Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Password Podcasts
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
Waveplays, interviews, specials, and the live nightly comedy talkshow, the Nonsense Password Lounge.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Step into Big Blend Radio’s virtual speakeasy, pull up a seat and enjoy lighthearted yet success-driven Happy Hour Hang Out conversations between people and experts from across the country, around the world, and all walks of life. PS: The speakeasy password is Wiggie!
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading

1
All Things Secured | Online Privacy & Security on Odysee
All Things Secured | Online Privacy & Security
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Forgot your password? Lost access to your email or phone? Or maybe your account got hacked? In this episode, we guide you step by step to recover your Facebook account safely and quickly.
…
continue reading
In this episode, Tyler and Bob break down cybersecurity in a fun, human way—no tech jargon overload, just real tips and tricks to keep your business safe. From password tricks and phishing scams to the importance of backups and cloud security, they share easy-to-follow advice with plenty of humour and relatable insights. If you’ve ever ignored an update or used ”password123,” this one’s for you. Tune in, laugh a little, and learn how to become a cybersecurity rockstar!
…
continue reading
Pudding On The Wrist is: It’s a car crash on television at 3:00 in the morning. A backward secret message carved into an oak tree at the edge of town. A whispered password between the washer woman and the fish monger.
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
Today’s biggest tech headlines in a flash from TechCrunch.
…
continue reading
Tech news from a uniquely Catholic perspective
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
This ministry is designed to spread the gospel of Jesus Christ throughout the world overseen by Pastor Ronnie and Prophet Tonya Cantrell. Hidden Riches Ministries, Inc P.O. Box 41 Gladeville, TN 37071 Email: [email protected] Website: www.hiddenrichesministries.com 615-530-0725 Services: Tuesday 7 PM: Prayer Call in 603-663-5504 no password required Thursday 7 PM: ZOOM meeting ID: 7851177424 password: Anointed Call in: 312-626-6799 password: 96683778 https://us02web.zoom.us/j/ ...
…
continue reading
Welcome to Sankofa FM, let us never forget. Website password: "Sankofa" Cover art photo provided by Steve Harvey on Unsplash: https://unsplash.com/@trommelkopf
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
About the podcast. If you're facing issues with your Prime Tv —such as login errors, password problems, or email setup—help is just a call away. The easiest and fastest way to get support is by contacting Prime Customer Support at +1-804-507-5662 (Toll free). You'll be connected to a live agent who can assist with troubleshooting, account recovery, and device setup.In addition to phone support, you can explore the Support Center online for FAQs, step-by-step guides, and common fixes. For rea ...
…
continue reading
Leading the Way
…
continue reading
Anthony F Andrew C Hailey F Lea P
…
continue reading
TV Tech Guy Rich DeMuro offers tech news, gadget reviews, helpful apps and answers your questions. richontech.tv
…
continue reading
Podcast about Passwordless Password Management, Identity Theft Protection, Cloud Storage Encryption and Passwordless MFA. Made by https://logmeonce.com/
…
continue reading
culture eats technology for breakfast
…
continue reading
Prophecy, dreams, end time events, and debunking conspiracy theories.
…
continue reading
The Gathering’s talks are generally tied to one or more of the 12 Steps, but are always guided by spiritual concepts, principles and ideas common to most faiths. Topics are drawn from a variety of sources: the 12 steps, many of the well-known wisdom texts, science and other teachers that speak to a spiritual solution to life's challenges. About Roger B. Roger has been in recovery for over 46 years and has spent thousands of hours in service, sharing his experience, strength and hope. He has ...
…
continue reading
Amazon.com/mytv Enter Mytv Code. Activate Your Call Prime : +1 804(507-5662) Device-Specific Instructions for Registering Prime Video Smart TVs (Samsung, LG, Sony, Vizio, etc.) Open the Prime Video app (download it from the app store if not already installed). Select Sign in or Register on the Amazon website. A registration code will appear on your TV screen. On your phone or computer, go to amazon.com/mytv. Sign in with your Amazon credentials. Enter the code from your TV and click Register ...
…
continue reading
culture eats technology for breakfast
…
continue reading
Welcome soft, sad freaks! Once a month, writer and longtime Tumblr user Lauren Shippen and longtime user-slash-Tumblr-employee Cher McAnelly dive deep into our favorite fandom site. We talk trending topics, share our new ships, and forecast upcoming fandoms. If you’ve ever gone feral over a fic or bonkers about one of your blorbos, this podcast is for you! And remember: the password to the secret clubhouse is “shoelaces”. This podcast is not produced by, nor officially affiliated with Tumblr ...
…
continue reading
We use an agile approach to test assumptions and connect with the needs of your audience early and often. To start the promotion, we only need a link to the song you want us to promote. We will never ask you for your password.
…
continue reading
Your Home for Linux-related fun and learning!
…
continue reading
ITech Insights are short easy to understand video's meant to provide further education on many of the technologies we already use in our day to day business, as well as to introduce new and useful tools for saving time, money, and above all aggravation.
…
continue reading
What lurks beneath the surface — from crime to conspiracies.
…
continue reading
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
…
continue reading
Feel brighter every day with our 20-minute pop-biz news podcast. The 3 business stories you need, with fresh takes you can pretend you came up with — Pairs perfectly with your morning oatmeal ritual. Hosted by Jack Crivici-Kramer & Nick Martell. Formerly known as “Snacks Daily”, Nick and Jack continue their podcast independent from Robinhood.
…
continue reading
So… We had a password debacle but now we are on this new account. Different name, same show! Poole and Roberts are back for a whole new summer season!
…
continue reading
Exploring the bonds shared between people and technology
…
continue reading
Triweekly show from a female podcaster about topics that I feel passionate about in 10 minutes or less. This podcast is specifically for those with a short attention span.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Have you ever wanted to send classified information within your work environment, to family or friends, but were afraid to do it through the Online, due to the fact that some malicious hacker was able to spy on you? Tornote is a free web service that allows you to submit completely hidden articles through the Online. It’s quick, elementary, and generally not obtrusive asking for a password or user registration.
…
continue reading
A collection of all the SQPN shows
…
continue reading

1
Aruba password warning, SharePoint zero day, Russian vodka maker attacked
8:06
8:06
Play later
Play later
Lists
Like
Liked
8:06Hewlett Packard warns of hardcoded passwords in Aruba access points SharePoint zero-day exploited via RCE, no patch available Russian vodka producer suffers ransomware attack Huge thanks to our sponsor, Nudge Security Discover every SaaS account ever created by anyone in your org within minutes of starting a free trial. Harden configs, enforce MFA,…
…
continue reading

1
Passwords and the Elderly: Why Writing Them Down Might Be OK
19:54
19:54
Play later
Play later
Lists
Like
Liked
19:54In this episode, join hosts Tom Eston, Scott Wright, and Kevin Johnson as they discuss the controversial topic of seniors writing down passwords. They discuss how threat modeling differs for the elderly, the practicality of using password managers, two-factor authentication, and future solutions like passkeys. The conversation includes humorous ane…
…
continue reading

1
Episode 586: Where do you Keep your Passwords?
8:26
8:26
Play later
Play later
Lists
Like
Liked
8:26Intro and outro @fiverr. This episode talks about passwords and where I should keep mine outside of my phone. Follow the show @dreaspointofview on ig, fb and threads. Follow @dreapoint on x and spill. Leave a review or catch up on episodes at www,theedreaspointofview.com. Subscribe to my Free weekly newsletter at dreaspointofview.Substack.com.…
…
continue reading

1
AI chatbot’s simple ‘123456’ password risked exposing personal data of millions of McDonald’s job applicants
6:16
6:16
Play later
Play later
Lists
Like
Liked
6:16Plus - RealSense spins out of Intel to scale its stereoscopic imaging technology; Samsung is exploring new wearable form factors such as earrings and necklaces Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
…
continue reading

1
The End of Passwords? Why Passkeys Are the Future of Online Security
50:41
50:41
Play later
Play later
Lists
Like
Liked
50:41Can we finally say goodbye to passwords? Dom Bettinelli and Jack Baruzzini unpack how passkeys promise a safer, simpler future—and why resistance still exists. Plus, AI job interviews, NASA on Netflix, and a Navy guy uploads the Catechism The post The End of Passwords? Why Passkeys Are the Future of Online Security appeared first on StarQuest Media…
…
continue reading
In this episode, we talk about over sixty methods used to steal or bypass passwords, covering how attackers gain physical access to devices, buy breached credentials from forums, exploit reused passwords, break into databases with Structured Query Language injection, brute force login pages with tools like Hydra and Burp Suite, crack hashes with Jo…
…
continue reading
In this episode of Enterprise Linux Security, Jay and Joao discuss several recent stories, one of which is a breach involving 16 billion passwords! Also, Ubuntu users may see a performance boost, threat actors use Minecraft mods to target victims, and more!By jay
…
continue reading

1
🔥 “Hot People Only” — Secret Influencer apps. Colbert’s Last Show. Crypto Week’s Roman Empire.
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22There’s a secret app for influencers to get anything for free… and now we know about it. The reason the Late Show industry is getting canceled? Partly business, partly politics… and partly podcasts. “Crypto Week” passed America’s 1st three Bitcoin laws… and it reminds us of Julius Caesar. The newest trend in coffee… is serving it in giant plastic b…
…
continue reading

1
SANS Stormcast Monday July 21st, 2025: Sharepoint Exploited; Veeam Fake Voicemail Phish; Passkey Phishing Attack
8:05
8:05
Play later
Play later
Lists
Like
Liked
8:05SharePoint Servers Exploited via 0-day CVE-2025-53770 Late last week, CodeWhite found a new remote code execution exploit against SharePoint. This vulnerability is now actively exploited. https://isc.sans.edu/diary/Critical+Sharepoint+0Day+Vulnerablity+Exploited+CVE202553770+ToolShell/32122/ Veeam Voicemail Phishing Attackers appear to impersonate …
…
continue reading

1
Risky Bulletin: Iranian security firm behind airline hacking spree
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07An Iranian security firm is behind an airline hacking spree, Chinese hackers breach Singapore’s critical infrastructure, new SharePoint and CrushFTP zero-days are being used in the wild, and Japan releases free ransomware decrypters. Show notes
…
continue reading

1
Sponsored: Haroon Meer's secret to business success is… love
20:53
20:53
Play later
Play later
Lists
Like
Liked
20:53In this Risky Business sponsored interview, Thinkst Canary CEO Haroon Meer chats to Casey Ellis about the company’s impressive growth over the past decade, and how it approached that path a little differently to other firms. Haroon’s advice for young startup founders: Is your problem worth solving? And can you actually solve it? And… Love your cust…
…
continue reading
Intro and outro @fiverr. Edited @auphonic. This episode talks about enjoying experiences without competition. Follow The show @dreaspointofview on ig, fb and threads. Follow @dreapoont on x And spill. Leave a comment at [email protected] and a review at theedreaspointofview.com. Subscribe to my FREE weekly newsletter at dreaspointofview.su…
…
continue reading
What a week we've had globally! I ended up doing quite a few recaps this show, G-d is serious & on the move world wide! Weather world watch - flash flood risks still remain in parts of central Us; flesh eating bacteria claims 4 lives in florida, both articles/mentions derived from AcuWeather News; Public broadcasting cuts hit well known stations; E…
…
continue reading

1
AI notebook hack, proving you’re human online & one phone for work and personal (130, July 19, 2025)
1:47:54
1:47:54
Play later
Play later
Lists
Like
Liked
1:47:54Rich talked about how to build an AI-powered notebook that can remember everything using a combination of Google Gemini and Google Keep. Brian in Orange County is trying to figure out how to transfer photos from his iPhone to an Android. Rich mentioned LocalSend and PairDrop. Were Nest cameras really hacked on May 28th? Rich explains. Google has se…
…
continue reading

1
Netflix starts using GenAI in its shows and films
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12Plus - Meta refuses to sign EU’s AI code of practice; Perplexity sees India as a shortcut in its race against OpenAI Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
…
continue reading
If you missed our announcement... we have a brand new podcast! Flesh and Code is a 6-part miniseries, where we investigate how technology is being used to exploit our most human desires, and the price we pay for perfect understanding. If you enjoyed our teaser, search and follow 'Flesh and Code' wherever you listen to podcasts. And if you can't w…
…
continue reading
Join us for a delightful "Happy Hour Hang Out" on Big Blend Radio as we celebrate National Picnic Month and Parks & Recreation Month! This engaging episode explores the pure joy of picnicking, the profound benefits of connecting with nature, and our favorite spots and foods for an outdoor feast from Arizona to England. We dive into the calming prac…
…
continue reading

1
Week in Review: Pentagon’s Chinese Engineers, Gemini’s email phish, 20-year-old railroad flaw persists
32:12
32:12
Play later
Play later
Lists
Like
Liked
32:12Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Cyrus Tibbs, CISO, PennyMac Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatL…
…
continue reading

1
TikTok lures songwriters with new promotional features
6:30
6:30
Play later
Play later
Lists
Like
Liked
6:30Plus - Twitch starts testing vertical video streams; OpenAI launches a general purpose agent in ChatGPT Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
…
continue reading

1
030 - Info Stealers, GrapheneOS Drama, and Why Video Games and Anti-Virus Are Spyware
52:42
52:42
Play later
Play later
Lists
Like
Liked
52:42In this episode, I address listener feedback and corrections regarding use of public Wi-Fi, MAC addresses, and aliases. I dive deep into the nuances of MAC address randomization on GrapheneOS versus Apple’s private Wi-Fi addresses, explaining why GrapheneOS offers superior privacy protection. I discuss the real threats of public Wi-Fi in 2025 (hint…
…
continue reading

1
The Oakville Blobs – Jimmy Akin’s Mysterious World
1:08:48
1:08:48
Play later
Play later
Lists
Like
Liked
1:08:48Gelatinous blobs fell from the sky in Oakville, Washington—then people got sick. Was it rain, jellyfish, or a secret government bioweapon test? Jimmy Akin and Dom Bettinelli dissect the evidence and theories. The post The Oakville Blobs – Jimmy Akin’s Mysterious World appeared first on StarQuest Media.…
…
continue reading

1
The Oakville Blobs – Jimmy Akin’s Mysterious World
1:08:48
1:08:48
Play later
Play later
Lists
Like
Liked
1:08:48Gelatinous blobs fell from the sky in Oakville, Washington—then people got sick. Was it rain, jellyfish, or a secret government bioweapon test? Jimmy Akin and Dom Bettinelli dissect the evidence and theories. The post The Oakville Blobs – Jimmy Akin’s Mysterious World appeared first on StarQuest Media.…
…
continue reading

1
📀 “DJ VC” — The Chainsmokers’ VC fund. Uber’s robo-chauffeur. The Fed’s situationship.
23:00
23:00
Play later
Play later
Lists
Like
Liked
23:00TBOY Live Chicago, July 23rd - tickets on sale here: https://www.axs.com/events/949346/the-best-one-yet-podcast-tickets The Chainsmokers’ music duo launched a VC fund… but their investing secret is their schedule. Uber is spending $2B on Lucid’s luxe electric cars to deliver its founder’s original dream… robo-chauffeurs. The Fed & President Trump a…
…
continue reading

1
Taiwan semiconductor sector hacked, Salt Typhoon breaches National Guard, Congress ponders Stuxnet
9:03
9:03
Play later
Play later
Lists
Like
Liked
9:03Chinese hackers use Cobalt Strike on Taiwan’s semiconductor sector Salt Typhoon breaches National Guard and steals network configurations Congress considers Stuxnet to manage OT threats Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses fro…
…
continue reading
Intro and outro @fiverr. This episode reviews my experience at the Sazerac House in New Orleans. Follow the show @dreaspointofview on ig, fb and threads. Follow the show @dreapoint on x and spill. Leave a review or catch up on episodes at www.theedreaspointofview.com. Subscribe to my free weekly newsletter at dreaspointofview.Substack.com.…
…
continue reading

1
Risky Bulletin: New phishing technique bypasses FIDO keys
8:03
8:03
Play later
Play later
Lists
Like
Liked
8:03Hackers bypass FIDO keys with a new phishing technique, a mobile surveillance vendor deploys an SS7 exploit, ransomware hits South Korea’s largest insurance provider, and law enforcement agencies dismantle a pro-Kremlin DDoS group. Show notes
…
continue reading

1
SANS Stormcast Friday, July 18th, 2025: Extended File Attributes; Critical Cisco ISE Patch; VMWare Patches; Quarterly Oracle Patches
4:55
4:55
Play later
Play later
Lists
Like
Liked
4:55Hiding Payloads in Linux Extended File Attributes Xavier today looked at ways to hide payloads on Linux, similar to how alternate data streams are used on Windows. Turns out that extended file attributes do the trick, and he presents some scripts to either hide data or find hidden data. https://isc.sans.edu/diary/Hiding%20Payloads%20in%20Linux%20Ex…
…
continue reading
What is DNS Delegation and what is it used for? What is new in the Delegation world, and what impact does it have on DNS security and operations? George Michaelson joins Tom Ammon and Russ White for a discussion about DNS DELEG in this episode of the Hedge. https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-274.mp3 download…
…
continue reading
What is DNS Delegation and what is it used for? What is new in the Delegation world, and what impact does it have on DNS security and operations? George Michaelson joins Tom Ammon and Russ White for a discussion about DNS DELEG in this episode of the Hedge. https://media.blubrry.com/hedge/content.blubrry.com/hedge/hedge-274.mp3 download…
…
continue reading

1
Google rolls out AI-powered business calling feature
8:30
8:30
Play later
Play later
Lists
Like
Liked
8:30Plus - xAI is hiring an engineer to make anime girls; Meta reportedly scores two more high-profile OpenAI researchers Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
…
continue reading

1
🐟 “CodBar” — David’s fish protein bar. Labubu: Beanie Baby or Barbie? Pittsburgh’s Austin-of-the-East.
21:32
21:32
Play later
Play later
Lists
Like
Liked
21:32David, the $725M protein bar brand, dropped its most controversial product yet… Cod fish. Pittsburgh just snagged $90B in AI investments… If all goes to plan, Pitt becomes the Austin of the East. Labubu dolls are now bigger than all of Mattel… but will these viral dolls become Beanie Babies or Barbies? Plus, France has a wild new plan to boost the …
…
continue reading

1
Google's AI tool finds bugs, Europol disrupts hacktivist group, SquidLoader targets Hong Kong
6:29
6:29
Play later
Play later
Lists
Like
Liked
6:29Google says ‘Big Sleep’ AI tool found bug hackers planned to use Google fixes actively exploited sandbox escape zero day in Chrome China’s cyber sector amplifies Beijing’s hacking of U.S. targets Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect busi…
…
continue reading

1
Srsly Risky Biz: Spain leaves key under mat for Huawei
21:23
21:23
Play later
Play later
Lists
Like
Liked
21:23Tom Uren and Amberleigh Jack talk about Huawei’s contract to manage storage for Spain’s lawful intercept system. News broke this week that Spain had signed a €12 million contract, but it turns out Huawei has been involved in the system since 2004! They also discuss arrests in the UK of four individuals associated with Scattered Spider. The criminal…
…
continue reading

1
SANS Stormcast Thursday, July 17th, 2025: catbox.moe abuse; Sonicwall Attacks; Rendering Issues
5:09
5:09
Play later
Play later
Lists
Like
Liked
5:09More Free File Sharing Services Abuse The free file-sharing service catbox.moe is abused by malware. While it officially claims not to allow hosting of executables, it only checks extensions and is easily abused https://isc.sans.edu/diary/More%20Free%20File%20Sharing%20Services%20Abuse/32112 Ongoing SonicWall Secure Mobile Access (SMA) Exploitation…
…
continue reading
Send us a text To judge or discern, whats the difference? Most of this is coming out of my conditioning, past experiences - my brain sorts the input information and I react instead of respond. Why do I do that? Where does that come from? This is why I blame and become a victim, the beasts does not want me to be responsible for the reaction, it does…
…
continue reading
Plus - xAI says it has fixed Grok 4’s problematic responses; Meta fixes bug that could leak users’ AI prompts and generated content Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
…
continue reading

1
🌮 “From TACO to BURRITO” — Trump’s next trade war trade. Jimmy Butler’s super coffee. Target’s influencer turnaround.
22:36
22:36
Play later
Play later
Lists
Like
Liked
22:36Forget the Trump T.A.C.O. Trade… we want to introduce the B.U.R.R.I.T.O. trade coming Aug 1st Basketball star Jimmy Butler just launched a $100 coffee… because of the wine industry. Target’s stock has dropped 60% from its high, so we have a solution… and it’s all about influencers. Plus, the most controversial part of your car? Cupholders (blame St…
…
continue reading

1
Chinese engineers at Pentagon, HazyBeacon malware, MITRE framework: AADAPT
8:06
8:06
Play later
Play later
Lists
Like
Liked
8:06Pentagon welcomes Chinese engineers into its environment HazyBeacon: It’s not a beer, but it leaves a bitter aftertaste What the world needs now is another framework Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks a…
…
continue reading
Intro and outro @fiverr. This episode discusses speaking your mind and standing on your opinion. Follow the show @dreaspointofview on ig, fb and threads. Follow @dreapoint on x and spill. Leave a review at www.theedreaspointofview.com. Subscribe to my free weekly newsletter at dreaspointofview.Substack.com.…
…
continue reading
We start with the AI hiring chatbot used by McDonald’s, and the vulnerability hiding beneath the conversation. What looked like some janky job application exchanges led two security researchers, Ian Carroll and Sam Curry, to uncover a serious flaw. That and a bunch of Grok madness. Learn more about your ad choices. Visit podcastchoices.com/adchoice…
…
continue reading