T Bidness public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
Divided

The Advertiser

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
2020 marks 30 years since Port Adelaide made a bid to join the AFL. After a bitter court battle between the SANFL and Port Adelaide, the Adelaide Crows were created and entered the AFL in 1991. Divided is a podcast series chatting to some of the key playmakers behind the creation of the Crows.
  continue reading
 
Artwork

1
Open4Bidness

T-Bidness

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We're Open4Bidness as T-Bidness is getting back in the stand up game that he was never really part of. The problem, he doesn't know if he's very good. Joined by guests from the Better Bidness Bureau, pitching jokes, stories and bad ideas, taking these concepts to a Chicago open mic followed by a full break down just how good, or likely bad, the set goes. Here we go... [email protected], Open4Bidness.Biz, @TBidness (Twitter/Insta)
  continue reading
 
Artwork

1
Producers' Happy Hour

Lawrence T. Lewis & Christian Kendrick

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Shattering the status quo of the commercial and film production industry one cocktail at a time. Tailored for Exec Producers, Line Producers, Agency Producers, Bidders, and Production Teams, our podcast serves as the ultimate destination for continuous learning throughout your career. Bid farewell to industry isolation and gatekeeping; we're forging a collective path through the challenges of production, united in our pursuit of producing excellence. Join us for in-depth discussions on the n ...
  continue reading
 
Hello, Im Thomas FreeMe and this is The Thomas FreeMe Show. Spending most of my life in and out of prison I finally came home from doing a 13 year Federal Bid for Conspiracy to traffic 5 kilos or more of cocaine. Facing a life sentence, a new born baby on the line, I chose to take the Federal Government to trial. I share this story and many more plus the stories of American Citizens from all over this Nation. Now a founder of a non-profit and a fast growing podcast I am trying to give us the ...
  continue reading
 
In 2006 Richard Hammond broke his brain. The high-speed jet-powered car he was piloting crashed at 319mph… and the thing that stopped the car from rolling? That was his head. Richard’s been on a journey of self-discovery and personal growth ever since, and now, he’s on a mission to demystify and destigmatise conversations around masculinity, mental health, and the issues that affect us all, in a bid to discover who we are now. Joined by his co-pilot and grown-up daughter Izzy, they’ll dive i ...
  continue reading
 
Artwork

1
Real Estate Finder

Matthew Maschler

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to the Real Estate Finder Podcast! I'm Matthew Maschler, the Real Estate Finder. And on this show, we will share my passion and knowledge of real estate. I'm a real estate broker with the Signature Real Estate Companies, and we sell Florida real estate here in Palm Beach County - where I live - Broward, Miami, the West Coast, Naples through Sarasota, and Central Florida - where we sell real estate in Orlando and near Disney World. Joining me each episode will be agents from my office ...
  continue reading
 
Loading …
show series
 
In one of the latest large-scale data breaches to hit the U.S. private sector, Kelly Benefits, a provider of payroll and benefits administration services, disclosed a significant cybersecurity incident impacting over 553,000 individuals. The breach, which occurred in December 2024 but was only revealed in April 2025, exposed sensitive personal info…
  continue reading
 
Welcome to The Big Orange, Boca Raton!!! www.TheBigOrange.org Boca Raton is always open to welcome our friends from “Northern” states and this year is no exception. Whether it is snow storms, high taxes, government over reach or whatever is going on with the Mayor of New York City, Florida is here to offer you sunshine, low taxes, a welcoming busin…
  continue reading
 
A newly disclosed exploit dubbed FileFix is redefining how attackers bypass Microsoft Windows' built-in security protections—specifically the Mark-of-the-Web (MotW) mechanism. Developed and detailed by security researcher mr.d0x, this attack takes advantage of how browsers save HTML files and how Windows handles HTA (HTML Application) files. The re…
  continue reading
 
The International Criminal Court (ICC), the world’s foremost tribunal for prosecuting war crimes, genocide, and crimes against humanity, has confirmed yet another sophisticated cyberattack, highlighting the persistent threat facing high-profile global institutions. This marks the second targeted intrusion against the ICC in recent years, and althou…
  continue reading
 
In a major red flag for the industrial cybersecurity community, three newly disclosed vulnerabilities in Microsens NMP Web+, a popular network management solution used across critical infrastructure, have revealed just how fragile many ICS environments remain. The flaws—two rated critical and one high—allow unauthenticated attackers to bypass authe…
  continue reading
 
In a stark reminder of the aviation industry's growing exposure to cyber threats, Australian airline Qantas recently confirmed a serious data breach—this time not from its own systems, but from a third-party platform used by one of its customer contact centers. The breach exposed personal data for up to six million customers, including names, dates…
  continue reading
 
Germany’s battle over digital sovereignty and data privacy has intensified, with the Berlin Commissioner for Data Protection formally requesting that Google and Apple remove the DeepSeek AI application from their app stores. The move stems from allegations that DeepSeek, a Chinese-developed generative AI platform, violates the EU’s General Data Pro…
  continue reading
 
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added multiple Citrix NetScaler vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog—an urgent signal for federal agencies and private enterprises alike. At the center of this update is CVE-2025-6543, a memory overflow flaw affecting NetScaler ADC and Gateway appli…
  continue reading
 
Cato Networks just raised $359 million in Series G funding, pushing its valuation past $4.8 billion and its total funding beyond the $1 billion mark—a milestone that cements its place as one of the most formidable players in the rapidly expanding Secure Access Service Edge (SASE) market. In this episode, we unpack what this massive investment means…
  continue reading
 
A new high-severity zero-day vulnerability in Google Chrome—CVE-2025-6554—has sent shockwaves across the cybersecurity landscape. This episode dives into the technical details, real-world impact, and broader implications of this actively exploited flaw. Tracked as a type confusion bug in Chrome’s V8 JavaScript engine, the vulnerability allows attac…
  continue reading
 
Russia has entered a new phase of digital authoritarianism. In a sweeping move, Russian Internet Service Providers (ISPs) have begun systematically throttling access to Cloudflare and other Western-backed services, including infrastructure giants Hetzner and DigitalOcean. This throttling is so severe that it restricts downloads to just 16 kilobytes…
  continue reading
 
Ahold Delhaize, one of the world’s largest food retailers, is now the subject of one of the most significant ransomware breaches in recent U.S. history. Affecting over 2.2 million current and former employees, this incident—claimed by the cybercrime group INC Ransom—highlights the rising threat posed by ransomware-as-a-service operations targeting …
  continue reading
 
Canada has taken a definitive stance in the escalating global scrutiny of Chinese technology, ordering surveillance giant Hikvision to cease all operations within its borders. Citing national security concerns and acting on the advice of intelligence agencies, the Canadian government has banned the use of Hikvision products across its public sector…
  continue reading
 
As the aviation industry becomes more digitally interconnected, its exposure to sophisticated cyber threats continues to grow. One of the most dangerous actors in this space—Scattered Spider, a financially motivated and technically skilled cybercrime group—has recently shifted its focus to target the aviation sector. With recent incidents involving…
  continue reading
 
In this episode, Alisa interviews Dr. Felix Cowan about his new book, The Kopeck Press Popular Journalism in Revolutionary Russia, 1908–1918 (University of Toronto Press, 2025). The Imperial Russian penny press was a vast network of newspapers sold for a single kopeck per issue. Emerging in cities and towns across the empire between the 1905 Revolu…
  continue reading
 
What would it feel like To Run the World? The Soviet rulers spent the Cold War trying desperately to find out. In To Run The World: The Kremlin’s Cold War Bid for Global Power, Sergey Radchenko provides an unprecedented deep dive into the psychology of the Kremlin's decision-making. He reveals how the Soviet struggle with the United States and Chin…
  continue reading
 
Elana Gomel is a former senior lecturer in the Department of English and American Studies at Tel Aviv University, where she also served as department chair for two years. This book investigates the Russian community in Israel, analyzing the narratives through which Russian Jewry defines itself and linking them to the legacy of Soviet history. Gomel…
  continue reading
 
The history of Tanzimat in the Ottoman Empire has largely been narrated as a unique period of equality, reform, and progress, often framing it as the backdrop to modern Turkey. Inspired by Walter Benjamin's exhortation to study the oppressed to understand the rule and the ruler, Talin Suciyan reexamines this era from the perspective of the Armenian…
  continue reading
 
In this volume, leading specialists examine the affinities and differences between the pan-Soviet famine of 1931–1933, the Ukrainian Holodomor, the Kazakh great hunger, and the famine in China in 1959–1961. The contributors presented papers at a conference organized by the Holodomor Research and Education Consortium in 2014. Learn more about your a…
  continue reading
 
In a landmark case that reshapes the conversation around digital ethics, the Federal Trade Commission’s $520 million settlement with Epic Games over its Fortnite monetization tactics highlights a critical issue facing the modern digital economy: the weaponization of interface design to manipulate users. Central to the case is the use of “dark patte…
  continue reading
 
Phishing has long been a favored weapon of cybercriminals, but a recent revelation about Microsoft 365’s Direct Send feature has elevated the threat to a new level—from inside the firewall. Designed for internal systems to send notifications without authentication, Direct Send can be abused by malicious actors to spoof emails that appear to origina…
  continue reading
 
A critical flaw in the Open VSX Registry—an open-source alternative to the Visual Studio Code Marketplace—recently put over 8 million developers at risk of mass compromise. This vulnerability, discovered in the platform’s GitHub Actions workflow, exposed a super-admin publishing token that could have enabled malicious actors to overwrite or inject …
  continue reading
 
A new critical vulnerability in Citrix NetScaler ADC and Gateway systems, dubbed CitrixBleed 2 (CVE-2025-5777), has emerged as a serious threat to remote access infrastructure. This memory exposure flaw allows unauthenticated attackers to extract session tokens directly from device memory — enabling session hijacking and even bypassing multi-factor…
  continue reading
 
Dr. Antonio J. Muñoz's Hitler’s War Against the Partisans During The Stalingrad Offensive: Spring 1942 to the Spring of 1943 (Frontline Books, 2025) explores the brutal and widespread partisan warfare on the Eastern Front during 1942-1943, detailing the Axis forces' anti-partisan efforts and the impact on the Soviet war effort. From the start of th…
  continue reading
 
A sophisticated cyber-espionage campaign named OneClik is actively targeting energy, oil, and gas organizations using a combination of legitimate cloud infrastructure and novel attack techniques. The campaign, attributed to an unknown but likely state-affiliated actor, leverages Microsoft's ClickOnce deployment technology to deliver custom Golang-b…
  continue reading
 
In October 2024, Central Kentucky Radiology (CKR), a Lexington-based imaging provider, became the latest victim of a growing trend in healthcare cyberattacks. An unauthorized actor accessed CKR’s systems over a two-day period, compromising sensitive data for approximately 167,000 individuals. The stolen information includes names, Social Security n…
  continue reading
 
The Florida Panthers have done it again—Stanley Cup champions for the second year in a row! In this special, emotion-packed episode, we dive into the energy and excitement of the Panthers’ victory and what it means for South Florida- including real estate. From season ticket dreams and unforgettable games to rain-soaked parades and tax debates with…
  continue reading
 
In a major development at the intersection of cybersecurity and AI governance, Israeli startup Bonfy.AI has officially launched its adaptive content security platform, backed by $9.5 million in seed funding. The company’s mission is bold and timely: to secure content generated by both humans and AI across modern SaaS ecosystems — including high-ris…
  continue reading
 
Cisco has disclosed two critical security vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) products, both earning a maximum CVSS severity score of 10.0. These flaws—CVE-2025-20281 and CVE-2025-20282—allow unauthenticated remote attackers to execute arbitrary commands on the underlying operating syst…
  continue reading
 
Stalin's Gulag at War: Forced Labour, Mass Death, and Soviet Victory in the Second World War (University of Toronto Press, 2018) places the Gulag within the story of the regional wartime mobilization of Western Siberia during the Second World War. The author explores a diverse array of issues, including mass death, informal practices, and the respo…
  continue reading
 
The U.S. House of Representatives has officially banned the use of WhatsApp on all House-managed devices, citing significant data security risks. This move places WhatsApp alongside other restricted applications like TikTok, ChatGPT, and Microsoft Copilot, reflecting an intensifying government focus on digital security and the reliability of consum…
  continue reading
 
The healthcare industry is facing a relentless wave of cyber threats, as demonstrated by two recent breaches impacting Mainline Health Systems and Select Medical Holdings. In April 2024, Mainline Health experienced a direct ransomware attack by the Inc Ransom group, compromising sensitive data for over 101,000 individuals. Select Medical’s breach, …
  continue reading
 
This episode examines a serious conflict between Siemens’ Simatic PCS industrial control systems and Microsoft Defender Antivirus. The absence of an "alert only" mode in Defender has created a significant operational risk for plants running Siemens’ systems. Without this functionality, operators must choose between ignoring potential malware detect…
  continue reading
 
Prometei is one of the most persistent and sophisticated botnet threats in circulation today. First identified in 2020—and active since at least 2016—this modular malware continues to evolve rapidly, targeting both Windows and Linux systems across the globe. Originally designed for cryptocurrency mining, Prometei has expanded its capabilities to in…
  continue reading
 
An intimate, affecting account of life during wartime, told through the lives that have been shattered. Even as scores of Americans rally to the Ukrainian cause and adopt Volodymyr Zelensky as a hero, the lives of Ukrainians remain opaque and mostly anonymous. In By the Second Spring, the historian Danielle Leavitt goes beyond familiar portraits of…
  continue reading
 
When Russia invaded Ukraine in 2022, the world witnessed the “creative, freewheeling, darkly humorous, and deeply resilient society” that is contemporary Ukraine. In this timely and original history, a bestseller in Ukraine, the historian Yaroslav Hrytsak tells the sweeping story of his nation through a meticulous examination of the major events, c…
  continue reading
 
In this episode, we dive into the 2024 McLaren Health Care data breach that compromised the sensitive information of over 743,000 individuals—just one year after a similar ransomware attack impacted 2.2 million. We’ll unpack the timeline of the attack: how cybercriminals gained unauthorized access between July 17 and August 3, exploiting vulnerabil…
  continue reading
 
This podcast dives deep into one of the most pressing vulnerabilities in modern AI — the rise of sophisticated "jailbreaking" attacks against large language models (LLMs). Our discussion unpacks a critical briefing on the evolving landscape of these attacks, with a spotlight on the novel “Echo Chamber” technique discovered by NeuralTrust. Echo Cham…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play