POPULARITY
Categories
On the latest episode of Media Matters, David Lynch joins Dave Davis for all the latest on Liverpool's transfer activity, including the Reds' desire for much-needed fresh wingers and attacking threat with pace and much more! Learn more about your ad choices. Visit podcastchoices.com/adchoices
Threat actors break out in under 30 minutes Claude allegedly hit with distillation attacks DeFi platform shutting down after crypto theft Get links to all of today's news in our show notes here: https://cisoseries.com/cybersecurity-news-hacked-in-30-minutes-claude-distillation-defi-shutdown-after-attack/ Thanks to today's episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first security awareness platform built to stop AI-powered social engineering. Attackers don't need malware anymore; they need trust. Tip: set a simple passphrase for high-risk actions, like wire requests or "urgent" account recovery – especially within finance teams and families. If the caller can't answer it, pause and verify. Adaptive runs deepfake and vishing simulations so employees practice this before it's real. adaptivesecurity.com.
SolarWinds patches four critical remote code execution vulnerabilities. A ransomware attack on Conduant puts the data of over 25 million Americans at risk. RoguePilot enables Github repository takeovers. ZeroDayRat targets Android and iOS devices. North Korea's Lazarus group deploy Medusa ransomware against organizations in the U.S. and the Middle East. Attackers' breakout times drop to under half an hour. CISA maintains its mission despite staffing challenges. Russian satellites draw fresh scrutiny. Two South Korean teenagers are charged with breaching Seoul's public bike service. Krishna Sai, CTO at SolarWinds, discusses why leaders should focus less on speculating about an AI bubble, and more on how to quantify AI's tangible contributions. The Pope pushes prayerful priests past predictable programs. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Krishna Sai, CTO at SolarWinds, discussing why leaders should focus less on speculating about an AI bubble, and more on how to quantify AI's tangible contributions. Selected Reading Critical SolarWinds Serv-U flaws offer root access to servers (Bleeping Computer) Massive Conduent Data Breach Exfiltrates 8 TB Affects Over 25 Million Americans (GB Hackers) GitHub Issues Abused in Copilot Attack Leading to Repository Takeover (SecurityWeek) New ZeroDayRAT Malware Claims Full Monitoring of Android and iOS Devices (Hackread) North Korean state hackers seen using Medusa ransomware in attacks on US, Middle East (The Record) CrowdStrike says attackers are moving through networks in under 30 minutes (CyberScoop) Shutdown at D.H.S. Extends to Cyber Agency, Adding to Setbacks (The New York Times) From Cold War interceptors to Ukraine: how Russia came to park spy satellites next to the West's most sensitive tech in orbit (Meduza) Korean cops charge two teens over Seoul bike hire breach (The Register) Pope tells priests to use their brains, not AI, to write homilies (EWTN News) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Cybercrime's escalation has reached a projected $12.2 trillion annual impact by 2031, with a notable surge in remote monitoring and management (RMM) tool abuse—up 277% year-over-year, according to Huntress and supporting vendor reports. Attackers utilize legitimate IT tools to facilitate stealthier ransomware and phishing campaigns, amplifying structural vulnerabilities within MSP technology stacks. Key metrics from Acronis, WatchGuard, and Vectra AI indicate a shift to smaller, more evasive malware campaigns, longer times to ransomware deployment (averaging 20 hours), and widespread unaddressed security alerts, raising questions about the adequacy of current defenses and incident response practices. Vendor-supplied threat intelligence further shows that MSPs' reliance on signature-based platforms and insufficient visibility leaves them exposed to evolving attack techniques. Data reviewed suggests phishing footholds can quickly compromise cross-client environments, and legal ramifications heavily fall on the service provider when RMM or monitoring tools act as entry points. Notably, only about 58-60% of organizations report full visibility across their systems, with a majority of alerts remaining unaddressed, underscoring gaps in operational maturity and preparedness. Adjacent coverage highlighted Microsoft Copilot's repeated security control failures within regulated environments, specifically its inability to enforce sensitivity labels and boundaries across emails—most recently affecting the UK's National Health Service. The lack of vendor-announced architectural changes calls into question the viability of deploying AI tools in compliance-driven contexts. Separately, political and public backlash against surveillance technologies (such as Flock cameras) demonstrates that unchecked data collection is no longer a manageable passive risk, as data becomes increasingly actionable and retains liability beyond technical considerations. The practical takeaway for MSPs and IT leaders is a need to prioritize audit, documentation, and enforcement of controls within their technology stacks, especially where vendor tools or AI-driven automation intersect with compliance and client trust. Preserving operational optionality and scrutinizing vendor terms—particularly data sharing and architectural enforcement—are essential to reduce exposure. Waiting for vendor patches, disregarding documented control failures, or underestimating public scrutiny elevate liability across legal, reputational, and client relationship domains. Four things to know today: 00:00 Vendor Threat Reports Converge on One Risk MSPs Can't Outsource: The RMM as Breach Vector 05:11 Copilot Failed Compliance Controls Twice in Eight Months — A Patch Won't Fix That 07:03 Flock Backlash Exposes the Liability Hidden in Every Vendor Data-Sharing Contract 09:42 GTDC Summit: Distributors Pitch AI On-Ramp as Hyperscalers Compress Their Margin Sponsored by:
Hospital Shutdown, Ransomware Surge, Fortinet Failures A hospital doesn't cancel chemotherapy appointments because of a “technical issue.” They cancel them because they've lost operational control. This week, the University of Mississippi Medical Center shut down its entire network after a ransomware attack disrupted systems — including Epic. Clinics closed. Elective procedures paused. Outpatient services halted. Emergency operations activated. Leadership described the shutdown as precautionary. But here's the real question executives should be asking: Why was a full network shutdown necessary? If segmentation is validated… If identity governance is enforced… If lateral movement detection is operationalized… Why does the only safe option become “turn it all off”? In this episode of Security Squawk, we break down what this incident signals about containment confidence, governance maturity, and operational resilience — not just in healthcare, but across every industry that depends on uptime. And we zoom out. Because UMMC isn't happening in isolation. According to TechRadar, ransomware groups have reached an all-time high in 2025. The victim growth rate has doubled. Qilin and other affiliate-driven operators are scaling aggressively. This isn't random chaos. It's industrialization. More fragmentation. More specialization. More execution discipline on the criminal side. Healthcare, public sector, and critical infrastructure are being economically targeted because downtime equals leverage. When systems go dark, negotiation pressure spikes. Then we connect it to something many leaders are still underestimating: Fortinet exploitation patterns. Edge vulnerabilities. VPN credential harvesting. Reinfection cycles months after patches were released. The vulnerability itself isn't the story. The response maturity is. Attackers are repeatedly probing whether organizations: – Patch fast enough – Rotate exposed credentials – Reset trust boundaries after compromise – Validate segmentation integrity – Rebuild identity confidence When those governance steps are skipped, attackers come back. That's not a tooling failure. That's a leadership failure. This episode translates three headlines into one hard truth: Ransomware is no longer just a malware problem. It's a containment confidence problem. For CEOs: If you cannot isolate an intrusion without shutting down revenue operations, your resilience model is fragile. For IT Directors: Active Directory recovery is not a restore-from-backup event. It's a trust re-establishment event. For MSPs: Client environments are operating in a denser criminal ecosystem. Tool stacking without maturity validation will not scale. For Risk Leaders: Financial exposure is no longer limited to ransom. Revenue interruption, regulatory scrutiny, and reputational damage compound quickly — especially in healthcare. We also discuss: • Why attacker communication often signals a second phase • Why affiliate ransomware models are accelerating • Why segmentation validation will become a board-level metric • Why detection speed does not equal governance strength Security Squawk exists to translate cybersecurity chaos into business reality — without vendor spin and without hype. If you value that kind of analysis and want to support independent, executive-focused cybersecurity conversations, you can back the show at: buymeacoffee.com/securitysquawk Your support helps us keep this live, timely, and unfiltered. Because criminals are already running maturity audits. And they invoice in operational shutdown. The question is simple: If it happened to you tomorrow, could you contain it — or would you turn the lights off?
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.A financially motivated threat actor known as GS7 is conducting a large-scale phishing campaign called Operation DoppelBrand, targeting Fortune 500 companies by impersonating their corporate login portals.Kaspersky researchers have analyzed a newly identified Android malware strain named Keenadu that provides attackers with remote control over infected devices.Application Programming Interfaces continue to be a primary attack surface, and new research from Wallarm shows the problem is accelerating as AI adoption expands.Hacker News outlines cybersecurity technology priorities for 2026, framing the environment as one of continuous instability rather than periodic disruption.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform.This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.
Open Tech Talks : Technology worth Talking| Blogging |Lifestyle
Episode # 183 Today's Guest: Adriel Desautels, Founder & CEO, Netragard Adriel is a leader in cybersecurity with over 20 years of experience. Adriel founded Secure Network Operations and the SNOsoft Research Team, whose vulnerability research helped shape modern responsible disclosure practices. He later launched Netragard, pioneering Realistic Threat Penetration Testing, which he now call Red Teaming, and expanding into a broad range of security services. Website: Netregard X/Twitter: Netregard What Listeners Will Learn: Why "AI penetration testing" is often closer to automated scanning than real offensive testing How AI changes security risk mainly through volume and speed, not necessarily sophistication Where organizations get misled into a false sense of security Why "preventing breach" is unrealistic and why limiting damage paths matters more What cybersecurity professionals should focus on to stay relevant in the LLM era How AI may influence vulnerability research, but still struggles with novel exploitation thinking Resources: Netregard
Your email gateway isn't enough anymore, attackers are already inside the workspace through OAuth apps, browser extensions, and account takeover. In this episode, Ron sits down with Rajan Kapoor, VP of Security at Material Security, to break down the real risks hiding inside Google Workspace and Microsoft 365. They cover how phishing has evolved into full-blown business email compromise, why malicious OAuth apps are the new favorite attack vector, and what security teams, especially lean ones, can do right now to lock down their cloud workspace. Rajan also drops practical advice on passkeys, document sharing hygiene, and why data lifecycle management is a problem no one is solving well enough. Impactful Moments 00:00 – Introduction 03:30 – The current state of phishing 05:30 – Outbound email compromise risk 09:30 – OAuth apps as attack vectors 15:00 – AI agents accessing your workspace 16:00 – Prompt injection is the new SQL injection 18:00 – Allow listing apps immediately 24:30 – Google Workspace vs Microsoft 365 security 27:30 – Custom detections require API expertise 28:00 – Why passkeys matter right now 32:00 – Data lifecycle management for shared docs Links Connect with our guest, Rajan Kapoor, on LinkedIn: https://www.linkedin.com/in/rajankkapoor/ Learn more about Material Security: https://material.security ___ Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/ Check out our upcoming events: https://www.hackervalley.com/livestreams Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
(Presented by Thinkst Canary: Most Companies find out way too late that they've been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching 'em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.) Three Buddy Problem - Episode 85: Top stories this week include drone incursions over El Paso and the murky line between cartel activity, anti-drone tech testing, and full-blown hybrid warfare; updates on the Notepad++ supply chain fallout; Microsoft's zero-day treadmill and AI-enabled attack surfaces; and Apple's “extremely sophisticated” iOS exploits. Plus, Europe's growing appetite for offensive cyber, Palo Alto and the uncomfortable politics of cyber attribution, Singapore on telco intrusions, and the economics of end-of-life infrastructure. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.
Podcast: Exploited: The Cyber Truth Episode: The OT Mistakes Attackers Count On—And How to Fix Them Before They DoPub date: 2026-02-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security CEO Joseph M. Saunders and OT/ICS security expert Mike Holcomb, founder of UTILSEC, for a candid discussion about the weaknesses attackers exploit inside industrial environments. Mike shares what he repeatedly finds during assessments of large OT and ICS networks: no effective firewall between IT and OT, flat networks with little segmentation, stale Windows domains, shared engineering credentials, exposed HMIs, and OT protocols that will accept commands from any reachable host. He explains how attackers move from IT into OT using familiar enterprise techniques before pivoting into PLCs, RTUs, safety systems, and historians. Joe outlines why secure-by-design practices, higher software quality, and “secure by demand” procurement are critical to long-term resilience—especially as cloud connectivity and AI accelerate modernization in industrial environments. Together, they explore: Why a missing or misconfigured IT/OT firewall remains the most common and dangerous gapHow micro-segmentation and unidirectional architectures reduce blast radiusThe risks of web-enabled HMIs and long-lived legacy systemsWhy monitoring PLC programming traffic and historian queries mattersHow the Cyber Resilience Act is reshaping accountability for OT vendors If you're responsible for industrial operations, plant uptime, or product security, this episode shows how attackers actually move through OT environments—and how to eliminate the mistakes they depend on.The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Industrial Cybersecurity InsiderEpisode: Former NSA now Founder & CTO Breaks Cybersecurity Down: Satellites to ManufacturingPub date: 2026-02-10Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino sits down with Dick Wilkinson, CTO and co-founder of Proof Labs, to explore the intersection of space technology and industrial cybersecurity.Dick shares his 20-year journey in the U.S. Army with the National Security Agency, transitioning from signals intelligence to becoming a CISO for critical infrastructure organizations, including New Mexico's Supreme Court and the Albuquerque water authority.The conversation dives deep into the challenges of securing satellite systems with onboard intrusion detection and the persistent gap between IT and OT security teams. We also explore why the "castle wall" perimeter security model is dangerously outdated.Dick reveals how AI is lowering the barrier to entry for both attackers and defenders, and discusses the real-world applications of satellite communications in oil and gas operations.He also introduces a revolutionary physical layer-one air gap device called Goldilock Secure, which could transform how we protect remote industrial assets.This episode is essential listening for CISOs, CTOs, and security leaders looking to understand emerging threats in space-based infrastructure and practical solutions for securing distributed industrial environments.Chapters:(00:00:00) - Dick's Journey: From NSA to Space Cybersecurity(00:04:32) - What is Proof Labs and Why Space Security Matters(00:08:15) - Satellites as OT Assets: Oil, Gas, and Critical Infrastructure(00:12:47) - How Onboard Intrusion Detection Works in Spacecraft(00:16:23) - The Castle Wall Problem: Moving Beyond Perimeter Security(00:19:41) - IT vs OT: Bridging the Gap in Manufacturing Cybersecurity(00:24:18) - AI's Impact: Lowering the Barrier for Attackers and Defenders(00:27:35) - The Visibility Challenge: Why Most Plants Don't Know Their Assets(00:30:12) - Goldilock Firebreak: A Physical Air Gap Device That Changes Everything(00:35:20) - Real-World Applications for Remote Industrial Asset ProtectionLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Dick Wilkinson on LinkedInProof Labs WebsiteIndustrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radios app.
Got a question or comment? Message us here!Attackers are hiding remote access trojans (RATs) inside malicious MSI installers disguised as legit software, and it's surging in early 2026. We break down how these phishing attacks bypass EDR, what to look for, and how SOC teams can stop them before they turn into full-blown breaches. Support the showWatch full episodes at youtube.com/@aliascybersecurity.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.
Chris Phillips, former head of the National Counter Terrorism Security Office, and Debbie Hayton, journalist and author, come on The Julia Hartley-Brewer Show to discuss two tragedies - a stabbing in London and a school shooting in Canada.Two boys, aged 12 and 13, have been left seriously injured after the attack in Brent, London. It is currently being investigated by a counter-terrorism unit. Chris Phillips discusses how to reduce knife crime, how to keep children safe, and how to improve policing to prevent incidents like this occurring again. Debbie Hayton discusses the Canadian school shooting, after the killer was described as a “gunperson” and an active shooter alert was described as a “female in a dress”. Nine people have died and twenty-five have been injured in the attack in a small village in British Columbia. The shooter was found dead with self-inflicted wounds. Rumours swirled about the perpetrator's sexual identity - which at the time of publishing was yet to be confirmed. Also: Chris Phillips on how pro-palestine protests are inhibiting officers from doing their job - as a report reveals that they are only on the beat for three days a week because of the demands of managing regular demonstrations. And Debbie Hayton on the Scottish National Party spending £1m on legal fees to defend gender self-identification in Scotland. Julia Hartley-Brewer broadcasts on Talk from Monday to Thursday, 10AM to 1PM. Available on YouTube and streaming platforms, along with DAB+ radio and your smart speaker. Hosted on Acast. See acast.com/privacy for more information.
In the world of Generative AI, natural language has become the new executable. Attackers no longer need complex code to breach your systems, sometimes, asking for a "poem" is enough to steal your passwords .In this episode, Eduardo Garcia (Global Head of Cloud Security Architecture at Check Point) joins Ashish to explain the paradigm shift in AI security. He shares his experience building AI-powered fraud detection systems and why traditional security controls fail against intent-based attacks like prompt injection and data poisoning .We dive deep into the reality of Shadow AI, where employees unknowingly train public models with sensitive corporate data , and the sophisticated world of Deepfakes, where attackers can bypass biometric security using AI-generated images unless you're tracking micro-movements of the eye .Guest Socials - Eduardo's LinkedinPodcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-Cloud Security Podcast- Youtube- Cloud Security Newsletter If you are interested in AI Security, you can check out our sister podcast - AI Security Podcast(00:00) Introduction(01:55) Who is Eduardo Garcia? (Check Point)(03:00) Defining Security for GenAI: The Focus on Prompts (05:20) Why Natural Language is the New Executable (08:50) Multilingual Attacks: Bypassing Filters with Mandarin (12:00) Shift Left vs. Shift Right: The 70/30 Rule for AI Security (15:30) The "Poem Hack": Stealing Passwords with Creative Prompts (21:00) Shadow AI: The "HR Spreadsheet" Leak Scenario (25:40) Security vs. Compliance in a Blurring World (28:00) The Conflict: "My Budget Doesn't Include Security" (34:00) The 5 V's of AI Data: Volume, Veracity, Velocity (40:00) Deepfakes & Biometrics: Detecting Micro-Movements (43:40) Fun Questions: Soccer, Family, and Honduran Tacos
Last time we spoke about The Battle of Suixian–Zaoyang-Shatow. Following the brutal 1938 capture of Wuhan, Japanese forces aimed to solidify their hold by launching an offensive against Chinese troops in the 5th War Zone, a rugged natural fortress in northern Hubei and southern Henan. Under General Yasuji Okamura, the 11th Army deployed three divisions and cavalry in a pincer assault starting May 1, 1939, targeting Suixian and Zaoyang to crush Nationalist resistance and secure flanks. Chinese commander Li Zongren, leveraging terrain like the Dabie and Tongbai Mountains, orchestrated defenses with over 200,000 troops, including Tang Enbo's 31st Army Group. By May 23, they recaptured Suixian and Zaoyang, forcing a Japanese withdrawal with heavy losses, over 13,000 Japanese casualties versus 25,000 Chinese, restoring pre-battle lines. Shifting south, Japan targeted Shantou in Guangdong to sever supply lines from Hong Kong. In a massive June 21 amphibious assault, the 21st Army overwhelmed thin Chinese defenses, capturing the port and Chao'an despite guerrilla resistance led by Zhang Fakui. Though losses mounted, Japan tightened its blockade, straining China's war effort amid ongoing attrition. #188 From Changkufeng to Nomonhan Welcome to the Fall and Rise of China Podcast, I am your dutiful host Craig Watson. But, before we start I want to also remind you this podcast is only made possible through the efforts of Kings and Generals over at Youtube. Perhaps you want to learn more about the history of Asia? Kings and Generals have an assortment of episodes on history of asia and much more so go give them a look over on Youtube. So please subscribe to Kings and Generals over at Youtube and to continue helping us produce this content please check out www.patreon.com/kingsandgenerals. If you are still hungry for some more history related content, over on my channel, the Pacific War Channel where I cover the history of China and Japan from the 19th century until the end of the Pacific War. Well hello again, and yes you all have probably guessed we are taking another detour. Do not worry I hope to shorten this one a bit more so than what became a sort of mini series on the battle of Changkufeng or Battle of Lake Khasan. What we are about to jump into is known in the west as the battle of khalkin Gol, by the Japanese the Nomohan incident. But first I need to sort of set the table up so to say. So back on August 10th, 1938 the Litvinov-Shigemitsu agreement established a joint border commission tasked with redemarcating the disputed boundary between the Soviet Union and Japanese-controlled Manchukuo. However, this commission never achieved a mutually agreeable definition of the border in the contested area. In reality, the outcome was decided well before the group's inaugural meeting. Mere hours after the cease-fire took effect on the afternoon of August 11, General Grigory Shtern convened with a regimental commander from Japan's 19th Division to coordinate the disengagement of forces. With the conflict deemed "honorably" concluded, Japan's Imperial General Headquarters mandated the swift withdrawal of all Japanese troops to the west bank of the Tumen River. By the night of August 13, as the final Japanese soldier crossed the river, it effectively became the de facto border. Soviet forces promptly reoccupied Changkufeng Hill and the adjacent heights—a move that would carry unexpected and profound repercussions. Authoritative Japanese military analyses suggest that if negotiations in Moscow had dragged on for just one more day, the 19th Division would likely have been dislodged from Changkufeng and its surrounding elevations. Undoubtedly, General Shtern's infantry breathed a sigh of relief as the bloodshed ceased. Yet, one can't help but question why Moscow opted for a cease-fire at a juncture when Soviet troops were on the cusp of total battlefield triumph. Perhaps Kremlin leaders deemed it wiser to settle for a substantial gain, roughly three-quarters of their objectives, rather than risk everything. After all, Japan had mobilized threatening forces in eastern Manchuria, and the Imperial Army had a history of impulsive, unpredictable aggression. Moreover, amid the escalating crisis over Czechoslovakia, Moscow may have been wary of provoking a broader Asian conflict. Another theory posits that Soviet high command was misinformed about the ground situation. Reports of capturing a small segment of Changkufeng's crest might have been misinterpreted as control over the entire ridge, or an imminent full takeover before midnight on August 10. The unexpected phone call from Foreign Minister Maxim Litvinov to the Japanese embassy that night—proposing a one-kilometer Japanese retreat in exchange for a cease-fire along existing lines—hints at communication breakdowns between Shtern's headquarters and the Kremlin. Ironically, such lapses may have preserved Japanese military honor, allowing the 19th Division's evacuation through diplomacy rather than defeat. Both sides endured severe losses. Initial Japanese press reports claimed 158 killed and 740 wounded. However, the 19th Division's medical logs reveal a grimmer toll: 526 dead and 914 injured, totaling 1,440 casualties. The true figure may have climbed higher, possibly to 1,500–2,000. Following the armistice, the Soviet news agency TASS reported 236 Red Army fatalities and 611 wounded. Given Shtern's uphill assaults across open terrain against entrenched positions, these numbers seem understated. Attackers in such scenarios typically suffered two to three times the defenders' losses, suggesting Soviet casualties ranged from 3,000 to 5,000. This aligns with a Soviet Military Council investigation on August 31, 1938, which documented 408 killed and 2,807 wounded. Japanese estimates placed Soviet losses even higher, at 4,500–7,000. Not all victims perished in combat. Marshal Vasily Blyukher, a decorated Soviet commander, former warlord of the Far East, and Central Committee candidate, was summoned to Moscow in August 1938. Relieved of duty in September and arrested with his family in October, he faced charges of inadequate preparation against Japanese aggression and harboring "enemies of the people" within his ranks. On November 9, 1938, Blyukher died during interrogation a euphemism for torture-induced death.Other innocents suffered as well. In the wake of the fighting, Soviet authorities deported hundreds of thousands of Korean rice farmers from the Ussuri region to Kazakhstan, aiming to eradicate Korean settlements that Japanese spies had allegedly exploited. The Changkufeng clash indirectly hampered Japan's Wuhan offensive, a massive push to subdue China. The influx of troops and supplies for this campaign was briefly disrupted by the border flare-up. Notably, Kwantung Army's 2nd Air Group, slated for Wuhan, was retained due to the Soviet threat. Chiang Kai-shek's drastic measure, breaching the Yellow River dikes to flood Japanese advance routes—further delayed the assault. By October 25, 1938, when Japanese forces captured Hankow, Chiang had relocated his capital to distant Chungking. Paradoxically, Wuhan's fall cut rail links from Canton inland, heightening Chiang's reliance on Soviet aid routed overland and by air from Central Asia. Japan secured a tactical win but missed the decisive blow; Chinese resistance persisted, pinning down a million Japanese troops in occupation duties. What was the true significance of Changkufeng? For General Koiso Suetaka and the 19th Division, it evoked a mix of bitterness and pride. Those eager for combat got their share, though not on their terms. To veterans mourning fallen comrades on those desolate slopes, it might have felt like senseless tragedy. Yet, they fought valiantly under dire conditions, holding firm until a retreat that blended humiliation with imperial praise, a bittersweet inheritance. For the Red Army, it marked a crucial trial of resolve amid Stalin's purges. While Shtern's forces didn't shine brilliantly, they acquitted themselves well in adversity. The U.S. military attaché in Moscow observed that any purge-related inefficiencies had been surmounted, praising the Red Army's valor, reliability, and equipment. His counterpart in China, Colonel Joseph Stilwell, put it bluntly: the Soviets "appeared to advantage," urging skeptics to rethink notions of a weakened Red Army. Yet, by World War II's eve, many British, French, German, and Japanese leaders still dismissed it as a "paper tiger." Soviet leaders appeared content, promoting Shtern to command the Transbaikal Military District and colonel general by 1940, while honoring "Heroes of Lake Khasan" with medals. In a fiery November 7, 1938, speech, Marshal Kliment Voroshilov warned that future incursions would prompt strikes deep into enemy territory. Tokyo's views diverged sharply. Many in the military and government saw it as a stain on Imperial Army prestige, especially Kwantung Army, humiliated on Manchukuo soil it swore to protect. Colonel Masanobu Tsuji Inada, however, framed it as a successful reconnaissance, confirming Soviet border defense without broader aggression, allowing the Wuhan push to proceed safely. Critics, including Major General Gun Hashimoto and historians, questioned this. They argued IGHQ lacked contingency plans for a massive Soviet response, especially with Wuhan preparations underway since June. One expert warned Japan had "played with fire," risking Manchuria and Korea if escalation occurred. Yet, Japanese commanders gleaned few lessons, downplaying Soviet materiel superiority and maintaining disdain for Red Army prowess. The 19th Division's stand against outnumbered odds reinforced this hubris, as did tolerance for local insubordination—attitudes that would prove costly. The Kremlin, conversely, learned Japan remained unpredictable despite its China quagmire. But for Emperor Hirohito's intervention, the conflict might have ballooned. Amid purges and the Czech crisis, Stalin likely viewed it as a reminder of eastern vulnerabilities, especially with Munich advancing German threats westward. Both sides toyed with peril. Moderation won in Tokyo, but Kwantung Army seethed. On August 11, Premier Fumimaro Konoye noted the need for caution. Kwantung, however, pushed for and secured control of the disputed salient from Chosen Army by October 8, 1938. Even winter's chill couldn't quench their vengeful fire, setting the stage for future confrontations. A quick look at the regional map reveals how Manchukuo and the Mongolian People's Republic each jut into the other's territory like protruding salients. These bulges could be seen as aggressive thrusts into enemy land, yet they also risked encirclement and absorption by the opposing empire. A northward push from western Manchuria through Mongolia could sever the MPR and Soviet Far East from the USSR's heartland. Conversely, a pincer movement from Mongolia and the Soviet Maritime Province might envelop and isolate Manchukuo. This dynamic highlights the frontier's strategic volatility in the 1930s. One particularly tense sector was the broad Mongolian salient extending about 150 miles eastward into west-central Manchukuo. There, in mid-1939, Soviet-Japanese tensions erupted into major combat. Known to the Japanese as the Nomonhan Incident and to the Soviets and Mongolians as the Battle of Khalkhin Gol, this clash dwarfed the earlier Changkufeng affair in scale, duration, and impact. Spanning four months and claiming 30,000 to 50,000 casualties, it amounted to a small undeclared war, the modern era's first limited conflict between great powers. The Mongolian salient features vast, semiarid plains of sandy grassland, gently rolling terrain dotted with sparse scrub pines and low shrubs. The climate is unforgivingly continental: May brings hot days and freezing nights, while July and August see daytime highs exceeding 38°C (100°F in American units), with cool evenings. Swarms of mosquitoes and massive horseflies necessitate netting in summer. Rainfall is scarce, but dense morning fogs are common in August. Come September, temperatures plummet, with heavy snows by October and midwinter lows dipping to –34°C. This blend of North African aridity and North Dakotan winters supports only sparse populations, mainly two related but distinct Mongol tribes. The Buriat (or Barga) Mongols migrated into the Nomonhan area from the northwest in the late 17th to early 18th centuries, likely fleeing Russian expansion after the 1689 Treaty of Nerchinsk. Organized by Manchu emperors between 1732 and 1735, they settled east of the river they called Khalkhin Gol (Mongolian for "river"), in lands that would later become Manchukuo. The Khalkha Mongols, named for the word meaning "barrier" or "shield," traditionally guarded the Mongol Empire's northern frontiers. Their territories lay west of the Buriats, in what would become the MPR. For centuries, these tribes herded livestock across sands, river crossings, and desert paths, largely oblivious to any formal borders. For hundreds of years, the line dividing the Mongolian salient from western Manchuria was a hazy administrative divide within the Qing Empire. In the 20th century, Russia's detachment of Outer Mongolia and Japan's seizure of Manchuria transformed this vague boundary into a frontline between rival powers. The Nomonhan Incident ignited over this contested border. Near the salient's northeastern edge, the river, called Khalkhin Gol by Mongols and Soviets, and Halha by Manchurians and Japanese, flows northwest into Lake Buir Nor. The core dispute: Was the river, as Japan asserted, the historic boundary between Manchukuo and the MPR? Soviet and MPR officials insisted the line ran parallel to and 10–12 miles east of the river, claiming the intervening strip. Japan cited no fewer than 18 maps, from Chinese and Japanese sources, to support the river as the border, a logical choice in such barren terrain, where it served as the sole natural divider. Yet, Soviets and Mongolians countered with evidence like a 1919 Chinese postal atlas and maps from Japanese and Manchukuoan agencies (1919–1934). Unbeknownst to combatants, in July 1939, China's military attaché in Moscow shared a 1934 General Staff map with his American counterpart, showing the border east of the river. Postwar Japanese studies of 18th-century Chinese records confirm that in 1734, the Qing emperor set a boundary between Buriat and Khalkha Mongols east of the river, passing through the hamlet of Nomonhan—as the Soviets claimed. However, Kwantung Army Headquarters dismissed this as non-binding, viewing it as an internal Qing affair without Russian involvement. Two former Kwantung Army officers offer a pragmatic explanation: From 1931 to 1935, when Soviet forces in the Far East were weak, Japanese and Manchukuoan authorities imposed the river as the de facto border, with MPR acquiescence. By the mid- to late 1930s, as Soviet strength grew, Japan refused to yield, while Mongolians and Soviets rejected the river line, sparking clashes. In 1935, Kwantung Army revised its maps to align with the river claim. From late that year, the Lake Buir Nor–Halha sector saw frequent skirmishes between Manchukuoan and MPR patrols. Until mid-1938, frontier defense in northwestern Manchukuo fell to the 8th Border Garrison Unit , based near Hailar. This 7,000-man force, spread thin, lacked mobility, training, and, in Kwantung Army's eyes, combat readiness. That summer, the newly formed 23rd Division, under Kwantung Army, took station at Hailar, absorbing the 8th BGU under its command, led by Lieutenant General Michitaro Komatsubara. At 52, Komatsubara was a premier Russian specialist in the Imperial Army, with stints as military attaché in the USSR and head of Kwantung's Special Services Agency in Harbin. Standing 5'7" with a sturdy build, glasses, and a small mustache, he was detail-oriented, keeping meticulous diaries, writing lengthy letters, and composing poetry, though he lacked combat experience. Before departing Tokyo in July 1938, Komatsubara received briefings from Colonel Masazumi Inada, AGS Operations Section chief. Amid planning for Changkufeng, Inada urged calm on the Manchukuo-MPR border given China's ongoing campaigns. Guidelines: Ignore minor incidents, prioritize intelligence on Soviet forces east of Lake Baikal, and study operations against the Soviet Far East's western sector. Familiar with the region from his Harbin days, Komatsubara adopted a low-key approach. Neither impulsive nor aggressive, he kept the green 23rd Division near Hailar, delegating patrols to the 8th BGU. An autumn incident underscores his restraint. On November 1, 1938, an 8th BGU patrol was ambushed by MPR forces. Per Japanese accounts, the three-man team, led by a lieutenant, strayed too close to the border and was attacked 50 meters inside Manchukuo. The lieutenant escaped, but his men died. Komatsubara sent an infantry company to secure the site but forbade retaliation. He pursued body recovery diplomatically, protested to MPR and Soviet officials, and disciplined his officers: garrison leaders got five days' confinement for poor troop training, the lieutenant thirty days. Despite this caution, pressures at AGS and KwAHQ were mounting, poised to thrust the 23rd Division into fierce battle. Modern militaries routinely develop contingency plans against potential adversaries, and the mere existence of such strategies doesn't inherently signal aggressive intentions. That said, shifts in Japan's operational planning vis-à-vis the Soviet Union may have inadvertently fueled the Nomonhan Incident. From 1934 to 1938, Japanese war scenarios emphasized a massive surprise assault in the Ussuri River region, paired with defensive holding actions in northwestern Manchuria. However, between mid-1938 and early 1939, a clandestine joint task force from the Army General Staff and Kwantung Army's Operations Departments crafted a bold new blueprint. This revised strategy proposed containing Soviet forces in the east and north while unleashing a full-scale offensive from Hailar, advancing west-northwest toward Chita and ultimately Lake Baikal. The goal: sever the Transbaikal Soviet Far East from the USSR's core. Dubbed Plan Eight-B, it gained Kwantung Army's endorsement in March 1939. Key architects—Colonels Takushiro Hattori and Masao Terada, along with Major Takeharu Shimanuki—were reassigned from AGS to Kwantung Army Headquarters to oversee implementation. The plan anticipated a five-year buildup before execution, with Hattori assuming the role of chief operations staff officer. A map review exposes a glaring vulnerability in Plan Eight-B: the Japanese advance would leave its southern flank exposed to Soviet counterstrikes from the Mongolian salient. By spring 1939, KwAHQ likely began perceiving this protrusion as a strategic liability. Notably, at the outbreak of Nomonhan hostilities, no detailed operational contingencies for the area had been formalized. Concurrently, Japan initiated plans for a vital railroad linking Harlun Arshan to Hailar. While its direct tie to Plan Eight-B remains unclear, the route skirted perilously close to the Halha River, potentially heightening KwAHQ's focus on the disputed Mongolian salient. In early 1939, the 23rd Division intensified reconnaissance patrols near the river. Around this time, General Grigory Shtern, freshly appointed commander of Soviet Far Eastern forces, issued a public warning that Japan was gearing up for an assault on the Mongolian People's Republic. As Plan Eight-B took shape and railroad proposals advanced, KwAHQ issued a strikingly confrontational set of guidelines for frontier troops. These directives are often cited as a catalyst for the Nomonhan clash, forging a chain linking the 1937 Amur River incident, the 1938 Changkufeng debacle, and the 1939 conflict.Resentment had festered at KwAHQ over perceived AGS meddling during the Amur affair, which curtailed their command autonomy. This frustration intensified at Changkufeng, where General Kamezo Suetaka's 19th Division endured heavy losses, only for the contested Manchukuoan territory to be effectively ceded. Kwantung Army lobbied successfully to wrest oversight of the Changkufeng salient from Chosen Army. In November 1938, Major Masanobu Tsuji of KwAHQ's Operations Section was sent to survey the site. The audacious officer was dismayed: Soviet forces dominated the land from the disputed ridge to the Tumen River. Tsuji undertook several winter reconnaissance missions. His final outing in March 1939 involved leading 40 men to Changkufeng's base. With rifles slung non-threateningly, they ascended to within 200 yards of Soviet lines, formed a line, and urinated in unison, eliciting amused reactions from the enemy. They then picnicked with obentos and sake, sang army tunes, and left gifts of canned meat, chocolates, and whiskey. This theatrical stunt concealed Tsuji's real aim: covert photography proving Soviet fortifications encroached on Manchukuoan soil. Tsuji was a singular figure. Born of modest means, he embodied a modern samurai ethos, channeling a sharp intellect into a frail, often ailing body through feats of extraordinary daring. A creative tactician, he thrived in intelligence ops, political scheming, aerial scouting, planning, and frontline command—excelling across a tumultuous career. Yet, flaws marred his brilliance: narrow bigotry, virulent racism, and capacity for cruelty. Ever the ambitious outsider, Tsuji wielded outsized influence via gekokujo—Japan's tradition of subordinates steering policy from below. In 1939, he was a major, but his pivotal role at Nomonhan stemmed from this dynamic. Back in Hsinking after his Changkufeng escapade, Tsuji drafted a response plan: negotiate border "rectification" with the Soviets; if talks failed, launch an attack to expel intruders. Kwantung Army adopted it. Deputy Chief of Staff Major General Otozaburo Yano flew to Tokyo with Tsuji's photos, seeking AGS approval. There, he was rebuffed—Changkufeng was deemed settled, and minor violations should be overlooked amid Tokyo's aversion to Soviet conflict. Yano's plea that leniency would invite aggression was countered by notes on Europe's tensions restraining Moscow. Yano's return sparked outrage at KwAHQ, seen as AGS thwarting their imperial duty to safeguard Manchukuo. Fury peaked in the Operations Section, setting the stage for Tsuji's drafting of stringent new frontier guidelines: "Principles for the Settlement of Soviet-Manchukuoan Border Disputes." The core tenet: "If Soviet troops transgress the Manchukuoan frontiers, Kwantung Army will nip their ambitions in the bud by completely destroying them." Specific directives for local commanders included: "If the enemy crosses the frontiers … annihilate him without delay, employing strength carefully built up beforehand. To accomplish our mission, it is permissible to enter Soviet territory, or to trap or lure Soviet troops into Manchukuoan territory and allow them to remain there for some time… . Where boundary lines are not clearly defined, area defense commanders will, upon their own initiative, establish boundaries and indicate them to the forward elements… . In the event of an armed clash, fight until victory is won, regardless of relative strengths or of the location of the boundaries. If the enemy violates the borders, friendly units must challenge him courageously and endeavor to triumph in their zone of action without concerning themselves about the consequences, which will be the responsibility of higher headquarters." Major Tsuji Masanobu later justified the new guidelines by pointing to the "contradictory orders" that had hamstrung frontier commanders under the old rules. They were tasked with upholding Manchukuo's territorial integrity yet forbidden from actions that might spark conflict. This, Tsuji argued, bred hesitation, as officers feared repercussions for decisive responses to incursions. The updated directives aimed to alleviate this "anxiety," empowering local leaders to act boldly without personal liability. In truth, Tsuji's "Principles for the Settlement of Soviet-Manchukuoan Border Disputes" were more incendiary than conciliatory. They introduced provocative measures: authorizing commanders to unilaterally define unclear boundaries, enforce them with immediate force "shoot first, ask questions later", permit pursuits into enemy territory, and even encourage luring adversaries across the line. Such tactics flouted both government policy and official army doctrine, prioritizing escalation over restraint. The proposals sparked intense debate within Kwantung Army's Operations Section. Section chief Colonel Takushiro Hattori and Colonel Masao Terada outranked Tsuji, as did Major Takeharu Shimanuki, all recent transfers from the Army General Staff. Tsuji, however, boasted longer tenure at Kwantung Army Headquarters since April 1936 and in Operations since November 1937, making him the de facto veteran. Hattori and Terada hesitated to challenge the assertive major, whose reputation for intellect, persuasion, and deep knowledge of Manchuria commanded respect. In a 1960 interview, Shimanuki recalled Tsuji's dominance in discussions, where his proactive ideas often swayed the group. Unified, the section forwarded Tsuji's plan to Kwantung Army Command. Commander Lieutenant General Kenkichi Ueda consulted Chief of Staff General Rensuke Isogai and Vice Chief General Otozaburo Yano, seasoned leaders who should have spotted the guidelines' volatility. Yet, lingering grudges from AGS "interference" in past incidents like the Amur River and Changkufeng clouded their judgment. Ueda, Isogai, and Tsuji shared history from the 1932 Shanghai Incident: Tsuji, then a captain, led a company in the 7th Regiment under Colonel Isogai, with Yano as staff officer and Ueda commanding the 9th Division. Tsuji was wounded there, forging bonds of camaraderie. This "clique," which grew to include Hattori, Terada, and Shimanuki, amplified Tsuji's influence. Despite Isogai's initial reservations as the group's moderate voice, the guidelines won approval. Ueda issued them as Kwantung Army Operations Order 1488 on April 25, 1939, during a division commanders' conference at KwAHQ. A routine copy reached AGS in Tokyo, but no formal reply came. Preoccupied with the China War and alliance talks with Germany, AGS may have overlooked border matters. Colonel Masazumi Inada, AGS Operations head, later noted basic acceptance of Order 1488, with an informal expectation—relayed to Hattori and Terada—of prior consultation on violations. KwAHQ dismissed this as another Tokyo intrusion on their autonomy. Some Japanese analysts contend a stern AGS rejection might have prevented Nomonhan's catastrophe, though quelling Kwantung's defiance could have required mass staff reassignments, a disruptive step AGS avoided. Tsuji countered that permitting forceful action at Changkufeng would have deterred Nomonhan altogether, underscoring the interconnectedness of these clashes while implicitly critiquing the 1939 battle's location. Undeniably, Order 1488's issuance on April 25 paved the way for conflict three weeks later. Japanese records confirm that Khalkha Mongols and MPR patrols routinely crossed the Halha River—viewed by them as internal territory, 10 miles from the true border. Such crossings passed uneventfully in March and April 1939. Post-Order 1488, however, 23rd Division commander General Michitaro Komatsubara responded aggressively, setting the stage for escalation. The Nomonhan Incident ignited with a border clash on May 11–12, 1939, that rapidly spiraled into a major conflict. Over a dozen "authoritative" accounts exist, varying in viewpoint, focus, and specifics. After cross-referencing these sources, a coherent timeline emerges. On the night of May 10–11, a 20-man Mongolian People's Republic border patrol crossed eastward over the Halha River (known as Khalkhin Gol to Mongols and Soviets). About 10 miles east, atop a 150-foot sandy hill, lay the tiny hamlet of Nomonhan, a cluster of crude huts housing a few Mongol families. Just south flowed the Holsten River, merging westward into the broader Halha. By morning on May 11, Manchukuoan forces spotted the MPR patrol north of the Holsten and west of Nomonhan. In the MPR/Soviet perspective, Nomonhan Hill marked the Mongolia-Manchuria border. To Manchukuoans and Japanese, it sat 10 miles inside Manchukuo, well east of the Halha. A 40-man Manchukuoan cavalry unit repelled the Mongolians back across the river, inflicting initial casualties on both sides—the Manchukuoans drawing first blood. The MPR patrol leader exaggerated the attackers as 200 strong. The next day, May 12, a 60-man MPR force under Major P. Chogdan evicted the Manchukuoans from the disputed zone, reestablishing positions between the Halha and Nomonhan. The Manchukuoans, in turn, reported facing 700 enemies. Sporadic skirmishes and maneuvering persisted through the week. On May 13, two days post-clash, the local Manchukuoan commander alerted General Michitaro Komatsubara's 23rd Division headquarters in Hailar. Simultaneously, Major Chogdan reported to Soviet military command in Ulaanbaatar, Mongolia's capital. What began as a Mongolian-Manchukuoan spat was poised to draw in Soviet and Japanese patrons. Attributing the May 10–11 violation hinges on border interpretations: both sides claimed the Halha-Nomonhan strip. Yet, most accounts concur that Manchukuoan forces initiated the fighting. Post-May 13 notifications to Moscow and Tokyo clarify the record thereafter. Midday on May 13, Komatsubara was leading a staff conference on the newly issued Kwantung Army Operations Order 1488—Major Tsuji Masanobu's aggressive border guidelines. Ironically, the first Nomonhan combat report arrived mid-discussion. Officers present recall Komatsubara deciding instantly to "destroy the invading Outer Mongolian forces" per Order 1488. That afternoon, he informed Kwantung Army Headquarters of the incident and his intent to eradicate the intruders, requesting air support and trucks. General Kenkichi Ueda, Kwantung commander, approved Komatsubara's "positive attitude," dispatching six scout planes, 40 fighters, 10 light bombers, two anti-aircraft batteries, and two motorized transport companies. Ueda added a caveat: exercise "extreme caution" to prevent escalation—a paradoxical blend of destruction and restraint, reflective of KwAHQ's fervent mood. Ueda relayed the details to Tokyo's Army General Staff, which responded that Kwantung should handle it "appropriately." Despite Kwantung's impulsive reputation, Tokyo deferred, perhaps trusting the northern strategic imbalance, eight Japanese divisions versus 30 Soviet ones from Lake Baikal to Vladivostok, would enforce prudence. This faith proved misguided. On May 14, Major Tsuji flew from KwAHQ for aerial reconnaissance over Nomonhan, spotting 20 horses but no troops. Upon landing, a fresh bullet hole in his plane confirmed lingering MPR presence east of the Halha. Tsuji briefed 23rd Division staff and reported to Ueda that the incident seemed minor. Aligning with Order 1488's spirit, Komatsubara deployed a force under Lieutenant Colonel Yaozo Azuma: an armored car company, two infantry companies, and a cavalry troop. Arriving at Nomonhan on May 15, Azuma learned most MPR forces had retreated westward across the Halha the prior night, with only token elements remaining, and those withdrawing. Undeterred, he pursued. The advance met scant resistance, as foes had crossed the river. However, Japanese light bombers struck a small MPR concentration on the west bank, Outpost Number 7, killing two and wounding 15 per MPR reports; Japanese claimed 30–40 kills. All agree: the raid targeted undisputed MPR territory. Hearing of May 15's events, Komatsubara deemed the Mongolians sufficiently rebuked and recalled Azuma to Hailar on May 16. KwAHQ concurred, closing the matter. Soviet leaders, however, saw it differently. Mid-May prompted Soviet support for the MPR under their 1936 Mutual Defense Pact. The Red Army's 57th Corps, stationed in Mongolia, faced initial disarray: Commander Nikolai Feklenko was hunting, Chief of Staff A. M. Kushchev in Ulan Ude with his ill wife. Moscow learned of clashes via international press from Japanese sources, sparking Chief of Staff Boris Shaposhnikov's furious inquiry. Feklenko and Kushchev rushed back to Ulaanbaatar, dispatching a mixed force—a battalion from the 149th Infantry Regiment (36th Division), plus light armor and artillery from the 11th Tank Brigade—to Tamsag Bulak, 80 miles west of the Halha. Led by Major A. E. Bykov, it bolstered the MPR's 6th Cavalry Division. Bykov and Cavalry Commander Colonel Shoaaiibuu inspected the site on May 15, post-Azum's departure. The cavalry arrived two days later, backed by Bykov (ordered to remain west of the river and avoid combat if possible). Some MPR troops recrossed, occupying the disputed zone. Clashes with Manchukuoan cavalry resumed and intensified. Notified of renewed hostilities, Komatsubara viewed it as defiance, a personal affront. Emboldened by Order 1488, he aimed not just to repel but to encircle and annihilate. The incident was on the verge of major expansion. I would like to take this time to remind you all that this podcast is only made possible through the efforts of Kings and Generals over at Youtube. Please go subscribe to Kings and Generals over at Youtube and to continue helping us produce this content please check out www.patreon.com/kingsandgenerals. If you are still hungry after that, give my personal channel a look over at The Pacific War Channel at Youtube, it would mean a lot to me. The ghosts of the Changufeng incident have come back to haunt both the USSR and Japan. Those like Tsuji Masanobu instigated yet another border clash that would erupt into a full blown battle that would set a precedent for both nations until the very end of WW2.
A psychiatrist who treated the Westfield Bondi Junction attacker has been referred for review by the coroner investigating the mass killing in 2024. New South Wales State Coroner Teresa O'Sullivan criticised the care of Joel Cauchi's former psychiatrist for failing to adequately respond to a schizophrenia relapse in the years before the mass stabbing, which saw six people killed and 10 injured. She has made 23 recommendations, including a call for the Health Ombudsman of Queensland to review the psychiatrist's care and treatment of Joel Cauchi. - सिड्नीको बोन्डाइस्थित वेस्टफिल्डमा सन् २०२४ मा ६ जनाको मृत्यु हुने गरी भएको सामूहिक हत्याको छानबिन गरिरहेकी कोरोनरले घटनामा संलग्न भनिएका आक्रमणकारीको उपचार गर्ने मनोचिकित्सकले आफ्नो जिम्मेवारी ठिक सँग पुरा गरे नगरेको बारेमा समीक्षाका लागि सिफारिस गरेकी छन् । यद्यपि कोरोनरले उक्त घटनाका पछाडि मनोचिकित्सकको मात्र दोष नरहेको भन्दै २३ सिफारिस पनि दिएकी छन्। एक रिपोर्ट।
Attackers are moving faster and faster every day, and the challenge of keeping pace is a daunting one. But it's not impossible. watchTowr's Ryan Dewhurst joins Dennis Fisher to talk about how the "magic" of computers first captured his imagination when he was young, how defenders can learn from attackers' tactics and adapt, and how the AI revolution is accelerating vulnerability disclosure and exploitation.Support the show
(Presented by Thinkst Canary: Most Companies find out way too late that they've been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching 'em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.) Three Buddy Problem - Episode 84: We process the cybersecurity fallout from the latest Epstein document dump, focusing on why redactions fail in the AI era and how quickly modern tools can unravel them. The conversation moves from sloppy redaction practices and exploit mythology to harder questions about ethics, accountability, and silence within the infosec community. Plus, inside the Notepad++ supply-chain compromise attributed to a known Chinese APT, Microsoft's security executive changes, Anthropic's AI-driven vulnerability discovery, China-linked network implants, and Lockdown Mode thwarting FBI investigators. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.
Sinister Christian Nationalist pastor Doug Wilson gets interviewed by chunky conservative media lolcow Ross Douthat. Amazingly, the person who comes out of this horrifying development looking worst is... Sam Harris? CONTENT WARNINGS. BECAUSE DOUG WILSON SAYING STUFF. EPISODE NOTES: Christian Nationalism vs Clown World | Interesting Times with Ross Douthat https://www.youtube.com/watch?v=WAYWbbSeIhE Dogma, Tribe, and Truth (Sam Harris, Making Sense Ep. 449) https://www.youtube.com/watch?v=nmtTAlbGv_M I Don't Speak German: 139: Bad Faith Discussion; Doug Wilson talks to Sam Harris https://idontspeakgerman.libsyn.com/139-bad-faith-discussion-doug-wilson-talks-to-sam-harris EXTRA NOTES re WILSON: Sons of Patriarchy Podcast - YouTube https://www.youtube.com/@SonsofPatriarchy Inside the Church That Preaches 'Wives Need to Be Led with a Firm Hand' https://www.vice.com/en/article/inside-the-church-that-preaches-wives-need-to-be-led-with-a-firm-hand/ At Doug Wilson's DC Church Plant, 'Worship Is Warfare' - Christianity Today https://www.christianitytoday.com/2025/07/christ-church-dc-doug-wilson-pete-hegseth/ Doug Wilson: The New Right's Favorite Pastor - POLITICO https://www.politico.com/news/magazine/2025/05/23/doug-wilson-new-right-pastor-hegseth-trump-officials-00355376 Examining Doug Wilson & Moscow - YouTube https://www.youtube.com/@ExaminingMoscow Sexual Abuse is Inevitable in Christian Patriarchy; Just Take a Look at Doug Wilson's Christ Church, and its New 'Documentary' 'Eve in Exile: The Restoration of Femininity' | Religion Dispatches https://religiondispatches.org/2022/05/31/sexual-abuse-inevitable-christian-patriarchy-just-take-look-doug-wilsons-christ-church Culture war and the evangelical church: Doug Wilson's "No Quarter November" hit the mainstream this year. https://slate.com/human-interest/2023/12/evangelical-church-doug-wilson-idaho-culture-war-no-quarter-november.html Doug Wilson Says https://dougwilsonsays.com/ 5 Part interview with Doug Wilson at Darren Doane's podcast / channel https://www.youtube.com/@allmyfriendsareheretics1354/featured Doug Wilson's Religious Empire Expanding in the Northwest https://www.splcenter.org/resources/reports/doug-wilsons-religious-empire-expanding-northwest/ Rachel Shubin: Analyzing Douglas Wilson's Handling of the Steven Sitler and Jamin Wight Cases https://www.moscowid.net/wp-content/uploads/2016/09/Analyzing-DWs-Response-to-Sitler-and-Wight-Cases.pdf Doug Wilson Archive | Champion of child rapists, Attacker of victims, Pastor of Christ Church in Moscow, Idaho, Presiding Minister of the Communion of Reformed Evangelical Churches (CREC) https://dougwilsonarchive.wordpress.com/ Doug Wilson Believes - Quotes from the Moscow, Idaho Pastor https://dougwilsonbelieves.com/ Fundie Fridays: Doug Wilson, the Final Boss of Christian Nationalism https://youtu.be/6dhaNeJ9UDw?si=SbAJoNEqnhOg8ckF Confronting Doug Wilson - by Kristin Du Mez https://kristindumez.substack.com/p/confronting-doug-wilson In an Idaho college town, Doug Wilson envisions an American theocracy : Up First from NPR : NPR https://www.npr.org/transcripts/1224382120 Bible Experts React To Viral CNN Christian Segment | HuffPost UK Life https://www.huffingtonpost.co.uk/entry/doug-wilson-pete-hegseth_l_689a2042e4b0be3f5edc4799 SHOW NOTES: Please consider donating to help us make the show and stay ad-free and independent. Patrons get exclusive access to at least one full extra episode a month plus all backer-only back-episodes. Daniel's Patreon: https://www.patreon.com/danielharper/posts Jack's Patreon: https://www.patreon.com/user?u=4196618&fan_landing=true IDSG Twitter: https://twitter.com/idsgpod Daniel's Twitter: @danieleharper Jack's (Locked) Twitter: @_Jack_Graham_ Jack's Bluesky: @timescarcass.bsky.social Daniel's Bluesky: @danielharper.bsky.social IDSG on Apple Podcasts: https://podcasts.apple.com/us/podcast/i-dont-speak-german/id1449848509?ls=1
Jeff & Shannon break the Benghazi suspect extradition, slam Hillary's mockery of the attack, expose Collins bloodline ties, and react to Bill Maher's QAnon apology question. Part 5 exclusive on Rumble Premium. Tune in at Rumble, YouTube, X and Red State Talk Radio now! Rise up, patriots—@intheMatrixxx and @shadygrooove deliver another unfiltered truth bomb in Season 8, Episode 025, “Benghazi Attacker Arrested and in US Custody; Part 5: Follow the Bloodlines,” tearing into Attorney General Pam Bondi's announcement that suspected 2012 Benghazi participant Zubar Al-Bakash has been captured and extradited to U.S. custody—finally delivering on Trump's long-standing demand for justice after four Americans were murdered while Hillary Clinton infamously scoffed, “what difference at this point does it make?” The hosts spotlight the glaring hypocrisy and question why establishment media continues to minimize or ignore this major win. In the second hour—available exclusively as Rumble Premium Content—they dive deeper into Part 5: Follow the Bloodlines, reading directly from historical sources to trace the Collins family's documented path from 1630s New England witchcraft accusations through elite financial networks, generational wealth transfers, and connections to powerful modern political and banking dynasties. They also react to Bill Maher publicly asking, “Where does QAnon go for the apology?” after recent revelations lent credence to long-ridiculed claims about elite networks—proof that real research eventually surfaces even on mainstream stages. The truth is learned, never told—the constitution is your weapon—tune in at noon-0-five Eastern LIVE to stand with Trump! MG Show: America First MAGA Podcast & Conservative Talk Show Launched in 2019 and now in Season 8, the MG Show is your go-to source for unfiltered truth on Trump policies, border security, economic nationalism, and exposing globalist psyops. Hosted by Jeffrey Pedersen (@InTheMatrixxx) and Shannon Townsend (@ShadyGrooove), it champions sovereignty, traditional values, and critiques of establishment politics. Tune in weekdays at 12pm ET / 9am PT for patriotic insights strengthening the Republic under President Trump's America First agenda. Hosts - Jeffrey Pedersen (@InTheMatrixxx): Expert in political analysis and exposing hidden agendas, with a focus on Trump's diplomatic wins and media bias. - Shannon Townsend (@ShadyGrooove): Delivers sharp insights on intelligence operations, Constitutional rights, and defenses of Trump's strategies against mainstream critiques. Where to Watch & Listen Catch live episodes or on-demand replays packed with MAGA victories like inflation drops, border awards, Trump pardons, and psyop exposures: - Live Streams: https://rumble.com/mgshow for premium America First content. - Radio: https://mgshow.link/redstate on Red State Talk Radio. - X Live: https://x.com/inthematrixxx for real-time pro-Trump discussions. - Podcasts: Search "MG Show" on PodBean, Apple Podcasts, Pandora, and Amazon Music. - YouTube: Full episodes at https://youtube.com/c/inthematrixxx and https://www.youtube.com/c/TruthForFreedom. Follow for daily pro-Trump alerts: - X: @InTheMatrixxx (https://x.com/inthematrixxx) and @ShadyGrooove (https://x.com/shadygrooove). Support the MG Show Fuel the MAGA movement against establishment lies: - Donate: https://mg.show/support or contribute at https://givesendgo.com/helpmgshow. - Merch: https://merch.mg.show for official gear. - MyPillow Special: Use code MGSHOW at https://mypillow.com/mgshow. - Crypto: https://mgshow.link/rumblewallet. All Links Everything MG Show Related: https://linktr.ee/mgshow. MG Show Anthem Get chills with the patriotic track: https://youtu.be/SyfI8_fnCAs
A psychiatrist who treated the Westfield Bondi Junction attacker has been referred for review by the coroner investigating the mass killing in 2024. New South Wales State Coroner Teresa O'Sullivan criticised the care of Joel Cauchi's former psychiatrist for failing to adequately respond to a schizophrenia relapse in the years before the mass stabbing, which saw six people killed and 10 injured. She has made 23 recommendations, including a call for the Health Ombudsman of Queensland to review the psychiatrist's care and treatment of Joel Cauchi. - Опубликованы результаты расследования массового нападения с ножом в торговом центре Westfield Bondi Junction в Сиднее. 13 апреля 2024 года Каучи нанес ножевые ранения 10 людям, убив шестерых, прежде чем был застрелен инспектором полиции Нового Южного Уэльса Эми Скотт. Психиатр из Квинсленда доктор Андреа Борос-Лавак лечила Каучи от хронической шизофрении с марта 2012 года.
Fiery Fridays are BACK and it's a good one this week!In today's episode, Alex Crook absolutely HAMMERS Christian Romero and his leadership, Adrian Durham and Angelina Kelly CLASH over whether Bruno Fernandes is the best player on the planet right now and Adrian redesigns the way promotion and relegation should work between the Premier League and Championship as he is just simply SICK of Burnley!As you know by now every Friday, it's all about bold opinions, strong feelings, and arguments just waiting to happen. Because as the week winds down, we're turning the heat all the way up… That's another three HUGE opinions… no sitting on the fence… and absolutely no fear of things getting a little heated.Produced by: Daniel KaneEdited by: Daniel Kane Hosted on Acast. See acast.com/privacy for more information.
This episode of Going In Raw is sponsored by BetterHelp and Tempo! Give online therapy a try at http://www.betterhelp.com/raw and get on your way to being your best self. Go to http://www.tempomeals.com/raw to get 60% off your first box! Consider joining Friendo Club by clicking JOIN ($5/month) OR becoming a $5+ Patron at http://www.patreon.com/steveandlarson!
In the security news this week: Residential proxy abuse is everywhere this week: from Google's takedown of IPIDEA to massive Citrix NetScaler scanning and the Badbox 2.0 botnet Supply chain fun time: Notepad++ updates were hijacked Attackers set their sights on: Ivanti EPMM, Dell Unity storage, Fortinet VPNs/firewalls, and ASUSTOR NAS devices Russian state hackers went after Poland's grid Is ICE on a surveillance shopping spree and into hacking anti-ICE apps? Ukraine's war-time Starlink problem is turning into a policy and controls experiment The AI security theme is alive and well with exposed LLM endpoints, OpenClaw/Moltbot/Moltbook fiasco, and letting anyone hijack agents Signed forensic driver for Windows is still an EDR killer The Trump administration's rollback of software security attestation National Cyber Director Sean Cairncross says: “less regulation, more cooperation.” Finally, there are some “only in infosec” human stories: * pen testers arrested in Iowa now getting a settlement, * a Google engineer convicted over stolen AI IP, * Booz Allen losing Treasury work over intentional insider leaks, * and an “AI psychosis” saga at an adult-content platform. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-912
Detective Chief Superintendent Seamus Boland, Head of the Garda's Drugs and Organised Crime Bureau, speaks to Crime Correspondent, Paul Reynolds, about the intelligence failure ahead of the Regency Hotel attack ten years ago.
In the security news this week: Residential proxy abuse is everywhere this week: from Google's takedown of IPIDEA to massive Citrix NetScaler scanning and the Badbox 2.0 botnet Supply chain fun time: Notepad++ updates were hijacked Attackers set their sights on: Ivanti EPMM, Dell Unity storage, Fortinet VPNs/firewalls, and ASUSTOR NAS devices Russian state hackers went after Poland's grid Is ICE on a surveillance shopping spree and into hacking anti-ICE apps? Ukraine's war-time Starlink problem is turning into a policy and controls experiment The AI security theme is alive and well with exposed LLM endpoints, OpenClaw/Moltbot/Moltbook fiasco, and letting anyone hijack agents Signed forensic driver for Windows is still an EDR killer The Trump administration's rollback of software security attestation National Cyber Director Sean Cairncross says: "less regulation, more cooperation." Finally, there are some "only in infosec" human stories: * pen testers arrested in Iowa now getting a settlement, * a Google engineer convicted over stolen AI IP, * Booz Allen losing Treasury work over intentional insider leaks, * and an "AI psychosis" saga at an adult-content platform. Show Notes: https://securityweekly.com/psw-912
A psychiatrist who treated the Westfield Bondi Junction attacker has been referred for review by the coroner investigating the mass killing in 2024. New South Wales State Coroner Teresa O'Sullivan criticised the care of Joel Cauchi's former psychiatrist for failing to adequately respond to a schizophrenia relapse in the years before the mass stabbing, which saw six people killed and 10 injured. She has made 23 recommendations, including a call for the Health Ombudsman of Queensland to review the psychiatrist's care and treatment of Joel Cauchi.
In the security news this week: Residential proxy abuse is everywhere this week: from Google's takedown of IPIDEA to massive Citrix NetScaler scanning and the Badbox 2.0 botnet Supply chain fun time: Notepad++ updates were hijacked Attackers set their sights on: Ivanti EPMM, Dell Unity storage, Fortinet VPNs/firewalls, and ASUSTOR NAS devices Russian state hackers went after Poland's grid Is ICE on a surveillance shopping spree and into hacking anti-ICE apps? Ukraine's war-time Starlink problem is turning into a policy and controls experiment The AI security theme is alive and well with exposed LLM endpoints, OpenClaw/Moltbot/Moltbook fiasco, and letting anyone hijack agents Signed forensic driver for Windows is still an EDR killer The Trump administration's rollback of software security attestation National Cyber Director Sean Cairncross says: "less regulation, more cooperation." Finally, there are some "only in infosec" human stories: * pen testers arrested in Iowa now getting a settlement, * a Google engineer convicted over stolen AI IP, * Booz Allen losing Treasury work over intentional insider leaks, * and an "AI psychosis" saga at an adult-content platform. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-912
Brenton Harrison Tarrant was jailed for life in August 2020, with no possibility of parole, after he plead guilty to the murder of 51 people and wounding 40 in the Christchurch terror attack. Tarrant is now, five years later, attempting to overturn his conviction with claims he was not in a rational state when he plead guilty. Criminal defence lawyer Steve Cullen spoke to Andrew Dickens about the appeal saying, "It's a very difficult situation for all, but we have to let the wheels of justice grind on and let it be dealt with properly so that hopefully, whatever the outcome is, we'll get finality and closure this time." LISTEN ABOVESee omnystudio.com/listener for privacy information.
In the security news this week: Residential proxy abuse is everywhere this week: from Google's takedown of IPIDEA to massive Citrix NetScaler scanning and the Badbox 2.0 botnet Supply chain fun time: Notepad++ updates were hijacked Attackers set their sights on: Ivanti EPMM, Dell Unity storage, Fortinet VPNs/firewalls, and ASUSTOR NAS devices Russian state hackers went after Poland's grid Is ICE on a surveillance shopping spree and into hacking anti-ICE apps? Ukraine's war-time Starlink problem is turning into a policy and controls experiment The AI security theme is alive and well with exposed LLM endpoints, OpenClaw/Moltbot/Moltbook fiasco, and letting anyone hijack agents Signed forensic driver for Windows is still an EDR killer The Trump administration's rollback of software security attestation National Cyber Director Sean Cairncross says: "less regulation, more cooperation." Finally, there are some "only in infosec" human stories: * pen testers arrested in Iowa now getting a settlement, * a Google engineer convicted over stolen AI IP, * Booz Allen losing Treasury work over intentional insider leaks, * and an "AI psychosis" saga at an adult-content platform. Show Notes: https://securityweekly.com/psw-912
Spurs Chat: Discussing all Things Tottenham Hotspur: Hosted by Chris Cowlin: The Daily Tottenham/Spurs Podcast Hosted on Acast. See acast.com/privacy for more information.
With Ben in the medic bay, Joshis joined by Venny to talk about all the content we've had since TOTY. Icon Swaps, Future Stars, Academy Evo's and much much more: 01:41 Pound for Pound Powerhouse 08:31 Future Stars Player Reviews 17:46 Which Future Stars SBC's Are Worth Doing 28:13 How Does Future Stars Academy Evo Work? 34:42 Best Playstyle Choices for Defenders 40:24 Best Playstyle Choices for Midfielders 47:17 Best Playstyle Choices for Attackers 54:32 Icon Swaps: Overview and Strategies 01:00:19 Evaluating Icon Rewards and Player Choices 01:06:46 Final Thoughts on Team of the Year Get these episodes in your podcast app: bit.ly/podfeedhelpDiscord (for Gold & Icon) Supporters: bit.ly/poddiscordhelpImprove your connection: bit.ly/connectionspecial Thank you as always for making FUT Weekly possible! Learn more about your ad choices. Visit podcastchoices.com/adchoices
OpenClaw targets ClawHub users Notepad++ update delivers malware APT28 attackers abuse Microsoft Office zero-day Get the show notes here: https://cisoseries.com/cybersecurity-news-openclaw-targets-clawhub-users-notepad-update-delivers-malware-apt28-attackers-abuse-microsoft-office-zero-day/ Huge thanks to our sponsor, Strike48 It's no secret that AI is only as good as the data available to it. Strike48 unifies agentic AI with unmatched log visibility while avoiding the typical hefty price tag. Build and deploy agents for phishing detection, alert triage, threat correlation and more. Queries existing logs where they currently live, so you can keep the technology you already have. Learn more at Strike48.com.
Cyber risk is escalating fast, and most business leaders are still operating with outdated assumptions. This episode of Security Squawk confronts that reality head on. Ransomware is no longer limited to encrypted files and downtime calculations. Threat actors are escalating pressure tactics into the physical world, including intimidation and direct threats against employees and executives. That shift fundamentally changes the risk profile for organizations. Once physical safety enters the equation, cybersecurity stops being a technical issue and becomes a leadership, legal, and duty of care problem. Companies that are unprepared for this escalation expose themselves to serious liability, regulatory scrutiny, and reputational damage that insurance alone cannot fix. At the same time, businesses are quietly introducing new risks through personal AI agents and automation tools. These tools are often adopted without security review, legal oversight, or compliance consideration. Marketed as productivity enhancers, personal AI agents frequently operate with broad access to email, files, customer data, and internal systems. When these agents mishandle or leak data, responsibility does not fall on the software vendor or the employee experimenting with automation. It falls squarely on the business. Regulators, insurers, and courts do not accept ignorance or convenience as a defense. We also examine why extortion groups like ShinyHunters continue to succeed even as companies invest heavily in security controls. This is not about sophisticated hacking techniques. It is about business pressure. Attackers understand deadlines, brand risk, customer trust, and executive fear. They exploit supply chains, third party vendors, and disclosure obligations to force decisions under time constraints. Paying extortion may feel like resolution, but it often increases long term risk, invites repeat targeting, and complicates regulatory reporting. Throughout this episode, the focus is not on tools, vendors, or technical jargon. It is on decision making. Who owns cyber risk inside the organization? How prepared is leadership to respond when incidents move beyond IT into legal, HR, and physical security territory? And how does a board defend its actions when regulators or plaintiffs start asking questions after an incident? This conversation is designed for CEOs, business owners, board members, and senior leaders who understand that cybersecurity is inseparable from operational risk, financial exposure, and executive accountability. If your strategy relies on cyber insurance, compliance checklists, or the belief that serious incidents only happen to larger companies, this episode will challenge that thinking. Security Squawk cuts through vendor noise and fear driven messaging to focus on what actually matters to businesses making real decisions. Support the show at https://buymeacoffee.com/securitysquawk
Cybersecurity Today: Google's Proxy Network Takedown, AI Agent Hijack, and More In today's episode of Cybersecurity Today, host David Shipley covers major cybersecurity stories, including Google's disruption of the massive residential proxy network IP Idea, the hijacking vulnerability of AI agent platform MT Book, and attackers abusing single sign-on platforms. We also delve into the coordinated cyber attack on Poland's energy sector by Russian state-linked actors and the misuse of eScan antivirus updates to deliver malware. Stay informed about the latest in cybersecurity with us! Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst 00:00 Introduction and Sponsor Message 00:52 Massive Residential Proxy Network Disrupted by Google 02:41 AI Agent Platform Security Flaw Exposed 04:46 Single Sign-On Platforms Targeted by Attackers 06:28 Coordinated Cyber Attack on Poland's Energy Sector 08:15 Antivirus Software Compromised by Attackers 09:45 Conclusion and Call to Action 10:13 Sponsor Message and Closing Remarks
North Korean hackers with the Lazarus Group have stolen over $300 million with this Telegram phishing scam. Subscribe to the Blockspace newsletter! Welcome back to The Blockspace Podcast! Today, Taylor Monahan, a security lead at MetaMask, joins us to talk about a highly sophisticated $300M phishing attack linked to North Korea's Lazarus Group. Taylor shares how the Lazarus Group hijacks Telegram accounts to lure victims into fake Zoom meetings and download a Trojan horse malware program. We break down the hackers' strategy, how the malware works, which wallet types are most vulnerable to theft, and what users can do to protect themselves if they have fallen prey to the scam or not. Tune in to learn how to identify these red flags and implement better digital hygiene for your crypto assets. Check out this article for a deep dive into how the malware works; plus, follow Taylor for updates on X and keep track of Laars Group's history of hacks via her Github. Subscribe to the newsletter! https://newsletter.blockspacemedia.com Notes: * Lazarus Group stole over $300M in the last year. * Attackers hijack Telegram accounts. * Scammers use fake Zoom links to deploy malware. * Malware often bypasses paid antivirus software. * Sandbox architecture on iOS offers more safety. * Software wallets and browser wallets are most vulnerable. * 2FA remains critical for sensitive account access. Timestamps: 00:00 Start 03:51 Telegram attack 11:30 2 Factor Authenticators 13:48 Losses 16:38 Calculating losses 19:08 North Korea 21:52 Malware 24:17 Malware detection 25:16 EDR 27:12 Wallets 34:21 Is verifying addresses enough? 39:28 Wallet malware design 44:11 What do they want? 54:16 Taylor stealing payloads 1:01:49 Steps to protect
We take an extended deep dive into the Ilhan Omar story and her "attacker"Former Viking Matt Kalil is now suing his ex-wife over too much information.The new Trump accounts are an interesting idea for newborns.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
We take an extended deep dive into the Ilhan Omar story and her "attacker"Former Viking Matt Kalil is now suing his ex-wife over too much information. The new Trump accounts are an interesting idea for newborns. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Get the stories from today's show in THE STACK: https://justinbarclay.comJoin Justin in the MAHA revolution - http://HealthWithJustin.comProTech Heating and Cooling - http://ProTechGR.com New gear is here! Check out the latest in the Justin Store: https://justinbarclay.com/storeKirk Elliott PHD - FREE consultation on wealth conservation - http://GoldWithJustin.comTry Cue Streaming for just $2 / day and help support the good guys https://justinbarclay.com/cueUp to 80% OFF! Use promo code JUSTIN http://MyPillow.com/JustinPatriots are making the Switch! What if we could start voting with our dollars too? http://SwitchWithJustin.com
Hour 1 of the Chris Hand Show | Wednesday 01-28-26 See omnystudio.com/listener for privacy information.
TRENDING - Minnesota Congresswoman Ilhan Omar was sprayed with an unknown substance during a town hall, Melania Trump calls for 'unity' in Minneapolis ahead of her movie release, man moons anti-ICE protesters from hotel window, DOJ drops bid to arrest Don Lemon on charges related to church protest.See omnystudio.com/listener for privacy information.
TRENDING - Minnesota Congresswoman Ilhan Omar was sprayed with an unknown substance during a town hall, Melania Trump calls for 'unity' in Minneapolis ahead of her movie release, man moons anti-ICE protesters from hotel window, DOJ drops bid to arrest Don Lemon on charges related to church protest.
This episode of Security Squawk breaks down a familiar and dangerous pattern in cybersecurity. Major brands are losing data. Attackers are moving fast. And companies are still relying on silence and delay as a response strategy. We cover hackers auctioning stolen source code from a major retailer, an unprotected database exposing millions of Gmail and Instagram records, ransomware claims involving Nike and Under Armour, and a gas station breach that exposed Social Security numbers. This is not about advanced hacking techniques or rare exploits. It is about basic security failures, weak response decisions, and the real business impact of hesitation after data exposure. If you are a business owner, executive, or IT leader, this episode explains why modern breaches cause damage long before confirmation and why waiting to respond often shifts risk onto customers and employees
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
"How many states are there in the United States?" Attackers are actively scanning for LLMs, fingerprinting them using the query How many states are there in the United States? . https://isc.sans.edu/diary/%22How%20many%20states%20are%20there%20in%20the%20United%20States%3F%22/32618 Closing the Door on Net-NTLMv1: Releasing Rainbow Tables to Accelerate Protocol Deprecation Mandiant is publicly releasing a comprehensive dataset of Net-NTLMv1 rainbow tables to underscore the urgency of migrating away from this outdated protocol. https://cloud.google.com/blog/topics/threat-intelligence/net-ntlmv1-deprecation-rainbow-tables Out-of-band update to address issues observed with the January 2026 Windows security update Microsoft has identified issues upon installing the January 2026 Windows security update. To address these issues, an out-of-band (OOB) update was released today, January 17, 2026 https://learn.microsoft.com/en-us/windows/release-health/windows-message-center
The Monday Microsegment for the week of January 19th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.Europe's space agency suffers a massive data breach.Attackers keep cashing in on Oracle's old breach.And credit card skimmers go digital.And Aishwarya Ramani joins us to discuss executive sponsorship. Head to The Zero Trust Hub: hub.illumio.comDownload The 2025 Global Cloud Detection and Response Report: https://www.illumio.com/resource-center/global-cloud-detection-and-response-report-2025
What happens when we finally admit that stopping every cyberattack was never realistic in the first place? That is the thread running through this conversation, recorded at the start of the year when reflection tends to be more honest and the noise dial is turned down a little. I was joined by returning guest Raghu Nandakumara from Illumio, nearly three years after our last discussion, to pick up a question that has aged far too well. How do organizations talk about cybersecurity value when breaches keep happening anyway? This episode is less about shiny tools and more about uncomfortable truths. We spend time unpacking why security teams still struggle to show value, why prevention-only thinking keeps setting leaders up for disappointment, and why the conversation is slowly shifting toward resilience and containment. Raghu is refreshingly direct on why reducing cyber risk, rather than chasing impossible guarantees, is the only metric that really holds up under boardroom scrutiny. We also talk about the strange contradiction playing out across industries. Attackers are often using familiar paths like misconfigurations, excessive permissions, and missing patches, yet many organizations still fail to close those gaps. The issue, as Raghu explains, is rarely a lack of tools. It is usually fragmented coverage, outdated processes, and a talent pipeline that blocks capable people from entering the field while claiming there is a skills shortage. One of the most practical parts of this conversation centers on mindset. Instead of asking whether an attacker got in, Raghu argues that leaders should be asking how far they were able to go once inside. That shift alone changes how success is measured, how teams prepare for incidents, and how pressure-filled P1 moments are handled when boards want answers every fifteen minutes. We also touch on how legal action, public claims campaigns, and customer lawsuits are changing the stakes after a breach, forcing executives to rethink how they frame cyber investment. From there, Raghu shares how Illumio has been working with Microsoft to strengthen internal resilience at massive scale, and why visibility and segmentation are becoming harder to ignore. This is a conversation about realism, responsibility, and growing up as an industry. If cybersecurity is really about safety and not slogans, what would you want your organization to stop saying, and what would you rather hear instead? Please feel free to upload the podcast. Here are also the links we discussed on the call: Useful Links Connect with Raghu Nandakumara on LinkedIn and Twitter Learn more about Illumio Lateral Movement in Cyberattacks Illumio Podcast Follow on Facebook, Twitter, LinkedIn, and YouTube Thanks to our sponsors, Alcor, for supporting the show.
Dave Chatterjee, Adjunct Associate Professor at Duke University, explains how scale, speed, and surprise are reshaping cyber threats and why many organizations remain dangerously reactive. He shares his Commitment-Preparedness-Discipline (CPD) framework along with ways that leaders can move beyond checkbox compliance by treating cybersecurity as a strategic business priority. Key Takeaways: The three underestimated AI risks that leaders often overlook, and how AI must be used to defend against AI-driven cyber threats Why deepfake attacks represent a systemic risk at both the individual and organizational levels Practical steps individuals can take to reduce exposure to fraud, impersonation, and data loss How better cybersecurity hygiene creates trust, resilience, and competitive advantage Guest Bio: Dave Chatterjee, Ph.D., is a leading authority on cybersecurity strategy, governance, and AI security. As the creator of the Commitment-Preparedness-Discipline (CPD) framework, he helps organizations worldwide build resilient, high-performance security cultures. His recent work explores the convergence of artificial intelligence, cybersecurity, and business resilience, addressing challenges such as AI exploitation, deepfake manipulation, and the secure integration of intelligent systems. Dr. Chatterjee is the author of "Cybersecurity Readiness: A Holistic and High-Performance Approach" and the cybercrime-themed novel "The DeepFake Conspiracy", which illustrates the emerging risks and ethical dilemmas at the intersection of AI and cyber defense. His thought leadership has appeared in The Wall Street Journal, Forbes, USA Today, Business Insider, California Management Review, Business Horizons, MIS Quarterly, and Journal of Management Information Systems. As host of the acclaimed Cybersecurity Readiness Podcast Series, he has engaged leading practitioners, policymakers, and researchers in discussions on topics such as agentic AI, post-quantum readiness, and AI-driven threat detection. A trusted advisor to Fortune 500 firms and government agencies, Dr. Chatterjee delivers high-impact keynotes and moderates CXO panels worldwide, advancing dialogue on how to turn AI risk into organizational resilience. ---------------------------------------------------------------------------------------- About this Show: The Brave Technologist is here to shed light on the opportunities and challenges of emerging tech. To make it digestible, less scary, and more approachable for all! Join us as we embark on a mission to demystify artificial intelligence, challenge the status quo, and empower everyday people to embrace the digital revolution. Whether you're a tech enthusiast, a curious mind, or an industry professional, this podcast invites you to join the conversation and explore the future of AI together. The Brave Technologist Podcast is hosted by Luke Mulks, VP Business Operations at Brave Software—makers of the privacy-respecting Brave browser and Search engine, and now powering AI everywhere with the Brave Search API. Music by: Ari Dvorin Produced by: Sam Laliberte
CNN has finally lifted its ban on allowing Stephen Miller on to talk about the Trump administration but they may be rethinking it. Miller was in the war room for the Maduro extraction and is obviously the guy who really has Trump's ear. Wait until you hear how it went with Jake Tapper. JD Vance had his home attacked by a rock throwing, hammer swinging psycho named William. He goes by another name but it's not Bill. Trump has lowered the vax schedule for American kids from 72 to 11. Great progress. Hilton hotels has a Bud Light problem on its hands. In sports, Chiefs DC Steve Spagnuola is getting some interest to be a head coach. Bill Self has some younger KU fans crawling all up in his kitchen right now over the Darryn Peterson situation. Texas Tech's new quarterback has a billionaire paying him more in one year than Shadeur Sanders will make with the Cleveland Browns in 4 years. The FCS title game was old school college fun and our Final Final is the end of the monkey business in Prairie Village.