Formerly known as Intelligence Matters, the NatSec Matters podcast features former senior national security officials Michael Allen, Jeremy Bash, and Andrew Shapiro as they interview top leaders in national security, including intelligence officers, military leaders, and policymakers, on the most critical security challenges of our time. Their interviews offer insights into the world’s most pressing problems and assess the effectiveness of U.S. policy responses. They also explore the biograp ...
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Buck Sexton breaks down the latest headlines with a fresh and honest perspective! He speaks truth to power, and cuts through the liberal nonsense coming from the mainstream media. Interact with Buck by emailing him at [email protected]
…
continue reading
A show about the technology, strategy, media and business trends defining the future of national security.
…
continue reading
Join author, actor, and funny lady Robin Hopkins as she helps guests manage stress, set some boundaries, find a new apartment, and save a dime or two. And that’s important because social security is probably gonna be gone by the time you get there. Robin’s disarming, connected, and forthcoming style allows her guests to open up about what’s really behind all that self-sabotaging. Well…Adjusting is not NPR. It’s not credentialed. But it is honest talk about real problems Gen Z’ers and Millenn ...
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
Battle Lines is The Telegraph’s foreign policy, geopolitics and global conflict podcast. It offers expert analysis and on-the-ground reporting everywhere from China and the United States to the Middle East and Europe. Twice a week, veteran foreign correspondents Roland Oliphant and Venetia Rainey bring you on-the-ground dispatches from the world’s most volatile regions and informed analysis from world-class experts. Whether it’s the Russia-Ukraine war, the Israel-Gaza conflict, Chinese aggre ...
…
continue reading
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
…
continue reading
Tune in for lively, insightful discussion of topics important to the mainframe community, from DevOps to security and staffing. 2020 & 2024 winner of the DevOps Dozen Award for Best DevOps-Related Podcast Series.
…
continue reading
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
…
continue reading
Security Nation Podcast is hosted by ESA, and it brings the voice of the electronic security and life safety industry to you! Host Hannah Boone brings on security pros to discuss best practices, real-life experiences, industry forecasts, and more on this monthly podcast. It's the ever-present voice in an ever-changing industry.
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
If Between Two Ferns and C-SPAN had a child, it would be All Quiet on the Second Front. Blending the very best (and the worst) of government gravitas with technical expertise, Second Front’s Chief Executive Officer, Tyler Sweatt, cuts through the noise and the bureaucratic BS surrounding all things defense tech, national security, and government markets. Be warned: this is not your typical military or government podcast. As host, Tyler has an uncanny ability to get people to talk honestly, m ...
…
continue reading
The Financial Answer is hosted by Nathan O’ Bryant, founder of O’Bryant & Associates, Inc., an investment advisory firm registered in Tennessee and Arkansas. Drawing on over 20 years of experience in financial planning, Nathan shares insights on a wide range of topics including retirement income strategies, tax planning, market trends, Social Security, portfolio management, and more. The show explores the real questions people face when planning for their financial future, offering clear exp ...
…
continue reading

1
The Cyber Go-To-Market podcast for cybersecurity sales and marketing teams. Save Cybr Donut!
Andrew Monaghan
The podcast for sales and marketing teams that tackles the question: How can Cybr Donut grow ARR to $10m by the end of 2025? We talk with cybersecurity CROs, CMOs, CEOs, as well as sales and marketing experts in our movement to Save Cybr Donut. Listen in, and you will get proven strategies to - help you get more leads - win more customers, and, - create your killer go-to-market growth engine. If you are a seller, marketer, leader, CEO, or founder at a cybersecurity company, you are in the ri ...
…
continue reading
Here's what you need to know: this show is different. The Technology Boardroom is your access-all-areas pass to one of Microsoft's leading partners in the UK, a roster of tech experts bringing you technical expertise, roundtable debates and strategic industry advice. Each episode will break down the latest tech developments and trends, ranging from AI and cyber security to sustainability and professional development. A real tech enthusiast? A decision-maker responsible for thousands of emplo ...
…
continue reading
Church Safety and Security Best Practices! Join Dr. James McGarvey and Michael Scully, the Church Safety Guys, as they talk about relevant church and place of worship safety and security practices. Exploring best practices and keeping ministry focus first, they weekly talk to authors, trainers, and leadership/ministry experts to provide insight into this growing ministry for places of worship. Additional resources and information at ChurchSafetyGuys.com [email protected]
…
continue reading
A look at issues affecting the bank and insurance securities community
…
continue reading
The Disruptive Successor Show is a podcast for next-generation leaders in family businesses and entrepreneurs who want to disrupt the status quo to grow their business and take it to the next level. We all know that what got us here isn’t going to get us there. If you are taking control over your family’s business or trying to get your business to the next level, you will need inspiration, advice and resources to help you create a massive impact. Listeners of my show include not only the mil ...
…
continue reading
Three experts, one Story. Each fortnight we host a panel of international experts diving into the biggest geopolitical stories shaping the news both here and overseas. Hosted by Michael Hilliard
…
continue reading
Discussions over drinks with security, defense, and foreign policy insiders and experts. The original War on the Rocks podcast series.
…
continue reading
Darren Pulsipher, Chief Solution Architect for Public Sector at Intel, investigates effective change leveraging people, process, and technology. Which digital trends are a flash in the pan—and which will form the foundations of lasting change? With in-depth discussion and expert interviews, Embracing Digital Transformation finds the signal in the noise of the digital revolution. People Workers are at the heart of many of today’s biggest digital transformation projects. Learn how to transform ...
…
continue reading
The real events of the world are out there, but it all depends on who you listen to. Human Events with Jack Posobiec brings you unfiltered and factual updates on how current events will impact our country today and in the future. This show is breaking the news that the biased mainstream media can't handle.
…
continue reading
SecurityGen
…
continue reading
Descoped: The Payments Security Podcast is the go-to show from VGS for fintech product builders and leaders. You’ll hear a conversations from experts in payments, issuing, and data security sharing their best practices & real-world experiences.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Power Problems is a bi-weekly podcast from the Cato Institute. Host John Glaser offers a skeptical take on U.S. foreign policy, and discusses today’s big questions in international security with distinguished guests from across the political spectrum. Podcast Hashtag: #FPPowerProblems. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading

1
The Transaction
Craig Rosenberg & Matt Amundson | B2B Sales & Marketing Experts - Hosts of The Transaction
Welcome to The Transaction. The #1 Go-To-Market podcast on the planet. Hosts Craig Rosenberg and Matt Amundson, two legendary go-to-market leaders in their own right, talk weekly with the best sales, marketing, operations, and product leaders in the B2B SaaS world to understand what's working in the new playbook of the post-ZIRP market. But Craig, Matt, and their guests don't just talk theoretically, they share the stories and actionable tips, tactics, and strategies behind what's driving re ...
…
continue reading
Two college radio DJs during the 90s, hosts Keith and Steve helped expose bands like Nirvana, Pavement and PJ Harvey. They went to shows, interviewed musicians and reviewed albums for various zines and papers. They worked security at concerts and once, even did load-in for Phish. Now they’re dads. Whether you want to explore lesser-known music or take a trip down memory lane, tune in to The New Dad Rock. Join hosts Keith and Steve as they navigate the ages together, sharing their love of mus ...
…
continue reading
Australian millennials are the first generation to be worse off than their parents – and things are only heading in the same direction for Gen Z. Jane Lee and Matilda Boseley investigate “who screwed young Australians” and examine why inequality is rising in Australia
…
continue reading
A podcast made by people who love running Linux.
…
continue reading
Small changes, made over time, can produce significant results. Much like a high performance engine, or an entire orchestra, when even a small part is not doing what it is supposed to do, everything suffers. And the same is true of your finances. This show is dedicated to the small things that make a significant difference.
…
continue reading
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, venture capital, and business trends, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Send feedback and show ideas to [email protected]. Each discussion delves into the intersection of technology advancement, market dynamics, and the founder journey, offe ...
…
continue reading
Crystal Orderson brings news from the continent.
…
continue reading
This is Aglowid's podcast, please have fun listening and give feedback :) Aglowid is a trusted Web & Mobile App Development Company with a motto of turning clients into successful businesses. We provide next-gen IT solutions, incorporating research-based insights for enhancing the customer-brand relationship.
…
continue reading
Welcome to NucleCast, the official podcast of the ANWA Deterrence Center. NucleCast is an engaging, educational podcast featuring a series of discussions and interviews with experts in nuclear policy, technology, and deterrence. The show is hosted by Dr. Adam Lowther, Strategic Advisor to the ANWA Deterrence Center and an expert on nuclear deterrence.
…
continue reading
The AI CEO Podcast Host: Seema Alexander, Co-founder & President of Virgent AI | Co-Chair, DC Startup & Tech Week AI isn’t just another tool—it’s the next frontier of business. The AI CEO Podcast explores the intersection of AI, business strategy, and leadership, equipping CEOs, founders, and executives with the insights they need to navigate and leverage AI effectively. Hosted by Seema Alexander, Co-founder & President of Virgent AI—a company specializing in AI-powered solutions and AI agen ...
…
continue reading
ITProToday.com is a leading online source of daily news, analysis and how-to’s about the information technology industry. We help IT professionals and technology stakeholders learn about, assess and manage the acquisition of next-gen technology that drives business innovation, including — but not limited to — analytics, artificial intelligence/machine learning, cloud computing, compute engines, containers, data center operations, edge computing, hyper-converged infrastructure, the mobile-fir ...
…
continue reading
You have been on quite the journey already, haven’t you prophet? What? Did you think you were the only one? Training prophets since 1999 Apostles Craig and Colette Toach have seen all the patterns and quirks that make up the Lord’s prophet. Never fitting in, passionately loving Jesus, and always saying the wrong thing... you are in good company. Everything changes from here prophet! The moment you push play to listen to this podcast, your whole world will be flipped upside down as you discov ...
…
continue reading

1
Exclusive Interview w/ Gen. Flynn LIVE From the Global Security and Diplomacy Conference
53:27
53:27
Play later
Play later
Lists
Like
Liked
53:27Here’s your Daily dose of Human Events with @JackPosobiec Go to https://hometitlelock.com/poso and use promo code POSO to get a FREE title history report so you can find out if you’re already a victim AND 14 days of protection for FREE! And make sure to check out the Million Dollar TripleLock protection details when you get there! Exclusions apply.…
…
continue reading

1
Cracking eSIM: Exposing the Hidden Threats in Next-Gen Mobile Security
16:43
16:43
Play later
Play later
Lists
Like
Liked
16:43eSIM technology has transformed the way we connect—but has it also introduced new vulnerabilities into the heart of modern telecommunications? In this deep-dive episode, we dissect the security architecture, remote provisioning systems, and critical attack surfaces of embedded SIM (eSIM) technology, now deployed in billions of mobile, consumer, and…
…
continue reading

1
The Africa Report: Ghana now plans crypto licensing
3:58
3:58
Play later
Play later
Lists
Like
Liked
3:58Bongani Bingwa speaks to Crystal Orderson about Ghana's central bank is taking steps to regulate the cryptocurrency industry by licensing platforms to track digital asset transactions. 702 Breakfast with Bongani Bingwa is broadcast on 702, a Johannesburg based talk radio station. Bongani makes sense of the news, interviews the key newsmakers of the…
…
continue reading

1
China’s military: Its three major flaws and how Xi is trying to fix them
22:04
22:04
Play later
Play later
Lists
Like
Liked
22:04China’s military is not a real army - it’s the armed wing of the Chinese Communist Party. Ideology is paramount and corruption is endemic. Plus, the People’s Liberation Army hasn’t fought a war since 1979. Xi Jinping calls it “the peace disease”. In episode two of this three-part series, Venetia Rainey looks at the PLA’s weaknesses and how the Chin…
…
continue reading
Grocery prices are high. Use ChatGPT to find rip-offs, stack coupons, and save big! Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
1.1 Million Private Messages Leaked: Inside the Tea App Privacy Disaster
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58A platform designed to protect women’s safety in dating has instead become a nightmare for its users. In this episode, we uncover the catastrophic Tea app data breach, which exposed more than 59 GB of highly sensitive user data due to a fundamental security failure: a completely public Firebase storage bucket with no authentication, no encryption, …
…
continue reading
Wesley Beary of Anchor speaks with host Sam Taggart about designing APIs with a particular emphasis on user experience. Wesley discusses what it means to be an “API connoisseur”— paying attention to what makes the APIs we consume enjoyable or frustrating and then taking those lessons and using them when we design our own APIs. Wesley and Sam also e…
…
continue reading

1
Trump’s 10-Day Ultimatum to Russia and Maxwell’s Immunity Demands For Testimony
48:06
48:06
Play later
Play later
Lists
Like
Liked
48:06Here’s your Daily dose of Human Events with @JackPosobiec The only thing worse than getting hacked is knowing you could have stopped it and didn’t take action when you could have. So go to https://www.PATRIOT-PROTECT.COM/POSO and use promo code Poso for 15% off a yearly subscription. Support the show…
…
continue reading

1
Job Scams, Corporate Espionage, and Digital Deception: Inside the Deepfake Crisis
1:16:30
1:16:30
Play later
Play later
Lists
Like
Liked
1:16:30Deepfake technology has evolved from a fringe novelty into one of the most serious cybersecurity and national security threats of our time. In this episode, we examine how artificial intelligence–generated synthetic media is being weaponized to impersonate CEOs, manipulate elections, infiltrate corporate networks, and damage reputations worldwide. …
…
continue reading
In this captivating episode of "Embracing Digital Transformation," hosted by Dr. Darren Pulsipher, we dive deep into the world of IoT and its complexities with industry expert Lee. Lee, whose insights are deeply rooted in his dissertation on edge security, discusses the challenges faced in integrating IoT solutions in enterprise environments. Key t…
…
continue reading

1
Microsoft Exposes Major macOS Flaws in Transparency, Consent, and Control
1:23:13
1:23:13
Play later
Play later
Lists
Like
Liked
1:23:13In this episode, we dive deep into Microsoft Threat Intelligence’s latest findings on two critical macOS vulnerabilities that shook Apple’s privacy defenses. The flaws, identified as CVE-2025-31199 (Sploitlight) and CVE-2024-44133 (HM Surf), specifically targeted Apple’s Transparency, Consent, and Control (TCC) framework, the system designed to gua…
…
continue reading

1
Aeroflot in Chaos: How Hackers Crippled Russia’s Flagship Airline
24:25
24:25
Play later
Play later
Lists
Like
Liked
24:25On July 28, 2025, Aeroflot—Russia’s largest state-owned airline—was brought to its knees in one of the most severe cyberattacks since the country’s invasion of Ukraine in 2022. The sophisticated assault, carried out by Ukrainian hacktivist group Silent Crow and the Belarusian Cyber-Partisans, led to the cancellation of more than 100 flights, strand…
…
continue reading

1
Keep People At The Center of it All with Mishi Choudhary Part 2 Rerun
34:25
34:25
Play later
Play later
Lists
Like
Liked
34:25Joining the podcast this week is Mishi Choudhary, SVP and General Counsel at Virtru. Mishi shares with us some legal perspective on the privacy discussion including freedom of thought, the right to be forgotten, end-to-end encryption for protecting user data, finding a middle ground between meeting customer privacy demands and complying with legal …
…
continue reading

1
98. Noam Oz, Former Director of Innovation Operations at NavalX
29:04
29:04
Play later
Play later
Lists
Like
Liked
29:04What does it really take to get disruptive tech to the fleet? In this episode, Tyler is joined by Noam Oz—former Director of Innovation Operations at NavalX and now Navy Portfolio Lead at Divergent—to unpack what’s working, what’s broken, and what’s changing across the national security ecosystem. Noam brings hard-earned insights from both sides of…
…
continue reading
The internet’s a powerful tool but it’s still just that: a tool. We get to choose how we use it. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
Pranay Vaddi: Inside the National Security Council, Policy and Arms Control
40:24
40:24
Play later
Play later
Lists
Like
Liked
40:24In this episode, Adam interviews Pranay Vaddi, who shares his experiences working at the National Security Council (NSC) and his insights into nuclear policy and arms control. Vaddi discusses the daily operations at the NSC, the challenges of elevating nuclear issues within the government, and the importance of collaboration among various agencies.…
…
continue reading
Robin and Producer Steph sip cocktails en vacances and unpack the emotional chaos of travel. From staying tethered to your phone, to navigating group trips with different travel styles, to figuring out how the hell you’re supposed to relax when your brain forgot how. Stick around ‘til the end for our Expert of the Day, travel writer Annie Roderique…
…
continue reading

1
Neferpitou Claims Cyberattack on French Naval Defense Giant
44:17
44:17
Play later
Play later
Lists
Like
Liked
44:17French defense contractor Naval Group, a cornerstone of Europe’s naval defense industry, is facing a high-stakes cybersecurity crisis. A threat actor known as “Neferpitou” claims to have exfiltrated 1TB of sensitive data, including combat management system (CMS) source code for submarines and frigates, technical documents, developer virtual machine…
…
continue reading
Scammers post fake jobs to steal your personal info. Here’s how to spot them and protect yourself before you apply. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
Root Evidence Launches With $12.5M to Redefine Vulnerability Management
36:51
36:51
Play later
Play later
Lists
Like
Liked
36:51In July 2025, a team of seasoned cybersecurity leaders launched Root Evidence, a Boise-based startup with a mission to revolutionize how organizations tackle vulnerability management. Armed with $12.5 million in seed funding led by Ballistic Ventures, founders Jeremiah Grossman, Robert Hansen, Heather Konold, and Lex Arquette are setting out to fix…
…
continue reading

1
TRIBE-ON-TRIBE VIOLENCE: Chaos Erupts In Cincinnati & New Deadline For Russia Ceasefire
48:05
48:05
Play later
Play later
Lists
Like
Liked
48:05Here’s your Daily dose of Human Events with @JackPosobiec Go to https://www.patriotmobile.com/poso/ or call 972-PATRIOT and get a FREE MONTH of service with promo code POSO. Support the showBy Human Events with Jack Posobiec
…
continue reading

1
NASCAR Hit by Medusa Ransomware: 1TB of Data Stolen in April 2025 Cyberattack
41:21
41:21
Play later
Play later
Lists
Like
Liked
41:21In April 2025, NASCAR became the latest victim of a major cyberattack, with hackers infiltrating its network between March 31 and April 3. During the breach, personal information—including names and Social Security numbers—was exfiltrated from NASCAR’s systems. In response, the organization has notified affected individuals, activated its incident …
…
continue reading

1
Scattered Spider Strikes Again: Inside the VMware ESXi Ransomware Tactics
55:59
55:59
Play later
Play later
Lists
Like
Liked
55:59In this episode, we examine the sophisticated operations of Scattered Spider—also known as Muddled Libra, UNC3944, and Octo Tempest—a financially motivated cybercriminal group that has redefined the ransomware threat landscape. Recently highlighted by Google’s Threat Intelligence Group (GTIG), Scattered Spider has escalated its attacks by targeting…
…
continue reading
A see-through screen can’t hide the truth: Apple’s AI is still way behind Android’s Gemini. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
429: Open Source AI, End of Clear Linux, & the Security Scoop with Sandfly
1:14:49
1:14:49
Play later
Play later
Lists
Like
Liked
1:14:49video: https://youtu.be/abgTchtrH0k On this episode of Destination Linux, we are joined by security expert Craig Rowland returns for the “Sandfly Security Scoop,” explaining how the stealthy BPFdoor back‑door evades firewalls and sharing tips for DEF CON and Black Hat attendees. We also unpack listener feedback about phone‑addiction myths and mindf…
…
continue reading

1
China's military: How it went from obsolete to world-class
24:03
24:03
Play later
Play later
Lists
Like
Liked
24:03Dive into the strengths and weaknesses of China’s military and its remarkable transformation over the last few decades from obsolete to world-class in a new special series on Battle Lines. How significant is China’s military buildup? What does Xi Jinping’s ongoing purge mean for the People’s Liberation Army? And how likely is an invasion of Taiwan …
…
continue reading
Your phone could give you a life-saving heads-up before an earthquake hits. Here’s how Android and iPhone users can stay safe. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
That magic number? It started as a marketing ploy. A massive study found when the real benefits kick in. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
Non-refundable travel plans don’t have to mean lost money. These sites let you recoup some of the cost. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
FOR ALL THE NEWS, ZERO STATIC, SUBSCRIBE TO HUMAN EVENTS WITH JACK POSOBIEC HERE: • Twitter ► https://twitter.com/humaneventslive • Rumble ► https://rumble.com/user/JackPosobiec • Tiktok► https://tiktok.com/humaneventslive • Instagram ► https://www.instagram.com/humaneventslive/ Support the showBy Human Events with Jack Posobiec
…
continue reading
Doubling the length of Prime Day backfired. While Amazon expected bigger profits, shoppers used the extra time to comparison shop. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
THOUGHTCRIME Ep. 92 — Bring Redskins Back? What Makes An American?
59:56
59:56
Play later
Play later
Lists
Like
Liked
59:56Charlie, Jack, Andrew and Blake look back on the life of American icon Hulk Hogan, and also ask: -Should America bring back the Washington Redskins, Cleveland Indians, and other names lost in the great madness of 2020? -What actually makes a person American, and can one person be more American than another? Support the show…
…
continue reading
Always forgetting things? Use your phone’s GPS to set location-based reminders that pop up right when you need them. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
Koske Malware Hides in Panda Images, Weaponizes AI to Target Linux
44:03
44:03
Play later
Play later
Lists
Like
Liked
44:03A new and highly sophisticated malware strain named Koske is redefining the threat landscape for Linux environments. Suspected to be partially developed using artificial intelligence, Koske introduces novel and highly evasive techniques, blending image files, rootkits, and adaptive cryptomining logic to create a stealthy and persistent backdoor int…
…
continue reading

1
The Latest on Epstein, The OKC Bombing Revisited and The Passing of Hulk Hogan
48:23
48:23
Play later
Play later
Lists
Like
Liked
48:23Here’s your Daily dose of Human Events with @JackPosobiec The only thing worse than getting hacked is knowing you could have stopped it and didn’t take action when you could have. So go to https://www.PATRIOT-PROTECT.COM/POSO and use promo code Poso for 15% off a yearly subscription. Right now, for their Christmas in July event, they’re including o…
…
continue reading

1
Operation Checkmate: BlackSuit Ransomware’s Dark Web Sites Seized
39:19
39:19
Play later
Play later
Lists
Like
Liked
39:19BlackSuit, the ransomware strain known for crippling critical sectors and demanding multi-million dollar payouts, has just suffered a devastating blow. In a coordinated international law enforcement operation codenamed "Operation Checkmate," authorities—including the U.S. Department of Justice, Homeland Security Investigations, FBI, Europol, the UK…
…
continue reading

1
Coyote Malware Exploits Microsoft UI Automation in First-Ever Wild Attack
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14A new banking trojan called Coyote has emerged as a groundbreaking cyber threat, becoming the first known malware in the wild to exploit Microsoft’s User Interface Automation (UIA) framework—an accessibility tool originally designed to help users interact with Windows interfaces. But in the hands of attackers, UIA becomes a weapon of stealth and pr…
…
continue reading

1
No Fix Coming: Remote Code Execution Flaw in 1,300 LG Security Cameras
31:12
31:12
Play later
Play later
Lists
Like
Liked
31:12A newly disclosed critical vulnerability, CVE-2025-7742, is putting hundreds of LG Innotek LNV5110R security cameras at risk around the world—including within critical infrastructure. This high-severity authentication bypass flaw allows remote attackers to gain full administrative control without credentials, giving them access to live camera feeds…
…
continue reading