In The Willing Fool podcast, we ask questions and seek answers about the biggest questions of life--what is the meaning of life, what we should pursue and how. We question, think, explore, and discuss things that you care about but might not feel safe to say out loud. We consider this search for wisdom a sacred journey that we can take together.
…
continue reading
Paul Trimble Podcasts
I will talk sports ! Rather it’s about the NBA , NFL or MLB etc. I’ll give u the spend on the latest rumors , transactions and live game scores and reports. Call in and let’s talk sports
…
continue reading
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
…
continue reading

1
CISA: Ransomware Attack Disrupts Trimble Cityworks, Threatening Local Governments
3:43
3:43
Play later
Play later
Lists
Like
Liked
3:43In late February 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a critical alert regarding a ransomware attack targeting Trimble Cityworks, an asset management platform widely used by local governments and infrastructure organizations across the United States. The attack, detailed in a report by Cyber Security Hub, ex…
…
continue reading

1
St. Paul Under Siege: Minnesota National Guard Mobilized in Response to Sophisticated Cyberattack
4:19
4:19
Play later
Play later
Lists
Like
Liked
4:19On July 25, 2025, the city of St. Paul, Minnesota, faced a digital onslaught that brought its municipal systems to a standstill. What began as "suspicious activity" detected on the city's internal networks quickly escalated into a confirmed cyberattack, described by Mayor Melvin Carter as a "deliberate, coordinated digital attack" orchestrated by a…
…
continue reading

1
Gunra Ransomware Emerges as a New Threat Targeting Windows Systems
2:00
2:00
Play later
Play later
Lists
Like
Liked
2:00A new ransomware strain, dubbed Gunra, has surfaced as a significant threat to Windows systems, with attacks detected as early as July 2025. This sophisticated malware, identified by security researchers at Palo Alto Networks’ Unit 42, targets both individual and enterprise Windows environments, encrypting critical files and demanding cryptocurrenc…
…
continue reading

1
Ep 48 - The Passive Aggressive Game of Our New Secular Religion
34:31
34:31
Play later
Play later
Lists
Like
Liked
34:31We've come to the rootless, unhinged, and disingenuous endgame of our New Secular Religion. Claims are being made, lines are being drawn, and goalposts are ever moving in this movement towards group madness. Check out the video podcast at https://www.youtube.com/@paultrimble22/videos Support the show…
…
continue reading

1
Microsoft SharePoint Zero-Day Exploited: Urgent Patch Issued for Critical Flaws
2:00
2:00
Play later
Play later
Lists
Like
Liked
2:00Microsoft has issued an urgent security advisory addressing two critical vulnerabilities in SharePoint Server, identified as CVE-2025-53770 and CVE-2025-53771, which have been actively exploited since July 7, 2025. These zero-day flaws allow attackers to bypass authentication and execute remote code, posing a severe risk to organizations relying on…
…
continue reading

1
U.S. Sanctions Target North Korean IT Scheme: Unmasking a $17M Cyber Fraud
2:00
2:00
Play later
Play later
Lists
Like
Liked
2:00In a bold move to counter North Korea’s illicit financial operations, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned Korea Sobaeksu Trading Company and three individuals—Kim Se Un, Jo Kyong Hun, and Myong Chol Min—for orchestrating a fraudulent IT worker scheme. This operation, designed to bypass U.S. a…
…
continue reading

1
McDonald’s Data Breach Exposes 64 Million Job Applicants Personal Info
2:00
2:00
Play later
Play later
Lists
Like
Liked
2:00In July 2025, McDonald’s faced a significant data breach involving its AI-powered hiring platform, McHire, developed by Paradox.ai. Security researchers Ian Carroll and Sam Curry discovered critical vulnerabilities that exposed the personal information of approximately 64 million job applicants. The breach stemmed from shockingly basic security fla…
…
continue reading

1
How Hackers Are Exploiting Microsoft Teams to Spread Malware
3:57
3:57
Play later
Play later
Lists
Like
Liked
3:57In July 2025, a sophisticated cyberattack campaign has emerged, leveraging Microsoft Teams to deploy Matanbuchus 3.0, a potent malware loader. This evolved version of Matanbuchus, available as a Malware-as-a-Service for as little as $2,500 on crime forums, boasts advanced stealth features like improved communication protocols, in-memory execution, …
…
continue reading

1
AT&T Data Breach Exposes 86 Million Customer Records
2:00
2:00
Play later
Play later
Lists
Like
Liked
2:00In May 2025, AT&T disclosed a massive data breach affecting approximately 86 million customer records, making it one of the largest cybersecurity incidents of the year. The breach involved sensitive personal information, including names, dates of birth, phone numbers, email addresses, physical addresses, and Social Security numbers. The compromised…
…
continue reading

1
Ep 47 - The Prophets of Our New Secular Religion
47:03
47:03
Play later
Play later
Lists
Like
Liked
47:03Who are the founders of the modern movement that we now find ourselves a part of? What were their lives and thoughts like? Understand them can bring surprising insight and clarity into our confusing and chaotic cultural moment. Psst...Did you know the podcast is now also available on YouTube in video form? Check it out at https://www.youtube.com/@p…
…
continue reading

1
Ep 46 - The Child Who Devoured Its Mother
53:55
53:55
Play later
Play later
Lists
Like
Liked
53:55Why have the progeny of early Feminists turned to devour their Mother? If you understand this, you may understand what's underneath our New Secular Religion--a movement which refuses to define what it is or what it stands for but feels justified in tearing down nearly everything. Support the showBy Paul Trimble
…
continue reading

1
Ep 45 - The 10 Marks of Our New Secular Religion
49:05
49:05
Play later
Play later
Lists
Like
Liked
49:05What happens when people take on a belief system that works like a religion but they claim to be non-religious? Something like what we see in the public today. Psst...These podcast episodes are also now YouTube videos. Just go to my YouTube channel @paultrimble22 to check them out. Support the showBy Paul Trimble
…
continue reading

1
Ep 44 - More Trouble with Men and Jumping Through the Overton Window
33:05
33:05
Play later
Play later
Lists
Like
Liked
33:05Looking at the direction our conversations have been moving in the last five years points to a new sensibility, and maybe even a new religion being born. Psst...These podcast episodes are now also available as YouTube videos. Just go to my channel @paultrimble22 or search for Paul Trimble. See you there. Support the show…
…
continue reading
A hot button post and a spicy comments section are a thread that will lead us to a deeper analysis of what's going on in this cultural moment. Pssst...Did you know that these episodes are also now available on YouTube? It's under my channel @paultrimble22 or search for Paul Trimble. Support the showBy Paul Trimble
…
continue reading

1
Louis Vuitton Data Breach: A Cybersecurity Wake-Up Call for Luxury Retail
4:17
4:17
Play later
Play later
Lists
Like
Liked
4:17On July 2, 2025, Louis Vuitton, the flagship brand of the French luxury group LVMH, became the latest victim of a sophisticated cyberattack targeting its UK operations. Hackers gained unauthorized access to the retailer’s systems, stealing sensitive customer information, including names, contact details, and purchase histories. While the company ha…
…
continue reading

1
Ingram Micro Ransomware Attack Signals Threats for Global IT Distributors
3:50
3:50
Play later
Play later
Lists
Like
Liked
3:50On July 4, 2025, Ingram Micro, a global IT distributor with $48 billion in annual sales, was hit by a devastating SafePay ransomware attack, causing widespread system outages. The attack, reported by BleepingComputer, disrupted operations across the company’s global network, affecting customers and partners who rely on its services for cloud, comme…
…
continue reading

1
City of Coppell TX Faces Ransomware Nightmare
3:23
3:23
Play later
Play later
Lists
Like
Liked
3:23On July 2, 2025, the city of Coppell, Texas, fell victim to a ransomware attack orchestrated by the RansomHub gang, compromising the personal data of approximately 17,000 residents. The attack targeted the city’s IT systems, exposing sensitive information such as names, addresses, Social Security numbers, and driver’s license details. The breach, d…
…
continue reading

1
Hawaiian Airlines Cyberattack: Flights Safe, Systems Targeted
2:45
2:45
Play later
Play later
Lists
Like
Liked
2:45On the morning of June 26th, Hawaiian Airlines reported a major cybersecurity incident that disrupted its IT systems. Travel alerts were posted by 10:45 a.m. local time, confirming issues that impacted digital check-in, employee portals, and internal communications. The airline's Honolulu-based operations hub was at the center of the disturbance. W…
…
continue reading

1
25yo UK Hacker Arrested for $25M in US Cybercrime Attacks
2:23
2:23
Play later
Play later
Lists
Like
Liked
2:23British national Kai West, 25, known online as IntelBroker, was arrested in France in February 2025 and now faces extradition to the U.S. The unsealed indictment from the Southern District of New York accuses him of orchestrating a transnational cybercrime operation that inflicted over $25 million in damages from 2022 to 2025. Under his alias Intel…
…
continue reading
On June 12, Aflac detected unauthorized activity on its U.S. network and shut it down within hours—a response detailed in its June 20 SEC filing and press release. There was no ransomware involved, and core operations continued uninterrupted. Aflac cautions that files containing Social Security numbers, health records, claims data, employee and age…
…
continue reading

1
Million-Code Heist: Why Your 2FA Texts Aren’t Safe and How to Fix It
3:54
3:54
Play later
Play later
Lists
Like
Liked
3:54You might want to sit up for this one because a recent report just dropped a bombshell: around a million SMS two-factor authentication (2FA) codes were intercepted. Yep, those little six-digit codes that are supposed to keep your accounts super secure? They’ve been passing through some shady hands. According to a whistleblower in the tech industry,…
…
continue reading

1
U.S. Drops $10M Bounty on Iranian Hackers: The IOControl Malware Threat
4:11
4:11
Play later
Play later
Lists
Like
Liked
4:11The U.S. State Department just put a $10 million bounty on the table for info on Iranian hackers tied to a nasty piece of malware called IOControl. This isn’t your average computer virus—it’s a cyberweapon targeting critical infrastructure like water systems, fuel pumps, and industrial controls in the U.S. and beyond. The hackers, linked to Iran’s …
…
continue reading

1
FBI’s Urgent Alert: Play Ransomware Explosion Threatens All—Protect Yourself Now!
3:43
3:43
Play later
Play later
Lists
Like
Liked
3:43Buckle up because the FBI just dropped a major warning about a cyberattack wave that’s hitting hard. The Play ransomware, linked to some seriously shady groups, has seen a skyrocketing number of victims in May 2025, targeting businesses and critical infrastructure across the Americas and Europe. This isn’t just a random hack—it’s a coordinated atta…
…
continue reading

1
UNK_SneakyStrike: A Massive Microsoft Entra ID Account Takeover Campaign
3:42
3:42
Play later
Play later
Lists
Like
Liked
3:42A large-scale account takeover (ATO) campaign, dubbed UNK_SneakyStrike, targeted over 80,000 Microsoft Entra ID accounts across approximately 100 cloud tenants, as reported by The Hacker News on June 12, 2025. The campaign, which peaked in January 2025 with 16,500 accounts targeted in a single day, exploits the open-source penetration testing tool …
…
continue reading

1
Massive JSFireTruck Malware Campaign Targets 269k Websites
3:45
3:45
Play later
Play later
Lists
Like
Liked
3:45A staggering 269,552 websites were infected with the JSFireTruck JavaScript malware between March 26 and April 25, 2025, according to a report by Palo Alto Networks Unit 42, published on June 13, 2025. This large-scale campaign, which peaked with over 50,000 compromised web pages on April 12, uses sophisticated obfuscation techniques like JSFuck to…
…
continue reading

1
Rising Cyber Risks and AI Adoption: Businesses Grapple with New Challenges
3:55
3:55
Play later
Play later
Lists
Like
Liked
3:55A recent report highlights cybersecurity as a pressing concern for businesses worldwide. Drawing insights from 1,200 business leaders across more than 20 countries, the report reveals that approximately 75% of respondents experienced heightened anxiety about cybersecurity and privacy over the past year. Malware, flagged by nearly half of those surv…
…
continue reading

1
AI Threats Drive Cybersecurity Talent Surge Amid U.S. Government Cutbacks
1:30
1:30
Play later
Play later
Lists
Like
Liked
1:30The Cybersecurity and Infrastructure Security Agency (CISA) has recently faced a substantial reduction in force, with approximately one-third of its workforce—about 1,000 employees—departing under the Trump administration’s 17% budget cuts and voluntary buyout offers. Despite this contraction, the private sector is stepping into the breach: cyberse…
…
continue reading

1
Victoria’s Secret Cyberattack Forces Website Shutdown
1:52
1:52
Play later
Play later
Lists
Like
Liked
1:52Victoria’s Secret disclosed that a cybersecurity breach—detected on May 24, 2025—led to the precautionary shutdown of its U.S. corporate systems and e-commerce site by May 26, keeping it offline for several days. The outage disrupted online shopping and in‑store services like returns, frustrating customers during the busy Memorial Day weekend. The …
…
continue reading

1
Hackers Exploit Salesforce Data Loader in Sophisticated Vishing Attack
1:44
1:44
Play later
Play later
Lists
Like
Liked
1:44A financially motivated threat actor, known as UNC6040, has been orchestrating a sophisticated vishing (voice phishing) and extortion campaign targeting Salesforce users securityweek.com bleepingcomputer.com. The attackers impersonate IT support staff and call English-speaking employees at organizations spanning sectors like education, hospitality,…
…
continue reading
A recent study by Dimensional Research and SailPoint highlights growing concerns over the security implications of agentic AI—autonomous bots capable of executing complex tasks without human oversight. The research reveals that 82% of organizations have already integrated these AI agents into their operations, with projections estimating over 1.3 b…
…
continue reading

1
Cybercriminals Use TikTok Videos to Spread Malware
1:53
1:53
Play later
Play later
Lists
Like
Liked
1:53Cybercriminals are increasingly leveraging AI-generated videos on platforms like TikTok to disseminate infostealer malware. These deceptive videos often masquerade as tutorials or promotional content, featuring AI-generated personas that appear trustworthy and familiar to viewers. Once engaged, users are directed to download malicious software such…
…
continue reading

1
Congress Urges Stronger Cybersecurity and Academia Collaboration
2:01
2:01
Play later
Play later
Lists
Like
Liked
2:01On May 29, 2025, the U.S. House Committee on Homeland Security convened a field hearing at Stanford University's Hoover Institution to address the nation's cybersecurity vulnerabilities. Chaired by Representative Mark Green of Tennessee, the session featured testimonies from cybersecurity experts, including former National Security Advisor H.R. McM…
…
continue reading

1
Why IT Leaders Are Moving from Active Directory to ZTNA
2:16
2:16
Play later
Play later
Lists
Like
Liked
2:16Why are IT Leaders Moving from Active Directory to ZTNA? IT security is evolving fast. If you're still relying on traditional Active Directory access controls to protect your Microsoft Server environment, it might be time to rethink your strategy. In this post, I talk about why IT leaders are choosing Zero Trust Network Access — or ZTNA — to stay a…
…
continue reading
EDR is a cybersecurity tool that monitors devices like laptops and servers, detecting and responding to threats in real time. Unlike traditional antivirus, which uses known malware signatures, EDR watches for suspicious behavior, like a program rapidly encrypting files—a ransomware red flag. Think of it as a security guard for every device. In this…
…
continue reading
Are Passkeys Secure? Yes, passkeys are secure—and arguably the future of login security. They offer a phishing-resistant, user-friendly alternative to passwords and are being widely adopted by tech giants like Google, Apple, Microsoft, and others. In this episode we discuss the 5 reasons why Passkeys really are the future of login security. Buzz My…
…
continue reading
Cybersecurity in 2025 is a battlefield. The threats are smarter, faster, and more relentless than ever before. Let’s break down the Top Cyber Threat Trends you need to know about emerging cybersecurity trends in 2025. Buzz My Biz provides a unified cybersecurity platform ideal for business, education, healthcare, and local governments. Give us a ca…
…
continue reading

1
Invoice Fraud: Cybercriminals use fraudulent invoices to attacks SMBs
2:38
2:38
Play later
Play later
Lists
Like
Liked
2:38A concerning trend is emerging across the business landscape: cybercriminals are increasingly turning to invoice fraud as a tactic to exploit small and medium-sized businesses. Here's how to help prevent your business from falling victim to invoice fraud. Buzz My Biz provides a unified cybersecurity platform ideal for business, education, healthcar…
…
continue reading
I discuss the difficult topic of transgenderism and what it points to in terms of language, power, fundamental mental categories, and the direction of humanity. Support the showBy Paul Trimble
…
continue reading

1
Ep 42 The Limits of Science and a Hidden Insight from the Bible
19:36
19:36
Play later
Play later
Lists
Like
Liked
19:36For some time, modern Westerners have prided themselves on building and basing their beliefs purely on scientific evidence. But this was never true, and this reality is becoming more obvious. Where science cannot speak, the bible has an important paradigm for how we believe and live. Support the show…
…
continue reading

1
Ep 40 The Olympics Opening Ceremony Controversy
41:17
41:17
Play later
Play later
Lists
Like
Liked
41:17Some people took offense at performances during the opening ceremony of the 2024 Olympics in Paris. Were Christians imagining references to Jesus' Last Supper re-enacted by drag queens, or was it Greek mythology? Does it matter? Is there anything there to take offense? Support the showBy Paul Trimble
…
continue reading

1
Ep 38 - 5 Criticisms of Belief (and How to Process Them)
23:02
23:02
Play later
Play later
Lists
Like
Liked
23:02Sometimes it isn't the content of the critique but the tone and spirit of the critic that hits us hardest. In this episode, we talk through 5 critiques of belief and some ways to process them. Support the showBy Paul Trimble
…
continue reading
Sometimes we say we believe one thing, but our actions reflect that some part of us believes another. Whether we're open to that evidence may in turn shape our lives. This interview with Jordan Peterson and Susan Blackmore is a great dialogue to investigate how this works. (Apologies for the audio in this episode. I had a camera/mic issue.) If you …
…
continue reading
The landscape about belief has changed in the last several decades, but these developments take time to work their way through to the popular culture. In this episode we track a few of the macro-developments. Gary Habermas' website: https://www.garyhabermas.com/ Richard Hays' book: Echoes of Scriptures in the Gospels Support the show…
…
continue reading

1
Ep 36 - 3 Arguments Used to Dismiss Belief
15:02
15:02
Play later
Play later
Lists
Like
Liked
15:02You may hear versions of these three arguments for why believing in God is ridiculous or unreasonable. Hearing and considering them can help you decide what you do believe and why. Support the showBy Paul Trimble
…
continue reading
The ancient trope of making a bargain with the devil, then paying the price is one worth understanding and considering. Power, success, and advantage are nice in the moment, but what might we be giving away in their pursuit? Support the showBy Paul Trimble
…
continue reading

1
Ep 34 - 2016, The Year Everything Changed
26:36
26:36
Play later
Play later
Lists
Like
Liked
26:36If you've noticed a change in the environment in the last several years, you're not alone. Culture is always changing, but it seems the movement has accelerated in dramatic and unexpected ways during this specific time frame. What are the markers of that change, and what might be the reason for it? This is what we explore in this episode. Support t…
…
continue reading
From the mental health crisis and the meaning crisis, to growing interest in nonhuman beings, to the twin trans movements, is there something more than just the random unfolding of events at work when it comes to the flourishing and fulfillment of humankind? Support the showBy Paul Trimble
…
continue reading
The pressing issues and conflicts of our day should drive us to gain a clear understanding of what a human is and should be. Some of these same issues also may reveal how we are being challenged and undermined--and to what end. It's worth the effort to think and consider deeply, for as much clarity as possible. The shape of the future depends on it…
…
continue reading
What is a human? What are we for and what is our purpose? How you answer that question will determine how you view life and reality. The truth is something that is scary, but also more fantastical and better than any answer we could invent. Support the showBy Paul Trimble
…
continue reading
Is there a third way between avoiding the harsh realities and conflicts of the world, on one hand, and joining an entrenched position and posture of conflict, on the other? Jesus tapped into a rich vein, a kernel of truth, that we often miss, that enabled him to go from quiet reflection in the countryside to the heart of most tense geopolitical con…
…
continue reading