POPULARITY
Categories
Big budget news for the Space Force from Capitol Hill. Quantum Space secured an additional $40 million to accelerate Ranger spacecraft. Attackers are increasingly targeting space assets with advanced malware. And, more. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. T-Minus Guest Our guest today is Celia Pelaz, COO at Spire Global. You can connect with Celia on LinkedIn, and learn more about Spire Global on their website. Selected Reading House appropriators unveil defense bill, boost Space Force funding (SpaceNews) Quantum Space raises $40 million (SpaceNews) Space ISAC articles - Constellations (Kratos) Axiom Mission 4 (Axiom) NASA raises the odds that an asteroid could hit the moon in 2032 (Space) Shenzhou-20 crew completes over 10 experiments, tests in past week (CGTN) CEO of space company Axiom breaks down what a $70 million ticket gets you (Business Insider) Space stocks soar as Elon Musk and Donald Trump argue (The Street) T-Minus Crew Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at space@n2k.com to request more info. Want to join us for an interview? Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
The coronial inquest into the death of LynnMall attacker Ahamed Samsudeen continues on Wednesday, after a forensic pathologist explained why he had zero chance of surviving as many as a dozen gunshot wounds. Finn Blackwell reports.
A new White House executive Order overhauls U.S. cybersecurity policy. The EU updates its “cybersecurity blueprint”. The Pentagon's inspector general investigates Defense Secretary Hegseth's Signal messages. Chinese hackers target U.S. smartphones. A new Mirai botnet variant drops malware on vulnerable DVRs. 17 popular Gluestack packages on NPM have been compromised. Attackers exploit vulnerabilities in Fortigate security appliances to deploy Qilin ransomware. A Nigerian man gets five years in prison for a hacking and fraud scheme. Our guest is Tim Starks from CyberScoop, discussing Sean Cairncross' journey toward confirmation as the next National Cyber Director. Fire Stick flicks spark a full-on legal blitz. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Tim Starks from CyberScoop, to discuss Sean Cairncross, who's bringing a focus on policy coordination if confirmed as the next National Cyber Director. Selected Reading Trump Administration Revises Cybersecurity Rules, Replaces Biden Order (Infosecurity Magazine) Europe arms itself against cyber catastrophe (Politico) Pentagon watchdog investigates if staffers were asked to delete Hegseth's Signal messages (Associated Press) Chinese hackers and user lapses turn smartphones into a 'mobile security crisis' (Associated Press) iMessage Zero-Click Attacks Suspected in Targeting of High-Value EU, US Individuals (SecurityWeek) New Mirai botnet infect TBK DVR devices via command injection flaw (Bleeping Computer) Malware found in NPM packages with 1 million weekly downloads (Bleeping Computer) Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware (Cyber Security News) Nigerian Involved in Hacking US Tax Preparation Firms Sentenced to Prison (SecurityWeek) Hacked Fire Sticks now come with more than just malware – a possible jail sentence (Cybernews) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
The Arsenal Transfer Show EP581 - Kepa Arrizabalaga, Benjamin Sesko, 3 Attackers Wanted!Join our Fantasy League: https://fantasy.premierleague.com/leagues/auto-join/kn7vdpTom presents a daily show on The Gooner Talk covering all the latest Arsenal news, Arsenal transfer news, match reaction, press conferences and much more plus a Q&A session taking questions from the LIVE chat. Get all your Arsenal news now and every day. Links to Fantasy code, Twitter, Instagram, audio-only platforms and our channel membership scheme including entry to the Discord community: https://linktr.ee/TheGoonerTalk Become a member at https://plus.acast.com/s/the-gooner-talk. Hosted on Acast. See acast.com/privacy for more information.
Howard, Chris and George evaluate the season of the attacking players at City, and Pep too. Another fascinating chat. *This is the first 15 minutes of the show. For the full episode, and all our other content on the 93:20 player, you can join below - for less than the price of a pint of beer each month.* ninetythreetwenty.com/9320-player/about-9320-player/ SIGN UP FOR OUR NEWSLETTER! A FREE WEEKLY UPDATE WITH NEW CONTENT GUARANTEED AND A WHOLE LOT MORE. CLICK THE LINK BELOW AND ENTER YOUR EMAIL IN THE BOX. ninetythreetwenty.com/the-9320-newsletter/
Bill O'Reilly talks about new crime stats for New York City. Learn more about your ad choices. Visit megaphone.fm/adchoices
Welcome to a special RSAC 2025 episode of the Breaking Badness Cybersecurity Podcast! Today, we delve into the critical role of domains in modern cyber attacks. From sophisticated nation-state operations to AI-powered phishing kits and malicious browser extensions, domains are the foundational infrastructure for threat actors. Host Kali Fencl is joined by four leading cybersecurity experts Joe Slowik, Robert Duncan, John Fokker and Vivek Ramachandran to break down how domains are weaponized and what organizations can do to defend themselves on this ever-evolving frontline
FBI and police officials said the family has cooperated with investigators, and Soliman said his family had no knowledge of his plans. That may not be enough to allow them to stay in the U.S. Guest Co-Host: Diane Pearce Please Like, Comment and Follow 'Broeske & Musson' on all platforms: --- The ‘Broeske & Musson Podcast’ is available on the KMJNOW app, Apple Podcasts, Spotify or wherever else you listen to podcasts. --- ‘Broeske & Musson' Weekdays 9-11 AM Pacific on News/Talk 580 AM & 105.9 FM KMJ | Facebook | Podcast| X | - Everything KMJ KMJNOW App | Podcasts | Facebook | X | Instagram See omnystudio.com/listener for privacy information.
The man who attacked a group of Jewish people in Boulder over the weekend has been charged. BJ was trying to sell his old BMW on Facebook marketplace. He listed the car for $1000. A woman got in contact with him about the car and then she never showed up. The trial with Justin Baldoni and Blake Lively just had an interesting turn of events.
Send us a textWe explore the recent LexisNexus data breach that exposed sensitive personal information of over 364,000 individuals through a third-party platform accessing their GitHub account. This incident highlights critical vulnerabilities in how data brokers handle our most sensitive information and raises questions about regulatory oversight.• Data exposed included names, date of birth, phone numbers, social security numbers, and driver's license numbers• The breach occurred when someone accessed the company's GitHub account through a third-party platform• Attackers likely found hard-coded credentials that allowed them to move laterally through systems • Data brokers operate with minimal regulation despite handling massive amounts of sensitive information• Better governance policies and automated privacy operations could significantly reduce these risks• Both technical solutions and regulatory approaches are needed to protect consumer dataBreach Occurred: December 25, 2024.Discovery: April 1, 2025.Public Notification: May 27, 2025.Notice Letters Sent: May 24, 2025.Shameless plus: Check out tools like Transcend's autonomous privacy operations to help prevent similar incidents and continue to monitor your privacy activities. Support the show
Forecast = Stormy with a chance of TikTok malware showers—exploit scoring systems hot, but patch management outlook remains partly cloudy. Welcome to Storm⚡️Watch! In this episode, we're diving into the current state of cyber weather with a mix of news, analysis, and practical insights. This week, we tackle a fundamental question: are all exploit scoring systems bad, or are some actually useful? We break down the major frameworks: **CVSS (Common Vulnerability Scoring System):** The industry standard for assessing vulnerability severity, CVSS uses base, temporal, and environmental metrics to give a comprehensive score. It's widely used but has limitations—especially since it doesn't always reflect real-world exploitability. **Coalition Exploit Scoring System (ESS):** This system uses AI and large language models to predict the likelihood that a CVE will be exploited in the wild. ESS goes beyond technical severity, focusing on exploit availability and usage probabilities, helping organizations prioritize patching with better accuracy than CVSS alone. **EPSS (Exploit Prediction Scoring System):** EPSS is a data-driven approach that estimates the probability of a vulnerability being exploited, using real-world data from honeypots, IDS/IPS, and more. It updates daily and helps teams focus on the most urgent risks. **VEDAS (Vulnerability & Exploit Data Aggregation System):** VEDAS aggregates data from over 50 sources and clusters vulnerabilities, providing a score based on exploit prevalence and maturity. It's designed to help teams understand which vulnerabilities are most likely to be actively exploited. **LEV/LEV2 (Likely Exploited Vulnerabilities):** Proposed by NIST, this metric uses historical EPSS data to probabilistically assess exploitation, helping organizations identify high-risk vulnerabilities that might otherwise be missed. **CVSS BT:** This project enriches CVSS scores with real-world threat intelligence, including data from CISA KEV, ExploitDB, and more. It's designed to help organizations make better patching decisions by adding context about exploitability. Next, we turn our attention to a troubling trend: malware distribution via TikTok. Attackers are using AI-generated videos, disguised as helpful software activation tutorials, to trick users into running malicious PowerShell commands. This “ClickFix” technique has already reached nearly half a million views. The malware, including Vidar and StealC, runs entirely in memory, bypassing traditional security tools and targeting credentials, wallets, and financial data. State-sponsored groups from Iran, North Korea, and Russia have adopted these tactics, making it a global concern. For employees, the takeaway is clear: never run PowerShell commands from video tutorials, and always report suspicious requests to IT. For IT teams, consider disabling the Windows+R shortcut for standard users, restrict PowerShell execution, and update security awareness training to include social media threats. We also highlight the latest from Censys, VulnCheck, runZero, and GreyNoise—industry leaders providing cutting-edge research and tools for vulnerability management and threat intelligence. Don't miss GreyNoise's upcoming webinar on resurgent vulnerabilities and their impact on organizational security. And that's a wrap for this episode! We will be taking a short break from Storm Watch for the summer. We look forward to bringing more episodes to you in the fall! Storm Watch Homepage >> Learn more about GreyNoise >>
Learn more about your ad choices. Visit megaphone.fm/adchoices
Mohamed Soliman originally came to the US legally, but his visas had expired by the time of Sunday's attack. ABC contributor and former counterterrorism coordinator for DHS John Cohen tells us more about Soliman.
Democrats need a plan to take down the Anti Semitism in the USA. Former President Biden made an appearance over the weekend at Delaware's Memorial Day Event. Joe Biden said he is feeling good after the treatments of his cancer. Mark Interviews NY Post Columnist Michael Goodwin. Michael believes that someone in the Biden Administration knew he had cancer the whole time. Jake Tapper Continues to get heat over his book. Tim Walz is most likely going to be disqualified from any kind of political victory in the future. Mark has details about the latest Ukraine strike on Russia. CNN's Jake Tapper's set an all-time record for low ratings, even though he tried to justify his decision on writing the book about Biden's decline. Mark has a secret on how to lose weight that celebrities do. President Trump was asked about a possible pardon for Diddy and what was Trump's response? Mark Interviews CNBC Contributor Jake Novak. Jake and Mark breakdown the horrible terrorist attack that happened in Colorado over the weekend. The Dems opening the border the last 4 years was a bad recipe for disaster. 6 months later and there isn't really a major player for the Democrats to take Center Stage. See omnystudio.com/listener for privacy information.
Mark has details about the latest Ukraine strike on Russia. CNN's Jake Tapper's set an all-time record for low ratings, even though he tried to justify his decision on writing the book about Biden's decline. Mark has a secret on how to lose weight that celebrities do. President Trump was asked about a possible pardon for Diddy and what was Trump's response? Mark Takes Your Calls! Mark Interviews CNBC Contributor Jake Novak. Jake and Mark breakdown the horrible terrorist attack that happened in Colorado over the weekend. The Dems opening the border the last 4 years was a bad recipe for disaster. 6 months later and there isn't really a major player for the Democrats to take Center Stage.
Democrats need a plan to take down the Anti Semitism in the USA. Former President Biden made an appearance over the weekend at Delaware's Memorial Day Event. Joe Biden said he is feeling good after the treatments of his cancer. Mark Interviews NY Post Columnist Michael Goodwin. Michael believes that someone in the Biden Administration knew he had cancer the whole time. Jake Tapper Continues to get heat over his book. Tim Walz is most likely going to be disqualified from any kind of political victory in the future. Mark has details about the latest Ukraine strike on Russia. CNN's Jake Tapper's set an all-time record for low ratings, even though he tried to justify his decision on writing the book about Biden's decline. Mark has a secret on how to lose weight that celebrities do. President Trump was asked about a possible pardon for Diddy and what was Trump's response? Mark Interviews CNBC Contributor Jake Novak. Jake and Mark breakdown the horrible terrorist attack that happened in Colorado over the weekend. The Dems opening the border the last 4 years was a bad recipe for disaster. 6 months later and there isn't really a major player for the Democrats to take Center Stage.
Mark has details about the latest Ukraine strike on Russia. CNN's Jake Tapper's set an all-time record for low ratings, even though he tried to justify his decision on writing the book about Biden's decline. Mark has a secret on how to lose weight that celebrities do. President Trump was asked about a possible pardon for Diddy and what was Trump's response? Mark Takes Your Calls! Mark Interviews CNBC Contributor Jake Novak. Jake and Mark breakdown the horrible terrorist attack that happened in Colorado over the weekend. The Dems opening the border the last 4 years was a bad recipe for disaster. 6 months later and there isn't really a major player for the Democrats to take Center Stage. See omnystudio.com/listener for privacy information.
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what's keeping IT decision-makers awkward at night, and the best approach to creating a proactive security measure. Cyber Resilience in Action: A Guide for Mid-Market Firms This segment is sponsored by CTG. Visit https://securityweekly.com/ctgrsac to learn more about them! Nightwing Interview Nightwing divested from Raytheon in April 2024 and is entering another year of redefining national security. Amid emerging threats and shifting industry regulations and compliance frameworks, traditional security measures are no longer cutting it. As Cyber Incident Response Manager at Nightwing, Nick Carroll discusses how organizations can continue to build cyber resiliency and stay one step ahead in today's threat landscape. This segment is sponsored by Nightwing. Visit https://securityweekly.com/nightwingrsac to learn more about them! Segment 2 Libraesva Interview Generative AI is having a transformative effect across almost every industry, but arguably the area it has had the most significant impact is cybercrime. Discriminative AI can now learn to recognize what constitutes normal communication patterns, so anything out of the ordinary can be flagged. AI is also enabling human security analysts to automate the triage of reported emails, to rapidly identify false positives and keep up with emerging cybercriminal tactics. Finally, specialized Small Language Models (SLMs) using neural networks are able to analyze and comprehend the semantic intent of the message. This segment is sponsored by Libraesva. Visit https://securityweekly.com/libraesvarsac to learn more about them! IRONSCALES Interview Phishing has evolved—fast. What started as basic email scams has transformed into AI-powered cyber deception. Phishing 1.0: Early phishing relied on spam emails, fake banking alerts, and malware links to trick users into clicking Phishing 2.0: Attackers got smarter—instead of mass emails, they started impersonating real people Phishing 3.0: Now, cybercriminals are using AI to generate fake but highly convincing voices, videos, and images IRONSCALES discusses the current gaps in SEG technology and will showcase industry-first innovations for protection against deepfakes. Assessing Organizational Readiness in the Face of Emerging Cyber Threat Using AI to Enhance Defensive Cybersecurity white paper The Hidden Gaps of SEG Protection white paper This segment is sponsored by IRONSCALES. Visit https://securityweekly.com/ironscalesrsac to learn more about them! Segment 3 Illumio Interview In the post-breach world, speed and clarity are essential for effective cybersecurity. Security teams are inundated with vast amounts of data, much of which is not actionable. To combat cyber threats—and level the playing field—defenders need precise intelligence to identify attacks, dynamically quarantine threats, and prevent cyber disasters, highlighting the power of the security graph. Segment Resources: Rethinking Threat Detection in a Decentralized World Illumio Insights Announcement More information about Illumio Insights This segment is sponsored by Illumio. Visit https://securityweekly.com/illumiorsac for information on Illumio Insights or to sign up for a private preview! ESET Interview The ransomware landscape is rapidly changing. ESET global research team has been closely following ransomware gang disruptions, new players and how the RaaS business model continues to evolve. In this segment, Tony Anscombe will take a look into recent research, hacks and attacks, and explore how the industry and businesses are responding to combat financial risk and mitigate threats. Segment Resources: https://www.welivesecurity.com/en/eset-research/shifting-sands-ransomhub-edrkillshifter/ https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2024/ This segment is sponsored by ESET. Visit https://securityweekly.com/esetrsac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-409
Solana spot ETF applications, the OCC green lighting digital asset activity and the US emphasizing its desire to be the crypto capital of the world. It's hard not to feel the momentum that is happening in the US and worldwide when it comes to crypto transforming traditional banking. In this “Live from Links” episode, Eitan Danon (Content Marketing Manager, Chainalysis) has an in person discussion with Carlos Salinas, Head of Digital Assets at Morabanc on the fascinating intersection of fintech, digital assets and traditional banking in Andorra. Carlos shares how his bank has responded to both client demand and new forms of economic activity, highlighting their novel digital asset custody solutions and the transformative role of regulatory frameworks that Andorra implemented three years ahead of its European peers, allowing Morabanc to navigate the burgeoning digital asset landscape effectively. The conversation highlights the crucial balance between risk mitigation and innovation, drawing parallels between the evolution of derivatives and the current wave of cryptocurrencies, while discussing the bank's strategy in offering stablecoin-based settlement solutions. This is truly a snapshot of current trends but also a look at the future potential for programmable finance and digital assets. Minute-by-minute episode breakdown 2 | Comparing derivatives in the early 2000s to early days of cryptocurrency 4 | Andorra: Unique characteristics and financial environment 6 | Morabanc's role in digital asset custody came from customer demand 11 | The impact the USA momentum on digital assets has around the world 14 | Introducing Morabanc's revolutionary new stablecoin settlement solution 19 | Consumer protection and crypto security at Morabanc 21 | Future roadmap for Morabanc and digital assets 25 | Attackers try to hack Carlos on LinkedIn Related resources Check out more resources provided by Chainalysis that perfectly complement this episode of the Public Key. Website: Morabanc: We understand the new role of responsible banking, bringing greater value to our stakeholders Blog: New LinkedIn Scam: How to Detect It and Protect Yourself Announcement: MoraBanc offers the first digital asset custody wallet in Andorra Customer Story: Morabanc serves as trusted entry point to world of digital assets Event: Links 2025 Digital Premiere: Free virtual event bringing together the leaders defining the future of blockchain intelligence Blog: U.S. Senate Advances GENIUS Act: Long Awaited Stablecoin Framework Edges Closer to Reality Blog: What the Huione Group Shutdown Signals About the Future of Crypto Scam Infrastructure YouTube: Chainalysis YouTube page Twitter: Chainalysis Twitter: Building trust in Speakers on today's episode Eitan Danon *host* (Content Marketing Manager, Chainalysis) Carlos Salinas (Head of Digital Assets, Morabanc) This website may contain links to third-party sites that are not under the control of Chainalysis, Inc. or its affiliates (collectively “Chainalysis”). Access to such information does not imply association with, endorsement of, approval of, or recommendation by Chainalysis of the site or its operators, and Chainalysis is not responsible for the products, services, or other content hosted therein. Our podcasts are for informational purposes only, and are not intended to provide legal, tax, financial, or investment advice. Listeners should consult their own advisors before making these types of decisions. Chainalysis has no responsibility or liability for any decision made or any other acts or omissions in connection with your use of this material. Chainalysis does not guarantee or warrant the accuracy, completeness, timeliness, suitability or validity of the information in any particular podcast and will not be responsible for any claim attributable to errors, omissions, or other inaccuracies of any part of such material. Unless stated otherwise, reference to any specific product or entity does not constitute an endorsement or recommendation by Chainalysis. The views expressed by guests are their own and their appearance on the program does not imply an endorsement of them or any entity they represent. Views and opinions expressed by Chainalysis employees are those of the employees and do not necessarily reflect the views of the company.
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what's keeping IT decision-makers awkward at night, and the best approach to creating a proactive security measure. Cyber Resilience in Action: A Guide for Mid-Market Firms This segment is sponsored by CTG. Visit https://securityweekly.com/ctgrsac to learn more about them! Nightwing Interview Nightwing divested from Raytheon in April 2024 and is entering another year of redefining national security. Amid emerging threats and shifting industry regulations and compliance frameworks, traditional security measures are no longer cutting it. As Cyber Incident Response Manager at Nightwing, Nick Carroll discusses how organizations can continue to build cyber resiliency and stay one step ahead in today's threat landscape. This segment is sponsored by Nightwing. Visit https://securityweekly.com/nightwingrsac to learn more about them! Segment 2 Libraesva Interview Generative AI is having a transformative effect across almost every industry, but arguably the area it has had the most significant impact is cybercrime. Discriminative AI can now learn to recognize what constitutes normal communication patterns, so anything out of the ordinary can be flagged. AI is also enabling human security analysts to automate the triage of reported emails, to rapidly identify false positives and keep up with emerging cybercriminal tactics. Finally, specialized Small Language Models (SLMs) using neural networks are able to analyze and comprehend the semantic intent of the message. This segment is sponsored by Libraesva. Visit https://securityweekly.com/libraesvarsac to learn more about them! IRONSCALES Interview Phishing has evolved—fast. What started as basic email scams has transformed into AI-powered cyber deception. Phishing 1.0: Early phishing relied on spam emails, fake banking alerts, and malware links to trick users into clicking Phishing 2.0: Attackers got smarter—instead of mass emails, they started impersonating real people Phishing 3.0: Now, cybercriminals are using AI to generate fake but highly convincing voices, videos, and images IRONSCALES discusses the current gaps in SEG technology and will showcase industry-first innovations for protection against deepfakes. Assessing Organizational Readiness in the Face of Emerging Cyber Threat Using AI to Enhance Defensive Cybersecurity white paper The Hidden Gaps of SEG Protection white paper This segment is sponsored by IRONSCALES. Visit https://securityweekly.com/ironscalesrsac to learn more about them! Segment 3 Illumio Interview In the post-breach world, speed and clarity are essential for effective cybersecurity. Security teams are inundated with vast amounts of data, much of which is not actionable. To combat cyber threats—and level the playing field—defenders need precise intelligence to identify attacks, dynamically quarantine threats, and prevent cyber disasters, highlighting the power of the security graph. Segment Resources: Rethinking Threat Detection in a Decentralized World Illumio Insights Announcement More information about Illumio Insights This segment is sponsored by Illumio. Visit https://securityweekly.com/illumiorsac for information on Illumio Insights or to sign up for a private preview! ESET Interview The ransomware landscape is rapidly changing. ESET global research team has been closely following ransomware gang disruptions, new players and how the RaaS business model continues to evolve. In this segment, Tony Anscombe will take a look into recent research, hacks and attacks, and explore how the industry and businesses are responding to combat financial risk and mitigate threats. Segment Resources: https://www.welivesecurity.com/en/eset-research/shifting-sands-ransomhub-edrkillshifter/ https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2024/ This segment is sponsored by ESET. Visit https://securityweekly.com/esetrsac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-409
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what's keeping IT decision-makers awkward at night, and the best approach to creating a proactive security measure. Cyber Resilience in Action: A Guide for Mid-Market Firms This segment is sponsored by CTG. Visit https://securityweekly.com/ctgrsac to learn more about them! Nightwing Interview Nightwing divested from Raytheon in April 2024 and is entering another year of redefining national security. Amid emerging threats and shifting industry regulations and compliance frameworks, traditional security measures are no longer cutting it. As Cyber Incident Response Manager at Nightwing, Nick Carroll discusses how organizations can continue to build cyber resiliency and stay one step ahead in today's threat landscape. This segment is sponsored by Nightwing. Visit https://securityweekly.com/nightwingrsac to learn more about them! Segment 2 Libraesva Interview Generative AI is having a transformative effect across almost every industry, but arguably the area it has had the most significant impact is cybercrime. Discriminative AI can now learn to recognize what constitutes normal communication patterns, so anything out of the ordinary can be flagged. AI is also enabling human security analysts to automate the triage of reported emails, to rapidly identify false positives and keep up with emerging cybercriminal tactics. Finally, specialized Small Language Models (SLMs) using neural networks are able to analyze and comprehend the semantic intent of the message. This segment is sponsored by Libraesva. Visit https://securityweekly.com/libraesvarsac to learn more about them! IRONSCALES Interview Phishing has evolved—fast. What started as basic email scams has transformed into AI-powered cyber deception. Phishing 1.0: Early phishing relied on spam emails, fake banking alerts, and malware links to trick users into clicking Phishing 2.0: Attackers got smarter—instead of mass emails, they started impersonating real people Phishing 3.0: Now, cybercriminals are using AI to generate fake but highly convincing voices, videos, and images IRONSCALES discusses the current gaps in SEG technology and will showcase industry-first innovations for protection against deepfakes. Assessing Organizational Readiness in the Face of Emerging Cyber Threat Using AI to Enhance Defensive Cybersecurity white paper The Hidden Gaps of SEG Protection white paper This segment is sponsored by IRONSCALES. Visit https://securityweekly.com/ironscalesrsac to learn more about them! Segment 3 Illumio Interview In the post-breach world, speed and clarity are essential for effective cybersecurity. Security teams are inundated with vast amounts of data, much of which is not actionable. To combat cyber threats—and level the playing field—defenders need precise intelligence to identify attacks, dynamically quarantine threats, and prevent cyber disasters, highlighting the power of the security graph. Segment Resources: Rethinking Threat Detection in a Decentralized World Illumio Insights Announcement More information about Illumio Insights This segment is sponsored by Illumio. Visit https://securityweekly.com/illumiorsac for information on Illumio Insights or to sign up for a private preview! ESET Interview The ransomware landscape is rapidly changing. ESET global research team has been closely following ransomware gang disruptions, new players and how the RaaS business model continues to evolve. In this segment, Tony Anscombe will take a look into recent research, hacks and attacks, and explore how the industry and businesses are responding to combat financial risk and mitigate threats. Segment Resources: https://www.welivesecurity.com/en/eset-research/shifting-sands-ransomhub-edrkillshifter/ https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2024/ This segment is sponsored by ESET. Visit https://securityweekly.com/esetrsac to learn more about them! Show Notes: https://securityweekly.com/esw-409
Ciara on Insta: / missredmondxxx0:00 Youur journey 0:19 Miracles 1:06 brother diagnosed with cancer 1:30 family dynamics 2:00 Playing up in school 2:10 I was bullied 2:30 Meeting Mark 2:40 21 yeas older than me 3:20 It clicked 3:45 Injuries4:50 The hospital phoned my dad 5:00 I was running away 5:10 There was always excuses 5:20 What was your escape 5:50 I thought mark was my escape 6:50 No freedom of choice 7:15 Thrown out of a balcony 8:40 Armed response 9:10 I was his 11:00 Injury 13:10 Massive void 15:30 Consent 16:20 Adiction 18:30 Vulnerable girls 19:20 Control of my mind , body and soul 19:30 Osman warning 20:19 Stalked up untill 2019 22:10 Standing up for myself 22:40 STI25:30 Cementary 28:20 Coping mechanism 28:50 Credit card fraud gang 33:00 Fireproof windows and letterboxes 37:20 The vybe I was getting 38:35 bang to my face 39:40 Feeling disorientated 43:40 I was exhausted 44:00 Bite marks 44:40 lights beamed 45:40 The door was opened 46:35 Daddy come get me 48:20 Operation 49:00 Going half blind 50:00 Eye impairment 51:05 Mediocre pain killers 52:20 Pannic attacks 57:35 6 victims 59:50 Victim number 4 1:05:10 Plead deal 1:05:20 Police interview 1:07:10 He is drawing me 1:09:20 Crime scene 1:09:50 Drinking from a straw 1:10:30 she has lost her teeth 1:13:50 There is no help1:15:50 his brother is grooming 1:24:30 Life skills 1:25:41 How do we support someone with a drug addiction 1:27:05 6ixth sense 1:27:10 His soul is too beautiful 1:28:10 Your not duty bound 1:28:40 Loosing yourself 1:30:10 Special visit 1:33:40 Grooming
In this OODAcast episode, host Matt Devost sits down with Maxie Reynolds, author of The Art of the Attack, to explore the evolution of her unique career from offshore oil rigs to elite red teaming and cybersecurity innovation. Maxie shares how her unconventional path, working a decade in oil and gas, earning degrees while on remote rigs, and eventually breaking into cybersecurity at PwC, shaped her approach to physical and digital security. Her journey led to the creation of a company that builds underwater data centers, a novel fusion of her industrial and red teaming experiences. She discusses the rising interest in submerged infrastructure, particularly after China's moves in the space and the demands of modern AI-driven cooling systems. The conversation dives deep into what it means to adopt an "attacker mindset", seeing opportunities where others see obstacles and using architecture, human psychology, and environment as vectors for access. Maxi outlines how her social engineering engagements hinge on understanding perception, psychology, and pretext creation rather than just technical exploits. She offers real-world stories of infiltrating secure facilities and engaging high-stakes targets using layered personas and misdirection. Through it all, she emphasizes the role of self-awareness, stress management, and emotional discipline in high-pressure operations, often drawing parallels between red teaming and stoicism. Maxie and Matt also examine how to responsibly deliver red team results to leadership, balancing candor with empathy to ensure organizations grow stronger without shame or defensiveness. They reflect on the future of AI in security, the persistence of physical threats, and the irreplaceable value of human judgment. The episode wraps with a powerful reading list and a shared love of books, highlighting titles that explore geopolitics, materials science, and the ungoverned world of the open ocean. This episode is packed with insight, storytelling, and practical wisdom for cybersecurity professionals, technologists, and leaders looking to understand how adversaries think—and how to outsmart them. Additional Links: The Art of Attack: Attacker Mindset for Security Professionals by Maxie Reynolds Maxie on Twitter/X Book Recommendations: How the World Really Works: The Science Behind How We Got Here and Where We're Going by Vaclav Smil The Outlaw Ocean: Journeys Across the Last Untamed Frontier by Ian Urbina Prisoners of Geography: Ten Maps That Explain Everything About the World by Tim Marshall Chip War: The Fight for the World's Most Critical Technology by Chris Miller Stuff Matters: Exploring the Marvelous Materials That Shape Our Man-Made World by Mark Miodownik
Another call with Peter Wilson discussing how to prepare for Court and self defence in these dangerous times. #commonlaw #natural law #sovereignityAbout my Guest:Ex Royal Navy gunner and armourer, turned professional fighter. Owned and ran own martial arts gym for about 30 years. Always been aware of something not being right in the world, went deep into it after losing over £1million of property in 1 week including own home. So been up and been down even living in a car for a while with his wife Janine and 4 dogs. ---Awakening Podcast Social Media / Coaching My Other Podcasts https://roycoughlan.com/ ------------------What we Discussed: 00:45 Where did the Name Checkmate the Matrix come from08:20 Social media Attacks17:00 How to Protect yourself with uprise in Crime 18:50 You are going to be the Bodyguard of You22:00 Weapons to protect you28:10 Attackers do not want to be identified29:40 How do we Create Proper Legal Files33:20 A case against a local council34:20 Acting as a Trustee instead of a McKenzie friend38:30 Council woman claiming she underdtood the law44:00 Council Create their own Rules46:50 The File Needed for Court50:10 3 Copies of the Files needed for Court53:40 Are they allowed to Redact information on the documents 58:45 Getting video recordings after a Data Request1:03:00 Choose your Battles1:06:00 You must always reply to Registed Letter1:09:00 The Companies wait untill the last day to submit a claim1:11:00 AIB Bank did illegal activities1:13:00 The Pigeons must be in small groups and injected1:15:50 Chicken Farm destroyed1:17:00 Wild Cows in the UK1:21:00 Coal Mined in Australia sent to Japan then to UK1:23:00 The Peat in Ireland imported after closing Peat bogs1:23:00 Amazon trees cut for Climate change event1:23:45 The Stupidity of the Climate Change Activists1:26:25 Trying to catch Mc Donalds customers that dump packaging How to Contact Peter: https://www.claimyourstrawman.com/ https://checkmatethematrix.com/?linkId=lp_513119&sourceId=roy&tenantId=checkmate-the-matrix https://linktr.ee/PeterWilsonReturnToDemocracy ------------------------------More about the Awakening Podcast:All Episodes can be found at www.awakeningpodcast.org My Facebook Group Mentioned in this Episode https://www.facebook.com/profile.php?id=61572386459383 Awakening Podcast Social Media / Coaching My Other Podcasts https://roycoughlan.com/ Our Facebook Group can be found at https://www.facebook.com/royawakening #checkmatethematrix #ucc #peterwilson #trustee
Total Soccer Show: USMNT, EPL, MLS, Champions League and more ...
We have the latest 60-player provisional roster for the USMNT, and we also have... waaaay too many thoughts about it. Surprise inclusions and omissions, our preferred final rosters and starting elevens, and a deeper look at what the pool itself reveals about the state of the program.WE HAVE A YOUTUBE CHANNEL!We're posting all our episodes here! Smash the like and subscribe etc.!JOIN THE TSS+ PATREON!Check out our Patreon, which houses bonus podcasts, access to our exclusive Discord, blog posts, videos, and much more. Hosted on Acast. See acast.com/privacy for more information.
03:29 Report claims feds fabricated 97% of phoenix police civil rights violation findings23:14 Cop shoots suspect who forced his way into woman's home38:07 Male attacker picks the wrong fight with officer ending in deadly shootingLEO Round Table (law enforcement talk show)Season 10, Episode 100 (2,439) filmed on 05/19/20251. https://www.tampafp.com/doj-deception-report-claims-feds-fabricated-97-of-phoenix-police-civil-rights-violation-findings/#google_vignette2. https://rumble.com/v6th47n-fort-wayne-police-department-released-bodycam-of-a-deadly-shooting-of-a-man.html?e9s=src_v1_upp3. https://rumble.com/v6th06l-man-shot-killed-by-jso-officer-after-attacking-girlfriend-charging-at-patro.html?e9s=src_v1_uppShow Panelists and Personalities:Chip DeBlock (Host and retired police detective)Dr. Travis Yates (retired major)Jeff Wenninger (retired lieutenant and Founder & CEO of Law Enforcement Consultants, LLC)Related Events, Organizations and Books:Retired DEA Agent Robert Mazur's works:Interview of Bryan Cranston about him playing Agent Robert Mazur in THE INFILTRATOR filmhttps://vimeo.com/channels/1021727Trailer for the new book, THE BETRAYALhttps://www.robertmazur.com/wp-content/uploads/2023/05/The-Betrayal-trailer-reMix2.mp4Everything on Robert Mazurhttps://www.robertmazur.com/The Wounded Blue - Lt. Randy Sutton's charityhttps://thewoundedblue.org/Rescuing 911: The Fight For America's Safety - by Lt. Randy Sutton (Pre-Order)https://rescuing911.org/Books by panelist and retired Lt. Randy Sutton:https://www.amazon.com/Randy-Sutton/e/B001IR1MQU%3Fref=dbs_a_mng_rwt_scns_shareThey're Lying: The Media, The Left, and The Death of George Floyd - by Liz Collin (Lt. Bob Kroll's wife)https://thelieexposed.com/Lt. Col. Dave Grossman - Books, Newsletter, Presentations, Shop, Sheepdogshttps://grossmanontruth.com/Sheriff David Clarke - Videos, Commentary, Podcast, Shop, Newsletterhttps://americassheriff.com/Content Partners:Red Voice Media - Real News, Real Reportinghttps://www.redvoicemedia.com/shows/leo/ThisIsButter - One of the BEST law enforcement video channelshttps://rumble.com/user/ThisIsButterThe Free Press - LEO Round Table is in their Cops and Crimes section 5 days a weekhttps://www.tampafp.com/https://www.tampafp.com/category/cops-and-crime/Video Show Schedule On All Outlets:http://leoroundtable.com/home/syndication/Syndicated Radio Schedule:http://leoroundtable.com/radio/syndicated-radio-stations/Sponsors:Galls - Proud to serve America's public safety professionalshttps://www.galls.com/leoCompliant Technologies - Cutting-edge non-lethal tools to empower and protect those who servehttps://www.complianttechnologies.net/Blue To Gold - training that is relevant and relatable to every street officerhttps://bluetogold.com/The International Firearm Specialist Academy - The New Standard for Firearm Knowledgehttps://www.gunlearn.com/MyMedicare.live - save money in Medicare insurance options from the expertshttp://www.mymedicare.live/
Preview Colleague Ambassador Husain Haqqani asks for more information regarding the Kashmir terror attackers who provoked the nuclear talk drama. More later. 1965 PAKISTAN-INDIA WAR
Welcome to another episode of The Transfer Show as Dave Davis & Trev Downey talk all things Transfers for Europe & Liverpool with big moves coming! Learn more about your ad choices. Visit podcastchoices.com/adchoices
Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.
On this week's episode, Claire presents her MVP candidate shortlist as the NWSL season dips into the second third of the year. Attackers have been reigning supreme, but which pros and cons could lead to the biggest individual award of 2025?
This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversing with Hopper Supercharge your Ghidra with AI Pretending to be an anti-virus to bypass anti-virus macOS RCE - perfect colors End of life routers are a hackers dream, and how info sharing sucks Ransomware in your CPU Disable ASUS DriverHub Age verification and privacy concerns Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-874
This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversing with Hopper Supercharge your Ghidra with AI Pretending to be an anti-virus to bypass anti-virus macOS RCE - perfect colors End of life routers are a hackers dream, and how info sharing sucks Ransomware in your CPU Disable ASUS DriverHub Age verification and privacy concerns Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-874
This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversing with Hopper Supercharge your Ghidra with AI Pretending to be an anti-virus to bypass anti-virus macOS RCE - perfect colors End of life routers are a hackers dream, and how info sharing sucks Ransomware in your CPU Disable ASUS DriverHub Age verification and privacy concerns Show Notes: https://securityweekly.com/psw-874
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Apple Updates Everything Apple patched all of its operating systems. This update ports a patch for a recently exploited vulnerability to older versions of iOS and macOS. https://isc.sans.edu/diary/31942 It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stupid 2013 Router Vulnerabilities Versions of the Mirai botnet are attacking devices made by Unipi Technology. These devices are using a specific username and password combination. In addition, this version of the Mirai botnet will also attempt exploits against an old Netgear vulnerability. https://isc.sans.edu/diary/It%20Is%202025%2C%20And%20We%20Are%20Still%20Dealing%20With%20Default%20IoT%20Passwords%20And%20Stupid%202013%20Router%20Vulnerabilities/31940 Output Messenger Vulnerability The internal messenger application Output Messenger is currently used in sophisticated attacks. Attackers are exploiting a path traversal vulnerability that has not been fixed. https://www.outputmessenger.com/cve-2025-27920/ Commvault Correction Commvault s patch indeed fixes the recent vulnerability. The Pioneer Release Will Dormann used to experiment will only offer patches after it has been registered, which leads to an error when assessing the patch s efficacy. https://www.darkreading.com/application-security/commvault-patch-works-as-intended
On this week's Security Sprint, Dave and Andy covered the following topics:Warm Open:• ICYMI: REGISTER NOW! WaterISAC's 2025 H2OSecCon! (20 May) From cybersecurity to climate resilience, operational continuity to public trust, we must collaborate across sectors to build smarter, stronger, and more adaptive systems. That's why we're inviting leaders like you to join the WaterISAC's 2025 H2OSecCon. Connect with peers and leaders committed to enhancing the resilience of our nation's critical systems.Main Topics:Ransomware & Data Breaches: • Monday was Anti-Ransomware Day 2025! What a great time to invest in ransomware resilience! Contact Gate 15 today to get to work building your Cyber Incident Response Plan and ransomware procedures, to start planning your next ransomware workshop or tabletop exercise, to plan for post-incident analysis or to take advantage of our new very price-friendly ransomware exercise for executives – designed especially for small and medium businesses! • Explore the latest cyber risks and claims trends from Coalition. LockBit ransomware gang hacked, victim negotiations exposed• Reminder! Criminals lie and NEVER DELETE YOUR DATA! School boards hit with ransom demands linked to PowerSchool cyberattack• M&S 'had no plan' for cyber attacks, insider claims, with 'staff left sleeping in the office amid paranoia and chaos' • The Very Real Costs of Ransomware: IT warning after hackers close 160-year-old firm. Extremism:• Ohio Man Charged with Threatening State Public Officials • Texas Man Convicted of Making Threats to Kill Nashville District Attorney Glenn Funk • FBI has opened 250 investigations tied to violent online network '764' that preys on teens, top official says• Teenage Terrorists Are a Growing Threat to Europe's SecurityUSG Transitions• Trump's 2026 budget proposes $163 billion cut to non-defense spending, slashes CISA and FEMA funding• White House Proposes $500 Million Cut to CISA• Hegseth orders Pentagon to cut number of senior generals by 20%• Lawmakers question Noem over cuts to CISA, FEMA, TSA• Lawmakers grill Noem over CISA funding cuts, demand Trump cyber plan• NSA to cut up to 2,000 civilian roles as part of intel community downsizing• NIST loses key cyber experts in standards and researchIndia strikes Pakistan over tourist killings, Pakistan says it will retaliate• Kashmir crisis live: Pakistan PM authorises armed forces to undertake ‘corresponding action' after India strikes kill 26• Pakistan vows to respond after India launches strikes in wake of Kashmir massacre• Pakistan claims to have downed Indian warplanes, vows response to strikes• China urges restraint as India-Pakistan tensions escalate with military strikes• A Timeline of Tensions Between India and Pakistan Over Kashmir• India, Pakistan accuse each other of attacks as hostilities rise• AlQaeda Statement On Indian Strikes In PakistanQuick Hits:• Crypto millionaires targeted in brutal kidnappings across France and Europe; Attackers' modus operandi: cutting off victims' fingers to pressure payments. • The father of a cryptocurrency entrepreneur was kidnapped in Paris and found held captive with his finger severed. (article in French)• Assessing the U.S. Climate in April 2025Assessing the U.S. Climate in April 2025• FBI PSA - Cyber Criminal Proxy Services Exploiting End of Life Routers• FBI FLASH: Cyber Criminal Services Target End-of-Life Routers to Launch Attacks and Hide Their Activities (PDF)• Risky Bulletin: France says Russian influence operations are getting better, achieving results• Unsophisticated Cyber Actor(s) Targeting Operational Technology • Primary Mitigations to Reduce Cyber Threats to Operational Technology• US Warns of Hackers Targeting ICS/SCADA at Oil and Gas Organizations• Primary Mitigations to Reduce Cyber Threats to Operational Technology• UK NCSC: UK pioneering global move away from passwords• Classic Rock - Hunting A Botnet That Preys On The Old
Kate (@MissKatefabe) and Alex (@_AlexisCardoza) discuss tonight's episode of Smackdown, May 9, 2025 including:-John Cena returns-Damian Priest and LA Knight vs. Solo Sikoa and Jacob Fatu-No. 1 Contender's Match for the WWE Women's Championship: Jade Cargill vs. Nia JaxGrab your EXCLUSIVE NordVPN Deal by going to http://nordvpn.com/fightful to get a Huge Discount off your NordVPN Plan + a Bonus Gift! It's completely risk free with Nord's 30 day money-back guarantee! ➼ https://nordvpn.com/fightful Try it risk-free now with a 30-day money-back guarantee!All of the odds we speak about on Fightful come from our official partner, BetOnline! Check them out at http://BetOnline.AG for the fastest payouts and earliest lines on sports, wrestling and more!Our Sponsors:* Check out Cigars International and use my code FIGHTFUL for a great deal: https://www.cigarsinternational.com* Check out Hims: https://hims.com/FIGHTFULSupport this podcast at — https://redcircle.com/fightful-pro-wrestling-and-mma-podcast/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.
In this episode of The Cyber Threat Perspective, we break down how attackers steal credentials and hijack sessions to gain unauthorized access to systems and data. From phishing to cookie stealing to session token theft, we'll explore the most common techniques and how to defend against them. Whether you're an IT admin or security pro, you'll walk away with practical tips to help protect your users and your organization.Recommended Conditional Access Policies to protect against account compromise: https://x.com/techspence/status/1919815226158932119Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Spencer's Twitter: https://x.com/techspenceSpencer's LinkedIn: https://linkedin.com/in/SpencerAlessi Work with Us: https://securit360.com
Join the Everyday Miracles podcast with Julie Hedenborg as she welcomes Father Matt Marino from St. Augustine, Florida. In this powerful episode, Father Matt shares his incredible testimony of survival after a brutal and unexpected stabbing. He details the miraculous events and divine intervention that saved his life, his journey of faith, and the profound sense of peace and forgiveness that he felt throughout this harrowing experience. Father Matt's story is a testament to the power of community, the miraculous nature of faith, and the importance of forgiveness. Stay tuned for an inspiring prayer for those struggling with fear and unforgiveness. 00:00 Preview 02:00 Father Matt's Background 06:05 The Attack before breakfast 16:13 The Aftermath and Medical Miracle 27:54 Forgiveness and Reflection 30:42 Startling discovery of demonic voices heard by attacker 32:40 Returning to Normalcy 36:21 Final and Prayer Ephesians 4:32 "Be kind and compassionate to one another, forgiving each other, just as in Christ God forgave you." How to reach Father Matt: https://www.trinitysta.org/ About Father Matt: An adolescent atheist turned Episcopal priest, Matt likes to drink coffee, talk about Jesus, and will shamelessly invite himself aboard your sailboat. Matt has been rector of Trinity since April Fools day, 2019. Also on Matt's resume: Basketball coach, history teacher, recovery planner, Young Life Area Director, summer camp program architect, youth/young adult director for the Diocese of Arizona, seminary instructor, church planter, consultant, and ballboy for the Phoenix Suns. Each of those experiences has left him more in wonder at the grandeur of the One who made us and calls us home through the cross and empty tomb. Matt and Kari have two grown children, Gabrielle and Luke, who love God and his church. Matt blogs at thegospelside.com
Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.
Summary On this episode of Chattinn Cyber, Marc is chattin' with Aaron Painter, a seasoned enterprise tech executive with years at Microsoft and experience leading operations in China and the UK, shares the origin story of his company, Nametag. After observing the rise in identity theft among friends and family, Aaron was struck by how outdated and vulnerable identity verification processes had become—especially the ease with which attackers could answer common security questions using publicly available data. The conversation turns to the evolution of cyber threats, particularly social engineering and deepfake-enabled attacks. Painter outlines a disturbing trend where attackers bypass even sophisticated technological protections like multi-factor authentication (MFA) by exploiting weak points in human processes, such as IT help desks. One example he highlights is the MGM breach, where a phone-based social engineering tactic led to significant damage. Painter emphasizes that many organizations' defenses rely on trust in video verification—such as Zoom or Teams calls—but that these platforms are now susceptible to real-time deepfake emulation. Attackers can impersonate employees or candidates using advanced visual spoofing tools, bypassing traditional verification methods and gaining access to critical systems. To address these vulnerabilities, Nametag offers a mobile-first identity verification solution that leverages smartphone cryptography and biometric tools to take three-dimensional selfies and securely scan IDs. This process ensures stronger identity proofing, even under conditions that would normally be vulnerable to deepfake deception or impersonation. The episode concludes with Painter warning HR professionals about the increasing threat of hiring fraud—where bad actors impersonate real candidates using deepfakes. He advises that companies don't need to replace existing systems like Workday or Okta but should instead implement layered solutions that complement current infrastructure and close critical security gaps. Key Points Cybersecurity Gaps Are Human, Not Just Technical: Despite widespread use of MFA, social engineering attacks targeting help desk personnel remain a primary threat vector. Deepfakes Are Evolving Rapidly: Attackers increasingly use deepfake technologies to impersonate employees or job applicants on video calls, rendering basic visual verification untrustworthy. Nametag's Mobile-First Approach: Nametag strengthens identity verification by using mobile devices' cryptographic and biometric capabilities to combat real-time deepfake impersonation. Hiring Fraud Is a Growing Threat: Criminals, sometimes state-sponsored, use deepfake tools to impersonate legitimate job candidates, gain access to internal systems, and cause serious security breaches. Enterprise Integration Over Replacement: Painter advocates for bolting on new security layers rather than replacing entire systems—filling in gaps while preserving operational continuity. Key Quotes “All you have to do is call and pretend to be the account holder and say you were locked out. Then there's a clear vulnerability. And that vulnerability is a social one or human one.” “The platforms weren't really built to prevent against deepfakes… You've got that person showing up completely different on the video call.” “95% of the background check providers do it with a Social Security number and no identity verification.” “We invented the same concept of scan your ID and take a selfie—but we do it exclusively on mobile.” “I knew identity verification was a hot area. I had no idea it would be this hot.” About Our Guest Aaron Painter is the visionary CEO of Nametag Inc., the pioneering identity verification platform dedicated to protecting users from impersonators and AI-generated deepfakes. With a mission to enhance online authenticity and foster trusted relationships,
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Web Scanning for Sonicwall Vulnerabilities CVE-2021-20016 For the last week, scans for Sonicwall API login and domain endpoints have skyrocketed. These attacks may be exploiting an older vulnerability or just attempting to brute force credentials. https://isc.sans.edu/diary/Web%20Scanning%20Sonicwall%20for%20CVE-2021-20016/31906 The Wizards APT Group SLAAC Spoofing Adversary in the Middle Attacks ESET published an article with details regarding an IPv6-linked attack they have observed. Attackers use router advertisements to inject fake recursive DNS servers that are used to inject IP addresses for hostnames used to update software. This leads to the victim downloading malware instead of legitimate updates. https://www.welivesecurity.com/en/eset-research/thewizards-apt-group-slaac-spoofing-adversary-in-the-middle-attacks/ Windows RDP Access is Possible with Old Credentials Credential caching may lead to Windows allowing RDP logins with old credentials. https://arstechnica.com/security/2025/04/windows-rdp-lets-you-log-in-using-revoked-passwords-microsoft-is-ok-with-that/?comments-page=1#comments
#cuttheclutter A week since Pahalgam terror attack that claimed 26 lives, top level huddles are underway in Delhi to calibrate India's response. PM Modi chaired a key meeting with the Defence Minister, NSA, CDS & Chiefs of the three Armed Forces on Tuesday. In Kashmir, India's security forces have reportedly ‘spotted' terrorists behind the attack. ThePrint Editor-In-Chief Shekhar Gupta discusses the key developments on this big story, with Defence Editor Snehesh Alex Philip, in Episode 1650 of #CutTheClutter. They also discuss how Pakistani terrorists, especially LeT have upped the communication battle in Jammu & Kashmir. --------------------------------------------------------------------------------------------- Produced By: Mahira Khan
Interviews with key people connected to the 2014 case in which two 12-year-olds stabbed their friend 19 times and left her for dead, in an effort to appease the mysterious fictional character known as Slender Man. Originally aired: 02/09/18 Learn more about your ad choices. Visit podcastchoices.com/adchoices
President Trump threatens to obliterate Harvard, the family of the teenager who allegedly murdered Austin Metcalf is using his GoFundMe money to buy a new house, and Katy Perry officially becomes a space cadet.Click here to join the member-exclusive portion of my show: https://bit.ly/4biDlriEp.1716- - -DailyWire+:We're leading the charge again and launching a full-scale push for justice. Go to https://PardonDerek.com right now and sign the petition.Now is the time to join the fight. Watch the hit movies, documentaries, and series reshaping our culture. Go to https://dailywire.com/subscribe today.Live Free & Smell Fancy with The Candle Club: https://thecandleclub.com/michael- - -Today's Sponsors:Balance of Nature - Go to https://balanceofnature.com and use promo code KNOWLES for 35% off your first order PLUS get a free bottle of Fiber and Spice.Birch Gold - Text KNOWLES to 989898 for your free information kit.Done With Debt - Start building the life you deserve! Visit https://donewithdebt.com and talk with one of their strategists. It's FREE!- - -Socials:Follow on Twitter: https://bit.ly/3RwKpq6Follow on Instagram: https://bit.ly/3BqZLXAFollow on Facebook: https://bit.ly/3eEmwygSubscribe on YouTube: https://bit.ly/3L273Ek
The Rich Zeoli Show- Hour 3: 5:05pm- During a press briefing on Wednesday, White House Press Secretary Karoline Leavitt was joined by Patty Morin—mother of Rachel Morin who was killed by MS-13 gang member Victor Martinez. Morin called out Senator Chris Van Hollen (D-MD) for failing to reach out to her family but finding time to rail against the Trump Administration for deporting dangerous migrants who entered the country unlawfully. Leavitt revealed that the wife of Kilmar Abrego Garcia sought a restraining order against him in 2021, citing domestic abuse. Abrego Garcia—a migrant who was in the United States illegally before being deported to El Salvador—was allegedly a member of MS-13, according to the Trump White House. 5:15pm- Cody Balmer, a 38-year-old Harrisburg man, was charged with setting fire to the Pennsylvania Governor's mansion. Balmer threw two Molotov cocktails into the residence and planned to beat Governor Josh Shapiro with a hammer. Thankfully, Shapiro and his family were unharmed. According to reports, Balmer was motivated by his support for Palestine—and his disdain for Shapiro's Jewish faith and support for Israel. Rich notes: Democrats clearly have an anti-Semitism problem. 5:30pm- During a press conference on Wednesday, Secretary of Health and Human Services Robert Kennedy Jr. announced that his department is planning a series of new studies to identify the cause of Autism. 5:40pm- According to Politico, Congresswoman Alexandria Ocasio Cortez (D-NY) has raised $9.6 million in 3-months. Should she be considered the new frontrunner to win the 2028 Democratic nomination for president? Weekday afternoons on Talk Radio 1210 WPHT, Rich Zeoli gives the expert analysis and humorous take that we need in this crazy political climate. Along with Executive Producer Matt DeSantis and Justin Otero, the Zeoli show is the next generation of talk radio and you can be a part of it weekday afternoons 3-7pm.
Learn more about your ad choices. Visit megaphone.fm/adchoices
No coverage from most of the Media for President Trump's Physical that came back good. Joe Biden returns to the national stage to speak about Social Security and Disability. Harvard University has had 2 billion dollars frozen due to not getting rid of activism on campus. Katy Perry, Gayle King, and more went to space yesterday! Mark Interviews Streaming Host Bill O'Reilly. Bill believes that China has used money they charge other countries in tariffs to strengthen the military. The Financial Markets will get better once the tariff controversy calms down. The Attacker that went after Governor Josh Shapiro's home over the weekend pulled a similar stunt that almost happened to Nancy Pelosi's Husband. NPR and PBS are at jeopardy of getting their funding cut from the government. Forest Hills Queens got the permits to have concerts in New York after controversy hit months ago to cancel them. Mark Interviews Political Consultant Ed Rollins. Ed explains how President Trump needs to clarify the Tariff plan to stop the uncertainty. Mark and Ed talk about how Trump operates as a billionaire and what's good and bad about it.
From 1997 to 2002, Long Beach, CA detectives attempt to track down a serial predator known as the Belmont Shore Rapist.Greenlight: Start your risk-free trial today at Greenlight.com/coldcaseSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.