Is there hope for my hurting marriage? Can my marriage be restored? How do we heal as a couple after a divorce? Welcome to the Rejoice Marriage Ministries podcast where your host, Charlyne Steinkamp, will answer these questions and others as she helps you gain hope for your marriage. You will be encouraged as you begin to see your spouse as the Lord sees them and the hope that you can have for your marriage to be healed and all that God intended it to be!
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
This podcast will analyse every single episode of Mad Men, from pilot to finale. The aim of this podcast, unlike other TV podcasts, is to discuss the show holistically, i.e. with reference to any and all seasons of the show. This is only possible now that the entire show has been aired and we have the full story to pull from. Official launch date is 18th August, after which you can expect a new episode every Sunday! [email protected]
…
continue reading
Masonic talk radio with the Rocky Mountain Mason.
…
continue reading
Reid My Mind Radio Featuring interviews with interesting people not covered by the mainstream media. RMM Radio also includes audio essays revolving around Reid’s personal adjustment to blindness and the impact that has on his life as a man, an African American, a husband and father. It’s more than blindness; it’s whatever is on his mind.
…
continue reading
Connecting Miami-Dade to Christ and Covenants and Christ and Covenants to Miami-Dade.
…
continue reading
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
…
continue reading
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
…
continue reading
In depth analysis on the movie Industry in its entirety. We discuss movie news (Rumors), the economics of filmmaking (Money) and the art of cinema (Movies). Hear from aspiring artists, doctoral professors, plain old movie lovers, movie professionals and as always your host, James Bastone. Hope you enjoy.
…
continue reading

1
RMM-093: A Stranger in the Elemental Temple: The Ancient Oriental Order of Ishmael with W. Bro. Billy Hamilton, Jr.
1:06:19
1:06:19
Play later
Play later
Lists
Like
Liked
1:06:19The Ancient Oriental Order of Ishmael surfaced in 1872, the transcription of Victorian-era Mason and esotericist Ken MacKenzie (the transcriber/author of the z-ciphers used in founding the Golden Dawn). Prominent Masons and esotericists of the era, including the likes of Robert Wentworth Little and William Wynn Westcott were members. Support the sh…
…
continue reading

1
The RMM protocol: Remote, risky, and ready to strike. [OMITB]
41:40
41:40
Play later
Play later
Lists
Like
Liked
41:40Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined b…
…
continue reading

1
The RMM protocol: Remote, risky, and ready to strike.
41:40
41:40
Play later
Play later
Lists
Like
Liked
41:40Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined b…
…
continue reading
This week, our three hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a bit of follow up, one from listener Aaron, who shares some safety tips fo…
…
continue reading

1
OWASP security logging and monitoring failures (noun) [Word Notes]
6:04
6:04
Play later
Play later
Lists
Like
Liked
6:04Please enjoy this encore of Word Notes. The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system.By N2K Networks
…
continue reading
This week, our three hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Listener Jim notes that money launderers and couriers mentioned in recent episodes are often scam…
…
continue reading

1
Ep 207 - Trust, Pray, Believe: You Spoke, We’re Listening
25:46
25:46
Play later
Play later
Lists
Like
Liked
25:46In this episode, Charlyne and Lori respond to questions and insights from our recent survey, sharing how Rejoice Marriage Ministries is walking with you. They share their heart for helping you grow in your relationship with Jesus, they will provide scripture-based strategies to fight spiritual battles, and resources to support you through every sea…
…
continue reading

1
OWASP identification and authentication failures (noun) [Word Notes]
5:58
5:58
Play later
Play later
Lists
Like
Liked
5:58Please enjoy this encore of Word Notes. Ineffectual confirmation of a user's identity or authentication in session management. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure Audio reference link: “Mr. Robot Hack - Password Cracking - Episode 1.” YouTube Video. YouTube, September 21, 20…
…
continue reading
And....we're back! This week, our three hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are all back to share the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. The team shares three bits of follow-up and then breaks into their stories. Joe star…
…
continue reading

1
The ClickFix Convergence: How Threat Actors Blur the Lines
35:49
35:49
Play later
Play later
Lists
Like
Liked
35:49Hello to all our Cyber Spring Chickens! Join host Selena Larson, and guest host, Sarah Sabotka, as they chat with Saher Naaman, Senior Threat Researcher at Proofpoint, for a deep dive into how modern espionage and cybercrime are increasingly blurring lines. At the center of the conversation is ClickFix—a fast-evolving social engineering technique o…
…
continue reading
Support the show www.rockymountainmason.com www.esotericmason.com Support the show: https://patreon.com/rockymountainmason?utm_medium=clipboard_copy&utm_source=copyLink&utm_campaign=creatorshare_creator&utm_content=join_link
…
continue reading
Please enjoy this encore of Word Notes. An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information. CyberWire Glossary link: https://thecyberwire.com/glossary/log4j Audio reference link: “CISA Director: The LOG4J Security Flaw Is the ‘Most Serious’ She’s Seen in Her …
…
continue reading

1
What’s inside the mystery box? Spoiler: It’s a scam!
46:13
46:13
Play later
Play later
Lists
Like
Liked
46:13As Dave Bittner is at the RSA Conference this week, our hosts Maria Varmazis and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from José on episode 335, sharing how UK banking features like Faster Payments and the “Check Payee” …
…
continue reading

1
Ep 206 - Overcoming What Feels Impossible
51:18
51:18
Play later
Play later
Lists
Like
Liked
51:18Are you feeling overwhelmed by life’s challenges? Are you battling anxiety, fear, or doubt? In this episode, we share a sermon from Pastor Scott Baugh, from Journey Church, that will encourage you. Pastor Scott will help you shift your perspective. Instead of looking at how big your problem is, what would happen if you started looking at how big yo…
…
continue reading

1
OWASP broken access control (noun) [Word Notes]
7:30
7:30
Play later
Play later
Lists
Like
Liked
7:30Please enjoy this encore of Word Notes. Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls.By N2K Networks
…
continue reading
As Maria is on vacation this week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe and Dave are joined by guest Rob Allen from ThreatLocker who shares a story on how a spoofed call to the help desk unraveled into a full-blown cybe…
…
continue reading

1
The Art of the Innocent Ask: How Threat Actors Use Benign Conversations
58:09
58:09
Play later
Play later
Lists
Like
Liked
58:09Hello to all our Cyber Spring Chickens! Join host Selena Larson and guest hosts, Tim Kromphardt and Sarah Sabotka, both Senior Threat Researchers at Proofpoint. These top sleuths crack open Proofpoint’s new Human Factor series and explore one of the most deceptively dangerous tactics in a threat actor’s playbook: the benign conversation. What exact…
…
continue reading

1
OWASP security misconfiguration (noun) [Word Notes]
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-security-misconfiguration Audio reference link: “What Is the Elvish Word for Friend?” Quora, 2021.…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. This week Joe's got some follow up about his chickens. Joe's story is on LLM-powered coding tools, and how they are inc…
…
continue reading

1
Ep 205 - How Can My Marriage Survive Sexual Betrayal?
32:35
32:35
Play later
Play later
Lists
Like
Liked
32:35It’s easy to believe that infidelity leaves only one option: divorce. But through personal experience, we’ve seen that healing and restoration are possible when you invite God into the broken places of your marriage. In this episode, we’re joined by Kallista Sanchez, author of Forgiving What the World Says You Shouldn’t: Releasing the Chains of Bit…
…
continue reading
Please enjoy this encore episode of Word Notes. A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design Audio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 Nove…
…
continue reading
This week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines, while our other host, Maria Varmazis is at a conference. We begin with some follow-up, as Joe reflects on the density of gold. Then, Dave shares some heartfelt and moving words ab…
…
continue reading
Please enjoy this encore of Word Notes. A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-injection Audio reference link: “APPSEC Cali 2018 - Taking on the King: Killing Injection Vulne…
…
continue reading

1
You get a million dollars, and you get a million dollars!
37:12
37:12
Play later
Play later
Lists
Like
Liked
37:12This week, while Dave Bittner is out, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off with a lot of follow up on listener feedback this week! Justin shares a thought about how to tra…
…
continue reading

1
Diving Into Cyber Journalism: FOIA, Fraud, and the Fight Against Online Threats
46:35
46:35
Play later
Play later
Lists
Like
Liked
46:35Hello to all our Cyber Cherry Blossoms! Join host Selena Larson and guest host, Tim Kromphardt, a Senior Threat Researcher, as they chat with Andrew Couts, Senior Editor, Security and Investigations at WIRED. Andrew shares insights into his work overseeing cybersecurity coverage and investigative reporting, collaborating with newsrooms, and uncover…
…
continue reading

1
Ep 204 - Faith & Friendship - Trusting Jesus as the Ultimate Friend
33:33
33:33
Play later
Play later
Lists
Like
Liked
33:33In this episode, Lori sits down with author Kristen Strong, author of Desperate Woman Seeks Friends: Real Talk About Connection, Rejection, and Trying Again for the Friendships You Need to talk about a topic many of us struggle with—friendship. When your marriage is in crisis, the ripple effects often touch every part of your life, including your f…
…
continue reading

1
OWASP cryptographic failures (noun) [Word Notes]
6:35
6:35
Play later
Play later
Lists
Like
Liked
6:35Please enjoy this encore of Word Notes. Code that fails to protect sensitive information. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-cryptographic-failure Audio reference link: Vandana Verma. “OWASP Spotlight - Project 10 - Top10.” YouTube Video. YouTube, January 4, 2021.By N2K Networks
…
continue reading
This week our hosts, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. First, we start off with some more follow-up on EZ passes, along with the newest iteration, as Kailey Cornick sh…
…
continue reading

1
account takeover prevention (noun) [Word Notes]
6:23
6:23
Play later
Play later
Lists
Like
Liked
6:23Enjoy this encore of Word Notes. The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim. CyberWire Glossary link: https://thecyberwire.com/glossary/account-takeover-preventionBy N2K Networks
…
continue reading

1
Hello? Is it malware you’re looking for? [OMITB]
37:37
37:37
Play later
Play later
Lists
Like
Liked
37:37Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K …
…
continue reading
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K …
…
continue reading
This week our hosts, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up on E-ZPass scams—a listener suggests that scammers may be exploiting exposed licens…
…
continue reading

1
Ep 203 - When the Enemy Strikes: Combating Fear, Bitterness, and Doubt with God’s Word
30:05
30:05
Play later
Play later
Lists
Like
Liked
30:05What do you do when it feels like the enemy is coming at you from every side? In this episode of the Fight for Your Marriage Podcast, Charlyne returns with an update on her health and shares what God has been teaching her during this season. Charlyne and Lori dive into the reality of spiritual warfare, drawing from Your Story Has a Villain by Jonat…
…
continue reading
Hello to all our Remote Cyber Pals! Join host Selena Larson and guest host, Tim Kromphardt, a Senior Threat Researcher, as they chat with Staff Threat Researcher, Ole Villadsen, from Proofpoint. They explore the broader shift from traditional malware to commercially available tools that fly under the radar and how cybercriminals are increasingly ab…
…
continue reading
Please enjoy this encore of Word Notes. The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect those threats. CyberWire Glossary link: https://thecyberwire.com/glossary/threat-hunting Audio reference link: “My ‘Aha!" Moment - Methods, Tips, & Less…
…
continue reading
On Hacking Humans, this week Dave Bittner is back with Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), and they are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe shares a bit of follow up on scam victims sharing their experiences of losing m…
…
continue reading

1
vulnerability management (noun) [Word Notes]
8:16
8:16
Play later
Play later
Lists
Like
Liked
8:16Please enjoy this encore of Word Notes. The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this. CyberWire Glossary link: https://thecyberwire.com/glossary/vulnerability-management Audio reference link: “Vulnerability Scanning - Comptia Security+ sy0-501 - 1.5.” YouTube, You…
…
continue reading
On Hacking Humans, this week Dave Bittner is on vacation so our two hosts Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Our hosts start out with some follow up on chicken talk from last week. M…
…
continue reading
Life is full of changes, and marriage is no exception. As we go through different seasons, some triggers can disrupt a relationship. We want to help you learn how to grow as a Christian and support your spouse. One area where women need support is through the changes that come with peri-menopause and mid-life changes. In this episode, we’re joined …
…
continue reading

1
Your Best Defense against Social Engineering: The Gray-Matter Firewall
51:06
51:06
Play later
Play later
Lists
Like
Liked
51:06Hello to all our Cyber Pals! Join host Selena Larson and guest hosts, Sarah Sabotka and Tim Kromphardt, both Senior Threat Researchers from Proofpoint, as they dive into the realities of current social engineering schemes —especially during high-risk times like tax season. Cybercriminals exploit fear, urgency, and excitement to manipulate victims, …
…
continue reading

1
software bill of materials (SBOM) (noun) [Word Notes]
6:59
6:59
Play later
Play later
Lists
Like
Liked
6:59Please enjoy this encore of Word Notes. A formal record containing the details and supply chain relationships of various components used in building software.By N2K Networks
…
continue reading
On Hacking Humans, this week Dave Bittner is on vacation so our two hosts Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off the show with some follow-up from a long-time listener who s…
…
continue reading

1
The new malware on the block. [Only Malware in the Building]
35:03
35:03
Play later
Play later
Lists
Like
Liked
35:03Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K …
…
continue reading
Please enjoy this encore of Word Notes. A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the resources essential to perform their function and nothing more.…
…
continue reading
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K …
…
continue reading

1
Oscars 2025 is the FINAL Stand for RMM
1:39:40
1:39:40
Play later
Play later
Lists
Like
Liked
1:39:40In the Series FINALE of Rumors, Money, and Movies host James Bastone and featured correspondent Matthew Gaetano talk the 97th Academy Awards and the legacy of the show. Thanks so much for all your support over the 5+ years, it means the world!
…
continue reading
In this special live episode of Hacking Humans, recorded at ThreatLocker’s Zero Trust World 2025 conference in Orlando, Florida, Dave Bittner is joined by T-Minus host Maria Varmazis. Together, they explore the latest in social engineering scams, phishing schemes, and cybercriminal exploits making headlines. Their guest, Seamus Lennon, ThreatLocker…
…
continue reading

1
Ep 201 - Dealing with Doubt with Nicki Koziarz
51:55
51:55
Play later
Play later
Lists
Like
Liked
51:55You may find yourself praying, “Please, God, no more hard things.” Nicki Koziarz, author and speaker with Proverbs 31 Ministries, knows how that feels. Doubt and disbelief can begin to creep into our lives without warning. When unbelief strikes, we must decide whether to trust God or be overcome by doubt. In this episode, we sit down with Nicki and…
…
continue reading

1
Hiding in Plain Sight: How Defenders Get Creative with Image Detection
45:52
45:52
Play later
Play later
Lists
Like
Liked
45:52Hello to all our Cyber Pals! Join host Selena Larson and guest host, Sarah Sabotka, as they speak with Kyle Eaton, Senior Security Research Engineer at Proofpoint. They explore the evolving world of image-based threat detection and the deceptive tactics cybercriminals use to evade defenses. From image lures embedded in emails, PDFs, and Office docu…
…
continue reading
Please enjoy this encore episode of Word Notes. Hardware and software designed to detect and prevent cyber adversary campaigns that target industrial operations.By N2K Networks
…
continue reading