth Mental Health05:37 The Role of Internal Documents in the Trial08:53 The Consequences of Negligence: Real Stories of Harm11:44 Facial Recognition and Privacy Concerns14:42 The Trial's Implications for Future Regulations17:31 Resources for Parents and Victims of CybercrimeQuestions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us.Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
New evidence and testimony in the landmark trial going on right now in Los Angeles. Do court documents prove Instagram was Designed To Addict Traumatized Kids?Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us.Support the show
AI Scams: Protecting Your Family In this episode of The Secure Family Podcast, Andy discusses how artificial intelligence is being used by scammers to target unsuspecting individuals and families. The episode details a recent scam in which AI-generated images were used to trick a couple into believing their lost dog needed emergency surgery. Andy explains the advanced techniques being used, such as AI-generated voices and personalized messages, and provides practical steps to verify emergencies, protect digital data, and educate elderly family members about these threats. The episode underscores the importance of being skeptical and maintaining digital privacy in an era where AI scams are becoming increasingly sophisticated and hard to detect. Take control of your data with DeleteMe. Because they sponsor the podcast you can get 20% off a privacy plan from DeleteMe with promo code: DAD. Connect
What happens when a tech giant is accused of copying your voice? Podcast host David Greene is suing Google, claiming his voice was used to create an AI clone inside NotebookLM without his permission and raising serious questions about how far AI tools can go when training on public content. That is just one headline in this week's news roundup. We also look at Apple finally leaning into native video on its platform and ask the obvious question: Why now? Is this a response to YouTube and Spotify gaining ground, or a long-overdue shift in strategy? Plus, we touch on SAG-AFTRA and ongoing union conversations around AI. Big tech is making big moves, and tensions between platforms and creators continue to grow. Are we watching the start of a major reset in how voice, video, and ownership are regulated in podcasting?Episode Highlights: [03:56] Newsday metrics and Apple and Spotify top five charts[06:04] Upcoming podcasting events, conferences, and weekly meetup[08:13] Creator money tip on 1099-K traps, tracking income, and tax prep[17:09] Captivate hires Rob Walsh and Elsie Escobar[25:27] SAG-AFTRA vs.Netflix and defining the Pete Davidson show as a podcast[32:47] Concerns about union impact on indie podcasting[38:27] NPR's David Greene sues Google over AI voice likeness[45:06] Apple Podcasts expands native video distribution[49:24] Apple's long-term video strategy and hardware positioningLinks & Resources: The Podcasting Morning Chat: www.podpage.com/pmcJoin The Empowered Podcasting Facebook Group:www.facebook.com/groups/empoweredpodcastingBook A Free Call With Me: https://calendly.com/ironickmedia/freestrategycallJoin The Empowered Podcasting Facebook Group:www.facebook.com/groups/empoweredpodcastingApplication To Submit Your Show For Evaluation: https://docs.google.com/forms/d/e/1FAIpQLSc8-Xv6O6lrNPcPJwj3N0Z5Osdl-5kHGz_PiAU45U57S-XgoA/viewform?usp=headerPodnews: www.Podnews.netNPR's David Greene Sues Google Over AI Voice Cloning:www.washingtonpost.com/technology/2026/02/15/david-greene-google-ai-podcast SAG-Aftra and Netflix Agree on Terms for Pete Davidson Show https://variety.com/2026/digital/news/pete-davidson-show-sag-aftra-podcast-agreement-netflix-1236661709/Apple Goes All In On Video: https://podcasters.apple.com/video-apple-podcasts?src=emailRemember to rate, follow, share, and review our podcast. Your support helps us grow and bring valuable content to the podcasting community.Join us LIVE every weekday morning at 7 am ET (US) on Clubhouse: https://www.clubhouse.com/house/empowered-podcasting-e6nlrk0wLive on YouTube: https://youtube.com/@marcronickBrought to you by iRonickMedia.com Please note that some links may be affiliate links, which support the hosts of the PMC. Thank you!--- Send in your mailbag question at: https://www.podpage.com/pmc/contact/ or marc@ironickmedia.comWant to be a guest on The Podcasting Morning Chat? Send me a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/1729879899384520035bad21b
People Are Marrying AI Now (And Your Business Should Be Worried). New Episode
China Government Turns APPS into SPY Tools | Ex FBI Agent Explainsew Episode
Synthetische Stimmen kennen wir spätestens seit Siri oder Google Maps alle. Ein bisschen wackelig, nicht immer perfekt. Aber wir verzeihen das, solange die Information stimmt. Doch was passiert, wenn genau solche Stimmen plötzlich zum Gamechanger für Verlage werden? In dieser Folge des Handelskraft Digital Business Talk spricht Host Franzi Kunz mit Pascal Hohmann, Co-Founder und Chief Product Officer von Storyflash. Das Start-up hilft Verlagen dabei, aus bestehenden Artikeln in wenigen Klicks Podcasts zu machen, inklusive Text-to-Speech, Voice Cloning und automatisiertem Workflow. Höre in dieser Folge, unter anderem: - weshalb KI-Stimmen für Wissensvermittlung hervorragend funktionieren - wie Verlage mit demselben Inhalt auf Papier, Website, Social und Audio völlig unterschiedliche Zielgruppen erreichen - welche Rolle Local Voices für Vertrauen und Bindung spielen - wie Voice Cloning in Redaktionen bereits heute produktiv eingesetzt wird - welche Use Cases über Verlage hinaus spannend sind (z. B. Banken, Studien, interne Wissensformate) Pascal zeigt sehr konkret, wie Verlage mit überschaubarem Aufwand ein Audio-Produkt aufbauen, warum Reichweite allein nicht alles ist und wie Podcasts als Branding-Format neue, junge Zielgruppen in die Medienmarke hineinholen. Wenn du in Verlag, Medienhaus, Corporate Communications oder Content-Team arbeitest und über Podcasts, KI-Stimmen oder neue Formate nachdenkst, ist diese Folge für dich Pflichtprogramm. Hör rein und lass dich inspirieren.
New Episode
NIKE ROBBED! Not What You Think. The Cybercrime Junkies show dives into the Nike Breach, the world of cybercrime and cybersecurity, offering insights for cybersecurity for beginners and seasoned pros alike. Learn about the latest threats, including ransomware and malware, and the minds of the hackers behind them. Stay informed and protect yourself from cyber crime.Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us.Support the show
New Episode
Hackers aren't stealing passwords anymore. They're stealing what makes companies valuable.We cover: • The European Space Agency breach and why even elite organizations aren't safe • Pig butchering romance scams and how social engineering targets human psychology • The Nike data breach where attackers stole intellectual property, not customer data • AI voice cloning, deepfake scams, and real-world fraud attempts • Why modern cybercrime looks more like organized crime than traditional hacking.If you care about cybersecurity threats, ransomware groups, AI scams, social engineering attacks, or how hackers actually operate today, this episode will change how you think about risk.Cybercrime is evolving fast. Most defenses aren't.CHAPTERS00:00 – Hackers stopped stealing passwords and started stealing everything 01:50 – Welcome to Chaos + panel intros 03:40 – Meme culture, cold weather, and why Dino has too much free time 04:25 – European Space Agency hacked twice in one month 06:00 – If rocket scientists can't keep hackers out… 07:10 – Space nerds, Carl Sagan, and stardust detour 08:15 – Romance scams and pig butchering explained 09:20 – “Wrong number” texts and how the scam really starts 10:50 – How victims are slowly manipulated into crypto scams 12:25 – The 764 gang and psychological weaponization 13:40 – The dark twist: scammers as human trafficking victims 16:40 – Luxury lifestyles, urgency, and fake success 18:20 – Why victims don't report scams 23:30 – Fake job offers and too-good-to-be-true salaries 24:20 – Nike breach isn't what you think 25:45 – Why hackers skipped customer data entirely 27:10 – WorldLeaks, ransomware evolution, and pure extortion 28:35 – 1.4TB of stolen intellectual property 30:30 – Stealing what actually makes Nike… NikeQuestions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us.Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
Nike's Worst Nightmare Just Happened. The Cybercrime Junkies show dives into the NIKE breach, the world of cybercrime and cybersecurity, offering insights for cybersecurity for beginners and seasoned pros alike. Learn about the latest threats, including ransomware and malware, and the minds of the hackers behind them. Stay informed and protect yourself from cyber crime.Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us.Support the show
AI Changed Social Engineering. New Verification Rules to Know TODAY!If you didn't independently confirm the human using a channel you know is legitimate, you didn't verify anything.You placed your trust in whatever entity controls that communication channel. And there's an increasing chance that entity is a criminal enterprise with better AI tools than your security team.Stop checking emails. Start checking humans.The difference could be your career—or your company's survival.Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us.Support the show
Hackers stole The HEART of Nike. | A Nightmare! The Cybercrime Junkies show dives into the NIKE BREACH and what it means, covering the world of cybercrime and cybersecurity, offering insights for cybersecurity for beginners and seasoned pros alike. Learn about the latest threats, including ransomware and malware, and the minds of the hackers behind them. Stay informed and protect yourself from cyber crime.Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us.Support the show
Jake and Michael discuss all the latest Laravel releases, tutorials, and happenings in the community.Show linksLaravel Boost v1.8.10 Released With New AI Prompts and Livewire v4 SupportAsync Request Cancellation Updates in Inertia v2.3.10Docker Support in Laravel VS Code Extension v1.4.2Query Builder Expression Aliases in Laravel 12.48Livewire 4 Support in Laravel VS Code Extension v1.4.3Laravel Boost v2.0 Released with Skills SupportEverything new in Livewire 4Statamic 6 Beta Now AvailableFilament v5 Released With Livewire v4 Support and a New Blueprint ToolLaravel News Is the Live Stream Partner for Laracon EU 2026Migrating Laravel News from Laravel Forge to CloudLaravel Debugbar v4.0.0 is releasedAutomate Laravel Herd Worktrees with This Claude Code SkillFluentVox: AI Text-to-Speech for Laravel with Voice Cloning and GPU AccelerationLaravel Deadlock: Manage Technical Debt with Expiring Code MarkersLaravel Invite Only Adds a Full User Invitation System with Tokens, Events, and RemindersRestrict User Actions with Time-Based Sanctions Using Laravel ProhibitionsRadiance: Generate Deterministic Mesh Gradient Avatars in PHPFair Queue Distribution with Laravel Balanced QueueTutorialsSpeeding Up Laravel News With Cloudflare
New Episode
New Episode
Have you ever noticed how we keep telling ourselves cyber risk is a “future problem” right up until it walks in the front door wearing a name badge?Because in this episode, we're not talking about Hollywood hackers or hoodie clichés. We're talking about how attacks actually happen now. We interview global vCISO Dan Elliott from Recorded Future all about it. Question? Text our Studio direct.Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
Hey! Alex here, with another weekly AI update! It seems like ThursdAI is taking a new direction, as this is our 3rd show this year, and a 3rd deep dive into topics (previously Ralph, Agent Skills), please let me know if the comments if you like this format. This week's deep dive is into Clawdbot, a personal AI assistant you install on your computer, but can control through your phone, has access to your files, is able to write code, help organize your life, but most importantly, it can self improve. Seeing Wolfred (my Clawdbot) learn to transcribe incoming voice messages blew my mind, and I wanted to share this one with you at length! We had Dan Peguine on the show for the deep dive + both Wolfram and Yam are avid users! This one is not to be missed. If ThursdAI is usually too technical for you, use Claude, and install Clawdbot after you read/listen to the deep dive!Also this week, we read Claude's Constitution that Anthropic released, heard a bunch of new TTS models (some are open source and very impressive) and talked about the new lightspeed coding model GLM 4.7 Flash. First the news, then deep dive, lets go
רק מספר 509 של רברס עם פלטפורמה - באמפרס מספר 90, שהוקלט ב-1 בינואר 2026, שנה אזרחית חדשה טובה! רן, דותן ואלון באולפן הוירטואלי (עם Riverside) בסדרה של קצרצרים וחדשות (ולפעמים קצת ישנות) מרחבי האינטרנט: הבלוגים, ה-GitHub-ים, ה-Rust-ים וה-LLM-ים החדשים מהתקופה האחרונה.
Question? Text our Studio direct.Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
Why modern cybercrime targets trust, urgency, and decision-making instead of systemsDeepfake Attacks, Voice Cloning, and Why AI Social Engineering WorksTraditional fraud used to feel obvious: misspellings, odd links, weird emails. Now? Deepfakes embed perfectly familiar voices and faces into your feed — or your inbox.Listen to Perry Carpenter on this. If you love this topic as much as we do grab Perry's incredible book FAIK available everywhere. Here's a non-affiliated link: https://www.barnesandnoble.com/w/faik-perry-carpenter/1145888787?ean=2940190971293Don't Miss the Deepfake Webinar coming up! You WIll See how you can test out your own deepfake to better understand them. https://info.knowbe4.com/new-deepfake-training-na?partnerref=blogChapters 00:00 Why the Next Breach Won't Look Like the Last One01:44 Welcome to America in 202603:00 Why Deepfakes Are Exploding Right Now05:20 Yes — A Voice Can Be Cloned in Seconds07:30 What Deepfakes Actually Are (No Hype)09:35 Legitimate Uses vs Weaponized Intent12:45 Why Deepfake Companies Stay Quiet17:05 Faces and Voices Are the New Attack Surface18:30 Stop Asking “Is This Real?” Ask This Instead20:55 Why Spotting Artifacts No Longer Works23:45 The One Question That Cuts Through Deepfakes25:50 What Leaders Should Actually Do Today27:45 Old-School Security Still Wins30:05 Why Detection Tools Are Losing the Race33:10 Romance Scams, HR Fraud, and Deepfake Hiring35:45 10 of 15 Job Candidates Were Fake — Here's Why38:40 Fake Workers, Real Access, Real Damage42:20 Deepfakes as Multi-Stage AttackQuestion? Text our Studio direct.Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
Most cybercrime doesn't start with genius hackers. It starts on a Tuesday. Someone's busy. An email feels urgent. And a decision gets made five seconds too fast. Fear-based cybersecurity training hasn't made people safer. It's made them tired.Most cyber attacks don't start with genius hackers. They start with rushed decisions, social engineering, and skipped updates.This short breaks down ai explained in plain English, why cybersecurity for beginners often gets taught the wrong way, and how cyber security and cybersecurity really fail in the real world.From ethical hacking myths to a realistic cybersecurity roadmap, this blends true crime stories, true crime, and modern AI threats to explain what actually puts people and companies at risk.If you care about small business cyber security and understanding how attacks really happen, this one matters.We've been trained to panic about rare, cinematic attacks… while leaving the front door unlocked every single day.The boring truth that actually works: • Don't get tricked • Patch your systemsThat's it. Not sexy. Not cinematic. But it works.Full breakdown in Chaos Brief and on the Cyber Crime Junkies channel.Question? Text our Studio direct.Support the show
We've trained people to fear nation-state hackers…while getting breached by rushed clicks and skipped updates.Cybercrime doesn't win because it's smart. It wins because people are tired. We've been trained to panic about rare, cinematic attacks… while leaving the front door unlocked every single day.The boring truth that actually works: • Don't get tricked • Patch your systemsThat's it. Not sexy. Not cinematic. But it works.Question? Text our Studio direct.Support the show
Question? Text our Studio direct.New Episode
Question? Text our Studio direct.New Episode
Question? Text our Studio direct.
Question? Text our Studio direct.New Episode
Question? Text our Studio direct.Today we're talking about AI-powered cybercrime—a phrase that sounds like a marketing stunt but is, unfortunately, very real. Cybercriminals basically got a software update, and now they're running their operations with more automation, more scale, and — let's just say it — better customer service than half the vendors in your tech stack.Season 8 is officially here — and it's the most unhinged, hilarious, and dangerously educational season we've ever done with full cyber chaos:
Question? Text our Studio direct.The Supreme Court is hearing a billion-dollar piracy case that could literally change how the entire internet works. Sony says Cox Communications should be liable for customers illegally downloading music — including 10,017 songs in dispute.Cox argues: “We didn't do it.” Leaked email: “F the DMCA!!!” Yeah… this case is pure chaos.Season 8 is officially here — and it's the most unhinged, hilarious, and dangerously educational season we've ever done with full cyber chaos:
Question? Text our Studio direct.In this shocking monthly cyber update, the Cyber Crime Junkies (David, Dr. Sergio E. Sanchez, and Zack Moscow) expose the craziest, must-know stories in tech and security.What's Inside This Episode:The AI Threat is Real: Dr. Sergio reveals how Chinese threat actors manipulated Anthropic's Claude AI system to stage cyber attacks against nearly 30 companies globally. Learn how powerful Large Language Models (LLMs) are leveling the field for malicious coders.The Casino Fish Tank Hack (True Story!): David tells the unbelievable story of how hackers breached a casino's main network by exploiting a smart thermostat inside an exotic fish tank, accessing high-roller financials. This proves critical network segmentation is non-negotiable.The New Scam: ClickFix: David breaks down the terrifying new ClickFix attack, where hackers trick you into literally copying and pasting malicious code into your own computer. Learn the golden rule to protect yourself from this massive, 500% spike in attacks.The Cloudflare Outage: Zack discusses the massive Cloudflare outage that took down major services like ChatGPT, revealing how a seemingly minor configuration error caused massive ripple effects across the entire internet.The iPhone Scam Laundry: Dr. Sergio shares a wild anecdote from his time at Apple about a global scammer laundering stolen or damaged iPhones for new ones, using a loophole caused by a business decision.
Heute zu Gast in der Show: Thilo Masuth (SAE Berlin). Thilo ist ein erfahrener Tontechniker und Audioengineer sowie COO des Hörspielstudio Xberg GmbH. Wir sprechen mit ihm über seine Reise in die Audioproduktion, die Herausforderungen und Entwicklungen im Hörspiel- und Hörbuchmarkt sowie die Auswirkungen von Künstlicher Intelligenz und Voice Cloning auf die Branche. Thilo teilt seine Erfahrungen im Schnitt von Hörbüchern, die Teamleitung in einem wachsenden Studio und die Herausforderungen der Atmos-Mischung. Zudem gibt er Einblicke in zukünftige Projekte und die Bedeutung von Leidenschaft in der Audioproduktion.LinedIn:https://www.linkedin.com/in/thilo-masuth-b453b41b2/Elgato BLACK FRIDAY DEALS:https://e.lga.to/p/black-friday-2025Life After SAE auf Instagram: https://www.instagram.com/lifeaftersae/Mehr zu Kurt gibt's hier:https://www.instagram.com/kurt_jonathan_engert/Mehr zu Glen gibt's hier:https://glenschaele.com/linktree
Question? Text our Studio direct.
A young undercover FBI operative risks everything to expose America's most devastating traitor — revealing how Cold-War spycraft evolved into today's cybercrime economy.The shocking true story of Robert Hanssen — the FBI mole who sold America's deepest secrets to Russia for over 20 years, leading to the execution of multiple double agents and triggering the worst intelligence breach in U.S. history.
What really happens during a cyber attack? Not the Hollywood version — the real one. The kind businesses experience every single day when a single compromised password, phishing email, or zero-day vulnerability ignites a full-scale crisis.In this full episode, we take you inside the anatomy of a real data breach with digital first responders from NetGain Technologies — the cybersecurity professionals who live inside ransomware events, Business Email Compromise (BEC) incidents, and wire-fraud attacks every week.You'll see how attacks start, how fast they spread, what attackers do once they're inside your email, and the exact steps that decide whether a company recovers… or collapses.What You'll Learn: • How a phishing email turns into credential theft and internal compromise • Why Business Email Compromise (BEC) is now the #2 most expensive breach type • The tricks attackers use to hide inside inboxes and impersonate executives • How wire transfer fraud really happens — and how the 2-person rule stops it • What zero-days look like in the wild (and why patches aren't enough) • The role of MFA, phishing-resistant MFA, email controls, and layered security • Why backups must be immutable, air-gapped, and isolated • How incident response teams contain malware without destroying evidence • When to call cyber insurance, law enforcement, and breach counsel • The IR playbook: detection → containment → communication → forensics → recovery • Why every business — no matter how small — IS a target⌚ CHAPTERS 00:00 – Intro: What BEC Really Looks Like Today 03:42 – How One Email Starts the Attack Chain 11:20 – Why Finance Teams Are Target #1 19:05 – The Social Engineering Playbook 27:48 – Live Breakdown of a Real BEC Incident 38:22 – What Happens During Wire Fraud Recovery 46:10 – Technical Controls That Actually Work 55:36 – How to Build a No-NonsSend us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
Discover the cutting-edge technology of CYBER EAGLE, a revolutionary system designed to defend against the threats of quantum warfare. As the world enters a new era of cybersecurity challenges, CYBER EAGLE is poised to be at the forefront of protecting sensitive information and national security.In this conversation, host David Mauro engages with Carlo Tortora Brayda and Michael Tiesemer, leaders of the Cyber Eagle Project, to discuss the future of AI in Cybersecurity and global protection of critical infrastructure. Chapters 00:00 Introduction to Cyber Eagle Project02:33 The Genesis of Cyber Eagle and Its Vision05:31 Understanding Critical Infrastructure Vulnerabilities08:00 The Age of Compression in Cybersecurity10:42 Building Resilience in Cyber Defense13:44 Dynamic Defense Strategies Against Evolving Threats16:19 Polymorphic AI Defense: Adapting to Attacks19:19 The Future of Cyber Eagle and Its Innovations25:25 Cyber Eagle's Global Deployment Strategy27:56 Building a Compliant Cybersecurity Channel30:40 Innovative Partnerships and Global Reach31:42 Quantum Safety and Cybersecurity Innovations36:58 The Future of Cyber Eagle and Its Mission Send us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
CMMC 2.0 explained in plain English — what it means for small businesses, defense contractors, and vendors across the DoD supply chain. Learn about Level 1 vs Level 2, self-attestation risks, C3PAO shortages, compliance deadlines, and how to stay audit-ready before 2025.Don't miss out on crucial information about the CMMC 2025 deadline. The Cybersecurity Maturity Model Certification is a vital requirement for businesses dealing with the Department of Defense. If you miss the deadline, you risk losing contracts and facing severe penalties. In this video, we'll explore the consequences of missing the CMMC 2025 deadline and provide valuable insights on how to prepare and stay compliant. Stay ahead of the game and ensure your business is CMMC-ready. Find out what happens if you missed the deadline and learn how to avoid costly mistakes. Tune in now and take the first step towards CMMC compliance. CHAPTERS00:00 – The 4 Letters That Can End Your Business00:15 – CMMC 2.0: Why November 10, 2025 Changes Everything01:35 – Meet the Expert: Frontline View from a CMMC Assessor02:59 – What Is CMMC (In Plain English)?04:20 – FCI vs CUI: The Data That Decides Your Level07:05 – Are You Level 1 or Level 2? How the Flow-Down Really Work10:05 – Why the DoD Stopped “Trusting” Small Contractors11:40 – Supply-Chain Breaches: How Third Parties Take You Down13:00 – Level 1: The 17 “Basic” Controls Everyone Ignores17:00 – The Dangerous Game of Fudging Your Self-Attestation21:15 – Level 2: 110 Controls, SSPs, and the Reality of NIST 800-17123:40 – C3PAO Bottleneck: Why Waiting Means Losing Contracts26:30 – POA&M and the 180-Day “Grace” Trap32:05 – Surprise: Printers, MSPs, and “Non-Defense” Vendors in the Blast Radius35:15 – CMMC Is Not Going Away (And Other Hard Truths)37:05 – Countdown to FallSend us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
When Amazon AWS and Microsoft Azure crashed, half a billion dollars vanished overnight. In this episode, David Mauro, Dr. Sergio Sanchez, and Zack Moscow uncover the ethics surrounding AI and the need for tech awareness, highlighting the importance of digital detox in maintaining a healthy balance.We break down:
Not long ago, faking someone's voice took real effort. Time's changed. Hear about a new system that allows anyone to mimic your voice in an instant. Learn more about your ad choices. Visit megaphone.fm/adchoices
Is there anything real left on the internet? Neil deGrasse Tyson and co-hosts Chuck Nice and Gary O'Reilly explore deepfakes, scams, and cybercrime with the Director of Threat Research at Bitdefender, Bogdan Botezatu. Scams are a trillion-dollar industry; keep your loved ones safe with Bitdefender: https://bitdefend.me/90-StarTalkNOTE: StarTalk+ Patrons can listen to this entire episode commercial-free here: https://startalkmedia.com/show/deepfakes-and-the-war-on-truth-with-bogdan-botezatu/Thanks to our Patrons Bubbalotski, Oskar Yazan Mellemsether, Craig A, Andrew, Liagadd, William ROberts, Pratiksha, Corey Williams, Keith, anirao, matthew, Cody T, Janna Ladd, Jen Richardson, Elizaveta Nikitenko, James Quagliariello, LA Stritt, Rocco Ciccolini, Kyle Jones, Jeremy Jones, Micheal Fiebelkorn, Erik the Nerd, Debbie Gloom, Adam Tobias Lofton, Chad Stewart, Christy Bradford, David Jirel, e4e5Nf3, John Rost, cluckaizo, Diane Féve, Conny Vigström, Julian Farr, karl Lebeau, AnnElizabeth, p johnson, Jarvis, Charles Bouril, Kevin Salam, Alex Rzem, Joseph Strolin, Madelaine Bertelsen, noel jimenez, Arham Jain, Tim Manzer, Alex, Ray Weikal, Kevin O'Reilly, Mila Love, Mert Durak, Scrubbing Bubblez, Lili Rose, Ram Zaidenvorm, Sammy Aleksov, Carter Lampe, Tom Andrusyna, Raghvendra Singh Bais, ramenbrownie, cap kay, B Rhodes, Chrissi Vergoglini, Micheal Reilly, Mone, Brendan D., Mung, J Ram, Katie Holliday, Nico R, Riven, lanagoeh, Shashank, Bradley Andrews, Jeff Raimer, Angel velez, Sara, Timothy Criss, Katy Boyer, Jesse Hausner, Blue Cardinal, Benjamin Kedwards, Dave, Wen Wei LOKE, Micheal Sacher, Lucas, Ken Kuipers, Alex Marks, Amanda Morrison, Gary Ritter Jr, Bushmaster, thomas hennigan, Erin Flynn, Chad F, fro drick, Ben Speire, Sanjiv VIJ, Sam B, BriarPatch, and Mario Boutet for supporting us this week. Subscribe to SiriusXM Podcasts+ to listen to new episodes of StarTalk Radio ad-free and a whole week early.Start a free trial now on Apple Podcasts or by visiting siriusxm.com/podcastsplus. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Unlocking Online Safety for Families in an AI WorldThis conversation delves into the critical intersection of child safety and artificial intelligence in today's digital landscape. The speakers discuss the importance of teaching children to navigate online spaces safely, the risks associated with social media, and the evolving nature of AI technology. They emphasize the need for common sense guardrails, the implications of identity theft, and the spread of misinformation. The discussion also touches on the future of AI regulation and the importance of education in safeguarding against cyber threats.Chapters00:00 Navigating Online Safety in an AI World02:35 The Intersection of AI and Child Safety05:29 Guardrails for Social Media and Parenting08:24 The Digital Footprint of Future Generations11:20 The Role of Social Media Companies14:18 The Risks of Identity Theft and Cybersecurity19:11 The Evolution of AI and Its Implications21:48 Jailbreaking AI: A New Frontier24:52 The Spread of Misinformation28:57 The Future of AI Regulation31:49 Preparing for an AI-Driven World34:43 AI and Cybersecurity35:30 AI, Cybersecurity, & Family Safety42:00 social media safetySend us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.A newly disclosed vulnerability in Redis, dubbed RediShell and tracked as CVE-2025-49844, affects all Redis versions and carries a maximum CVSS score of 10.0.Cisco has disclosed a critical zero-day vulnerability—CVE-2025-20352—affecting its widely deployed IOS and IOS XE software, confirming active exploitation in the wild.Researchers at NCC Group have found that voice cloning technology has reached a level where just five minutes of recorded audio is enough to generate convincing voice clones in real time.A China-linked cyber-espionage group, tracked as UNC5221, has been systematically targeting network infrastructure appliances that lack standard endpoint detection and response (EDR) support.Dutch authorities have arrested two 17-year-old boys suspected of being recruited by pro-Russian hackers to carry out surveillance activities.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform.This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.
In the world of cybersecurity, there are big lies that have been perpetuated about compliance, fixability and communication--and it's time to burn it all down and start over. Many experts see one main cybersecurity truth, especially about AI, SIEM, EDR and related business technology. By examining the intersection of AI, cybersecurity, and compliance, we can gain a deeper understanding of the lies that have been told about the state of cybersecurity and work towards a more secure future. Tune in to this thought-provoking Send us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
Content marketer and video lead Emily Kensley (Fellow) walks through a near-zero-friction workflow for creating polished product videos fast. She records clean, auto-animated screen demos with Screen Studio, fixes (or replaces) audio with Podcastle (Magic Dust + AI voices), and drafts scripts by riffing into a Fellow meeting then refining the transcript in ChatGPT. The result: 11-minute, brand-consistent tutorials produced in hours instead of days—repeatable by any team (marketing, CS, product, sales).Timestamps01:19 — Daily use of AI; from occasional to constant over last 6 months01:53 — What you'll learn: a minimal-human, video-centric content workflow03:41 — Tool #1 intro: Screen Studio for screen recordings05:27 — Live capture of an AI meeting recap demo (click-through highlights, actions, decisions)06:23 — Raw → instant output: auto-smoothing cursor paths & smart zooms (no manual keyframes)07:23 — Host example: using Screen Studio for a Zapier + Fellow automation video07:44 — “Done is better than perfect”: quick crop fixes, branded backgrounds, cursor presets08:24 — Team presets = consistent brand across departments09:44 — Tool #2 intro & story: Podcastle rescues a day of bad mic audio10:59 — Podcastle audio editor: noise reduction, levelling, silence removal12:10 — Magic Dust AI demo: echoey room → studio-quality voice13:38 — AI Voices in Podcastle: when to clone vs. pick a preset (e.g., “Abigail”)16:12 — Long-form scripts → generated narration in minutes; edit/regenerate on typos17:54 — Brand consistency: shared voice so any team can ship VO18:29 — Putting it together: Screen Studio video + Podcastle narration19:24 — Finished example: Fellow YouTube settings walkthrough (11-minute tutorial)21:06 — Syncing visuals to VO: record screen while listening to the generated narration22:59 — Script creation workflow: Fellow call → transcript → ChatGPT → clean script23:34 — Full recap of the end-to-end pipeline25:01 — Repurposing: scripts → blogs, help center, CS clips; scale breadth of tutorials26:28 — Looking ahead: excitement about fast-evolving AI agentsTools & Technologies Mentioned (with quick notes)Screen Studio — Smart screen recorder that auto-smooths mouse movement, adds tasteful zoom/pan animations, and supports brand presets for consistent output.Podcastle — Audio suite used here to edit audio clipsMagic Dust AI: one-click studio-quality enhancement (denoise, de-reverb, leveling).AI Voices & Voice Cloning: generate narration from text; keep brand-consistent VO.Fellow — AI Meeting assistant used to host a solo “idea dump,” generate transcripts, AI recaps, chapters, and action items; doubles as the seed for scripts.ChatGPT — Refines raw Fellow transcript into a clean, concise voiceover script.YouTube — Publishing destination for finished tutorials.Zapier — Example in host's Screen Studio demo (automation with Fellow).Google Meet / Zoom — Where the solo Fellow “recording” session can happen.Adobe (Premiere/After Effects) — Old manual workflow stand-ins (contrast to auto animations).Subscribe at thisnewway.com to get the step-by-step playbooks, tools, and workflows.
Amanda Cupido doesn't speak Spanish or French. But using AI, she and her team helped a global nonprofit make their internal podcast more accessible to as many employees as possible. Amanda is an audio producer and the founder of a production company called Lead Podcasting. One of her clients is a global nonprofit with over 35,000 employees—and not all of them speak English. So she made them a pitch: what if they added AI into the mix? They would make the podcast in English, and then use generative AI voice tools to translate it into Spanish and French—with a lot of human oversight, of course. Driven by a desire to use these tools for good, the goal was never to replace people, but to reach more people, and it worked.On this episode, Amanda shows what it's like—and what it sounds like—to make a podcast with AI that's still human at its core.You can learn more about Lead Podcasting at leadpodcasting.com~ ~ ~Working Smarter is brought to you by Dropbox Dash—the AI universal search and knowledge management tool from Dropbox. Learn more at workingsmarter.ai/dashYou can listen to more episodes of Working Smarter on Apple Podcasts, Spotify, YouTube Music, Amazon Music, or wherever you get your podcasts. To read more stories and past interviews, visit workingsmarter.aiThis show would not be possible without the talented team at Cosmic Standard: producer Dominic Girard, sound engineer Aja Simpson, technical director Jacob Winik, and executive producer Eliza Smith. Special thanks to our illustrators Justin Tran and Fanny Luor, marketing consultant Meggan Ellingboe, and editorial support from Catie Keck. Our theme song was composed by Doug Stuart. Working Smarter is hosted by Matthew Braga. Thanks for listening!
New Episode! Tell us your feedback! Is Your Company Safe From AI Attacks?This episode covers the intersection of artificial intelligence and cybersecurity, exploring how AI can be used for both protection and malicious purposes. We examine how AI is used to create advanced ai cybercrime and deep fakes, and the rising threat of social engineering attacks. Learn how ai cybersecurity can help defend against ai hackers and other emerging threats. Feeling Kind? Consider Supporting Our Channel by subscribing! Over 84% of viewers do not subscribe to our channel!