A podcast about dark & grim tabletop RPGs
…
continue reading
Web DM are lifelong friends and roleplayers who want to help you make your games the best they can be! Our shows offer advice, interviews, and other fun TTRPG goodness beamed directly into your ears! Want more? We've got another weekly podcast on patreon.com/webdm, videos every week on youtube.com/webdm, and livestreams of our podcasts on twitch.tv/webdm.
…
continue reading
Rekindling a Spirit of Hope and Truth in the Conversation by applying a Biblical perspective to current events. It's time to wake the LIONS! web: www.onedaycloser.biz email: [email protected] DM on IG: odc.md X account: @odc22md
…
continue reading
A Curse of Strahd actual-play D&D podcast! We're the Goons, an adventuring party of actors, teachers, woodworkers, brewers and web developers banding together to defeat D&D's most horrifying villaināStrahd von Zarovich. Join us around the table as we endeavor to bring hope and light back to the people of the far, foggy realm of Barovia!
…
continue reading
Welcome to the trading desk. š. A weekly podcast released every Saturday. You will here my thoughts, as well as my guests takes on the week in crypto Bitget- Web :https://bit.ly/3BAeQU0 Mobile : https://bit.ly/3DGkEgA DM on Twitter for more info!
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
The Ishan Show is a podcast related to stories of software developers, entrepreneurs, and people who are doing some amazing work in their fields during or after college. I am Ishan Sharma, 18 year old Electrical Engineering student at BITS Goa, India. I spend most of my time learning content marketing, and computer science. I love reading books and solving problems. I have worked at multiple companies in front end developer, and social media marketing roles. I'm also the Founder of a podcast ...
…
continue reading
British comedy duo 'Kat and Kat' - Katerina Robinson and Kat Ronson, dive in to the depths of their DM inboxes. Some have to be heard to be believed! Kat & Kat have been a comedy sketch duo since 2018 and have been featured by BBC Radio, Wonderland Magazine, Daily Star, METRO, Evening Standard, Chortle, Wall of Comedy, Lad Bible, British Comedy Guide, Beyond the Joke & more. In 2021, their web comedy series 'LADS' received 9.1 on IMDb and 100% on Rotten Tomatoes.
…
continue reading

1
How Hackers Think.š„Chris Robertsš„Latest AI Risks for Business
58:38
58:38
Play later
Play later
Lists
Like
Liked
58:38Rural Healthcare and small/midsized businesses are being tipped over the edge. Not by Tariffs or high interest rates, but by investments needed into protecting their people and systems from disruption. How can you protect yourself from something you donāt know? A risk you donāt understand. What if you could think like a hacker⦠and use that power tā¦
…
continue reading

1
E 241: Dave's Epiphany & Trumps First 100 Days Preview
57:26
57:26
Play later
Play later
Lists
Like
Liked
57:26In a show entitled Trump Tariffs E238, we had a nice pre-Passover Bible lesson in the back half of that show. If you didnāt hear it, you should go back and listen to the latter half of that show. It talks about what was Christ doing leading up to Passover. What was he thinking about? Was he satisfied with his ministry? Did he feel he accomplished eā¦
…
continue reading

1
Are you at Risk? Personal Liability Cyber Breaches.
54:33
54:33
Play later
Play later
Lists
Like
Liked
54:33We interview Joseph Brunsman of the Brunsman Group, a thought leader in cybersecurity insurance. They discuss the liability in data breaches and the changes happening in the cybersecurity insurance industry. They also explore the impact of AI on cyber insurance and the importance of accurate application and underwriting processes. The conversation ā¦
…
continue reading

1
Darkened Tides Ep. 2: Barroom Blitz
1:18:39
1:18:39
Play later
Play later
Lists
Like
Liked
1:18:39Welcome to Darkened Tides, a new adventure in Saltmarsh from Critical Fayle DM! During the month of April 2025, we'll be bringing you the first two episodes of this new story in lieu of the Strahdcast for what we're calling 'Salty Spring!' After that, we'll be back to the Strahdcast on the main podcast feed, and this story will move over to our Patā¦
…
continue reading

1
šØNew FBI AlertšØGot a DM from the āFBIā on Telegram?
1:47
1:47
Play later
Play later
Lists
Like
Liked
1:47š² Got a DM from the āFBIā on Telegram? šØ Did someone named āJaimie Quinā claim they run IC3? ā ļø Itās a scam. Full stop. The FBI just issued an alert warning the public: They are NOT direct messaging victims on Telegram or any other social media app. A scammer posing as āJaimie Quinā is pretending to be the head of the FBIās Internet Crime Complaintā¦
…
continue reading

1
Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure
1:36:41
1:36:41
Play later
Play later
Lists
Like
Liked
1:36:41Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/home Chapters 00:00 Introduction to the Challenges of Securing Critical Infrastructure 03:11 Vulnerabilities and Weaknesses in Critical Infrastructure 10:0ā¦
…
continue reading

1
New Alert šØ Beware of Your Next Google SearchšØ
1:55
1:55
Play later
Play later
Lists
Like
Liked
1:55š Could your next Google search lead you into a cyber trap? š Are you sure that āHR loginā link isnāt a fake? šØ The FBI just issued a Public Service Announcement warning EVERYONE ā yes, even you ā that cybercriminals are now targeting employee self-service websites (like payroll, benefits, and HR portals). Hereās how it works: ā ļø Fraudsters buy seaā¦
…
continue reading

1
New Alert. šØ Don't Fall For The New Google SubpoenašØ
1:39
1:39
Play later
Play later
Lists
Like
Liked
1:39š¬ Would you fall for a fake Google subpoena? š”ļø What if it passed every security check ā and looked 100% real? šØ A new phishing tactic is slipping past traditional defenses ā and itās terrifyingly convincing. šµļøāāļø Recent reports reveal cybercriminals are sending fake emails that mimic legal subpoenas from Google. ā
No misspellings ā
No suspicious ā¦
…
continue reading

1
E240 The Hilton Sisters "I Will Never Leave You"
34:51
34:51
Play later
Play later
Lists
Like
Liked
34:51Born in 1908 these famous sisters became top celebrities in Vaudville in the late 1920' and 1930s, making $5,000 a week at their peak. Books, Plays, and Movies have captured their life, but they still remain mostly unknown, until today. Listen to the show and find out what made Violet and Daisy Hilton the most famous entertainers you never heard ofā¦
…
continue reading

1
Zero Trust, SMB & National Security. INTEL CTO Exclusive.
1:01:40
1:01:40
Play later
Play later
Lists
Like
Liked
1:01:40Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. Steve is a key advisor in emā¦
…
continue reading

1
Secrets To Cyber Crime Discussions. Ransomware Negotiations Unleashed.
58:15
58:15
Play later
Play later
Lists
Like
Liked
58:15David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know. Chapters 00:00 The Reality of Cybercriā¦
…
continue reading

1
Carrion Company S3E27 Conflagration
2:03:10
2:03:10
Play later
Play later
Lists
Like
Liked
2:03:10In this episode, things are heating up for Wolfgang, Walter and Alaric. Character sheets for the episode can be found here: https://docs.google.com/spreadsheets/d/1_kIp6s3RNaPpivhUDjBF7LYOHo-ITmweiLPETeNTGaM/edit?usp=sharing To get in touch or discuss the show, you can find all of our social media links on our website: https://www.toatabletop.com/ ā¦
…
continue reading

1
E 239: Pondering the Flood of Emotions - Post Easter
50:16
50:16
Play later
Play later
Lists
Like
Liked
50:16Today, we are going to examine what was happening AFTER the crucifixion and resurrection? What did the next 40 days look like? What were the emotions, thoughts and questions whirling around in the heads of Christ followers, as well as the onlookers, the Pharisees and politicians? No doubt, the weeks following Jesusā triumphant entry, his arrest, thā¦
…
continue reading

1
How start a career in cybersecurity today. Josh Mason
56:21
56:21
Play later
Play later
Lists
Like
Liked
56:21Discussed how start a career in cybersecurity today with military veteran and security teacher, trainer and expert, Josh Mason. Covering what employers want in cybersecurity, new approaches to enter cyber security, how transition fro military into cybersecurity today, new approaches to enter cybersecurity, how start a career in cybersecurity today,ā¦
…
continue reading

1
Zero Trust. Social Engineering. Ron Woerner.
44:18
44:18
Play later
Play later
Lists
Like
Liked
44:18Zero Trust. New Approaches to Social Engineering. Video Episode: https://youtu.be/U-RiapHidco We discuss new approaches to understanding zero trust and new approaches to understanding social engineering with Ron Woerner. Ron is a Keynote Speaker, Tedx Speaker, Author, Security Community Leader, CEO of Cyber-AAA, Professor of Cyber Studies, CISO, Haā¦
…
continue reading

1
Oracle Breach 2025 šÆ How Hackers Attack
35:53
35:53
Play later
Play later
Lists
Like
Liked
35:53In early 2025, Oracle faced two significant cybersecurity breaches that exposed sensitive data and raised serious concerns about its security practices. The first breach involved outdated Cerner servers, compromising healthcare data, while the second targeted an inactive legacy system, leading to the theft of client credentials. Both incidents highā¦
…
continue reading

1
Hunting Down Hackers. John Hammond Exclusive.
1:00:59
1:00:59
Play later
Play later
Lists
Like
Liked
1:00:59Hunting Down Hackers. True Crime Stories with Huntress/YouTube Leader John Hammond. Video episode here: https://youtu.be/CMOu0o9FvFQ Examples with advice from top security content creator JOHN HAMMOND. Understanding the Cyber Crime Mind To Protect Business, top security content creator insight, recent true cyber crime examples, new findings on cybeā¦
…
continue reading

1
š„ How Hackers Can Protect Your Business | AI Risks & DEF CON Secretsš„
58:42
58:42
Play later
Play later
Lists
Like
Liked
58:42What if the hackers are actually the heroes? In this mind-blowing episode, host David Mauro sits down with Matt Toussain, elite military cyber warrior, DEF CON speaker, and Founder of Open Security, to reveal how offensive security and real-world hacking tactics are helping businesses reduce risk, fight cybercrime, and stay ten steps ahead of threaā¦
…
continue reading

1
Mind Games: Exploring Brain Reactions in Social Engineering
52:29
52:29
Play later
Play later
Lists
Like
Liked
52:29We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing. Find out more about Dr Marono, her research and findings at https://www.abbiemarono.com/ Send us a text Growth withoā¦
…
continue reading

1
CRIMINAL MINDS, Entitlement & Accountability. Godfather Brett Johnson.
51:15
51:15
Play later
Play later
Lists
Like
Liked
51:15šØ NEW EPISODE ALERT šØJoined by Brett Johnson, who EXPOSES the MIND of Cyber Crime. Once known as the "Original Internet Godfather" and US Most Wanted cybercriminal, Brett is now a cybersecurity consultant aiding law enforcement. Brett shares his remarkable journey of redemption, and we explore the mind of cyber crime and what drives criminals to coā¦
…
continue reading

1
Darkened Tides Ep. 1: Any Port in a Storm
1:09:21
1:09:21
Play later
Play later
Lists
Like
Liked
1:09:21Welcome to Darkened Tides, a new adventure in Saltmarsh from Critical Fayle DM! During the month of April 2025, we'll be bringing you the first two episodes of this new story in lieu of the Strahdcast for what we're calling 'Salty Spring!' After that, we'll be back to the Strahdcast on the main podcast feed, and this story will move over to our Patā¦
…
continue reading

1
E 238: Trumps Tariffs, Fair Trade & America's Rebalancing Strategy Explained
51:01
51:01
Play later
Play later
Lists
Like
Liked
51:01First and foremost, take a chill pill Chicken Little! The lefts Black Monday crash never arrived but boy did we get 75 some nations to reach out and express interest in renegotiating or removing Tariffs on the US! This has proven to be a rather historic week on the Global stage. Doomsayers anticipated that most nations would retaliate against Trumpā¦
…
continue reading
Chris Hadnagy, Best-selling author, security expert and CEO of Social Engineer, LLC, join sus to discuss hacking humans using sacience. Topics: understanding science in social engineering, hacking humans using science, neuroscience behind social engineering, science supporting social engineering, psychology of social engineering explained, how neurā¦
…
continue reading

1
The Undetected. Espionage and Spies.(Part 2)
30:23
30:23
Play later
Play later
Lists
Like
Liked
30:23Inside Espionage What Every American Should Know. Inside Truth Behind Data Breaches. There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Impact of Chinese Espionage on US Businesses and Innovation Insiā¦
…
continue reading

1
Carrion Company S3E26 Of Wolves and Men
2:26:08
2:26:08
Play later
Play later
Lists
Like
Liked
2:26:08We rejoin Klaus and Larus to find out whether they will make good their escape or head back into the besieged town to help their comrades. Character sheets for the episode can be found here: https://docs.google.com/spreadsheets/d/1fs6Z3ftP1qharrRFRxWJpNKv4scJzsrf0kO0qJEmWzQ/edit?usp=sharing To get in touch or discuss the show, you can find all of oā¦
…
continue reading

1
E 237: Part 2: Interview with Mark Davidson author of DANIEL REVISITED
38:35
38:35
Play later
Play later
Lists
Like
Liked
38:35We are honored today to have author Mark Davidson join us live and in person here in studio. Mark is the author of four books, Daniel Revisited, Iranās Great Invasion, Chronicles of the End Times, and the fourth, Hidden Babylon and Gods Last Warning. With a masters in engineering AND a student of history, biblical prophecy, geopolitics and economicā¦
…
continue reading

1
The Undetected. Espionage and Spies.(Part 1)
31:08
31:08
Play later
Play later
Lists
Like
Liked
31:08There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Threat of Chinese Espionage to American National Security Inside Espionage: What Every American Should Know Send us a text Growth without Interruptioā¦
…
continue reading

1
PowerSchool Exposed-š„-Children at Risk at School
28:48
28:48
Play later
Play later
Lists
Like
Liked
28:48šØNew Episode šØWe dive into PowerSchool Exposed-- Children at Risk at School, about the significant cybersecurity breach at PowerSchool, which exposed sensitive data of millions of students and teachers. It emphasizes the importance of transparency, accountability, and robust cybersecurity measures in protecting sensitive information. Takeaways Cybeā¦
…
continue reading

1
E 236: Interview with Mark Davidson author of Daniel Revisited - The Four Mideast Signs Leading to the ANTICHRIST
34:43
34:43
Play later
Play later
Lists
Like
Liked
34:43We are honored today to have author Mark Davidson join us live and in person here in studio. Mark is the author of four books, Daniel Revisited, Iranās Great Invasion, Chronicles of the End Times, and the fourth, Hidden Babylon and Gods Last Warning. With a masters in engineering AND a student of history, biblical prophecy, geopolitics and economicā¦
…
continue reading

1
The Shocking Rise and Fall of 23andMe. Exposed.
26:31
26:31
Play later
Play later
Lists
Like
Liked
26:31We expose and discuss the rise and fall of genetic testing company 23andMe. On September 13th, 2024 the once popular genetic testing company ā23andMeā agreed to a $30 million settlement stemming from a data breach that affected nearly 7 million users. The next day, on September 14th every single board member resigned. Victims of the data breach areā¦
…
continue reading