Alter X public
[search 0]
More

Download the App!

show episodes
 
Author of THE DARK PATH Isaac Weishaupt hosts this show focused on pop culture and its role in the occult agenda to instill ritualistic symbolism in entertainment! This podcast provides unbiased opinions and discussion on the symbolism, theories, pop culture, music, film, gossip and celebrity tabloids; in a safe and positive light with respect to all opinions and world views. Isaac Weishaupt has been on the leading edge of conspiracy theories surrounding the elusive “Illuminati” and its infi ...
 
Welcome to the Geordie Geek podcast - a veritable feast of geeky things from Tech to Gadgets to Scifi and the odd sneaker thrown in for fun. This week we cover Bladerunner, PS4 Games Before Dawn and Star Wars X Wing VR, Apple Watch vs The Fenix 3, The amazing Yeti Speaker and even the odd Yeezy is mentioned. Enjoy!
 
Hey! I'm Kate Maree O'Brien and I'm deeply passionate about women switching on their inner leadership muscles and being highly effective in what they're out to cause in the world.⁣ ⁣These days, I'm the founder of SHE, Australasia's largest women's leadership and empowerment event, a multiple business owner with a rockstar team of 11 incredibly committed full-timers, a women's leadership coach, trainer and speaker - and - wife to Henare, and mum to our two teenagers (who keep us on our toes), ...
 
Loading …
show series
 
Guest Michael DeBolt, Chief Intelligence Officer from Intel471, joins Dave Bittner to discuss their work on "How Groove Gang is shaking up the Ransomware-as-a-Service market to empower affiliates." McAfee Enterprise ATR believes, with high confidence, that the Groove gang is associated with the Babuk gang, either as a former affiliate or subgroup. …
 
A CISA-issued Joint Advisory warns of threats and vulnerabilities at water and wastewater treatment facilities. CISA issues twenty-two other industrial control system advisories. Andrea Little Limbago from Interos on trends in the human element of security. Our guest is Gidi Cohen from Skybox with Vulnerability and Threat Trends. And the Governor o…
 
Data breach extortion seems to be an emerging criminal trend. Notes on a darknet market’s retirement. Verizon advises Visible users to look to their credentials. Windows users’ attention is drawn to seven potentially serious vulnerabilities (all patchable). The Necro botnet is installing Monero cryptojackers. Organizing an international response to…
 
A Chinese-speaking APT is distributing the MysterySnail RAT in what appears to be a cyberespionage campaign. Some users still haven’t patched vulnerable SolarWinds instances. Notes on yesterday’s Patch Tuesday. The US-convened international ransomware conference kicked off today, and Russia wasn’t invited. Former users of a criminal booter service …
 
Doc welcomes film director, David Yarovesky aka Yarvo, to the show and they talk about David making a name for himself as music video director for bands like Korn, how he got his first break doing a fundraiser party that attracted supporters like Wes Craven, Matt Parker, and Trey Stone, the litany of difficulties and challenges that go along with n…
 
We break down the symbolism of the Netflix global phenomenon called "SQUID GAMES!" There's so much to unpack on this first season- we'll talk about the Illuminati elites playing the game, the initiation ritual of the main character as he traverses the Kabbalah Tree of Life (the ACTUAL squid game...), Christianity, death and rebirth, human furniture…
 
Teheran is running password spraying attacks (especially on Thursdays and Sundays). More on the renewed popularity of DDoS attacks. NCSC warns British businesses against ransomware. Two journalists win the Nobel Peace Prize. Joe Carrigan shares his thoughts on GriftHorse. Our guest is Bindu Sundaresan from AT&T Cybersecurity football season and cyb…
 
We do a plot-spoiling film analysis of James Wan's latest horror film "Malignant!" We'll go through the whole film, discuss all of the symbolism of MKULTRA, the devil, serpents, Q @n0n 17, the Caduceus, Carl Jung's Shadow and the occult initiation ritual the characters go through to 'know thyself!' Screenshot images discussed are at my Instagram, l…
 
Our guest is author and journalist Steven Levy. He’s editor-at-large at Wired and his most recent book is "Facebook: The Inside Story. Steven offers his insights on Facebook’s internal research teams, Ben shares a newly-decided court case on whether Big Tech companies can be sued under the Anti-Terrorism statute, and Dave's got the story of some wa…
 
Lieutenant in the US Navy and Skillbridge Fellow at the CyberWire, Brandon Karpf, knew he wanted to join the military at a young age. He achieved that through the US Naval Academy where he was a member of the men's heavyweight rowing team. Commissioning into the cryptologic field as a naval cryptologic warfare officer, Brandon was sent to MIT for a…
 
Matt Stafford, Senior Threat Intelligence Researcher, from Prevailion joins Dave to talk about their work on "Diving Deep into UNC1151’s Infrastructure: Ghostwriter and beyond." Prevailion’s Adversarial Counterintelligence Team (PACT) used advanced infrastructure hunting techniques and Prevailion’s visibility into threat actor infrastructure creati…
 
Google warns fourteen-thousand Gmail users that Fancy Bear has probably been after their passwords. FIN12, a fast-running ransomware group, is after hospitals’ and healthcare providers’ money. BlackMatter remains active against the agriculture sector. REvil is back and talking on the RAMP forum, but so far it’s getting a chilly reception. Twitch tr…
 
Cyberespionage seems undeterred by stern warnings. DDoS hits the Philippine Senate. The US Department of Homeland Security intends to issue cybersecurity regulations for passenger rail and airlines. The US Department of Justice intends to use the False Claims Act to bring civil actions against government contractors who fail to follow “recognized c…
 
For 100 million Americans, the glowing red line is the VINO's - vaccines in name only - and they will fight to the death against taking Satan's Shot. But it's the battle over workplace masks and testing where the enemy is getting easy wins. Links mentioned in the show: https://www.marcionitechurch.org/covidscam.html https://www.theveryfirstbible.or…
 
For 100 million Americans, the glowing red line is the VINO's - vaccines in name only - and they will fight to the death against taking Satan's Shot. But it's the battle over workplace masks and testing where the enemy is getting easy wins. Links mentioned in the show: https://www.marcionitechurch.org/covidscam.html https://www.theveryfirstbible.or…
 
Twitch is breached. A newly discovered Iranian threat group is described. A Chinese cyberespionage campaign in India proceeds by phishing. SafeMoon alt-coin is trendy phishbait in criminal circles. As the US prepares to convene an anti-ransomware conference, Russian gangs show no signs of slacking off. Betsy Carmelite from BAH on AI/ ML in cyber de…
 
Doc welcomes Alter Bridge and Creed guitarist, Mark Tremonti, to the show and they talk about working on his new solo album, the secret to his very organized writing process, his thoughts on Creed's legacy, dealing with the critical backlash of being in such a big band, how starting Alter Bridge was a chance to do something totally different from C…
 
Today is a crossover show- a perfect blend of Conspiracy Theories & Unpopular Culture with Breaking Social Norms! The topic at hand called for this joint venture where Mrs Josie Weishaupt joins us to discuss and debate the conspiracies about why Facebook shut down on October 4th! We'll also hit the BSN Patreon Tier 2 shoutouts- thank you!! Be sure …
 
Facebook restores service after dealing with an accidental BGP configuration issue. There’s now a data auction site for AvosLocker ransomware. Atom Silo ransomware is quiet, patient, and stealthy. The state of investigation into those two guys collared on a ransomware beef in Kyiv last week. Ben Yelin is skeptical of data privacy poll results. Our …
 
The Pandora Papers leak erstwhile private financial transactions by the rich and well-connected (and it’s 150 mainstream news organizations who cooperated in bringing them to light). Flubot is using itself to scare victims into installing Flubot. Coinbase thieves exploited account recovery systems to obtain 2FA credentials. The US plans to convene …
 
We catch up on a ton of headlines over the past few weeks before diving into this new show called Alter Ego! We'll cover all themed celeb news like Demi Lovato, Ozzy Osbourne and Snooki from Jersey Shore! Links: *****Check out the episode of 'BREAKING SOCIAL NORMS' where we discuss that Rolling Stone 500 Greatest Songs: https://breakingsocialnorms.…
 
Moving to the cloud creates a tremendous opportunity to get security right and reduce the risk of data breach. But most cloud security initiatives get underway after services are deployed in the cloud. It’s frustrating when major breaches resulting from basic mistakes, like S3 buckets left unsecured or secrets exposed. Continually checking for risk…
 
Product Manager in Anti-Fraud Solutions at SpyCloud, Pattie Dillon shares her journey from raising her family to specializing in the anti-fraud space. Upon reentering the workforce, Pattie worked on identity verification and developed a system with privacy concerns in mind. She moved to work in gift cards and was exposed to money laundering. Travel…
 
Dan Petro, Lead Researcher, and Allan Cecil, Security Consultant, from Bishop Fox join Dave to share their research "You're Doing IoT RNG," that they presented at DefCon 29. There’s a crack in the foundation of Internet of Things (IoT) security, one that affects 35 billion devices worldwide. Basically, every IoT device with a hardware random number…
 
A malware campaign offers bogus protection against Pegasus surveillance. A new APT, ChamelGang, is found active against targets in at least ten countries. A ransomware gang can’t get its decryptor right. A proof-of-concept shows that charges can be made from a non-contact Visa card in an iPhone wallet. David Dufour from Webroot warns of potential p…
 
GriftHorse will subscribe afflicted Android users to premium services they never knew they’d signed up for (and wouldn’t want if they did). Facebook releases a static analysis tool it uses internally to check apps for security issues. Speculation about what put Group-IB’s CEO in hot water with the Kremlin. A look from NSA about where the major nati…
 
Distributed denial-of-service attacks have been making a comeback, and many of them represent criminal extortion attempts. A major British payroll provider is recovering from a cyberattack, but it’s not providing much information on the nature of that attack. Russian authorities arrest the founder of Group-IB on treason charges. Johannes Ullrich fr…
 
Doc welcomes Exodus guitarist, Gary Holt, to the show and they talk about the challenges of navigating a divisive social media landscape, recording the new Exodus album with mutual friend and colleague, Steve Lagudi, the secret to the "Gary Holt guitar sound", how he adjusted his playing and sound in his time playing with Slayer, how playing with S…
 
We have our final installment of the Tier 4 Conspiracy Considerations segments! We'll discuss the background of the project before being joined by two guests- Josh and John! Special thanks to all the Tier 4 folks: Southside Tarot, Cheryl, Jason F., John, BigFezzik, Jon P, Wally and Josh! Here's where you can get more from the guests: More links: Jo…
 
If the Apostle Paul teleported to the present day, his words and warnings would ring just as true now as they did 2,000 years ago. In today's episode we look at his blueprint for identifying and defeating the demonic forces behind the Covid reset and the VINO's - vaccines in name only. Institutions and links mentioned in the show: https://www.first…
 
If the Apostle Paul teleported to the present day, his words and warnings would ring just as true now as they did 2,000 years ago. In today's episode we look at his blueprint for identifying and defeating the demonic forces behind the Covid reset and the VINO's - vaccines in name only. Institutions and links mentioned in the show: https://www.first…
 
The triumphant homecoming of Huawei’s CFO. Microsoft describes the FoggyWeb backdoor, a significant cyberespionage tool. Kaspersky looks at the BloodyStealer Trojan and finds it especially risky to gamers. A novel approach to distributed denial-of-service. Apple looks into those iPhone zero-days. Joe Carrigan looks at the latest offerings in passwo…
 
Imagine you have two friends who are obsessed with crime, murder, and unsolved mysteries. They have a passion for breaking down cases that have been cold for years. GENERATION WHY is a true crime podcast where hosts Aaron and Justin give startling theories, dive into forensic evidence, and share their bold opinions. They dig deep looking for answer…
 
The EU publicly blames Russia for GhostWriter, and counsels Moscow to amend its ways. Finland’s security services warn of foreign cyberespionage and influence threats. Zoombombing at the highest levels in Cambodia. A ransomware operation, “Colossus,” is described. Conti is back, as predicted, and has hit a major European call center. Dinah Davis fr…
 
If you need to start at Part 1 of the 9/11 Conspiracy Theories series you can start here: https://wp.me/p2ijVF-b8H We continue our journey of decoding the occult symbolism and conspiracy theories around 9/11! On this special series of four shows, we'll commemorate the 20th anniversary of the biggest PsyOp of occult symbolism EVER! We'll conclude ou…
 
Host of the CyberWire Podcast, Dave Bittner, wanted to work with the Muppets, so naturally he landed in cybersecurity. Dave and his Cookie Monster puppet spent much of his childhood putting on shows for his parents friends. During one of those performances, he was discovered and got his start at the local PBS station. A radio, television and film m…
 
The commonly held, idealized picture of technology is that tech makes our lives easier, safer, and better in just about every respect. But an unintended consequence of that picture is an unjustified assumption that companies will sell more products if they serve the public interest, and that may not be so. On the consumer side, personal technology …
 
Guest Ariel Zelivansky, Senior Manager of Security Research at Palo Alto Networks, joins Dave to discuss Unit 42's work on the first cross-account container takeover in the public cloud. The Unit 42 Threat Intelligence team has identified the first known vulnerability that could enable one user of a public cloud service to break out of their enviro…
 
Someone is phishing for Russian rocketeers. The Port of Houston discloses a cyberattack, which the Port says it deflected before it had operational consequences. Ransomware gangs are up and active, and the US is considering mandatory reporting by victims as a defensive policy. Pegasus spyware is said to have been found in the phones of five French …
 
After over 60,000 downloads in over 100 countries, we are so glad to have brought an entire cycle of Torah study to our listeners. Rabbi Adam and Raviv look back at a year filled with inspiring conversation, insight, and wisdom. Thanks for joining. The Study is produced by Evan Scott Nicholas and Raviv Ullman. Artwork by Julia Pott.…
 
Ransomware hits a second US Midwestern farm co-op. The US House hears from the FBI that Russia seems not to have modified its toleration of privateering gangs (at least yet). A new APT, “FamousSparrow,” is described. REvil seems to have been--surprise!--cheating its criminal affiliates. Josh Ray from Accenture with an update on the Hades Threat Gro…
 
BlackMatter continues to make a nuisance of itself on a large scale. The US is woofing about taking action against ransomware, and Treasury has sanctioned a rogue cryptocurrency exchange, but some advocate stronger measures. Where did all those Ukrainian cybercriminal chat platforms go? A warning of the “censor mode” in some Chinese manufactured sm…
 
Doc welcomes Spirit Adrift guitarist and vocalist, Nate Garrett, to the show, and they talk about getting out there and seeing live music again, how he started Spirit Adrift originally as a one-man band, getting his drum chops up to snuff to record the first album, his time with the band Gatecreeper, why he quit drinking and chose a sober life, wha…
 
Ransomware hits an Iowa agricultural cooperative, which doesn’t meet, the criminals say, the standard for “critical infrastructure.” US Treasury Department announces steps against ransomware’s economic support system. Did Kaseya get its REvil decryptor from the FBI? Ben Yelin describes a major federal court victory for security researchers. Our gue…
 
Cyber electioneering, in Hungary and Russia, the latter with some international implications. The Mirai botnet is exploiting the OMIGOD vulnerability. A shipping company deals with data extortion. Government websites have been serving up some oddly adult-themed ads. Malek Ben Salem from Accenture has thoughts on quantum security in the automotive i…
 
If you need to start at Part 1 of the 9/11 Conspiracy Theories series you can start here: https://wp.me/p2ijVF-b8H We continue our journey of decoding the occult symbolism and conspiracy theories around 9/11! On this special series of four shows, we'll commemorate the 20th anniversary of the biggest PsyOp of occult symbolism EVER! Part 3 begins our…
 
Executive Security Advisor at IBM Security Limor Kessem says she started her cybersecurity career by pure chance. Limor made a change from her childhood dream of being a doctor and came into cybersecurity with her passion, investment, discipline, and perseverance. Limor talks about how we must tighten our core security and at the same time we allow…
 
Guest Jake Valletta, Director of Professional Services at Mandiant, joins Dave to talk about the critical vulnerability Mandiant disclosed that affects millions of IoT devices. Mandiant disclosed a critical risk vulnerability in coordination with the Cybersecurity and Infrastructure Security Agency (“CISA”) that affects millions of IoT devices that…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login