Great Catholic Conversation, each week. www.pillarcatholic.com
…
continue reading
Gretchen Rubin is HAPPIER, and she wants you to be happier too. The #1 bestselling author of The Happiness Project and Better Than Before gets more personal than ever as she brings her practical, manageable advice about happiness and good habits to this lively, thought-provoking podcast. Gretchen’s cohost and guinea pig is her younger sister, Elizabeth Craft, a TV writer and producer living in Los Angeles, who (lovingly) refers to Gretchen as her happiness bully. Sales and Distribution by Le ...
…
continue reading
Leading the Way with Jill S. Robinson is a journey into the international arts and culture industry. Join Jill, a driving force in the sector who has counseled arts leaders for more than three decades, for conversations with some of the most insightful and daring minds leading the way to a resilient 21st century.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading

1
Jaguar Land Rover Cyberattack Fallout: £1.5B UK Bailout Sparks Fears of More Attacks
27:34
27:34
나중에 재생
나중에 재생
리스트
좋아요
좋아요
27:34Jaguar Land Rover (JLR), one of the UK’s largest exporters and a key anchor of the nation’s automotive supply chain, has been brought to the brink by a devastating cyberattack. With production lines halted, digital operations crippled, and a data breach confirmed, the UK government stepped in with a massive £1.5 billion support package to stabilize…
…
continue reading

1
CISA’s Sunset Clause: What Happens if America’s Cyber Threat Shield Expires?
24:00
24:00
나중에 재생
나중에 재생
리스트
좋아요
좋아요
24:00The Cybersecurity Information Sharing Act (CISA), first enacted in 2015, is facing a critical expiration deadline in September 2025. Without reauthorization, the law that shields companies from liability when sharing cyber threat data with the federal government and industry peers will vanish, leaving organizations exposed to lawsuits and reputatio…
…
continue reading

1
Crypto Theft on macOS: XCSSET Malware Swaps Wallet Addresses in Real Time
23:49
23:49
나중에 재생
나중에 재생
리스트
좋아요
좋아요
23:49A new and more dangerous variant of the XCSSET macOS malware has been uncovered by Microsoft, revealing an expanded arsenal of capabilities aimed at financial theft and deeper system compromise. Originally known for spreading through malicious Xcode projects, XCSSET has steadily evolved into one of the most persistent malware families targeting App…
…
continue reading

1
Nine High-Severity Vulnerabilities Expose Cognex Legacy Cameras to Cyber Threats
26:21
26:21
나중에 재생
나중에 재생
리스트
좋아요
좋아요
26:21Cybersecurity researchers at Nozomi Networks have uncovered nine high-severity vulnerabilities in several older models of Cognex industrial cameras, including the widely deployed In-Sight 2000, 7000, 8000, and 9000 series. These machine vision systems are vital for modern manufacturing—guiding robots, inspecting products, and ensuring quality contr…
…
continue reading

1
Microsoft Cuts Services to Israeli Military Unit After Surveillance Revelations
28:39
28:39
나중에 재생
나중에 재생
리스트
좋아요
좋아요
28:39Microsoft has taken the unprecedented step of cutting off services to an Israeli military unit after internal and external investigations revealed its cloud and AI products were being used for mass surveillance of Palestinians in Gaza and the West Bank. This dramatic reversal came only after sustained reporting by The Associated Press and The Guard…
…
continue reading

1
Ghana, Senegal, Ivory Coast at the Center of Interpol’s Multi-Nation Cybercrime Takedown
27:23
27:23
나중에 재생
나중에 재생
리스트
좋아요
좋아요
27:23Interpol has announced the results of a sweeping cybercrime operation across 14 African nations, leading to the arrest of 260 individuals behind romance scams and sextortion schemes. The crackdown, conducted in July and August, exposed the alarming scale of digital exploitation sweeping the continent. Victims—more than 1,400 in total—were deceived,…
…
continue reading

1
Harrods Data Breach Exposes Customer Details in Third-Party Hack
22:17
22:17
나중에 재생
나중에 재생
리스트
좋아요
좋아요
22:17Britain is facing a troubling wave of cyberattacks that has shaken some of its most high-profile organizations. Harrods, the world-renowned luxury retailer, confirmed that customer names and contact details were compromised after attackers infiltrated a third-party vendor’s system. While account passwords and payment data were spared, the breach hi…
…
continue reading

1
Little Happier: Good Idea or Bad Idea? Do I Regret My Experience, or Not? I Can’t Decide.
3:25
3:25
나중에 재생
나중에 재생
리스트
좋아요
좋아요
3:25A simple childhood memory of jubilation raises a lasting question: Is it better to persist with activities we dislike and struggle with, or pursue what comes naturally? Get in touch: [email protected] Visit Gretchen's website to learn more about Gretchen's best-selling books, products from The Happiness Project Collection, and the Happier a…
…
continue reading

1
More Happier: Introducing “Since You Asked with Gretchen Rubin and Lori Gottlieb”
35:27
35:27
나중에 재생
나중에 재생
리스트
좋아요
좋아요
35:27Introducing my new podcast: Since You Asked! This is the first episode of my new show with my friend, the therapist and author Lori Gottlieb. Each week, we tackle the daily problems of living—the pet peeve that’s annoyed you for years, the question you’re too embarrassed to ask, or the dilemma you just can’t solve. If you enjoy this episode, follow…
…
continue reading
This is a free preview of a paid episode. To hear more, visit www.pillarcatholic.com Ed shares a story from his Sunday. Are you a paying subscriber? * Visit pillarcatholic.com/listen on your phone * Check the top right corner of the webpage to ensure you are logged into your Substack account. * Tap ‘set up podcast’ next to The Pillar Podcast Having…
…
continue reading
JD is not boycotting homework. Then, Pope Leo makes some appointments. JD and Ed talk about what the appointments may tell us about Pope Leo and his engagement with the Church in the United States. This episode is sponsored by Decided Excellence Catholic Media, helping Catholic parishes start their own parish magazines for the purposes of communica…
…
continue reading

1
Ep. 553: Ask for Clarification, an Easy Way to Unclutter & a “Use It Up” Epiphany
31:56
31:56
나중에 재생
나중에 재생
리스트
좋아요
좋아요
31:56We talk about why asking for clarification is so important—yet it’s an easy step to skip. We also mention a listener’s great hack for nudging her kids to unclutter, and we discuss the urge to “use it up.” Resources & links related to this episode: Listen to the new podcast Since You Asked with Lori Gottlieb and Gretchen Rubin Elizabeth is reading: …
…
continue reading

1
Steam Game BlockBlasters Turns Malicious, Drains $150K in Crypto
29:37
29:37
나중에 재생
나중에 재생
리스트
좋아요
좋아요
29:37What happens when a trusted gaming platform becomes a weapon for cybercriminals? That’s exactly what unfolded with BlockBlasters, a free-to-play platformer on Steam that turned from harmless fun into a malicious cryptocurrency-draining scheme. For nearly two months, BlockBlasters appeared safe, even earning “Very Positive” reviews. But in late Augu…
…
continue reading

1
Beyond the Inbox: The Rising Threat of Non-Email Phishing Attacks
26:15
26:15
나중에 재생
나중에 재생
리스트
좋아요
좋아요
26:15Phishing is no longer just an email problem. A new wave of non-email phishing attacks is targeting employees through social media, instant messaging apps, SMS, malicious search engine ads, and even collaboration tools like Slack and Teams. These campaigns are designed to bypass traditional defenses—leaving organizations exposed while attackers expl…
…
continue reading

1
Stellantis Data Breach Exposes Contact Info in Third-Party Provider Attack
24:09
24:09
나중에 재생
나중에 재생
리스트
좋아요
좋아요
24:09Automotive giant Stellantis, the world’s fifth-largest automaker, has confirmed a data breach affecting its North American customers after attackers compromised a third-party service provider’s platform. While no financial data was exposed, the company acknowledged that customer contact details were stolen, prompting advisories to remain vigilant a…
…
continue reading

1
HoundBytes Launches WorkHorse to Eliminate SOC Tier 1 Bottlenecks
20:34
20:34
나중에 재생
나중에 재생
리스트
좋아요
좋아요
20:34Cybersecurity firm HoundBytes has officially launched WorkHorse, an automated security analyst designed to solve one of the biggest pain points in modern Security Operations Centers (SOCs): the Tier 1 bottleneck. Overwhelmed by a constant flood of raw alerts, Tier 1 analysts often suffer from burnout and slow triage times, putting organizations at …
…
continue reading

1
Toronto’s Mycroft Raises $3.5M to Bring AI Security Officers to Startups
29:58
29:58
나중에 재생
나중에 재생
리스트
좋아요
좋아요
29:58Toronto-based cybersecurity startup Mycroft has stepped out of stealth with a bold promise: to give startups and small-to-midsize businesses (SMBs) the kind of enterprise-grade security typically reserved for Fortune 500 companies. Acting as an AI-powered “Security and Compliance Officer,” Mycroft deploys autonomous AI agents that manage an organiz…
…
continue reading

1
FBI Issues Guidance as Fraudsters Pose as IC3 to Extort Victims
10:29
10:29
나중에 재생
나중에 재생
리스트
좋아요
좋아요
10:29The FBI has issued a warning to the public about a cyber campaign impersonating the Internet Crime Complaint Center (IC3), using spoofed websites to trick victims into handing over sensitive information and money. Between December 2023 and February 2025, the agency received more than 100 reports of malicious activity tied to fake IC3 domains. Threa…
…
continue reading

1
Fraudulent GitHub Repos Spread Atomic Stealer Malware Targeting macOS Users
22:08
22:08
나중에 재생
나중에 재생
리스트
좋아요
좋아요
22:08A new cyber campaign is actively targeting macOS users with the Atomic Stealer (AMOS) malware, leveraging fake GitHub repositories disguised as legitimate software downloads. Security researchers tracking the campaign report that the operators are impersonating trusted brands such as LastPass, 1Password, Dropbox, Notion, and Shopify to lure unsuspe…
…
continue reading

1
Netskope’s IPO Raises $908M: SASE Leader Surges 18% on First Trading Day
10:50
10:50
나중에 재생
나중에 재생
리스트
좋아요
좋아요
10:50Netskope, a California-based cybersecurity firm specializing in secure access service edge (SASE) solutions, has officially gone public in one of the largest cybersecurity IPOs of 2025. Trading on the Nasdaq under the ticker symbol NTSK, the company raised more than $908 million by selling shares at $19 each. Investor enthusiasm was evident as the …
…
continue reading

1
SPLX Exposes AI Exploit: Prompt Injection Tricks ChatGPT Into Solving CAPTCHAs
24:17
24:17
나중에 재생
나중에 재생
리스트
좋아요
좋아요
24:17A startling new report from AI security platform SPLX reveals how attackers can bypass the built-in guardrails of AI agents like ChatGPT through a sophisticated exploit involving prompt injection and context poisoning. Traditionally, AI models are programmed to refuse solving CAPTCHAs, one of the most widely deployed tools for distinguishing humans…
…
continue reading

1
Brussels, Berlin, London Hit Hard as Cyber Disruption Sparks Flight Chaos
23:50
23:50
나중에 재생
나중에 재생
리스트
좋아요
좋아요
23:50A cyberattack on Collins Aerospace, a U.S.-based provider of passenger check-in and baggage handling software, plunged major European airports into chaos over the weekend. Beginning late Friday, the disruption rippled across hubs in Brussels, Berlin, and London, crippling critical check-in systems and forcing a reversion to manual operations. Bruss…
…
continue reading

1
Little Happier: Andy Warhol, Woolworth’s, Air Conditioning, and Roasted Peanuts
3:21
3:21
나중에 재생
나중에 재생
리스트
좋아요
좋아요
3:21Our five senses constantly make adjustments and compromises—an observation that explains a cryptic comment by Andy Warhol. Get in touch: [email protected] Visit Gretchen's website to learn more about Gretchen's best-selling books, products from The Happiness Project Collection, and the Happier app. Find the transcript for this episode on th…
…
continue reading

1
More Happier: For Travel, Familiarity or Novelty? Plus a Flossing Hack & the Pleasure of Routine
23:56
23:56
나중에 재생
나중에 재생
리스트
좋아요
좋아요
23:56We explore whether it's better to seek out new experiences or enjoy familiar favorites when traveling. Plus, we share a surprising hack about alternatives to flossing, and how we’re approaching fall routines. Resources & links related to this episode: Learn your Tendency and learn more about the "Four Tendencies" framework "Dentists know you hate f…
…
continue reading

1
Novakon Ignored Security Reports on ICS Weaknesses, Leaving 40,000+ Devices Exposed
22:35
22:35
나중에 재생
나중에 재생
리스트
좋아요
좋아요
22:35A new security report has revealed serious, unpatched vulnerabilities in industrial control system (ICS) products manufactured by Novakon, a Taiwan-based subsidiary of iBASE Technology. Security researchers at CyberDanube identified five categories of flaws affecting Novakon’s Human-Machine Interfaces (HMIs), including an unauthenticated buffer ove…
…
continue reading
JD and Ed talk about recently published excerpts of Pope Leo XIV’s first interviews— including his reflections on the papacy, Vatican finances, and the clerical sexual abuse crisis. This episode is sponsored by FaithInvestors.com. Let the experienced investment advisors at FaithInvestors.com help you align your finances and your faith without sacri…
…
continue reading

1
RevengeHotels Cybercrime Group Adopts AI and VenomRAT in Hotel Credit Card Theft Campaign
23:00
23:00
나중에 재생
나중에 재생
리스트
좋아요
좋아요
23:00The cybercrime group known as RevengeHotels, also tracked as TA558, has launched a new wave of attacks against the hospitality sector, evolving its tactics with the help of Artificial Intelligence (AI) and a powerful new malware strain, VenomRAT. Active since 2015, RevengeHotels has long targeted hotels, travel agencies, and tourism businesses to s…
…
continue reading

1
ShadowLeak: Server-Side Data Theft Attack Discovered Against ChatGPT Deep Research
26:15
26:15
나중에 재생
나중에 재생
리스트
좋아요
좋아요
26:15A groundbreaking new cyberattack dubbed ShadowLeak has been uncovered targeting ChatGPT’s Deep Research capability, marking a dangerous escalation in AI-related threats. Unlike prior exploits such as AgentFlayer and EchoLeak, which operated on the client side, ShadowLeak weaponized OpenAI’s own cloud infrastructure to silently exfiltrate sensitive …
…
continue reading

1
WatchGuard Firebox Vulnerability Could Let Hackers Take Over Networks
28:50
28:50
나중에 재생
나중에 재생
리스트
좋아요
좋아요
28:50A new critical vulnerability, CVE-2025-9242, has been discovered in WatchGuard Firebox firewalls, putting thousands of networks worldwide at risk. The flaw stems from an out-of-bounds write bug in the Fireware OS’s iked process, which could allow a remote, unauthenticated attacker to execute arbitrary code. If exploited, this would grant full contr…
…
continue reading

1
How SystemBC’s 1,500 Infected VPS Servers Fuel Ransomware and Fraud
32:02
32:02
나중에 재생
나중에 재생
리스트
좋아요
좋아요
32:02The SystemBC proxy botnet has quietly become one of the most persistent pillars of the cybercrime ecosystem. First detected in 2019, SystemBC is less about stealth and more about scale. It maintains an average of 1,500 compromised commercial virtual private servers (VPS) around the world, providing a powerful, high-bandwidth proxy network for cyber…
…
continue reading

1
Tiffany & Co. Data Breach Exposes Gift Card Details of 2,500+ Customers
12:33
12:33
나중에 재생
나중에 재생
리스트
좋아요
좋아요
12:33Tiffany and Company, the iconic luxury jeweler under the LVMH umbrella, has confirmed a serious data breach impacting over 2,500 customers across the United States and Canada. On or around May 12, 2025, hackers infiltrated Tiffany’s internal systems, compromising sensitive customer data tied to gift cards. Exposed information includes names, email …
…
continue reading

1
Lakera’s Gandalf Network Joins Check Point in $300M AI Security Deal
24:33
24:33
나중에 재생
나중에 재생
리스트
좋아요
좋아요
24:33In a major strategic move, Check Point Software Technologies has announced the acquisition of Lakera, a Zurich and San Francisco–based AI security firm founded by former Google and Meta AI researchers. Valued at around $300 million, the acquisition will close in late 2025 and serve as the foundation for Check Point’s new Global Center of Excellence…
…
continue reading

1
Shai-Hulud Exposes Fragility of the Open-Source Software Supply Chain
34:50
34:50
나중에 재생
나중에 재생
리스트
좋아요
좋아요
34:50A major supply chain attack is underway in the npm ecosystem. Dubbed Shai-Hulud, this worm-style campaign began with the compromise of the popular @ctrl/tinycolor package and has since infected at least 187 npm packages, including some published under CrowdStrike’s official account. The malware, designed to spread automatically, abuses the legitima…
…
continue reading

1
ChatGPT Calendar Vulnerability Exposes User Emails in New AI Attack
20:27
20:27
나중에 재생
나중에 재생
리스트
좋아요
좋아요
20:27A critical vulnerability has been uncovered in ChatGPT’s new calendar integration, exposing how attackers could exfiltrate sensitive user data—particularly emails—through a deceptively simple exploit. Security researchers at EdisonWatch, led by Eito Miyamura, demonstrated how a malicious calendar invitation could contain hidden instructions that Ch…
…
continue reading

1
CrowdStrike Acquires Pangea to Launch AI Detection and Response (AIDR)
22:03
22:03
나중에 재생
나중에 재생
리스트
좋아요
좋아요
22:03At Fal.Con 2025, CrowdStrike announced one of its boldest moves yet: the acquisition of AI security startup Pangea. The deal signals CrowdStrike’s intent to redefine the future of cybersecurity by protecting not just endpoints and networks, but the entire AI lifecycle. Pangea, founded in 2021, is known for cutting-edge tools like AI Guard, which pr…
…
continue reading

1
RaccoonO365: $100K Phishing-as-a-Service Scheme Taken Down
27:03
27:03
나중에 재생
나중에 재생
리스트
좋아요
좋아요
27:03Microsoft and Cloudflare have successfully dismantled RaccoonO365, a global phishing-as-a-service (PhaaS) operation that had been running for over a year. This criminal platform, marketed on Telegram and used by up to 200 subscribers, enabled attackers to craft realistic Microsoft 365 phishing campaigns, complete with fake login pages, email lures,…
…
continue reading

1
Ep. 552: Start Your 100-Day Countdown, Try Substack & the Power of Engaging
32:56
32:56
나중에 재생
나중에 재생
리스트
좋아요
좋아요
32:56There are about 100 days left in the year, and we discuss why starting your 100-day countdown can make you happier. We also explore a hack that will help you read, learn, and get entertained, and we share interesting responses from listeners about the power of engaging. Resources & links related to this episode: For the Happier Podcast Book Club: A…
…
continue reading

1
AI-Generated Phishing and Deepfakes Supercharge Social Engineering Attacks
1:01:18
1:01:18
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:01:18Social engineering has reclaimed center stage as today’s most reliable intrusion vector—and it’s not just email anymore. Recent warnings from law enforcement and national cyber centers underscore how adversaries exploit human psychology to “log in, not hack in,” bypassing hardened perimeters with phishing, vishing (voice phishing) against IT help d…
…
continue reading

1
Phoenix Attack Breaks DDR5 Rowhammer Defenses: Root in 109 Seconds
41:45
41:45
나중에 재생
나중에 재생
리스트
좋아요
좋아요
41:45The infamous Rowhammer vulnerability, long thought to be contained by new DRAM protections, has resurfaced with devastating force. Academic researchers, working with Google, have unveiled the Phoenix attack, a breakthrough Rowhammer variant that shatters the defenses of DDR5 memory chips. Despite the industry’s investment in Target Row Refresh (TRR…
…
continue reading

1
Silent Push Raises $10M Series B to Expand Threat Intelligence Platform
48:07
48:07
나중에 재생
나중에 재생
리스트
좋아요
좋아요
48:07Cybercriminals aren’t just breaking in—they’re borrowing your brand to do it. This episode dives into the critical intersection of brand protection, threat intelligence, and external attack surface management (EASM) and lays out a practical, intelligence-driven blueprint you can start applying today. We begin with the state of brand abuse: a sharp …
…
continue reading

1
Google Accused of Shadow Lobbying Against California Privacy Opt-Out Law
31:38
31:38
나중에 재생
나중에 재생
리스트
좋아요
좋아요
31:38California’s Assembly Bill 566 (AB 566) has become one of the most hotly contested pieces of privacy legislation in the country. The bill would require universal “opt-out preference signals” in web browsers and mobile operating systems, allowing consumers to automatically block the sale and sharing of their personal data across the internet. Propon…
…
continue reading

1
FinWise Bank Data Breach Exposes 700K Customers Amid Predatory Lending Allegations
33:04
33:04
나중에 재생
나중에 재생
리스트
좋아요
좋아요
33:04FinWise Bank is facing a double crisis—one of data security and another of public trust. Nearly 700,000 customers of American First Finance (AFF), a FinWise partner, were impacted by a massive data breach after a former employee improperly accessed sensitive records. The bank has responded with offers of free credit monitoring, but the damage to co…
…
continue reading
This is a free preview of a paid episode. To hear more, visit www.pillarcatholic.com JD has a story for Ed. Are you a paying subscriber? * Visit pillarcatholic.com/listen on your phone * Check the top right corner of the webpage to ensure you are logged into your Substack account. * Tap ‘set up podcast’ next to The Pillar Podcast Having issues? Ema…
…
continue reading

1
Little Happier: A Surprising and Subtle Way to Change Your Habits: Consider Texas
4:06
4:06
나중에 재생
나중에 재생
리스트
좋아요
좋아요
4:06Texas’s extremely successful anti-littering campaign illustrates an important principle about habit change: Sometimes changing our habits requires us first to change our identity. Get in touch: [email protected] Visit Gretchen's website to learn more about Gretchen's best-selling books, products from The Happiness Project Collection, and th…
…
continue reading

1
More Happier: Returning to Routine? 7 Strategies to Make it Easier [Revisited]
28:00
28:00
나중에 재생
나중에 재생
리스트
좋아요
좋아요
28:00Feeling the end-of-summer slump? In this revisited episode, we share 7 practical strategies that can help you rebuild your routine for fall—especially if you're dragging your feet. September is the other January, and this “starter kit” for habit change will help you reset without forcing it. Resources & links related to this episode: Better Than Be…
…
continue reading
This is a free preview of a paid episode. To hear more, visit www.pillarcatholic.com This is the west. Are you a paying subscriber? * Visit pillarcatholic.com/listen on your phone * Check the top right corner of the webpage to ensure you are logged into your Substack account. * Tap ‘set up podcast’ next to The Pillar Podcast Having issues? Email ou…
…
continue reading
This is a free bonus episode of The Pillar Podcast. Subscribe to The Pillar today to access every bonus episode of The Pillar Podcast. What does it mean to be a Christian in America right now? Are you a paying subscriber? * Visit pillarcatholic.com/listen on your phone * Check the top right corner of the webpage to ensure you are logged into your S…
…
continue reading

1
Ep. 228: Cooperation with China, and 'Traditionis custodes'
1:06:03
1:06:03
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:06:03Ed talks about reactions to Pope Leo XIV’s suppression of two dioceses and creation of a new diocese in mainland China. Then, the Traditional Latin Mass will be celebrated next month on the main altar of St. Peter’s Basilica. JD and Ed talk about what the move could signify for future application of Traditionis custodes. Ed plays a round of video g…
…
continue reading

1
Ep. 551: Question Assumptions, College Drop-Off Hacks & Rebelling Against an Unappreciative Family
31:43
31:43
나중에 재생
나중에 재생
리스트
좋아요
좋아요
31:43We talk about why it can be very valuable to question our assumptions, and we also share hacks for helping a child moving into a college dorm. Plus we discuss a listener’s feelings of Obliger-rebellion due to the unacknowledged work she does for her family. Resources & links related to this episode: Listen to the new podcast Since You Asked with Lo…
…
continue reading

1
The “s1ngularity” Attack: How Hackers Hijacked Nx and Leaked Thousands of Repositories
38:48
38:48
나중에 재생
나중에 재생
리스트
좋아요
좋아요
38:48In late August 2025, the open-source software ecosystem was rocked by a sophisticated two-phase supply chain attack, now known as “s1ngularity.” The incident began when attackers exploited a flaw in GitHub Actions workflows for the Nx repository, stealing an NPM publishing token and using it to release malicious versions of Nx packages. These packa…
…
continue reading