Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Persistent Campaign Podcasts

show episodes
 
Artwork
 
We're an actual play D&D group who almost exclusively uses homebrew setting expansions in our games. Our game has taken us to the worlds of One Piece, Star Wars, Pokemon, and Dragon Age so far. No matter where we end up, we're just a pack of chaos goblins in pretty hats. I have no idea how the DMs stay sane.
  continue reading
 
The power of Data is undeniable. And unharnessed - it’s nothing but chaos. Making data your ally. Using it to lead with confidence and clarity. Host Jess Carter is solving problems in real-time to reveal what’s possible. Helping communities and people thrive. This is Data Driven Leadership, a show brought to you by Resultant.
  continue reading
 
Politics and Religion. We’re not supposed to talk about that, right? Wrong! We only say that nowadays because the loudest, most extreme voices have taken over the whole conversation. Well, we‘re taking some of that space back! If you’re dying for some dialogue instead of all the yelling; if you know it’s okay to have differences without having to hate each other; if you believe politics and religion are too important to let ”the screamers” drown out the rest of us and would love some engagin ...
  continue reading
 
Artwork

1
Bringin' it Backwards

Adam & Tera Lisicky

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Bringin' It Backwards: podcast – giving driven musicians the invaluable insight they need to succeed in the music industry, by revealing how legendary musicians achieved stardom. Become a supporter of this podcast: https://www.spreaker.com/podcast/bringin-it-backwards--4972373/support.
  continue reading
 
Social Pulse Podcast: B2B Edition is your dedicated source for conquering the unique social media marketing challenges in the B2B sector - authentically. Join award-winning marketer Mike Allton as he connects with B2B marketing professionals, uncovering the persistent obstacles they encounter and the innovative strategies they employ to overcome them. Each episode offers an in-depth look at the real-world dynamics of B2B marketing - from navigating complex sales cycles to leveraging LinkedIn ...
  continue reading
 
Artwork

4
Democracy Decoded

Campaign Legal Center

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Let’s face it: This is an unprecedented time for our democracy. Many of our government’s checks and balances are being challenged or outright ignored. We did not arrive here because of one person or one policy, but rather the erosion of numerous safeguards, which, over time, have allowed some persistent issues with our system of government to be exploited. Decisions by the U.S. Supreme Court in recent years have favored secretive political donations and restrictive voting laws, reshaping our ...
  continue reading
 
The Conflict & Development in Africa podcast brings experts from Africa and the world as guests to discuss critical conflict and development issues that affect Africa. Our guests include practitioners, academics, journalists, researchers, policy makers and advocates that are renowned and are nationally and internationally recognized for their work, expertise and contribution to conflict and development issues in Africa. Our audience includes policy makers, governments, researchers, students, ...
  continue reading
 
Artwork

1
Searching for My Wives

William Bostock

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Imagine how it all began, this marvelous, long journey of Humanity. Some souls work for peace and happiness. Others, though, despoil, degrade, and kill. This is a novel of past lives, reincarnation, and our occult history. Not many protohumans were alive, one and one-half million years ago, but all of us had souls, and souls persist, and there are souls which lived in hominids in Chesowanja, eastern Africa who have lived among us almost to the present day. Shimmer loves his wives, Sita and A ...
  continue reading
 
Loading …
show series
 
In this episode, we explore the mounting scrutiny TikTok faces over its handling of European user data, with the EU’s Data Protection Commission (DPC) launching a fresh investigation into alleged transfers of data to China. TikTok, owned by Beijing-based ByteDance, is once again in the crosshairs for possible violations of the General Data Protecti…
  continue reading
 
As the cybersecurity landscape shifts toward hyperautomation and AI-driven autonomy, a new frontier has emerged: the identity and access security of machines. In this episode, we explore Booz Allen Ventures’ strategic investment in Corsha, a company at the forefront of Machine Identity Provider (mIDP) technology. Their collaboration marks a pivotal…
  continue reading
 
Windows Server Update Services (WSUS) has long been a cornerstone of enterprise patch management—but recent global synchronization failures have raised serious questions about its future viability. In this episode, we dissect the widespread outage that left organizations unable to sync critical Windows updates, unpacking both the technical cause an…
  continue reading
 
eSIM technology has transformed the way we connect—but has it also introduced new vulnerabilities into the heart of modern telecommunications? In this deep-dive episode, we dissect the security architecture, remote provisioning systems, and critical attack surfaces of embedded SIM (eSIM) technology, now deployed in billions of mobile, consumer, and…
  continue reading
 
In this solo episode, host Corey Nathan shares a personal story that explores a fundamental question many of us face in political and relational discourse: “Do you want to be right, or do you want the relationship?” Prompted by a real-life interaction following his attendance at a local rally, Corey examines how we navigate our convictions, the cos…
  continue reading
 
As Australia contends with a growing wave of cybersecurity incidents, this episode explores the intersection of national privacy laws, global supply chain vulnerabilities, and public trust in digital security. The recent Qantas data breach—affecting over 5 million customers—was the latest high-profile case to expose how fragile third-party service …
  continue reading
 
In this episode, we examine Taiwan’s growing alarm over Chinese mobile applications, especially TikTok and WeChat, in light of rising global concern over data privacy and foreign surveillance. A recent inspection by Taiwan’s National Security Bureau (NSB) revealed that these apps aggressively collect personal data and transmit it to servers located…
  continue reading
 
This episode exposes the growing menace of Atomic macOS Stealer (AMOS) — a rapidly evolving malware-as-a-service (MaaS) platform targeting macOS users worldwide. Once seen as a simple data stealer, AMOS has matured into a potent, long-term threat featuring keyloggers, a persistent backdoor, and system-level access, all designed to exfiltrate data a…
  continue reading
 
In this episode, we dissect CitrixBleed 2—a newly disclosed and actively exploited vulnerability affecting Citrix NetScaler ADC and Gateway appliances. Tracked as CVE-2025-5777 (and possibly also CVE-2025-6543), this critical flaw mirrors the notorious original CitrixBleed by allowing attackers to extract sensitive memory content, including user se…
  continue reading
 
In this episode, we break down SAP’s July 2025 Security Patch Day—a high-stakes moment for any enterprise relying on SAP’s core business applications. With 27 new and 4 updated security notes released, including seven rated as critical, this patch cycle directly targets some of the most serious vulnerabilities seen in SAP environments in recent mem…
  continue reading
 
In this episode, host Corey Nathan welcomes back political consultant, author, and Substack contributor Mike Madrid. A renowned expert on Latino voters and co-founder of the Lincoln Project, Mike brings his profound insights on American politics, identity, and democracy. Together, Corey and Mike explore deeply personal stories, historical context, …
  continue reading
 
In this episode, we explore a shadowy and unconfirmed—but highly consequential—data breach at Spanish telecommunications giant Telefónica. Allegedly orchestrated by the HellCat ransomware group, the breach involves a staggering 106GB of exfiltrated data, including internal communications, customer records, and employee information. Telefónica has y…
  continue reading
 
In this week’s episode, we focus on the controversial allegation of White Farmers’ Genocide in South Africa and Trump’s granting of Refugee Status to ‘persecuted’ white farmers in South Africa. I am joined by Professor Christi van der Westhuizen, Professor of Sociology at the University of Western Cape, Cape Town.…
  continue reading
 
The recent ransomware attack on Ingram Micro, a global technology distribution giant, reveals not only a sophisticated human-operated cyber assault—but also the fragile state of modern supply chain cybersecurity. In this episode, we break down how attackers, believed to be affiliated with the SafePay ransomware group, penetrated Ingram Micro’s infr…
  continue reading
 
With the party split and facing two different near death experiences simultaneously, there are a lot of unanswered questions… Will Ricky ever wake up? What do the dark ones want with 00M-3N and Sett? And will we find a way to destroy ourselves by accident? Send us a text Season 1 System: We are using the One Piece homebrew by Joyful Gent and Bluebe…
  continue reading
 
In a sudden and cryptic announcement, the notorious ransomware group Hunters International has declared its shutdown, citing “recent developments” and pledging to release decryption keys to victims. Active since late 2022 and suspected to be a rebrand of the earlier Hive ransomware gang, Hunters International has been responsible for attacks on nea…
  continue reading
 
A newly discovered and actively exploited zero-day vulnerability in Google Chrome has sent ripples through the cybersecurity community. Known as CVE-2025-6554, this critical type confusion flaw in Chrome’s V8 JavaScript and WebAssembly engine enables remote attackers to perform arbitrary read/write operations or execute code via a single malicious …
  continue reading
 
In this episode, we uncover a high-stakes cyber campaign targeting the heart of French digital infrastructure. ANSSI, France’s national cybersecurity agency, has exposed a Chinese-linked hacking group known as Houken (UNC5174 or Uteus) responsible for a widespread espionage operation since late 2024. This state-adjacent threat actor infiltrated cri…
  continue reading
 
In this episode, we examine a growing threat reshaping financial crime in Europe: sophisticated, technology-driven investment fraud. Spanish law enforcement has recently dismantled a fraud operation that spanned multiple years, deceived over 300 victims, and resulted in more than $11.8 million in losses. What made this case particularly notable was…
  continue reading
 
A devastating vulnerability—CVE-2025-20309—has been discovered in Cisco’s Unified Communications Manager (Unified CM) and its Session Management Edition (SME), threatening the security of over a thousand internet-exposed VoIP systems globally. In this episode, we break down this critical flaw, which scores a perfect CVSS 10.0, and explore why it's …
  continue reading
 
A new, highly advanced malware strain—NimDoor—has emerged as the latest cyber weapon in the arsenal of North Korean state-sponsored hackers, specifically targeting macOS systems used by cryptocurrency and Web3 organizations. This episode explores the complex tactics and alarming capabilities of NimDoor, a malware family showcasing a blend of C++ an…
  continue reading
 
This was such a refreshing conversation with Bishop Mariann Edgar Budde. We recorded it just after she delivered the homily at the National Cathedral the day after the inauguration. Bishop Budde's candor, winsomeness and wisdom shines through in all circumstances - whether it's before a worldwide audience or upon earnest reflection of the impact of…
  continue reading
 
A newly disclosed vulnerability—CVE-2025-20309—in Cisco's Unified Communications Manager (Unified CM) and Session Management Edition has sent shockwaves through enterprise VoIP and IT security teams. The flaw stems from hardcoded root SSH credentials that could allow unauthenticated remote attackers to gain full control of affected systems. In this…
  continue reading
 
A critical new WordPress vulnerability—CVE-2025-6463—has been discovered in the widely used Forminator plugin, affecting over 600,000 active installations and putting hundreds of thousands of websites at risk of full compromise. In this episode, we dive deep into the mechanics, risks, and remediation of this arbitrary file deletion flaw and explain…
  continue reading
 
In one of the latest large-scale data breaches to hit the U.S. private sector, Kelly Benefits, a provider of payroll and benefits administration services, disclosed a significant cybersecurity incident impacting over 553,000 individuals. The breach, which occurred in December 2024 but was only revealed in April 2025, exposed sensitive personal info…
  continue reading
 
Thank you for being a loyal listener! In this special, final episode, host Mike Allton shares some big, exciting news about the future of our podcast conversations. We're evolving and bringing everything under one roof to create a single, powerhouse weekly show designed to help social media managers win. Listen to this important announcement to hea…
  continue reading
 
A newly disclosed exploit dubbed FileFix is redefining how attackers bypass Microsoft Windows' built-in security protections—specifically the Mark-of-the-Web (MotW) mechanism. Developed and detailed by security researcher mr.d0x, this attack takes advantage of how browsers save HTML files and how Windows handles HTA (HTML Application) files. The re…
  continue reading
 
The International Criminal Court (ICC), the world’s foremost tribunal for prosecuting war crimes, genocide, and crimes against humanity, has confirmed yet another sophisticated cyberattack, highlighting the persistent threat facing high-profile global institutions. This marks the second targeted intrusion against the ICC in recent years, and althou…
  continue reading
 
In a major red flag for the industrial cybersecurity community, three newly disclosed vulnerabilities in Microsens NMP Web+, a popular network management solution used across critical infrastructure, have revealed just how fragile many ICS environments remain. The flaws—two rated critical and one high—allow unauthenticated attackers to bypass authe…
  continue reading
 
In a stark reminder of the aviation industry's growing exposure to cyber threats, Australian airline Qantas recently confirmed a serious data breach—this time not from its own systems, but from a third-party platform used by one of its customer contact centers. The breach exposed personal data for up to six million customers, including names, dates…
  continue reading
 
From writing better emails to helping her son learn the alphabet, Jess Carter is using AI in unexpected ways. In this Q&A episode, Jess shares how she’s integrating AI into both her professional and personal routines, with real examples that span leadership, data storytelling, parenting, and everyday problem-solving. She offers practical advice for…
  continue reading
 
Germany’s battle over digital sovereignty and data privacy has intensified, with the Berlin Commissioner for Data Protection formally requesting that Google and Apple remove the DeepSeek AI application from their app stores. The move stems from allegations that DeepSeek, a Chinese-developed generative AI platform, violates the EU’s General Data Pro…
  continue reading
 
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added multiple Citrix NetScaler vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog—an urgent signal for federal agencies and private enterprises alike. At the center of this update is CVE-2025-6543, a memory overflow flaw affecting NetScaler ADC and Gateway appli…
  continue reading
 
Cato Networks just raised $359 million in Series G funding, pushing its valuation past $4.8 billion and its total funding beyond the $1 billion mark—a milestone that cements its place as one of the most formidable players in the rapidly expanding Secure Access Service Edge (SASE) market. In this episode, we unpack what this massive investment means…
  continue reading
 
A new high-severity zero-day vulnerability in Google Chrome—CVE-2025-6554—has sent shockwaves across the cybersecurity landscape. This episode dives into the technical details, real-world impact, and broader implications of this actively exploited flaw. Tracked as a type confusion bug in Chrome’s V8 JavaScript engine, the vulnerability allows attac…
  continue reading
 
In this timely episode of "Talkin' Politics & Religion Without Killin' Each Other," host Corey Nathan speaks with Professor Daniel Mach, Director of the ACLU Program on Freedom of Religion and Belief and adjunct professor of law at the George Washington University Law School. They explore the complexities of First Amendment rights, the historical S…
  continue reading
 
In this week’s episode, we focus on the forthcoming elections in Cameroon. Cameroonians are set to go to the polls in October to choose their president. President Paul Biya has been the President since 1982. But at 92 years of age, sooner or later, he would have to make way for a successor. Who will replace Biya? And will this election mark the daw…
  continue reading
 
Russia has entered a new phase of digital authoritarianism. In a sweeping move, Russian Internet Service Providers (ISPs) have begun systematically throttling access to Cloudflare and other Western-backed services, including infrastructure giants Hetzner and DigitalOcean. This throttling is so severe that it restricts downloads to just 16 kilobytes…
  continue reading
 
Ahold Delhaize, one of the world’s largest food retailers, is now the subject of one of the most significant ransomware breaches in recent U.S. history. Affecting over 2.2 million current and former employees, this incident—claimed by the cybercrime group INC Ransom—highlights the rising threat posed by ransomware-as-a-service operations targeting …
  continue reading
 
We finally get a map of the area we’re about to enter, so now we can figure who is planting bombs and where and how we are going to use the resources we have at hand to kill/save the people we’re here for… Send us a text Season 1 System: We are using the One Piece homebrew by Joyful Gent and Bluebeary, which was inspired by u/Mr-Silvers. Season 2 S…
  continue reading
 
Canada has taken a definitive stance in the escalating global scrutiny of Chinese technology, ordering surveillance giant Hikvision to cease all operations within its borders. Citing national security concerns and acting on the advice of intelligence agencies, the Canadian government has banned the use of Hikvision products across its public sector…
  continue reading
 
As the aviation industry becomes more digitally interconnected, its exposure to sophisticated cyber threats continues to grow. One of the most dangerous actors in this space—Scattered Spider, a financially motivated and technically skilled cybercrime group—has recently shifted its focus to target the aviation sector. With recent incidents involving…
  continue reading
 
Have you ever hung up from a sales call and immediately thought of all the better responses you could have given? Or maybe you've sent your sales team into important conversations only to discover they weren't fully prepared for the tough questions that came their way? In today's high-stakes B2B environment, a single conversation can make or break …
  continue reading
 
In a landmark case that reshapes the conversation around digital ethics, the Federal Trade Commission’s $520 million settlement with Epic Games over its Fortnite monetization tactics highlights a critical issue facing the modern digital economy: the weaponization of interface design to manipulate users. Central to the case is the use of “dark patte…
  continue reading
 
Phishing has long been a favored weapon of cybercriminals, but a recent revelation about Microsoft 365’s Direct Send feature has elevated the threat to a new level—from inside the firewall. Designed for internal systems to send notifications without authentication, Direct Send can be abused by malicious actors to spoof emails that appear to origina…
  continue reading
 
A critical flaw in the Open VSX Registry—an open-source alternative to the Visual Studio Code Marketplace—recently put over 8 million developers at risk of mass compromise. This vulnerability, discovered in the platform’s GitHub Actions workflow, exposed a super-admin publishing token that could have enabled malicious actors to overwrite or inject …
  continue reading
 
A new critical vulnerability in Citrix NetScaler ADC and Gateway systems, dubbed CitrixBleed 2 (CVE-2025-5777), has emerged as a serious threat to remote access infrastructure. This memory exposure flaw allows unauthenticated attackers to extract session tokens directly from device memory — enabling session hijacking and even bypassing multi-factor…
  continue reading
 
A sophisticated cyber-espionage campaign named OneClik is actively targeting energy, oil, and gas organizations using a combination of legitimate cloud infrastructure and novel attack techniques. The campaign, attributed to an unknown but likely state-affiliated actor, leverages Microsoft's ClickOnce deployment technology to deliver custom Golang-b…
  continue reading
 
In October 2024, Central Kentucky Radiology (CKR), a Lexington-based imaging provider, became the latest victim of a growing trend in healthcare cyberattacks. An unauthorized actor accessed CKR’s systems over a two-day period, compromising sensitive data for approximately 167,000 individuals. The stolen information includes names, Social Security n…
  continue reading
 
In a major development at the intersection of cybersecurity and AI governance, Israeli startup Bonfy.AI has officially launched its adaptive content security platform, backed by $9.5 million in seed funding. The company’s mission is bold and timely: to secure content generated by both humans and AI across modern SaaS ecosystems — including high-ris…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play