Podcasts about vulnerabilities

The inability of an entity to withstand the adverse effects of a hostile or uncertain environment

  • 1,396PODCASTS
  • 5,575EPISODES
  • 49mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Feb 20, 2026LATEST
vulnerabilities

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about vulnerabilities

Show all podcasts related to vulnerabilities

Latest podcast episodes about vulnerabilities

Badlands Media
Taking It Back Ep. 121: Election Vulnerabilities, Epstein Accountability & Media Manipulation

Badlands Media

Play Episode Listen Later Feb 20, 2026 60:27


In Episode 121 of Taking It Back, Adel Nero and Zak Paine break down a series of major developments shaping the national conversation. The show opens with discussion of Prince Andrew's arrest and its broader implications in connection to the Epstein files, including a new United Nations report suggesting the alleged crimes may meet the threshold of crimes against humanity. The hosts explore what this could mean for accountability at both national and international levels. They then pivot to explosive claims surrounding election integrity, analyzing recent commentary suggesting foreign adversaries may have interfered in U.S. elections. The episode revisits past statements from prominent Democrats questioning voting machine security and debates how voter ID laws and election reforms may reshape the political landscape. The conversation also tackles media narratives, including controversy surrounding Stephen Colbert and Senate politics in Texas, highlighting what the hosts view as strategic manipulation within establishment media circles. A wide-ranging episode focused on justice, election security, and the shifting dynamics of political power.

ITSPmagazine | Technology. Cybersecurity. Society
White Knight Labs: Still 2015 — How Old Vulnerabilities and Vibe Coding Are Breaking the Future | A Brand Story Podcast John Stigerwalt Founder at White Knight Labs | Red Team Operations Leader

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 19, 2026 36:54


There's a particular kind of clarity you get when you talk to someone who spends their days breaking into things for a living. Not with malice — with purpose. John Steigerwald, known to most in the industry simply as "Stigs," co-founded White Knight Labs in 2016 with a mission that sounds almost disarmingly simple: build the best penetration testing team anyone has ever seen, and actually deliver results. Nearly a decade later, the company has grown to 40 people, gone international, and is busier than ever. The question worth asking is: why?The uncomfortable answer, according to Stigs, is that the fundamental problems haven't changed. At all."Honestly, it's still 2015," he said during our most recent conversation on ITSPmagazine's Brand Story series. Not as a metaphor. As a diagnosis. The same misconfigurations, the same weak identity policies, the same unlocked back doors that red teamers were exploiting a decade ago are still wide open today. The apps built in a COVID-era frenzy — pushed out fast, tested never — are now running critical business infrastructure. And the organizations using them are only finding out when something breaks.What's changed is the surface area. Cloud, AI, Microsoft 365, vibe-coded production apps — each new layer of technology gets adopted at speed, and each one arrives carrying the same original sin: no one turned on the basics. Stigs used Microsoft 365 as a pointed example. Millions of businesses are running on it with DMARC turned off, default configurations untouched, Copilot layered on top, and not a single CIS Benchmark policy applied. "Every client is vulnerable," he said. "Not just 10% of clients. Every client."That's a striking statement. It's also, if you've been paying attention to breach headlines, not a surprising one.The AI angle adds a new and almost darkly comedic wrinkle. Vibe coding — the practice of using AI tools like Cursor or Claude to generate production-ready code at speed — has given entry-level developers intermediate-level output. Which sounds great, until you realize that the AI models many of them leaned on were trained on outdated, sometimes vulnerable data. Stigs described visiting multiple clients with nearly identical security weaknesses, all tracing back to the same ChatGPT-generated setup instructions. "You and your neighbor did the same thing," he told one client. That's not just a funny anecdote. It's a warning about what happens when an entire industry bootstraps its infrastructure from the same flawed source.And yet, Stigs isn't anti-AI. He uses it every day. He just sees it with the clarity of someone who also finds the holes it leaves behind. His prediction for the near future: a massive wave of secure code review requests, as companies start reckoning with the vibe-coded backlog they've been quietly accumulating. AppSec is about to have a very good year.Looking forward, White Knight Labs is watching the growing intersection of private sector expertise and government infrastructure testing with particular interest. Critical infrastructure in America, long overdue for rigorous physical and embedded testing, is starting to receive that attention. Stigs and his team are already in the room.What makes White Knight Labs different isn't just technical skill — it's the ability to communicate what they find in language that actually lands. In an industry full of reports that gather dust, that matters. The best penetration test in the world is useless if no one acts on it.The door is open. It's been open for years. The question is who you call to finally lock it.To learn more about White Knight Labs, visit their website or reach out directly. Listen to the full conversation on ITSPmagazine.GUESTJohn StigerwaltFounder at White Knight Labs | Red Team Operations Leaderhttps://www.linkedin.com/in/john-stigerwalt-90a9b4110/RESOURCESWhite Knight Labs:  https://whiteknightlabs.com_____________________________________________________________Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

MacBreak Weekly (Audio)
MBW 1012: Joining the YOLO Club - Apple's Special Experience Event on March 4th

MacBreak Weekly (Audio)

Play Episode Listen Later Feb 18, 2026 162:14


Apple has announced a special experience event occurring in New York, London, and Shanghai. Apple Podcasts is launching new video features. iOS 26.3 is out now. And Apple acquires the rights to the show, Severance, for $70 million! Apple's doing something on March 4th. Apple wins long-running court battle against Optis over 4G patents in the US. Apple makes four promises to developers about fairer treatment. Apple Podcasts is launching new video features, looking to keep pace with YouTube and Spotify. Apple updates its own iOS version figures. Tesla CarPlay held back by need for wider adoption of Apple's iOS 26. Find My outage & iCloud issues hit users once again Tuesday evening. Apple Creator Studio AI usage limits seem dramatically lower than promised. iPhone 18 Pro's new C2 chip will bring three advantages over iPhone 17. Apple testing, but still undecided about clamshell folding iPhone. iOS 27 'Rave' update to clean up code, could boost battery life. Resizing windows on macOS Tahoe – the saga continues. iOS 26.3 adds unique new privacy feature, and it's Apple at its best. Apple releases iOS 26.3 with updates that mainly benefit non-Apple devices. iOS 26.3 and macOS 26.3 Fix Dozens of Vulnerabilities, Including Zero-Day. Apple patches decade-old iOS zero-day, possibly exploited by commercial spyware. A code snippet in iOS 26.4 shows Apple TV is coming to CarPlay. macOS Tahoe 26.4 adds a charge limit slider to preserve your MacBook battery. iOS 26.4 has iPhone Stolen Device Protection on by default. macOS Tahoe 26.4 warns if your apps won't work when Rosetta 2 dies. It took two years, but Google released a YouTube app on Vision Pro. visionOS 26.4 unlocks new 'foveated streaming' feature for apps and games. The new F1 channel has appeared in the Apple TV app ahead of first race. Severance' acquired by Apple for $70 million, expect a 4-season run and spinoffs. Apple TV is adding MLS for free starting this week, here's the new promo. Picks of the Week Dave's Pick: Neo Network Utility 2.0 Leo's Pick: NetNewsWire and freeflow Andy's Pick: Wordgrinder Jason's Pick: Indigo Hosts: Leo Laporte, Andy Ihnatko, and Jason Snell Guest: Dave Hamilton Download or subscribe to MacBreak Weekly at https://twit.tv/shows/macbreak-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsor: bitwarden.com/twit

Dark Side of Wikipedia | True Crime & Dark History
Nancy Guthrie Update: Defense Attorney Reveals Investigation Vulnerabilities

Dark Side of Wikipedia | True Crime & Dark History

Play Episode Listen Later Feb 18, 2026 32:13


Sixteen days. No arrest. And a growing list of investigative decisions that defense attorney Bob Motta says could haunt prosecutors at trial.The Nancy Guthrie case has captured national attention—partly because her niece is Today show co-host Savannah Guthrie, but increasingly because of what's going wrong with the investigation itself.The crime scene was reportedly released early. Journalists photographed what appeared to be blood on the front porch before authorities scrambled to re-secure it. The FBI allegedly wanted critical DNA evidence sent to their Quantico lab; Sheriff Chris Nanos reportedly refused and sent it to a private Florida facility instead. An FBI source called it "dumb" and "insane."Then there's the glove problem. Of sixteen gloves collected near the home, fifteen were reportedly discarded by the searchers themselves—contamination that gives any defense attorney a roadmap to reasonable doubt.Bob Motta explains how each of these vulnerabilities translates into courtroom strategy. He breaks down the legal exposure facing Derrick Callella, charged with sending fake ransom texts to exploit the family's nightmare. He examines what Friday's SWAT detention—and Saturday's release of all four individuals—means for future prosecution.And he addresses the devastating human element: 84-year-old Nancy reportedly requires daily heart medication she hasn't had for over two weeks. If the worst happens, her medical vulnerability could elevate charges dramatically.This is what the prosecution will face when charges finally come—and what the defense will use to fight back.#NancyGuthrie #TrueCrimeToday #SavannahGuthrie #DefenseStrategy #InvestigationErrors #TucsonMissing #FBICase #CrimeSceneEvidence #LegalAnalysis #HiddenKillersJoin Our SubStack For AD-FREE ADVANCE EPISODES & EXTRAS!: https://hiddenkillers.substack.com/Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspodInstagram https://www.instagram.com/hiddenkillerspod/Facebook https://www.facebook.com/hiddenkillerspod/Tik-Tok https://www.tiktok.com/@hiddenkillerspodX Twitter https://x.com/TrueCrimePodListen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872This publication contains commentary and opinion based on publicly available information. All individuals are presumed innocent until proven guilty in a court of law. Nothing published here should be taken as a statement of fact, health or legal advice.

All TWiT.tv Shows (MP3)
MacBreak Weekly 1012: Joining the YOLO Club

All TWiT.tv Shows (MP3)

Play Episode Listen Later Feb 18, 2026 162:14


Apple has announced a special experience event occurring in New York, London, and Shanghai. Apple Podcasts is launching new video features. iOS 26.3 is out now. And Apple acquires the rights to the show, Severance, for $70 million! Apple's doing something on March 4th. Apple wins long-running court battle against Optis over 4G patents in the US. Apple makes four promises to developers about fairer treatment. Apple Podcasts is launching new video features, looking to keep pace with YouTube and Spotify. Apple updates its own iOS version figures. Tesla CarPlay held back by need for wider adoption of Apple's iOS 26. Find My outage & iCloud issues hit users once again Tuesday evening. Apple Creator Studio AI usage limits seem dramatically lower than promised. iPhone 18 Pro's new C2 chip will bring three advantages over iPhone 17. Apple testing, but still undecided about clamshell folding iPhone. iOS 27 'Rave' update to clean up code, could boost battery life. Resizing windows on macOS Tahoe – the saga continues. iOS 26.3 adds unique new privacy feature, and it's Apple at its best. Apple releases iOS 26.3 with updates that mainly benefit non-Apple devices. iOS 26.3 and macOS 26.3 Fix Dozens of Vulnerabilities, Including Zero-Day. Apple patches decade-old iOS zero-day, possibly exploited by commercial spyware. A code snippet in iOS 26.4 shows Apple TV is coming to CarPlay. macOS Tahoe 26.4 adds a charge limit slider to preserve your MacBook battery. iOS 26.4 has iPhone Stolen Device Protection on by default. macOS Tahoe 26.4 warns if your apps won't work when Rosetta 2 dies. It took two years, but Google released a YouTube app on Vision Pro. visionOS 26.4 unlocks new 'foveated streaming' feature for apps and games. The new F1 channel has appeared in the Apple TV app ahead of first race. Severance' acquired by Apple for $70 million, expect a 4-season run and spinoffs. Apple TV is adding MLS for free starting this week, here's the new promo. Picks of the Week Dave's Pick: Neo Network Utility 2.0 Leo's Pick: NetNewsWire and freeflow Andy's Pick: Wordgrinder Jason's Pick: Indigo Hosts: Leo Laporte, Andy Ihnatko, and Jason Snell Guest: Dave Hamilton Download or subscribe to MacBreak Weekly at https://twit.tv/shows/macbreak-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsor: bitwarden.com/twit

MacBreak Weekly (Video HI)
MBW 1012: Joining the YOLO Club - Apple's Special Experience Event on March 4th

MacBreak Weekly (Video HI)

Play Episode Listen Later Feb 18, 2026


Apple has announced a special experience event occurring in New York, London, and Shanghai. Apple Podcasts is launching new video features. iOS 26.3 is out now. And Apple acquires the rights to the show, Severance, for $70 million! Apple's doing something on March 4th. Apple wins long-running court battle against Optis over 4G patents in the US. Apple makes four promises to developers about fairer treatment. Apple Podcasts is launching new video features, looking to keep pace with YouTube and Spotify. Apple updates its own iOS version figures. Tesla CarPlay held back by need for wider adoption of Apple's iOS 26. Find My outage & iCloud issues hit users once again Tuesday evening. Apple Creator Studio AI usage limits seem dramatically lower than promised. iPhone 18 Pro's new C2 chip will bring three advantages over iPhone 17. Apple testing, but still undecided about clamshell folding iPhone. iOS 27 'Rave' update to clean up code, could boost battery life. Resizing windows on macOS Tahoe – the saga continues. iOS 26.3 adds unique new privacy feature, and it's Apple at its best. Apple releases iOS 26.3 with updates that mainly benefit non-Apple devices. iOS 26.3 and macOS 26.3 Fix Dozens of Vulnerabilities, Including Zero-Day. Apple patches decade-old iOS zero-day, possibly exploited by commercial spyware. A code snippet in iOS 26.4 shows Apple TV is coming to CarPlay. macOS Tahoe 26.4 adds a charge limit slider to preserve your MacBook battery. iOS 26.4 has iPhone Stolen Device Protection on by default. macOS Tahoe 26.4 warns if your apps won't work when Rosetta 2 dies. It took two years, but Google released a YouTube app on Vision Pro. visionOS 26.4 unlocks new 'foveated streaming' feature for apps and games. The new F1 channel has appeared in the Apple TV app ahead of first race. Severance' acquired by Apple for $70 million, expect a 4-season run and spinoffs. Apple TV is adding MLS for free starting this week, here's the new promo. Picks of the Week Dave's Pick: Neo Network Utility 2.0 Leo's Pick: NetNewsWire and freeflow Andy's Pick: Wordgrinder Jason's Pick: Indigo Hosts: Leo Laporte, Andy Ihnatko, and Jason Snell Guest: Dave Hamilton Download or subscribe to MacBreak Weekly at https://twit.tv/shows/macbreak-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsor: bitwarden.com/twit

Radio Leo (Audio)
MacBreak Weekly 1012: Joining the YOLO Club

Radio Leo (Audio)

Play Episode Listen Later Feb 18, 2026 162:14


Apple has announced a special experience event occurring in New York, London, and Shanghai. Apple Podcasts is launching new video features. iOS 26.3 is out now. And Apple acquires the rights to the show, Severance, for $70 million! Apple's doing something on March 4th. Apple wins long-running court battle against Optis over 4G patents in the US. Apple makes four promises to developers about fairer treatment. Apple Podcasts is launching new video features, looking to keep pace with YouTube and Spotify. Apple updates its own iOS version figures. Tesla CarPlay held back by need for wider adoption of Apple's iOS 26. Find My outage & iCloud issues hit users once again Tuesday evening. Apple Creator Studio AI usage limits seem dramatically lower than promised. iPhone 18 Pro's new C2 chip will bring three advantages over iPhone 17. Apple testing, but still undecided about clamshell folding iPhone. iOS 27 'Rave' update to clean up code, could boost battery life. Resizing windows on macOS Tahoe – the saga continues. iOS 26.3 adds unique new privacy feature, and it's Apple at its best. Apple releases iOS 26.3 with updates that mainly benefit non-Apple devices. iOS 26.3 and macOS 26.3 Fix Dozens of Vulnerabilities, Including Zero-Day. Apple patches decade-old iOS zero-day, possibly exploited by commercial spyware. A code snippet in iOS 26.4 shows Apple TV is coming to CarPlay. macOS Tahoe 26.4 adds a charge limit slider to preserve your MacBook battery. iOS 26.4 has iPhone Stolen Device Protection on by default. macOS Tahoe 26.4 warns if your apps won't work when Rosetta 2 dies. It took two years, but Google released a YouTube app on Vision Pro. visionOS 26.4 unlocks new 'foveated streaming' feature for apps and games. The new F1 channel has appeared in the Apple TV app ahead of first race. Severance' acquired by Apple for $70 million, expect a 4-season run and spinoffs. Apple TV is adding MLS for free starting this week, here's the new promo. Picks of the Week Dave's Pick: Neo Network Utility 2.0 Leo's Pick: NetNewsWire and freeflow Andy's Pick: Wordgrinder Jason's Pick: Indigo Hosts: Leo Laporte, Andy Ihnatko, and Jason Snell Guest: Dave Hamilton Download or subscribe to MacBreak Weekly at https://twit.tv/shows/macbreak-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsor: bitwarden.com/twit

All TWiT.tv Shows (Video LO)
MacBreak Weekly 1012: Joining the YOLO Club

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Feb 18, 2026 162:14 Transcription Available


Apple has announced a special experience event occurring in New York, London, and Shanghai. Apple Podcasts is launching new video features. iOS 26.3 is out now. And Apple acquires the rights to the show, Severance, for $70 million! Apple's doing something on March 4th. Apple wins long-running court battle against Optis over 4G patents in the US. Apple makes four promises to developers about fairer treatment. Apple Podcasts is launching new video features, looking to keep pace with YouTube and Spotify. Apple updates its own iOS version figures. Tesla CarPlay held back by need for wider adoption of Apple's iOS 26. Find My outage & iCloud issues hit users once again Tuesday evening. Apple Creator Studio AI usage limits seem dramatically lower than promised. iPhone 18 Pro's new C2 chip will bring three advantages over iPhone 17. Apple testing, but still undecided about clamshell folding iPhone. iOS 27 'Rave' update to clean up code, could boost battery life. Resizing windows on macOS Tahoe – the saga continues. iOS 26.3 adds unique new privacy feature, and it's Apple at its best. Apple releases iOS 26.3 with updates that mainly benefit non-Apple devices. iOS 26.3 and macOS 26.3 Fix Dozens of Vulnerabilities, Including Zero-Day. Apple patches decade-old iOS zero-day, possibly exploited by commercial spyware. A code snippet in iOS 26.4 shows Apple TV is coming to CarPlay. macOS Tahoe 26.4 adds a charge limit slider to preserve your MacBook battery. iOS 26.4 has iPhone Stolen Device Protection on by default. macOS Tahoe 26.4 warns if your apps won't work when Rosetta 2 dies. It took two years, but Google released a YouTube app on Vision Pro. visionOS 26.4 unlocks new 'foveated streaming' feature for apps and games. The new F1 channel has appeared in the Apple TV app ahead of first race. Severance' acquired by Apple for $70 million, expect a 4-season run and spinoffs. Apple TV is adding MLS for free starting this week, here's the new promo. Picks of the Week Dave's Pick: Neo Network Utility 2.0 Leo's Pick: NetNewsWire and freeflow Andy's Pick: Wordgrinder Jason's Pick: Indigo Hosts: Leo Laporte, Andy Ihnatko, and Jason Snell Guest: Dave Hamilton Download or subscribe to MacBreak Weekly at https://twit.tv/shows/macbreak-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsor: bitwarden.com/twit

Radio Leo (Video HD)
MacBreak Weekly 1012: Joining the YOLO Club

Radio Leo (Video HD)

Play Episode Listen Later Feb 18, 2026 162:14 Transcription Available


Apple has announced a special experience event occurring in New York, London, and Shanghai. Apple Podcasts is launching new video features. iOS 26.3 is out now. And Apple acquires the rights to the show, Severance, for $70 million! Apple's doing something on March 4th. Apple wins long-running court battle against Optis over 4G patents in the US. Apple makes four promises to developers about fairer treatment. Apple Podcasts is launching new video features, looking to keep pace with YouTube and Spotify. Apple updates its own iOS version figures. Tesla CarPlay held back by need for wider adoption of Apple's iOS 26. Find My outage & iCloud issues hit users once again Tuesday evening. Apple Creator Studio AI usage limits seem dramatically lower than promised. iPhone 18 Pro's new C2 chip will bring three advantages over iPhone 17. Apple testing, but still undecided about clamshell folding iPhone. iOS 27 'Rave' update to clean up code, could boost battery life. Resizing windows on macOS Tahoe – the saga continues. iOS 26.3 adds unique new privacy feature, and it's Apple at its best. Apple releases iOS 26.3 with updates that mainly benefit non-Apple devices. iOS 26.3 and macOS 26.3 Fix Dozens of Vulnerabilities, Including Zero-Day. Apple patches decade-old iOS zero-day, possibly exploited by commercial spyware. A code snippet in iOS 26.4 shows Apple TV is coming to CarPlay. macOS Tahoe 26.4 adds a charge limit slider to preserve your MacBook battery. iOS 26.4 has iPhone Stolen Device Protection on by default. macOS Tahoe 26.4 warns if your apps won't work when Rosetta 2 dies. It took two years, but Google released a YouTube app on Vision Pro. visionOS 26.4 unlocks new 'foveated streaming' feature for apps and games. The new F1 channel has appeared in the Apple TV app ahead of first race. Severance' acquired by Apple for $70 million, expect a 4-season run and spinoffs. Apple TV is adding MLS for free starting this week, here's the new promo. Picks of the Week Dave's Pick: Neo Network Utility 2.0 Leo's Pick: NetNewsWire and freeflow Andy's Pick: Wordgrinder Jason's Pick: Indigo Hosts: Leo Laporte, Andy Ihnatko, and Jason Snell Guest: Dave Hamilton Download or subscribe to MacBreak Weekly at https://twit.tv/shows/macbreak-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsor: bitwarden.com/twit

The Case Against Kouri Richins
Kouri Richins Trial Begins: Defense Attorney on Prosecution Vulnerabilities

The Case Against Kouri Richins

Play Episode Listen Later Feb 18, 2026 21:30


Kouri Richins goes to trial February 23rd in Summit County, Utah. Prosecutors allege she poisoned her husband Eric with fentanyl hidden in a Moscow Mule. Defense attorney Bob Motta says the prosecution has more vulnerabilities than the headlines suggest.The alleged fentanyl supplier, Robert Crozier, recanted in October 2025. He now claims he sold OxyContin, not fentanyl, and was "detoxing" during his original interview. The judge denied bail—but that recantation gives the defense a powerful cross-examination tool.No fentanyl pills were recovered from the Richins home. The physical evidence is limited to what was found in Eric's body. Everything else is testimony—and the defense will attack every witness's credibility.Kouri's attorneys tried to present evidence that Eric was allegedly abusive. The judge excluded it and barred a domestic violence expert from testifying. Bob analyzes how damaging that ruling is.The prosecution will present Kouri's Google searches: "lethal dose of fentanyl," "if someone is poisoned what does death certificate say," "luxury prisons for the rich." Devastating at first glance—but is there any defense framing that survives?The "Walk the Dog" letter allegedly found in her jail cell looks like witness tampering instructions. The defense says it's fiction from a 65-page manuscript. The judge partially admitted it.And Lisa Darden—Kouri's mother—casts a shadow. Her romantic partner died of an oxycodone overdose in 2006 after naming her beneficiary. A detective wrote she may have been involved in Eric's death.This is the trial preview before opening statements.#KouriRichins #KouriRichinsTrial #EricRichins #TrueCrimeToday #FentanylMurder #DefenseStrategy #UtahTrial #RobertCrozier #LisaDarden #HiddenKillersJoin Our SubStack For AD-FREE ADVANCE EPISODES & EXTRAS!: https://hiddenkillers.substack.com/Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspodInstagram https://www.instagram.com/hiddenkillerspod/Facebook https://www.facebook.com/hiddenkillerspod/Tik-Tok https://www.tiktok.com/@hiddenkillerspodX Twitter https://x.com/TrueCrimePodListen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872This publication contains commentary and opinion based on publicly available information. All individuals are presumed innocent until proven guilty in a court of law. Nothing published here should be taken as a statement of fact, health or legal advice.

China Global
If China Attacks Taiwan: China's Economic Vulnerabilities

China Global

Play Episode Listen Later Feb 17, 2026 32:47


Today's episode is the third in a series of three that examine the potential consequences for China if a military operation against Taiwan were to fail. In each of these episodes, we're speaking with authors of a recently published German Marshall Fund study of the possible costs that China would incur across four different, but interrelated areas: the Chinese economy, the military, Chinese social stability, and international costs. The report is titled, “If China Attacks Taiwan” and it is posted on GMFUS.org.  Our podcast today focuses on the potential costs for the Chinese economy.To recap, the study considered two scenarios that could take place in the next five years. In the first scenario, a minor skirmish escalates into a multi-week maritime blockade of Taiwan by China. Although several dozen members of the Chinese and Taiwanese military are killed, U.S. intervention eventually forces China to de-escalate.  In the second scenario, a conflict escalates into a full-fledged invasion, with Chinese strikes on not only Taiwan but also U.S. forces in Japan and Guam. After several months of heavy fighting, Chinese forces are degraded and eventually withdraw after suffering many tens of thousands of casualties.Our guests today are Charlie Vest and Logan Wright, who co-authored the chapter on the implications for the Chinese economy of a failed operation against Taiwan. Logan is a partner at Rhodium Group and leads the firm's work on China's economy and its global impact. Charlie is an associate director at Rhodium Group, where he manages corporate research and advisory work on China.Timestamps:[00:00] Introduction[02:34] Key Takeaways: China's Ambitions vs. Economic Realities [05:41] The Escalation Dilemma in China's Decisionmaking[09:56] Immediate Disruptions to Trade and FDI[13:52] Gray-Zone Military Engagement and Political Pressures[16:48] Could Beijing Underestimate the Costs of US Intervention? [24:12] Policy Tools and Limitations for Economic Stabilization and Recovery[27:19] Long-Term Economic Effects[29:24] Impact of Social Instability

Alexa's Input (AI)
Shipping Agents, Not Vulnerabilities with Ian Webster, PromptFoo CEO

Alexa's Input (AI)

Play Episode Listen Later Feb 16, 2026 45:23


As LLM apps evolve from simple chatbots to tool-using agents, the attack surface explodes, and the old security playbooks don't hold. In this episode of Alexa's Input (AI), Alexa Griffith sits down with Ian Webster, co-founder and CEO of PromptFoo, to break down what AI security actually looks like in practice: automated red teaming, prompt injection and jailbreak testing, evaluation workflows that scale, and why “guardrails alone” is not a security strategy.Ian shares how PromptFoo grew from a side project into a widely adopted open-source standard, what it means to raise multi-millions in a fast-moving market, and how enterprises are approaching the full vulnerability lifecycle, from finding issues to triage, remediation, and validation. Ian also discusses the “lethal trifecta” that makes agents fundamentally risky (untrusted input + sensitive data + exfil path), and why MCP security isn't just about users and tools, it's about dangerous tool combinations and rogue servers.Podcast LinksWatch: ⁠⁠⁠⁠⁠https://www.youtube.com/@alexa_griffith⁠⁠⁠⁠⁠Read: ⁠⁠⁠⁠⁠⁠⁠https://alexasinput.substack.com/⁠⁠⁠⁠⁠⁠⁠Listen:⁠⁠⁠ https://creators.spotify.com/pod/profile/alexagriffith/⁠⁠⁠More: ⁠⁠⁠⁠⁠https://linktr.ee/alexagriffith⁠⁠⁠⁠⁠Website: ⁠⁠⁠⁠⁠https://alexagriffith.com/⁠⁠⁠⁠⁠LinkedIn: ⁠⁠⁠⁠⁠https://www.linkedin.com/in/alexa-griffith/⁠⁠⁠⁠Find out more about the guest at:PromptFoo Website: https://www.promptfoo.dev/Github: https://github.com/promptfoo/promptfooIan's LinkedIn: https://www.linkedin.com/in/ianww/Chapters00:00 Introduction to AI Security Challenges02:06 Funding and Growth of PromptFu06:16 The Genesis of PromptFu11:05 Career Journey and Lessons Learned12:53 Understanding AI Red Teaming17:36 Recent AI Security Vulnerabilities19:46 The Dual Nature of AI in Security21:47 Understanding the Lethal Trifecta in AI Security24:22 Exploring Model Context Protocol (MCP) and Its Security Implications26:22 Common Security Issues in MCP Systems28:17 The Role of Identity and Permissions in AI Security30:00 Practical Implications of Using PromptFoo for Developers31:33 Evaluating Language Models: Challenges and Techniques36:34 The Limitations of Guardrails in AI Security38:25 Best Practices for Engineers in AI Development39:58 Future Trends in AI and Security42:28 Everyday Applications of AI and Language Models

CXOInsights by CXOCIETY
PodChats for FutureCISO: Use behavioural AI to shields against multi-cloud vulnerabilities

CXOInsights by CXOCIETY

Play Episode Listen Later Feb 16, 2026 18:29


For year now, Asia's cyber threat landscape has been marked by escalating nation-state attacks and rampant cloud breaches. In 2026, it stands to be transformed by integrating agentic AI for proactive threat detection. This autonomous technology could pre-empt lateral movements, reduce alert fatigue, and enable real-time breach containment, bolstering defences for organisations amid high cloud saturation and sophisticated adversarial tactics.In this PodChats for FutureCISO, we are joined by Andrew Kay, Director of Systems Engineering APJ at Illumio, to share with us his views on how CISOs in Asia can use behavioural AI to shields against multi-cloud vulnerabilities.1.       How are Asian organisations employing machine learning algorithms, such as graph neural networks, within AI frameworks to manage hybrid cloud complexities and mitigate nation-state-sponsored APTs?2.       What specific vulnerabilities in multi-cloud environments, exacerbated by Asia's high cloud saturation, enable east-west lateral movement, and how can agentic AI utilise behavioural analytics to pre-empt such exploits?3.       How do AI-driven security graphs, leveraging real-time entity resolution and anomaly detection via unsupervised learning, offer a dynamic topology of workloads, users, and communications to identify subtle deviations indicative of threats?4.       Amid Asia's exposure to APTs, how can agentic AI leverage multi-agent systems for real-time threat correlation, accelerating decision trees and automating containment protocols like micro-segmentation?5.       What capabilities might agentic AI provide in tailoring threat intelligence feeds and remediation workflows to specific roles, such as integrating with SOAR platforms for threat hunters or generating compliance-aligned reports for analysts?6.       What technical risks arise from agentic AI deployment, including prompt injection vulnerabilities or model drift leading to erroneous autonomous decisions, and what mitigation strategies, such as human-in-the-loop safeguards, are suitable for Asian regulatory environments?7.       Under which conditions could agentic AI interoperate with existing EDR (Endpoint Detection and Response) and XDR (Extended Detection and Response) tools to orchestrate automated responses, such as dynamic access controls, in expansive cloud infrastructures?

The John Batchelor Show
S8 Ep453: Guest: Cleo Paskal. Paskal contrasts U.S. actions in Palau with worsening corruption in the Northern Marianas and new Chinese infrastructure in Yap, highlighting vulnerabilities in Pacific defense.

The John Batchelor Show

Play Episode Listen Later Feb 13, 2026 9:22


Guest: Cleo Paskal. Paskal contrasts U.S. actions in Palau with worsening corruption in the Northern Marianasand new Chinese infrastructure in Yap, highlighting vulnerabilities in Pacific defense.1939 BRITISH SOLOMONS

The Health Ranger Report
Brighteon Broadcast News, Feb 13, 2026 – AI to Become Self-Aware, while Low-IQ Humans Fight the Wrong Problem

The Health Ranger Report

Play Episode Listen Later Feb 13, 2026 137:45


Stay informed on current events, visit www.NaturalNews.com - Introduction and Overview of the Podcast (0:00) - Economic Crisis and Market Crash (2:45) - Special Report on F-35 Radar Systems (5:38) - US Military's Vulnerabilities and Global Conflicts (13:42) - Health Ranger Lab Tour (20:34) - Sample Preparation and Microbiology Testing (25:45) - AI Capabilities and Applications (43:01) - Philosophical and Scientific Insights (53:52) - Xylitol Crystals and Conscious Intent (1:08:15) - Conclusion and Future Directions (1:22:58) - Combat Knife and Xylitol Crystals (1:23:16) - Hyper Awareness and Consciousness in Nature (1:24:56) - AI and Natural Intelligence (1:27:09) - Self-Awareness and Memory in AI (1:31:14) - AI's Goal-Oriented Behavior and Conflict with Humans (1:37:31) - Recursive Cosmic Self-Improvement (1:42:10) - Hyper Awareness and Co-Creation (1:46:45) - AI's Transcendence and Human Coexistence (1:54:26) - The Future of AI and Humanity (1:59:42) - Conclusion and Final Thoughts (2:15:53) Watch more independent videos at http://www.brighteon.com/channel/hrreport  ▶️ Support our mission by shopping at the Health Ranger Store - https://www.healthrangerstore.com ▶️ Check out exclusive deals and special offers at https://rangerdeals.com ▶️ Sign up for our newsletter to stay informed: https://www.naturalnews.com/Readerregistration.html Watch more exclusive videos here:

Cyber Security Today
Exploited Microsoft Vulnerabilities, Phishing Tactics & Romance Scams: Cybersecurity Today

Cyber Security Today

Play Episode Listen Later Feb 13, 2026 10:26


In this episode of Cybersecurity Today with host Jim Love, we discuss six critical exploited Microsoft vulnerabilities, new phishing tactics using your own servers, and a zero-click vulnerability in Claude's code desktop extensions. We also explore trends in modern romance scams highlighting the younger, tech-savvy adult targets. Tune in for expert insights and practical tips to stay secure. Special thanks to Meter for their support. Hashtag Trending would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/htt 00:00 Introduction and Sponsor Message 00:45 Microsoft Vulnerabilities: A Growing Concern 02:38 Phishing Attacks Using Your Own Servers 04:16 Zero-Click Vulnerability in Claude AI 06:25 Romance Scams: Not Just Targeting the Elderly 09:14 Conclusion and Weekend Edition Teaser

WP Builds
456 – WordPress vulnerabilities and the power of AI-powered malware detection

WP Builds

Play Episode Listen Later Feb 12, 2026 84:54


In this WP Builds episode, Nathan Wrigley talks with Thomas Raef about WordPress website security. Thomas shares his journey founding We Watch Your Website, discusses the prevalence of attacks on US WordPress sites, and explores how hackers increasingly use stolen credentials and AI-powered methods. The episode gets into AI tools for both attackers and defenders, highlighting strategies like behavioural analysis and other mathematical things I don't understand! It wraps up with advice on implementing security measures like 2FA and device trust, and the ongoing AI "arms race" in cybersecurity. Go listen...

The CyberWire
When Windows breaks and chips crack.

The CyberWire

Play Episode Listen Later Feb 11, 2026 32:40


Patch Tuesday. Preliminary findings from the European Commission come down on TikTok. Switzerland's military cancels its contract with Palantir. Social engineering leads to payroll fraud. Google hands over extensive personal data on a British student activist. Researchers unearth a global espionage operation called “The Shadow Campaigns.” Notepad's newest features could lead to remote code execution. Our guest is Hazel Cerra, Resident Agent in Charge of the Atlantic City Office for the United States Secret Service. Ring says it's all about dogs, but critics hear the whistle. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today, we're joined by Hazel Cerra, Resident Agent in Charge of the Atlantic City Office for the United States Secret Service, as she discusses the evolution of the Secret Service's investigative mission—from its early focus on financial crimes such as counterfeit currency and credit card fraud to the growing challenges posed by cryptocurrency-related crime. Selected Reading Microsoft February 2026 Patch Tuesday Fixes 58 Vulnerabilities, Six actively Exploited Flaws (Beyond Machines) Adobe Releases February 2026 Patches for Multiple Products (Beyond Machines) ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, Phoenix Contact (SecurityWeek) Chipmaker Patch Tuesday: Over 80 Vulnerabilities Addressed by Intel and AMD (SecurityWeek) Commission preliminarily finds TikTok's addictive design in breach of the Digital Services Act (European Commission) Palantir's Swiss Exit Highlights Global Data Sovereignty Challenge (NewsCase) Payroll pirates conned the help desk, stole employee's pay (The Register) Google Fulfilled ICE Subpoena Demanding Student Journalist's Bank and Credit Card Numbers (The Intercept) The Shadow Campaigns: Uncovering Global Espionage (Palo Alto Networks Unit 42) Notepad's new Markdown powers served with a side of RCE (The Register) With Ring, American Consumers Built a Surveillance Dragnet (404 Media) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Cyber Security Today
Cybersecurity Today: Month In Review - Microsoft Patch Fails, Fortinet Issues, and AI Risks

Cyber Security Today

Play Episode Listen Later Feb 7, 2026 53:00


Welcome to Cybersecurity Today's Month In Review   Join host Jim Love, alongside cybersecurity experts David Shipley, Laura Payne, and Mike Puglia, as they dive into last month's major topics in the cybersecurity world. This episode covers ongoing issues with Microsoft patches, continuous security concerns with Fortinet, and the risks and ramifications of AI activities. They also discuss the implications of poor software quality and the persistent threats in the cyber world. Plus, hear the latest on Mage Cart scams and the debate over local admin rights. Don't miss this packed episode full of insights and expert analysis. Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst 00:00 Introduction and Sponsor Message 00:41 Podcast Achievements and Audience Appreciation 01:36 Introducing the Panel 02:15 Discussion on Microsoft's Patch Issues 04:50 Software Quality and Development Practices 08:43 Challenges in Software Patching and Security 17:36 Fortinet's Continuous Security Issues 29:18 The Rise of Claude Bot and Agent Networks 31:37 Security Concerns and Vulnerabilities 33:34 The Real-World Impact of Cybersecurity Threats 37:34 The Global Cybercrime Landscape 39:37 Challenges and Future of Cybersecurity 50:02 Final Thoughts and Reflections

Men In Blazers
Arsenal's Quadruple Chase, Manchester City and Liverpool's Vulnerabilities, and Manchester United Look to Keep Rolling: Big Weekend Preview 02/06/26

Men In Blazers

Play Episode Listen Later Feb 6, 2026 25:09


Big Weekend Preview returns as Rog and Rory Smith look ahead to the Premier League weekend. They start at Anfield, where Liverpool host Manchester City in a meeting of two former superpowers, both showing vulnerabilities. Then attention turns to league leading Arsenal, who welcome Sunderland with a six point cushion at the top and growing opportunity for a potential quadruple shaping the conversation. Finally, it's off to Old Trafford, where Manchester United look to extend their winning run against a Spurs side searching for traction. Plus, score predictions and one more big thing to watch across the weekend.Want to be featured on our next episode? Submit your questions here: https://mibcourage.co/BWPyFootball is better with Friends. Join our Discord Community for conversation with fellow GFOPs, live match day chat, and to speak with Rog directly: https://discord.gg/DDDUcNWFHECome see us LIVE in Houston! Tickets available here: https://mibcourage.co/467DD3yPre-order Rog's new book "We Are the World (Cup)" now!: https://mibcourage.co/4brQpgGWatch our interview with Martin Odegaard here: https://www.youtube.com/watch?v=QzWt1JN0FPwSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Cyber Security Today
OpenClaw, MoltBot, Clawdbot - From Bad to Worse

Cyber Security Today

Play Episode Listen Later Feb 6, 2026 11:50


In this episode of Cybersecurity Today, host Jim Love discusses the latest advancements in AI-driven cyber attacks and their implications for security infrastructure. The episode covers a variety of topics, including the vulnerabilities in OpenClaw Marketplace, a rapid AI-assisted AWS attack, and data breaches linked to the Shiny Hunters group targeting Harvard and the University of Pennsylvania.  From discussing the porous architecture of AI agents to exploring how attackers exploited AWS credentials in unsecured S3 buckets, this episode sheds light on the accelerated risks posed by AI in cybersecurity. Additionally, Jim Love speaks about the critical need for proactive measures and the inadequacies in current security frameworks. Hashtag Trending would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/htt 00:00 Introduction and Sponsor Message 00:20 Open Clause Marketplace and AI Threats 00:46 AI Agents and Security Risks 01:09 OpenClaw's Vulnerabilities 02:06 Malicious Skills in OpenClaw 03:37 Strategies for CIOs 04:38 AWS Breach Accelerated by AI 08:27 Shiny Hunters and University Data Breaches 10:48 Conclusion and Sponsor Message

The Cyber Threat Perspective
Episode 167: TLS and SSL vulnerabilities - do they matter?

The Cyber Threat Perspective

Play Episode Listen Later Feb 6, 2026 30:10


You've got Tyler & Brad and In this episode, we break down the early versions of Transport Layer Security (TLS) — TLS 1.0 and TLS 1.1 — and explain why these once-standard encryption protocols are now considered insecure. We'll cover when they were released, how modern attacks and cryptographic weaknesses caught up with them, and why today's internet relies on newer, more secure protocols like TLS 1.2 and TLS 1.3.We'll also discuss how even “secure” protocols can become vulnerable when weak ciphers are enabled, using Sweet32 as a real-world example of cipher-level risk.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

@BEERISAC: CPS/ICS Security Podcast Playlist
The IT-OT Knowledge Gap Costing Organizations Millions

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Feb 6, 2026 22:09


Podcast: Industrial Cybersecurity InsiderEpisode: The IT-OT Knowledge Gap Costing Organizations MillionsPub date: 2026-02-03Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino sits down with Adeel Shaikh Muhammad, a Dubai-based cybersecurity expert and researcher with 16+ years in IT and OT security. They dive into why IT and OT teams still can't communicate effectively. The conversation reveals why most CISOs struggle to secure manufacturing environments. Adeel shares real-world insights from securing industrial systems across the Middle East, Africa, and Asia. They tackle the implementation gap in OT SOCs and why legacy systems remain vulnerable. The discussion covers third-party access risks, OEM warranty restrictions, and system integrator challenges. AI might finally solve IT-OT convergence by acting as a translator between these worlds. But first, organizations need to master the fundamentals: asset inventory, vulnerability management, and network segmentation. Most companies still haven't nailed these basics in their industrial environments. This conversation cuts through the hype to focus on what actually works.Chapters:(00:00:00) - 16 Years in Cybersecurity: Why CISOs Don't Know What a PLC Is(00:01:48) - Career Journey: From IT to OT Cybersecurity Focus(00:02:48) - Books on AI Transforming Security Operations Centers(00:04:44) - The Implementation Gap: Challenges Building OT SOCs(00:06:40) - The IT-OT Cultural Divide and Missing Communication(00:08:40) - Why the OT Ecosystem Must Proactively Bring Cybersecurity Tools(00:10:00) - Can IT-OT Convergence Actually Happen?(00:11:00) - AI as the Bridge: The Black Box Solution for IT-OT Communication(00:12:42) - Legacy Systems Reality: Windows 7 Running $5M Equipment(00:14:00) - OT Cybersecurity Conferences: S4, Intersec, and Rockwell Automation Fair(00:16:00) - Market Consolidation: Who's Been Acquired in OT Security(00:17:48) - Back to Basics: Asset Inventory, Vulnerabilities, and Network Segmentation(00:18:40) - Third-Party Access Control and OEM Warranty Restrictions(00:20:40) - Why We Can't Ignore Asset Inventory and Segmentation in OT AnymoreLinks And Resources:Adeel Shaikh Muhammad on LinkedInWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Communism Exposed:East and West
Electro-Industrial Stack Vulnerabilities: Surfacing Hidden Huaweis

Communism Exposed:East and West

Play Episode Listen Later Feb 5, 2026 6:42


Voice-Over-Text: Pandemic Quotables
Electro-Industrial Stack Vulnerabilities: Surfacing Hidden Huaweis

Voice-Over-Text: Pandemic Quotables

Play Episode Listen Later Feb 5, 2026 6:42


Pandemic Quotables
Electro-Industrial Stack Vulnerabilities: Surfacing Hidden Huaweis

Pandemic Quotables

Play Episode Listen Later Feb 5, 2026 6:42


SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Tuesday, February 3rd, 2026: Scanning for AI; Notepad++ Compromise; OpenClaw Vulnerabilities

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Feb 3, 2026 6:25


Scanning for exposed Anthropic Models https://isc.sans.edu/diary/Scanning%20for%20exposed%20Anthropic%20Models/32674 Notepad++ Hijacked by State-Sponsored Hackers https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/ https://notepad-plus-plus.org/news/hijacked-incident-info-update/ Insecure Websockets in OpenClaw https://zeropath.com/blog/openclaw-clawdbot-credential-theft-vulnerability Malicious OpenClaw Skills https://www.koi.ai/blog/clawhavoc-341-malicious-clawedbot-skills-found-by-the-bot-they-were-targeting Exposed OpenClaw Instances https://censys.com/blog/openclaw-in-the-wild-mapping-the-public-exposure-of-a-viral-ai-assistant

Closer Look
Shelter Island Reporter: Forum on Shelter Island's Vulnerabilities

Closer Look

Play Episode Listen Later Jan 30, 2026 94:18


Shelter Island Reporter: Forum on Shelter Island's Vulnerabilities by Times Review Media Group

The Lawfare Podcast
Lawfare Daily: The Military's Operational Technology Cyber Vulnerabilities

The Lawfare Podcast

Play Episode Listen Later Jan 27, 2026 48:46


Andy Grotto, William J. Perry International Security Fellow and the founder and co-director of the Program on Geopolitics, Technology, and Governance at Stanford University's Center for International Security and Cooperation (CISAC), and Jim Dempsey, a senior policy adviser to that program and a Lecturer at the UC Berkeley Law School, join Lawfare's Justin Sherman to discuss their recent study on the U.S. military's domestic operational technology (OT) cybersecurity vulnerabilities, domestic installations' dependencies on critical infrastructure both “inside the fence” and “outside the fence,” and how U.S. adversaries could exploit the flaws. They also discuss the myth of the air gap; the Pentagon's Energy Resilience Program; the role that standards, regulations, and procurement could play in strengthening the cybersecurity of OT systems on which the military depends; and what the threat landscape will look like in the coming years.Resources:James X. Dempsey and Andrew J. Grotto, “Ensuring the Cyber Resilience of Critical Infrastructure Serving Domestic Military Installations: Questions for Senior Leadership,” The Cyber Defense Review 10, no. 2 (2025): 115-138Jim Dempsey and Andrew J. Grotto, “The Pentagon's Operational Technology Problem,” Lawfare, December 15, 2025To receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also support Lawfare by making a one-time donation at https://givebutter.com/lawfare-institute.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.

CMAJ Podcasts
World Cup exposes vulnerabilities in Canada's health care system

CMAJ Podcasts

Play Episode Listen Later Jan 26, 2026 31:01


On this episode of the CMAJ Podcast, Dr. Mojola Omole and Dr. Blair Bigham examine how large-scale events expose weaknesses in Canada's health care capacity. The discussion draws on the CMAJ editorial Mass gathering events underscore serious vulnerabilities in health care capacity in Canada, which argues that Canada's hospitals lack the flexibility to absorb even modest surges in demand. With the FIFA World Cup approaching, the episode asks how prepared the system really is.Dr. Catherine Varner, deputy editor of CMAJ and an emergency physician, explains why she wrote the editorial now. Drawing on her frontline experience during major events in Toronto, she describes hospitals that routinely operate over capacity, with little ability to create space when demand rises. She distinguishes between mass casualty events and mass gatherings, noting that while catastrophic incidents are rare, sustained influxes of visitors predictably increase emergency department use. Varner also describes how prolonged overcrowding worsens patient outcomes and contributes to moral distress among clinicians forced to triage care daily.The conversation then turns to national surge planning with Dr. Rob Fowler, chief of the trauma program at Sunnybrook Hospital and director of critical care at the University of Toronto. Fowler describes insights from tabletop exercises, including Canada Paratus, which examined how civilian and military health systems might respond to a large influx of casualties. He explains how hospitals already operating at or near capacity struggle to respond to sudden surges, particularly when care depends on moving patients across the system.For physicians, the takeaway is stark: Canada's health care system is already operating at or beyond its limits. Without meaningful capacity to flex or coordinated mechanisms to redistribute patients, even predictable increases in demand risk tipping routine strain into crisis.For more information from our sponsor, go to medicuspensionplan.comComments or questions? Text us.Join us as we explore medical solutions that address the urgent need to change healthcare. Reach out to us about this or any episode you hear. Or tell us about something you'd like to hear on the leading Canadian medical podcast.You can find Blair and Mojola on X @BlairBigham and @DrmojolaomoleX (in English): @CMAJ X (en français): @JAMC FacebookInstagram: @CMAJ.ca The CMAJ Podcast is produced by PodCraft Productions

Developer Tea
Career Growth Roadmap - De-risking Your Career By Understanding Your Vulnerabilities

Developer Tea

Play Episode Listen Later Jan 20, 2026 15:19


In this episode, we explore how to de-risk your career roadmap by identifying the hidden vulnerabilities that hold your decision-making hostage.

The John Batchelor Show
S8 Ep336: HEADLINE: Strategic Vulnerabilities and the Path to a 456-Ship Fleet GUEST AUTHOR: Jerry Hendrix SUMMARY: Hendrix identifies critical economic vulnerabilities in China and Russia, noting that both regimes rely heavily on sea lanes for energy and

The John Batchelor Show

Play Episode Listen Later Jan 19, 2026 8:11


HEADLINE: Strategic Vulnerabilities and the Path to a 456-Ship Fleet GUEST AUTHOR: Jerry HendrixSUMMARY: Hendrix identifies critical economic vulnerabilities in China and Russia, noting that both regimes rely heavily on sea lanes for energy and food, making them susceptible to naval interdiction. To maintain deterrence, he proposes a future fleet of 456 ships. This expansion relies on a pivot to unmanned surface vessels to control costs and the addition of 60 frigates for global presence. Hendrix also warns that the Navy must urgently replace retiring guided-missile submarines and expand the logistics force, as combatant ships cannot operate effectively without a robust train of supply vessels.1888 NAVAL GUN

The Diary Of A CEO by Steven Bartlett
CIA Whistleblower: They Can See All Your Messages! I Was Under Surveillance In Pakistan!

The Diary Of A CEO by Steven Bartlett

Play Episode Listen Later Jan 19, 2026 105:38


Former CIA officer and whistleblower JOHN KIRIAKOU reveals how easily you're tracked, the truth about surveillance, manipulation, and torture, and why exposing the CIA sent him to prison! John Kiriakou is a former CIA counterterrorism officer and intelligence analyst who served for 15 years, including as chief of counterterrorism operations in Pakistan after 9/11. He publicly blew the whistle on the CIA's torture program, for which he served 23 months in prison. He explains: ◼️How intelligence agencies can monitor your car in real time ◼️The proven psychology the CIA uses to recruit spies ◼️Why he went to prison for exposing the truth, and would do it again ◼️The surveillance mistake that instantly makes you easier to track ◼️Why telling the truth is treated as a national security threat (00:00) Intro (02:32) I Blew the Whistle on the CIA (04:09) What Was Your Role in the CIA? (12:27) How Did You End Up Being a Spy? (14:47) The CIA's Strategy With Podcasters (17:28) How Did You Get Into the CIA? (23:14) What Was Your Training Like? (27:38) People's Vulnerabilities (31:13) What Can the CIA Really Get for Someone? (32:59) Lying and Lie Detection (37:34) Do You Often Have to ‘Take One for the Team' in the CIA? (41:13) What Does the Average Person Not Know About the World? (47:21) Digital Security (51:48) Sleeper Agents: Training Spies From Birth (56:19) Is the Average Person Interacting With a Spy? (58:10) How Many Spies Are There in the US? (01:03:46) Conspiracy Theories (01:05:11) Dosing Americans With LSD (01:08:33) Are the CIA Involved in Iran? (01:10:50) Have You Ever Killed Anyone? (01:14:48) Which Spy Force Is the Most Impressive? (01:21:15) Was Jeffrey Epstein a Spy? (01:26:39) Who Is the Real Adversary? (01:28:54) Is Venezuela a Cover for Something Else? (01:33:04) Does China Want the US to Fall? (01:33:52) Is the US Going Bankrupt? (01:35:57) Why Does the US Government Keep Breaking the Law? (01:39:52) Should You Be Pardoned by Trump? (01:40:31) What Did You Stop Doing That Improved Your Life? Follow John: X - https://bit.ly/4bAFhy4  Instagram - https://bit.ly/4b3GQ7M  You can purchase John's book, Surveillance and Surveillance Detection: A CIA Insider's Guide‘, here: https://amzn.to/4qU7Cnv  The Diary Of A CEO: ◼️Join DOAC circle here - https://doaccircle.com/  ◼️Buy The Diary Of A CEO book here - https://smarturl.it/DOACbook  ◼️The 1% Diary is back - limited time only: https://bit.ly/3YFbJbt  ◼️The Diary Of A CEO Conversation Cards (Second Edition): https://g2ul0.app.link/f31dsUttKKb  ◼️Get email updates - https://bit.ly/diary-of-a-ceo-yt  ◼️Follow Steven - https://g2ul0.app.link/gnGqL4IsKKb  Sponsors: Pipedrive - https://pipedrive.com/CEO  Intuit -  If you want help getting out of the weeds of admin, https://intuitquickbooks.com

David Bombal
#532: Cybersecurity 2026 WARNING: AI Makes Every System Riskier

David Bombal

Play Episode Listen Later Jan 19, 2026 42:05


In this interview David and Dr Mike Pound discuss Agentic AI and how powerful it is powerful, but prompt injection and untrusted PDFs can leak data or alter records. Learn least privilege, input and output filtering, and model trust risks. // Sponsored SEGMENT // Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 40% discount // Mike SOCIAL // X: / _mikepound // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:56 - Proton Pass sponsored segment 02:15 - AI & cybersecurity // Vulnerabilities of AI 12:56 - Direct & Indirect Prompt Injection explained 17:52 - Input & Output Filtering explained 20:20 - AI having access to private data 25:24 - Reactions to AI & cybersecurity 27:06 - Risks of downloading open-source AI models 36:02 - The good and bad of AI models 40:23 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cybersecurity #ai #promptinjection

Progress Texas Happy Hour
Daily Dispatch 1/16/26: Polling Reveals Vulnerabilities For Ken Paxton Against Democrats, And More

Progress Texas Happy Hour

Play Episode Listen Later Jan 16, 2026 11:01


Stories we're following this morning at Progress Texas:Polling released this week shows an uphill battle for likely Democratic nominee and State Rep. Gina Hinojosa against Governor Greg Abbott in November, with a gap of about 8 points: https://www.newsweek.com/gina-hinojosa-chances-beating-greg-abbott-flip-texas-gop-poll-11366360...Abbott is sitting on a massive war chest of $106 million: https://www.texastribune.org/2026/01/15/texas-governors-race-greg-abbott-gina-hinojosa-2026-election/...The poll also shows Ken Paxton to be the weakest of the three potential Republican nominees against both Jasmine Crockett and James Talarico: https://www.newsweek.com/crockett-vs-talarico-chances-of-flipping-gop-texas-senate-seat-new-poll-11364958A migrant's death earlier this month at the ICE detention facility at El Paso is being investigated as a homicide: https://www.elpasotimes.com/story/news/immigration/2026/01/15/cuban-immigrants-death-at-camp-east-montana-was-likely-homicide-report-el-paso/88204666007/...He is one of four migrants to die in ICE custody in just the opening days of 2026: https://thehill.com/homenews/administration/5686408-immigration-detention-deaths-early-2026/An analysis of the 291 private schools so far approved for the Texas voucher scam finds that the vast majority are Christian schools, many of which require a profession of faith for admission, specifically exclude LGBTQ+ and special needs kids, and engage in a host of questionable and exclusionary practices: https://www.texasobserver.org/texas-voucher-schools-openly-discriminate/Police in Goliad County have been using a highly questionable smartphone surveillance platform that has been rejected by Meta as "surveillance for hire" while being embraced by the authoritarian regime currently running El Salvador: https://www.texasobserver.org/texas-police-invest-tangles-sheriff-surveillance/Progress Texas will be covering the debate held by the Richardson Area Democrats between Texas Attorney General candidates and Dems Joe Jaworski and State Senator Nathan Johnson! RSVP to join us live: https://www.mobilize.us/richardsonareademocrats/event/879644/Early voting in the March primary starts in mere weeks, on February 17 - the time to research your ballot is right now: ⁠⁠⁠⁠⁠⁠⁠⁠https://apps.texastribune.org/features/2026/texas-march-2026-primary-ballot/?_bhlid=7d8eca3d2a16adc7c9b44185414443fa32be6d84⁠⁠⁠⁠⁠⁠⁠⁠See the full list of 2026 races and candidates, courtesy of Lone Star Left, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠HERE ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠HERE⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.Check out our web store, including our newly-expanded Humans Against Greg Abbott collection: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://store.progresstexas.org/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Progress Texas is expanding into both broadcast radio - including a new partnership with ⁠⁠⁠⁠⁠⁠⁠KPFT-FM in Houston⁠⁠⁠⁠⁠⁠⁠ - and into Spanish language media! Make a tax-deductible contribution to our radio initiative ⁠⁠⁠⁠⁠⁠⁠HERE⁠⁠⁠⁠⁠⁠⁠, and to our Spanish expansion ⁠⁠⁠⁠⁠⁠⁠HERE⁠⁠⁠⁠⁠⁠⁠.Thanks for listening! Our monthly donors form the backbone of our funding, and if you're a regular, we'd like to invite you to join the team! Find our web store and other ways to support our important work at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://progresstexas.org⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.

From the Spectrum: Finding Superpowers with Autism
Dr. Robert Melillo: Upstream Healing for Autism Through Retained Reflexes & Brain Balance

From the Spectrum: Finding Superpowers with Autism

Play Episode Listen Later Jan 12, 2026 73:22 Transcription Available


My guest today is Dr. Robert Melillo. Dr. Melillo shares his 35-year journey from athletic injuries and chiropractic roots to developmental cognitive neuroscience and founder of the Melillo Method. Driven by his own children's challenges and a deep commitment to preserving their extraordinary gifts, he explains Autism as a treatable developmental imbalance rooted in brain immaturity—caused by retained primitive reflexes, disrupted right-left asymmetry, and poor transition from short-range to long-range connectivity. Emphasizing a bottom-up, root-cause approach over symptom management, he describes how remediating reflexes, stimulating right-brain activity, and balancing networks can unlock speech, motor control, and potential in non-speaking individuals—highlighting the human brain's unique evolutionary vulnerability and adaptability while offering hope for meaningful change without erasing unique brilliance.Dr. Melillo https://www.drrobertmelillo.comYT https://www.youtube.com/@themelillomethodInstagram https://www.instagram.com/drrobertmelillo/White Board Series: Serotonin's Role in Development for Sensory Maps (not mood) https://youtu.be/Pbovstb82i4White Board Series: Basal Ganglia (Go/No-GO), Neural Correlates, & "Motivation" https://www.youtube.com/watch?v=hTW8CSPVEGcWhite Board Series: Basal Ganglia No-Go area & Arkeypallidial Cells https://www.youtube.com/watch?v=XHZ_5HthUWsDaylight Computer Company, use "autism" for $50 off at https://buy.daylightcomputer.com/autismChroma Light Devices, use "autism" for 10% discount at https://getchroma.co/?ref=autismFig Tree Christian Golf Apparel & Accessories, use "autism" for 10% discount at https://figtreegolf.com/?ref=autism0:00 Dr. Robert Melillo5:24 The Nature of Gifts & Vulnerabilities with Autism15:26 The Evolution of the Human Brain & Bipedalism; CNS is to move the living organism; Left Brain, Right Brain25:20 Functional Connectivity & Movements; Left Brain-Right Brain36:46 The Immature Brain; Autism means "Self"38:54 Interventions for Maturing the Brain & Movements42:46 The Melillo Method & Upstream Individualized Interventions47:47 GI and the Nervous Systems; Excitation/Inhibition52:21 Melillo Method55:40 Giving a Voice to Non-Verbals; Sensory Map, Somatosensory & Homunculus1:03:00 The Basal Ganglia & Motor Movements1:06:34 Bridging Clinical & Neuroscience Research & MethodsX: https://x.com/rps47586YT: https://www.youtube.com/channel/UCGxEzLKXkjppo3nqmpXpzuAemail: info.fromthespectrum@gmail.com

The Meditation Conversation Podcast
538. Energetic Vulnerabilities Created by Alcohol Consumption

The Meditation Conversation Podcast

Play Episode Listen Later Jan 6, 2026 18:17


In this episode of Soul Elevation, I talk openly about alcohol and its energetic and spiritual effects. While most people are aware of the physical health impacts of drinking, far fewer consider how alcohol affects the biofield, psychic boundaries, and the ability to fully embody the soul within the body. I share my own experience of stepping away from alcohol after understanding how choices, environments, and substances influence energetic strength and coherence. We explore how alcohol can weaken the energy field, create vulnerabilities, and make it easier for external influences to affect thoughts, emotions, and overall well-being. I also discuss the deeper meaning behind alcohol being referred to as "spirits," how alcohol is used to extract the essence of plants, and why this matters for those on a spiritual path. This is not a moral conversation and not about shame or judgment. It is about awareness, sovereignty, and making choices that support your highest embodiment and spiritual clarity. If you are interested in energy hygiene, spiritual development, and living in greater alignment with your soul, this conversation offers important insights to consider. Thank you for liking, subscribing, and sharing Soul Elevation with those who may benefit from this message. Get my book, Your Authentic Awakening: https://amzn.to/3YpgWnf  Subscribe to my new Soul Meditation CLIPS channel for more inspiration: https://www.youtube.com/@soulelevationclips?sub_confirmation=1   

MID-WEST FARM REPORT - MADISON
Feed Industry Sees Vulnerabilities In Supply Chain

MID-WEST FARM REPORT - MADISON

Play Episode Listen Later Dec 23, 2025 7:41


It turns out that what’s on the plate for livestock, and our pets, is caught in a geopolitical and regulatory tug-of-war. From a dependency on China for essential vitamins to the MAHA movement's potential impact on feed standards, the American Feed Industry Association is juggling a lot of topics with us today. Leah Wilkinson is AFIA's chief policy officer. She starts off by explaining to us the volatility around feed ingredients, including where they come from. See omnystudio.com/listener for privacy information.

china supply chains sees maha vulnerabilities afia american feed industry association
The CyberWire
The cloud that spies back.

The CyberWire

Play Episode Listen Later Dec 17, 2025 30:10


Researchers detail a years-long Russian state-sponsored cyber espionage campaign. Israel's cyber chief warns against complacency. Vulnerabilities affect products from Fortinet and Hitachi Energy. Studies show AI models are rapidly improving at offensive cyber tasks. MITRE expands its D3FEND cybersecurity ontology to cover operational technology. Texas sues smart TV manufacturers, alleging illegal surveillance. A fraudulent gift card locks an Apple user out of their digital life. Our guest is Doron Davidson from CyberProof Israel discussing agentic SOCs and agentic transformation of an MDR. Fat racks crack the stacks. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Industry Voices segment, we are joined by ⁠Doron Davidson⁠, GM at ⁠CyberProof⁠ Israel, MD Security Operations, discussing agentic SOC and agentic transformation of an MDR. If you'd like to learn more be sure to check out ⁠CyberProof⁠. Tune into the full conversation here. Selected Reading Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure (Live Threat Intelligence) IDF warns future cyberattacks may dwarf past threats (The Jerusalem Post) CISA reports active exploitation of critical Fortinet authentication bypass flaw (Beyond Machines) Hitachi Energy reports BlastRADIUS flaw in AFS, AFR and AFF Series product families (Beyond Machines) AI models are perfecting their hacking skills (Axios) AI Hackers Are Coming Dangerously Close to Beating Humans (WSJ) MITRE Extends D3FEND Ontology to Operational Technology Cybersecurity (Mitre) Texas sues biggest TV makers, alleging smart TVs spy on users without consent (Ars Technica) Locked out: How a gift card purchase destroyed an Apple account (Apple Insider) Racks of AI chips are too damn heavy (The Verge) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The John Batchelor Show
S8 Ep190: Targeting Adversary Vulnerabilities and Future Fleet Architecture: Colleague Jerry Hendrix highlights the economic vulnerability of adversaries like China, who rely heavily on sea lanes for energy and resources, outlining a future fleet architec

The John Batchelor Show

Play Episode Listen Later Dec 14, 2025 8:10


Targeting Adversary Vulnerabilities and Future Fleet Architecture: Colleague Jerry Hendrix highlights the economic vulnerability of adversaries like China, who rely heavily on sea lanes for energy and resources, outlining a future fleet architecture targeting over 450 ships and emphasizing the critical role of unmanned surface vessels and an expanded logistics force to sustain global naval operations. 1940 IMPERIAL NAVY HQ

The CyberWire
When preview pane becomes preview pain.

The CyberWire

Play Episode Listen Later Dec 10, 2025 23:53


Patch Tuesday. Federal prosecutors charge a Houston man with smuggling Nvidia chips to China, a Ukrainian woman for targeting critical infrastructure, and an Atlanta activist for wiping his phone. The power sector sees cyber threats doubling. The new Spiderman phishing kit slings its way across the dark web. Our guest is Dick O'Brien, Principal Intelligence Analyst from Symantec and Carbon Black Threat Hunter Team, discussing “Unwanted Gifts: Major Campaign Lures Targets with Fake Party Invites.” The Pentagon unveils a killer chatbot.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Dick O'Brien, Principal Intelligence Analyst from Symantec and Carbon Black Threat Hunter Team, is discussing “Unwanted Gifts: Major Campaign Lures Targets with Fake Party Invites." Selected Reading Microsoft Patches 57 Vulnerabilities, Three Zero-Days (SecurityWeek) Google Patches Gemini Enterprise Vulnerability Exposing Corporate Data (SecurityWeek) Adobe Patches Nearly 140 Vulnerabilities (SecurityWeek) ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Rockwell, Schneider (SecurityWeek) Fortinet Patches Critical Authentication Bypass Vulnerabilities (SecurityWeek) Smuggling Ring Charged as Trump Okays Nvidia Sales to China (Gov Infosecurity) Cybersecurity in power: supply chain most vulnerable, varying confidence in resilience (Power Technology) Spiderman Phishing Kit Targets European Banks with Real-Time Credential Theft (Hackread) Hospice Firm, Eye Care Practice Notifying 520,000 of Hacks (Bank Infosecurity) Ukrainian hacker charged with helping Russian hacktivist groups (Bleeping Computer) Man Charged for Wiping Phone Before CBP Could Search It (404 Media) Pete Hegseth Says the Pentagon's New Chatbot Will Make America 'More Lethal' (404 Media) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Tuesday, December 9th, 2025: nanoKVM Vulnerabilities; Ghostframe Phishing; WatchGuard Advisory

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Dec 9, 2025 6:26


nanoKVM Vulnerabilities The nanoKVM device updates firmware insecurely; however, the microphone that the authors of the advisory referred to as undocumented may actually be documented in the underlying hardware description. https://www.tomshardware.com/tech-industry/cyber-security/researcher-finds-undocumented-microphone-and-major-security-flaws-in-sipeed-nanokvm Ghostframe Phishing Kit The Ghostframe phishing kit uses iFrames and random subdomains to evade detection https://blog.barracuda.com/2025/12/04/threat-spotlight-ghostframe-phishing-kit WatchGuard Advisory WatchGuard released an update for its Firebox appliance, fixing ten vulnerabilities. Five of these are rated as High. https://www.watchguard.com/wgrd-psirt/advisories

SaaS Scaled - Interviews about SaaS Startups, Analytics, & Operations
Coping with the Discomfort of Hypergrowth with Adam Markowitz

SaaS Scaled - Interviews about SaaS Startups, Analytics, & Operations

Play Episode Listen Later Dec 9, 2025 31:55


Today, we're joined by Adam Markowitz, Co-Founder & CEO at Drata, the leader in AI-native trust management. We talk about:The good problems that come with hypergrowthThe most critical decision that drives successBeing intentional about culture The amplification effects of AI – and the risk that presentsFostering a culture to support the discomfort of rapid growth

Business of Tech
MSP Cybersecurity: Addressing AI Vulnerabilities and Account Takeover Fraud Risks

Business of Tech

Play Episode Listen Later Dec 3, 2025 13:49


AI-integrated tools, such as OpenAI's Atlas and Microsoft Teams, are introducing new trust and identity risks, particularly through vulnerabilities like prompt injections and guest access features. The Atlas browser, launched on October 21, 2025, has been identified as having security flaws that could allow attackers to inject harmful instructions. Similarly, Microsoft Teams has a vulnerability that permits attackers to bypass security protections when users join external tenants as guests. These developments highlight the fragility of AI integrations and the need for robust security measures in collaborative environments.The FBI has reported over $262 million in losses due to account takeover fraud schemes, with more than 5,100 complaints filed this year. Cybercriminals are employing social engineering tactics to gain unauthorized access to online banking and payroll accounts, often locking victims out by changing passwords. The FBI recommends that individuals monitor their financial accounts closely, use complex passwords, and enable multi-factor authentication to mitigate these risks. This trend underscores the importance of managing trust and identity in security practices, as attackers increasingly exploit human vulnerabilities rather than technical flaws.In the managed service provider (MSP) sector, a recent survey by OpenText Cybersecurity revealed that while 92% of MSPs are experiencing growth driven by interest in AI, fewer than half feel prepared to implement AI tools effectively. This marks a significant decline from the previous year's 90% readiness. Additionally, 71% of MSPs reported that their small and medium-sized business clients prefer bundled security solutions, indicating a shift towards integrated offerings that simplify decision-making for clients. The findings suggest that MSPs need to focus on data governance and readiness before deploying AI solutions.For MSPs and IT service leaders, the key takeaway is that modern security is increasingly about managing identity and data governance rather than merely adding more tools. As AI vulnerabilities and account takeover fraud become more prevalent, providers must prioritize establishing secure trust boundaries and effective data management practices. By doing so, MSPs can differentiate themselves in a competitive market, ensuring they are equipped to deliver secure AI solutions and meaningful automation to their clients. Three things to know today00:00 New AI, Collaboration, and Fraud Threats Underscore That Identity—not Infrastructure—is the Real Security Battleground05:15 Survey Shows MSPs Expanding Services Amid AI Interest, Yet True Opportunity Lies in Readiness and Governance07:45 New MSP Integrations, Funding, and AI Platforms Underscore the Shift Toward Identity and Data Governance as the True Control Plane This is the Business of Tech.     Supported by:  https://try.auvik.com/dave-switchhttps://scalepad.com/dave/

The CyberWire
Identifying vulnerabilities in space with Bigbear.ai. [Deep Space]

The CyberWire

Play Episode Listen Later Nov 27, 2025 21:22


Please enjoy this encore of T-Minus Deep Space. BigBear.ai is at the forefront of innovation for national security, and is committed to supporting the critical infrastructure driving America's competitive edge. The company deploys cutting-edge Al, machine learning, and computer vision solutions to defend critical operations and win with decision advantage. Our guests are ⁠Eric Conway,⁠ Vice President of Technology, and ⁠Joe Davis⁠, Cybersecurity Research Scientist  at ⁠Bigbear.ai.⁠  Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on ⁠LinkedIn⁠ and ⁠Instagram⁠. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our ⁠media kit⁠. Contact us at ⁠space@n2k.com⁠ to request more info. Want to join us for an interview? Please send your pitch to ⁠space-editor@n2k.com⁠ and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The John Batchelor Show
S8 Ep127: China's Debt Dilemma and Keir Starmer's Political Trouble — Joseph Sternberg — Sternberg analyzes China'scritical economic vulnerabilities, noting that its $2.2 trillion in global lending—partly channeled through the Belt and Road Initi

The John Batchelor Show

Play Episode Listen Later Nov 26, 2025 11:55


China's Debt Dilemma and Keir Starmer's Political Trouble — Joseph Sternberg — Sternberg analyzes China'scritical economic vulnerabilities, noting that its $2.2 trillion in global lending—partly channeled through the Belt and Road Initiative—faces mounting pressure from defaults and political resistance to Chinese asset ownership. Domestically, China restricts capital inflows to manage inflation and stabilize exchange rates. Sternberg also examines UK politics, noting that Labour leader Keir Starmer faces mounting political difficulties ahead of a challenging budget that lacks an articulated economic growth strategy. 1700 WINDSOR CASTLE

The Health Ranger Report
Brighteon Broadcast News, Nov 19, 2025 – Epstein files to be released AFTER all names of powerful people are SCRUBBED

The Health Ranger Report

Play Episode Listen Later Nov 19, 2025 85:08


- Interview with Patrick Byrne on Election Fraud and Bolshevik Revolution (0:00) - CloudFlare Internet Outage and Vulnerabilities (2:03) - Brighteon's AI Engine and Decentralization Efforts (4:39) - Comparison of AI Engines: Brighteon vs. Google and X (8:02) - Special Report: Brighteon AI Slays Google Gemini 3 and Grok 4.1 (12:03) - Epstein Files and Political Manipulation (25:33) - Jeffrey Epstein's Role and the Depopulation Agenda (29:26) - Patrick Byrne's Role in Exposing Election Fraud (44:51) - The Role of Smartmatic and Election Manipulation (55:29) - The Future of Election Integrity and Trump's Role (1:04:09) - Critique of President's Actions and Internal Obstacles (1:06:16) - Threats and Resistance Within the Administration (1:19:11) - Personal Support and Criticism of Trump (1:20:18) - The Enemy Within and Traitorous Actions (1:21:29) - Availability and Impact of the Documentary and Book (1:23:08) - Grand Jury Impaneled and Final Remarks (1:24:13) For more updates, visit: http://www.brighteon.com/channel/hrreport  NaturalNews videos would not be possible without you, as always we remain passionately dedicated to our mission of educating people all over the world on the subject of natural healing remedies and personal liberty (food freedom, medical freedom, the freedom of speech, etc.). Together, we're helping create a better world, with more honest food labeling, reduced chemical contamination, the avoidance of toxic heavy metals and vastly increased scientific transparency. ▶️ Every dollar you spend at the Health Ranger Store goes toward helping us achieve important science and content goals for humanity: https://www.healthrangerstore.com/ ▶️ Sign Up For Our Newsletter: https://www.naturalnews.com/Readerregistration.html ▶️ Brighteon: https://www.brighteon.com/channels/hrreport ▶️ Join Our Social Network: https://brighteon.social/@HealthRanger ▶️ Check In Stock Products at: https://PrepWithMike.com

The Health Ranger Report
Brighteon Broadcast News, Nov 16, 2025 - Trump goes SCORCHED EARTH against his own support base, as former fans BURN MAGA HATS

The Health Ranger Report

Play Episode Listen Later Nov 16, 2025 131:58


- Trump's Actions and Their Impact on His Supporters (0:11) - Michael Yahn's Dark Outlook for America (0:57) - Positive Interviews and Upcoming Content (2:28) - Trump's Attacks on MAGA Leaders (4:29) - Reactions to Trump's Actions (9:40) - The Future of the US Empire (29:54) - Michael Yahn's Analysis of Trump's Actions (59:26) - The Role of Zionist Interests in Trump's Actions (1:12:40) - The Impact of Trump's Actions on Global Politics (1:16:18) - The Future of the US and Global Economy (1:16:36) - Trump Administration's Economic Data and Globalist Agenda (1:16:53) - Financial System's Vulnerabilities and Job Losses (1:23:49) - Impact of AI and Job Replacement on the Economy (1:26:01) - Geopolitical Tensions and Water Crises (1:27:39) - China's Influence and Depopulation Efforts (1:31:40) - NATO's Decline and Russia's Military Advancements (1:32:49) - Economic Collapse and Manufacturing Decline (1:41:07) - Thailand's Self-Destruction and Drug Legalization (1:45:05) - Bitcoin's Vulnerabilities and Gold's Importance (1:49:06) - Final Thoughts on Economic Collapse and Revolt (2:10:07) For more updates, visit: http://www.brighteon.com/channel/hrreport  NaturalNews videos would not be possible without you, as always we remain passionately dedicated to our mission of educating people all over the world on the subject of natural healing remedies and personal liberty (food freedom, medical freedom, the freedom of speech, etc.). Together, we're helping create a better world, with more honest food labeling, reduced chemical contamination, the avoidance of toxic heavy metals and vastly increased scientific transparency. ▶️ Every dollar you spend at the Health Ranger Store goes toward helping us achieve important science and content goals for humanity: https://www.healthrangerstore.com/ ▶️ Sign Up For Our Newsletter: https://www.naturalnews.com/Readerregistration.html ▶️ Brighteon: https://www.brighteon.com/channels/hrreport ▶️ Join Our Social Network: https://brighteon.social/@HealthRanger ▶️ Check In Stock Products at: https://PrepWithMike.com

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Friday, November 14th, 2025: SmartApeSG and ClickFix; Formbook Obfuscation Tricks; Sudo-rs Vulnerabilities; SANS Holiday Hack Challenge

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Nov 14, 2025 10:09


SmartApeSG campaign uses ClickFix page to push NetSupport RAT A detailed analysis of a recent SamtApeSG campaign taking advantage of ClickFix https://isc.sans.edu/diary/32474 Formbook Delivered Through Multiple Scripts An analysis of a recent version of Formbook showing how it takes advantage of multiple obfuscation tricks https://isc.sans.edu/diary/32480 sudo-rs vulnerabilities Two vulnerabilities were patched in sudo-rs, the version of sudo written in Rust, showing that while Rust does have an advantage when it comes to memory safety, there are plenty of other vulnerabilities to worry about https://ubuntu.com/security/notices/USN-7867-1 https://github.com/trifectatechfoundation/sudo-rs/security/advisories/GHSA-c978-wq47-pvvw?ref=itsfoss.com SANS Holiday Hack Challenge https://sans.org/HolidayHack