Four friends revisit a movie every week to see if it holds up and go on numerous tangents in the process!
…
continue reading
Welcome to "The Ground Zero Podcast," where Rob & Chad drop explosive takes on just about anything and everything! From culture to comedy, faith to fandoms, and all the random rabbit holes in between, every episode is packed with dynamic discussions, unexpected twists, and the occasional detonation of conventional wisdom. It’s not just a conversation—it’s ground zero for ideas that blow your mind. Plus, don’t miss our weekly "Bomb Drop of the Week" poll, where you get to weigh in on a polari ...
…
continue reading
Two Sisters. Too opinionated. Zero Clue. We’re Carly and Cindy, and we were raised to be obedient, modest, and quiet. Instead, we got divorced, left the church, and started a podcast. Messy Genes is where we unpack everything from religious deconstruction to dating after 7-20 years of marriage—with a lot of sarcasm, sister banter, and oversharing along the way. If you've ever been labeled “too much,” “too loud,” or just plain “too messy,” you're in the right place. Grab a drink and join us a ...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading

1
The Website Success Show: SEO & Website Tips For Beauty & Wellness Businesses Who Want More Website Traffic & Conversions
Jules White: Website & SEO Marketing Consultant
Need more traffic and sales through your website, without having to rely so heavily on social media or expensive ads? You need the power of SEO (Search Engine Optimisation)! This show is for beauty and wellness business owners - like salons & medspas, skin clinics, private practitioners, training academies & coaches - who want their website to do more than just look good. You want it to work - bringing in more of the right visitors and helping you turn those clicks into clients and customers ...
…
continue reading
Foster Parent Well is the go-to podcast for foster and adoptive parents who are navigating the complexities of parenting children with trauma while trying to stay sane in the process. Hosted by Nicole T Barlow, a foster and adoptive mom of six, parent trainer, and wellness coach, this podcast is where faith, resilience, and practical strategies come together. If you're feeling burnt out, overwhelmed, or just plain exhausted from the daily realities of foster care and adoption—you're not alon ...
…
continue reading
The "Dear Abby" podcast for the black community
…
continue reading
"Somewhere in Vegas" is a show dedicated to stories about fascinating people from all walks of life, from all over the world. The "Somewhere in Vegas" podcast used to be headquartered somewhere in Las Vegas, but now we travel the globe in search of the the most interesting people and places. We've featured top comedians, actors, wrestlers, MMA fighters and more. Exotic, sexy, dangerous, funny or just plain fascinating -- join us "Somewhere in Vegas."
…
continue reading
Medtech Innovation Podcast: Spencer Jones dives deep into winning medtech startup strategies. Each episode unpacks hot takes and insider tactics from the trenches of medtech innovation. Join physician inventors, founders, engineers, and healthcare market makers as they share actionable insights to navigate the FDA, secure medtech funding, and drive medtech breakthroughs. No-nonsense advice to be a change maker in medtech.
…
continue reading
For the brilliantly messy humans ready to show up as themselves! Tired of the "post every day, be everywhere, hustle harder" visibility advice? SAME. This is where we get real about what it actually takes to show up in business when visibility feels stretchy, imperfect or just plain hard. No filtered perfection here. Just honest conversations about building sustainable visibility that works with your brain, your energy, and your beautifully chaotic life. Whether you're a seasoned business ow ...
…
continue reading
The Technado crew covers a whirlwind of tech topics each week from interviews with industry experts and up-and-coming companies to commentary on topics like security, vendor certifications, networking, and just about anything IT related.
…
continue reading
The end is nigh. Wax on, wax off. Put ‘em in a body bag. 499 down, 1 to go. No mercy. The penultimate episode.By Plain Zero
…
continue reading

1
REWIND: Being a Learner as a Foster or Adoptive Parent
37:18
37:18
Play later
Play later
Lists
Like
Liked
37:18Ever felt like the gap between what you know about trauma and how you respond to it is impossibly wide? In this soul-nourishing conversation with Katrina Campbell, Director of Training at FaithBridgeU, we explore how continuous learning transforms not just our parenting but our spiritual lives. "Suffering moved in with me," Katrina shares, capturin…
…
continue reading
A House oversight committee requests DOGE documents from Microsoft. Predatory Sparrow claims a cyberattack on an Iranian bank. Microsoft says data that happens in Europe will stay in Europe. A complex malware campaign is using heavily obfuscated Visual Basic files to deploy RATs. A widely used CMS platform suffers potential RCE bugs. North Korea’s …
…
continue reading
I'm joined by Natalie Freels, CEO at InsightHealth Consulting, as we explore how data-driven market intelligence is revolutionizing medtech commercialization strategies and transforming how innovative companies bring breakthrough technologies to market. The Hidden Truth About Market Research in Medtech → Traditional market research methods are fail…
…
continue reading

1
Darknet drug marketplace closed for business.
37:24
37:24
Play later
Play later
Lists
Like
Liked
37:24International law enforcement takes down a darknet drug marketplace. The Washington Post is investigating a cyberattack targeting several journalists' email accounts. Anubis ransomware adds destructive capabilities. The GrayAlpha threat group uses fake browser update pages to deliver advanced malware. Researchers uncover a stealthy malware campaign…
…
continue reading

1
Mark Nunnikhoven: Providing clarity about security. [Cloud strategy]
8:53
8:53
Play later
Play later
Lists
Like
Liked
8:53Please enjoy this encore of Career Notes. Distinguished Cloud Strategist at Lacework, Mark Nunnikhoven, has gone from taking technology to its limits for his own understanding to providing clarity about security for others. Mark fell in love with his Commodore 128 and once he realized he could bend the machine to his will, it set him on the path to…
…
continue reading
This week, Dave is joined by Ziv Karliner, Pillar Security’s Co-Founder and CTO, sharing details on their work on "New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents." Vibe Coding - where developers use AI assistants like GitHub Copilot and Cursor to generate code almost instantly - has become central to how e…
…
continue reading
Cloudflare says yesterday’s widespread outage was not caused by a cyberattack. Predator mobile spyware remains highly active. Microsoft is investigating ongoing Microsoft 365 authentication services issues. An account takeover campaign targets Entra ID users by abusing a popular pen testing tool. Palo Alto Networks documents a JavaScript obfuscatio…
…
continue reading

1
089: From Zero to 6K+ Podcast Downloads Without Promotion On Social Media
50:05
50:05
Play later
Play later
Lists
Like
Liked
50:05Jules White reflects on one year of podcasting & the surprising impact it’s had on her business, her confidence, & her visibility. She shares the story of how the podcast began, the mindset shifts she’s experienced, what she’s learned about content creation, & how podcasting has helped her connect more deeply with her audience. She also opens up ab…
…
continue reading
Interpol’s Operation Secure dismantles a major cybercrime network, and Singapore takes down scam centers. GitLab patches multiple vulnerabilities in its DevSecOps platform. Researchers unveil a covert method for exfiltrating data using smartwatches. EchoLeak allows for data exfiltration from Microsoft Copilot. Journalists are confirmed targets of P…
…
continue reading

1
Messy Mormon Men: Priesthood Authority? More like Penishood Audacity
49:57
49:57
Play later
Play later
Lists
Like
Liked
49:57In this episode of the 'Messy Genes' podcast, hosts Carly and Cindy engage in lively banter and humorous anecdotes about their personal journeys and recent hectic schedules. They dive into a collection of outrageous and often shocking experiences shared by listeners regarding interactions with Mormon men. Topics range from inappropriate comments an…
…
continue reading

1
Matching Your Inside and Outside: Unlocking Congruence and Confidence on Your Terms - The Visible(ish) Podcast Ep.4
1:03:15
1:03:15
Play later
Play later
Lists
Like
Liked
1:03:15Matching Your Inside and Outside: Unlocking Congruence and Confidence on Your Terms - The Visible(ish) Podcast Ep.4 In this powerful episode, Melissa Howard sits down with transformational coach Washington Ali to discuss congruence, authentic visibility and the moment a pair of shoes changed his life. In this powerful episode, I sit down with trans…
…
continue reading

1
Ghost students “haunting” online colleges.
37:06
37:06
Play later
Play later
Lists
Like
Liked
37:06Patch Tuesday. Mozilla patches two critical FireFox security flaws. A critical flaw in Salesforce OmniStudio exposes sensitive customer data stored in plain text. The Badbox botnet continues to evolve. AI-powered “ghost students” enrolling in online college courses to steal government funds. Hackers steal nearly 300,000 vehicle crash reports from t…
…
continue reading

1
REWIND: The Marriage Behind the Mission- Navigating Foster Care as a Couple
30:56
30:56
Play later
Play later
Lists
Like
Liked
30:56Parenting children from hard places requires an extraordinary partnership between spouses. In this candid conversation, Nicole interviews her husband Bruce about how they've navigated the challenges and joys of foster parenting as a team. When Nicole first felt called to foster care, Bruce's immediate response was a firm "no." His journey from relu…
…
continue reading
An unsecured Chroma database exposes personal information of Canva Creators. A researcher brute-forces Google phone numbers. Five zero-day vulnerabilities in Salesforce Industry Cloud are uncovered. Librarian Ghouls target Russian organizations with stealthy malware. SAP releases multiple security patches including a critical fix for a NetWeaver bu…
…
continue reading

1
This medtech startup got acquired by Medtronic (here’s how you can do it)
45:24
45:24
Play later
Play later
Lists
Like
Liked
45:24I'm joined by Brian More, CEO at Nanovis, a nanotechnology company that's transforming patient outcomes through breakthrough surface engineering innovations. In this episode, we jump into: The Nanotechnology Impact in Spinal Implants → Nanovis creates surfaces that mimic natural bone structure at the nanoscale, dramatically improving osseointegrati…
…
continue reading

1
White House reboots cybersecurity priorities.
36:12
36:12
Play later
Play later
Lists
Like
Liked
36:12A new White House executive Order overhauls U.S. cybersecurity policy. The EU updates its “cybersecurity blueprint”. The Pentagon’s inspector general investigates Defense Secretary Hegseth’s Signal messages. Chinese hackers target U.S. smartphones. A new Mirai botnet variant drops malware on vulnerable DVRs. 17 popular Gluestack packages on NPM hav…
…
continue reading

1
Ell Marquez: It's okay to be new. [Linux] [Career Notes]
9:52
9:52
Play later
Play later
Lists
Like
Liked
9:52Please enjoy this encore of Career Notes. Linux and Security Advocate at Intezer Ell Marquez shares her journey from the family ranch to security. Needing a life change due to a bunch of circumstances that had occurred that left her almost homeless, Ell found out about a six week Linux boot camp that took her down the path toward technology. She fe…
…
continue reading

1
A new stealer hiding behind AI hype. [Research Saturday]
25:08
25:08
Play later
Play later
Lists
Like
Liked
25:08This week, we are joined by Michael Gorelik, Chief Technology Officer from Morphisec, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as fake AI video generation platforms, luring users in…
…
continue reading
The DOJ files to seize over $7 million linked to illegal North Korean IT workers. The FBI warns of BADBOX 2.0 malware targeting IoT devices. Researchers uncover a major security flaw in Chrome extensions. ESET uncovers Iranian hackers targeting Kurdish and Iraqi government officials. Hitachi Energy, Acronis and Cisco patch critical vulnerabilities.…
…
continue reading

1
088: Why Your Website Needs Better Photos (and How to Get Them)
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08In this episode, Jules White is joined by brand photographer Adele Williams from Super Funky Penguin, for a deep dive into how to use photography strategically on your website – and why it’s far more than just a ‘nice to have’. Adele shares her journey from engineering to photography, and why visuals are one of the most powerful tools you have to s…
…
continue reading

1
China’s largest data leak exposes billions.
33:43
33:43
Play later
Play later
Lists
Like
Liked
33:43Researchers discover what may be China’s largest ever data leak. CrowdStrike cooperates with federal authorities following last year’s major software bug. A researcher discovers over half a million sensitive insurance documents exposed online. Microsoft offers free cybersecurity programs to European governments. The FBI chronicles the Play ransomwa…
…
continue reading

1
Messy Moms: Not Your Mormon Motherhood Manual
1:11:13
1:11:13
Play later
Play later
Lists
Like
Liked
1:11:13In this episode of Messy Genes, we throw the Mormon motherhood manual straight into the fire. Carly and Cindy unpack the myths, pressure, and pedestal that shaped our parenting scripts—and how we’re unlearning it all. From "motherhood as divine destiny" to the shame-soaked standards of being the perfect mom, we’re talking about what it's like to pa…
…
continue reading

1
Stop Faking It: Show Up Online as Your True Self and Grow Your Brand - The Visible(ish) Podcast Ep. 3
20:27
20:27
Play later
Play later
Lists
Like
Liked
20:27Stop Faking It: Show Up Online as Your True Self and Grow Your Brand - The Visible(ish) Podcast Ep. 3 Is there a gap between your online persona and your actual personality? In this episode, Melissa dives into the "visibility disconnect" and shows you how to audit your content to ensure it truly reflects YOU. This episode covers: Why "professional"…
…
continue reading

1
Why Showing Up Everywhere Is a Myth: Strategic Visibility for Entrepreneurs - The Visible(ish) Podcast Ep.2
25:11
25:11
Play later
Play later
Lists
Like
Liked
25:11Why Showing Up Everywhere Is a Myth: Strategic Visibility for Entrepreneurs - The Visible(ish) Podcast Ep.2 Stop burning out on visibility! In this episode, visibility coach Melissa Howard busts the myth that visibility means showing up every day on every platform saying something life-changing. Instead, she shares her permission-based visibility f…
…
continue reading

1
Progress Over Perfection: Real Talk on Entrepreneurial Visibility - The Visible(ish) Podcast Ep.1
11:08
11:08
Play later
Play later
Lists
Like
Liked
11:08Progress Over Perfection: Real Talk on Entrepreneurial Visibility - The Visible(ish) Podcast Ep.1 Podcast launch offer: Get my eyeballs on your business with my Quickfire Social Audit (Pre-Podcast Launch Price) - One platform. Quickfire video audit of your content, tone, and visuals from a customer’s POV! Bargain! £49 https://ln-k.me/RJZU The Visib…
…
continue reading

1
Appetite for tracking: A feast on private data.
37:00
37:00
Play later
Play later
Lists
Like
Liked
37:00Researchers uncover a major privacy violation involving tracking scripts from Meta and Yandex. A compliance automation firm discloses a data breach. PumaBot stalks vulnerable IoT devices. The Ramnit banking trojan gets repurposed for ICS intrusions. The North Face suffers a credential stuffing attack. Kaspersky says the Black Owl team is a cyber th…
…
continue reading

1
REWIND: Staying Calm in Chaos: Tools for Foster & Adoptive Parents
23:48
23:48
Play later
Play later
Lists
Like
Liked
23:48Ever found yourself triggered by your child's meltdown, wondering how to break the cycle of dysregulation? This summer rewind episode tackles one of the most challenging aspects of foster and adoptive parenting: staying calm when everything around you is chaos. Drawing from personal experience as both a certified parent trainer and adoptive mom to …
…
continue reading
Google issues an emergency patch for a Chrome zero-day. A new malware campaign uses fake DocuSign CAPTCHA pages to trick users into installing a RAT. A high-severity Splunk vulnerability allows non-admin users to access and modify critical directories. Experts warn congress that Chinese infiltrations are preparations for war. Senators look to stren…
…
continue reading
I'm joined by Damian Carr, CEO of Eyedea MedTech Education, as we explore his mission to rapidly accelerate medtech innovation through democratized catheter design knowledge, hands-on learning experiences, and breaking down the traditional silos that slow device development. In this episode, we dive deep into: From Personal Health Crisis to Innovat…
…
continue reading
An international law enforcement operation dismantles AVCheck. Trump’s 2026 budget looks to cut over one thousand positions from CISA. Cyber Command’s defensive wing gains sub-unified command status. A critical vBulletin vulnerability is actively exploited. Acreed takes over Russian markets as credential theft kingpin. Qualcomm patches three active…
…
continue reading
The final three. Bras on heads. It’s getting close. He don’t even have his license, Lisa.By Plain Zero
…
continue reading

1
Brandon Karpf: A sailor of the 21st century. [Transitioning service member] [Career Notes]
11:27
11:27
Play later
Play later
Lists
Like
Liked
11:27Please enjoy this encore of Career Notes. Lieutenant in the US Navy and Skillbridge Fellow at the CyberWire, Brandon Karpf, knew he wanted to join the military at a young age. He achieved that through the US Naval Academy where he was a member of the men’s heavyweight rowing team. Commissioned as a cryptologic warfare officer, Brandon was sent to M…
…
continue reading

1
Triofox and the key to disaster. [Research Saturday]
22:26
22:26
Play later
Play later
Lists
Like
Liked
22:26This week, we are joined by John Hammond, Principal Security Researcher at Huntress, who is sharing his PoC and research on "CVE-2025-30406 - Critical Gladinet CentreStack & Triofox Vulnerability Exploited In The Wild." A critical 9.0 severity vulnerability (CVE-2025-30406) in Gladinet CentreStack and Triofox is being actively exploited in the wild…
…
continue reading
SentinelOne suffers a global service outage. A major DDoS attack hits a Russian internet provider. U.S. banking groups urge the SEC to scrap cybersecurity disclosure rules. Australia mandates reporting of ransomware payments. Researchers uncover a new Browser-in-the-Middle (BitM) attack targeting Safari users. A Florida health system pays over $800…
…
continue reading

1
087: Is Your Website Ready for AI Search? What Beauty & Wellness Brands Need to Know
23:29
23:29
Play later
Play later
Lists
Like
Liked
23:29In this episode, Jules White shares an honest and reassuring update on what’s really changing in the world of SEO - and what still works, especially for beauty and wellness businesses. With Google’s new AI Mode rolling out in the US, it’s easy to feel overwhelmed or behind. But instead of chasing every new trend, Jules encourages listeners to refoc…
…
continue reading

1
When "out of the box" becomes "out of control."
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08Children’s DNA in criminal databases. ASUS routers get an unwanted houseguest. New APT41 malware uses Google Calendar for command-and-control. Interlock ransomware gang deploys new Trojan. Estonia issues arrest warrant for suspect in massive pharmacy breach. The enemy within the endpoint. New England hospitals disrupted by cyberattack. Tim Starks f…
…
continue reading
The Czech Republic accuses Chinese state-backed hackers of cyber-espionage. CISA’s leaders head for the exits. Cybercriminals are using fake AI video generator websites to spread malware. A stealthy phishing campaign delivers the Remcos RAT via DBatLoader. A fake Bitdefender website spreads malware targeting financial data. Medusa ransomware claims…
…
continue reading

1
Finding Justice in a Broken Foster Care System
25:18
25:18
Play later
Play later
Lists
Like
Liked
25:18We confront the reality of injustice in foster care and explore how to effectively advocate for change without burning out or losing sight of our purpose. From recognizing that not every battle is ours to fight, to making strategic relationships within the system, these seven practical tips help foster parents navigate the broken parts of the syste…
…
continue reading
“Laundry Bear” airs dirty cyber linen in the Netherlands. AI coding agents are tricked by malicious prompts in a Github MCP vulnerability.Tenable patches critical flaws in Network Monitor on Windows. MathWorks confirms ransomware behind MATLAB outage. Feds audit NVD over vulnerability backlog. FBI warns law firms of evolving Silent Ransom Group tac…
…
continue reading

1
AWS in Orbit: Automated Satellite Management. [T-Minus Space]
22:38
22:38
Play later
Play later
Lists
Like
Liked
22:38While our team is observing Memorial Day in the United States, please enjoy this episode from our team from T-Minus Space Daily recorded recently at Space Symposium. You can learn more about AWS in Orbit at space.n2k.com/aws. Our guests on this episode are Dax Garner, CTO at Cognitive Space and Ed Meletyan, AWS Sr Solutions Architect. Remember to l…
…
continue reading

1
Hugh Thompson on Building the RSA Conference [Afternoon Cyber Tea]
37:34
37:34
Play later
Play later
Lists
Like
Liked
37:34While our team is observing Memorial Day in the United States, please enjoy this episode from the N2K CyberWire network partner, Microsoft Security. You can hear new episodes of Ann Johnson's Afternoon Cyber Tea podcast every other Tuesday. Dr. Hugh Thompson, Executive Chairman of RSA Conference and Managing Partner at Crosspoint Capital joins Ann …
…
continue reading

1
Pattie Dillon: Take the leap. [Anti-fraud] [Career Notes]
9:06
9:06
Play later
Play later
Lists
Like
Liked
9:06Please enjoy this encore of Career Notes. Product Manager in Anti-Fraud Solutions at SpyCloud, Pattie Dillon shares her journey from raising her family to specializing in the anti-fraud space. Upon reentering the workforce, Pattie worked on identity verification and developed a system with privacy concerns in mind. She moved to work in gift cards a…
…
continue reading

1
Purple teaming in the modern enterprise. [CyberWire-X]
26:30
26:30
Play later
Play later
Lists
Like
Liked
26:30In large enterprise software companies, Red and Blue Teams collaborate through Purple Teaming to proactively detect, respond to, and mitigate advanced threats. In this episode of CyberWire-X, N2K's Dave Bittner is joined by Adobe’s Justin Tiplitsky, Director of Red Team and Ivan Koshkin, Senior Detection Engineer to discuss how their teams work tog…
…
continue reading

1
Pandas with a purpose. [Research Saturday]
20:20
20:20
Play later
Play later
Lists
Like
Liked
20:20This week, we are joined by Deepen Desai, Zscaler's Chief Security Officer and EVP of Cyber and AI Engineering, taking a dive deep into Mustang Panda’s latest campaign. Zscaler ThreatLabz uncovered new tools used by Mustang Panda, including the backdoors TONEINS, TONESHELL, PUBLOAD, and the proxy tool StarLoader, all delivered via phishing. They al…
…
continue reading
Operation Endgame dismantles cybercriminal infrastructure. DOGE’s use of the Grok AI chatbot raises ethical and privacy concerns. Malware on the npm registry uses malicious packages to quietly gather intelligence on developer environments. Researchers link Careto malware to the Spanish government. Exploring proactive operations via letters of marqu…
…
continue reading

1
086: Website Quick Wins for Better Visibility and Usability: Productivity Coach Natalie Ford SEO AUDIT EPISODE
40:42
40:42
Play later
Play later
Lists
Like
Liked
40:42In this episode, Jules White dives into a live website and SEO audit with productivity and lifestyle coach Natalie Ford — revealing the simple fixes and overlooked opportunities that could transform her website. If your website is more of a “digital brochure” than a working part of your business, you’ll want to listen in. Jules shares bite-sized ad…
…
continue reading
A joint operation takes down Lumma infrastructure. The FTC finalizes a security settlement with GoDaddy. The Telemessage breach compromised far more U.S. officials than initially known. Twin hackers allegedly breach a major federal software provider from the inside. U.S. telecom providers fail to notify the Senate when law enforcement agencies requ…
…
continue reading

1
Messy, Divorced & Finally Free (from Mormonism too)
1:10:46
1:10:46
Play later
Play later
Lists
Like
Liked
1:10:46Cindy and Carly are talking the D-word. DIVORCE. We discuss a bit about our own divorces, what we thought about divorce pre faith crises, how Mormons view divorce, what it's like telling family and friends, how we navigated the challenges, what we're loving post divorce life and so much more. Please give us a follow over at @messy_genes on Instagra…
…
continue reading
A joint advisory warns of Fancy Bear targeting Western logistics and technology firms. A nonprofit hospital network in Ohio suffers a disruptive ransomware attack. The Consumer Financial Protection Bureau (CFPB) drops plans to subject data brokers to tighter regulations. KrebsOnSecurity and Google block a record breaking DDoS attack. A phishing cam…
…
continue reading