POPULARITY
Categories
Energy Department to release first cyber strategy Tech giants sign on to fight scammers Font-rendering hides malicious commands from AI in plain sight Get links to all our stories in the show notes: https://cisoseries.com/cybersecurity-news-energy-strategy-scammer-accord-font-rendering-attack/ Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first security awareness platform built to stop AI-powered social engineering. Attackers don't need malware anymore; they need trust. Tip: set a simple passphrase for high-risk actions, like wire requests or "urgent" account recovery – especially within finance teams and families. If the caller can't answer it, pause and verify. Adaptive runs deepfake and vishing simulations so employees practice this before it's real. Learn more at adaptivesecurity.com.
Eric Immesberger, a former undercover ATF agent, recounts the wild, dangerous cases and close calls from his career, including exposing corrupt cops, stopping murder plots, and surviving violent encounters, revealing the chaotic reality behind high-stakes federal investigations. Eric's links - www.ericimmesberger.com https://www.instagram.com/ericimmesberger/ https://www.tiktok.com/@ericimmesberger https://youtube.com/@ericimmesberger Contact for Keynotes: Info@ericimmesberger.com Do you want to be a guest? Fill out the form https://www.insidetruecrimepodcast.com/apply-to-be-a-guest Go to GoodRanchers.com and use code INSIDE to get a free meat for life plus $100 off your first three orders. F*%k your khakis and get The Perfect Jean 15% off with the code COX15 at theperfectjean.nyc/COX15 #theperfectjeanpod https://theperfectjean.nyc Send me an email here: insidetruecrime@gmail.com Do you extra clips and behind the scenes content? Subscribe to my Patreon: https://patreon.com/InsideTrueCrime Check out my Dark Docs YouTube channel here - https://www.youtube.com/@DarkDocsMatthewCox Follow me on all socials! Instagram: https://www.instagram.com/insidetruecrime/ TikTok: https://www.tiktok.com/@matthewcoxtruecrime Do you want a custom painting done by me? Check out my Etsy Store: https://www.etsy.com/shop/coxpopart Listen to my True Crime Podcasts anywhere: https://anchor.fm/mattcox Check out my true crime books! Shark in the Housing Pool: https://www.amazon.com/dp/B0851KBYCF Bent: https://www.amazon.com/dp/B0BV4GC7TM It's Insanity: https://www.amazon.com/dp/B08KFYXKK8 Devil Exposed: https://www.amazon.com/dp/B08TH1WT5G Devil Exposed (The Abridgment): https://www.amazon.com/dp/1070682438 The Program: https://www.amazon.com/dp/B0858W4G3K Bailout: https://www.barnesandnoble.com/w/bailout-matthew-cox/1142275402 Dude, Where's My Hand-Grenade?: https://www.amazon.com/dp/B0BXNFHBDF/ref=tmm_pap_swatch_0?_encoding=UTF8&qid=1678623676&sr=1-1 Checkout my disturbingly twisted satiric novel! Stranger Danger: https://www.amazon.com/dp/B0BSWQP3WX If you would like to support me directly, I accept donations here: Paypal: https://www.paypal.me/MattCox69 Cashapp: $coxcon69 CHAPTERS: 0:00 - Bad Cops, Dirty Precincts & The Mike Dowd Discussion 2:01 - Drug Dealer Claims Two NYPD Cops Are Robbing Dealers 6:25 - Undercover Sting: Setting Up Corrupt Officers 12:03 - ATF Agent Brutally Attacked Outside Headquarters 20:02 - Hospital Aftermath & The Attacker's Shocking Sentence 29:17 - The Long Road to Becoming an ATF Agent 42:34 - Undercover Hitman Sting: Husband Wants Wife Dead 1:00:11 - Proving Himself Undercover & The “Wife of the Year” Bomb Plot 1:28:03 - Gun Sting Turns Into Kidnapping & Murder Plot 2:04:47 - Motorcycle Gunman Shootout & The Final Case Before Retirement Learn more about your ad choices. Visit megaphone.fm/adchoices
Glenn starts the show by bringing in his chief researcher, Jason Buttrill, to discuss the current situation in Iran. What is Trump's plan in dealing with Iran? Glenn also gives a small but promising update on the SAVE America Act — and he credits his audience for demanding that Majority Leader Sen. John Thune (R-S.D.) bring it to the floor. Glenn discusses the growing threat of political Islam in America. Mauro Institute Director Ryan Mauro joins to discuss Glenn's upcoming Torch special, which focuses on the Islamization of the West, and the research that went into it. Ryan and Glenn also discuss the growing anti-Semitism happening on both sides of the political spectrum. Glenn issues a warning to those who choose what's “almost right” instead of what's right, which can eventually lead down a dark road. An armed man was arrested after entering an elementary school. Glenn speaks about the job of a journalist during a time in which America is at war. Will the FCC begin revoking broadcast licenses if an outlet spreads misleading information? Learn more about your ad choices. Visit megaphone.fm/adchoices
Drone strikes hit a key chip supply chain. China-linked hackers target Southeast Asian militaries. Attackers race ahead with AI. ShinyHunters claim a massive Telus breach. Microsoft issues a hotpatch. Malware turns up on Steam. Fileless attacks grow. Airline miles become cybercrime currency. Monday business breakdown. Tim Starks from CyberScoop unpacks the Stryker attack and the nebulous nature of Iranian cyber activity. AI playmates puzzle preschoolers. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest is Tim Starks from CyberScoop discussing how the Stryker attack highlights the nebulous nature of Iranian cyber activity amid joint U.S.-Israel conflict. You can read more in Tim's article here. Selected Reading Drone strikes halt a third of the world's helium supply, threatening chip production (TechSpot) China-Linked Hackers Hit Asian Militaries in Patient Espionage Operation (SecurityWeek) Attackers are exploiting AI faster than defenders can keep up, new report warns (CyberScoop) Telus Digital confirms breach after hacker claims 1 petabyte data theft (Bleeping Computer) Microsoft releases Windows 11 OOB hotpatch to fix RRAS RCE flaw (Bleeping Computer) The FBI is investigating malware hidden inside games hosted on Steam (TechCrunch) New XWorm 7.1 and Remcos RAT Attacks Abuse Windows Tools to Evade Detection (Hackread) Airline miles become underground currency in loyalty fraud schemes | brief (SC Media) Kevin Mandia-founded Armadin launches with $190 million. (N2K Pro Business Briefing) AI toys for young children need tighter rules, researchers warn (BBC News) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Welcome to Impact Theory with Tom Bilyeu, where we tackle the most pressing headlines and cultural shifts shaping our world. In this episode, Tom Bilyeu and Drew dive deep into breaking news across global conflict zones, with a particular focus on the escalating tensions in the Strait of Hormuz and the ongoing war involving Iran. The discussion breaks down Iran's strategic moves, the potential economic fallout—including spiking oil prices—and the challenges facing U.S. policy and leadership as the situation evolves. But the conversation doesn't stop overseas. The episode takes a hard look at recent domestic terror attacks, economic reports showing troubling signs for the U.S. economy, debates over digital currencies, and the rising challenges in major U.S. cities like New York as leaders propose controversial new tax strategies. Tom Bilyeu and Drew don't shy away from controversial topics—they address questions of immigration, national security, and the emotional toll of chasing (and reimagining) personal dreams in uncertain times. Whether you're interested in geopolitics, personal growth, economics, or just want to make sense of a world that seems to be changing faster than ever, this episode delivers engaging analysis and actionable insight. Stay tuned—there's a lot to unpack, and Impact Theory is here to help you navigate it. What's up, everybody? It's Tom Bilyeu here: If you want my help... STARTING a business: join me here at ZERO TO FOUNDER: https://tombilyeu.com/zero-to-founder?utm_campaign=Podcast%20Offer&utm_source=podca[%E2%80%A6]d%20end%20of%20show&utm_content=podcast%20ad%20end%20of%20show SCALING a business: see if you qualify here.: https://tombilyeu.com/call Get my battle-tested strategies and insights delivered weekly to your inbox: sign up here.: https://tombilyeu.com/ ********************************************************************** If you're serious about leveling up your life, I urge you to check out my new podcast, Tom Bilyeu's Mindset Playbook —a goldmine of my most impactful episodes on mindset, business, and health. Trust me, your future self will thank you. ********************************************************************** FOLLOW TOM: Instagram: https://www.instagram.com/tombilyeu/ Tik Tok: https://www.tiktok.com/@tombilyeu?lang=en Twitter: https://twitter.com/tombilyeu YouTube: https://www.youtube.com/@TomBilyeu Ketone IQ: Visit https://ketone.com/IMPACT for 30% OFF your subscription orderQuince: Free shipping and 365-day returns at https://quince.com/impactpodDuck.Ai: Protect your privacy at https://duck.ai/impactShopify: Sign up for your one-dollar-per-month trial period at https://shopify.com/impactMonetary Metals: Future-proof your wealth at https://monetary-metals.com/impactBlinkist: Start your free trial at https://blinkist.com/impactPlaud: Get 10% off with code TOM10 at https://plaud.ai/tomBlocktrust IRA: get up to $2,500 funding bonus to kickstart your account at https://tomcryptoira.comCape: 33% off your first 6 months with code IMPACT at https://cape.co/impactNetsuite: Right now, get our free business guide, Demystifying AI, at https://NetSuite.com/Theory Learn more about your ad choices. Visit megaphone.fm/adchoices
We are getting more details about who the suspects were and why they attacked a Michigan synagogue and a Virginia university campus. One was a convicted ISIS sympathizer, recently released from prison who tried to make the courts believe he felt deeply regretful for his allegiance to the terror organization. The other was a naturalized U.S. citizen from Lebanon who authorities believe had recently lost family members to Israeli missile strikes in his home country. See omnystudio.com/listener for privacy information.
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.”See omnystudio.com/listener for privacy information.
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.”See omnystudio.com/listener for privacy information.
We are getting more details about who the suspects were and why they attacked a Michigan synagogue and a Virginia university campus. One was a convicted ISIS sympathizer, recently released from prison who tried to make the courts believe he felt deeply regretful for his allegiance to the terror organization. The other was a naturalized U.S. citizen from Lebanon who authorities believe had recently lost family members to Israeli missile strikes in his home country. See omnystudio.com/listener for privacy information.
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.”See omnystudio.com/listener for privacy information.
We are getting more details about who the suspects were and why they attacked a Michigan synagogue and a Virginia university campus. One was a convicted ISIS sympathizer, recently released from prison who tried to make the courts believe he felt deeply regretful for his allegiance to the terror organization. The other was a naturalized U.S. citizen from Lebanon who authorities believe had recently lost family members to Israeli missile strikes in his home country. See omnystudio.com/listener for privacy information.
Europol dismantles the SocksEscort proxy service. Cyber operations highlight imbalance in the war in Iran. Google rushes Chrome zero-day patches. Veeam fixes critical backup flaws. A former incident responder faces ransomware charges. Thomson Reuters staff push back on an ICE contract. Attackers abuse backup tools for data theft. CISA flags a critical n8n vulnerability. Maria Varmazis is joined by Jack R. Bialik, engineer and author, to discuss the hidden risks of a fully-digital society, and talk about his book "In Lost in Time: Our Forgotten and Vanishing Knowledge." A Phony photo fuels a phantom flight fiasco. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest N2K CyberWire's Maria Varmazis is joined by Jack R. Bialik, engineer and author, to discuss the hidden risks of a fully-digital society, and talk about his book "In Lost in Time: Our Forgotten and Vanishing Knowledge." Selected Reading Europol and international partners disrupt ‘SocksEscort' proxy service - Joint operation targeted malicious proxy service exploiting residential routers worldwide (Europol) War in Iran – asymmetry in cyberspace (IISS) Google fixes two new Chrome zero-days exploited in attacks (Bleeping Computer) Veeam warns of critical flaws exposing backup servers to RCE attacks (Bleeping Computer) Former Employee of Cybersecurity Companies Charged in ALPHV (BlackCat) Ransomware Extortion Case (TechNadu) They Don't Want Their Company's Surveillance Tool Used by ICE (The New York Times) Data Exfiltration and Threat Actor Infrastructure Exposed (Huntress) CISA adds n8n RCE flaw to list of known exploited vulnerabilities (SC Media) Cyber National Mission Force to get new commander amid broader leadership turnover (The Record) AI Used to Promote Non-Existent Evacuation Flights From the Middle East (Bellingcat) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Get the stories from today's show in THE STACK: https://justinbarclay.comJoin Justin in the MAHA revolution - http://HealthWithJustin.comProTech Heating and Cooling - http://ProTechGR.com New gear is here! Check out the latest in the Justin Store: https://justinbarclay.com/storeKirk Elliott PHD - FREE consultation on wealth conservation - http://GoldWithJustin.comTry Cue Streaming for just $2 / day and help support the good guys https://justinbarclay.com/cueUp to 80% OFF! Use promo code JUSTIN http://MyPillow.com/JustinPatriots are making the Switch! What if we could start voting with our dollars too? http://SwitchWithJustin.com
We are getting more details about who the suspects were and why they attacked a Michigan synagogue and a Virginia university campus. One was a convicted ISIS sympathizer, recently released from prison who tried to make the courts believe he felt deeply regretful for his allegiance to the terror organization. The other was a naturalized U.S. citizen from Lebanon who authorities believe had recently lost family members to Israeli missile strikes in his home country. See omnystudio.com/listener for privacy information.
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.”See omnystudio.com/listener for privacy information.
It’s been a chaotic and frightening day in both Michigan and Virginia. First, just outside of Detroit, a vehicle driven by a man armed with a rifle rammed a synagogue. Security fired shots and the vehicle burst into flames inside the synagogue. The would-be shooter was killed, but there are concerns about incendiary devices that may still be inside the vehicle. In Virginia, one victim is dead, two others injured after a gunman opened fire on Old Dominion University’s campus just before 11am. The gunman is dead, but investigators are now trying to determine what happened and why, as classes have been cancelled for the rest of the week.See omnystudio.com/listener for privacy information.
It’s been a chaotic and frightening day in both Michigan and Virginia. First, just outside of Detroit, a vehicle driven by a man armed with a rifle rammed a synagogue. Security fired shots and the vehicle burst into flames inside the synagogue. The would-be shooter was killed, but there are concerns about incendiary devices that may still be inside the vehicle. In Virginia, one victim is dead, two others injured after a gunman opened fire on Old Dominion University’s campus just before 11am. The gunman is dead, but investigators are now trying to determine what happened and why, as classes have been cancelled for the rest of the week.See omnystudio.com/listener for privacy information.
But we also have confirmation on PC gems coming to Xbox and a more immersive Google Maps experience.Starring Tom Merritt and Huyen Tue Dao.Show notes can be found here. Hosted on Acast. See acast.com/privacy for more information.
It’s been a chaotic and frightening day in both Michigan and Virginia. First, just outside of Detroit, a vehicle driven by a man armed with a rifle rammed a synagogue. Security fired shots and the vehicle burst into flames inside the synagogue. The would-be shooter was killed, but there are concerns about incendiary devices that may still be inside the vehicle. In Virginia, one victim is dead, two others injured after a gunman opened fire on Old Dominion University’s campus just before 11am. The gunman is dead, but investigators are now trying to determine what happened and why, as classes have been cancelled for the rest of the week.See omnystudio.com/listener for privacy information.
It’s been a chaotic and frightening day in both Michigan and Virginia. First, just outside of Detroit, a vehicle driven by a man armed with a rifle rammed a synagogue. Security fired shots and the vehicle burst into flames inside the synagogue. The would-be shooter was killed, but there are concerns about incendiary devices that may still be inside the vehicle. In Virginia, one victim is dead, two others injured after a gunman opened fire on Old Dominion University’s campus just before 11am. The gunman is dead, but investigators are now trying to determine what happened and why, as classes have been cancelled for the rest of the week.See omnystudio.com/listener for privacy information.
Send a textHow do we protect ourselves in a digital world where attackers face almost no real consequences?In this episode of Joey Pinz Discipline Conversations, Joey Pinz sits down with cybersecurity founder and inventor Mike Siers for a thought-provoking conversation that challenges everything we assume about online security, identity, and trust.Mike's journey begins in the Florida National Guard and a deployment to Afghanistan, where life-altering experiences shaped how he sees service, responsibility, and problem-solving. That same mindset later led him into healthcare innovation—and eventually into cybersecurity—after realizing that the internet lacks one critical element found in the physical world: real risk for bad actors.Inspired by military strategy and an MIT thesis on cyber power projection, Mike explains a radical idea: what if unauthorized access attempts cost money? Instead of defenders absorbing endless attacks, attackers would inherit the risk before they even try.This conversation explores how empathy fuels innovation, why most cybersecurity models are reactive by design, and how shifting incentives could dramatically change online behavior. It's a powerful look at leadership, responsibility, and building solutions not just for today—but for the next generation. ⭐ Top 3 Highlights
AI has created a dilemma for security teams. Attackers are using AI to develop exploits to newly disclosed vulnerabilities faster than security teams can patch them. Security teams have not fully leveraged the capabilities of AI to autonomously prevent these attacks. Without a radical change in approach, organizations will be exposed to an exponentially increasing attack surface. How long can your organization tolerate being exploitable? Myke Lyons, CISO at Cribl, joins Business Security Weekly to discuss why organizations need to embrace AI to understand the behavior of attacks to effectively prevent them. For decades, we've focused on the Indicators of Compromise (IoCs) and have played whack-a-mole to try and patch them. Instead, we should focus on the Tactics, Techniques, and Procedures (TTPs) and leverage LLMs to understand the behavior of the attack. Once we understand the behaviors, we can implement preventative controls to minimize exposure. And yes, AI can also help us automate patching, when we're ready to trust it. In the leadership and communications segment, Your Risk Tolerance Has Changed. Does Your Leadership Team Know That? , The New Leadership Structures that Unblock Innovation, How CISOs can build a resilient workforce, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-438
AI has created a dilemma for security teams. Attackers are using AI to develop exploits to newly disclosed vulnerabilities faster than security teams can patch them. Security teams have not fully leveraged the capabilities of AI to autonomously prevent these attacks. Without a radical change in approach, organizations will be exposed to an exponentially increasing attack surface. How long can your organization tolerate being exploitable? Myke Lyons, CISO at Cribl, joins Business Security Weekly to discuss why organizations need to embrace AI to understand the behavior of attacks to effectively prevent them. For decades, we've focused on the Indicators of Compromise (IoCs) and have played whack-a-mole to try and patch them. Instead, we should focus on the Tactics, Techniques, and Procedures (TTPs) and leverage LLMs to understand the behavior of the attack. Once we understand the behaviors, we can implement preventative controls to minimize exposure. And yes, AI can also help us automate patching, when we're ready to trust it. In the leadership and communications segment, Your Risk Tolerance Has Changed. Does Your Leadership Team Know That? , The New Leadership Structures that Unblock Innovation, How CISOs can build a resilient workforce, and more! Show Notes: https://securityweekly.com/bsw-438
AI has created a dilemma for security teams. Attackers are using AI to develop exploits to newly disclosed vulnerabilities faster than security teams can patch them. Security teams have not fully leveraged the capabilities of AI to autonomously prevent these attacks. Without a radical change in approach, organizations will be exposed to an exponentially increasing attack surface. How long can your organization tolerate being exploitable? Myke Lyons, CISO at Cribl, joins Business Security Weekly to discuss why organizations need to embrace AI to understand the behavior of attacks to effectively prevent them. For decades, we've focused on the Indicators of Compromise (IoCs) and have played whack-a-mole to try and patch them. Instead, we should focus on the Tactics, Techniques, and Procedures (TTPs) and leverage LLMs to understand the behavior of the attack. Once we understand the behaviors, we can implement preventative controls to minimize exposure. And yes, AI can also help us automate patching, when we're ready to trust it. In the leadership and communications segment, Your Risk Tolerance Has Changed. Does Your Leadership Team Know That? , The New Leadership Structures that Unblock Innovation, How CISOs can build a resilient workforce, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-438
Why do your friends and parents still get breach notification letters from companies they've never heard of?John Watters aka “The Cowboy” joins the show this week for a hard look at information security. In the early 2000s, he built iDefense from a bankruptcy buyout into one of the most influential threat intelligence companies in the world, pioneered responsible disclosure before the term even existed, and has watched the attack surface evolve from nation-state espionage into something that hits your credit card at a restaurant on a Tuesday.His answer to the breach question? The industry's been losing the clock. Attackers can move from target selection to exploitation in days. Defenders are still operating in weeks. And the gap isn't closing, not by a long shot. If anything, it's widening.This conversation goes from the living rooms of people who've stopped trusting cybersecurity to the boardrooms of Fortune 500 CISOs who still can't explain their third-party risk exposure in plain English. We talk time compression, threat intelligence architecture, the AI arms race that only one side seems to be taking seriously, and the uncomfortable truth about analysis paralysis in a field where the cost of inaction is terminal.John's closing advice to defenders: automate yourself out of a job before someone else does it for you.That one's worth the price of admission alone.Mentioned:This is How They Tell Me the World Ends, by Nicole PerlrothCISO Mike Melo's post on security theater
Why do so many leaders struggle with hard conversations?On this episode of Olympic Minds: Leadership Beyond Limits, Sherry Winn interviews Kim-Adelle Randall, CEO and Executive Coach at Authentic Achievements, author, and fractional CRO/COO, about the leadership mindset shift that transforms conflict into growth.Kim reveals how kindness, courage, and belief are the true tools of high-impact leadership.Difficult conversations fail when leaders defend instead of align.Lending belief to others reduces imposter syndrome.Grace is built through accountability — not guilt.If you want to build resilient teams and lead with significance, this conversation delivers practical wisdom you can use immediately.Tune now.#TALRadio #LeadershipGrowth #ExecutiveCoaching #ImposterSyndrome #WinningConversations #SherryWinn
Learn more about your ad choices. Visit megaphone.fm/adchoices
Learn more about your ad choices. Visit megaphone.fm/adchoices
(Presented by Thinkst Canary: Most Companies find out way too late that they've been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching 'em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.) Three Buddy Problem - Episode 88: We unpack the fallout from public documentation of the Coruna iOS exploit kit, the likely connection to the Peter Williams/Trenchant exploit sale to Russians, how it slipped from government hands into criminal use, and the widening use of zero-days by surveillance vendors and cybercriminals. Plus, fresh signs of cyber-warfare activity tied to Iran and Israel, the FBI's disclosure of a breach affecting internal surveillance systems, and the latest debate over AI, security tooling, and Anthropic's public stumbles. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.
Attackers are moving in 72 minutes. One CISO has already eliminated the entire SOC team. And the industry is spending a quarter of a trillion dollars while struggling to define what "resilience" even means. In this edition of Lens Four, Sean Martin looks at the cybersecurity landscape through three lenses — programs, innovation, and messaging — to connect the signals that matter.
Attackers are moving in 72 minutes. One CISO has already eliminated the entire SOC team. And the industry is spending a quarter of a trillion dollars while struggling to define what "resilience" even means. In this edition of Lens Four, Sean Martin looks at the cybersecurity landscape through three lenses — programs, innovation, and messaging — to connect the signals that matter.
Send a textIn this episode, Ball and Banter members recall their favourite players from the FA Barclays & Barclaycard era of the Premier League from 2004 - 2010! They cannot choose any players from the top 4 clubs of that era (Arsenal, Man Utd, Liverpool & Chelsea!) In true BnB style there will be a quiz to determine the order that the members get to go in. This week we recall our favourite attackers!Support the showBall And Banter Website:https://ballandbanter.buzzsprout.comBall And Banter Instagram Page:https://Instagram.com/ball_and_banterBall And Banter YouTube channel:https://youtube.com/channel/UC_d9jnnTdxAoReNZUkW8xDw
Quantum decryption gets theoretically easier OpenAI alters the deal with the Pentagon South Korea leaks crypto keys for all to see Get the show notes here: https://cisoseries.com/cybersecurity-news-quantum-decryption-openais-deal-south-korea-leaks-crypto-keys/ Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first security awareness platform built to stop AI-powered social engineering. Attackers don't need malware anymore; they need trust. Tip: set a simple passphrase for high-risk actions, like wire requests or "urgent" account recovery – especially within finance teams and families. If the caller can't answer it, pause and verify. Adaptive runs deepfake and vishing simulations so employees practice this before it's real. adaptivesecurity.com.
Cyberattacks that used to take months now take minutes. And your defenders still can't keep up.Rob T. Lee, Chief AI Officer of the SANS Institute, and David A. Bray, Chair of the Accelerator at the Stimson Center, explain why AI gives attackers a structural advantage. Attackers don't care if their AI breaks something. Your security team can't take that risk. That asymmetry changes everything.✅ You'll discover:✅ Why attackers will always remove the human in the loop faster than defenders can, and the risk calculus that creates✅ How "death by 1,000 cuts" works: $300 per person times 10,000 targets via SIM farms equals a single ransomware payout✅ The federated learning approach that lets organizations share threat intelligence without exposing their own data or vulnerabilities✅ Why hackers are exploiting AI hallucinations by writing real code libraries for packages that models reliably hallucinate✅ How to identify the right cybersecurity talent: hire for learning velocity and the "fiddling mindset," not static AI credentials✅ Why boards must stop treating cybersecurity as prevention and start rewarding rapid detection and response✅ The pre-compute vs. post-compute distinction for AI agent safety that most executives are missing entirely✅ When autonomous cyber defense will actually be viable (hint: think pilotless planes and robotic surgeons)⏱️ TIMESTAMPS0:00 AI has made "death by 1,000 cuts" attacks scalable0:39 Why the AI security lifecycle matters now2:27 Military history lessons for cyber defense strategy5:00 Federated learning: sharing threat intelligence without exposing data6:48 How incident response must evolve for AI-speed attacks8:05 The human-in-the-loop dilemma: defenders vs. attackers11:37 Distraction attacks: coordinated multi-target campaigns15:37 Autonomous agents as a new attack surface19:44 Hackers weaponizing AI hallucinations against developers22:23 Development velocity as the real "swarm" capability24:20 Perverse incentives: why stopping an attack still counts as failure27:09 Your personal attack surface grew from 3 devices to 5031:22 Protecting AI tool chains from becoming prime targets34:25 Hackathons as the future of cybersecurity hiring36:53 Patterns of life: instrumenting your enterprise for anomaly detection38:18 When will we trust AI defenders without human oversight?41:09 Pre-compute vs. post-compute: where AI agent safety rules must live46:45 AI trust, hallucinations, and prompt injection as information warfare51:42 Building security culture: leadership, not blame
This week's Security Squawk episode isn't about phishing. It's about structural weakness. Three separate incidents. Three different industries. One uncomfortable pattern: the systems organizations trust most are expanding risk quietly — and in some cases, architecturally. First, a lawsuit that should make every board member pay attention. Marquis Software Solutions, a fintech serving 74 U.S. banks, is suing SonicWall. The allegation centers on SonicWall's cloud backup system, where firewall configuration backups were allegedly accessible and contained credentials — including MFA scratch codes. Those backups were reportedly used to compromise Marquis, leading to a ransomware incident and downstream exposure. What began as a scoped 5% customer exposure was later reported as potentially impacting all customers. This is not a misconfigured endpoint. This is a control-plane failure. For CEOs, this reframes vendor risk. It's no longer a questionnaire exercise. It's a litigation vector. If a security provider's design exposes authentication artifacts, your internal diligence may not matter. The liability chain now includes vendors and MSPs in a very direct way. For IT Directors, the operational question is simple: what exactly is inside your firewall backups? Are reusable authentication artifacts stored? Who can access vendor-hosted exports? If attackers obtain your configuration backups, can they replay your defenses? For MSPs, the exposure is real. If you manage firewall exports or MFA deployments, you are part of the architecture. And potentially part of the courtroom. Then we shift to UFP Technologies, a medical device manufacturer. Intrusion detected. Billing and shipping label systems disrupted. Data stolen or destroyed. Insurance expected to offset financial impact. But this isn't primarily a data story. Attackers disrupted order-to-cash and fulfillment velocity. In healthcare supply chains, slowing billing and labeling can create immediate executive escalation without touching the factory floor. Modern ransomware groups increasingly target business process choke points — ERP, labeling, scheduling — because leverage doesn't require full encryption anymore. For CEOs, “no material impact expected” is accounting language. Customers measure impact in delayed shipments. For IT leaders, the question becomes operational: can billing, labeling, and fulfillment functions recover independently? Are those systems segmented? Tested? Immutable? For risk managers and insurers, this represents a shift in underwriting focus — from endpoints to process resilience. Finally, the University of Hawaiʻi Cancer Center ransomware incident. Roughly 87,000 study participants directly impacted. But historical datasets, including Social Security numbers collected from driver's license and voter registration data dating back to 1998, expanded potential exposure to nearly 1.2 million individuals. They engaged the threat actors. They received a decryptor. They received “assurances” that data was destroyed. That's not verification. That's negotiation. The uncomfortable truth: legacy identity data becomes modern ransom currency. Research environments often have weaker governance than clinical systems, yet they can contain decades of sensitive identifiers. For boards, the issue isn't just security posture. It's data retention discipline. What obsolete identity data are you still holding? Why? For how long? And who owns the risk? Across these stories, three themes emerge: Control-plane trust is fragile. Operational choke points are the new leverage strategy. Data retention is compounded liability. Cybersecurity is no longer just about stopping intrusion. It's about architectural accountability and governance maturity. If you value independent, executive-level analysis without vendor spin, support the show at: buymeacoffee.com/securitysquawk The real question is this: Are your greatest cyber risks coming from external attackers — or from design decisions you haven't revisited in years?
Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radios app.
Hosted on Acast. See acast.com/privacy for more information.
(Presented by Thinkst Canary: Most Companies find out way too late that they've been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching 'em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.) Three Buddy Problem - Episode 87: We wake up to news of U.S./Israel military action against Iran and the expected fallout, including Tehran's cyber capabilities and proxy risks. Plus: Anthropic's clash with the Pentagon over AI use in warfare, market shockwaves from AI-driven security tools, mass layoffs tied to automation, Trenchant exec sentencing and sanctions in the exploit trade, and fresh questions around Cisco's SD-WAN breach and supply-chain trust. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.
FREE Longevity Builder Web Class:https://longevitybuilderwebclass.netlify.app/Longevity Builder Book and Longevity Builder Health Labhttps://secretlongevityoffer.bolt.host/Theme: Why Cardiorespiratory Fitness (CRF) is the ultimate biological armor against the "Attackers" (Chronic Disease).Host: ShaneFeatured Guests: * John Ranello: 75-year-old fitness practitioner (VO2 Max: 48.5)Professor Ulrik Wisløff: Head of CERG, NTNU; Creator of PAI.Dr. Atefe Tari: Neuroscientist; Lead Researcher on the ExPlas study.The Narrative: Shane introduces the "rare physiology" of 75-year-old John Ranello.The Stats: John's VO2 Max is 48.5 mL/kg/min (Top 1% for his age). Shane's is 54.5 at nearly 60.The Premise: These aren't just "fitness numbers"—they are The Oxygen Shield™.The Core Thesis: High oxygen efficiency isn't about running marathons; it's about creating a system that is biologically "Hard to Kill."The Philosophy: 53 years in the industry. Why he refuses the "retirement" mindset.The Protocol: The 40-minute warm-up discipline and why sprinting is the fountain of youth.The Mindset: The body as a unified, high-performance system rather than a collection of parts.The Analogy: The body as a city; Oxygen as electricity. Low efficiency leads to "system brownouts."The "Attackers": How Heart Disease, Type 2 Diabetes, and Stroke cluster where the shield is thinnest.Biological Armor: Why increasing stroke volume and capillary density thickens the "walls" of your city, making it harder for disease to take hold.Expert Insight: Wisløff explains the HUNT Study data—showing that low cardiorespiratory fitness predicts mortality more accurately than smoking or blood pressure.The Mechanism: Moving from a "small engine" (high stress/low output) to a "large engine" (low stress/high output).Moving Beyond Steps: Why "10,000 steps" is a blunt tool.The 100 PAI Goal: The science of maintaining a rolling 7-day score of 100 to reduce mortality risk by 25-30%.The Longevity Builder Health Lab: Shane introduces the technology used to track the Oxygen Efficiency App and the AQ Engine App..
* Sponsor read Bart Merrick Team and market confusion * Longtime advertiser becomes platinum client * Advice on buying and selling during rate changes * Friday Free Show opening * BDM Appreciation Week announced * $5 shirt presale and signup info * April 11 members party details * Dad hat merch sale * Construction noise outside studio * Seth absent due to renovation stress * Discussion of stress tolerance and burnout * Stress without recovery worsens coping * Beard turning gray conversation * Biggest regret was starting renovation * Previous mansion sale repair disputes * Video tour of unfinished house * Smart fridge ovens and propane range * Expensive decorative upgrades * Range caused house fire incident * Gaudy luxury house jokes * Wood ceiling beams and playroom prep * Project far behind schedule * Screaming in car lost voice * Wrong appliance finish frustration * Bad contractor work and service issues * Smart oven wifi and Sabbath mode * Limestone tile sealed incorrectly * Entire floor covered in hardened spots * Contractors refused repair job * Chemical strip then mechanical polish * Repair cost about five thousand * Regret selling old house * Marriage strain and cramped rental life * Wife now works at Disney hotel * Increased workload at dojo * Castleberry neighborhood comparison * Broken ride on car giveaway * Boat dock lift completed * Boat stuck in driveway tire issues * Childcare juggling during move * Sleep Number bed delivery trouble * Plumbing and wiring disputes * Move in maybe one to two weeks * Six figures over budget * Savings emotionally drained * Pool dig discovered large root * Extra charges expected * Spiral staircase delivery problems * Karate of Orlando business plug * Dojo pricing confusion email * Premium materials admiration * Tease armed speedboat near Cuba * Cuban Coast Guard shootout story * No child on the boat * Armed men attacked patrol boat * Cuba labeled infiltration * Attackers killed after gunfire exchange * Amateur invasion disbelief * Miami exile groups discussed * Childhood neighbors ran drills * Teen transporting guns to Everglades * Shooting watermelons no ear protection * Guns and Melons joke * Parent loss reflection * Growing up minority in Miami * Kids had access to guns and alcohol * Debate nature vs parenting influence * Listener sent Bentons country ham * Country ham traditions and funerals * Quick fry biscuits serving method * Anniversary restaurant indecision * Tease feeding alcohol to hawk * Man gave BuzzBall to hawk arrested * Alcohol toxic to birds * Old beer drinking camel story * Animals seeking intoxicants discussion * Mid level cruelty debate * Marijuana smoke harms birds * Dead pelican car prank * Amoeba infection fears * Pee hole fish myth debunked * Amazon travel fears comparison * Upcoming show plugs and events ### Social Media [https://tomanddan.com](https://tomanddan.com) [https://twitter.com/tomanddanlive](https://twitter.com/tomanddanlive) [https://facebook.com/amediocretime](https://facebook.com/amediocretime) [https://instagram.com/tomanddanlive](https://instagram.com/tomanddanlive) Tom & Dan on Real Radio 104.1 Apple Podcasts: [https://podcasts.apple.com/us/podcast/a-corporate-time/id975258990](https://podcasts.apple.com/us/podcast/a-corporate-time/id975258990) Google Podcasts: [https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fjb3Jwb3JhdGV0aW1lL3BvZGNhc3QueG1s](https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fjb3Jwb3JhdGV0aW1lL3BvZGNhc3QueG1s) TuneIn: [https://tunein.com/podcasts/Comedy/A-Corporate-Time-p1038501/](https://tunein.com/podcasts/Comedy/A-Corporate-Time-p1038501/) Exclusive Content [https://tomanddan.com/registration](https://tomanddan.com/registration)
On the latest episode of Media Matters, David Lynch joins Dave Davis for all the latest on Liverpool's transfer activity, including the Reds' desire for much-needed fresh wingers and attacking threat with pace and much more! Learn more about your ad choices. Visit podcastchoices.com/adchoices
Threat actors break out in under 30 minutes Claude allegedly hit with distillation attacks DeFi platform shutting down after crypto theft Get links to all of today's news in our show notes here: https://cisoseries.com/cybersecurity-news-hacked-in-30-minutes-claude-distillation-defi-shutdown-after-attack/ Thanks to today's episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first security awareness platform built to stop AI-powered social engineering. Attackers don't need malware anymore; they need trust. Tip: set a simple passphrase for high-risk actions, like wire requests or "urgent" account recovery – especially within finance teams and families. If the caller can't answer it, pause and verify. Adaptive runs deepfake and vishing simulations so employees practice this before it's real. adaptivesecurity.com.
SolarWinds patches four critical remote code execution vulnerabilities. A ransomware attack on Conduant puts the data of over 25 million Americans at risk. RoguePilot enables Github repository takeovers. ZeroDayRat targets Android and iOS devices. North Korea's Lazarus group deploy Medusa ransomware against organizations in the U.S. and the Middle East. Attackers' breakout times drop to under half an hour. CISA maintains its mission despite staffing challenges. Russian satellites draw fresh scrutiny. Two South Korean teenagers are charged with breaching Seoul's public bike service. Krishna Sai, CTO at SolarWinds, discusses why leaders should focus less on speculating about an AI bubble, and more on how to quantify AI's tangible contributions. The Pope pushes prayerful priests past predictable programs. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Krishna Sai, CTO at SolarWinds, discussing why leaders should focus less on speculating about an AI bubble, and more on how to quantify AI's tangible contributions. Selected Reading Critical SolarWinds Serv-U flaws offer root access to servers (Bleeping Computer) Massive Conduent Data Breach Exfiltrates 8 TB Affects Over 25 Million Americans (GB Hackers) GitHub Issues Abused in Copilot Attack Leading to Repository Takeover (SecurityWeek) New ZeroDayRAT Malware Claims Full Monitoring of Android and iOS Devices (Hackread) North Korean state hackers seen using Medusa ransomware in attacks on US, Middle East (The Record) CrowdStrike says attackers are moving through networks in under 30 minutes (CyberScoop) Shutdown at D.H.S. Extends to Cyber Agency, Adding to Setbacks (The New York Times) From Cold War interceptors to Ukraine: how Russia came to park spy satellites next to the West's most sensitive tech in orbit (Meduza) Korean cops charge two teens over Seoul bike hire breach (The Register) Pope tells priests to use their brains, not AI, to write homilies (EWTN News) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Cybercrime's escalation has reached a projected $12.2 trillion annual impact by 2031, with a notable surge in remote monitoring and management (RMM) tool abuse—up 277% year-over-year, according to Huntress and supporting vendor reports. Attackers utilize legitimate IT tools to facilitate stealthier ransomware and phishing campaigns, amplifying structural vulnerabilities within MSP technology stacks. Key metrics from Acronis, WatchGuard, and Vectra AI indicate a shift to smaller, more evasive malware campaigns, longer times to ransomware deployment (averaging 20 hours), and widespread unaddressed security alerts, raising questions about the adequacy of current defenses and incident response practices. Vendor-supplied threat intelligence further shows that MSPs' reliance on signature-based platforms and insufficient visibility leaves them exposed to evolving attack techniques. Data reviewed suggests phishing footholds can quickly compromise cross-client environments, and legal ramifications heavily fall on the service provider when RMM or monitoring tools act as entry points. Notably, only about 58-60% of organizations report full visibility across their systems, with a majority of alerts remaining unaddressed, underscoring gaps in operational maturity and preparedness. Adjacent coverage highlighted Microsoft Copilot's repeated security control failures within regulated environments, specifically its inability to enforce sensitivity labels and boundaries across emails—most recently affecting the UK's National Health Service. The lack of vendor-announced architectural changes calls into question the viability of deploying AI tools in compliance-driven contexts. Separately, political and public backlash against surveillance technologies (such as Flock cameras) demonstrates that unchecked data collection is no longer a manageable passive risk, as data becomes increasingly actionable and retains liability beyond technical considerations. The practical takeaway for MSPs and IT leaders is a need to prioritize audit, documentation, and enforcement of controls within their technology stacks, especially where vendor tools or AI-driven automation intersect with compliance and client trust. Preserving operational optionality and scrutinizing vendor terms—particularly data sharing and architectural enforcement—are essential to reduce exposure. Waiting for vendor patches, disregarding documented control failures, or underestimating public scrutiny elevate liability across legal, reputational, and client relationship domains. Four things to know today: 00:00 Vendor Threat Reports Converge on One Risk MSPs Can't Outsource: The RMM as Breach Vector 05:11 Copilot Failed Compliance Controls Twice in Eight Months — A Patch Won't Fix That 07:03 Flock Backlash Exposes the Liability Hidden in Every Vendor Data-Sharing Contract 09:42 GTDC Summit: Distributors Pitch AI On-Ramp as Hyperscalers Compress Their Margin Sponsored by:
Hospital Shutdown, Ransomware Surge, Fortinet Failures A hospital doesn't cancel chemotherapy appointments because of a “technical issue.” They cancel them because they've lost operational control. This week, the University of Mississippi Medical Center shut down its entire network after a ransomware attack disrupted systems — including Epic. Clinics closed. Elective procedures paused. Outpatient services halted. Emergency operations activated. Leadership described the shutdown as precautionary. But here's the real question executives should be asking: Why was a full network shutdown necessary? If segmentation is validated… If identity governance is enforced… If lateral movement detection is operationalized… Why does the only safe option become “turn it all off”? In this episode of Security Squawk, we break down what this incident signals about containment confidence, governance maturity, and operational resilience — not just in healthcare, but across every industry that depends on uptime. And we zoom out. Because UMMC isn't happening in isolation. According to TechRadar, ransomware groups have reached an all-time high in 2025. The victim growth rate has doubled. Qilin and other affiliate-driven operators are scaling aggressively. This isn't random chaos. It's industrialization. More fragmentation. More specialization. More execution discipline on the criminal side. Healthcare, public sector, and critical infrastructure are being economically targeted because downtime equals leverage. When systems go dark, negotiation pressure spikes. Then we connect it to something many leaders are still underestimating: Fortinet exploitation patterns. Edge vulnerabilities. VPN credential harvesting. Reinfection cycles months after patches were released. The vulnerability itself isn't the story. The response maturity is. Attackers are repeatedly probing whether organizations: – Patch fast enough – Rotate exposed credentials – Reset trust boundaries after compromise – Validate segmentation integrity – Rebuild identity confidence When those governance steps are skipped, attackers come back. That's not a tooling failure. That's a leadership failure. This episode translates three headlines into one hard truth: Ransomware is no longer just a malware problem. It's a containment confidence problem. For CEOs: If you cannot isolate an intrusion without shutting down revenue operations, your resilience model is fragile. For IT Directors: Active Directory recovery is not a restore-from-backup event. It's a trust re-establishment event. For MSPs: Client environments are operating in a denser criminal ecosystem. Tool stacking without maturity validation will not scale. For Risk Leaders: Financial exposure is no longer limited to ransom. Revenue interruption, regulatory scrutiny, and reputational damage compound quickly — especially in healthcare. We also discuss: • Why attacker communication often signals a second phase • Why affiliate ransomware models are accelerating • Why segmentation validation will become a board-level metric • Why detection speed does not equal governance strength Security Squawk exists to translate cybersecurity chaos into business reality — without vendor spin and without hype. If you value that kind of analysis and want to support independent, executive-focused cybersecurity conversations, you can back the show at: buymeacoffee.com/securitysquawk Your support helps us keep this live, timely, and unfiltered. Because criminals are already running maturity audits. And they invoice in operational shutdown. The question is simple: If it happened to you tomorrow, could you contain it — or would you turn the lights off?
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.A financially motivated threat actor known as GS7 is conducting a large-scale phishing campaign called Operation DoppelBrand, targeting Fortune 500 companies by impersonating their corporate login portals.Kaspersky researchers have analyzed a newly identified Android malware strain named Keenadu that provides attackers with remote control over infected devices.Application Programming Interfaces continue to be a primary attack surface, and new research from Wallarm shows the problem is accelerating as AI adoption expands.Hacker News outlines cybersecurity technology priorities for 2026, framing the environment as one of continuous instability rather than periodic disruption.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform.This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.
Your email gateway isn't enough anymore, attackers are already inside the workspace through OAuth apps, browser extensions, and account takeover. In this episode, Ron sits down with Rajan Kapoor, VP of Security at Material Security, to break down the real risks hiding inside Google Workspace and Microsoft 365. They cover how phishing has evolved into full-blown business email compromise, why malicious OAuth apps are the new favorite attack vector, and what security teams, especially lean ones, can do right now to lock down their cloud workspace. Rajan also drops practical advice on passkeys, document sharing hygiene, and why data lifecycle management is a problem no one is solving well enough. Impactful Moments 00:00 – Introduction 03:30 – The current state of phishing 05:30 – Outbound email compromise risk 09:30 – OAuth apps as attack vectors 15:00 – AI agents accessing your workspace 16:00 – Prompt injection is the new SQL injection 18:00 – Allow listing apps immediately 24:30 – Google Workspace vs Microsoft 365 security 27:30 – Custom detections require API expertise 28:00 – Why passkeys matter right now 32:00 – Data lifecycle management for shared docs Links Connect with our guest, Rajan Kapoor, on LinkedIn: https://www.linkedin.com/in/rajankkapoor/ Learn more about Material Security: https://material.security ___ Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/ Check out our upcoming events: https://www.hackervalley.com/livestreams Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Last time we spoke about The Battle of Suixian–Zaoyang-Shatow. Following the brutal 1938 capture of Wuhan, Japanese forces aimed to solidify their hold by launching an offensive against Chinese troops in the 5th War Zone, a rugged natural fortress in northern Hubei and southern Henan. Under General Yasuji Okamura, the 11th Army deployed three divisions and cavalry in a pincer assault starting May 1, 1939, targeting Suixian and Zaoyang to crush Nationalist resistance and secure flanks. Chinese commander Li Zongren, leveraging terrain like the Dabie and Tongbai Mountains, orchestrated defenses with over 200,000 troops, including Tang Enbo's 31st Army Group. By May 23, they recaptured Suixian and Zaoyang, forcing a Japanese withdrawal with heavy losses, over 13,000 Japanese casualties versus 25,000 Chinese, restoring pre-battle lines. Shifting south, Japan targeted Shantou in Guangdong to sever supply lines from Hong Kong. In a massive June 21 amphibious assault, the 21st Army overwhelmed thin Chinese defenses, capturing the port and Chao'an despite guerrilla resistance led by Zhang Fakui. Though losses mounted, Japan tightened its blockade, straining China's war effort amid ongoing attrition. #188 From Changkufeng to Nomonhan Welcome to the Fall and Rise of China Podcast, I am your dutiful host Craig Watson. But, before we start I want to also remind you this podcast is only made possible through the efforts of Kings and Generals over at Youtube. Perhaps you want to learn more about the history of Asia? Kings and Generals have an assortment of episodes on history of asia and much more so go give them a look over on Youtube. So please subscribe to Kings and Generals over at Youtube and to continue helping us produce this content please check out www.patreon.com/kingsandgenerals. If you are still hungry for some more history related content, over on my channel, the Pacific War Channel where I cover the history of China and Japan from the 19th century until the end of the Pacific War. Well hello again, and yes you all have probably guessed we are taking another detour. Do not worry I hope to shorten this one a bit more so than what became a sort of mini series on the battle of Changkufeng or Battle of Lake Khasan. What we are about to jump into is known in the west as the battle of khalkin Gol, by the Japanese the Nomohan incident. But first I need to sort of set the table up so to say. So back on August 10th, 1938 the Litvinov-Shigemitsu agreement established a joint border commission tasked with redemarcating the disputed boundary between the Soviet Union and Japanese-controlled Manchukuo. However, this commission never achieved a mutually agreeable definition of the border in the contested area. In reality, the outcome was decided well before the group's inaugural meeting. Mere hours after the cease-fire took effect on the afternoon of August 11, General Grigory Shtern convened with a regimental commander from Japan's 19th Division to coordinate the disengagement of forces. With the conflict deemed "honorably" concluded, Japan's Imperial General Headquarters mandated the swift withdrawal of all Japanese troops to the west bank of the Tumen River. By the night of August 13, as the final Japanese soldier crossed the river, it effectively became the de facto border. Soviet forces promptly reoccupied Changkufeng Hill and the adjacent heights—a move that would carry unexpected and profound repercussions. Authoritative Japanese military analyses suggest that if negotiations in Moscow had dragged on for just one more day, the 19th Division would likely have been dislodged from Changkufeng and its surrounding elevations. Undoubtedly, General Shtern's infantry breathed a sigh of relief as the bloodshed ceased. Yet, one can't help but question why Moscow opted for a cease-fire at a juncture when Soviet troops were on the cusp of total battlefield triumph. Perhaps Kremlin leaders deemed it wiser to settle for a substantial gain, roughly three-quarters of their objectives, rather than risk everything. After all, Japan had mobilized threatening forces in eastern Manchuria, and the Imperial Army had a history of impulsive, unpredictable aggression. Moreover, amid the escalating crisis over Czechoslovakia, Moscow may have been wary of provoking a broader Asian conflict. Another theory posits that Soviet high command was misinformed about the ground situation. Reports of capturing a small segment of Changkufeng's crest might have been misinterpreted as control over the entire ridge, or an imminent full takeover before midnight on August 10. The unexpected phone call from Foreign Minister Maxim Litvinov to the Japanese embassy that night—proposing a one-kilometer Japanese retreat in exchange for a cease-fire along existing lines—hints at communication breakdowns between Shtern's headquarters and the Kremlin. Ironically, such lapses may have preserved Japanese military honor, allowing the 19th Division's evacuation through diplomacy rather than defeat. Both sides endured severe losses. Initial Japanese press reports claimed 158 killed and 740 wounded. However, the 19th Division's medical logs reveal a grimmer toll: 526 dead and 914 injured, totaling 1,440 casualties. The true figure may have climbed higher, possibly to 1,500–2,000. Following the armistice, the Soviet news agency TASS reported 236 Red Army fatalities and 611 wounded. Given Shtern's uphill assaults across open terrain against entrenched positions, these numbers seem understated. Attackers in such scenarios typically suffered two to three times the defenders' losses, suggesting Soviet casualties ranged from 3,000 to 5,000. This aligns with a Soviet Military Council investigation on August 31, 1938, which documented 408 killed and 2,807 wounded. Japanese estimates placed Soviet losses even higher, at 4,500–7,000. Not all victims perished in combat. Marshal Vasily Blyukher, a decorated Soviet commander, former warlord of the Far East, and Central Committee candidate, was summoned to Moscow in August 1938. Relieved of duty in September and arrested with his family in October, he faced charges of inadequate preparation against Japanese aggression and harboring "enemies of the people" within his ranks. On November 9, 1938, Blyukher died during interrogation a euphemism for torture-induced death.Other innocents suffered as well. In the wake of the fighting, Soviet authorities deported hundreds of thousands of Korean rice farmers from the Ussuri region to Kazakhstan, aiming to eradicate Korean settlements that Japanese spies had allegedly exploited. The Changkufeng clash indirectly hampered Japan's Wuhan offensive, a massive push to subdue China. The influx of troops and supplies for this campaign was briefly disrupted by the border flare-up. Notably, Kwantung Army's 2nd Air Group, slated for Wuhan, was retained due to the Soviet threat. Chiang Kai-shek's drastic measure, breaching the Yellow River dikes to flood Japanese advance routes—further delayed the assault. By October 25, 1938, when Japanese forces captured Hankow, Chiang had relocated his capital to distant Chungking. Paradoxically, Wuhan's fall cut rail links from Canton inland, heightening Chiang's reliance on Soviet aid routed overland and by air from Central Asia. Japan secured a tactical win but missed the decisive blow; Chinese resistance persisted, pinning down a million Japanese troops in occupation duties. What was the true significance of Changkufeng? For General Koiso Suetaka and the 19th Division, it evoked a mix of bitterness and pride. Those eager for combat got their share, though not on their terms. To veterans mourning fallen comrades on those desolate slopes, it might have felt like senseless tragedy. Yet, they fought valiantly under dire conditions, holding firm until a retreat that blended humiliation with imperial praise, a bittersweet inheritance. For the Red Army, it marked a crucial trial of resolve amid Stalin's purges. While Shtern's forces didn't shine brilliantly, they acquitted themselves well in adversity. The U.S. military attaché in Moscow observed that any purge-related inefficiencies had been surmounted, praising the Red Army's valor, reliability, and equipment. His counterpart in China, Colonel Joseph Stilwell, put it bluntly: the Soviets "appeared to advantage," urging skeptics to rethink notions of a weakened Red Army. Yet, by World War II's eve, many British, French, German, and Japanese leaders still dismissed it as a "paper tiger." Soviet leaders appeared content, promoting Shtern to command the Transbaikal Military District and colonel general by 1940, while honoring "Heroes of Lake Khasan" with medals. In a fiery November 7, 1938, speech, Marshal Kliment Voroshilov warned that future incursions would prompt strikes deep into enemy territory. Tokyo's views diverged sharply. Many in the military and government saw it as a stain on Imperial Army prestige, especially Kwantung Army, humiliated on Manchukuo soil it swore to protect. Colonel Masanobu Tsuji Inada, however, framed it as a successful reconnaissance, confirming Soviet border defense without broader aggression, allowing the Wuhan push to proceed safely. Critics, including Major General Gun Hashimoto and historians, questioned this. They argued IGHQ lacked contingency plans for a massive Soviet response, especially with Wuhan preparations underway since June. One expert warned Japan had "played with fire," risking Manchuria and Korea if escalation occurred. Yet, Japanese commanders gleaned few lessons, downplaying Soviet materiel superiority and maintaining disdain for Red Army prowess. The 19th Division's stand against outnumbered odds reinforced this hubris, as did tolerance for local insubordination—attitudes that would prove costly. The Kremlin, conversely, learned Japan remained unpredictable despite its China quagmire. But for Emperor Hirohito's intervention, the conflict might have ballooned. Amid purges and the Czech crisis, Stalin likely viewed it as a reminder of eastern vulnerabilities, especially with Munich advancing German threats westward. Both sides toyed with peril. Moderation won in Tokyo, but Kwantung Army seethed. On August 11, Premier Fumimaro Konoye noted the need for caution. Kwantung, however, pushed for and secured control of the disputed salient from Chosen Army by October 8, 1938. Even winter's chill couldn't quench their vengeful fire, setting the stage for future confrontations. A quick look at the regional map reveals how Manchukuo and the Mongolian People's Republic each jut into the other's territory like protruding salients. These bulges could be seen as aggressive thrusts into enemy land, yet they also risked encirclement and absorption by the opposing empire. A northward push from western Manchuria through Mongolia could sever the MPR and Soviet Far East from the USSR's heartland. Conversely, a pincer movement from Mongolia and the Soviet Maritime Province might envelop and isolate Manchukuo. This dynamic highlights the frontier's strategic volatility in the 1930s. One particularly tense sector was the broad Mongolian salient extending about 150 miles eastward into west-central Manchukuo. There, in mid-1939, Soviet-Japanese tensions erupted into major combat. Known to the Japanese as the Nomonhan Incident and to the Soviets and Mongolians as the Battle of Khalkhin Gol, this clash dwarfed the earlier Changkufeng affair in scale, duration, and impact. Spanning four months and claiming 30,000 to 50,000 casualties, it amounted to a small undeclared war, the modern era's first limited conflict between great powers. The Mongolian salient features vast, semiarid plains of sandy grassland, gently rolling terrain dotted with sparse scrub pines and low shrubs. The climate is unforgivingly continental: May brings hot days and freezing nights, while July and August see daytime highs exceeding 38°C (100°F in American units), with cool evenings. Swarms of mosquitoes and massive horseflies necessitate netting in summer. Rainfall is scarce, but dense morning fogs are common in August. Come September, temperatures plummet, with heavy snows by October and midwinter lows dipping to –34°C. This blend of North African aridity and North Dakotan winters supports only sparse populations, mainly two related but distinct Mongol tribes. The Buriat (or Barga) Mongols migrated into the Nomonhan area from the northwest in the late 17th to early 18th centuries, likely fleeing Russian expansion after the 1689 Treaty of Nerchinsk. Organized by Manchu emperors between 1732 and 1735, they settled east of the river they called Khalkhin Gol (Mongolian for "river"), in lands that would later become Manchukuo. The Khalkha Mongols, named for the word meaning "barrier" or "shield," traditionally guarded the Mongol Empire's northern frontiers. Their territories lay west of the Buriats, in what would become the MPR. For centuries, these tribes herded livestock across sands, river crossings, and desert paths, largely oblivious to any formal borders. For hundreds of years, the line dividing the Mongolian salient from western Manchuria was a hazy administrative divide within the Qing Empire. In the 20th century, Russia's detachment of Outer Mongolia and Japan's seizure of Manchuria transformed this vague boundary into a frontline between rival powers. The Nomonhan Incident ignited over this contested border. Near the salient's northeastern edge, the river, called Khalkhin Gol by Mongols and Soviets, and Halha by Manchurians and Japanese, flows northwest into Lake Buir Nor. The core dispute: Was the river, as Japan asserted, the historic boundary between Manchukuo and the MPR? Soviet and MPR officials insisted the line ran parallel to and 10–12 miles east of the river, claiming the intervening strip. Japan cited no fewer than 18 maps, from Chinese and Japanese sources, to support the river as the border, a logical choice in such barren terrain, where it served as the sole natural divider. Yet, Soviets and Mongolians countered with evidence like a 1919 Chinese postal atlas and maps from Japanese and Manchukuoan agencies (1919–1934). Unbeknownst to combatants, in July 1939, China's military attaché in Moscow shared a 1934 General Staff map with his American counterpart, showing the border east of the river. Postwar Japanese studies of 18th-century Chinese records confirm that in 1734, the Qing emperor set a boundary between Buriat and Khalkha Mongols east of the river, passing through the hamlet of Nomonhan—as the Soviets claimed. However, Kwantung Army Headquarters dismissed this as non-binding, viewing it as an internal Qing affair without Russian involvement. Two former Kwantung Army officers offer a pragmatic explanation: From 1931 to 1935, when Soviet forces in the Far East were weak, Japanese and Manchukuoan authorities imposed the river as the de facto border, with MPR acquiescence. By the mid- to late 1930s, as Soviet strength grew, Japan refused to yield, while Mongolians and Soviets rejected the river line, sparking clashes. In 1935, Kwantung Army revised its maps to align with the river claim. From late that year, the Lake Buir Nor–Halha sector saw frequent skirmishes between Manchukuoan and MPR patrols. Until mid-1938, frontier defense in northwestern Manchukuo fell to the 8th Border Garrison Unit , based near Hailar. This 7,000-man force, spread thin, lacked mobility, training, and, in Kwantung Army's eyes, combat readiness. That summer, the newly formed 23rd Division, under Kwantung Army, took station at Hailar, absorbing the 8th BGU under its command, led by Lieutenant General Michitaro Komatsubara. At 52, Komatsubara was a premier Russian specialist in the Imperial Army, with stints as military attaché in the USSR and head of Kwantung's Special Services Agency in Harbin. Standing 5'7" with a sturdy build, glasses, and a small mustache, he was detail-oriented, keeping meticulous diaries, writing lengthy letters, and composing poetry, though he lacked combat experience. Before departing Tokyo in July 1938, Komatsubara received briefings from Colonel Masazumi Inada, AGS Operations Section chief. Amid planning for Changkufeng, Inada urged calm on the Manchukuo-MPR border given China's ongoing campaigns. Guidelines: Ignore minor incidents, prioritize intelligence on Soviet forces east of Lake Baikal, and study operations against the Soviet Far East's western sector. Familiar with the region from his Harbin days, Komatsubara adopted a low-key approach. Neither impulsive nor aggressive, he kept the green 23rd Division near Hailar, delegating patrols to the 8th BGU. An autumn incident underscores his restraint. On November 1, 1938, an 8th BGU patrol was ambushed by MPR forces. Per Japanese accounts, the three-man team, led by a lieutenant, strayed too close to the border and was attacked 50 meters inside Manchukuo. The lieutenant escaped, but his men died. Komatsubara sent an infantry company to secure the site but forbade retaliation. He pursued body recovery diplomatically, protested to MPR and Soviet officials, and disciplined his officers: garrison leaders got five days' confinement for poor troop training, the lieutenant thirty days. Despite this caution, pressures at AGS and KwAHQ were mounting, poised to thrust the 23rd Division into fierce battle. Modern militaries routinely develop contingency plans against potential adversaries, and the mere existence of such strategies doesn't inherently signal aggressive intentions. That said, shifts in Japan's operational planning vis-à-vis the Soviet Union may have inadvertently fueled the Nomonhan Incident. From 1934 to 1938, Japanese war scenarios emphasized a massive surprise assault in the Ussuri River region, paired with defensive holding actions in northwestern Manchuria. However, between mid-1938 and early 1939, a clandestine joint task force from the Army General Staff and Kwantung Army's Operations Departments crafted a bold new blueprint. This revised strategy proposed containing Soviet forces in the east and north while unleashing a full-scale offensive from Hailar, advancing west-northwest toward Chita and ultimately Lake Baikal. The goal: sever the Transbaikal Soviet Far East from the USSR's core. Dubbed Plan Eight-B, it gained Kwantung Army's endorsement in March 1939. Key architects—Colonels Takushiro Hattori and Masao Terada, along with Major Takeharu Shimanuki—were reassigned from AGS to Kwantung Army Headquarters to oversee implementation. The plan anticipated a five-year buildup before execution, with Hattori assuming the role of chief operations staff officer. A map review exposes a glaring vulnerability in Plan Eight-B: the Japanese advance would leave its southern flank exposed to Soviet counterstrikes from the Mongolian salient. By spring 1939, KwAHQ likely began perceiving this protrusion as a strategic liability. Notably, at the outbreak of Nomonhan hostilities, no detailed operational contingencies for the area had been formalized. Concurrently, Japan initiated plans for a vital railroad linking Harlun Arshan to Hailar. While its direct tie to Plan Eight-B remains unclear, the route skirted perilously close to the Halha River, potentially heightening KwAHQ's focus on the disputed Mongolian salient. In early 1939, the 23rd Division intensified reconnaissance patrols near the river. Around this time, General Grigory Shtern, freshly appointed commander of Soviet Far Eastern forces, issued a public warning that Japan was gearing up for an assault on the Mongolian People's Republic. As Plan Eight-B took shape and railroad proposals advanced, KwAHQ issued a strikingly confrontational set of guidelines for frontier troops. These directives are often cited as a catalyst for the Nomonhan clash, forging a chain linking the 1937 Amur River incident, the 1938 Changkufeng debacle, and the 1939 conflict.Resentment had festered at KwAHQ over perceived AGS meddling during the Amur affair, which curtailed their command autonomy. This frustration intensified at Changkufeng, where General Kamezo Suetaka's 19th Division endured heavy losses, only for the contested Manchukuoan territory to be effectively ceded. Kwantung Army lobbied successfully to wrest oversight of the Changkufeng salient from Chosen Army. In November 1938, Major Masanobu Tsuji of KwAHQ's Operations Section was sent to survey the site. The audacious officer was dismayed: Soviet forces dominated the land from the disputed ridge to the Tumen River. Tsuji undertook several winter reconnaissance missions. His final outing in March 1939 involved leading 40 men to Changkufeng's base. With rifles slung non-threateningly, they ascended to within 200 yards of Soviet lines, formed a line, and urinated in unison, eliciting amused reactions from the enemy. They then picnicked with obentos and sake, sang army tunes, and left gifts of canned meat, chocolates, and whiskey. This theatrical stunt concealed Tsuji's real aim: covert photography proving Soviet fortifications encroached on Manchukuoan soil. Tsuji was a singular figure. Born of modest means, he embodied a modern samurai ethos, channeling a sharp intellect into a frail, often ailing body through feats of extraordinary daring. A creative tactician, he thrived in intelligence ops, political scheming, aerial scouting, planning, and frontline command—excelling across a tumultuous career. Yet, flaws marred his brilliance: narrow bigotry, virulent racism, and capacity for cruelty. Ever the ambitious outsider, Tsuji wielded outsized influence via gekokujo—Japan's tradition of subordinates steering policy from below. In 1939, he was a major, but his pivotal role at Nomonhan stemmed from this dynamic. Back in Hsinking after his Changkufeng escapade, Tsuji drafted a response plan: negotiate border "rectification" with the Soviets; if talks failed, launch an attack to expel intruders. Kwantung Army adopted it. Deputy Chief of Staff Major General Otozaburo Yano flew to Tokyo with Tsuji's photos, seeking AGS approval. There, he was rebuffed—Changkufeng was deemed settled, and minor violations should be overlooked amid Tokyo's aversion to Soviet conflict. Yano's plea that leniency would invite aggression was countered by notes on Europe's tensions restraining Moscow. Yano's return sparked outrage at KwAHQ, seen as AGS thwarting their imperial duty to safeguard Manchukuo. Fury peaked in the Operations Section, setting the stage for Tsuji's drafting of stringent new frontier guidelines: "Principles for the Settlement of Soviet-Manchukuoan Border Disputes." The core tenet: "If Soviet troops transgress the Manchukuoan frontiers, Kwantung Army will nip their ambitions in the bud by completely destroying them." Specific directives for local commanders included: "If the enemy crosses the frontiers … annihilate him without delay, employing strength carefully built up beforehand. To accomplish our mission, it is permissible to enter Soviet territory, or to trap or lure Soviet troops into Manchukuoan territory and allow them to remain there for some time… . Where boundary lines are not clearly defined, area defense commanders will, upon their own initiative, establish boundaries and indicate them to the forward elements… . In the event of an armed clash, fight until victory is won, regardless of relative strengths or of the location of the boundaries. If the enemy violates the borders, friendly units must challenge him courageously and endeavor to triumph in their zone of action without concerning themselves about the consequences, which will be the responsibility of higher headquarters." Major Tsuji Masanobu later justified the new guidelines by pointing to the "contradictory orders" that had hamstrung frontier commanders under the old rules. They were tasked with upholding Manchukuo's territorial integrity yet forbidden from actions that might spark conflict. This, Tsuji argued, bred hesitation, as officers feared repercussions for decisive responses to incursions. The updated directives aimed to alleviate this "anxiety," empowering local leaders to act boldly without personal liability. In truth, Tsuji's "Principles for the Settlement of Soviet-Manchukuoan Border Disputes" were more incendiary than conciliatory. They introduced provocative measures: authorizing commanders to unilaterally define unclear boundaries, enforce them with immediate force "shoot first, ask questions later", permit pursuits into enemy territory, and even encourage luring adversaries across the line. Such tactics flouted both government policy and official army doctrine, prioritizing escalation over restraint. The proposals sparked intense debate within Kwantung Army's Operations Section. Section chief Colonel Takushiro Hattori and Colonel Masao Terada outranked Tsuji, as did Major Takeharu Shimanuki, all recent transfers from the Army General Staff. Tsuji, however, boasted longer tenure at Kwantung Army Headquarters since April 1936 and in Operations since November 1937, making him the de facto veteran. Hattori and Terada hesitated to challenge the assertive major, whose reputation for intellect, persuasion, and deep knowledge of Manchuria commanded respect. In a 1960 interview, Shimanuki recalled Tsuji's dominance in discussions, where his proactive ideas often swayed the group. Unified, the section forwarded Tsuji's plan to Kwantung Army Command. Commander Lieutenant General Kenkichi Ueda consulted Chief of Staff General Rensuke Isogai and Vice Chief General Otozaburo Yano, seasoned leaders who should have spotted the guidelines' volatility. Yet, lingering grudges from AGS "interference" in past incidents like the Amur River and Changkufeng clouded their judgment. Ueda, Isogai, and Tsuji shared history from the 1932 Shanghai Incident: Tsuji, then a captain, led a company in the 7th Regiment under Colonel Isogai, with Yano as staff officer and Ueda commanding the 9th Division. Tsuji was wounded there, forging bonds of camaraderie. This "clique," which grew to include Hattori, Terada, and Shimanuki, amplified Tsuji's influence. Despite Isogai's initial reservations as the group's moderate voice, the guidelines won approval. Ueda issued them as Kwantung Army Operations Order 1488 on April 25, 1939, during a division commanders' conference at KwAHQ. A routine copy reached AGS in Tokyo, but no formal reply came. Preoccupied with the China War and alliance talks with Germany, AGS may have overlooked border matters. Colonel Masazumi Inada, AGS Operations head, later noted basic acceptance of Order 1488, with an informal expectation—relayed to Hattori and Terada—of prior consultation on violations. KwAHQ dismissed this as another Tokyo intrusion on their autonomy. Some Japanese analysts contend a stern AGS rejection might have prevented Nomonhan's catastrophe, though quelling Kwantung's defiance could have required mass staff reassignments, a disruptive step AGS avoided. Tsuji countered that permitting forceful action at Changkufeng would have deterred Nomonhan altogether, underscoring the interconnectedness of these clashes while implicitly critiquing the 1939 battle's location. Undeniably, Order 1488's issuance on April 25 paved the way for conflict three weeks later. Japanese records confirm that Khalkha Mongols and MPR patrols routinely crossed the Halha River—viewed by them as internal territory, 10 miles from the true border. Such crossings passed uneventfully in March and April 1939. Post-Order 1488, however, 23rd Division commander General Michitaro Komatsubara responded aggressively, setting the stage for escalation. The Nomonhan Incident ignited with a border clash on May 11–12, 1939, that rapidly spiraled into a major conflict. Over a dozen "authoritative" accounts exist, varying in viewpoint, focus, and specifics. After cross-referencing these sources, a coherent timeline emerges. On the night of May 10–11, a 20-man Mongolian People's Republic border patrol crossed eastward over the Halha River (known as Khalkhin Gol to Mongols and Soviets). About 10 miles east, atop a 150-foot sandy hill, lay the tiny hamlet of Nomonhan, a cluster of crude huts housing a few Mongol families. Just south flowed the Holsten River, merging westward into the broader Halha. By morning on May 11, Manchukuoan forces spotted the MPR patrol north of the Holsten and west of Nomonhan. In the MPR/Soviet perspective, Nomonhan Hill marked the Mongolia-Manchuria border. To Manchukuoans and Japanese, it sat 10 miles inside Manchukuo, well east of the Halha. A 40-man Manchukuoan cavalry unit repelled the Mongolians back across the river, inflicting initial casualties on both sides—the Manchukuoans drawing first blood. The MPR patrol leader exaggerated the attackers as 200 strong. The next day, May 12, a 60-man MPR force under Major P. Chogdan evicted the Manchukuoans from the disputed zone, reestablishing positions between the Halha and Nomonhan. The Manchukuoans, in turn, reported facing 700 enemies. Sporadic skirmishes and maneuvering persisted through the week. On May 13, two days post-clash, the local Manchukuoan commander alerted General Michitaro Komatsubara's 23rd Division headquarters in Hailar. Simultaneously, Major Chogdan reported to Soviet military command in Ulaanbaatar, Mongolia's capital. What began as a Mongolian-Manchukuoan spat was poised to draw in Soviet and Japanese patrons. Attributing the May 10–11 violation hinges on border interpretations: both sides claimed the Halha-Nomonhan strip. Yet, most accounts concur that Manchukuoan forces initiated the fighting. Post-May 13 notifications to Moscow and Tokyo clarify the record thereafter. Midday on May 13, Komatsubara was leading a staff conference on the newly issued Kwantung Army Operations Order 1488—Major Tsuji Masanobu's aggressive border guidelines. Ironically, the first Nomonhan combat report arrived mid-discussion. Officers present recall Komatsubara deciding instantly to "destroy the invading Outer Mongolian forces" per Order 1488. That afternoon, he informed Kwantung Army Headquarters of the incident and his intent to eradicate the intruders, requesting air support and trucks. General Kenkichi Ueda, Kwantung commander, approved Komatsubara's "positive attitude," dispatching six scout planes, 40 fighters, 10 light bombers, two anti-aircraft batteries, and two motorized transport companies. Ueda added a caveat: exercise "extreme caution" to prevent escalation—a paradoxical blend of destruction and restraint, reflective of KwAHQ's fervent mood. Ueda relayed the details to Tokyo's Army General Staff, which responded that Kwantung should handle it "appropriately." Despite Kwantung's impulsive reputation, Tokyo deferred, perhaps trusting the northern strategic imbalance, eight Japanese divisions versus 30 Soviet ones from Lake Baikal to Vladivostok, would enforce prudence. This faith proved misguided. On May 14, Major Tsuji flew from KwAHQ for aerial reconnaissance over Nomonhan, spotting 20 horses but no troops. Upon landing, a fresh bullet hole in his plane confirmed lingering MPR presence east of the Halha. Tsuji briefed 23rd Division staff and reported to Ueda that the incident seemed minor. Aligning with Order 1488's spirit, Komatsubara deployed a force under Lieutenant Colonel Yaozo Azuma: an armored car company, two infantry companies, and a cavalry troop. Arriving at Nomonhan on May 15, Azuma learned most MPR forces had retreated westward across the Halha the prior night, with only token elements remaining, and those withdrawing. Undeterred, he pursued. The advance met scant resistance, as foes had crossed the river. However, Japanese light bombers struck a small MPR concentration on the west bank, Outpost Number 7, killing two and wounding 15 per MPR reports; Japanese claimed 30–40 kills. All agree: the raid targeted undisputed MPR territory. Hearing of May 15's events, Komatsubara deemed the Mongolians sufficiently rebuked and recalled Azuma to Hailar on May 16. KwAHQ concurred, closing the matter. Soviet leaders, however, saw it differently. Mid-May prompted Soviet support for the MPR under their 1936 Mutual Defense Pact. The Red Army's 57th Corps, stationed in Mongolia, faced initial disarray: Commander Nikolai Feklenko was hunting, Chief of Staff A. M. Kushchev in Ulan Ude with his ill wife. Moscow learned of clashes via international press from Japanese sources, sparking Chief of Staff Boris Shaposhnikov's furious inquiry. Feklenko and Kushchev rushed back to Ulaanbaatar, dispatching a mixed force—a battalion from the 149th Infantry Regiment (36th Division), plus light armor and artillery from the 11th Tank Brigade—to Tamsag Bulak, 80 miles west of the Halha. Led by Major A. E. Bykov, it bolstered the MPR's 6th Cavalry Division. Bykov and Cavalry Commander Colonel Shoaaiibuu inspected the site on May 15, post-Azum's departure. The cavalry arrived two days later, backed by Bykov (ordered to remain west of the river and avoid combat if possible). Some MPR troops recrossed, occupying the disputed zone. Clashes with Manchukuoan cavalry resumed and intensified. Notified of renewed hostilities, Komatsubara viewed it as defiance, a personal affront. Emboldened by Order 1488, he aimed not just to repel but to encircle and annihilate. The incident was on the verge of major expansion. I would like to take this time to remind you all that this podcast is only made possible through the efforts of Kings and Generals over at Youtube. Please go subscribe to Kings and Generals over at Youtube and to continue helping us produce this content please check out www.patreon.com/kingsandgenerals. If you are still hungry after that, give my personal channel a look over at The Pacific War Channel at Youtube, it would mean a lot to me. The ghosts of the Changufeng incident have come back to haunt both the USSR and Japan. Those like Tsuji Masanobu instigated yet another border clash that would erupt into a full blown battle that would set a precedent for both nations until the very end of WW2.
This episode of Going In Raw is sponsored by BetterHelp and Tempo! Give online therapy a try at http://www.betterhelp.com/raw and get on your way to being your best self. Go to http://www.tempomeals.com/raw to get 60% off your first box! Consider joining Friendo Club by clicking JOIN ($5/month) OR becoming a $5+ Patron at http://www.patreon.com/steveandlarson!
We take an extended deep dive into the Ilhan Omar story and her "attacker"Former Viking Matt Kalil is now suing his ex-wife over too much information.The new Trump accounts are an interesting idea for newborns.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.