Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Exploitation Podcasts

show episodes
 
Artwork

51
Conspirituality

Derek Beres, Matthew Remski, Julian Walker

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Dismantling New Age cults, wellness grifters, and conspiracy-mad yogis. At best, the conspirituality movement attacks public health efforts in times of crisis. At worst, it fronts and recruits for the fever-dream of QAnon. As the alt-right and New Age horseshoe toward each other in a blur of disinformation, clear discourse, and good intentions get smothered. Charismatic influencers exploit their followers by co-opting conspiracy theories on a spectrum of intensity ranging from vaccines to ch ...
  continue reading
 
Artwork

451
GBW Podcast

The Video Graveyard

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Biweekly podcast from the guys behind The Video Graveyard.Tackles a diverse assortment of movie related topics with side trips into music, comics, books, and much more! You never know what to expect on GBW!
  continue reading
 
Welcome to Paper Chains, a podcast that takes a deep dive into key reports, uncovering exploitation, labor abuses, and global supply chain tracking. This series is a project of Five24, dedicated to shining a light on the facts behind the headlines.
  continue reading
 
Artwork

1
YusufOnSecurity.com

YusufOnSecurity.Com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Warren Sharp is joined by his NFL & College Football Analysts to pore through the data and bring you the smartest people in the sport to find edges to exploit and advantages to make better bets and win fantasy football leagues & contests! Featuring insights, projections and commentary from Warren Sharp, Rich Hribar, Ray Summerlin, Ryan McCrystal and the Sharp Football team!
  continue reading
 
Artwork

1
Exploit

Exploit Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
A show about hacking the system, hosted by Patrick Tomasso and Gabi Pirraglia. Patrick is a content creator and Gabi is digital strategist, together they pull apart the internet and social media to reveal the hidden creative formulas for success.
  continue reading
 
Artwork

1
Outside the Cinema

outsidethecinema

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Outside The Cinema is a weekly podcast that focuses on to cult movies of all kinds. We feature films running the gamut from Horror to Exploitation to Noir and Matial Arts and back. You know that random video you got on VHS from some random mom and pop video store when you were 12? Yeah, we covered it. So sit back and enjoy the OTC ride.
  continue reading
 
Artwork

1
Midnight Drive-In

Midnight Drive-In

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
From the ashes of The Last Horrorcast comes The Midnight Drive-In. Each week Bryan, Doug, and Noah will be talking about the craziest, weirdest, and down right insane cult, exploitation, and horror movies.
  continue reading
 
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
  continue reading
 
Discover the schemes of Satan and his demons as they work to lead you away from God’s eternal glory. We unpack the reality of spiritual warfare and the enemy’s strategic tactics—deception, distraction, doubt, division, and temptation. Learn how these personalized attacks exploit your weaknesses, pulling you away from God’s love and purpose. Equip yourself to stand firm in faith and overcome these subtle yet powerful schemes
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you're curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
Artwork

1
The Tucker Carlson Show

Tucker Carlson Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The Tucker Carlson Show is your beacon of free speech and honest reporting in a media landscape dominated by misinformation. The only solution to ending the propaganda spiral is by telling the truth. That's our job. Every day. No matter what.
  continue reading
 
Artwork

51
Devil's Trap: A Supernatural Podcast

Don't Be A Dick Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
We're going back to the beginning of the road and watching Supernatural from the beginning. For your host Liz, it's probably her fifth time through. For your other host Diana, it's her first. She claims she was scared. Naturally as a supportive friend, Liz will attempt to exploit this fear as much as possible. We also dive into the spooky spook in the show in whatever way we want - occult, folklore, true crime, shopping, GAME SHOWS? Watch the videos on you tube @devilstrappodcast Follow us o ...
  continue reading
 
Tony and Adam embark on a podcast adventure and instantly realise that quality, factual and intelligent conversation isn’t as easy as it looks. Despite this they persevere with their horror movie based waffley chit-chat, taking time out to discuss a randomly chosen horror movie each episode with varying results. Keep telling yourself.....it can only get better, it can only get better, it can only get better.
  continue reading
 
Welcome! In this eye-opening podcast, join us as we delve into the gripping stories of individuals who have bravely escaped the clutches of cults, anti-MLM movements, and abusive relationships. Each episode is a journey of empowerment, shedding light on the tactics used to control minds and exploit trust. Our guests share their personal experiences, offering insights into the red flags and warning signs that others may encounter. Get ready for a compelling exploration of resilience, self-dis ...
  continue reading
 
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
  continue reading
 
It's 1721, and London is abuzz with news of notorious pirates Anne Bonny and Mary Read, currently languishing in Newgate Prison. It’s the perfect time for debt-ridden journalist Nathaniel Mist to exploit the public appetite and ghost-write a sensational (and hopefully best-selling) history of pirates. But as the balladeers and gossips on the streets of London build myths around the blood-thirsty, perverse lady pirates, Mist is forced to reckon with the real Bonny & Read... Featuring musical ...
  continue reading
 
Artwork

2651
Death By DVD

Death By DVD

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Death By DVD: When watching is never enough. We here at Death By DVD sit painfully through hours and hours of movies so you, the public, can make an informed decision of what you put in your ear holes and eye holes. Some of these films are good, some bad, and some even unmentionable; but ALL have one thing in common : Watching all of these movies will one day melt our brains into a sloppy wet mush. No need to thank us, we were already methodically destroying ourselves with cinema. At least t ...
  continue reading
 
Artwork

1
CANADALAND

CANADALAND

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The best newspaper in Canada is a podcast. Original reporting, sharp political analysis, and media criticism you won’t get anywhere else. Keeping you informed about what’s happening now in your country. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Brandon Friesen brings you (XNOS) Exploiting Nostalgia.. the Saturday morning variety show dedicated to rediscovering all the things we feel sentimental about. Enjoy multiple segments per episode covering childhood memories, classic videogames, music of yesteryear, movies, shows, toys and anything else that comes with that warm familiar feeling. New guests featured every week. Powered by FreezenFactor.
  continue reading
 
Artwork

1
Exploited Podcast

Exploited

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Shir Khan is the owner of in-vogue and on-point deep house label at the moment, the leviathan that is Exploited Records. Exploited Rec blazes its way through since 2007 with releases that simply cannot be brushed aside. 2012 has been the breakthrough year for Exploited, bringing them massive celebration and support from artists, the scene and a large audience. Still stated as one of the leading influences in Deep House & Indie Dance, Exploited is not set up to stop releasing tracks that blow ...
  continue reading
 
Artwork

1
Day[0]

dayzerosec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A weekly podcast for bounty hunters, exploit developers or anyone interesting in the details of the latest disclosed vulnerabilities and exploits.
  continue reading
 
Artwork

1
Exploit Circus

Exploit Circus

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Born from the pit and forged in distortion, the crew of Exploit Circus bring their metal mayhem to the mic. Ring Master Jay, the Dancing Monkey Cee, Hosel the Clown, and Cabana Boy Dre thrash through exploitation and horror cinema, unload brutally honest takes on life, and rip into themes of society, romance, and chaos itself. It’s loud. It’s raw. It’s real. If you live for heavy riffs, dark humor, and unfiltered conversation, welcome to the circus. Mature audiences only. The Exploit Circus ...
  continue reading
 
In Season Two of her true crime series, The God Hook, journalist Carol Costello investigates the complex case of the Ohio Craigslist Killings—and in doing so, unearths the untold story of the crimes that preceded the murders—and the victims who’ve never received justice. Richard Beasley was convicted of murdering three men and attempting to kill a fourth in the fall of 2011, but before that heinous spree, authorities were building a human trafficking case against him. Now, working with the c ...
  continue reading
 
Artwork

1
Post Reports

The Washington Post

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Post Reports is the daily podcast from The Washington Post. Unparalleled reporting. Expert insight. Clear analysis. Everything you’ve come to expect from the newsroom of The Post, for your ears. Martine Powers and Elahe Izadi are your hosts, asking the questions you didn’t know you wanted answered. Published weekdays around 5 p.m. Eastern time.
  continue reading
 
Artwork

1
The Art of Manliness

The Art of Manliness

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Art of Manliness Podcast aims to deepen and improve every area of a man's life, from fitness and philosophy, to relationships and productivity. Engaging and edifying interviews with some of the world's most interesting doers and thinkers drop the fluff and filler to glean guests' very best, potentially life-changing, insights.
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Loading …
show series
 
This year, taxpayers will spend about $193 billion to compensate almost 7 million disabled veterans. Some of the conditions prevent veterans from working or doing everyday tasks – but a Post investigation found that many are receiving money for easily manageable ailments like acne, eczema and sleep apnea. Others are filing fraudulent claims to get …
  continue reading
 
Camvember starts out with... Frank Stallone. The stakes could not be lower in this "erotic" thriller where Cameron is just trying to go to bed, Frank literally won't go home, and someone might have blown themselves up or something. Wick, Yobo, Other Tim, and Mike try and figure out if anything makes sense on the first episode of 2025's Camvember.…
  continue reading
 
LG Uplus confirms cybersecurity incident 10 million+ impacted by Conduent breach Russian hackers exploit tools against Ukrainian targets Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer requests for documentation or answers. But Convey…
  continue reading
 
The prospect of regime changing Maduro is like Viagra to Lindsey Graham. Unfortunately it won’t prevent a single fentanyl death. Paid partnerships with: Eight Sleep: Get $350 off the new Pod 5 Ultra at https://EightSleep.com/Tucker SimpliSafe: Visit https://simplisafe.com/TUCKER to claim 50% off a new system. There's no safe like SimpliSafe. PureTa…
  continue reading
 
Tom Uren and Amberleigh Jack talk about Peter Williams, the general manager of vulnerability research firm Trenchant, who has pleaded guilty to selling exploits to the Russian 0day broker Operation Zero. It’s a terrible look, but it doesn’t mean the private sector can’t be trusted to develop exploits. They also discuss a new report’s recommendation…
  continue reading
 
In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: L3Harris Trenchant boss accused of selling exploits to Russia once worked at the Australian Signals Directorate Microsoft WSUS bug being exploited in the wild Dan Kaminsky DNS cache poisoning comes back because of a bad PRNG SpaceX finally starts dis…
  continue reading
 
This is this week’s cyber news for November third through November seventh, twenty twenty-five. The week unfolded with relentless attacks on edge infrastructure, high-stakes data breaches, and fresh discoveries in global espionage campaigns. Cisco faced active exploitation of its Secure Firewalls and routers, SonicWall confirmed a state-backed back…
  continue reading
 
Taylor Swift: Nazi sympathizer, freshly-minted racist, MAGA trad wife. Or so proponents of a recent conspiracy theory would have it. For years, the most successful female recording and performing artist of her generation (and therefore of all time) has used “easter eggs” as part of her marketing. Hidden messages in music videos and lyric sheets, ob…
  continue reading
 
This is today’s cyber news for November 7th, 2025. We lead with a confirmed incident at the Congressional Budget Office, where compromised mailboxes and files could expose draft budget work and internal policy discussions. Nevada’s rare after-action report then maps a ransomware crew’s path from a trojanized admin tool to encrypting roughly sixty a…
  continue reading
 
The first tree revealed our rebellion, the second tree revealed our redemption. Which tree are you feeding from?Join me as we learn how to walk daily in the transforming power of Jesus Christ, the Living Tree of Life, and continue our journey toward a soul fully rooted in Him.In this episode, we return to the Garden, the place where humanity’s dest…
  continue reading
 
Kate Barr ran for state Senate in North Carolina’s 37th District as a Democrat last year, expecting to lose. She even branded her campaign with the words “Kate Barr can’t win.” She ran the unconventional campaign to make an argument against gerrymandering — a tactic used in her state and across the country by politicians who have redrawn congressio…
  continue reading
 
Hello, Laurence & Lindsay here. We've got a big problem, and we need your help. If you're listening to this on Spotify, we're asking you to stop, and switch to another podcast player. As I'm sure most of you know, there's plenty of evidence that Spotify is a terrible company with a long history of exploiting and underpaying artists, but that's only…
  continue reading
 
Zelensky is using the secret police to extinguish traditional Christianity in Ukraine. How come no one in the US Congress seems to notice this? (00:00) The Armenian Christian Persecution(24:10) Who's Behind the Global Push to Eliminate Christianity?(30:50) Why Aren't American Leaders Talking About the Attacks on the Armenian Church?(37:15) Zelensky…
  continue reading
 
In a world where cyber risk is business risk, today's Chief Information Security Officers are not just defenders of data—they are strategic partners driving organizational resilience. Moderated by Gartner's Ash Ahuja, this candid conversation explores how security leaders are balancing innovation with risk management, influencing board-level decisi…
  continue reading
 
Poilievre’s Terrible, Horrible, No Good, Very Bad Week. With MP Chris d’Entremont crossing the floor and MP Matt Jeneroux puzzling resignation, the Conservative caucus is scrambling. Plus, can the Liberals and NDP actually resonate with young Canadians? It’s crowdfunding month here at Canadaland! The next 20 people to sign up today will receive a F…
  continue reading
 
NFL Week 10 best bets, player props & referee impact for Patriots at Buccaneers, Ravens at Vikings, Falcons vs Colts (Germany), Bills at Dolphins, Rams at 49ers, Steelers at Chargers and Eagles at Packers, plus college football picks from BYU at Texas Tech and Oregon at Iowa. Warren Sharp breaks down the horrible Raiders at Broncos game on Thursday…
  continue reading
 
This episode's title will all make sense. You'll see. We're talking sixteen movies including a trio of sequels, a giant killer sperm, a teen TV movie about driver's ed, some nasty killer yogurt, a super sexist and super drunk spy from the 60's, Harvey Keitel getting freaky (surprise!), a lazy 2000's crime thriller we can blame Tarantino for and so …
  continue reading
 
Hackers use Windows Hyper-V to evade EDR detection Critical Cisco UCCX flaw lets attackers run commands as root The Louvre's video security password was reportedly Louvre Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatL…
  continue reading
 
Payment service provider executives arrested over a credit card fraud ring, Meta makes a fortune showing scam ads, South Korean telco KT tried to hide a second breach and five more scammers are sentenced to death in China. Show notes Risky Bulletin: Europol arrests payment service executives for role in credit card fraud ring…
  continue reading
 
NFL Week 10 player picks, Start-Sit advice, PrizePicks edges, NFL Trade Deadline analysis and deep-league sleepers — plus “Agree or Disagree” debates from Rich Hribar & Ray Summerlin. We JUST prorated prices on all of our products, dropping the price by over 30%! On top of that, we’re giving you an EXTRA 25% OFF any of our season-long packages! You…
  continue reading
 
In this conversation, Chris critiques the quality of screenwriting in a recent film, expressing disappointment over the dialogue and the perceived lack of care from the producers. He highlights the disconnect between audience expectations and the reality of film production, emphasizing the need for a good script to meet those expectations.…
  continue reading
 
We all have things that we’re experts in. They could be our jobs, they could be hobbies, they could be random bits of information you’ve gleaned from podcasts over the years. So then you find yourself sitting in your car, listening to somebody on the radio yap on about a topic and get it ALL WRONG. Frustrating, for sure. So today, we wanted to hear…
  continue reading
 
When restaurants and cafes in Portland and elsewhere link into networks of food pantries and soup kitchens, will mutual aid feel real in the US? When regular folks come out of their houses to shame and chase ICE thugs out of the neighborhood, will that feeling of power from below catch on? Will it create some craving for a different way of doing th…
  continue reading
 
This is today’s cyber news for November 6th, 2025. We open with zero-click prompt issues that could make large language models leak prior chats, then move to Hyundai AutoEver’s exposure of sensitive identifiers in U.S. systems. A fresh cloud study underscores that most breaches still start with credentials and misconfiguration, while a Control Web …
  continue reading
 
Google uncovers PROMPTFLUX malware CISA warns of CentOS Web Panel bug Threat group targets academics Huge thanks to our sponsor, ThreatLocker Cybercriminals don't knock — they sneak in through the cracks other tools miss. That's why organizations are turning to ThreatLocker. As a zero-trust endpoint protection platform, ThreatLocker puts you back i…
  continue reading
 
Tom Uren and Amberleigh Jack talk about aggressive US cyber operations targeting the Venezuelan government in President Trump’s first term. These were narrowly successful in that they achieved their immediate operational goals, but they didn’t achieve Trump’s broader policy goal of ousting Venezuelan leader Nicolás Maduro. They also talk about why …
  continue reading
 
If Lindsey Graham gets re-elected to the US Senate, there’s no reason to have a Republican Party. Here’s how to stop it. (00:00) Monologue (45:23) Why Paul Dans Decided to Run Against Lindsey Graham (1:00:01) How Globalism Destroyed the United States (1:18:57) How Does Lindsey Graham Keep Getting Reelected? (1:24:55) How Much Money Has Lindsey Grah…
  continue reading
 
There was little suspense after polls closed yesterday. Democrat Mikie Sherrill won the governor’s office in New Jersey, Abigail Spanberger easily defeated Republican Winsome Earle-Sears for the same office in Virginia, and Californians voted to redraw congressional maps to give Democrats an edge in next year’s midterm elections. In New York City, …
  continue reading
 
Carney’s much-anticipated budget is finally here. Will it trigger an election? Rachael Segal joins Noor Azrieh to unpack the “Christmas election” hysteria around the budget. Then, Sam Konnert reports on where the media, the CBC, and Eurovision fit into Carney’s plans. Host: Noor Azrieh Credits: James Nicholson (Producer), Jules Bugiel (Associate pr…
  continue reading
 
This is today’s cyber news for November fifth, twenty twenty-five. We open with trust problems inside everyday tools: researchers found Microsoft Teams flaws that enable impersonation and message edits, and Google Play’s defenses were skirted by dozens of malicious apps with tens of millions of installs. A separate disclosure from Nikkei highlights…
  continue reading
 
This week, Dee and Isla take on a story that truly crosses borders - from the assassination of Sweden’s Prime Minister to a double murder in small-town North Carolina. When 40-year-old Swede Victor Gunnarsson moved to the US in search of a fresh start, he had no idea his past as a one-time suspect in the killing of Prime Minister Olof Palme would f…
  continue reading
 
Scattered Spider, LAPSUS$, and ShinyHunters join forces Nikkei reports data breach impacting 17,000 people React Native NPM flaw leads to attacks Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero…
  continue reading
 
In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: We love some good vulnerability reporting drama, this time FFmpeg’s got beef with Google OpenAI announces its Aardvark bug-gobbling system Two US ransomware responders get arrested for… ransomware Memento (nee HackingTeam) CEO says: Sì, those are tot…
  continue reading
 
The US indicts two cybersecurity employees over ransomware attacks, hackers extort customers of South Korean massage parlors, another crypto firm gets hacked for $128 million dollars, and cargo thieves collab with hackers to target freight companies. Show notes Risky Bulletin: US indicts two rogue cybersecurity employees for ransomware attacks…
  continue reading
 
Alejandro Jodorowsky tar oss med inn i et mareritt av blod, sirkus og religiøs galskap!Vi snakker om filmen der mor styrer sønnen fra graven, elefanter blør fra snabelen, og kjærligheten kanskje – bare kanskje – kan bryte forbannelsen.En surrealistisk blanding av Psycho, sirkus og guddommelig galskap. Bli med når vi prøver å finne ut hva som egentl…
  continue reading
 
It's the end of our werewolves vs vampires month and we're going for three films this time around. First, monsters gather in HOUSE OF FRANKENSTEIN. Then, monsters gather albiet a little more seperately in HOUSE OF DRACULA. Finally, a werewolf fights a vampire woman in the aptly named THE WEREWOLF VS THE VAMPIRE WOMAN.…
  continue reading
 
These days, just about any food you could possibly imagine now has “added” protein. There’s protein popcorn, protein muffins and even protein water. But where did this obsession with protein begin? And how much should we really be eating on a daily basis? Host Colby Itkowitz speaks with Washington Post health columnist Anahad O’Connor about this la…
  continue reading
 
Last week, Alberta Premier Danielle Smith used the notwithstanding clause to shut down the teachers’ strike and force them back to work. Why? Host Sam Konnert talks with labour expert Jason Foster about how politicians are quietly learning from each other and testing limits. And he sits down with a teacher to talk about what it’s really like inside…
  continue reading
 
This is today’s cyber news for November 4th, 2025. The brief opens with rare criminal charges against security insiders allegedly aiding a ransomware crew, a major breach disclosure affecting more than ten million people, and a stealthy espionage campaign focused on defense networks. Together they highlight three pressure points for every organizat…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play