What S The Data Point 공개
[search 0]
Download the App!
show episodes
 
Artwork

1
Happier with Gretchen Rubin

Gretchen Rubin / The Onward Project

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다+
 
Gretchen Rubin is HAPPIER, and she wants you to be happier too. The #1 bestselling author of The Happiness Project and Better Than Before gets more personal than ever as she brings her practical, manageable advice about happiness and good habits to this lively, thought-provoking podcast. Gretchen’s cohost and guinea pig is her younger sister, Elizabeth Craft, a TV writer and producer living in Los Angeles, who (lovingly) refers to Gretchen as her happiness bully. Sales and Distribution by Le ...
  continue reading
 
Leading the Way with Jill S. Robinson is a journey into the international arts and culture industry. Join Jill, a driving force in the sector who has counseled arts leaders for more than three decades, for conversations with some of the most insightful and daring minds leading the way to a resilient 21st century.
  continue reading
 
Loading …
show series
 
Jaguar Land Rover (JLR), one of the UK’s largest exporters and a key anchor of the nation’s automotive supply chain, has been brought to the brink by a devastating cyberattack. With production lines halted, digital operations crippled, and a data breach confirmed, the UK government stepped in with a massive £1.5 billion support package to stabilize…
  continue reading
 
The Cybersecurity Information Sharing Act (CISA), first enacted in 2015, is facing a critical expiration deadline in September 2025. Without reauthorization, the law that shields companies from liability when sharing cyber threat data with the federal government and industry peers will vanish, leaving organizations exposed to lawsuits and reputatio…
  continue reading
 
A new and more dangerous variant of the XCSSET macOS malware has been uncovered by Microsoft, revealing an expanded arsenal of capabilities aimed at financial theft and deeper system compromise. Originally known for spreading through malicious Xcode projects, XCSSET has steadily evolved into one of the most persistent malware families targeting App…
  continue reading
 
Cybersecurity researchers at Nozomi Networks have uncovered nine high-severity vulnerabilities in several older models of Cognex industrial cameras, including the widely deployed In-Sight 2000, 7000, 8000, and 9000 series. These machine vision systems are vital for modern manufacturing—guiding robots, inspecting products, and ensuring quality contr…
  continue reading
 
Microsoft has taken the unprecedented step of cutting off services to an Israeli military unit after internal and external investigations revealed its cloud and AI products were being used for mass surveillance of Palestinians in Gaza and the West Bank. This dramatic reversal came only after sustained reporting by The Associated Press and The Guard…
  continue reading
 
Interpol has announced the results of a sweeping cybercrime operation across 14 African nations, leading to the arrest of 260 individuals behind romance scams and sextortion schemes. The crackdown, conducted in July and August, exposed the alarming scale of digital exploitation sweeping the continent. Victims—more than 1,400 in total—were deceived,…
  continue reading
 
Britain is facing a troubling wave of cyberattacks that has shaken some of its most high-profile organizations. Harrods, the world-renowned luxury retailer, confirmed that customer names and contact details were compromised after attackers infiltrated a third-party vendor’s system. While account passwords and payment data were spared, the breach hi…
  continue reading
 
A simple childhood memory of jubilation raises a lasting question: Is it better to persist with activities we dislike and struggle with, or pursue what comes naturally? Get in touch: [email protected] Visit Gretchen's website to learn more about Gretchen's best-selling books, products from The Happiness Project Collection, and the Happier a…
  continue reading
 
Introducing my new podcast: Since You Asked! This is the first episode of my new show with my friend, the therapist and author Lori Gottlieb. Each week, we tackle the daily problems of living—the pet peeve that’s annoyed you for years, the question you’re too embarrassed to ask, or the dilemma you just can’t solve. If you enjoy this episode, follow…
  continue reading
 
This is a free preview of a paid episode. To hear more, visit www.pillarcatholic.com Ed shares a story from his Sunday. Are you a paying subscriber? * Visit pillarcatholic.com/listen on your phone * Check the top right corner of the webpage to ensure you are logged into your Substack account. * Tap ‘set up podcast’ next to The Pillar Podcast Having…
  continue reading
 
JD is not boycotting homework. Then, Pope Leo makes some appointments. JD and Ed talk about what the appointments may tell us about Pope Leo and his engagement with the Church in the United States. This episode is sponsored by Decided Excellence Catholic Media, helping Catholic parishes start their own parish magazines for the purposes of communica…
  continue reading
 
We talk about why asking for clarification is so important—yet it’s an easy step to skip. We also mention a listener’s great hack for nudging her kids to unclutter, and we discuss the urge to “use it up.” Resources & links related to this episode: Listen to the new podcast Since You Asked with Lori Gottlieb and Gretchen Rubin Elizabeth is reading: …
  continue reading
 
What happens when a trusted gaming platform becomes a weapon for cybercriminals? That’s exactly what unfolded with BlockBlasters, a free-to-play platformer on Steam that turned from harmless fun into a malicious cryptocurrency-draining scheme. For nearly two months, BlockBlasters appeared safe, even earning “Very Positive” reviews. But in late Augu…
  continue reading
 
Phishing is no longer just an email problem. A new wave of non-email phishing attacks is targeting employees through social media, instant messaging apps, SMS, malicious search engine ads, and even collaboration tools like Slack and Teams. These campaigns are designed to bypass traditional defenses—leaving organizations exposed while attackers expl…
  continue reading
 
Automotive giant Stellantis, the world’s fifth-largest automaker, has confirmed a data breach affecting its North American customers after attackers compromised a third-party service provider’s platform. While no financial data was exposed, the company acknowledged that customer contact details were stolen, prompting advisories to remain vigilant a…
  continue reading
 
Cybersecurity firm HoundBytes has officially launched WorkHorse, an automated security analyst designed to solve one of the biggest pain points in modern Security Operations Centers (SOCs): the Tier 1 bottleneck. Overwhelmed by a constant flood of raw alerts, Tier 1 analysts often suffer from burnout and slow triage times, putting organizations at …
  continue reading
 
Toronto-based cybersecurity startup Mycroft has stepped out of stealth with a bold promise: to give startups and small-to-midsize businesses (SMBs) the kind of enterprise-grade security typically reserved for Fortune 500 companies. Acting as an AI-powered “Security and Compliance Officer,” Mycroft deploys autonomous AI agents that manage an organiz…
  continue reading
 
The FBI has issued a warning to the public about a cyber campaign impersonating the Internet Crime Complaint Center (IC3), using spoofed websites to trick victims into handing over sensitive information and money. Between December 2023 and February 2025, the agency received more than 100 reports of malicious activity tied to fake IC3 domains. Threa…
  continue reading
 
A new cyber campaign is actively targeting macOS users with the Atomic Stealer (AMOS) malware, leveraging fake GitHub repositories disguised as legitimate software downloads. Security researchers tracking the campaign report that the operators are impersonating trusted brands such as LastPass, 1Password, Dropbox, Notion, and Shopify to lure unsuspe…
  continue reading
 
Netskope, a California-based cybersecurity firm specializing in secure access service edge (SASE) solutions, has officially gone public in one of the largest cybersecurity IPOs of 2025. Trading on the Nasdaq under the ticker symbol NTSK, the company raised more than $908 million by selling shares at $19 each. Investor enthusiasm was evident as the …
  continue reading
 
A startling new report from AI security platform SPLX reveals how attackers can bypass the built-in guardrails of AI agents like ChatGPT through a sophisticated exploit involving prompt injection and context poisoning. Traditionally, AI models are programmed to refuse solving CAPTCHAs, one of the most widely deployed tools for distinguishing humans…
  continue reading
 
A cyberattack on Collins Aerospace, a U.S.-based provider of passenger check-in and baggage handling software, plunged major European airports into chaos over the weekend. Beginning late Friday, the disruption rippled across hubs in Brussels, Berlin, and London, crippling critical check-in systems and forcing a reversion to manual operations. Bruss…
  continue reading
 
Our five senses constantly make adjustments and compromises—an observation that explains a cryptic comment by Andy Warhol. Get in touch: [email protected] Visit Gretchen's website to learn more about Gretchen's best-selling books, products from The Happiness Project Collection, and the Happier app. Find the transcript for this episode on th…
  continue reading
 
We explore whether it's better to seek out new experiences or enjoy familiar favorites when traveling. Plus, we share a surprising hack about alternatives to flossing, and how we’re approaching fall routines. Resources & links related to this episode: Learn your Tendency and learn more about the "Four Tendencies" framework "Dentists know you hate f…
  continue reading
 
A new security report has revealed serious, unpatched vulnerabilities in industrial control system (ICS) products manufactured by Novakon, a Taiwan-based subsidiary of iBASE Technology. Security researchers at CyberDanube identified five categories of flaws affecting Novakon’s Human-Machine Interfaces (HMIs), including an unauthenticated buffer ove…
  continue reading
 
JD and Ed talk about recently published excerpts of Pope Leo XIV’s first interviews— including his reflections on the papacy, Vatican finances, and the clerical sexual abuse crisis. This episode is sponsored by FaithInvestors.com. Let the experienced investment advisors at FaithInvestors.com help you align your finances and your faith without sacri…
  continue reading
 
The cybercrime group known as RevengeHotels, also tracked as TA558, has launched a new wave of attacks against the hospitality sector, evolving its tactics with the help of Artificial Intelligence (AI) and a powerful new malware strain, VenomRAT. Active since 2015, RevengeHotels has long targeted hotels, travel agencies, and tourism businesses to s…
  continue reading
 
A groundbreaking new cyberattack dubbed ShadowLeak has been uncovered targeting ChatGPT’s Deep Research capability, marking a dangerous escalation in AI-related threats. Unlike prior exploits such as AgentFlayer and EchoLeak, which operated on the client side, ShadowLeak weaponized OpenAI’s own cloud infrastructure to silently exfiltrate sensitive …
  continue reading
 
A new critical vulnerability, CVE-2025-9242, has been discovered in WatchGuard Firebox firewalls, putting thousands of networks worldwide at risk. The flaw stems from an out-of-bounds write bug in the Fireware OS’s iked process, which could allow a remote, unauthenticated attacker to execute arbitrary code. If exploited, this would grant full contr…
  continue reading
 
The SystemBC proxy botnet has quietly become one of the most persistent pillars of the cybercrime ecosystem. First detected in 2019, SystemBC is less about stealth and more about scale. It maintains an average of 1,500 compromised commercial virtual private servers (VPS) around the world, providing a powerful, high-bandwidth proxy network for cyber…
  continue reading
 
Tiffany and Company, the iconic luxury jeweler under the LVMH umbrella, has confirmed a serious data breach impacting over 2,500 customers across the United States and Canada. On or around May 12, 2025, hackers infiltrated Tiffany’s internal systems, compromising sensitive customer data tied to gift cards. Exposed information includes names, email …
  continue reading
 
In a major strategic move, Check Point Software Technologies has announced the acquisition of Lakera, a Zurich and San Francisco–based AI security firm founded by former Google and Meta AI researchers. Valued at around $300 million, the acquisition will close in late 2025 and serve as the foundation for Check Point’s new Global Center of Excellence…
  continue reading
 
A major supply chain attack is underway in the npm ecosystem. Dubbed Shai-Hulud, this worm-style campaign began with the compromise of the popular @ctrl/tinycolor package and has since infected at least 187 npm packages, including some published under CrowdStrike’s official account. The malware, designed to spread automatically, abuses the legitima…
  continue reading
 
A critical vulnerability has been uncovered in ChatGPT’s new calendar integration, exposing how attackers could exfiltrate sensitive user data—particularly emails—through a deceptively simple exploit. Security researchers at EdisonWatch, led by Eito Miyamura, demonstrated how a malicious calendar invitation could contain hidden instructions that Ch…
  continue reading
 
At Fal.Con 2025, CrowdStrike announced one of its boldest moves yet: the acquisition of AI security startup Pangea. The deal signals CrowdStrike’s intent to redefine the future of cybersecurity by protecting not just endpoints and networks, but the entire AI lifecycle. Pangea, founded in 2021, is known for cutting-edge tools like AI Guard, which pr…
  continue reading
 
Microsoft and Cloudflare have successfully dismantled RaccoonO365, a global phishing-as-a-service (PhaaS) operation that had been running for over a year. This criminal platform, marketed on Telegram and used by up to 200 subscribers, enabled attackers to craft realistic Microsoft 365 phishing campaigns, complete with fake login pages, email lures,…
  continue reading
 
There are about 100 days left in the year, and we discuss why starting your 100-day countdown can make you happier. We also explore a hack that will help you read, learn, and get entertained, and we share interesting responses from listeners about the power of engaging. Resources & links related to this episode: For the Happier Podcast Book Club: A…
  continue reading
 
Social engineering has reclaimed center stage as today’s most reliable intrusion vector—and it’s not just email anymore. Recent warnings from law enforcement and national cyber centers underscore how adversaries exploit human psychology to “log in, not hack in,” bypassing hardened perimeters with phishing, vishing (voice phishing) against IT help d…
  continue reading
 
The infamous Rowhammer vulnerability, long thought to be contained by new DRAM protections, has resurfaced with devastating force. Academic researchers, working with Google, have unveiled the Phoenix attack, a breakthrough Rowhammer variant that shatters the defenses of DDR5 memory chips. Despite the industry’s investment in Target Row Refresh (TRR…
  continue reading
 
Cybercriminals aren’t just breaking in—they’re borrowing your brand to do it. This episode dives into the critical intersection of brand protection, threat intelligence, and external attack surface management (EASM) and lays out a practical, intelligence-driven blueprint you can start applying today. We begin with the state of brand abuse: a sharp …
  continue reading
 
California’s Assembly Bill 566 (AB 566) has become one of the most hotly contested pieces of privacy legislation in the country. The bill would require universal “opt-out preference signals” in web browsers and mobile operating systems, allowing consumers to automatically block the sale and sharing of their personal data across the internet. Propon…
  continue reading
 
FinWise Bank is facing a double crisis—one of data security and another of public trust. Nearly 700,000 customers of American First Finance (AFF), a FinWise partner, were impacted by a massive data breach after a former employee improperly accessed sensitive records. The bank has responded with offers of free credit monitoring, but the damage to co…
  continue reading
 
This is a free preview of a paid episode. To hear more, visit www.pillarcatholic.com JD has a story for Ed. Are you a paying subscriber? * Visit pillarcatholic.com/listen on your phone * Check the top right corner of the webpage to ensure you are logged into your Substack account. * Tap ‘set up podcast’ next to The Pillar Podcast Having issues? Ema…
  continue reading
 
Texas’s extremely successful anti-littering campaign illustrates an important principle about habit change: Sometimes changing our habits requires us first to change our identity. Get in touch: [email protected] Visit Gretchen's website to learn more about Gretchen's best-selling books, products from The Happiness Project Collection, and th…
  continue reading
 
Feeling the end-of-summer slump? In this revisited episode, we share 7 practical strategies that can help you rebuild your routine for fall—especially if you're dragging your feet. September is the other January, and this “starter kit” for habit change will help you reset without forcing it. Resources & links related to this episode: Better Than Be…
  continue reading
 
This is a free preview of a paid episode. To hear more, visit www.pillarcatholic.com This is the west. Are you a paying subscriber? * Visit pillarcatholic.com/listen on your phone * Check the top right corner of the webpage to ensure you are logged into your Substack account. * Tap ‘set up podcast’ next to The Pillar Podcast Having issues? Email ou…
  continue reading
 
This is a free bonus episode of The Pillar Podcast. Subscribe to The Pillar today to access every bonus episode of The Pillar Podcast. What does it mean to be a Christian in America right now? Are you a paying subscriber? * Visit pillarcatholic.com/listen on your phone * Check the top right corner of the webpage to ensure you are logged into your S…
  continue reading
 
Ed talks about reactions to Pope Leo XIV’s suppression of two dioceses and creation of a new diocese in mainland China. Then, the Traditional Latin Mass will be celebrated next month on the main altar of St. Peter’s Basilica. JD and Ed talk about what the move could signify for future application of Traditionis custodes. Ed plays a round of video g…
  continue reading
 
We talk about why it can be very valuable to question our assumptions, and we also share hacks for helping a child moving into a college dorm. Plus we discuss a listener’s feelings of Obliger-rebellion due to the unacknowledged work she does for her family. Resources & links related to this episode: Listen to the new podcast Since You Asked with Lo…
  continue reading
 
In late August 2025, the open-source software ecosystem was rocked by a sophisticated two-phase supply chain attack, now known as “s1ngularity.” The incident began when attackers exploited a flaw in GitHub Actions workflows for the Nx repository, stealing an NPM publishing token and using it to release malicious versions of Nx packages. These packa…
  continue reading
 
Loading …

빠른 참조 가이드

탐색하는 동안 이 프로그램을 들어보세요.
재생