Podcasts about Attackers

  • 1,401PODCASTS
  • 2,621EPISODES
  • 38mAVG DURATION
  • 1DAILY NEW EPISODE
  • Oct 30, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Attackers

Show all podcasts related to attackers

Latest podcast episodes about Attackers

That Millwall Podcast
Femi Azeez: Millwall's New No Fear Attacker | Full Interview

That Millwall Podcast

Play Episode Listen Later Oct 30, 2025 33:03


Learn more about your ad choices. Visit podcastchoices.com/adchoices

ITSPmagazine | Technology. Cybersecurity. Society
CI/CD Pipeline Security: Why Attackers Breach Your Software Pipeline and Own Your Build Before Production | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 4 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 29, 2025 3:38


Organizations pour millions into protecting running applications—yet attackers are targeting the delivery path itself.This episode of AppSec Contradictions reveals why CI/CD and cloud pipelines are becoming the new frontline in cybersecurity.

Investec Focus Radio
NOW Ep 113: The new era of cyber risk

Investec Focus Radio

Play Episode Listen Later Oct 29, 2025 15:42


Deepfakes that fool the eye. Voices that sound real. Attacks that never sleep. As artificial intelligence reshapes both offence and defence, cyber risk has gone mainstream. In this episode of No Ordinary Wednesday, Jeremy Maggs speaks with Investec cybersecurity experts Nomalizo Hlazo and Tash van den Heever about the new era of digital resilience where trust, adaptability and awareness are your strongest defences. Podcast key moments 00:00 - Introduction 01:27 - AI on both sides – Attackers and defenders in the digital arms race 02:52 - 2025: The year cyber risk went mainstream 03:46 - Why digital risk is compounding 05:05 - Building resilience through third-party and supply chain visibility 07:15 - Regulation tightens – Balancing compliance and agility 08:57 - Critical infrastructure under threat 10:32 - Building digital trust in a diverse and connected market 11:48 - The future of cybersecurity: Integrity, speed, and adaptability 13:16 - Quantum computing, AI agents, and hyperconnectivity 13:58 - Cybersecurity as a life skill 14:56 - Closing remarks Read more on www.investec.com/now Hosted by seasoned broadcaster, Jeremy Maggs, the No Ordinary Wednesday podcast unpacks the latest economic, business, and political news in South Africa, with an all-star cast of investment and wealth managers, economists, and financial planners from Investec. Listen in every second Wednesday for an in-depth look at what's moving markets, shaping the economy, and changing the game for your wallet and your business. Investec Focus Radio SA

Redefining CyberSecurity
CI/CD Pipeline Security: Why Attackers Breach Your Software Pipeline and Own Your Build Before Production | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 4 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE

Redefining CyberSecurity

Play Episode Listen Later Oct 29, 2025 3:38


Organizations pour millions into protecting running applications—yet attackers are targeting the delivery path itself.This episode of AppSec Contradictions reveals why CI/CD and cloud pipelines are becoming the new frontline in cybersecurity.

TechTimeRadio
273: TechTime Radio: Tech turns terrifying: cloud crashes, robot takeovers, satellite leaks, AI love, ghost-seeing Teslas, doorbell surveillance, and blockchain malware. One failure can haunt everything. Tune in—if you dare. | Air Date: 10/28 - 11/3/25

TechTimeRadio

Play Episode Listen Later Oct 28, 2025 61:53 Transcription Available


Want a Halloween scare that sticks with you after the candy's gone? We're pouring a glass and pulling back the curtain on the creepiest corners of everyday tech: a cloud outage that toppled major apps and smart beds, a Prime refund saga with fine-print timelines, and Amazon's bold plan to swap 600,000 human jobs for robots by 2033. The number that matters isn't the 30 cents shaved off a product; it's the blast radius when a single point of failure hits everything from payments to sleep pods.We go deeper with cybersecurity expert Nick Espinosa to map the new threat surface. He breaks down a jaw-dropping study showing unencrypted geostationary satellite traffic—airline passenger data, critical infrastructure chatter, even U.S. and Mexican military communications—floating for the taking. Then we connect the surveillance dots: Ring's partnership with Flock could feed millions of doorbells into a searchable police network. With Ring's track record, do you want your front porch in a national database accessible by natural-language prompts?The uncanny valley gets crowded too. A widower claims an AI replica of Suzanne Somers “feels indistinguishable,” while OpenAI prepares to allow “mature” content for verified adults. We weigh the supposed benefits against the hard psychology: isolation, distorted attachment, and empathy atrophy. For a lighter fright, we test the viral claim that Teslas see “ghosts” in cemeteries—spoiler: that's what a cautious perception model looks like when tombstones confuse it. The real nightmare? Attackers hiding malware inside blockchain smart contracts, using decentralization to dodge takedowns and $2 fees to keep it cheap.From airline IT meltdowns to smart contract exploits, the pattern is clear: concentration of power and data magnifies risk. Redundancy, privacy-by-design, and failure-aware engineering aren't nice-to-haves—they're the only way through. Grab your headphones and your favorite pour, then join us for a tour of the haunted infrastructure underneath daily life.Enjoyed the ride? Follow, share with a friend, and leave a quick review so more curious listeners can find the show. What scared you most—and what would you fix first?Support the show

Ekot
Ekot 17:45 Netanyahu beordrar nya attacker mot Gaza

Ekot

Play Episode Listen Later Oct 28, 2025 20:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

PolySécure Podcast
Teknik - The Overlooked Playground - An Attacker's Journey Through GCP - Parce que... c'est l'épisode 0x650!

PolySécure Podcast

Play Episode Listen Later Oct 23, 2025 63:40


Parce que… c'est l'épisode 0x650! Shameless plug 4 et 5 novembre 2025 - FAIRCON 2025 8 et 9 novembre 2025 - DEATHcon 17 au 20 novembre 2025 - European Cyber Week 25 et 26 février 2026 - SéQCure 2026 Description Introduction Dans cet épisode du podcast Police Secure, Clément Cruchet présente une analyse approfondie de la surface d'attaque de Google Cloud Platform (GCP), un sujet souvent négligé dans la communauté de la cybersécurité. Contrairement à Azure et AWS qui bénéficient d'une documentation abondante sur leurs vulnérabilités et vecteurs d'attaque, GCP reste le “petit frère oublié” du cloud computing. Cette présentation, donnée lors de la conférence Bide, vise à combler cette lacune en explorant les chemins qu'un attaquant pourrait emprunter dans un environnement GCP. Le contexte : pourquoi GCP est moins documenté Clément observe qu'il y a trois ou quatre ans, la documentation sur les vulnérabilités GCP était quasi inexistante. Cette absence de contenu a même conduit certains utilisateurs sur des forums comme Reddit à affirmer de manière erronée que GCP était plus sûr ou exempt de mauvaises configurations. En réalité, ces failles existent bel et bien, mais elles n'avaient simplement pas été explorées en profondeur. Bien que la situation se soit améliorée depuis trois ans avec l'apparition de formations et de certifications, GCP demeure significativement moins couvert que ses concurrents. L'importance de l'IAM (Identity and Access Management) Le cœur de la sécurité dans tous les environnements cloud réside dans la gestion des identités et des accès. Que ce soit Azure, AWS, GCP ou d'autres fournisseurs comme Oracle Cloud ou Alibaba Cloud, chacun possède son propre modèle IAM distinct. Ces modèles constituent la base de toute gestion des permissions, rôles et autorisations dans les environnements cloud. Le paradoxe est clair : sans permissions IAM, on ne peut rien faire, mais avec trop de permissions, on ouvre la porte à des abus et des défauts de configuration. La majorité des vulnérabilités dans les environnements cloud proviennent justement de ces mauvaises configurations au sein de l'IAM. La hiérarchie unique de GCP GCP se distingue par sa structure hiérarchique particulière. Contrairement à AWS qui fonctionne avec des comptes, ou à Azure qui utilise des tenants, des subscriptions et des groupes de ressources, GCP adopte une approche top-down très structurée. Au sommet se trouve l'organisation, généralement liée au nom de domaine de l'entreprise (par exemple company.com). Sous l'organisation, on trouve des folders, comparables aux unités organisationnelles (OU) d'Active Directory. Ces folders contiennent ensuite des projets, qui constituent l'unité administrative la plus importante. Les projets dans GCP peuvent être comparés aux comptes AWS et c'est principalement à ce niveau que se fait la facturation. Pour beaucoup d'utilisateurs, seule la vue du projet est accessible, sans nécessairement avoir besoin d'une organisation complète. Cette flexibilité permet de commencer à travailler directement avec un projet sans passer par la création d'une infrastructure organisationnelle complète. Les rôles et leurs dangers Un point crucial soulevé par Clément concerne les rôles primitifs dans GCP : éditeur, viewer, owner et browser. Ces rôles sont extrêmement dangereux car ils accordent des permissions bien trop larges. Par exemple, un rôle d'éditeur peut avoir accès à 800 permissions différentes, ce qui viole complètement le principe du moindre privilège. Le message clé est de ne jamais utiliser ces rôles primitifs dans une infrastructure GCP. Même les rôles prédéfinis, pourtant plus granulaires, peuvent présenter des risques. Un rôle comme “compute admin”, qui devrait théoriquement se limiter à l'administration des ressources compute, peut en réalité inclure 800 permissions, dont certaines touchent à des services non liés comme BigQuery. La recommandation fondamentale est de créer des rôles personnalisés aussi granulaires que possible et d'appliquer systématiquement le principe du moindre privilège. Domain wide delegation : un vecteur d'exfiltration méconnu L'une des contributions majeures de cette présentation concerne le domain wide delegation, une technique d'exfiltration peu documentée. Cette fonctionnalité permet à un compte de service dans GCP d'interagir avec Google Workspace : accéder à Drive, Gmail, envoyer des emails au nom d'utilisateurs, récupérer des pièces jointes, etc. Clément a développé un outil Python appelé “Delegate” pour démontrer et tester cette technique. Lorsqu'il a écrit son article de blog sur le sujet début 2023, il n'existait pratiquement aucune documentation sur cette vulnérabilité. Ironiquement, Palo Alto Networks a publié un article similaire plusieurs mois après, ce qui témoigne du caractère précurseur de ses recherches. Le scénario d'attaque typique implique un attaquant qui compromet une machine virtuelle possédant un compte de service capable d'effectuer du domain wide delegation. Cette technique peut également servir de mécanisme de persistance, permettant à un attaquant de configurer sa propre délégation pour exfiltrer des données de manière discrète. L'outil Delegate permet de lire des emails, télécharger et uploader des fichiers sur Drive, offrant ainsi une capacité d'exfiltration complète. La matrice d'attaque GCP Pour synthétiser ses recherches, Clément propose une kill chain communautaire spécifique à GCP, disponible sur GitHub (github.com/otendfreed/GCP-attack-matrix). Cette matrice d'attaque représente l'ensemble des tactiques, techniques et procédures (TTP) depuis la reconnaissance jusqu'à l'exfiltration et l'impact. L'objectif est de fournir un outil pour les équipes de sécurité souhaitant effectuer du purple teaming dans des environnements GCP, leur permettant d'évaluer leurs contrôles de sécurité et leur capacité de détection. Conclusion Ce podcast souligne l'importance de ne pas négliger GCP dans les stratégies de sécurité cloud. Bien que moins documenté, ce fournisseur présente des vecteurs d'attaque tout aussi critiques que ses concurrents. La recherche communautaire et le partage de connaissances sont essentiels pour identifier et corriger les vulnérabilités avant que des attaquants malveillants ne les exploitent. Comme le souligne Clément, pour attaquer un système, il faut d'abord le comprendre, et c'est précisément cette compréhension qu'il cherche à transmettre à la communauté de la cybersécurité. Notes À venir Collaborateurs Nicolas-Loïc Fortin Clément Cruchet Crédits Montage par Intrasecure inc Locaux réels par Bsides Montréal

Ben Fordham: Highlights
‘Can't believe it' - Victim reacts after accused attacker allegedly strikes again

Ben Fordham: Highlights

Play Episode Listen Later Oct 21, 2025 6:10


See omnystudio.com/listener for privacy information.

Alan Jones Daily Comments
‘Can't believe it' - Victim reacts after accused attacker allegedly strikes again

Alan Jones Daily Comments

Play Episode Listen Later Oct 21, 2025 6:10


See omnystudio.com/listener for privacy information.

KentOnline
Podcast: Attacker ‘saw red' at his Folkestone bar Picklebacks and stabbed man with broken bottle

KentOnline

Play Episode Listen Later Oct 21, 2025 19:51


A court has heard a man “saw red” on the night his town centre bar was closing down and thrust a broken bottle into another man's head.Steven Harwood-Brown threw one of his employees to the floor at Folkestone venue Picklebacks, before stabbing the victim, who had intervened to stop the fight.Also in today's podcast, pressure is growing on the leader of Kent County Council after seven MPs demanded she quit and an eighth labelled her behaviour ‘unacceptable.'In a letter to Reform leader Nigel Farage, the Labour MPs said Cllr Linden Kemkaran was ‘clearly not up to the job. Two Kent women who survived domestic abuse are starting a community project to provide clothing and toiletries for other victims.The DV Closet, in Sevenoaks, is a safe space where those who've fled abuse can get the support they need.Long-harboured plans to build a new reservoir in the Kent countryside are finally moving forward as contractors carry out the first phase of ground investigation works.South East Water is planning to build a 200-acre facility on farmland near Canterbury - you can hear from the project manager. And a Kent farmer's told us he's pleased to be able to give apples he grows to charity - to avoid them going to waste.The crop at Hazel Street Farm is no longer financially viable, so the orchard has been handed over to a food project. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Active Self Protection Podcast
POM STOPS Machete-Weilding Attacker! -Alec

Active Self Protection Podcast

Play Episode Listen Later Oct 17, 2025 21:22


This week on the Active Self Protection Podcast we sit down with security professional Alec and discuss the day he was working his shift at a strip mall when he was alerted to the presence of a man holding a machete and how he put himself and a can of POM OC spray in between the attacker and the young people working at the mall that day.  Active Self Protection exists to help good, sane, sober, moral, prudent people in all walks of life to more effectively protect themselves and their loved ones from criminal violence. On the ASP Podcast you will hear the true stories of life or death self defense encounters from the men and women that lived them. If you are interested in the Second Amendment, self defense and defensive firearms use, martial arts or the use of less lethal tools used in the real world to defend life and family, you will find this show riveting.  Join host and career federal agent Mike Willever as he talks to real life survivors and hear their stories in depth. You'll hear about these incidents and the self defenders from well before the encounter occurred on through the legal and emotional aftermath. Music: bensound.com

The Cyber Threat Perspective
Episode 153: How to Prove Your Security Works Before Attackers Do

The Cyber Threat Perspective

Play Episode Listen Later Oct 17, 2025 33:04


In this episode, we dig into how to move from “we think we're secure” to “we can prove it.” We'll lay out a practical loop for validating controls, gathering evidence, and tracking results that leadership understands. If you've ever wondered how to demonstrate security value beyond dashboards and audits, this is your playbook.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal assume breach pentesting here.

77 WABC Early News
So, who won the big debate last night? A Bronx attacker should have never been on the streets.

77 WABC Early News

Play Episode Listen Later Oct 17, 2025 45:01


So, who won the big debate last night? A Bronx attacker should have never been on the streets. Learn more about your ad choices. Visit megaphone.fm/adchoices

Reboot IT - 501(c) Technology
Cybersecurity Maturity: What Associations Need to Know

Reboot IT - 501(c) Technology

Play Episode Listen Later Oct 16, 2025 39:17


In this episode of Reboot IT, host Dave Coriale sits down with Ben Muscolino, CEO of Breezio, Data Sangria, and co-founder at Vortacity, and Ryan O'Donnell, CTO at Vortacity, to demystify cybersecurity for associations and nonprofits. They explore the evolving threat landscape, the importance of proactive security measures, and how organizations can build a culture of cybersecurity without fear or shame. From phishing-resistant MFA to red team engagements, this conversation is packed with practical advice for leaders and IT professionals alike. Themes and Topics: Cybersecurity Culture and Leadership Cybersecurity must be embraced across the organization, not just by IT. Leaders should foster a “shameless and blameless” environment for open dialogue. Culture impacts how teams respond to threats and education efforts. Phishing and Account Takeover Risks Phishing remains the most common entry point for breaches. Attackers often dwell silently before exploiting access. Social engineering tactics are becoming more sophisticated. Cybersecurity Maturity  Organizations should progress from asset inventory to vulnerability scans, pen tests, and red team engagements. Skipping foundational steps can lead to ineffective or costly security efforts. Tailoring assessments to organizational needs is key. Penetration Testing and Red Teaming Pen tests simulate real-world attacks to expose vulnerabilities. Red team engagements test people, processes, and systems under stealth conditions. Trusted agents within the organization coordinate red team efforts discreetly. Deception Technology and Canary Tokens Canary tokens act as tripwires to detect post-compromise behavior. These tools are low-cost and high-impact for early breach detection. Ideal for organizations with limited cybersecurity resources. Budgeting and Advocacy for Cybersecurity Cybersecurity is often the first to be cut during budget reviews. IT leaders must communicate risk in terms of cost and organizational responsibility. Starting small is better than doing nothing—get from zero to one.

Hacker Valley Studio
How AI Elevates Cyber Hygiene with Jason Rebholz

Hacker Valley Studio

Play Episode Listen Later Oct 10, 2025 21:32


What if protecting your digital twin becomes the new cyber hygiene? In this week's episode, Ron welcomes back cybersecurity leader Jason Rebholz, CEO of Evoke, to discuss how AI is reshaping the fundamentals of cyber hygiene. From data breaches and deepfakes to everyday habits that protect our digital lives, Jason shares how small actions and smarter use of AI can make all the difference. Together, they uncover how our growing digital footprints are giving rise to digital twins, AI replicas that can mirror our behaviors, voices, and even decisions, and what that means for the future of trust, identity, and security. Impactful Moments: 00:00 - Introduction 01:00 - The Neon app data leak story 03:00 - Why our voices are the new passwords 05:00 - How AI can strengthen cyber hygiene 07:00 - Jason's mission to secure AI systems 09:00 - AI as a force multiplier for defenders 11:00 - Deepfakes and the new social engineering playbook 13:00 - Attackers' use of AI and what it means for us 15:00 - The rise of digital twins and identity threats 19:00 - How to defend against “yourself” online 20:00 - Final reflection: Trust in the AI age   Links: Connect with Jason on LinkedIn: https://www.linkedin.com/in/jrebholz/ Check out the TechCrunch article on the Neon app data leak story: https://techcrunch.com/2025/09/25/viral-call-recording-app-neon-goes-dark-after-exposing-users-phone-numbers-call-recordings-and-transcripts/   Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/  

98FM's Dublin Talks
*Trigger Warning* Siobhan Reveals Horror Of Bumping Into Her Sex Attacker On Night Out

98FM's Dublin Talks

Play Episode Listen Later Oct 10, 2025 41:55


Warning - This episode contains material that may be triggering. This is one of the most harrowing interviews we've ever done on the podcast. A brave listener, Siobhan, contacted us to talk about how her sex attacker is still walking the streets and even approached her on a night out to intimidate her even more

The Tech Blog Writer Podcast
3447: How DXC Is Using AI to Outsmart Cybercriminals

The Tech Blog Writer Podcast

Play Episode Listen Later Oct 9, 2025 28:36


In this episode, Mike Baker, Vice President and Global CISO at DXC Technology, says the cyber industry has been focusing on the wrong side of AI. He believes too many companies use it only to block threats instead of studying how criminals use it to scale phishing, bypass defenses, and deploy adaptive malware. Attackers are learning faster than ever, and security teams must catch up. Mike argues that defenders need to think differently and use AI as both protection and opportunity. He shares how DXC is already doing this. The company has brought autonomous AI agents into its security operations through a partnership with 7AI. These agents process alerts that used to require hours of human effort. The result is faster detection, less burnout, and more time for analysts to investigate real threats. By cutting manual work by more than eighty percent, DXC has shown how AI can make cybersecurity teams stronger, not smaller. Zero Trust remains a core part of DXC's strategy. Mike calls it a journey that never ends. It needs cultural change, constant learning, and leadership that keeps security invisible to end users. AI now plays a role here too, improving identity checks and spotting access issues in real time. Yet, he reminds us, AI still needs people in the loop for oversight and judgment. We also talk about supply chain risks. Too many companies still treat risk assessments as one-time tasks. Mike pushes for continuous monitoring and close collaboration with suppliers. He closes the conversation on a hopeful note. AI will not replace people in cybersecurity, he says. It will make their work more meaningful and more effective if used with care and common sense.

Cyber Security Headlines
North Korean attackers steal crypto. Who's sending UK phones to China? Avnet confirms data breach

Cyber Security Headlines

Play Episode Listen Later Oct 8, 2025 7:35


North Korean hackers steal more than $2B in crypto Group suspected of sending stolen UK phones to China Avnet confirms breach, says stolen data unreadable Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero-trust endpoint protection platform, ThreatLocker fills the gaps traditional solutions leave behind, giving your business stronger security and control. Don't just react to threats — stop them with ThreatLocker. Learn more at ThreatLocker.com.

RIMScast
National Cybersecurity Awareness Month with Gwenn Cujdik

RIMScast

Play Episode Listen Later Oct 7, 2025 46:20


Welcome to RIMScast. Your host is Justin Smulison, Business Content Manager at RIMS, the Risk and Insurance Management Society.   In this episode, Justin interviews Gwenn Cujdik, the Incident Response and Cyber Services Lead for North America at AXA XL. Justin and Gwenn cover various cybersecurity topics, and how her 15 years as an Assistant District Attorney prepared her for her current role of responding to cyber attacks. Listen for tips on securing your organization, large or small, from cyber attacks and responding when, not if, they come. Gwenn shares her experiences and some advice.   Listen for Gwenn's insights to help you be vigilant and prepared against cybercrime.   Key Takeaways: [:01] About RIMS and RIMScast. [:14] With great sadness, the RIMS family lost a true leader in September. Susan Meltzer was an exceptional risk professional and passionate volunteer with RIMS. She served as the Society's President in 1999 and 2000. [:29] RIMS has established a scholarship fund in her name. You can donate to that fund through RIMS, The Foundation for Risk Management®, at RIMS.org/FRM. [:46] About this episode of RIMScast. This is our National Cybersecurity Awareness Month episode. Here to lend her insight on all things cyber is Gwenn Cujdik. She is the Incident Response and Cyber Services Lead for North America at AXA XL. [1:19] We're also going to talk about her fascinating career that antedates her time in cyber. [1:24] RIMS-CRMP Prep Workshops! The next RIMS CRMP Prep Workshops will be held on October 29th and 30th and led by John Button. [1:36] The next RIMS-CRMP-FED Virtual Workshop will be held on November 11th and 12th and led by Joseph Mayo. Links to these courses can be found through the Certifications page of RIMS.org and through this episode's show notes. [1:53] RIMS Virtual Workshops! RIMS has launched a new course, “Intro to ERM for Senior Leaders.” It will be held again on November 4th and 5th and will be led by Elise Farnham. [2:07] On November 11th and 12th, Chris Hansen will lead “Fundamentals of Insurance”. It features everything you've always wanted to know about insurance but were afraid to ask. Fear not; ask Chris Hansen! RIMS members always enjoy deep discounts on virtual workshops! [2:26] The full schedule of virtual workshops can be found on the RIMS.org/education and RIMS.org/education/online-learning pages. A link is also in this episode's notes. [2:37] Several RIMS Webinars are being hosted this Fall. On October 9th, Global Risk Consultants returns to deliver “Natural Hazards: A Data-Driven Guide to Improving Resilience and Risk Financing Outcomes”. [2:51] On October 16th, Zurich returns to deliver “Jury Dynamics: How Juries Shape Today's Legal Landscape”. On October 30th, Swiss Re will present “Parametric Insurance: Providing Financial Certainty in Uncertain Times”. [3:08] On November 6th, HUB will present “Geopolitical Whiplash — Building Resilient Global Risk Programs in an Unstable World”. Register at RIMS.org/Webinars. [3:20] On with the show! It's National Cybersecurity Awareness Month here in the U.S. and in many places around the world. Cyber continues to be a top risk among organizations of all sizes in the public and private sectors. [3:35] Joining me today to discuss cybersecurity awareness is Gwenn Cujdik. You may remember her from the RIMS AXA XL webinar on September 4th, “Lock Down & Level Up.” [3:52] During that webinar, we had a brief, fascinating discussion about her time as an Assistant District Attorney in Pennsylvania. [4:01] I wanted to learn more about how someone transitions from a colorful career to cybersecurity and eventually becomes the Incident Response and Cyber Services Lead for North America at AXA XL. [4:15]  She's got a lot on her plate. She's got a huge risk radar. We're going to talk all about it and help all the risk managers out there use her insight and perspective to protect their organizations. Let's get to it! [4:28] Interview! Gwenn Cujdik, welcome to RIMScast! [5:09] Gwenn is Incident Response and Cyber Services Lead for North America at AXA XL. When a client has a cyber breach, they call AXA XL and work with Gwenn's teams. [5:42] Gwenn works on training her teams to be able to respond, setting up procedures and processes to make the response seamless and collaborative, and making sure the clients get consistent service, whoever handles the call. [6:16] Gwen's team has 18. Four are in leadership with 14 more team members. Two managers directly supervise the teams to help them with answers to questions about unusual situations. [6:50] Gwenn helps the teams understand massive events and how they might affect AXA XL and their clients, how to interact with brokers, and technical matters. She helps the team understand coverages when it comes to something unique. “It's all hands on deck for us!” [7:55] Gwenn says, Fighting crime is a part of who I am. She is driven by helping others get through some terrible times. She has seen the worst of the worst. Sometimes it takes just one helping hand to get people through tough times. She has seen how impactful that can be. [8:44] Sometimes, in a crisis, how people interact with the victim could be the recipe for them to recover fully from that event. Gwenn has seen people recover, take back their lives, move forward, and be survivors. She has seen corporations and companies do so and become better. [9:39] Justin repeats that Gwenn has seen the worst of the worst: homicides, murders, abuses of women and children, arson, and more. She has seen it all, including things that she wishes she hadn't seen. [10:27] Gwenn compares cyber incident response to her ADA work. A prosecutor has to be able to handle things under pressure. The best prosecutors are looking to do the right thing. Gwenn has met many people who, absent the crime, would have been friends. [11:06] You have to be able to see there's a human on the other side, and there are humans that they hurt. You do right by understanding that there are a lot of players involved, who are humans. [11:26] It helps you understand where somebody might be coming from. It helps you understand why they might be screaming at you. “I'm just the messenger, but let's talk about why you're so upset.” [11:39] Gwenn says one of the cool things about being a prosecutor is that every case you have presents a different set of facts and circumstances. There's a law that's intertwined with it, and that's interesting for Gwenn. [11:54] The first time Gwenn had an arson case, she had to work with the Fire Marshals to understand how they knew the fire started here. How did they know it was a chemical? She started with the Fire Marshals and then went to the crime scene to talk to Forensic Chemists. [12:11] The Forensic Investigators explained the chemistry behind the Molotov Cocktail that was thrown through the window. This was how the fire started, and then it enveloped the room. [12:22] When Gwenn first worked with DNA, she found it to be incredibly complicated. She had to learn it to be able to explain it. Her job was to explain to 12 people why DNA mattered, why it's this guy, and not anybody else, that committed this crime; the numbers are insane. [12:44] It could be one in a hundred quadrillion that it's another person. Those numbers are insane, and it's really hard to understand. [12:56] Gwenn was in the DA's office when cell site analysis came around; being able to triangulate where someone is, using cell towers. The Philadelphia Field Office had one of the pioneers in that science. Gwenn learned from him. [13:13] One of Gwenn's matters was a homicide. They tracked the defendant from the scene of the crime, through public transportation, back to his house, using cell site triangulation. While they were mapping, the actor Joe Piscopo came by, touring the building. Gwenn was an SNL fan. [14:23] Gwenn's prosecutorial experience translates to cyber in that each matter is a little different. There's a bad guy at the other end. Gwenn is not sympathetic to the bad guys because they are anonymous. Nobody sees them or knows them. It's usually a criminal enterprise. [14:59] It's a group of people working together, motivated by money and wreaking havoc on people who are trying to make a living and support their families. The bad guys want to extort millions of dollars and put businesses and livelihoods in danger. [15:42] In Philadelphia, the elite of the elite prosecutors worked in homicide. Some spend 20 or 30 years there. Gwenn was an ADA for 15 years, but couldn't see herself doing it for 20 or 30 years. She wanted to stay positive and be a force for good when she was dealing with bad. [16:34] She wondered where she could go to have a similar impact for good, investigating, and helping people get through an awful time. [16:45] Gwenn had a friend who worked with her in the Family Violence and Sexual Assault Unit. She had left the office to work for a new law firm doing cyber incident response. She called Gwenn and said she would be really good at it. She explained it to Gwenn. [17:50] Gwenn interviewed with the firm and got an offer the day she interviewed. She realized that was what she wanted to do. Some former prosecutors were doing it. There were some amazing people, and she wanted to be a part of that, something new, interesting, and growing. [18:15] Gwenn wanted to be challenged and get to help people. Once she discovered it, she couldn't think of a better transition for people who are in law enforcement than going into cybersecurity. [18:39] RIMS Events! On November 17th and 18th, join us in Seattle, Washington, for the RIMS ERM Conference 2025. The agenda is live. Check out Episode 357 for Justin's dialogue with ERM Conference Keynote Presenter Dan Chuparkoff on AI and the future of risk. [18:59] Visit the Events page of RIMS.org to register. [19:02] RISKWORLD 2026 will be in Philadelphia, Pennsylvania, from May 3rd through May 6th. RIMS members can now lock in the 2025 rate for a full conference pass to RISKWORLD 2026 when you register by October 30th! [19:16] This also lets you enjoy earlier access to the RISKWORLD hotel block. Register by October 30th, and you will also be entered to win a $500 raffle! Do not miss out on this chance to plan and score some of these extra perks! [19:30] The members-only registration link is in this episode's show notes. If you are not yet a member, this is the time to join us! Visit RIMS.org/Membership and build your network with us here at RIMS! [19:42] Let's return to our interview with Gwenn Cujdik! [20:14] Gwenn says cybersecurity takes a village. What she learned in criminal prosecution is that as long as there have been humans, there has been crime. We're fortunate as a society to have laws, law enforcement, governing bodies, and organizations to keep crime down. [20:54] It's not dissimilar to cybersecurity. If Gwenn were talking to a board, she would say, It takes everybody in your community, in your organization, to build resilience, protect yourself from cybercrime, and react to it. [21:12] Gwenn says a big mistake people often make is thinking incident response is a job for just their tech team. The IT team is not trained in all the various fields you need to be an expert in to get through a cyber incident. [21:41] Your IT team will be able to get you up and running, collaborate, and be a good foundation for the incident response, working with outside experts. It takes people who understand the law and who understand communications. [21:54] It takes people who understand the brand, who are the heart of the organization, to be able to respond. Your CISO may say, Here's how I think that we should respond, but your CEO may say, This isn't how I think we would respond to an event like this. Keep in mind who we are. [22:32] Your legal team is there to say, Here's why we can't do that, the risk is too great; It will be worse if you do X, Y, Z; You shouldn't do that because you need to be compliant with the law. [23:11] Gwenn says good leaders lead best when they model. If you expect people to be open-minded and collaborative, you need to be the same. For the most part, organization leadership is very aware that cybersecurity is an important part of who they are and will be. [23:55] Gwenn has met a ton of CEOs who admit they don't know what they don't know and ask for help to understand cybersecurity so they can help their organizations in the best way possible. Some CEOs are thinking ahead and putting teams together that understand their role. [24:20] Gwenn has encountered CEOs who are just messing up the process. One wanted to invite his wife, not an employee, to the conversation because she would like to hear about it.  From a legal and business perspective, it's very risky for the company. [25:04] One Final Break! The Spencer Educational Foundation's goal to help build a talent pipeline of risk management and insurance professionals is achieved, in part, by its collaboration with risk management and insurance educators across the U.S. and Canada. [25:23] Since 1999, Spencer has awarded over $2.9 million to create more than 570 Risk Management Internships. The Internship Grants application process is now open through October 15th, 2025. [25:39] To be eligible, risk managers must be based in the U.S., Canada, or Bermuda. A link to the Internship Grants page is in this episode's show notes. You can always visit SpencerEd.org, as well. [25:53] Let's Conclude Our National Cybersecurity Awareness Month Interview with Gwenn Cujdik! [26:05] It's National Cybersecurity Awareness Month 2025, here in the U.S. It's a big month for everyone in Gwenn's house; they have to pull their own weight a little more because she's traveling a lot, she's out a lot, and there are a lot of conferences and meetings going on! [26:29] Gwenn tries not to shove everything cyber just into October. October is busy, and she loves it. [26:56] On October 29th, at the Sheraton New York Times Square Hotel in Manhattan, Gwenn will be the Conference Co-Chair for the Zywave Cyber Risk Insights New York event. It's a full day with a lot of very knowledgeable individuals from a range of companies. [27:50] It is one of Gwenn's favorite events. It's a day packed with good information. She would love to see more risk managers and CISOs join it. The amount of information you can get in one day is almost unbelievable. The content is pretty diverse. [28:21] It covers claims, the state of the market, the different ways threat actors are attacking, how to prepare better for attacks and for business continuity, and how to organize invoices and costs as you're going through an incident response. [29:01] Gwenn says, Get the small things right so you can deal with the big things. While you tackle the small things, you can talk about whether or not the law requires you to file notifications to seven million people and how to get through that as a company. [29:22] Gwen says it's a great event. Gwenn will be there, giving opening remarks. Justin will be there, after attending a heavy metal concert the night before. The link is in this episode's show notes. [30:52] When Gwenn entered the cybersecurity field, she was surprised at the female presence. One of the managing partners who interviewed her was a female. There are also savvy female hackers out there. [31:35] Gwenn says that in criminal law, people have trouble understanding that women can commit crimes, the same way that men can. Gwenn points out Elizabeth Holmes and the book Bad Blood, about Theranos. [32:23] Gwenn mentions a woman in government who embezzled $22 million from her community to show horses. [32:42] Gwenn says, in terms of cybersecurity being a male-dominated field, we're all learning together; anybody who tries and is committed to it can do it. Because it's new, people come from different backgrounds with diverse experiences. [33:11] Gwenn says, We're seeing value in people coming from different careers and different industries and seeing their skillsets translate to cybersecurity. In this field, you need great diversity with people from all different backgrounds to be able to tackle this. [33:38] It's not one-size-fits-all. There are personalities involved. There are different businesses involved, from small to large, public to government. You have to be able to understand a huge variety of people and businesses. You have to understand a huge amount of technology. [34:00] Gwenn talks about the differences between cybersecurity and other industries. eDiscovery for cyber is not the same as eDiscovery for litigation. You need special people and tooling, and you have to understand what the tooling is, which helps you figure out timing. [34:43] Technology is always developing. Gwenn compares it to cat and mouse. We're constantly chasing the bad guys to figure out what they're doing. Sometimes it's reactive. They'll think of something new, and we've never seen it before. This is how we get through it. [35:04] The tools and a skillset you've used dealing with everything before help you tackle what's coming. Even the way we investigate and respond to things has changed. [35:16] Gwenn says when we came on the scene, we would grab images of all the computers. If there were 50 computers, you would have 50 images, which would mean people going through a massive amount of data, taking a really long time. [35:30] We don't do that now. We have tools and technology that can get through a system programmatically, to pull the evidence we need to do these investigations without having to go into a shop and take copies of laptops or servers to get through that. [35:49] That makes a potential difference of millions of dollars in responding. It's the difference between months and a month to respond. [36:15] Gwenn has not seen a malicious actor with technology or an algorithm that is beyond what she has seen before. She says, We have the technology they have. You'd be surprised how much private industry gives to our community in terms of intelligence and technology. [36:35] Gwenn adds, We work with the government to find out solutions. The industry is armed pretty well. Gwenn has seen some things that have impressed her. One attacker was pulling searches from a legal hold, getting into sensitive information. [37:16] Their searches looked legitimate, like what an attorney would look for, so it didn't set off bells and whistles. Gwenn wonders how they knew to look in a legal hold. Were they lawyered? That was something small but ingenious to Gwenn. [37:46] Seeing a smart attack invigorates Gwenn to use her brain and try to be as smart or smarter. She says that's what is great about this job. It's constantly changing. You're constantly moving. It's not for weak minds. [38:11] To excel, you have to be smart, tenacious, and love learning. You have to love that you may be an expert in this, but you may become obsolete. You've got to keep your game up.  Gwenn says she is just a big nerd for it. [38:33] Attackers are using AI more. Gwenn recalls two incidents recently where two different groups, for two different reasons, were attacking Salesforce. That's the rub of being popular. One group used AI to search quickly for sensitive information to leverage attacks on companies. [39:27] Unfortunately, people are reusing passwords, and the bad guys know that. Gwenn says you'd better not! [39:57] Justin comments that AI being used for a cyber attack should be on companies' risk radars. How can they adjust defense strategies to stay ahead of something like that? [40:08] Gwenn is dealing with that at this moment. If you are a big company with subsidiaries and locations around the country or the world, segregate the networks. If an attack hits your facility in Oklahoma, they won't have access to your facility in Belgium. [40:38] If your locations are networked, it's a domino effect. If one goes down, they all go down. In terms of business resilience, that is the one factor that can tumble everything with the press of a button. [40:55] The tools that bad guys are using are meant to get them through fast. They get in, use AI to conduct reconnaissance, and get terabytes of data out quickly. It's important to take every effort to reduce the severity of an attack in its spread and the amount of data stolen. [41:40] Can they move laterally within a company or elevate privileges by getting to the admin, who has access to everything? It's great to focus on how to prevent it, but the reality is, they're going to find a way. It's not if, it's when. [42:09] While you have to prevent the attack from happening, and be vigilant. If you get an attack, you have to make sure it's small, you respond quickly, and it's not going to hit every facet of your company. Attacks that hit every facet of the company are the most devastating. [42:39] Justin says you've been wonderful. You've given us so much to think about when it comes to National Cybersecurity Awareness Month. You do great work! I look forward to seeing you in more AXA XL RIMS collaborative webinars! [42:55] We'll see you in the city for the Zywave Cyber Risk Insights New York, on  October 29th, delivering the opening address and mingling with attendees. [43:04] Gwenn says, I'll be there all day, attending sessions, supporting my friends on panels, my cyber family, and for folks who want to meet me. I'm always happy to talk cyber! [43:24] Justin says, Lock Down & Level Up: Turn Up Your Cybersecurity Game Against Creative Cyber Criminals. [43:30] You've been such a wonderful guest, and I appreciate all your time and insight today. Thank you, Gwenn! [43:43] Special thanks to Gwenn Cujdik of AXA XL for joining us here to discuss all things cyber. The AXA XL RIMS webinar, “Lock Down & Level Up: Turn Up Your Cybersecurity Game Against Creative Cyber Criminals,” is now available on demand through the RIMS.org/Webinars page. [44:05] A link is also in this episode's show notes. [44:07] Gwenn will deliver the opening address at the Zywave Cyber Risks Insights New York Conference on October 29th in Manhattan. A link is in this episode's show notes. [44:19] Plug Time! You can sponsor a RIMScast episode for this, our weekly show, or a dedicated episode. Links to sponsored episodes are in the show notes. [44:47] RIMScast has a global audience of risk and insurance professionals, legal professionals, students, business leaders, C-Suite executives, and more. Let's collaborate and help you reach them! Contact pd@rims.org for more information. [45:05] Become a RIMS member and get access to the tools, thought leadership, and network you need to succeed. Visit RIMS.org/membership or email membershipdept@RIMS.org for more information. [45:23] Risk Knowledge is the RIMS searchable content library that provides relevant information for today's risk professionals. Materials include RIMS executive reports, survey findings, contributed articles, industry research, benchmarking data, and more. [45:39] For the best reporting on the profession of risk management, read Risk Management Magazine at RMMagazine.com. It is written and published by the best minds in risk management. [45:54] Justin Smulison is the Business Content Manager at RIMS. Please remember to subscribe to RIMScast on your favorite podcasting app. You can email us at Content@RIMS.org. [46:06] Practice good risk management, stay safe, and thank you again for your continuous support!   Links: RIMS ERM Conference 2025 — Nov. 17‒18 Spencer Internship Program — Registration Open Through Oct. 15. RISKWORLD 2026 — Members-only early registration through Oct 30! RIMS-Certified Risk Management Professional (RIMS-CRMP) The Strategic and Enterprise Risk Center RIMS Diversity Equity Inclusion Council RISK PAC | RIMS Advocacy | RIMS Legislative Summit SAVE THE DATE — March 18‒19, 2026 RIMS Risk Management magazine | Contribute RIMS Now Zywave's 2025 Cyber Risk Insights Conference — Oct. 29, 2025 | New York City StaySafeOnline.org “RIMS Issues Statement on the Passing of Legendary Risk Leader and Former RIMS President Susan Meltzer” Upcoming RIMS Webinars: RIMS.org/Webinars Natural Hazards: A Data-Driven Guide to Improving Resilience and Risk Financing Outcomes | Oct. 9 | Sponsored by Global Risk Consultants Jury Dynamics: How Juries Shape Today's Legal Landscape | Oct. 16, 2025 | Sponsored by Zurich Parametric Insurance: Providing Financial Certainty in Uncertain Times | Oct. 30, 2025 | Sponsored by Swiss Re Geopolitical Whiplash — Building Resilient Global Risk Programs in an Unstable World | Nov. 6 | Sponsored by Hub “Lock Down & Level Up: Turn Up Your Cybersecurity Game Against Creative Cyber Criminals”   Upcoming RIMS-CRMP Prep Virtual Workshops: RIMS-CRMP Virtual Exam Prep — Oct. 29‒30, 2025 RIMS-CRMP-FED Exam Prep Virtual Workshop — November 11‒12 Full RIMS-CRMP Prep Course Schedule “Risk Appetite Management” | Oct 22‒23 | Instructor: Ken Baker “Intro to ERM for Senior Leaders” | Nov. 4‒5 | Instructor: Elise Farnham “Fundamentals of Insurance” | Nov. 11‒12 | Instructor: Chris Hansen “Leveraging Data and Analytics for Continuous Risk Management (Part I)” | Dec 4. See the full calendar of RIMS Virtual Workshops RIMS-CRMP Prep Workshops   Related RIMScast Episodes about Cyber: “AI Risks and Compliance with Chris Maguire” “Data Privacy and Protection with CISA Chief Privacy Officer James Burd” “Cyberrisk Trends in 2025 with Tod Eberle of Shadowserver”   Sponsored RIMScast Episodes: “The New Reality of Risk Engineering: From Code Compliance to Resilience” | Sponsored by AXA XL (New!) “Change Management: AI's Role in Loss Control and Property Insurance” | Sponsored by Global Risk Consultants, a TÜV SÜD Company “Demystifying Multinational Fronting Insurance Programs” | Sponsored by Zurich “Understanding Third-Party Litigation Funding” | Sponsored by Zurich “What Risk Managers Can Learn From School Shootings” | Sponsored by Merrill Herzog “Simplifying the Challenges of OSHA Recordkeeping” | Sponsored by Medcor “Risk Management in a Changing World: A Deep Dive into AXA's 2024 Future Risks Report” | Sponsored by AXA XL “How Insurance Builds Resilience Against An Active Assailant Attack” | Sponsored by Merrill Herzog “Third-Party and Cyber Risk Management Tips” | Sponsored by Alliant “RMIS Innovation with Archer” | Sponsored by Archer “Navigating Commercial Property Risks with Captives” | Sponsored by Zurich “Breaking Down Silos: AXA XL's New Approach to Casualty Insurance” | Sponsored by AXA XL “Weathering Today's Property Claims Management Challenges” | Sponsored by AXA XL “Storm Prep 2024: The Growing Impact of Convective Storms and Hail” | Sponsored by Global Risk Consultants, a TÜV SÜD Company “Partnering Against Cyberrisk” | Sponsored by AXA XL “Harnessing the Power of Data and Analytics for Effective Risk Management” | Sponsored by Marsh “Accident Prevention — The Winning Formula For Construction and Insurance” | Sponsored by Otoos “Platinum Protection: Underwriting and Risk Engineering's Role in Protecting Commercial Properties” | Sponsored by AXA XL “Elevating RMIS — The Archer Way” | Sponsored by Archer   RIMS Publications, Content, and Links: RIMS Membership — Whether you are a new member or need to transition, be a part of the global risk management community! RIMS Virtual Workshops On-Demand Webinars RIMS-Certified Risk Management Professional (RIMS-CRMP) RISK PAC | RIMS Advocacy RIMS Strategic & Enterprise Risk Center RIMS-CRMP Stories — Featuring RIMS President Kristen Peed!   RIMS Events, Education, and Services: RIMS Risk Maturity Model®   Sponsor RIMScast: Contact sales@rims.org or pd@rims.org for more information.   Want to Learn More? Keep up with the podcast on RIMS.org, and listen on Spotify and Apple Podcasts.   Have a question or suggestion? Email: Content@rims.org.   Join the Conversation! Follow @RIMSorg on Facebook, Twitter, and LinkedIn.   About our guest: Gwenn Cujdik, Incident Response and Cyber Services Lead for North America at AXA XL Production and engineering provided by Podfly.  

The Dana Show with Dana Loesch
Absurd Truth: Kavanaugh's Trans Attacker Got Off EASY

The Dana Show with Dana Loesch

Play Episode Listen Later Oct 6, 2025 24:11 Transcription Available


The Transgender man who planned to assassinate Brett Kavanaugh will serve just 8 years. Steak ‘n Shake announces it is installing "the tallest and biggest American flag that local governments will allow" at every restaurant across the country. Disney CEO Bob Iger reinstated Jimmy Kimmel after the cancellation threatened a glitzy party he and his wife were hosting.Thank you for supporting our sponsors that make The Dana Show possible…Noble Gold https://NobleGoldInvestments.com/DanaOpen a new qualified IRA or cash account with Noble Gold and get a free 10-ounce Silver Flag Bar plus a Silver American Eagle Proof Coin.Webroothttps://Webroot.com/danaChange your October from cyber-scary to cyber-secure with 60% off Webroot Total Protection.AmmoSquaredhttps://AmmoSquared.comDon't get caught without ammo and be sure to tell them you heard about Ammo Squared on this show. HumanNhttps://HumanN.comStart supporting your cardiovascular health with SuperBeets now available at your local Walmart. ChapterFor free and unbiased Medicare help from my partners Chapter, dial #250 and say keyword “My Medicare”Chapter and its affiliates are not connected with or endorsed by any government entity or the federal Medicare program. Chapter Advisory, LLC represents Medicare Advantage HMO, PPO, and PFFS organizations and stand-alone prescription drug plans that have a Medicare contract. Enrollment depends on the plan's contract renewal. While we have a database of every Medicare plan nationwide and can help you search among all plans, we have contracts with many but not all plans. As a result, we do not offer every plan available in your area. Currently, we represent 50 organizations which offer 18,160 products nationwide. We search and recommend all plans, even those we don't directly offer. You can contact a licensed Chapter agent to find out the number of products available in your specific area. Please contact Medicare.gov, 1-800-Medicare, or your local State Health Insurance Program (SHIP) to get information on all of your options.PreBornhttps://PreBorn.com/DANA Or DIAL #250 Say the keyword BABY. That's #250, BABY. Together, we can save lives — one mom and one baby at a time.Keltechttps://KelTecWeapons.comKelTec builds every KS7 GEN2 right here in the USA with American materials and workers—upgrade your home defense today. All Family Pharmacyhttps://AllFamilyPharmacy.com/Dana Don't wait until flu season knocks at your door. Use code DANA10 at checkout to save 10%. Relief Factorhttps://ReliefFactor.com OR CALL 1-800-4-RELIEFTurn the clock back on pain with Relief Factor. Get their 3-week Relief Factor Quick Start for only $19.95 today! Byrnahttps://Byrna.com/danaGet your hands on the new compact Byrna CL. Visit Byrna.com/Dana to receive 10% off Patriot Mobilehttps://PatriotMobile.com/DanaDana's personal cell phone provider is Patriot Mobile. Get a FREE MONTH of service code DANA

Bear Attack
S7E9: K-Pop Bear Wranglers

Bear Attack

Play Episode Listen Later Oct 6, 2025 100:17


Happy spooky season Attackers! Normally this time of year we do a halloween themed episode, however this year we decided to be a little more broad and talk about Korean demons and crap related to that.On this episode we discuss Korean Grim Reaper hats, have a wild time with asian rock music and review Netflix's K-Pop Demon Hunters.Please share our show with your friends and hit us up on socials with ideas and stuff.

David Bombal
#517: Have you been hacked? Advanced detection method

David Bombal

Play Episode Listen Later Oct 6, 2025 39:51


Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You'll also get 20% off an annual premium subscription. Think you've been hacked? In this video, David Bombal and OTW (OccupyTheWeb) walk you through OSQuery - a free, open-source tool that lets you query your operating system like a database. You'll learn the exact SQL-style commands to find: • Listening processes & remote connections (spot command-and-control) • Suspicious services and misspelled look-alikes • Persistence via registry startup items and scheduled tasks • Fileless malware (on_disk = 0) running only in RAM OTW draws from real digital forensics cases (200+ inquiries/month), including harassment, divorce disputes, and business rivalries. We also explain why antivirus often fails once malware is resident—and what you can do next (kill the process, remove the file, and harden startup entries). // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // YouTube video REFERENCE // Have you been hacked? Hacker explains how to find out: • Have you been hacked? Hacker explains how ... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:35 - Introduction 01:08 - The New Python Book 01:41 - Sponsored Section 02:49 - OTW Shares a Cool Tool 05:11 - Why This Tool is Powerful 06:45 - Latest Hacking Trends 09:59 - Who Should Use This Tool (and When) 10:54 - What Happens When You're Hacked 11:20 - Why Hackers Need Access First 12:02 - After Installing the Software 12:39 - How to Query a Database 14:43 - Exploring OS Query's Page 16:14 - Finding Unwanted Services on Your Computer 18:06 - Narrowing Down the Data 22:06 - Tracing the Hacker's Footsteps 23:11 - The Case of the Husband Who Hacked His Wife 24:31 - Are You Being Hacked by the CIA? 25:31 - The Attacker's Go-To Move 26:25 - Understanding the Windows Registry 29:55 - Investigating Scheduled Tasks 30:48 - Common Hacker Techniques 32:11 - Checking the Processes Running on Your System 33:48 - Is Chrome Malicious? 35:05 - Why Most Home Users Get Hacked 36:16 - Should You Rely on Anti-Virus? 37:48 - Windows vs Mac: Which Gets Hacked More? 38:30 - Getting Hacked Through a Friend's Link 39:10 - Tutorials for Finding Malware on Your System 39:34 - Outro & Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #hacked #osquery #cybersecurity

Global News Podcast
Manchester synagogue attacker named

Global News Podcast

Play Episode Listen Later Oct 3, 2025 29:35


Police have named the man who killed two people at a synagogue in Manchester. Jihad Al-Shamie, a 35-year-old British man of Syrian descent, was shot and killed by officers outside the Heaton Park Hebrew Congregation Synagogue. Also, Donald Trump has declared the US is now in an armed conflict with drug smugglers in the Caribbean Sea. A man alleged to be a high-up figure in the Tren de Aragua gang has been arrested in Colombia. A former Israeli hostage who was held in captivity in Gaza for 16 months has called on Hamas to sign President Trump's peace plan. The disgraced rapper, Sean Diddy Combs, is set to be sentenced on prostitution charges. Luxembourg's Grand Duke Henri is formally abdicating his throne. There is a rogue planet gobbling up gas and dust at an unprecedented rate. Open AI's Sora app raises yet more concerns about artificial intelligence and copyright.The Global News Podcast brings you the breaking news you need to hear, as it happens. Listen for the latest headlines and current affairs from around the world. Politics, economics, climate, business, technology, health – we cover it all with expert analysis and insight. Get the news that matters, delivered twice a day on weekdays and daily at weekends, plus special bonus episodes reacting to urgent breaking stories. Follow or subscribe now and never miss a moment. Get in touch: globalpodcast@bbc.co.uk

The Smart 7
Police name Manchester Synagogue Attacker, Ukraine concerned over Russian strikes at Nuclear power stations, Taylor Swift celebrates “The Life of a Showgirl”

The Smart 7

Play Episode Listen Later Oct 3, 2025 7:29


The Smart 7 is an award winning daily podcast, in association with METRO, that gives you everything you need to know in 7 minutes, at 7am, 7 days a week…With over 19 million downloads and consistently charting, including as No. 1 News Podcast on Spotify, we're a trusted source for people every day and we've won Gold at the Signal International Podcast awardsIf you're enjoying it, please follow, share, or even post a review, it all helps... Today's episode includes the following: https://x.com/i/status/1973773098080968937 https://x.com/i/status/1973739745759948948 https://x.com/i/status/1973702449652277630 https://x.com/i/status/1973733624970129756https://x.com/i/status/1973670765246464284 https://x.com/i/status/1973657896098414874 https://x.com/i/status/1973859962829910062 https://x.com/i/status/1973975000681164818 https://x.com/i/status/1973423810230841815 Contact us over @TheSmart7pod or visit www.thesmart7.com or find out more at www.metro.co.uk Voiced by Jamie East, using AI, written by Liam Thompson, researched by Lucie Lewis and produced by Daft Doris. Hosted on Acast. See acast.com/privacy for more information.

Community IT Innovators Nonprofit Technology Topics
Cybersecurity, Viruses, Phish-Resistant MFA with Matt Eshleman

Community IT Innovators Nonprofit Technology Topics

Play Episode Listen Later Oct 3, 2025 19:49 Transcription Available


Nonprofit Cybersecurity expert and Community IT CTO Matt Eshleman offered his take on these trends. Listen for expert advice on avoiding new computer viruses and making sure your organization is protected from Attacker-in-the-Middle attacks on MFA (Multi-Factor Authentication), particularly for important accounts like your Executive Director and CFO.Fighting VirusesVirus attacks have been increasing. These computer viruses are no longer just malware that “infects” your network through an email link or website. Bad actors know we are suspicious of links in our email and that these days most malicious emails are stopped from reaching our inboxes. As a work around, they have started sending a document with instructions to open the document with a “secure code” – actually a malicious code. In this way, they trick the victim into running the attack against themselves. To resist this attack, always think – if the document you need to open is legitimate, and the person emailing it to you is genuine, they can send you a pdf. You should be very suspicious of any attachment that requires another set of steps to open, particularly executing code on your computer.Other ways you may pick up a computer virus: downloading something malicious online. Be careful to double check you are on a legitimate site before downloading anything. Better yet, use the App Store where possible. We are also seeing an increase in malicious pop-ups. If a window opens on your computer saying you have a virus, it can be scary. Always contact your own IT provider. Do not follow the directions the pop up is giving you to get “support,” or you will be calling the scammer. Using Phish-Resistant MFACommunity IT continues to recommend that all users use a Multi-Factor Authentication method on all accounts.Because MFA is so effective, it is not surprising that attackers are trying to work around it. In the past few years Attacker-in-the-Middle attacks have been on the rise. In this attack, the bad guys trick a user into “logging in” in a way that exposes their secure token for the attacker to steal. The attacker can then login as the user from a different device and gain access to anything the user has access to.Phish-Resistant MFA, like using a passkey or Microsoft Hello, will only allow the MFA to be authenticated from the device where you are. You can also use a physical key like Ubikey or FIDO, which must be present to allow the login.Community IT is recommending at a minimum that all accounts with access to sensitive data such as Executive Director, CFO, maybe Board members, the executive team, should use Phish-Resistant MFA to best protect the organization. Of course, any access to your network is a risk, so where possible, investing in Phish-Resistant MFA for all staff is a good investment.Training on Phish-Resistant MFA can lessen the friction or feeling that an extra step is required. Most Phish-Resistant MFA is quick to use and easy to learn. Peace of mind is worth it. Community IT hopes that building this culture of care at your organization makes it easier for you to update your staff on new threats and scams through your regular training program.  _______________________________Start a conversation :) Register to attend a webinar in real time, and find all past transcripts at https://communityit.com/webinars/ email Carolyn at cwoodard@communityit.com on LinkedIn Thanks for listening.

Nigeria Football Weekly
Super Eagles Squad REVEALED! Too Many Attackers?

Nigeria Football Weekly

Play Episode Listen Later Oct 3, 2025 25:36


In this episode, Olu dives into the Super Eagles' final squad list for the crucial World Cup qualifiers. He breaks down the selections, asking whether this is really the best team Nigeria could field in such a decisive moment. With no press conference from coach Eric Chelle to justify his decisions once again.The squad features a whopping nine attackers in total, including five centre-forwards, but just four midfielders. Olu examines what this imbalance could mean tactically, the players who made the cut, and whether the Super Eagles have the right mix to get the job done.#SuperEagles #NigeriaFootball #Nigeria Listen to the audio version of the podcast for free on all major podcast platforms here: https://podfollow.com/nigeria-football-weekly/view or https://linktr.ee/nigeriafootballweekly Subscribe to the Nigeria Football Weekly channel here: @nigeriafootballweekly & make sure to enable all push notifications to never miss an updateFollow Nigeria Football Weekly:Twitter - https://twitter.com/NFWPod Instagram - https://www.instagram.com/nigeriafootballweekly/ TikTok - https://www.tiktok.com/@nigeriafootballweekly Facebook - https://www.facebook.com/NigeriaFootballWeekly Linktree - https://linktr.ee/nigeriafootballweekly Email - nigeriafootballweekly@gmail.com (00:00) Intro(00:49) No press conference AGAIN(01:23) South Africa's Confidence(02:46) Full Squad List(04:54) Overall Thoughts(05:32) Could Nigeria Make the Playoffs?(08:24) Team imbalance and worries(09:24) Goalkeepers(09:59) Good Defensive Picks?(15:53) Just 4 Midfielders?(18:00) Enough Wingers?(21:08) Too many strikers?

Rebel News +
EZRA LEVANT | Rebel News caught suspected Antifa church attacker (INSIDE the Defence department?!)

Rebel News +

Play Episode Listen Later Oct 2, 2025 29:34


The Rebel News podcasts features free audio-only versions of select RebelNews+ content and other Rebel News long-form videos, livestreams, and interviews. Monday to Friday enjoy the audio version of Ezra Levant's daily TV-style show, The Ezra Levant Show, where Ezra gives you his contrarian and conservative take on free speech, politics, and foreign policy through in-depth commentary and interviews. Wednesday evenings you can listen to the audio version of The Gunn Show with Sheila Gunn Reid the Chief Reporter of Rebel News. Sheila brings a western sensibility to Canadian news. With one foot in the oil patch and one foot in agriculture, Sheila challenges mainstream media narratives and stands up for Albertans. If you want to watch the video versions of these podcasts, make sure to begin your free RebelNewsPlus trial by subscribing at http://www.RebelNewsPlus.com

New England Soccer Weekly w/ Tom Quinlan
RIFC Manager Khano Smith, Midfielder Zach Herivaux, Attacker JJ Williams

New England Soccer Weekly w/ Tom Quinlan

Play Episode Listen Later Oct 2, 2025 17:38


Tom catches up with Coach Khano, Midfielder Zachary Herivaux and Forward JJ Williams this week. The guys talk about the teams form heading into the final four matches, how the attack has improved and the growth of RIFC in the community after year 1 at Centerville Bank Stadium.See omnystudio.com/listener for privacy information.

AWS for Software Companies Podcast
Ep153: From Minutes to Seconds: How AI-Native Cybersecurity is Winning the Speed War Against Attackers

AWS for Software Companies Podcast

Play Episode Listen Later Oct 2, 2025 21:52


John Skinner of Vectra AI shares how cyber attackers are democratizing sophisticated attacks using dark web tools, and why AI-powered hybrid defense is now essential for enterprise security.Topics Include:Vectra AI: 13-year-old cybersecurity company founded as "AI native" from day oneBuilt on machine learning assumption while competitors treated AI as afterthoughtGenerative AI represents the latest evolution in their comprehensive AI journeyStarted pairing threat researchers with ML developers to codify attack behaviorsAdded agentic AI in 2018 for correlation across space and timeUses AWS Security Lake, GuardDuty, and recently became AWS Bedrock customerSuccess measured by reducing "dwell time" from initial attack to detectionAchieved 60% faster alerts, 51% faster monitoring, 50% faster investigation timesCustomers should evaluate vendor's data science quality and algorithm training yearsEvolved hybrid defense approach as attacks start anywhere, go everywhereAI handles high-volume correlation while humans focus on analytical decisionsFuture challenge: democratized cyber attacks using readily available dark web toolsParticipants:John Skinner – Vice President Corporate/Business Development, Vectra AIFurther Links:Vectra AI: Website – LinkedIn – AWS Marketplace - YouTubeSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon.com/isv/

AP Audio Stories
Police say attacker who killed 2 people and injured 2 at a British synagogue has been killed

AP Audio Stories

Play Episode Listen Later Oct 2, 2025 0:21


AP correspondent Karen Chammas reports on a deadly vehicle and stabbing attack outside a synagogue in Manchester, England.

The Vermont Conversation with David Goodman
Cynthia Miller-Idriss on 'the common thread' of misogyny and violent extremism

The Vermont Conversation with David Goodman

Play Episode Listen Later Oct 2, 2025 42:21


The assassination of conservative activist Charlie Kirk is the latest in a growing list of incidents of political violence. There have been 150 politically motivated attacks just this year, and a 2000% increase in targeted violent plots over the past two decades.What explains this surge in political violence?Extremism expert Cynthia Miller-Idriss confirms that this is “the worst moment of political violence since the 1970s,” adding, "We are in an era of mass shootings." She argues that rising polarization and “the common thread" of misogyny links many recent attacks. Miller-Idriss is the founding director of the Polarization and Extremism Research Innovation Lab at American University, where she is also a professor in the School of Public Affairs and the School of Education. Her latest book is “Man Up: The New Misogyny and the Rise of Violent Extremism.” She is an MSNBC columnist and regular commentator who appears frequently on CNN, PBS and other news outlets.President Donald Trump has vowed to mount a government assault on “the left” in response to Kirk's assassination. But a recent study by the Center for Strategic and International Studies shows that despite a small uptick in “left-wing” violence this year, ”right-wing” terrorism has far exceeded all other forms of political violence in the number of fatalities and attacks in the past decade.Miller-Idriss contends that most mass shooters, terrorists and violent extremists have two things in common: Nearly all are men, and they are almost always “virulent misogynists, homophobes or transphobes.” She says that the media — herself included — have long overlooked this link between political violence and misogyny.The U.S. now averages more than one mass shooting per day. “Virtually every mass shooter in the U.S. has a history of gender-based violence in some way,” with 60% of them having documented histories of domestic violence or “stalking, harassment, rape threats, cyber porn, revenge porn, sexual assault, rape, anti-LGBTQ violence,” Miller-Idriss said. “Even when the targets are not very clearly women or the LGBTQ community … gender or homophobia really significantly play a role.”Miller-Idriss highlighted two factors that make this era of political violence unique — the proliferation of guns and online communities that traffic in hate.“We have a lot of shootings that don't seem to have any ideological motivation at all but are really at the hands of extraordinarily online young people … who spend a lot of time in online spaces, in gaming spaces, in very meme-driven, irony laden spaces,” she said. Attackers “are kind of communicating, almost in a way that may be detached from reality, with online communities as part of the attack.” Shooters are “not just highly online but expressing a lot of online misogyny and gender-based harms or harassing teenage girls online,” she said.Miller-Idriss said that even “everyday forms of misogyny” that she and other women face are linked to more extreme forms. She said she observed that in the hate mail that she receives that there was “a very clear pattern of containment, that what they wanted was for me to not be front and center.”“There's some sort of anger there about a person, a woman, being in a public space at all, and it makes you realize that phrases like ‘lock her up,' ‘send them back,' ‘get back in the closet,' ‘get back in the kitchen' (are) containment metaphors (that) are very, very common in everyday life directed toward women or LGBTQ folks who are seen as being too public or too flamboyant or too out,” she said.Everyday misogyny “can evolve into a trajectory in which some young men are conditioned through online influencers to believe that they have lost their rightful place, that women belong in a more submissive role,” Miller-Idriss said.“Some men are so easily mobilized to anger if they're denied what they think they're entitled to (and) that might escalate eventually into rage in a more public way,” she said.Miller-Idriss and her colleagues at the Polarization and Extremism Research Innovation Lab work with young people to “off-ramp” violent online hate. “If you start to recognize that part of the problem of mass shootings and mass violence is rooted in very everyday harms, then you can take action on those everyday harms,” she said. “It should be an empowering message to say, ‘Let's have a conversation about what this looks like, and let's have a conversation about the experience of boys compared to girls.'”

The World Tonight
Manchester police name synagogue attacker as two confirmed dead

The World Tonight

Play Episode Listen Later Oct 2, 2025 47:40


Manchester police have named the man they say attacked a synagogue in the city as 35-year-old Jihad Al-Shamie, a British citizen of Syrian descent. The car ramming and stabbing attack left two Jewish men dead. We hear some of the shock and fear in Europe's biggest Jewish neighbourhood and ask if counter-terrorism legislation is up to date.Also on the programme:A former chief of staff for Conservative Prime Minister Theresa May says the pledge by new leader Kemi Badenoch to scrap the 2008 Climate Change Act if she gets into office is "bad policy and bad politics".And 75 years since the first edition of Peanuts, with its lovable main character Charlie Brown, we speak to artist and fan Andy Holden.

WhatCulture Wrestling
WWE NXT Review - CHAOS Ahead Of NXT Showdown! Mustafa Ali RETURNS To NXT! Mystery Attacker REVEALED! The Showdown Summit?!

WhatCulture Wrestling

Play Episode Listen Later Oct 1, 2025 89:42


The Dadley Boyz review last night's episode of NXT and discuss...CHAOS ahead of NXT Showdown!Mustafa Ali RETURNS to NXT!Mystery attacker REVEALED!Je'Von Evans & Leon Slater team up!The Showdown Summit?!ENJOY!Follow us on Twitter:@AdamWilbourn@MichaelHamflett@MSidgwick@WhatCultureWWEFor more awesome content, check out: whatculture.com/wwe Hosted on Acast. See acast.com/privacy for more information.

Kevin Kietzman Has Issues
Who Will Notice Shutdown?, Frank White is Out, KS Schools Embarrass, T-Mobile Attacker Charged, Chiefs Have Top CB, Sporting KC's Bold Move, Tom Watson Takes a Stand, Record Setting Bridge

Kevin Kietzman Has Issues

Play Episode Listen Later Oct 1, 2025 54:21


   I can think of a thousand things that if they were shutdown today I would notice.  The federal government isn't one of them.   So here we go, will this be another shutdown about nothing that we all forget about or will President Trump make this a shutdown to remember?    Frank White is out as Jackson County Executive... wait until you hear how badly he got smoked at the polls.  Now, who's next and what does it mean for the Royals and Chiefs.  At the same time, a lawsuit in Missouri is likely headed to the state's Supreme Court to keep the Royals and Chiefs from using tax revenue to build.    Kansas schools are becoming the embarrassment of the land as a young, portly principal with blue hair at an Olathe grade school takes a liberal stand.  And a sex ed teacher in Derby is arrested for child endangerment.  Why is this happening in Kansas so often and not Missouri?    The teenager that attacked the usher at T-Mobile Center ten days ago has been charged on two counts of assault but his real punishment may be coming from his school.    The Chiefs have the top cornerback in the league through four games and it's not Trent McDuffie.  Sporting KC makes a big, bold hire to run soccer operations.  Tom Watson has some very strong opinions about the fans at the Ryder Cup while Paul Azinger has strong words for Rory McIlroy.    And our Final Final is a new bridge that is the highest and longest in the world.

The Tech Trek
How Attackers Are Using AI to Outpace Defenses

The Tech Trek

Play Episode Listen Later Oct 1, 2025 27:42


Jonathan DiVincenzo, co-founder and CEO of Impart Security, joins the show to unpack one of the fastest growing risks in tech today: how AI is reshaping the attack surface. From prompt injections to invisible character exploits hidden inside emojis, JD explains why security leaders can't afford to treat AI as “just another tool.” If you're an engineering or security leader navigating AI adoption, this conversation breaks down what's hype, what's real, and where the biggest blind spots lie.Key Takeaways• Attackers are now using LLMs to outpace traditional defenses, turning old threats like SQL injection into live problems again• The attack surface is “iterating,” with new vectors like emoji-based smuggling exposing unseen vulnerabilities• Frameworks have not caught up. While OWASP has listed LLM threats, practical solutions are still undefined• The biggest divide in AI coding is between senior engineers who can validate outputs and junior developers who may lack that context• Security tools must evolve quickly, but rollout cannot create performance hits or damage business systemsTimestamped Highlights01:44 Why runtime security has always mattered and why APIs were not enough04:00 How attackers use LLMs to regenerate and adapt attacks in real time06:59 Proof of concept vs. security and why both must be treated as first priorities09:14 The rise of “emoji smuggling” and why hidden characters create a Trojan horse effect13:24 Iterating attack surfaces and why patches are no longer enough in the AI era20:29 Is AI really writing production code and what risks does that createA thought worth holding onto“AI is great, but the bad actors can use AI too, and they are.”Call to ActionIf this episode gave you new perspective on AI security, share it with a colleague who needs to hear it. Follow the show for more conversations with the leaders shaping the future of tech.

The Neatcast
Episode 189 (Ft. Mark) - THRILLternships, Non-Human Attackers, and The Beast of Brusco

The Neatcast

Play Episode Listen Later Sep 29, 2025 108:14


Click Here to Text us. Yes really, you totally can.Click Here to Text us. Yes really, you totally can.Guess WhatGet yourself a THRILLTERNSHIPThe Toy Hall of Fame's list, made by a 300 year old manEven WeirderIt landed in my truck, it's not human!Aliens are driving around in gigantic English letters again...New BUGA SPHERE news!Beyond The PaleThe Beast of Brusco! A turtle that could do nothing but take Massive W's when put head to head against a angry landowner...WhatchaAre these Baseball player names real or made up?? This game is harder than you think, because they're baseball players so they all have names that sound like lewd limericks. Check Out Our Website!Join our Discord!Check out our Merch Store HERE!Follow us @theneatcast on TikTok!Follow us @neatcastpod on BlueskyFollow us @neatcastpod on Twitter!Follow us @neatcastpod on Instagram!Follow us @theneatcast on Facebook!

Cyber Briefing
September 29, 2025 - Cyber Briefing

Cyber Briefing

Play Episode Listen Later Sep 29, 2025 9:34


If you like what you hear, please subscribe, leave us a review and tell a friend!Attackers exploited Cisco firewall zero-days, Medusa and Akira ransomware hit Comcast and SonicWall VPNs, and Ohio's Union County suffered a ransomware attack affecting 45,000 people. Meanwhile, Dutch teens spied for pro-Russian hackers, US investors plan to take over TikTok operations, and a vital cyber data-sharing law may expire amid a government shutdown, while a South Korean data center fire took 600+ government websites offline.

ASCII Anything
S10E5: Normalizing NO-Best Practices for Defending Against Emotionally Engineered Phishing Attacks

ASCII Anything

Play Episode Listen Later Sep 29, 2025 31:55


This episode focuses on the evolution of phishing and how it has transformed itself into deepfakes and sophisticated, emotionally engineered attacks.  Moser's Hersey Richardson is joining us again to discuss how it's changing, why it's harder to detect, and what you can do to stay ahead. We've come a long way from the days of clumsy emails promising lottery winnings. Today's phishing is a sophisticated cyber threat powered by AI, deepfakes, and psychological manipulation. Attackers now use realistic voice clones, AI-generated emails, and even video deepfakes to impersonate trusted individuals or leaders. What once relied on poor grammar and broken links now leverages emotional triggers, urgency, and hyper-personalization to exploit human behavior.#moserconsulting#technology #phishing #emotionalengineering#informationtechnology #cybersecurity

AI + a16z
When Deepfakes Steal $30M: The New Edge of Cybercrime

AI + a16z

Play Episode Listen Later Sep 26, 2025 22:11


AI is transforming both sides of the cybersecurity cat-and-mouse game. Attackers are using LLMs to scale impersonation, phishing, and even deepfake fraud—while defenders are racing to automate detection and takedowns at the same speed.In this episode, a16z partner Joel de la Garza talks with Kevin Tian, cofounder & CEO of Doppel Security (and former Uber engineer), about building in this new landscape. They cover:Why outsider founders sometimes build the most effective security companiesThe “3 V's” framework for today's social engineering attacks: volume, velocity, varietyHow Doppel uses reasoning models and reinforcement fine-tuning to cut false positives and improve precisionSimulation tools like “vibe phishing” to train employees on real attacker tacticsThe shift from manual cyber-intelligence services to AI-driven, software-margin businessesWhy the biggest bottleneck now isn't model cost—but engineering time to deliver the right contextIf you're building security products or exploring how AI can automate tough edge cases, this is a ground-level look at what's working—and what comes next. Check out everything a16z is doing with artificial intelligence here, including articles, projects, and more podcasts. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Canary Cry News Talk
ANTI-ICE SHOOTING! Left-Wing Terrorism on the RISE, Trump Attacker Spills Blood in Court | CCNT 879

Canary Cry News Talk

Play Episode Listen Later Sep 25, 2025 136:43


ANTI-ICE SHOOTINGS - 09.24.2025 - #879 Take the Survey: https://tiny.cc/cc879 BestPodcastintheMetaverse.com Canary Cry News Talk #879 - 09.24.2025 - Recorded Live to 1s and 0s Deconstructing World Events from a Biblical Worldview Declaring Jesus as Lord amidst the Fifth Generation War! CageRattlerCoffee.com SD/TC email Ike for discount https://CanaryCry.Support   Send address and shirt size updates to canarycrysupplydrop@gmail.com   4TH ANNIVERSARY OF SENJESS AND COOLRUNNINGSMON!    Join the Canary Cry Roundtable This Episode was Produced By:   SIR KULLEN ANDERSON HOBO OF THE AMERICA'S   Executive Producers Sir LX Protocol V2 Baron of the Berrean Protocol*** Felicia D***   Producers of TREASURE (CanaryCry.Support) Malik, American Hobo   Producers of TIME Timestampers: Jade Bouncerson, Morgan E Clankoniphius Links: JAM   SHOW NOTES Greg on X even knew yesterday was the Rapture (X)   PROPAGANDA/IMMIGRANTS BREAKING: 2 dead, 1 shot at ICE facility in Texas (Guardian) Kash Patel Releases Photo of Anti-Ice “clip”  MSNBC GENIUS on Anti-ICE shooter (X/MSNBC)   → Clip: DHS uses Pokemon theme, gotta catch em all, deportation (X) → Clip: DHS uses Theo Von banger deportation video (X) → Post: Theo Von expresses frustration, DHS complies and takes down video (X)    → Trump and Epstein best friends statues, taken down (NY Post/X) → Trump Bitcoin statue    TRUMP/ASSASSANATION  Routh tries to stab himself in the neck after verdict    PROPAGANDA Left-Wing Terrorism Is on the Rise (Atlantic)   SPACE Nasa plans first manned moon mission in February 2026 (BBC)   EXECUTIVE PRODUCERS TALENT/TIME END

Dirshu Mishnah Brurah Yomi
MB3 170a: Dealing with Attackers on Shabbos (329:3-9)

Dirshu Mishnah Brurah Yomi

Play Episode Listen Later Sep 25, 2025


Black Hills Information Security
Kerberoasting Goes to Washington – 2025-09-15

Black Hills Information Security

Play Episode Listen Later Sep 20, 2025 62:58


???? Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com 00:00 - PreShow Banter™ — Enter Dark John03:15 - Kerberoasting Goes to Washington – BHIS - Talkin' Bout [infosec] News 2025-09-1503:49 - Story # 1: Senator blasts Microsoft for making default Windows vulnerable to “Kerberoasting”12:46 - Story # 2: How an Attacker's Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations32:42 - Story # 3: Some JLR suppliers ‘face bankruptcy' due to hack crisis41:30 - Story # 4: AI-Powered Villager Pen Testing Tool Hits 11,000 PyPI Downloads Amid Abuse Concerns46:07 - Story # 5: All your vulns are belong to us! CISA wants to maintain gov control of CVE program49:55 - Story # 6: Qantas penalizes executives for July cyberattack51:15 - Story # 7: America's second largest egg producer breached, claim hackers54:55 - Story # 8: Undocumented Radios Found in Solar-Powered Devices

Paul's Security Weekly
Safes, Hackers, and Web Servers - PSW #892

Paul's Security Weekly

Play Episode Listen Later Sep 18, 2025 132:25


This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on disposable vapes NPM worms and token stealing Attackers make mistakes too AI podcasts Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-892

Paul's Security Weekly TV
Safes, Hackers, and Web Servers - PSW #892

Paul's Security Weekly TV

Play Episode Listen Later Sep 18, 2025 132:25


This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on disposable vapes NPM worms and token stealing Attackers make mistakes too AI podcasts Show Notes: https://securityweekly.com/psw-892

Paul's Security Weekly
Board Priority But Lack of Access & CISO Pressure, 360 Privacy and Pentera Interviews - Chuck Randolph, Tom Pore - BSW #413

Paul's Security Weekly

Play Episode Listen Later Sep 17, 2025 70:10


In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more! Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a gripping conversation about the evolution of executive protection in the digital age. With over 30 years of experience, Chuck shares how targeted violence has shifted from physical threats to online ideation—and why it now starts with a click. From PII abuse to unregulated data brokers, generative AI manipulation, and real-world convergence of cyber and physical risks—this is a must-watch for CISOs, CSOs, CEOs, and anyone navigating modern threat landscapes. Hear real-world examples, including shocking stories of doxxing, AI-fueled radicalization, and the hidden dangers of digital exhaust. Whether you're in cyber, physical security, or executive leadership, this interview lays out the urgent need for converged risk strategies, narrative control, and a new approach to duty of care in a remote-first world. Learn what every security leader needs to do now to protect key personnel, prevent exploitation, and build a unified, proactive risk posture. This segment is sponsored by 360 Privacy. Learn how to integrate privacy and protective intelligence to get ahead of the next threat vector at https://securityweekly.com/360privacybh! In this exclusive Black Hat 2025 interview, CyberRisk TV host Matt Alderman sits down with Tom Pore, AVP of Sales Engineering at Pentera, to dive into the rapidly evolving world of AI-driven cyberattacks. What's happening? Attackers are already using AI and LLMs to launch thousands of attacks per second—targeting modern web apps, exploiting PII, and bypassing traditional testing methods. Tom explains how automated AI payload generation, context-aware red teaming, and language/system-aware attack modeling are reshaping the security landscape. The twist? Pentera flips the script by empowering security teams to think like an attacker—using continuous, AI-powered penetration testing to uncover hidden risks before threat actors do. This includes finding hardcoded credentials, leveraging leaked identities, and pivoting across systems just like real adversaries. To learn more about Pentera's proactive Ransomware testing please visit: https://securityweekly.com/penterabh Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-413

Reimagining Cyber
NPM Hack, Supply Chain Chaos - Ep 167

Reimagining Cyber

Play Episode Listen Later Sep 17, 2025 11:39


This week on Reimagining Cyber, we unpack one of the biggest supply chain attacks of the year: the NPM hack. Attackers compromised widely used packages like Chalk and Debug—billions of weekly downloads—slipping in code that silently hijacked crypto transactions. Tyler Moffitt joins us to explain how it happened, who's most at risk, and the practical steps every developer and security leader should take right now.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70 Chief Information Security Officer CISO Podcasts rankings.

The Howie Carr Radio Network
Aaron Chadbourne: What Was The Charlotte Attacker Doing On The Street | 9.9.25 - The Grace Curley Show Hour 1

The Howie Carr Radio Network

Play Episode Listen Later Sep 9, 2025 38:57


Justin Filler joins the show to discuss the Charlotte murder, and how was the attacker even on the streets?  Visit the Howie Carr Radio Network website to access columns, podcasts, and other exclusive content.

rSlash
r/Nuclearrevenge He Killed His Sister's Attacker

rSlash

Play Episode Listen Later Sep 8, 2025 21:12


0:00 Intro 0:07 Unaliving 6:33 Army revenge 15:10 Credit card Learn more about your ad choices. Visit megaphone.fm/adchoices

Graham Allen’s Dear America Podcast
Leftist Media Outlets ADMIT Trump Was Right…Again + BIG BALLS Attacker REVEALED!

Graham Allen’s Dear America Podcast

Play Episode Listen Later Aug 12, 2025 62:14


Check out our sponsors: ✅ Patriot Mobile - https://patriotmobile.com/partners/chad Episode Description: Chad unloads on the latest bombshells rocking the political world! Leftist media outlets are forced to eat crow as they admit—yet again—that President Trump was right all along about tariffs, the economy, etc.  Plus, one of the "BIG BALLS" attackers is revealed, and Chad's got the unfiltered scoop. Buckle up for hard-hitting commentary, razor-sharp wit, and the truth they don't want you to hear! Learn more about your ad choices. Visit megaphone.fm/adchoices