The inability of an entity to withstand the adverse effects of a hostile or uncertain environment
POPULARITY
Categories
In this episode, we explore how to de-risk your career roadmap by identifying the hidden vulnerabilities that hold your decision-making hostage.
HEADLINE: Strategic Vulnerabilities and the Path to a 456-Ship Fleet GUEST AUTHOR: Jerry HendrixSUMMARY: Hendrix identifies critical economic vulnerabilities in China and Russia, noting that both regimes rely heavily on sea lanes for energy and food, making them susceptible to naval interdiction. To maintain deterrence, he proposes a future fleet of 456 ships. This expansion relies on a pivot to unmanned surface vessels to control costs and the addition of 60 frigates for global presence. Hendrix also warns that the Navy must urgently replace retiring guided-missile submarines and expand the logistics force, as combatant ships cannot operate effectively without a robust train of supply vessels.1888 NAVAL GUN
Former CIA officer and whistleblower JOHN KIRIAKOU reveals how easily you're tracked, the truth about surveillance, manipulation, and torture, and why exposing the CIA sent him to prison! John Kiriakou is a former CIA counterterrorism officer and intelligence analyst who served for 15 years, including as chief of counterterrorism operations in Pakistan after 9/11. He publicly blew the whistle on the CIA's torture program, for which he served 23 months in prison. He explains: ◼️How intelligence agencies can monitor your car in real time ◼️The proven psychology the CIA uses to recruit spies ◼️Why he went to prison for exposing the truth, and would do it again ◼️The surveillance mistake that instantly makes you easier to track ◼️Why telling the truth is treated as a national security threat (00:00) Intro (02:32) I Blew the Whistle on the CIA (04:09) What Was Your Role in the CIA? (12:27) How Did You End Up Being a Spy? (14:47) The CIA's Strategy With Podcasters (17:28) How Did You Get Into the CIA? (23:14) What Was Your Training Like? (27:38) People's Vulnerabilities (31:13) What Can the CIA Really Get for Someone? (32:59) Lying and Lie Detection (37:34) Do You Often Have to ‘Take One for the Team' in the CIA? (41:13) What Does the Average Person Not Know About the World? (47:21) Digital Security (51:48) Sleeper Agents: Training Spies From Birth (56:19) Is the Average Person Interacting With a Spy? (58:10) How Many Spies Are There in the US? (01:03:46) Conspiracy Theories (01:05:11) Dosing Americans With LSD (01:08:33) Are the CIA Involved in Iran? (01:10:50) Have You Ever Killed Anyone? (01:14:48) Which Spy Force Is the Most Impressive? (01:21:15) Was Jeffrey Epstein a Spy? (01:26:39) Who Is the Real Adversary? (01:28:54) Is Venezuela a Cover for Something Else? (01:33:04) Does China Want the US to Fall? (01:33:52) Is the US Going Bankrupt? (01:35:57) Why Does the US Government Keep Breaking the Law? (01:39:52) Should You Be Pardoned by Trump? (01:40:31) What Did You Stop Doing That Improved Your Life? Follow John: X - https://bit.ly/4bAFhy4 Instagram - https://bit.ly/4b3GQ7M You can purchase John's book, Surveillance and Surveillance Detection: A CIA Insider's Guide‘, here: https://amzn.to/4qU7Cnv The Diary Of A CEO: ◼️Join DOAC circle here - https://doaccircle.com/ ◼️Buy The Diary Of A CEO book here - https://smarturl.it/DOACbook ◼️The 1% Diary is back - limited time only: https://bit.ly/3YFbJbt ◼️The Diary Of A CEO Conversation Cards (Second Edition): https://g2ul0.app.link/f31dsUttKKb ◼️Get email updates - https://bit.ly/diary-of-a-ceo-yt ◼️Follow Steven - https://g2ul0.app.link/gnGqL4IsKKb Sponsors: Pipedrive - https://pipedrive.com/CEO Intuit - If you want help getting out of the weeds of admin, https://intuitquickbooks.com
Stories we're following this morning at Progress Texas:Polling released this week shows an uphill battle for likely Democratic nominee and State Rep. Gina Hinojosa against Governor Greg Abbott in November, with a gap of about 8 points: https://www.newsweek.com/gina-hinojosa-chances-beating-greg-abbott-flip-texas-gop-poll-11366360...Abbott is sitting on a massive war chest of $106 million: https://www.texastribune.org/2026/01/15/texas-governors-race-greg-abbott-gina-hinojosa-2026-election/...The poll also shows Ken Paxton to be the weakest of the three potential Republican nominees against both Jasmine Crockett and James Talarico: https://www.newsweek.com/crockett-vs-talarico-chances-of-flipping-gop-texas-senate-seat-new-poll-11364958A migrant's death earlier this month at the ICE detention facility at El Paso is being investigated as a homicide: https://www.elpasotimes.com/story/news/immigration/2026/01/15/cuban-immigrants-death-at-camp-east-montana-was-likely-homicide-report-el-paso/88204666007/...He is one of four migrants to die in ICE custody in just the opening days of 2026: https://thehill.com/homenews/administration/5686408-immigration-detention-deaths-early-2026/An analysis of the 291 private schools so far approved for the Texas voucher scam finds that the vast majority are Christian schools, many of which require a profession of faith for admission, specifically exclude LGBTQ+ and special needs kids, and engage in a host of questionable and exclusionary practices: https://www.texasobserver.org/texas-voucher-schools-openly-discriminate/Police in Goliad County have been using a highly questionable smartphone surveillance platform that has been rejected by Meta as "surveillance for hire" while being embraced by the authoritarian regime currently running El Salvador: https://www.texasobserver.org/texas-police-invest-tangles-sheriff-surveillance/Progress Texas will be covering the debate held by the Richardson Area Democrats between Texas Attorney General candidates and Dems Joe Jaworski and State Senator Nathan Johnson! RSVP to join us live: https://www.mobilize.us/richardsonareademocrats/event/879644/Early voting in the March primary starts in mere weeks, on February 17 - the time to research your ballot is right now: https://apps.texastribune.org/features/2026/texas-march-2026-primary-ballot/?_bhlid=7d8eca3d2a16adc7c9b44185414443fa32be6d84See the full list of 2026 races and candidates, courtesy of Lone Star Left, HERE and HERE.Check out our web store, including our newly-expanded Humans Against Greg Abbott collection: https://store.progresstexas.org/Progress Texas is expanding into both broadcast radio - including a new partnership with KPFT-FM in Houston - and into Spanish language media! Make a tax-deductible contribution to our radio initiative HERE, and to our Spanish expansion HERE.Thanks for listening! Our monthly donors form the backbone of our funding, and if you're a regular, we'd like to invite you to join the team! Find our web store and other ways to support our important work at https://progresstexas.org.
My guest today is Dr. Robert Melillo. Dr. Melillo shares his 35-year journey from athletic injuries and chiropractic roots to developmental cognitive neuroscience and founder of the Melillo Method. Driven by his own children's challenges and a deep commitment to preserving their extraordinary gifts, he explains Autism as a treatable developmental imbalance rooted in brain immaturity—caused by retained primitive reflexes, disrupted right-left asymmetry, and poor transition from short-range to long-range connectivity. Emphasizing a bottom-up, root-cause approach over symptom management, he describes how remediating reflexes, stimulating right-brain activity, and balancing networks can unlock speech, motor control, and potential in non-speaking individuals—highlighting the human brain's unique evolutionary vulnerability and adaptability while offering hope for meaningful change without erasing unique brilliance.Dr. Melillo https://www.drrobertmelillo.comYT https://www.youtube.com/@themelillomethodInstagram https://www.instagram.com/drrobertmelillo/White Board Series: Serotonin's Role in Development for Sensory Maps (not mood) https://youtu.be/Pbovstb82i4White Board Series: Basal Ganglia (Go/No-GO), Neural Correlates, & "Motivation" https://www.youtube.com/watch?v=hTW8CSPVEGcWhite Board Series: Basal Ganglia No-Go area & Arkeypallidial Cells https://www.youtube.com/watch?v=XHZ_5HthUWsDaylight Computer Company, use "autism" for $50 off at https://buy.daylightcomputer.com/autismChroma Light Devices, use "autism" for 10% discount at https://getchroma.co/?ref=autismFig Tree Christian Golf Apparel & Accessories, use "autism" for 10% discount at https://figtreegolf.com/?ref=autism0:00 Dr. Robert Melillo5:24 The Nature of Gifts & Vulnerabilities with Autism15:26 The Evolution of the Human Brain & Bipedalism; CNS is to move the living organism; Left Brain, Right Brain25:20 Functional Connectivity & Movements; Left Brain-Right Brain36:46 The Immature Brain; Autism means "Self"38:54 Interventions for Maturing the Brain & Movements42:46 The Melillo Method & Upstream Individualized Interventions47:47 GI and the Nervous Systems; Excitation/Inhibition52:21 Melillo Method55:40 Giving a Voice to Non-Verbals; Sensory Map, Somatosensory & Homunculus1:03:00 The Basal Ganglia & Motor Movements1:06:34 Bridging Clinical & Neuroscience Research & MethodsX: https://x.com/rps47586YT: https://www.youtube.com/channel/UCGxEzLKXkjppo3nqmpXpzuAemail: info.fromthespectrum@gmail.com
In this episode of Soul Elevation, I talk openly about alcohol and its energetic and spiritual effects. While most people are aware of the physical health impacts of drinking, far fewer consider how alcohol affects the biofield, psychic boundaries, and the ability to fully embody the soul within the body. I share my own experience of stepping away from alcohol after understanding how choices, environments, and substances influence energetic strength and coherence. We explore how alcohol can weaken the energy field, create vulnerabilities, and make it easier for external influences to affect thoughts, emotions, and overall well-being. I also discuss the deeper meaning behind alcohol being referred to as "spirits," how alcohol is used to extract the essence of plants, and why this matters for those on a spiritual path. This is not a moral conversation and not about shame or judgment. It is about awareness, sovereignty, and making choices that support your highest embodiment and spiritual clarity. If you are interested in energy hygiene, spiritual development, and living in greater alignment with your soul, this conversation offers important insights to consider. Thank you for liking, subscribing, and sharing Soul Elevation with those who may benefit from this message. Get my book, Your Authentic Awakening: https://amzn.to/3YpgWnf Subscribe to my new Soul Meditation CLIPS channel for more inspiration: https://www.youtube.com/@soulelevationclips?sub_confirmation=1
It turns out that what’s on the plate for livestock, and our pets, is caught in a geopolitical and regulatory tug-of-war. From a dependency on China for essential vitamins to the MAHA movement's potential impact on feed standards, the American Feed Industry Association is juggling a lot of topics with us today. Leah Wilkinson is AFIA's chief policy officer. She starts off by explaining to us the volatility around feed ingredients, including where they come from. See omnystudio.com/listener for privacy information.
In this week's episode of The Korea Pro Podcast, Jeongmin, John and Joon Ha examine how economic security, domestic politics and supply-chain strategy are increasingly colliding for South Korea. They begin with the special counsel investigation into former President Yoon Suk Yeol's martial law preparations, discussing why prosecutors concluded the episode was the result of prolonged institutional erosion rather than an isolated abuse of power. The conversation then turns to economic security. The hosts assess the launch of the U.S.-led Pax Silica initiative and Korea Zinc's $7.5 billion U.S. smelter project, focusing on how allied coordination is shifting geopolitical compliance costs onto private firms. They also discuss South Korea's record ICT exports and third-quarter corporate data, unpacking how surging semiconductor shipments to China and rising chaebol profitability are masking deepening stress among small and medium-sized enterprises. The episode concludes with a look ahead to an upcoming ban on the free provision of disposable plastic cups at various business establishments, including cafes, under a comprehensive “de-plastics” policy. About the podcast: The Korea Pro Podcast is a weekly conversation hosted by Korea Risk Group Executive Director Jeongmin Kim, Editor John Lee and correspondent Joon Ha Park, delivering deep, clear analysis of South Korean politics, diplomacy, security, society and technology for professionals who need more than headlines. Uploaded every Friday. This episode was recorded on Thursday, Dec. 18, 2025. Audio edited by Gaby Magnuson
Researchers detail a years-long Russian state-sponsored cyber espionage campaign. Israel's cyber chief warns against complacency. Vulnerabilities affect products from Fortinet and Hitachi Energy. Studies show AI models are rapidly improving at offensive cyber tasks. MITRE expands its D3FEND cybersecurity ontology to cover operational technology. Texas sues smart TV manufacturers, alleging illegal surveillance. A fraudulent gift card locks an Apple user out of their digital life. Our guest is Doron Davidson from CyberProof Israel discussing agentic SOCs and agentic transformation of an MDR. Fat racks crack the stacks. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Industry Voices segment, we are joined by Doron Davidson, GM at CyberProof Israel, MD Security Operations, discussing agentic SOC and agentic transformation of an MDR. If you'd like to learn more be sure to check out CyberProof. Tune into the full conversation here. Selected Reading Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure (Live Threat Intelligence) IDF warns future cyberattacks may dwarf past threats (The Jerusalem Post) CISA reports active exploitation of critical Fortinet authentication bypass flaw (Beyond Machines) Hitachi Energy reports BlastRADIUS flaw in AFS, AFR and AFF Series product families (Beyond Machines) AI models are perfecting their hacking skills (Axios) AI Hackers Are Coming Dangerously Close to Beating Humans (WSJ) MITRE Extends D3FEND Ontology to Operational Technology Cybersecurity (Mitre) Texas sues biggest TV makers, alleging smart TVs spy on users without consent (Ars Technica) Locked out: How a gift card purchase destroyed an Apple account (Apple Insider) Racks of AI chips are too damn heavy (The Verge) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode:More security vulnerabilities in RSC landAnthropic tries to garner more OSS goodwillAnd we do a wrap up of CSS in 2025Timestamps:2:29 - More vulnerabilities in RSCs6:36 - Anthropic donates MCP to the Agentic AI Foundation16:04 - CSS 2025 wrap up25:05 - Disney to allow characters on Sora29:42 - What's making us happyNews:Paige - Anthropic donates MCP to the Agentic AI FoundationJack - More vulnerabilities in RSCs discoveredTJ - CSS Wrapped 2025Lightning News: Disney will allow characters on Sora AI video generatorWhat Makes Us Happy this Week:Paige - Twinkly Christmas LightsJack - 3D printed underwear for the multiboard desk organizationTJ - MammothThanks as always to our sponsor, the Blue Collar Coder channel on YouTube. You can join us in our Discord channel, explore our website and reach us via email, or talk to us on X, Bluesky, or YouTube.Front-end Fire websiteBlue Collar Coder on YouTubeBlue Collar Coder on DiscordReach out via emailTweet at us on X @front_end_fireFollow us on Bluesky @front-end-fire.comSubscribe to our YouTube channel @Front-EndFirePodcast
Targeting Adversary Vulnerabilities and Future Fleet Architecture: Colleague Jerry Hendrix highlights the economic vulnerability of adversaries like China, who rely heavily on sea lanes for energy and resources, outlining a future fleet architecture targeting over 450 ships and emphasizing the critical role of unmanned surface vessels and an expanded logistics force to sustain global naval operations. 1940 IMPERIAL NAVY HQ
12/12/25: MTA Pres Max Page & Berkshire Comm Coll Pres Ellen Kennedy: big threats to higher ed but reasons for optimism Free Press Co-Pres Craig Aaron: Trumps' EO prohibiting regul AI regulation, media mergers' threat to 1st Am. Holyoke Mayor Joshua Garcia: Trump's DOE killing Sublime Systems' low-carbon cement production facility. Political Gold w/ Josh Silver: Trump's vulnerabilities, SCOTUS to kill the Voting Rights Act? redistricting & 2026. Donnabelle Casis w/ poet Matt Dunovan & artist Ligia Bouton on Emily Dickinson & “A Something Overtakes the Mind.”
Patch Tuesday. Federal prosecutors charge a Houston man with smuggling Nvidia chips to China, a Ukrainian woman for targeting critical infrastructure, and an Atlanta activist for wiping his phone. The power sector sees cyber threats doubling. The new Spiderman phishing kit slings its way across the dark web. Our guest is Dick O'Brien, Principal Intelligence Analyst from Symantec and Carbon Black Threat Hunter Team, discussing “Unwanted Gifts: Major Campaign Lures Targets with Fake Party Invites.” The Pentagon unveils a killer chatbot. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Dick O'Brien, Principal Intelligence Analyst from Symantec and Carbon Black Threat Hunter Team, is discussing “Unwanted Gifts: Major Campaign Lures Targets with Fake Party Invites." Selected Reading Microsoft Patches 57 Vulnerabilities, Three Zero-Days (SecurityWeek) Google Patches Gemini Enterprise Vulnerability Exposing Corporate Data (SecurityWeek) Adobe Patches Nearly 140 Vulnerabilities (SecurityWeek) ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Rockwell, Schneider (SecurityWeek) Fortinet Patches Critical Authentication Bypass Vulnerabilities (SecurityWeek) Smuggling Ring Charged as Trump Okays Nvidia Sales to China (Gov Infosecurity) Cybersecurity in power: supply chain most vulnerable, varying confidence in resilience (Power Technology) Spiderman Phishing Kit Targets European Banks with Real-Time Credential Theft (Hackread) Hospice Firm, Eye Care Practice Notifying 520,000 of Hacks (Bank Infosecurity) Ukrainian hacker charged with helping Russian hacktivist groups (Bleeping Computer) Man Charged for Wiping Phone Before CBP Could Search It (404 Media) Pete Hegseth Says the Pentagon's New Chatbot Will Make America 'More Lethal' (404 Media) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode, Amy Gaeta, a researcher at the Centre for Drones and Culture and the Leverhulme Centre for the Future of Intelligence, discusses the how drones both uphold and subvert traditional masculine norms and the implications of their use in various contexts, from hobbyist communities to pornography. The conversation explores the complexities of gender dynamics in technology and the potential for systemic change in societal perceptions.Edited by: Meibel Dabodabo
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
nanoKVM Vulnerabilities The nanoKVM device updates firmware insecurely; however, the microphone that the authors of the advisory referred to as undocumented may actually be documented in the underlying hardware description. https://www.tomshardware.com/tech-industry/cyber-security/researcher-finds-undocumented-microphone-and-major-security-flaws-in-sipeed-nanokvm Ghostframe Phishing Kit The Ghostframe phishing kit uses iFrames and random subdomains to evade detection https://blog.barracuda.com/2025/12/04/threat-spotlight-ghostframe-phishing-kit WatchGuard Advisory WatchGuard released an update for its Firebox appliance, fixing ten vulnerabilities. Five of these are rated as High. https://www.watchguard.com/wgrd-psirt/advisories
SaaS Scaled - Interviews about SaaS Startups, Analytics, & Operations
Today, we're joined by Adam Markowitz, Co-Founder & CEO at Drata, the leader in AI-native trust management. We talk about:The good problems that come with hypergrowthThe most critical decision that drives successBeing intentional about culture The amplification effects of AI – and the risk that presentsFostering a culture to support the discomfort of rapid growth
AI-integrated tools, such as OpenAI's Atlas and Microsoft Teams, are introducing new trust and identity risks, particularly through vulnerabilities like prompt injections and guest access features. The Atlas browser, launched on October 21, 2025, has been identified as having security flaws that could allow attackers to inject harmful instructions. Similarly, Microsoft Teams has a vulnerability that permits attackers to bypass security protections when users join external tenants as guests. These developments highlight the fragility of AI integrations and the need for robust security measures in collaborative environments.The FBI has reported over $262 million in losses due to account takeover fraud schemes, with more than 5,100 complaints filed this year. Cybercriminals are employing social engineering tactics to gain unauthorized access to online banking and payroll accounts, often locking victims out by changing passwords. The FBI recommends that individuals monitor their financial accounts closely, use complex passwords, and enable multi-factor authentication to mitigate these risks. This trend underscores the importance of managing trust and identity in security practices, as attackers increasingly exploit human vulnerabilities rather than technical flaws.In the managed service provider (MSP) sector, a recent survey by OpenText Cybersecurity revealed that while 92% of MSPs are experiencing growth driven by interest in AI, fewer than half feel prepared to implement AI tools effectively. This marks a significant decline from the previous year's 90% readiness. Additionally, 71% of MSPs reported that their small and medium-sized business clients prefer bundled security solutions, indicating a shift towards integrated offerings that simplify decision-making for clients. The findings suggest that MSPs need to focus on data governance and readiness before deploying AI solutions.For MSPs and IT service leaders, the key takeaway is that modern security is increasingly about managing identity and data governance rather than merely adding more tools. As AI vulnerabilities and account takeover fraud become more prevalent, providers must prioritize establishing secure trust boundaries and effective data management practices. By doing so, MSPs can differentiate themselves in a competitive market, ensuring they are equipped to deliver secure AI solutions and meaningful automation to their clients. Three things to know today00:00 New AI, Collaboration, and Fraud Threats Underscore That Identity—not Infrastructure—is the Real Security Battleground05:15 Survey Shows MSPs Expanding Services Amid AI Interest, Yet True Opportunity Lies in Readiness and Governance07:45 New MSP Integrations, Funding, and AI Platforms Underscore the Shift Toward Identity and Data Governance as the True Control Plane This is the Business of Tech. Supported by: https://try.auvik.com/dave-switchhttps://scalepad.com/dave/
Episode SummaryAs AI systems become increasingly integrated into enterprise workflows, a new security frontier is emerging. In this episode of The Secure Developer, host Danny Allan speaks with Nicolas Dupont about the often-overlooked vulnerabilities hiding in vector databases and how they can be exploited to expose sensitive data.Show NotesAs organizations shift their focus from training massive models to deploying them for inference and ROI, they are increasingly centralizing proprietary data into vector databases to power RAG (Retrieval-Augmented Generation) and agentic workflows. However, these vector stores are frequently deployed with insufficient security measures, often relying on the dangerous misconception that vector embeddings are unintelligible one-way hashes.Nicolas Dupont explains that vector embeddings are simply dense representations of semantic meaning that can be inverted back to their original text or media formats relatively trivially. Because vector databases traditionally require plain text access to perform similarity searches efficiently, they often lack encryption-in-use, making them susceptible to data exfiltration and prompt injection attacks via context loading. This is particularly concerning when autonomous agents are over-provisioned with write access, potentially allowing malicious actors to poison the knowledge base or manipulate system prompts.The discussion highlights the need for a "secure by inception" approach, advocating for granular encryption that protects data even during processing without incurring massive performance penalties. Beyond security, this architectural rigor is essential for meeting privacy regulations like GDPR and HIPAA in regulated industries. The episode concludes with a look at the future of AI security, emphasizing that while AI can accelerate defense, attackers are simultaneously leveraging the same tools to create more sophisticated threats.LinksCyborgOWASP LLM Top 10Snyk - The Developer Security Company Follow UsOur WebsiteOur LinkedIn
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss vulnerabilities in popular chat applications, particularly focusing on Line and WhatsApp. They explore the implications of these vulnerabilities for user privacy and security, emphasizing the importance of API security and rate limiting. The conversation then shifts to the integration of AI in the workplace, highlighting how companies are adapting to this technology and the challenges employees face in learning to use it effectively. Finally, they touch on the impact of AI on education and the need for responsible use of technology.----------------------------------------------------YouTube Video Link: https://youtu.be/zK3JKEcisfY----------------------------------------------------Documentation:https://www.darkreading.com/application-security/line-messaging-bugs-asian-cyber-espionagehttps://www.bleepingcomputer.com/news/security/whatsapp-api-flaw-let-researchers-scrape-35-billion-accounts/https://www.wsj.com/tech/ai/ai-work-use-performance-reviews-1e8975df?mod=e2li----------------------------------------------------Contact Us:Website: https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: https://www.linkedin.com/company/bluesecpodYouTube: https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: https://www.linkedin.com/in/andyjaw/Email: andy@bluesecuritypod.com----------------------------------------------------Adam BrewerTwitter: https://twitter.com/ajbrewerLinkedIn: https://www.linkedin.com/in/adamjbrewer/Email: adam@bluesecuritypod.com
Please enjoy this encore of T-Minus Deep Space. BigBear.ai is at the forefront of innovation for national security, and is committed to supporting the critical infrastructure driving America's competitive edge. The company deploys cutting-edge Al, machine learning, and computer vision solutions to defend critical operations and win with decision advantage. Our guests are Eric Conway, Vice President of Technology, and Joe Davis, Cybersecurity Research Scientist at Bigbear.ai. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at space@n2k.com to request more info. Want to join us for an interview? Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
China's Debt Dilemma and Keir Starmer's Political Trouble — Joseph Sternberg — Sternberg analyzes China'scritical economic vulnerabilities, noting that its $2.2 trillion in global lending—partly channeled through the Belt and Road Initiative—faces mounting pressure from defaults and political resistance to Chinese asset ownership. Domestically, China restricts capital inflows to manage inflation and stabilize exchange rates. Sternberg also examines UK politics, noting that Labour leader Keir Starmer faces mounting political difficulties ahead of a challenging budget that lacks an articulated economic growth strategy. 1700 WINDSOR CASTLE
PolicyTracker journalist Camilla Mina speaks to Logan Scott, independent consultant and expert in Position, Navigation and Timing about GNSS interferences and its current challenges. They discuss jamming and spoofing but also interferences from other services and ways to mitigate them.
- Interview with Patrick Byrne on Election Fraud and Bolshevik Revolution (0:00) - CloudFlare Internet Outage and Vulnerabilities (2:03) - Brighteon's AI Engine and Decentralization Efforts (4:39) - Comparison of AI Engines: Brighteon vs. Google and X (8:02) - Special Report: Brighteon AI Slays Google Gemini 3 and Grok 4.1 (12:03) - Epstein Files and Political Manipulation (25:33) - Jeffrey Epstein's Role and the Depopulation Agenda (29:26) - Patrick Byrne's Role in Exposing Election Fraud (44:51) - The Role of Smartmatic and Election Manipulation (55:29) - The Future of Election Integrity and Trump's Role (1:04:09) - Critique of President's Actions and Internal Obstacles (1:06:16) - Threats and Resistance Within the Administration (1:19:11) - Personal Support and Criticism of Trump (1:20:18) - The Enemy Within and Traitorous Actions (1:21:29) - Availability and Impact of the Documentary and Book (1:23:08) - Grand Jury Impaneled and Final Remarks (1:24:13) For more updates, visit: http://www.brighteon.com/channel/hrreport NaturalNews videos would not be possible without you, as always we remain passionately dedicated to our mission of educating people all over the world on the subject of natural healing remedies and personal liberty (food freedom, medical freedom, the freedom of speech, etc.). Together, we're helping create a better world, with more honest food labeling, reduced chemical contamination, the avoidance of toxic heavy metals and vastly increased scientific transparency. ▶️ Every dollar you spend at the Health Ranger Store goes toward helping us achieve important science and content goals for humanity: https://www.healthrangerstore.com/ ▶️ Sign Up For Our Newsletter: https://www.naturalnews.com/Readerregistration.html ▶️ Brighteon: https://www.brighteon.com/channels/hrreport ▶️ Join Our Social Network: https://brighteon.social/@HealthRanger ▶️ Check In Stock Products at: https://PrepWithMike.com
- Trump's Actions and Their Impact on His Supporters (0:11) - Michael Yahn's Dark Outlook for America (0:57) - Positive Interviews and Upcoming Content (2:28) - Trump's Attacks on MAGA Leaders (4:29) - Reactions to Trump's Actions (9:40) - The Future of the US Empire (29:54) - Michael Yahn's Analysis of Trump's Actions (59:26) - The Role of Zionist Interests in Trump's Actions (1:12:40) - The Impact of Trump's Actions on Global Politics (1:16:18) - The Future of the US and Global Economy (1:16:36) - Trump Administration's Economic Data and Globalist Agenda (1:16:53) - Financial System's Vulnerabilities and Job Losses (1:23:49) - Impact of AI and Job Replacement on the Economy (1:26:01) - Geopolitical Tensions and Water Crises (1:27:39) - China's Influence and Depopulation Efforts (1:31:40) - NATO's Decline and Russia's Military Advancements (1:32:49) - Economic Collapse and Manufacturing Decline (1:41:07) - Thailand's Self-Destruction and Drug Legalization (1:45:05) - Bitcoin's Vulnerabilities and Gold's Importance (1:49:06) - Final Thoughts on Economic Collapse and Revolt (2:10:07) For more updates, visit: http://www.brighteon.com/channel/hrreport NaturalNews videos would not be possible without you, as always we remain passionately dedicated to our mission of educating people all over the world on the subject of natural healing remedies and personal liberty (food freedom, medical freedom, the freedom of speech, etc.). Together, we're helping create a better world, with more honest food labeling, reduced chemical contamination, the avoidance of toxic heavy metals and vastly increased scientific transparency. ▶️ Every dollar you spend at the Health Ranger Store goes toward helping us achieve important science and content goals for humanity: https://www.healthrangerstore.com/ ▶️ Sign Up For Our Newsletter: https://www.naturalnews.com/Readerregistration.html ▶️ Brighteon: https://www.brighteon.com/channels/hrreport ▶️ Join Our Social Network: https://brighteon.social/@HealthRanger ▶️ Check In Stock Products at: https://PrepWithMike.com
TestTalks | Automation Awesomeness | Helping YOU Succeed with Test Automation
AI is accelerating software delivery, but it's also introducing new security risks that most developers and automation engineers never see coming. In this episode, we explore how AI-generated code can embed vulnerabilities by default, how "vibe coding" is reshaping developer workflows, and what teams must do to secure their pipelines before bad code reaches production. You'll learn how to prompt more securely, how guardrails can stop vulnerabilities at generation time, how to prioritize real risks instead of false positives, and how AI can be used to protect your applications just as effectively as attackers use it to exploit them. Whether you're using Cursor, Copilot, Playwright MCP, or any AI tool in your automation workflow, this conversation gives you a clear roadmap for staying ahead of AI-driven vulnerabilities — without slowing down delivery. Featuring Sarit Tager, VP of Product for Application Security at Palo Alto Networks, who reveals real-world insights on securing AI-generated code, understanding modern attack surfaces, and creating a future-proof DevSecOps strategy.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SmartApeSG campaign uses ClickFix page to push NetSupport RAT A detailed analysis of a recent SamtApeSG campaign taking advantage of ClickFix https://isc.sans.edu/diary/32474 Formbook Delivered Through Multiple Scripts An analysis of a recent version of Formbook showing how it takes advantage of multiple obfuscation tricks https://isc.sans.edu/diary/32480 sudo-rs vulnerabilities Two vulnerabilities were patched in sudo-rs, the version of sudo written in Rust, showing that while Rust does have an advantage when it comes to memory safety, there are plenty of other vulnerabilities to worry about https://ubuntu.com/security/notices/USN-7867-1 https://github.com/trifectatechfoundation/sudo-rs/security/advisories/GHSA-c978-wq47-pvvw?ref=itsfoss.com SANS Holiday Hack Challenge https://sans.org/HolidayHack
In this episode of Cybersecurity Today, host Jim Love dives into several shocking security lapses and emerging threats. Highlights include ransomware negotiators at Digital Mint accused of being behind attacks, a new AI vulnerability that exploits Windows' built-in stack, and a misuse of OpenAI's API for command and control in malware operations. Additionally, AMD confirms a flaw in its Zen 5 CPUs that could lead to predictable encryption keys, and the Louvre faces scrutiny after a major theft reveals poor password practices and maintenance failures. The episode underscores the importance of basic security measures like strong passwords and regular audits despite advanced technological systems in place. 00:00 Introduction and Sponsor Message 00:48 Ransomware Negotiators Turned Hackers 02:08 AI Stack Vulnerabilities in Windows 04:04 Backdoor Exploits OpenAI's API 05:24 AMD's Encryption Key Flaw 06:59 Louvre Heist and Security Lapses 08:24 Conclusion and Call to Action
Imagine stepping into a role and discovering your predecessor had been severely underreporting vulnerabilities, leaving your systems 300 days behind on patches. Join G Mark Hardy and Ross Young in this riveting episode of CISO Tradecraft as they unveil a startling real-world scenario and a proven strategy to revolutionize your patching process. Learn how to tackle the ever-growing number of vulnerabilities, leverage AI and automation, and instill a culture of accountability and gamification among your team. With expert insights and practical steps, this episode is a must-watch for every cybersecurity leader looking to stay ahead of threats and secure their organization's future.Big thanks to our sponsor, Forcepoint. Check out how they can help you shut down ShadowAI. https://www.forcepoint.com/resources/ebooks/shadow-ai-security-guide?utm_source=linkedin&sf_src_cmpid=701a600000exxd7AAA&utm_medium=display&utm_content=AW_NC_LinkedInAds_October25_ban&utm_campaign=LinkedInAds_October25Slides can be found here: https://www.linkedin.com/posts/mrrossyoung_patch-or-perish-activity-7389964440546471936--I_F?utm_source=share&utm_medium=member_desktop&rcm=ACoAABnnk5MBYbK8I-lYgI25f6ro7t6rOeP-OdsChapters00:00 Introduction: The CISO Challenge 00:31 The Importance of Data Security 01:05 Welcome to CISO Tradecraft 02:01 Ross Young's Patching Journey 03:34 The Growing Threat of Vulnerabilities 05:16 AI and Cybersecurity 07:34 Developing a Comprehensive Security Approach 10:51 Accountability and Metrics 15:30 Improving Vulnerability Management Processes 19:28 Advanced Tooling and Automation 23:16 Future Trends in Cybersecurity 27:06 Conclusion: Adapting to the Future
Bottom line is any person in your life will always treat you exactly how you've taught them to treat you and how you've allowed them to treat you! It doesn't matter who the individaul is, they will do to you what you allow them to get away with! You teach your significant other exactly how he or she can treat you because you show your vulnerabilities out of what you perceive is love, when it has nothing to do with love. A person who truly loves you should enhance your life, not use, abuse, or control you! Most people don't have a clue of what love is because they've never learned to love self first!Become a supporter of this podcast: https://www.spreaker.com/podcast/relationships-and-relatable-life-chronicles--4126439/support.
In light of Kathryn Bigelow's new political thriller A House of Dynamite, this week's episode explores how Steven Spielberg's 1975 classic Jaws reveals the inherent weaknesses of democracy in times of crisis.We also discuss:A House of Dynamite (2025) d. Kathryn BigelowContact UsEmail: contact@jimmybernasconi.comInstagram: https://www.instagram.com/filmsfortoday/?hl=en
In this episode of 'Cybersecurity Today,' the panel, including Laura Payne from White TOK and David Shipley from Boer on Securities, reviews the major cybersecurity events of October. Key topics include DNS failures at AWS and Microsoft, the rise of AI and its associated security concerns, and several severe cloud and on-premises vulnerabilities in platforms like SharePoint and WSUS. The discussion highlights a surge in sophisticated phishing threats, the integration of AI in cyber attacks, and the critical importance of multifactor authentication. The panel also examines the implications of recent security breaches affecting critical infrastructure and the broader impact of cybersecurity on financial sectors. Ethical concerns about AI's use in creating inappropriate content and the urgent need for better regulatory frameworks for tech and cloud providers are underscored. The episode concludes with a humorous moment as Jim dons a gifted white TOK, bringing a smile to the discussion. 00:00 Introduction and Sponsor Message 00:18 Panel Introduction and AI Discussion 01:02 Cloud Outages and Their Impact 02:52 DNS and Internet Fragility 07:07 Botnets and Cybersecurity Threats 14:09 Industrial Control Systems Vulnerabilities 26:29 AI in Cybersecurity 35:37 Voice Deepfakes and Authentication Risks 38:32 Creative Scams and Real-Time Voice Translators 39:22 The Importance of Safe Words and Persistent Surveillance Issues 40:17 Hybrid Scams and Financial Crimes in Canada 41:44 Corporate Reputation and Financial Crimes Agency 42:41 Challenges with Digital Banking and Security 44:49 The Role of AI and Security in Financial Transactions 45:55 The Impact of Open Banking and Real-Time Payments 50:57 Email Filters and Cybersecurity Awareness 58:03 Microsoft's Security Challenges and Vulnerabilities 01:03:39 Legal Consequences for Cybercriminals 01:12:17 Final Thoughts and Acknowledgements
In this episode of the Autonomous IT, host Landon Miles dives deep into the world of vulnerabilities, exploits, and the psychology behind cyberattacks. From the story of Log4j and its massive global impact to the difference between hackers and attackers, this episode explores how and why breaches happen—and what can be done to stop them.Joining Landon is Jason Kikta, Chief Technology Officer and Chief Information Security Officer at Automox, Marine Corps veteran, and former leader at U.S. Cyber Command. Together, they break down attacker motivations, how to recognize threat patterns, and why understanding your own network better than your adversaries is the key to effective defense.Key Takeaways:The five stages of a vulnerability: introduction, discovery, disclosure, exploitation, and patching.Why Log4j became one of the most devastating vulnerabilities in modern history.How to identify attacker types and motivations.The mindset and methodology of effective defense.Why “good IT starts with good security.”Whether you're a cybersecurity professional, IT leader, or just curious about how cyberattacks really work, this episode offers practical insights from the front lines of digital defense.
In this episode of Cybersecurity Today, host David Shipley covers the latest updates from the Pwn2Own 2025 event in Ireland, where top hackers earned over $1 million for uncovering 73 zero-day vulnerabilities. Despite significant hype, AI's impact on cybersecurity remains limited. We also dive into a critical Microsoft WSUS flaw under active exploitation and its implications for U.S. government cyber defenses amid a federal shutdown. Lastly, ESET reports reveal North Korea's increased cyber espionage targeting European drone manufacturers. Stay informed on the ever-evolving landscape of cybersecurity threats and defenses. 00:00 Introduction and Headlines 00:29 Pwn to Own 2025 Highlights 02:35 AI's Role in Cybersecurity 03:43 Microsoft's Critical WSUS Vulnerability 07:24 US Government Shutdown and Cyber Attacks 10:04 North Korean Cyber Espionage 12:46 Conclusion and Call to Action
I know you're out there. The developer who watches their colleagues enthusiastically embrace Claude Code and Cursor, having AI write entire feature sets while you proudly type every semicolon by hand. The founder who sees AI-generated code as a ticking time bomb of bugs and security vulnerabilities. The software entrepreneur who believes that real code comes from human minds, not language models.This one's for you.This episode of The Bootstraped Founder is sponsored by Paddle.comYou'll find the Black Friday Guide here: https://www.paddle.com/learn/grow-beyond-black-fridayThe blog post: https://thebootstrappedfounder.com/ai-for-the-code-writing-purist-how-to-use-ai-without-surrendering-your-keyboard/The podcast episode: https://tbf.fm/episodes/420-ai-for-the-code-writing-purist-how-to-use-ai-without-surrendering-your-keyboardCheck out Podscan, the Podcast database that transcribes every podcast episode out there minutes after it gets released: https://podscan.fmSend me a voicemail on Podline: https://podline.fm/arvidYou'll find my weekly article on my blog: https://thebootstrappedfounder.comPodcast: https://thebootstrappedfounder.com/podcastNewsletter: https://thebootstrappedfounder.com/newsletterMy book Zero to Sold: https://zerotosold.com/My book The Embedded Entrepreneur: https://embeddedentrepreneur.com/My course Find Your Following: https://findyourfollowing.comHere are a few tools I use. Using my affiliate links will support my work at no additional cost to you.- Notion (which I use to organize, write, coordinate, and archive my podcast + newsletter): https://affiliate.notion.so/465mv1536drx- Riverside.fm (that's what I recorded this episode with): https://riverside.fm/?via=arvid- TweetHunter (for speedy scheduling and writing Tweets): http://tweethunter.io/?via=arvid- HypeFury (for massive Twitter analytics and scheduling): https://hypefury.com/?via=arvid60- AudioPen (for taking voice notes and getting amazing summaries): https://audiopen.ai/?aff=PXErZ- Descript (for word-based video editing, subtitles, and clips): https://www.descript.com/?lmref=3cf39Q- ConvertKit (for email lists, newsletters, even finding sponsors): https://convertkit.com?lmref=bN9CZw
In this episode of the Unsecurity Podcast, hosted by Megan Larkins and Brad Nigh from FRSecure, we are joined by Pinky from the IR team to dive deep into the pressing cybersecurity challenges as the holiday season approaches.From early breaches to the increasing sophistication of AI in phishing attacks, discover how attackers are evolving their tactics. The trio discusses the impact of VPN vulnerabilities, the rise of AI-enabled chatbots in ransomware scenarios, and how businesses can prepare for the uptick in threats during this busy time of year.Whether you're an IT professional or just curious about cybersecurity, this episode is packed with valuable insights.Don't miss out!-- Like, subscribe, and share with your network to stay informed about the latest in cybersecurity!Looking to get in touch? Reach out at unsecurity@frsecure.com and follow us for more!LinkedIn: https://www.linkedin.com/company/frsecure/Instagram: https://www.instagram.com/frsecureofficial/Facebook: https://www.facebook.com/frsecure/BlueSky: https://bsky.app/profile/frsecure.bsky.socialAbout FRSecure:https://frsecure.com/FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start or looking for a team of experts to collaborate with you, we are ready to serve.
402-521-3080In this conversation, Stephanie Olson and Rebecca Saunders explore the complexities and misconceptions surrounding human trafficking. They react to various media portrayals, debunk myths about age and vulnerability, and share cautionary tales for job seekers. The discussion emphasizes the importance of awareness, intuition, and understanding the realities of trafficking beyond sensationalized narratives.takeawaysHuman trafficking is often misunderstood and misrepresented in media.Grooming is a common tactic used by traffickers, rather than outright kidnapping.All age groups can be victims of trafficking, not just children.Vulnerable populations, including those with mental health issues, are at risk.Job seekers should be cautious of red flags during interviews.Intuition plays a crucial role in recognizing potentially dangerous situations.Misconceptions about trafficking can lead to fear and misinformation.Target and similar stores are often wrongly associated with trafficking incidents.Trafficking can occur without physical transportation of victims.It's important to define trafficking accurately to understand its implications.Sound Bites"Human trafficking is a business.""All ages are being trafficked.""Pay attention to your intuition."Chapters00:00 Introduction to Reaction Videos on Human Trafficking01:35 Debunking Myths About Human Trafficking in Public Spaces10:07 Understanding the Grooming Process in Trafficking12:29 The Reality of Kidnapping and Trafficking13:59 Exploring Trafficking of Older Adults15:38 Clarifying Misconceptions About Trafficking and Transportation20:15 Addressing Vulnerabilities and Misconceptions in Trafficking21:55 Understanding Trafficking Risks Across Age Groups28:10 The Complexity of Human Trafficking28:58 Job Seekers and Trafficking Awareness33:08 Red Flags in Job Interviews40:25 Final Thoughts on Safety and Vigilance42:18 R&R Outro.mp4Support the showEveryone has resilience, but what does that mean, and how do we use it in life and leadership? Join Stephanie Olson, an expert in resiliency and trauma, every week as she talks to other experts living lives of resilience. Stephanie also shares her own stories of addictions, disordered eating, domestic and sexual violence, abandonment, and trauma, and shares the everyday struggles and joys of everyday life. As a wife, mom, and CEO she gives commentaries and, sometimes, a few rants to shed light on what makes a person resilient. So, if you have experienced adversity in life in any way and want to learn how to better lead your family, your workplace, and, well, your life, this podcast is for you!https://setmefreeproject.net https://www.stephanieolson.com/
Cameron discusses the essential mindset and strategies for practice owners in the medical aesthetics field. He emphasizes the importance of maximizing time, intentional leadership, and the need for a disciplined morning routine. He also highlights the significance of working on the business rather than in it, understanding key performance indicators (KPIs), and the role of effective leadership in achieving success. The conversation concludes with a call to action for practice owners to embrace their entrepreneurial identity and focus on growth.Listen In!Thank you for listening to this episode of Medical Millionaire!Takeaways:Maximize your time to deliver value to clients.Mindset is crucial for success in practice ownership.Vulnerabilities should be viewed as opportunities for growth.Intentional leadership drives enterprise growth.Focus on signal, not noise, in business operations.Establish a disciplined morning routine for success.Work on your business, not just in it.Understand and track your KPIs for better decision-making.Leadership is a daily commitment, not just a title.Every successful entrepreneur has a coach or mentor.Unlock the Secrets to Success in Medical Aesthetics & Wellness with "Medical Millionaire"Welcome to "Medical Millionaire," the essential podcast for owners and entrepreneurs inMedspas, Plastic Surgery, Dermatology, Cosmetic Dental, and Elective Wellness Practices! Dive deep into marketing strategies, scaling your medical practice, attracting high-end clients, and staying ahead with the latest industry trends. Our episodes are packed with insights from industry leaders to boost revenue, enhance patient satisfaction, and master marketing techniques.Our Host, Cameron Hemphill, has been in Aesthetics for over 10 years and has supported over 1,000 Practices, including 2,300 providers. He has worked with some of the industry's most well-recognized brands, practice owners, and key opinion leaders.Tune in every week to transform your practice into a thriving, profitable venture with expert guidance on the following categories...-Marketing-CRM-Patient Bookings-Industry Trends Backed By Data-EMR's-Finance-Sales-Mindset-Workflow Automation-Technology-Tech Stack-Patient RetentionLearn how to take your Medical Aesthetics Practice from the following stages....-Startup-Growth-Optimize-Exit Inquire Here:http://get.growth99.com/mm/
In this episode of Hashtag Trending, host Jim Love discusses several key topics. An $800 experiment reveals that many satellites over North America transmit unencrypted sensitive data, including phone calls and military communications. Starlink demonstrates its capability by achieving 10 gigabit speeds on a cruise ship while dealing with congestion issues. Microsoft is betting on a voice-first future for PCs with its new AI-driven features in Windows 11. Finally, the episode highlights the growing vulnerabilities of businesses as they become increasingly dependent on cloud services amidst internet outages. 00:00 Introduction and Headlines 00:27 Unencrypted Satellite Data Exposed 02:47 Starlink's Impressive Speeds and Challenges 05:46 Microsoft's Vision for AI-Powered PCs 08:41 The Risks of Cloud Dependency 10:55 Conclusion and Upcoming Topics
I chat with Joshua Rogers about a blog post he wrote as well as some bugs he submitted to the curl project. Joshua explains how he went searching for some AI tools to help find security bugs, and found out they can work, if you're a competent human. We discuss the challenges of finding effective tools, the importance of human oversight in triaging vulnerabilities, and how to submit those bugs to open source projects responsibly. It's a very sane and realistic conversation about what AI tools can and can't do, and how humans should be interacting with these things. The show notes and blog post for this episode can be found at https://opensourcesecurity.io/2025/2025-10-ai-joshua-rogers/
Join us for another episode of the Unsecurity Podcast as Megan, Brad, and Seth Bowling, lead researcher and developer at FRSecure, dive into the evolving landscape of cybersecurity for city and county governments.Seth shares how Mirrored Defense's innovative heat map visualizes the attack surface across the U.S. and presents surprising findings from their research. The trio discusses the challenges and vulnerabilities faced by local governments, the importance of proactive security measures, and how Project Broken Mirror aims to raise awareness by providing public service solutions.The crew also discusses Seth's efforts to kick-start FRSecure's vulnerability management and conditional access policy initiatives.Whether you're a cybersecurity professional or an interested citizen, this episode offers valuable insights into protecting our critical infrastructure.Don't miss out on this engaging discussion and find out how you can get involved!--Like, subscribe, and share with your network to stay informed about the latest in cybersecurity!Looking to get in touch? Reach out at unsecurity@frsecure.com and follow us for more!LinkedIn: https://www.linkedin.com/company/frsecure/Instagram: https://www.instagram.com/frsecureofficial/Facebook: https://www.facebook.com/frsecure/BlueSky: https://bsky.app/profile/frsecure.bsky.socialAbout FRSecure:https://frsecure.com/FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start or looking for a team of experts to collaborate with you, we are ready to serve.
Google DeepMind's AI agent finds and fixes vulnerabilities California law lets consumers universally opt out of data sharing China-Nexus actors weaponize 'Nezha' open source tool Huge thanks to our sponsor, ThreatLocker Cybercriminals don't knock — they sneak in through the cracks other tools miss. That's why organizations are turning to ThreatLocker. As a zero-trust endpoint protection platform, ThreatLocker puts you back in control, blocking what doesn't belong and stopping attacks before they spread. Zero Trust security starts here — with ThreatLocker. Learn more at ThreatLocker.com.
Join guest host Dr. Liz Specht for a conversation with Nicole Favreau Farhadi, Senior Research Biochemist at the Army Combat Capabilities Development Command's (DEVCOM) Soldier Center, Combat Feeding Division (CFD). This episode, the final installment of our five-part biomanufacturing series, explores food research within the Department of Defense and the intersection of food biomanufacturing innovation with warfighter readiness. The discussion highlights the Defense Department's responsibilities in combat feeding, logistical vulnerabilities in military food systems, the integration of new biotechnologies for food processing, and the optimization of combat rations for nutrient density, weight, and shelf life. Learn More: DEVCOM: https://sc.devcom.army.mil/who-we-are/ Joint Culinary Center of Excellence (JCCoE): https://quartermaster.army.mil/jccoe/jccoe_main.html Close Combat Assault Ration (CCAR): https://www.dla.mil/Troop-Support/Subsistence/Operational-rations/Close-Combat-Assault-Ration/ Unitized Group Ration (UGR): https://www.dla.mil/Troop-Support/Subsistence/Operational-rations/UGR-HS/ To receive updates about the conference please join our mailing list here: https://www.emergingtechnologiesinstitute.org/sign-up http://emergingtechnologiesinstitute.org https://www.facebook.com/EmergingTechETI https://www.linkedin.com/company/ndia-eti-emerging-technologies-institute https://www.twitter.com/EmergingTechETI
Join guest host Dr. Liz Specht for a conversation with Nicole Favreau Farhadi, Senior Research Biochemist at the Army Combat Capabilities Development Command's (DEVCOM) Soldier Center, Combat Feeding Division (CFD). This episode, the final installment of our five-part biomanufacturing series, explores food research within the Department of Defense and the intersection of food biomanufacturing innovation with warfighter readiness. The discussion highlights the Defense Department's responsibilities in combat feeding, logistical vulnerabilities in military food systems, the integration of new biotechnologies for food processing, and the optimization of combat rations for nutrient density, weight, and shelf life.Learn More:DEVCOM: https://sc.devcom.army.mil/who-we-are/Joint Culinary Center of Excellence (JCCoE): https://quartermaster.army.mil/jccoe/jccoe_main.htmlClose Combat Assault Ration (CCAR): https://www.dla.mil/Troop-Support/Subsistence/Operational-rations/Close-Combat-Assault-Ration/Unitized Group Ration (UGR): https://www.dla.mil/Troop-Support/Subsistence/Operational-rations/UGR-HS/To receive updates about the conference please join our mailing list here: https://www.emergingtechnologiesinstitute.org/sign-up http://emergingtechnologiesinstitute.org https://www.facebook.com/EmergingTechETI https://www.linkedin.com/company/ndia-eti-emerging-technologies-institute https://www.twitter.com/EmergingTechETI
There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall and threat defense products. On the news front, the vulnerability spotlight stays on Cisco as the US Cybersecurity and Infrastructure Security Agency (CISA) issues an emergency directive to all federal... Read more »
There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall and threat defense products. On the news front, the vulnerability spotlight stays on Cisco as the US Cybersecurity and Infrastructure Security Agency (CISA) issues an emergency directive to all federal... Read more »
There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall and threat defense products. On the news front, the vulnerability spotlight stays on Cisco as the US Cybersecurity and Infrastructure Security Agency (CISA) issues an emergency directive to all federal... Read more »
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Distracting the Analyst for Fun and Profit Our undergraduate intern, Tyler House analyzed what may have been a small DoS attack that was likely more meant to distract than to actually cause a denial of service https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Distracting%20the%20Analyst%20for%20Fun%20and%20Profit/32308 GitHub s plan for a more secure npm supply chain GitHub outlined its plan to harden the supply chain, in particular in light of the recent attack against npm packages https://github.blog/security/supply-chain-security/our-plan-for-a-more-secure-npm-supply-chain/ SolarWinds Web Help Desk AjaxProxy Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVE-2025-26399) SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass of CVE-2024-28988, which in turn is a patch bypass of CVE-2024-28986. https://www.solarwinds.com/trust-center/security-advisories/cve-2025-26399 Vulnerabilities in Supermicro BMC Firmware CVE-2025-7937 CVE-2025-6198 Supermicro fixed two vulnerabilities that could allow an attacker to compromise the BMC with rogue firmware. https://www.supermicro.com/en/support/security_BMC_IPMI_Sept_2025
Former CIA officer Mike Baker joins Dr. Phil to expose China's long-game intelligence play from IP theft to border infiltration and land grabs near U.S. military sites. Dr. Phil talks with Mike Baker, host of The President's Daily Brief Podcast, former CIA covert ops officer, and cofounder of Portman Square Group to dissect the threats shaping America's future security. From China's long-horizon intelligence strategy and relentless intellectual property theft, to suspicious border crossings, cyber probing of U.S. infrastructure, and farmland acquisitions near military bases—this conversation connects the dots on a silent war unfolding in plain sight. Baker reveals how these moves aren't isolated incidents, but part of a systemic campaign to weaken America's resilience. Dr. Phil pushes the discussion further: What are the psychological effects of living under constant, invisible threats? Are Americans prepared mentally and structurally for disruption on this scale? Thank you to our sponsors: Chapter: For free and unbiased Medicare help, dial 352-845-0659 or go to https://askchapter.org/PHIL Disclaimer: Chapter and its affiliates are not connected with or endorsed by any government entity or the federal Medicare program. Chapter Advisory, LLC represents Medicare Advantage HMO, PPO, and PFFS organizations and stand alone prescription drug plans that have a Medicare contract. Enrollment depends on the plan's contract renewal. While we have a database of every Medicare plan nationwide and can help you to search among all plans, we have contracts with many but not all plans. As a result, we do not offer every plan available in your area. Currently we represent 50 organizations which offer 18,160 products nationwide. We search and recommend all plans, even those we don't directly offer. You can contact a licensed Chapter agent to find out the number of products available in your specific area. Please contact Medicare.gov, 1-800-Medicare, or your local State Health Insurance Program (SHIP) to get information on all of your options. Greenlight: Raise financially smart kids. Start your risk-free trial today! Visit https://Greenlight.com/phil
I've spent years talking about endpoint security, yet printers rarely enter the conversation. Today, that blind spot takes center stage. I'm joined by Jim LaRoe, CEO of Symphion, to unpack why printers now represent one of the most exposed corners of the enterprise and what can be done about it. Jim's team protects fleets that range from a few hundred devices to tens of thousands, and the picture he paints is stark. In many organizations, printers make up 20 to 30 percent of endpoints, and almost all of them are left in a factory default state. That means open ports, default passwords, and little to no monitoring. Pair that with the sensitive data printers receive, process, and store, plus the privileged connections they hold to email and file servers, and you start to see why attackers love them. We trace Symphion's path from a configuration management roots story in 1999 to a pivot in 2015 when a major printer manufacturer invited the company behind the curtain. What they found was a parallel universe to mainstream IT. Brand silos, disparate operating systems, and a culture that treated printers as cost items rather than connected computers. Add in the human factor, where technicians reset devices to factory defaults after service as second nature, and you have a recipe for recurring vulnerabilities that never make it into a SOC dashboard. Jim explains how Symphion's Print Fleet Cybersecurity as a Service tackles this mess with cross-brand software, professional operations, and proven processes delivered for a simple per-device price. The model is designed to remove operational burden from IT teams. Automated daily monitoring detects drift, same-day remediation resets hardened controls, and comprehensive reporting supports regulatory needs in sectors like healthcare where compliance is non-negotiable. The goal is steady cyber hygiene for printers that mirrors what enterprises already expect for servers and PCs, without cobbling together multiple vendor tools, licenses, and extra headcount to operate them. We also talk about the hidden costs of DIY printer security. Licensing multiple management platforms for different brands, training staff who already have full plates, and outages caused by misconfigurations all add up. Jim shares real-world perspectives from organizations that tried to patch together a solution before calling in help. The pattern is familiar. Costs creep. Vulnerabilities reappear. Incidents push the topic onto the CISO's agenda. Symphion's pitch is straightforward. Treat print fleets like any other class of critical infrastructure in the enterprise, and measure outcomes in risk reduction, time saved, and fewer surprises. If you are commuting while listening and now hearing alarm bells, you are not alone. Think about the printers scattered across your offices and clinics. Consider the data that passes through them every day. Then picture an attacker who finds default credentials in minutes and uses a printer to move across your network. Tune in for a fast, practical look at a risk hiding in plain sight, and learn how Symphion's Print Fleet Cybersecurity as a Service can help you close a gap that attackers know too well. ********* Visit the Sponsor of Tech Talks Network: Land your first job in tech in 6 months as a Software QA Engineering Bootcamp with Careerist https://crst.co/OGCLA
Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com