POPULARITY
Categories
Should we teach self defense to children at school? A new book revealed that as a teenager, Queen Camilla fought off a would-be attacker on a train. Frank spoke to Glyn Ashton from Vault self-defence and Treasa Rice from Glow NI Hosted on Acast. See acast.com/privacy for more information.
Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organizational value throughout the M&A process. Topic: The Challenge of Breach Transparency Every industry concerned with safety has a process for publishing the details of accidents, incidents, and failures. Cybersecurity has yet to reach this milestone, and hiding the details of failures is holding us back. This talk will argue for the need for breach details to go public, and share strategies for finding and using some little-known sources of detailed breach data. Weekly Enterprise News Finally, in the enterprise security news, A funding, a few acquisitions, and an IPO for the first time in forever! Attackers are really actually starting to use AI now Some researcher spent all of August poking holes in all the AI tools Someone got Microsoft Copilot to be an accomplice in a coverup Microsoft is making a big change in Azure that will probably break some stuff No, Flipper Zero can't help you steal your car (just the stuff in it) Domain names are free to register now, maybe? Disgruntled former employee goes to jail AI tricked into doing more bad things All that and more, on this episode of Enterprise Security Weekly. This segment is sponsored by 1Password. Visit https://securityweekly.com/1password to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-422
Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organizational value throughout the M&A process. Topic: The Challenge of Breach Transparency Every industry concerned with safety has a process for publishing the details of accidents, incidents, and failures. Cybersecurity has yet to reach this milestone, and hiding the details of failures is holding us back. This talk will argue for the need for breach details to go public, and share strategies for finding and using some little-known sources of detailed breach data. Weekly Enterprise News Finally, in the enterprise security news, A funding, a few acquisitions, and an IPO for the first time in forever! Attackers are really actually starting to use AI now Some researcher spent all of August poking holes in all the AI tools Someone got Microsoft Copilot to be an accomplice in a coverup Microsoft is making a big change in Azure that will probably break some stuff No, Flipper Zero can't help you steal your car (just the stuff in it) Domain names are free to register now, maybe? Disgruntled former employee goes to jail AI tricked into doing more bad things All that and more, on this episode of Enterprise Security Weekly. This segment is sponsored by 1Password. Visit https://securityweekly.com/1password to learn more about them! Show Notes: https://securityweekly.com/esw-422
Desiree Lee, one of the Business CTOs at Armis, joins Amir to unpack one of the toughest realities in cybersecurity: the biggest risks aren't always technical, they're human. From phishing and deepfakes to the way AI is reshaping both attackers' and defenders' playbooks, Desiree shares hard-won insights on what companies should actually prioritize. If you're a tech leader navigating the expanding attack surface, this episode will sharpen how you think about security in the AI era.Key Takeaways• Most breaches stem from human behavior, not lack of technology.• Attackers adopt AI faster because there's no downside for them—defenders must catch up.• Fundamentals like patching and asset inventory still make or break resilience.• AI can reduce noise for security teams by spotting patterns in overwhelming data.• Small and midsize businesses will benefit from AI-driven tools that lower the barrier to effective security.Timestamped Highlights00:34 — How Armis evolved from asset inventory to full security solutions03:30 — Why security failures are more about psychology than technology07:32 — The deepfake CFO story and why training alone can't solve phishing risks09:18 — Why most enterprises struggle with basics like patching and automation11:41 — Where AI gives defenders an edge in processing massive data sets18:33 — Practical ways AI can ease alert fatigue and vulnerability management21:03 — The overlooked need to label assets by business criticalityA Moment Worth Remembering“There is no penalty on the attacking side for embracing AI. It's only good things for them. So they will adopt it quickly.” — Desiree LeeResources MentionedArmis: armis.comDesiree Lee on LinkedIn: linkedin.com/in/desireedleePro TipsTagging assets with their business criticality is one of the simplest, highest-impact steps companies can take. It turns asset inventories from static lists into real decision-making tools for AI-driven defense.Call to ActionIf you found this episode valuable, share it with a colleague who's thinking about security and AI. Subscribe on your favorite podcast platform so you never miss future conversations with tech leaders pushing the edge of what's possible.
Organizations today face escalating cyber risks spanning state-sponsored attacks, supply chain compromises, and malicious apps. ShinyHunters' breaches of Salesforce platforms (impacting Google and Farmers Insurance) show how social engineering—like voice phishing—can exploit trusted vendors. Meanwhile, Russian actors (FSB-linked “Static Tundra”) continue to leverage old flaws, such as a seven-year-old Cisco Smart Install bug, to infiltrate U.S. infrastructure. Malicious apps on Google Play (e.g., Joker, Anatsa) reached millions of downloads before removal, proving attackers' success in disguising malware. New technologies bring fresh vectors: Perplexity's Comet browser allowed prompt injection–driven account hijacking, while malicious RDP scanning campaigns exploit timing to maximize credential theft.Responses vary between safeguarding and asserting control. The FTC warns U.S. firms against weakening encryption or enabling censorship under foreign pressure, citing legal liability. By contrast, Russia mandates state-backed apps like MAX Messenger and RuStore, raising surveillance concerns. Microsoft, facing leaks from its bug-sharing program, restricted exploit code access to higher-risk countries. Open-source projects like LibreOffice gain traction as sovereignty tools—privacy-first, telemetry-free, and free of vendor lock-in.AI-powered wearables such as Halo X smart glasses blur lines between utility and surveillance. Their ability to “always listen” and transcribe conversations augments human memory but erodes expectations of privacy. The founders' history with facial recognition raises additional misuse concerns. As AI integrates directly into conversation and daily life, the risks of pervasive recording, ownership disputes, and surveillance intensify.Platforms like Bluesky are strained by conflicting global regulations. Mississippi's HB 1126 requires universal age verification, fines for violations, and parental consent for minors. Lacking resources for such infrastructure, Bluesky withdrew service from the state. This illustrates the tension between regulatory compliance, resource limits, and preserving open user access.AI adoption is now a competitive imperative. Coinbase pushes aggressive integration, requiring engineers to embrace tools like GitHub Copilot or face dismissal. With one-third of its code already AI-generated, Coinbase aims for 50% by quarter's end, supported by “AI Speed Runs” for knowledge-sharing. Yet, rapid adoption risks employee dissatisfaction and AI-generated security flaws, underscoring the need for strict controls alongside innovation.Breaches at Farmers Insurance (1.1M customers exposed) and Google via Salesforce illustrate the scale of third-party risk. Attackers exploit trusted platforms and human error, compromising data across multiple organizations at once. This shows security depends not only on internal defenses but on continuous vendor vetting and monitoring.Governments often demand access that undermines encryption, privacy, and transparency. The FTC warns that backdoors or secret concessions—such as the UK's (later retracted) request for Apple to weaken iCloud—violate user trust and U.S. law. Meanwhile, Russia's mandatory domestic apps exemplify sovereignty used for surveillance. Companies face a global tug-of-war between privacy, compliance, and open internet principles.Exploited legacy flaws prove that vulnerabilities never expire. Cisco's years-old Smart Install bug, still unpatched in many systems, allows surveillance of critical U.S. sectors. Persistent RDP scanning further highlights attackers' patience and scale. The lesson is clear: proactive patching, continuous updates, and rigorous audits are essential. Cybersecurity demands ongoing vigilance against both emerging and legacy threats.
Nyheterna Radio 10:00
The Alan Cox ShowSee omnystudio.com/listener for privacy information.
The Alan Cox Show
DOGE Put Critical Social Security Data at Risk, Whistle-Blower Says CISA warns of actively exploited Git code execution flaw Alleged mastermind behind K-Pop celebrity stock heist extradited to South Korea Huge thanks to our sponsor, Prophet Security Your security analysts didn't sign up to chase false alarms all day. With Prophet Security's AI SOC platform, they won't have to. It works like a tireless teammate—triaging and investigating alerts around the clock. Less burnout. Better coverage. And more time for meaningful work. Learn more atprophetsecurity.ai.
After a WSU Trump supporter was assaulted over a hat, a judge is sending the attacker (a WSU grad student) to jail. Crime is rampant in Seattle’s Belltown neighborhood. Sea-Tac airport is bracing for Labor Day travel. Voter registration numbers for the Democrats are dismal. President Trump issued an executive order aimed at ending cashless bail. // The Democrats continued to show that they’re completely out of touch at the annual DNC summer meeting. The great redistricting fight continues. // Trump is rolling out the National Guard all across the country to crack down on illegal immigration.
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.• Attackers are actively exploiting CVE-2023-46604, a remote code execution vulnerability in Apache ActiveMQ first disclosed in October 2023, that is used to compromise cloud-hosted Linux servers.• AshES Cybersecurity has publicly disclosed a critical zero-day vulnerability in Elastic's Endpoint Detection and Response (EDR) platform, specifically in the Microsoft-signed kernel driver elastic-endpoint-driver.sys.• At least a dozen ransomware groups are now deploying kernel-level EDR killers - tools designed specifically to disable endpoint detection and response solutions - as part of their malware arsenal.• Microsoft has released an in-depth technical analysis of PipeMagic, a modular backdoor linked to ransomware operations carried out by Storm-2460, a financially motivated threat group associated with RansomEXX.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform.This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.
Transgender ATTACKER FINDS OUT after AMBUSHING ICE Agents with a KNIFE! FAFO!
Erik Menendez was denied parole at his first-ever hearing—36 years and a day after he and his brother Lyle killed their parents, Jose and Kitty Menendez. The board pointed to his prison behavior, past burglaries before the murders, and especially the killing of his mother in their decision. Now, all eyes are on Lyle's parole outcome. Michael Monks and members of the DTLA Residents Association met with city officials and business leaders to address one of downtown's toughest challenges: homelessness tied to acute mental illness episodes. Cracker Barrel lost nearly $100 million in market value after unveiling a new logo, sending shockwaves through investors. A man accused of attacking three people at a Rose Bowl concert has been arrested. Crozier shared his own story of recently having to step in during a similar confrontation.
this surprise patch has HUGE buffs and nerfs to the competitive scene!This patch was so unexpected, I recorded it from my phone as I was walking to my car after work! I LOVE this game!jump in now! ENGLISH TRANSLATIONS:LatiasMist BallBasic damage: 200% increaseMovement speed decrease: 30% → 40%Dragon PulseBasic damage: 20% increaseTelekinetic projectile damage: 10% increaseDragon CheerCan now be used to move to a different ally on the second use.Dragon BreathA 30% movement speed decrease has been added to Dragon Breath.This increases to 40% for Dragon Breath+.Both the damage and support capabilities for Latias have been significantly strengthened, allowing Latias to establish a unique role of dealing damage while also providing support.UrshifuSurging StrikesCooldown: 11s → 10sLiquidationShield amount: 8% increaseWicked BlowMovement speed decrease on self during charge: 40% → 30%Throat Chop+Cooldown reduction for this move from Wicked Blow: 30% → 40%The usability of both of Urshifu's styles has been improved, allowing either style to be effective. In particular, by improving the frequency of move usage and reducing the risk while charging, it is now easier to leverage the strengths of each style.MiraidonStatsHP: 3300–7000 → 3300–7300Defense: 70–280 → 70–320Sp. Def: 80–240 → 80–280Charge BeamDamage: 5% increaseMiraidon's overall durability has been improved, reducing the frequency of being knocked out in a single blow. Additionally, the previously lacking damage of Charge Beam has been increased.ComfeyStatsHP: 3000–5500 → 3000–5900Defense: 40–190 → 40–250Sp. Def: 30–160 → 30–220Sweet KissShield amount: 20% increaseSweet Kiss+Movement speed increase: 40% → 50%Comfey's durability has been increased, and the shield amount from Sweet Kiss when attaching to an ally has been strengthened. This enhances the strategy of supporting allies by attaching and detaching from them.Alolan RaichuElectro BallDamage: 10% increaseThunderboltParalysis duration: 1s → 2sThe damage and hindrance effects of Alolan Raichu's moves have been increased, creating more opportunities for Alolan Raichu to perform as the team's Attacker.LatiosTelekinesisDamage: 30% increaseCooldown: 8s → 7.5sTime opponent is unable to act: Standardized to 1sFirst-stage projectile speed: IncreasedSecond-stage range: 7.5m → 9mSecond-stage usage condition: Can now be used even if the first stage misses.Draco MeteorDamage: 10% increaseDragon PulseTelekinetic projectile damage: 15% decreaseThe usability of Telekinesis has been significantly improved, strengthening it to become the core of new tactics. On the other hand, the damage from Dragon Pulse, which was dealing high damage, has been reduced to adjust the overall balance.Ho-OhSacred FireRange: 8.5m → 7mArea of effect: 3m → 2.5mFlight duration: 8s → 6sHo-Oh's high mobility and wide attack range were difficult for opponents to handle. Its mobility and attack range have been adjusted to create more opportunities for opponents to counter.AlcremieDazzling GleamDamage: 8% decreaseSweet ScentDamage: 12% decreaseIn addition to its support capabilities, Alcremie's damage contribution was also very high. Therefore, the damage of some moves has been reduced to better align Alcremie's abilities with the Supporter role.SuicuneAvalancheDamage: Approx. 19%–23% decreaseThe damage from Avalanche was too high for a move learned in the early stages of a battle, so it has been decreased.Held Item AdjustmentsBased on win rates and usage rates, the effects of some held items have been adjusted.Rescue HoodShield and recovery increase: 8%/11%/14% → 11%/14%/17%Healing CrownRecovery amount: 7%/10%/13% → 9%/12%/15%
AP correspondent Charles de Ledesma reports a memorial tree in France has been destroyed.
GSD Presents Silicon Valley Tech & AI with Anton Zimarov AI in Cybersecurity: Attacker and Defender POV July 23, Wednesday 1PM EST
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: CISA warns about the path from on-prem Exchange to the cloud Microsoft awards a crisp zero dollar bill for a report about what a mess its internal Entra-authed apps are Everyone and their dog seems to have a shell in US Federal Court information systems Google pays $250k for a Chrome sandbox escape Attackers use javascript in adult SVG files to … farm facebook likes?! SonicWall says users aren't getting hacked with an 0day… this time. This week's episode is sponsored by SpecterOps. Chief product officer Justin Kohler talks about how the flagship Bloodhound tool has evolved to map attack paths anywhere. Bring your own applications, directories and systems into the graph, and join the identity attacks together. This episode is also available on Youtube. Show notes CISA, Microsoft issue alerts on ‘high-severity' Exchange vulnerability | The Record from Recorded Future News Advanced Active Directory to Entra ID lateral movement techniques Consent & Compromise: Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications Cartels may be able to target witnesses after major court hack Federal judiciary tightens digital security as it deals with ‘escalated cyberattacks' | The Record from Recorded Future News Citrix NetScaler flaws lead to critical infrastructure breaches | Cybersecurity Dive DARPA touts value of AI-powered vulnerability detection as it announces competition winners | Cybersecurity Dive Buttercup is now open-source! HTTP/1.1 must die: the desync endgame US confirms takedown of BlackSuit ransomware gang that racked up $370 million in ransoms | The Record from Recorded Future News North Korean cyber-espionage group ScarCruft adds ransomware in recent attack | The Record from Recorded Future News Adult sites are stashing exploit code inside racy .svg files - Ars Technica Google pays 250k for Chromium sandbox escape SonicWall says recent attack wave involved previously disclosed flaw, not zero-day | Cybersecurity Dive Two groups exploit WinRAR flaws in separate cyber-espionage campaigns | The Record from Recorded Future News Tornado Cash cofounder dodges money laundering conviction, found guilty of lesser charge | The Record from Recorded Future News Hackers Hijacked Google's Gemini AI With a Poisoned Calendar Invite to Take Over a Smart Home | WIRED Malware in Open VSX: These Vibes Are Off How attackers are using Active Directory Federation Services to phish with legit office.com links Introducing our guide to phishing detection evasion techniques The State of Attack Path Management
As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Security Weekly to discuss how to defend trust and reputation in the age of AI. Santosh will cover both the company and executive challenges of defending against the latest AI attacks, including: Impersonations and Deepfakes Employee Scams Financial Fraud Segment Resources: - https://styxintel.com/blog/what-is-brand-protection/ - https://styxintel.com/blog/brand-impersonation-hurts-business/ - https://styxintel.com/blog/social-engineering-tactics/ In the leadership and communications section, Mind the overconfidence gap: CISOs and staff don't see eye to eye on security posture, Your AI Strategy Needs More Than a Single Leader, Avoid These Communication Breakdowns When Launching Strategic Initiatives, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-408
The All Local Afternoon Update for Wednesday August 13th 2025
As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Security Weekly to discuss how to defend trust and reputation in the age of AI. Santosh will cover both the company and executive challenges of defending against the latest AI attacks, including: Impersonations and Deepfakes Employee Scams Financial Fraud Segment Resources: - https://styxintel.com/blog/what-is-brand-protection/ - https://styxintel.com/blog/brand-impersonation-hurts-business/ - https://styxintel.com/blog/social-engineering-tactics/ In the leadership and communications section, Mind the overconfidence gap: CISOs and staff don't see eye to eye on security posture, Your AI Strategy Needs More Than a Single Leader, Avoid These Communication Breakdowns When Launching Strategic Initiatives, and more! Show Notes: https://securityweekly.com/bsw-408
As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Security Weekly to discuss how to defend trust and reputation in the age of AI. Santosh will cover both the company and executive challenges of defending against the latest AI attacks, including: Impersonations and Deepfakes Employee Scams Financial Fraud Segment Resources: - https://styxintel.com/blog/what-is-brand-protection/ - https://styxintel.com/blog/brand-impersonation-hurts-business/ - https://styxintel.com/blog/social-engineering-tactics/ In the leadership and communications section, Mind the overconfidence gap: CISOs and staff don't see eye to eye on security posture, Your AI Strategy Needs More Than a Single Leader, Avoid These Communication Breakdowns When Launching Strategic Initiatives, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-408
As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Security Weekly to discuss how to defend trust and reputation in the age of AI. Santosh will cover both the company and executive challenges of defending against the latest AI attacks, including: Impersonations and Deepfakes Employee Scams Financial Fraud Segment Resources: - https://styxintel.com/blog/what-is-brand-protection/ - https://styxintel.com/blog/brand-impersonation-hurts-business/ - https://styxintel.com/blog/social-engineering-tactics/ In the leadership and communications section, Mind the overconfidence gap: CISOs and staff don't see eye to eye on security posture, Your AI Strategy Needs More Than a Single Leader, Avoid These Communication Breakdowns When Launching Strategic Initiatives, and more! Show Notes: https://securityweekly.com/bsw-408
Check out our sponsors: ✅ Patriot Mobile - https://patriotmobile.com/partners/chad Episode Description: Chad unloads on the latest bombshells rocking the political world! Leftist media outlets are forced to eat crow as they admit—yet again—that President Trump was right all along about tariffs, the economy, etc. Plus, one of the "BIG BALLS" attackers is revealed, and Chad's got the unfiltered scoop. Buckle up for hard-hitting commentary, razor-sharp wit, and the truth they don't want you to hear! Learn more about your ad choices. Visit megaphone.fm/adchoices
8-12 Adam and Jordana 11a hour
Welcome to the "Week in Review," where we delve into the true stories behind this week's headlines. Your host, Tony Brueski, joins hands with a rotating roster of guests, sharing their insights and analysis on a collection of intriguing, perplexing, and often chilling stories that made the news. This is not your average news recap. With the sharp investigative lens of Tony and his guests, the show uncovers layers beneath the headlines, offering a comprehensive perspective that traditional news can often miss. From high-profile criminal trials to in-depth examinations of ongoing investigations, this podcast takes listeners on a fascinating journey through the world of true crime and current events. Each episode navigates through multiple stories, illuminating their details with factual reporting, expert commentary, and engaging conversation. Tony and his guests discuss each case's nuances, complexities, and human elements, delivering a multi-dimensional understanding to their audience. Whether you are a dedicated follower of true crime, or an everyday listener interested in the stories shaping our world, the "Week in Review" brings you the perfect balance of intrigue, information, and intelligent conversation. Expect thoughtful analysis, informed opinions, and thought-provoking discussions beyond the 24-hour news cycle. Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Welcome to the "Week in Review," where we delve into the true stories behind this week's headlines. Your host, Tony Brueski, joins hands with a rotating roster of guests, sharing their insights and analysis on a collection of intriguing, perplexing, and often chilling stories that made the news. This is not your average news recap. With the sharp investigative lens of Tony and his guests, the show uncovers layers beneath the headlines, offering a comprehensive perspective that traditional news can often miss. From high-profile criminal trials to in-depth examinations of ongoing investigations, this podcast takes listeners on a fascinating journey through the world of true crime and current events. Each episode navigates through multiple stories, illuminating their details with factual reporting, expert commentary, and engaging conversation. Tony and his guests discuss each case's nuances, complexities, and human elements, delivering a multi-dimensional understanding to their audience. Whether you are a dedicated follower of true crime, or an everyday listener interested in the stories shaping our world, the "Week in Review" brings you the perfect balance of intrigue, information, and intelligent conversation. Expect thoughtful analysis, informed opinions, and thought-provoking discussions beyond the 24-hour news cycle. Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
Welcome to the "Week in Review," where we delve into the true stories behind this week's headlines. Your host, Tony Brueski, joins hands with a rotating roster of guests, sharing their insights and analysis on a collection of intriguing, perplexing, and often chilling stories that made the news. This is not your average news recap. With the sharp investigative lens of Tony and his guests, the show uncovers layers beneath the headlines, offering a comprehensive perspective that traditional news can often miss. From high-profile criminal trials to in-depth examinations of ongoing investigations, this podcast takes listeners on a fascinating journey through the world of true crime and current events. Each episode navigates through multiple stories, illuminating their details with factual reporting, expert commentary, and engaging conversation. Tony and his guests discuss each case's nuances, complexities, and human elements, delivering a multi-dimensional understanding to their audience. Whether you are a dedicated follower of true crime, or an everyday listener interested in the stories shaping our world, the "Week in Review" brings you the perfect balance of intrigue, information, and intelligent conversation. Expect thoughtful analysis, informed opinions, and thought-provoking discussions beyond the 24-hour news cycle. Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
Welcome to the "Week in Review," where we delve into the true stories behind this week's headlines. Your host, Tony Brueski, joins hands with a rotating roster of guests, sharing their insights and analysis on a collection of intriguing, perplexing, and often chilling stories that made the news. This is not your average news recap. With the sharp investigative lens of Tony and his guests, the show uncovers layers beneath the headlines, offering a comprehensive perspective that traditional news can often miss. From high-profile criminal trials to in-depth examinations of ongoing investigations, this podcast takes listeners on a fascinating journey through the world of true crime and current events. Each episode navigates through multiple stories, illuminating their details with factual reporting, expert commentary, and engaging conversation. Tony and his guests discuss each case's nuances, complexities, and human elements, delivering a multi-dimensional understanding to their audience. Whether you are a dedicated follower of true crime, or an everyday listener interested in the stories shaping our world, the "Week in Review" brings you the perfect balance of intrigue, information, and intelligent conversation. Expect thoughtful analysis, informed opinions, and thought-provoking discussions beyond the 24-hour news cycle. Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Welcome to the "Week in Review," where we delve into the true stories behind this week's headlines. Your host, Tony Brueski, joins hands with a rotating roster of guests, sharing their insights and analysis on a collection of intriguing, perplexing, and often chilling stories that made the news. This is not your average news recap. With the sharp investigative lens of Tony and his guests, the show uncovers layers beneath the headlines, offering a comprehensive perspective that traditional news can often miss. From high-profile criminal trials to in-depth examinations of ongoing investigations, this podcast takes listeners on a fascinating journey through the world of true crime and current events. Each episode navigates through multiple stories, illuminating their details with factual reporting, expert commentary, and engaging conversation. Tony and his guests discuss each case's nuances, complexities, and human elements, delivering a multi-dimensional understanding to their audience. Whether you are a dedicated follower of true crime, or an everyday listener interested in the stories shaping our world, the "Week in Review" brings you the perfect balance of intrigue, information, and intelligent conversation. Expect thoughtful analysis, informed opinions, and thought-provoking discussions beyond the 24-hour news cycle. Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
We look at the FPL forwards and midfielders in various price brackets. ━━━━━━━━━━━━━
This week on the Active Self Protection Podcast we sit down with South African Self Defender Tubs and discuss the day he was at work at his family restaurant when a commotion drew him to the parking lot just in time to see a man rushing innocent citizens with a large glass bottle and how he had to react to protect life. More Info: https://fhftc.orgTo Donate: https://fhftc.org/donate/To Sign Up: https://fhftc.org/bullets-bibles-conference/Active Self Protection exists to help good, sane, sober, moral, prudent people in all walks of life to more effectively protect themselves and their loved ones from criminal violence. On the ASP Podcast you will hear the true stories of life or death self defense encounters from the men and women that lived them. If you are interested in the Second Amendment, self defense and defensive firearms use, martial arts or the use of less lethal tools used in the real world to defend life and family, you will find this show riveting. Join host and career federal agent Mike Willever as he talks to real life survivors and hear their stories in depth. You'll hear about these incidents and the self defenders from well before the encounter occurred on through the legal and emotional aftermath. Music: bensound.com
On September 30th Microsoft will only support a new unified multi-factor authentication control configuration. What does this mean for your nonprofit?In March 2023 Microsoft announced that after September 30th, 2025, they would no longer automatically support “legacy” multi-factor authentication controls in the Microsoft 365 Entra ID and General Admin administration portals. The methods your staff are using now will not automatically roll over to be allowed via the new admin dashboard after that date. Steve Longenecker, Community IT's Director of IT Consulting, explains to Carolyn the implications for nonprofits of this change and the Microsoft unified security administration deadline.The takeaways: The new unified authentication dashboard is available now to Microsoft 365 admins.The new Authentication Methods page does not inherit methods allowed in the legacy controls. An administrator needs to manually enable the MFA methods your organization wants to allow. Old MFA options your staff are using now will not roll over automatically to the new dashboard.Microsoft and Community IT are pushing admins to use this opportunity to to exclude less secure MFA methods. Community IT advises against allowing SMS texting and one-time codes sent to personal email addresses as MFA methods. You can upgrade and implement the new MFA and password reset options at any time, and we advise you to do this before September 30, whether or not Microsoft grants an extension of the deadline.If you just started using Microsoft 365 for Nonprofits, you don't need to worry about the deadline because your initial configuration would already be using the new Authentication Methods page. If you haven't made the change or don't know, you need to check before September 30, 2025.This change is visible only to Microsoft administrators, who should be making the change and informing staff where appropriate. If you are a nonprofit leader or board member and have not heard from your IT Director or outsourced IT, check with them to understand the plan for your organization. If you are a nonprofit staffer, pay attention to directions on using the safest MFA to protect your nonprofit.While not directly impacted by this deadline from Microsoft, Carolyn and Steve discuss the importance of “phish-resistant” MFA, preventing Attacker-in-the-Middle (AitM) attacks, for executives and staff working in finance, IT and other highly targeted areas of your operations. NOTE: The timelines on Microsoft changes do sometimes shift, and we are working to keep you updated. Please check for the most recent blog or podcast from us to ensure you have the most recent update. _______________________________Start a conversation :) Register to attend a webinar in real time, and find all past transcripts at https://communityit.com/webinars/ email Carolyn at cwoodard@communityit.com on LinkedIn Thanks for listening.
Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00:00 - PreShow Banter™ — Stop Asking Wade if he's in Vegas00:02:16 - Perplexity Uses Stealth Crawlers to Evade No-Crawl Directives – 2025-08-0400:11:25 - Story # 1: Insurance won't cover $5M in City of Hamilton claims for cyberattack, citing lack of log-in security00:18:40 - Story # 2: States Enact Safe Harbor Laws that Provide Affirmative Defenses in Data Breach Litigation00:26:45 - Story # 3: Hackers Destroy Aeroflot's IT Infrastructure, Causing Over 42 Flight Cancellations00:34:18 - Story # 4: Attackers exploit link-wrapping services to steal Microsoft 365 logins00:40:09 - Story # 5: Mozilla flags phishing wave aimed at hijacking trusted Firefox add-ons00:42:18 - Wade's plugin recommendation00:44:39 - Story # 6: Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives00:51:11 - Story # 7: After Backlash, ChatGPT Removes Option to Have Private Chats Indexed by Google00:55:21 - AI 202701:01:01 - What's Ralph been up to?
1. Scrutiny of the "Tea" Dating AppThe women-focused dating app "Tea" faces backlash after two data breaches exposed 72,000 sensitive images and 1.1 million private messages. Though security upgrades were promised, past data remained exposed, and the app lacks end-to-end encryption. Additionally, anonymous features enabling posts about men have sparked defamation lawsuits. Critics argue Tea prioritized rapid growth over user safety, exemplifying the danger of neglecting cybersecurity in pursuit of scale.2. North Korean Remote Work InfiltrationCrowdStrike has flagged a 220% surge in North Korean IT operatives posing as remote workers—over 320 cases in the past year. These operatives use stolen/fake identities, aided by generative AI to craft résumés, deepfake interviews, and juggle multiple jobs. Their earnings fund Pyongyang's weapons programs. The tactic reveals the limits of traditional vetting and the need for advanced hiring security.3. Airportr's Data ExposureUK luggage service Airportr suffered a major security lapse exposing passport photos, boarding passes, and flight details—including those of diplomats. CyberX9 found it possible to reset accounts with just an email and no limits on login attempts. Attackers could gain admin access, reroute luggage, or cancel flights. Although patched, the incident underscores risks of convenience services with poor security hygiene.4. Risks of AI-Generated CodeVeracode's "2025 GenAI Code Security Report" found that nearly 45% of AI-generated code across 80 tasks had security flaws—many severe. This highlights the need for human oversight and thorough reviews. While AI speeds development, it also increases vulnerability if unchecked, making secure coding a human responsibility.5. Microsoft's SharePoint Hack ControversyChinese state hackers exploited flaws in SharePoint, breaching hundreds of U.S. entities. A key concern: China-based Microsoft engineers maintained the hacked software, potentially enabling earlier access. Microsoft also shared vulnerability data with Chinese firms through its MAPP program, while Chinese law requires such data be reported to the state. This raises alarms about outsourcing sensitive software to geopolitical rivals.6. Russian Embassy Surveillance AttackRussia's "Secret Blizzard" hackers used ISP-level surveillance to deliver fake Kaspersky updates to embassies. These updates installed malware and rogue certificates enabling adversary-in-the-middle attacks—allowing full decryption of traffic. The attack shows the threat of state-level manipulation of software updates and underscores the need for update authenticity verification.7. Signal's Threat to Exit AustraliaSignal may pull out of Australia if forced to weaken encryption. ASIO's push for access contradicts Signal's end-to-end encryption model, which can't accommodate backdoors without global compromise. This standoff underscores a broader debate: encryption must be secure for all or none. Signal's resistance reflects the rising tension between privacy advocates and governments demanding access.8. Los Alamos Turns to AILos Alamos National Laboratory has launched a National Security AI Office, signaling a pivot from nuclear to AI capabilities. With massive GPU infrastructure and university partnerships, the lab sees AI as the next frontier in scientific and national defense. This reflects a shift in global security dynamics—where large language models may be as strategically vital as missiles.
Arkansas DA Is Protecting Child Predators By Prosecuting A Father Who Took Out Daughter's Attacker Description: What happens when the people who are supposed to prosecute predators instead turn their attention to the parents trying to stop them? In this explosive episode, we examine the disturbing implications of the case against Aaron Spencer, the Arkansas father who shot and killed Michael Fosler—the man accused of sexually assaulting and kidnapping his daughter. Defense attorney Bob Motta argues that this isn't just an overreach by prosecutors—it's a betrayal of public trust. Fosler had already been arrested on 43 felony counts including rape, grooming, and child pornography involving Spencer's 14-year-old daughter. Yet he walked out of jail on a $5,000 bond and went right back to contacting her, ultimately leading to her disappearance the night Spencer tracked down and fatally confronted him. Instead of thanking Spencer for saving his daughter, the Arkansas DA charged him with second-degree murder. Bob breaks down why this prosecution feels less like justice and more like protection for predators. He outlines the legal mechanisms that could—and should—shield Spencer under Arkansas's self-defense and stand-your-ground laws. And he asks a hard question the state doesn't seem eager to answer: why are they more invested in punishing a desperate father than preventing the next victim? If you're angry, you should be. If you're confused, you're not alone. This is a case where the system looks broken—and very few seem willing to fix it. #ProtectKidsNotPredators #AaronSpencer #TrueCrimeNews #ArkansasDA #HiddenKillers #BobMotta #StandYourGround #JusticeSystemFailure #ProsecutorialInjustice #ChildProtectionNow Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
Arkansas DA Is Protecting Child Predators By Prosecuting A Father Who Took Out Daughter's Attacker Description: What happens when the people who are supposed to prosecute predators instead turn their attention to the parents trying to stop them? In this explosive episode, we examine the disturbing implications of the case against Aaron Spencer, the Arkansas father who shot and killed Michael Fosler—the man accused of sexually assaulting and kidnapping his daughter. Defense attorney Bob Motta argues that this isn't just an overreach by prosecutors—it's a betrayal of public trust. Fosler had already been arrested on 43 felony counts including rape, grooming, and child pornography involving Spencer's 14-year-old daughter. Yet he walked out of jail on a $5,000 bond and went right back to contacting her, ultimately leading to her disappearance the night Spencer tracked down and fatally confronted him. Instead of thanking Spencer for saving his daughter, the Arkansas DA charged him with second-degree murder. Bob breaks down why this prosecution feels less like justice and more like protection for predators. He outlines the legal mechanisms that could—and should—shield Spencer under Arkansas's self-defense and stand-your-ground laws. And he asks a hard question the state doesn't seem eager to answer: why are they more invested in punishing a desperate father than preventing the next victim? If you're angry, you should be. If you're confused, you're not alone. This is a case where the system looks broken—and very few seem willing to fix it. #ProtectKidsNotPredators #AaronSpencer #TrueCrimeNews #ArkansasDA #HiddenKillers #BobMotta #StandYourGround #JusticeSystemFailure #ProsecutorialInjustice #ChildProtectionNow Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Twenty years after he tried to light the surrounding forests on fire, Japanese pilot Nobuo Fujita returned to Brookings as an honored guest and presented the town with his family's Samurai sword. (Brookings, Curry County; 1960s) (For text and pictures, see https://offbeatoregon.com/1305c-japanese-pilot-fujita-friendship-with-brookings.html)
Devils Den Attacker Andrew McGann, Was Also An Alleged Child Predator With Claims Ignored In this gripping episode, we delve into the chilling case of James Andrew McGann, the 28-year-old suspect in the brutal double homicide at Devil's Den State Park, Arkansas, where he allegedly stabbed a married couple to death in front of their young daughters. But the horror doesn't stop there—McGann, a former elementary school teacher who went by "Drew," faced ignored complaints of inappropriate behavior toward young female students during his brief career. Despite parental reports of him being "very touchy" with girls, placing them on his lap, and making unsettling comments, internal investigations in Texas found no substantiation, allowing him to resign quietly and shuffle between districts in Texas, Oklahoma, and Arkansas without red flags. We expose the systemic failures known as "passing the trash," where schools prioritize avoiding scandal over child safety, enabling potential predators to evade accountability. Featuring interviews with affected parents like Sierra Marcum and insights from experts on educator misconduct, this episode uncovers how warning signs were dismissed, leaving a trail of vulnerability that culminated in tragedy. #DevilsDenHomicide #AndrewMcGann #AllegedPredator #PassingTheTrash #SchoolSystemFailure #TeacherMisconduct #ChildSafety #TrueCrime #ArkansasMurder #IgnoredComplaints #EducatorAccountability #PodcastEpisode Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
Devils Den Attacker Andrew McGann, Was Also An Alleged Child Predator With Claims Ignored In this gripping episode, we delve into the chilling case of James Andrew McGann, the 28-year-old suspect in the brutal double homicide at Devil's Den State Park, Arkansas, where he allegedly stabbed a married couple to death in front of their young daughters. But the horror doesn't stop there—McGann, a former elementary school teacher who went by "Drew," faced ignored complaints of inappropriate behavior toward young female students during his brief career. Despite parental reports of him being "very touchy" with girls, placing them on his lap, and making unsettling comments, internal investigations in Texas found no substantiation, allowing him to resign quietly and shuffle between districts in Texas, Oklahoma, and Arkansas without red flags. We expose the systemic failures known as "passing the trash," where schools prioritize avoiding scandal over child safety, enabling potential predators to evade accountability. Featuring interviews with affected parents like Sierra Marcum and insights from experts on educator misconduct, this episode uncovers how warning signs were dismissed, leaving a trail of vulnerability that culminated in tragedy. #DevilsDenHomicide #AndrewMcGann #AllegedPredator #PassingTheTrash #SchoolSystemFailure #TeacherMisconduct #ChildSafety #TrueCrime #ArkansasMurder #IgnoredComplaints #EducatorAccountability #PodcastEpisode Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Devils Den Attacker Andrew McGann, Was Also An Alleged Child Predator With Claims Ignored In this gripping episode, we delve into the chilling case of James Andrew McGann, the 28-year-old suspect in the brutal double homicide at Devil's Den State Park, Arkansas, where he allegedly stabbed a married couple to death in front of their young daughters. But the horror doesn't stop there—McGann, a former elementary school teacher who went by "Drew," faced ignored complaints of inappropriate behavior toward young female students during his brief career. Despite parental reports of him being "very touchy" with girls, placing them on his lap, and making unsettling comments, internal investigations in Texas found no substantiation, allowing him to resign quietly and shuffle between districts in Texas, Oklahoma, and Arkansas without red flags. We expose the systemic failures known as "passing the trash," where schools prioritize avoiding scandal over child safety, enabling potential predators to evade accountability. Featuring interviews with affected parents like Sierra Marcum and insights from experts on educator misconduct, this episode uncovers how warning signs were dismissed, leaving a trail of vulnerability that culminated in tragedy. #DevilsDenHomicide #AndrewMcGann #AllegedPredator #PassingTheTrash #SchoolSystemFailure #TeacherMisconduct #ChildSafety #TrueCrime #ArkansasMurder #IgnoredComplaints #EducatorAccountability #PodcastEpisode Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
A woman is warning prosecutors to prepare for her demise, after a dangerous abuser with a violent history is freed -- despite her brutal 2-week kidnapping, torture ordeal. A monster, who sadistically tortured & killed his ex, is finally caged after a more than week-long manhunt. His mother is also behind bars accused of helping to cover up the horrific crime. Plus, a deep-fried dispute leaves a couple customers burned! Jennifer Gould reports. See omnystudio.com/listener for privacy information.
Yesterday, five men were sentenced to between 8 and a half and 14 years for their involvement in the horrific torture of Natalie Ennis, after they pleaded guilty to her false imprisonment and assault causing harm at a flat in Henrietta House in Dublin on the 26th of September last year. Natalie spoke to Claire in studio.
July 29, 2025 ~ Chris, Lloyd, and Jamie talk with Alli Baxter, multimedia journalist at UpNorthLive News, to recount the law enforcement and media's rapid response to a mass stabbing at a Traverse City Walmart.
Headlines: – Welcome to Mo News (02:00) – National Chocolate Day: Chocolate Price Going Up (02:30) – Michigan Walmart Mass Stabbing Suspect Faces Terrorism Charge (06:40) – Israel Announces Daily Military Pause In Gaza Amid International Pressure, Aid Airdrops Resume (10:00) – U.S. And E.U. Reach Tariff Agreement As Friday Deadline Looms (18:20) – Thailand, Cambodia Set For Ceasefire Talks After Trump's Push (23:00) – Democrats Polling Their Worst With Voters In Decades (24:50) – U.S. Birth Rate Hits All-Time Low (27:30) – Gwyneth Paltrow Hired By Astronomer As Temp Spokesperson After Coldplay KissCam Scandal (33:30) – On This Day In History (35:50) Thanks To Our Sponsors: – LMNT - Free Sample Pack with any LMNT drink mix purchase – Industrious - Coworking office. 30% off day pass – Athletic Greens – AG1 Powder + 1 year of free Vitamin D & 5 free travel packs – Incogni - 60% off an annual plan| Promo Code: MONEWS
Who is Juventus top 5 goalkeeper, defender, midfielder & attacker of all time? Nima Tavallaey and Carlo Garganese debate, discuss, and analyze a question on this topic sent in from patron/YouTube member. This is an extended clip from this weeks Q & A episode of The Italian Football Podcast available only to patrons on Patreon.com/TIFP and on YouTube Memberships. To listen to this & all other full episodes of The Italian Football Podcast (and support the show), go to Patreon.com/TIFP OR now also available on Spotify OR YouTube Memberships and sign up. Your support makes The Italian Football Podcast possible. Follow us: Twitter, Facebook, Instagram, YouTube Learn more about your ad choices. Visit podcastchoices.com/adchoices
Israel, long a prime target for cyber attacks, has seen a dramatic increase since the war with Iran last month. The cyber attackers are not just hitting institutional sights, but also going after civilians with sophisticated phishing campaigns, mostly to steal money. Reporter Arieh O’Sullivan spoke with Ori Segal, a co-founder and CEO of Cyvore, an Israeli cybersecurity firm, about the minds of the attackers and cautionary measures everyone should take. (photo: shuttersock) See omnystudio.com/listener for privacy information.
“Detection is not the end—it's just the beginning.” — Jerry Mancini, NETSCOUT In this episode of Technology Reseller News, Publisher Doug Green speaks with Jerry Mancini of NETSCOUT about the company's latest advancements in automated threat detection and response—with a particular focus on why telecommunications networks are uniquely vulnerable and high-value targets. NETSCOUT, long known for its deep packet inspection and network performance management, is expanding the capabilities of its adaptive threat analytics—a platform designed not only to detect threats but also to assemble and contextualize them using network-level intelligence. Beyond Detection: Seeing the Full Picture While most cybersecurity tools focus on isolated detections—EDR, firewall logs, and suspicious indicators—NETSCOUT's approach centers on reconstructing the complete threat narrative across the enterprise. By capturing packet data continuously and using workflows to connect disparate detections, NETSCOUT enables investigators to: Understand the root cause and lateral movement Detect activity before and after a flagged incident Integrate signals from multiple sources (EDR, NDR, WAF, and more) Investigate threats in real time and retrospectively Why Telcos Are at Greater Risk Mancini highlights the unique role of telco infrastructure in global data movement, making them prime targets for cyber espionage and traffic manipulation. Attackers, such as the Salt Typhoon group, have used compromised routers and peering points to reroute and eavesdrop on massive data flows—impacting not just carriers but their customers across the internet. Best Practices for Threat Hunters NETSCOUT supports both bottom-up investigations (starting with a detected incident) and top-down threat hunts (searching for indicators tied to known campaigns). The platform's ability to store and search packet-level data gives teams visibility that goes far beyond typical log-based detection tools. Mancini's key advice: “You need more than alerts—you need the data to trace back, understand what happened, and act before it's too late.” Where to Learn More Visit netscout.com to explore solutions in: Network Performance Management DDoS Detection & Mitigation Adaptive Threat Analytics NETSCOUT supports both enterprise and service provider environments and is available to assist with immediate and long-term threat management strategies.
The Medcurity Podcast: Security | Compliance | Technology | Healthcare
The domain looks right. The logo checks out. Even the login page feels familiar. But it isn't what it seems.Attackers are using subtle domain tricks—like typos, lookalike characters, and spoofed subdomains—to mimic trusted names in healthcare. These aren't high-tech hacks. They rely on speed, habit, and trust.Once you know what to watch for, they're easier to stop. Listen to the latest Medcurity Podcast for real examples and smart ways to stay ahead.Learn more about Medcurity here: https://medcurity.com#Healthcare #Cybersecurity #Compliance #HIPAA #SecurityRiskAnalysis
In this dynamic episode of The Segment, two of cybersecurity's biggest names reunite with host, Raghu Nandakumara, for a no-holds-barred conversation: John Kindervag, the godfather of Zero Trust, and Dr. Chase Cunningham, aka Dr. Zero Trust. What unfolds is a fast-paced, insight-packed dialogue that spans decades of hard-earned wisdom, unexpected humor, and a shared mission to demystify modern cyber defense.John and Chase reflect on the global evolution of Zero Trust—from its scrappy beginnings to its widespread adoption by Fortune 500s, military leaders, and even elder care facilities. They dive into why context-driven maps are now indispensable, how graph-based security is reshaping the cyber terrain, and where AI and automation can give defenders a real edge. Expect candid takes on the limits of SIEMs, the failure of red teaming without strategy, and why defenders need to start thinking like attackers if they want to win.There's personal reflection too—Chase shares why he was reluctant to pick up the Zero Trust torch, and John opens up about the real heart behind the strategy. With wit, war stories, and straight talk, they make a clear case: cybersecurity isn't about perfection—it's about deterrence, resilience, and knowing what truly matters. Topics Covered:The origin and global adoption of Zero Trust Why “good maps” are critical for cyber resilience Real-world applications of AI in cyber defense Why attackers often outmaneuver defenders—and how to change that The psychology of leadership in cybersecurity strategy From Chick-fil-A to Bletchley Park: the unexpected places Zero Trust shows up Chase's take on stock-picking based on breach trends (yes, really) Resources Mentioned:Think Like an Attacker by Dr. Chase Cunningham John Kindervag's Zero Trust 5-Step Model “Zero Trust Terrain & Holding the High Ground” LinkedIn Live Stay Connected with our host, Raghu on LinkedInFor more information about Illumio, check out our website at illumio.com
FBI has launched a criminal investigation of James Comey and John Brennan for their roles in investigating the alleged collusion between Trump and Russia. Visit the Howie Carr Radio Network website to access columns, podcasts, and other exclusive content.