POPULARITY
Categories
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: CISA warns about the path from on-prem Exchange to the cloud Microsoft awards a crisp zero dollar bill for a report about what a mess its internal Entra-authed apps are Everyone and their dog seems to have a shell in US Federal Court information systems Google pays $250k for a Chrome sandbox escape Attackers use javascript in adult SVG files to … farm facebook likes?! SonicWall says users aren't getting hacked with an 0day… this time. This week's episode is sponsored by SpecterOps. Chief product officer Justin Kohler talks about how the flagship Bloodhound tool has evolved to map attack paths anywhere. Bring your own applications, directories and systems into the graph, and join the identity attacks together. This episode is also available on Youtube. Show notes CISA, Microsoft issue alerts on ‘high-severity' Exchange vulnerability | The Record from Recorded Future News Advanced Active Directory to Entra ID lateral movement techniques Consent & Compromise: Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications Cartels may be able to target witnesses after major court hack Federal judiciary tightens digital security as it deals with ‘escalated cyberattacks' | The Record from Recorded Future News Citrix NetScaler flaws lead to critical infrastructure breaches | Cybersecurity Dive DARPA touts value of AI-powered vulnerability detection as it announces competition winners | Cybersecurity Dive Buttercup is now open-source! HTTP/1.1 must die: the desync endgame US confirms takedown of BlackSuit ransomware gang that racked up $370 million in ransoms | The Record from Recorded Future News North Korean cyber-espionage group ScarCruft adds ransomware in recent attack | The Record from Recorded Future News Adult sites are stashing exploit code inside racy .svg files - Ars Technica Google pays 250k for Chromium sandbox escape SonicWall says recent attack wave involved previously disclosed flaw, not zero-day | Cybersecurity Dive Two groups exploit WinRAR flaws in separate cyber-espionage campaigns | The Record from Recorded Future News Tornado Cash cofounder dodges money laundering conviction, found guilty of lesser charge | The Record from Recorded Future News Hackers Hijacked Google's Gemini AI With a Poisoned Calendar Invite to Take Over a Smart Home | WIRED Malware in Open VSX: These Vibes Are Off How attackers are using Active Directory Federation Services to phish with legit office.com links Introducing our guide to phishing detection evasion techniques The State of Attack Path Management
As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Security Weekly to discuss how to defend trust and reputation in the age of AI. Santosh will cover both the company and executive challenges of defending against the latest AI attacks, including: Impersonations and Deepfakes Employee Scams Financial Fraud Segment Resources: - https://styxintel.com/blog/what-is-brand-protection/ - https://styxintel.com/blog/brand-impersonation-hurts-business/ - https://styxintel.com/blog/social-engineering-tactics/ In the leadership and communications section, Mind the overconfidence gap: CISOs and staff don't see eye to eye on security posture, Your AI Strategy Needs More Than a Single Leader, Avoid These Communication Breakdowns When Launching Strategic Initiatives, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-408
The All Local Afternoon Update for Wednesday August 13th 2025
As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Security Weekly to discuss how to defend trust and reputation in the age of AI. Santosh will cover both the company and executive challenges of defending against the latest AI attacks, including: Impersonations and Deepfakes Employee Scams Financial Fraud Segment Resources: - https://styxintel.com/blog/what-is-brand-protection/ - https://styxintel.com/blog/brand-impersonation-hurts-business/ - https://styxintel.com/blog/social-engineering-tactics/ In the leadership and communications section, Mind the overconfidence gap: CISOs and staff don't see eye to eye on security posture, Your AI Strategy Needs More Than a Single Leader, Avoid These Communication Breakdowns When Launching Strategic Initiatives, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-408
Check out our sponsors: ✅ Patriot Mobile - https://patriotmobile.com/partners/chad Episode Description: Chad unloads on the latest bombshells rocking the political world! Leftist media outlets are forced to eat crow as they admit—yet again—that President Trump was right all along about tariffs, the economy, etc. Plus, one of the "BIG BALLS" attackers is revealed, and Chad's got the unfiltered scoop. Buckle up for hard-hitting commentary, razor-sharp wit, and the truth they don't want you to hear! Learn more about your ad choices. Visit megaphone.fm/adchoices
8-12 Adam and Jordana 11a hour
Welcome to the "Week in Review," where we delve into the true stories behind this week's headlines. Your host, Tony Brueski, joins hands with a rotating roster of guests, sharing their insights and analysis on a collection of intriguing, perplexing, and often chilling stories that made the news. This is not your average news recap. With the sharp investigative lens of Tony and his guests, the show uncovers layers beneath the headlines, offering a comprehensive perspective that traditional news can often miss. From high-profile criminal trials to in-depth examinations of ongoing investigations, this podcast takes listeners on a fascinating journey through the world of true crime and current events. Each episode navigates through multiple stories, illuminating their details with factual reporting, expert commentary, and engaging conversation. Tony and his guests discuss each case's nuances, complexities, and human elements, delivering a multi-dimensional understanding to their audience. Whether you are a dedicated follower of true crime, or an everyday listener interested in the stories shaping our world, the "Week in Review" brings you the perfect balance of intrigue, information, and intelligent conversation. Expect thoughtful analysis, informed opinions, and thought-provoking discussions beyond the 24-hour news cycle. Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Welcome to the "Week in Review," where we delve into the true stories behind this week's headlines. Your host, Tony Brueski, joins hands with a rotating roster of guests, sharing their insights and analysis on a collection of intriguing, perplexing, and often chilling stories that made the news. This is not your average news recap. With the sharp investigative lens of Tony and his guests, the show uncovers layers beneath the headlines, offering a comprehensive perspective that traditional news can often miss. From high-profile criminal trials to in-depth examinations of ongoing investigations, this podcast takes listeners on a fascinating journey through the world of true crime and current events. Each episode navigates through multiple stories, illuminating their details with factual reporting, expert commentary, and engaging conversation. Tony and his guests discuss each case's nuances, complexities, and human elements, delivering a multi-dimensional understanding to their audience. Whether you are a dedicated follower of true crime, or an everyday listener interested in the stories shaping our world, the "Week in Review" brings you the perfect balance of intrigue, information, and intelligent conversation. Expect thoughtful analysis, informed opinions, and thought-provoking discussions beyond the 24-hour news cycle. Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
Welcome to the "Week in Review," where we delve into the true stories behind this week's headlines. Your host, Tony Brueski, joins hands with a rotating roster of guests, sharing their insights and analysis on a collection of intriguing, perplexing, and often chilling stories that made the news. This is not your average news recap. With the sharp investigative lens of Tony and his guests, the show uncovers layers beneath the headlines, offering a comprehensive perspective that traditional news can often miss. From high-profile criminal trials to in-depth examinations of ongoing investigations, this podcast takes listeners on a fascinating journey through the world of true crime and current events. Each episode navigates through multiple stories, illuminating their details with factual reporting, expert commentary, and engaging conversation. Tony and his guests discuss each case's nuances, complexities, and human elements, delivering a multi-dimensional understanding to their audience. Whether you are a dedicated follower of true crime, or an everyday listener interested in the stories shaping our world, the "Week in Review" brings you the perfect balance of intrigue, information, and intelligent conversation. Expect thoughtful analysis, informed opinions, and thought-provoking discussions beyond the 24-hour news cycle. Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
Welcome to the "Week in Review," where we delve into the true stories behind this week's headlines. Your host, Tony Brueski, joins hands with a rotating roster of guests, sharing their insights and analysis on a collection of intriguing, perplexing, and often chilling stories that made the news. This is not your average news recap. With the sharp investigative lens of Tony and his guests, the show uncovers layers beneath the headlines, offering a comprehensive perspective that traditional news can often miss. From high-profile criminal trials to in-depth examinations of ongoing investigations, this podcast takes listeners on a fascinating journey through the world of true crime and current events. Each episode navigates through multiple stories, illuminating their details with factual reporting, expert commentary, and engaging conversation. Tony and his guests discuss each case's nuances, complexities, and human elements, delivering a multi-dimensional understanding to their audience. Whether you are a dedicated follower of true crime, or an everyday listener interested in the stories shaping our world, the "Week in Review" brings you the perfect balance of intrigue, information, and intelligent conversation. Expect thoughtful analysis, informed opinions, and thought-provoking discussions beyond the 24-hour news cycle. Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Welcome to the "Week in Review," where we delve into the true stories behind this week's headlines. Your host, Tony Brueski, joins hands with a rotating roster of guests, sharing their insights and analysis on a collection of intriguing, perplexing, and often chilling stories that made the news. This is not your average news recap. With the sharp investigative lens of Tony and his guests, the show uncovers layers beneath the headlines, offering a comprehensive perspective that traditional news can often miss. From high-profile criminal trials to in-depth examinations of ongoing investigations, this podcast takes listeners on a fascinating journey through the world of true crime and current events. Each episode navigates through multiple stories, illuminating their details with factual reporting, expert commentary, and engaging conversation. Tony and his guests discuss each case's nuances, complexities, and human elements, delivering a multi-dimensional understanding to their audience. Whether you are a dedicated follower of true crime, or an everyday listener interested in the stories shaping our world, the "Week in Review" brings you the perfect balance of intrigue, information, and intelligent conversation. Expect thoughtful analysis, informed opinions, and thought-provoking discussions beyond the 24-hour news cycle. Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
We look at the FPL forwards and midfielders in various price brackets. ━━━━━━━━━━━━━
This week on the Active Self Protection Podcast we sit down with South African Self Defender Tubs and discuss the day he was at work at his family restaurant when a commotion drew him to the parking lot just in time to see a man rushing innocent citizens with a large glass bottle and how he had to react to protect life. More Info: https://fhftc.orgTo Donate: https://fhftc.org/donate/To Sign Up: https://fhftc.org/bullets-bibles-conference/Active Self Protection exists to help good, sane, sober, moral, prudent people in all walks of life to more effectively protect themselves and their loved ones from criminal violence. On the ASP Podcast you will hear the true stories of life or death self defense encounters from the men and women that lived them. If you are interested in the Second Amendment, self defense and defensive firearms use, martial arts or the use of less lethal tools used in the real world to defend life and family, you will find this show riveting. Join host and career federal agent Mike Willever as he talks to real life survivors and hear their stories in depth. You'll hear about these incidents and the self defenders from well before the encounter occurred on through the legal and emotional aftermath. Music: bensound.com
On September 30th Microsoft will only support a new unified multi-factor authentication control configuration. What does this mean for your nonprofit?In March 2023 Microsoft announced that after September 30th, 2025, they would no longer automatically support “legacy” multi-factor authentication controls in the Microsoft 365 Entra ID and General Admin administration portals. The methods your staff are using now will not automatically roll over to be allowed via the new admin dashboard after that date. Steve Longenecker, Community IT's Director of IT Consulting, explains to Carolyn the implications for nonprofits of this change and the Microsoft unified security administration deadline.The takeaways: The new unified authentication dashboard is available now to Microsoft 365 admins.The new Authentication Methods page does not inherit methods allowed in the legacy controls. An administrator needs to manually enable the MFA methods your organization wants to allow. Old MFA options your staff are using now will not roll over automatically to the new dashboard.Microsoft and Community IT are pushing admins to use this opportunity to to exclude less secure MFA methods. Community IT advises against allowing SMS texting and one-time codes sent to personal email addresses as MFA methods. You can upgrade and implement the new MFA and password reset options at any time, and we advise you to do this before September 30, whether or not Microsoft grants an extension of the deadline.If you just started using Microsoft 365 for Nonprofits, you don't need to worry about the deadline because your initial configuration would already be using the new Authentication Methods page. If you haven't made the change or don't know, you need to check before September 30, 2025.This change is visible only to Microsoft administrators, who should be making the change and informing staff where appropriate. If you are a nonprofit leader or board member and have not heard from your IT Director or outsourced IT, check with them to understand the plan for your organization. If you are a nonprofit staffer, pay attention to directions on using the safest MFA to protect your nonprofit.While not directly impacted by this deadline from Microsoft, Carolyn and Steve discuss the importance of “phish-resistant” MFA, preventing Attacker-in-the-Middle (AitM) attacks, for executives and staff working in finance, IT and other highly targeted areas of your operations. NOTE: The timelines on Microsoft changes do sometimes shift, and we are working to keep you updated. Please check for the most recent blog or podcast from us to ensure you have the most recent update. _______________________________Start a conversation :) Register to attend a webinar in real time, and find all past transcripts at https://communityit.com/webinars/ email Carolyn at cwoodard@communityit.com on LinkedIn Thanks for listening.
Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00:00 - PreShow Banter™ — Stop Asking Wade if he's in Vegas00:02:16 - Perplexity Uses Stealth Crawlers to Evade No-Crawl Directives – 2025-08-0400:11:25 - Story # 1: Insurance won't cover $5M in City of Hamilton claims for cyberattack, citing lack of log-in security00:18:40 - Story # 2: States Enact Safe Harbor Laws that Provide Affirmative Defenses in Data Breach Litigation00:26:45 - Story # 3: Hackers Destroy Aeroflot's IT Infrastructure, Causing Over 42 Flight Cancellations00:34:18 - Story # 4: Attackers exploit link-wrapping services to steal Microsoft 365 logins00:40:09 - Story # 5: Mozilla flags phishing wave aimed at hijacking trusted Firefox add-ons00:42:18 - Wade's plugin recommendation00:44:39 - Story # 6: Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives00:51:11 - Story # 7: After Backlash, ChatGPT Removes Option to Have Private Chats Indexed by Google00:55:21 - AI 202701:01:01 - What's Ralph been up to?
1. Scrutiny of the "Tea" Dating AppThe women-focused dating app "Tea" faces backlash after two data breaches exposed 72,000 sensitive images and 1.1 million private messages. Though security upgrades were promised, past data remained exposed, and the app lacks end-to-end encryption. Additionally, anonymous features enabling posts about men have sparked defamation lawsuits. Critics argue Tea prioritized rapid growth over user safety, exemplifying the danger of neglecting cybersecurity in pursuit of scale.2. North Korean Remote Work InfiltrationCrowdStrike has flagged a 220% surge in North Korean IT operatives posing as remote workers—over 320 cases in the past year. These operatives use stolen/fake identities, aided by generative AI to craft résumés, deepfake interviews, and juggle multiple jobs. Their earnings fund Pyongyang's weapons programs. The tactic reveals the limits of traditional vetting and the need for advanced hiring security.3. Airportr's Data ExposureUK luggage service Airportr suffered a major security lapse exposing passport photos, boarding passes, and flight details—including those of diplomats. CyberX9 found it possible to reset accounts with just an email and no limits on login attempts. Attackers could gain admin access, reroute luggage, or cancel flights. Although patched, the incident underscores risks of convenience services with poor security hygiene.4. Risks of AI-Generated CodeVeracode's "2025 GenAI Code Security Report" found that nearly 45% of AI-generated code across 80 tasks had security flaws—many severe. This highlights the need for human oversight and thorough reviews. While AI speeds development, it also increases vulnerability if unchecked, making secure coding a human responsibility.5. Microsoft's SharePoint Hack ControversyChinese state hackers exploited flaws in SharePoint, breaching hundreds of U.S. entities. A key concern: China-based Microsoft engineers maintained the hacked software, potentially enabling earlier access. Microsoft also shared vulnerability data with Chinese firms through its MAPP program, while Chinese law requires such data be reported to the state. This raises alarms about outsourcing sensitive software to geopolitical rivals.6. Russian Embassy Surveillance AttackRussia's "Secret Blizzard" hackers used ISP-level surveillance to deliver fake Kaspersky updates to embassies. These updates installed malware and rogue certificates enabling adversary-in-the-middle attacks—allowing full decryption of traffic. The attack shows the threat of state-level manipulation of software updates and underscores the need for update authenticity verification.7. Signal's Threat to Exit AustraliaSignal may pull out of Australia if forced to weaken encryption. ASIO's push for access contradicts Signal's end-to-end encryption model, which can't accommodate backdoors without global compromise. This standoff underscores a broader debate: encryption must be secure for all or none. Signal's resistance reflects the rising tension between privacy advocates and governments demanding access.8. Los Alamos Turns to AILos Alamos National Laboratory has launched a National Security AI Office, signaling a pivot from nuclear to AI capabilities. With massive GPU infrastructure and university partnerships, the lab sees AI as the next frontier in scientific and national defense. This reflects a shift in global security dynamics—where large language models may be as strategically vital as missiles.
Arkansas DA Is Protecting Child Predators By Prosecuting A Father Who Took Out Daughter's Attacker Description: What happens when the people who are supposed to prosecute predators instead turn their attention to the parents trying to stop them? In this explosive episode, we examine the disturbing implications of the case against Aaron Spencer, the Arkansas father who shot and killed Michael Fosler—the man accused of sexually assaulting and kidnapping his daughter. Defense attorney Bob Motta argues that this isn't just an overreach by prosecutors—it's a betrayal of public trust. Fosler had already been arrested on 43 felony counts including rape, grooming, and child pornography involving Spencer's 14-year-old daughter. Yet he walked out of jail on a $5,000 bond and went right back to contacting her, ultimately leading to her disappearance the night Spencer tracked down and fatally confronted him. Instead of thanking Spencer for saving his daughter, the Arkansas DA charged him with second-degree murder. Bob breaks down why this prosecution feels less like justice and more like protection for predators. He outlines the legal mechanisms that could—and should—shield Spencer under Arkansas's self-defense and stand-your-ground laws. And he asks a hard question the state doesn't seem eager to answer: why are they more invested in punishing a desperate father than preventing the next victim? If you're angry, you should be. If you're confused, you're not alone. This is a case where the system looks broken—and very few seem willing to fix it. #ProtectKidsNotPredators #AaronSpencer #TrueCrimeNews #ArkansasDA #HiddenKillers #BobMotta #StandYourGround #JusticeSystemFailure #ProsecutorialInjustice #ChildProtectionNow Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
Arkansas DA Is Protecting Child Predators By Prosecuting A Father Who Took Out Daughter's Attacker Description: What happens when the people who are supposed to prosecute predators instead turn their attention to the parents trying to stop them? In this explosive episode, we examine the disturbing implications of the case against Aaron Spencer, the Arkansas father who shot and killed Michael Fosler—the man accused of sexually assaulting and kidnapping his daughter. Defense attorney Bob Motta argues that this isn't just an overreach by prosecutors—it's a betrayal of public trust. Fosler had already been arrested on 43 felony counts including rape, grooming, and child pornography involving Spencer's 14-year-old daughter. Yet he walked out of jail on a $5,000 bond and went right back to contacting her, ultimately leading to her disappearance the night Spencer tracked down and fatally confronted him. Instead of thanking Spencer for saving his daughter, the Arkansas DA charged him with second-degree murder. Bob breaks down why this prosecution feels less like justice and more like protection for predators. He outlines the legal mechanisms that could—and should—shield Spencer under Arkansas's self-defense and stand-your-ground laws. And he asks a hard question the state doesn't seem eager to answer: why are they more invested in punishing a desperate father than preventing the next victim? If you're angry, you should be. If you're confused, you're not alone. This is a case where the system looks broken—and very few seem willing to fix it. #ProtectKidsNotPredators #AaronSpencer #TrueCrimeNews #ArkansasDA #HiddenKillers #BobMotta #StandYourGround #JusticeSystemFailure #ProsecutorialInjustice #ChildProtectionNow Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Twenty years after he tried to light the surrounding forests on fire, Japanese pilot Nobuo Fujita returned to Brookings as an honored guest and presented the town with his family's Samurai sword. (Brookings, Curry County; 1960s) (For text and pictures, see https://offbeatoregon.com/1305c-japanese-pilot-fujita-friendship-with-brookings.html)
Devils Den Attacker Andrew McGann, Was Also An Alleged Child Predator With Claims Ignored In this gripping episode, we delve into the chilling case of James Andrew McGann, the 28-year-old suspect in the brutal double homicide at Devil's Den State Park, Arkansas, where he allegedly stabbed a married couple to death in front of their young daughters. But the horror doesn't stop there—McGann, a former elementary school teacher who went by "Drew," faced ignored complaints of inappropriate behavior toward young female students during his brief career. Despite parental reports of him being "very touchy" with girls, placing them on his lap, and making unsettling comments, internal investigations in Texas found no substantiation, allowing him to resign quietly and shuffle between districts in Texas, Oklahoma, and Arkansas without red flags. We expose the systemic failures known as "passing the trash," where schools prioritize avoiding scandal over child safety, enabling potential predators to evade accountability. Featuring interviews with affected parents like Sierra Marcum and insights from experts on educator misconduct, this episode uncovers how warning signs were dismissed, leaving a trail of vulnerability that culminated in tragedy. #DevilsDenHomicide #AndrewMcGann #AllegedPredator #PassingTheTrash #SchoolSystemFailure #TeacherMisconduct #ChildSafety #TrueCrime #ArkansasMurder #IgnoredComplaints #EducatorAccountability #PodcastEpisode Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
Devils Den Attacker Andrew McGann, Was Also An Alleged Child Predator With Claims Ignored In this gripping episode, we delve into the chilling case of James Andrew McGann, the 28-year-old suspect in the brutal double homicide at Devil's Den State Park, Arkansas, where he allegedly stabbed a married couple to death in front of their young daughters. But the horror doesn't stop there—McGann, a former elementary school teacher who went by "Drew," faced ignored complaints of inappropriate behavior toward young female students during his brief career. Despite parental reports of him being "very touchy" with girls, placing them on his lap, and making unsettling comments, internal investigations in Texas found no substantiation, allowing him to resign quietly and shuffle between districts in Texas, Oklahoma, and Arkansas without red flags. We expose the systemic failures known as "passing the trash," where schools prioritize avoiding scandal over child safety, enabling potential predators to evade accountability. Featuring interviews with affected parents like Sierra Marcum and insights from experts on educator misconduct, this episode uncovers how warning signs were dismissed, leaving a trail of vulnerability that culminated in tragedy. #DevilsDenHomicide #AndrewMcGann #AllegedPredator #PassingTheTrash #SchoolSystemFailure #TeacherMisconduct #ChildSafety #TrueCrime #ArkansasMurder #IgnoredComplaints #EducatorAccountability #PodcastEpisode Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Devils Den Attacker Andrew McGann, Was Also An Alleged Child Predator With Claims Ignored In this gripping episode, we delve into the chilling case of James Andrew McGann, the 28-year-old suspect in the brutal double homicide at Devil's Den State Park, Arkansas, where he allegedly stabbed a married couple to death in front of their young daughters. But the horror doesn't stop there—McGann, a former elementary school teacher who went by "Drew," faced ignored complaints of inappropriate behavior toward young female students during his brief career. Despite parental reports of him being "very touchy" with girls, placing them on his lap, and making unsettling comments, internal investigations in Texas found no substantiation, allowing him to resign quietly and shuffle between districts in Texas, Oklahoma, and Arkansas without red flags. We expose the systemic failures known as "passing the trash," where schools prioritize avoiding scandal over child safety, enabling potential predators to evade accountability. Featuring interviews with affected parents like Sierra Marcum and insights from experts on educator misconduct, this episode uncovers how warning signs were dismissed, leaving a trail of vulnerability that culminated in tragedy. #DevilsDenHomicide #AndrewMcGann #AllegedPredator #PassingTheTrash #SchoolSystemFailure #TeacherMisconduct #ChildSafety #TrueCrime #ArkansasMurder #IgnoredComplaints #EducatorAccountability #PodcastEpisode Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
A woman is warning prosecutors to prepare for her demise, after a dangerous abuser with a violent history is freed -- despite her brutal 2-week kidnapping, torture ordeal. A monster, who sadistically tortured & killed his ex, is finally caged after a more than week-long manhunt. His mother is also behind bars accused of helping to cover up the horrific crime. Plus, a deep-fried dispute leaves a couple customers burned! Jennifer Gould reports. See omnystudio.com/listener for privacy information.
Yesterday, five men were sentenced to between 8 and a half and 14 years for their involvement in the horrific torture of Natalie Ennis, after they pleaded guilty to her false imprisonment and assault causing harm at a flat in Henrietta House in Dublin on the 26th of September last year. Natalie spoke to Claire in studio.
July 29, 2025 ~ Chris, Lloyd, and Jamie talk with Alli Baxter, multimedia journalist at UpNorthLive News, to recount the law enforcement and media's rapid response to a mass stabbing at a Traverse City Walmart.
Headlines: – Welcome to Mo News (02:00) – National Chocolate Day: Chocolate Price Going Up (02:30) – Michigan Walmart Mass Stabbing Suspect Faces Terrorism Charge (06:40) – Israel Announces Daily Military Pause In Gaza Amid International Pressure, Aid Airdrops Resume (10:00) – U.S. And E.U. Reach Tariff Agreement As Friday Deadline Looms (18:20) – Thailand, Cambodia Set For Ceasefire Talks After Trump's Push (23:00) – Democrats Polling Their Worst With Voters In Decades (24:50) – U.S. Birth Rate Hits All-Time Low (27:30) – Gwyneth Paltrow Hired By Astronomer As Temp Spokesperson After Coldplay KissCam Scandal (33:30) – On This Day In History (35:50) Thanks To Our Sponsors: – LMNT - Free Sample Pack with any LMNT drink mix purchase – Industrious - Coworking office. 30% off day pass – Athletic Greens – AG1 Powder + 1 year of free Vitamin D & 5 free travel packs – Incogni - 60% off an annual plan| Promo Code: MONEWS
The show-ending “Smoking Gun” segment on the Monday Bob Rose Show 7-28-25
Who is Juventus top 5 goalkeeper, defender, midfielder & attacker of all time? Nima Tavallaey and Carlo Garganese debate, discuss, and analyze a question on this topic sent in from patron/YouTube member. This is an extended clip from this weeks Q & A episode of The Italian Football Podcast available only to patrons on Patreon.com/TIFP and on YouTube Memberships. To listen to this & all other full episodes of The Italian Football Podcast (and support the show), go to Patreon.com/TIFP OR now also available on Spotify OR YouTube Memberships and sign up. Your support makes The Italian Football Podcast possible. Follow us: Twitter, Facebook, Instagram, YouTube Learn more about your ad choices. Visit podcastchoices.com/adchoices
Israel, long a prime target for cyber attacks, has seen a dramatic increase since the war with Iran last month. The cyber attackers are not just hitting institutional sights, but also going after civilians with sophisticated phishing campaigns, mostly to steal money. Reporter Arieh O’Sullivan spoke with Ori Segal, a co-founder and CEO of Cyvore, an Israeli cybersecurity firm, about the minds of the attackers and cautionary measures everyone should take. (photo: shuttersock) See omnystudio.com/listener for privacy information.
“Detection is not the end—it's just the beginning.” — Jerry Mancini, NETSCOUT In this episode of Technology Reseller News, Publisher Doug Green speaks with Jerry Mancini of NETSCOUT about the company's latest advancements in automated threat detection and response—with a particular focus on why telecommunications networks are uniquely vulnerable and high-value targets. NETSCOUT, long known for its deep packet inspection and network performance management, is expanding the capabilities of its adaptive threat analytics—a platform designed not only to detect threats but also to assemble and contextualize them using network-level intelligence. Beyond Detection: Seeing the Full Picture While most cybersecurity tools focus on isolated detections—EDR, firewall logs, and suspicious indicators—NETSCOUT's approach centers on reconstructing the complete threat narrative across the enterprise. By capturing packet data continuously and using workflows to connect disparate detections, NETSCOUT enables investigators to: Understand the root cause and lateral movement Detect activity before and after a flagged incident Integrate signals from multiple sources (EDR, NDR, WAF, and more) Investigate threats in real time and retrospectively Why Telcos Are at Greater Risk Mancini highlights the unique role of telco infrastructure in global data movement, making them prime targets for cyber espionage and traffic manipulation. Attackers, such as the Salt Typhoon group, have used compromised routers and peering points to reroute and eavesdrop on massive data flows—impacting not just carriers but their customers across the internet. Best Practices for Threat Hunters NETSCOUT supports both bottom-up investigations (starting with a detected incident) and top-down threat hunts (searching for indicators tied to known campaigns). The platform's ability to store and search packet-level data gives teams visibility that goes far beyond typical log-based detection tools. Mancini's key advice: “You need more than alerts—you need the data to trace back, understand what happened, and act before it's too late.” Where to Learn More Visit netscout.com to explore solutions in: Network Performance Management DDoS Detection & Mitigation Adaptive Threat Analytics NETSCOUT supports both enterprise and service provider environments and is available to assist with immediate and long-term threat management strategies.
A single compromised password led to the collapse of 158-year-old UK logistics firm KNP, after hackers—suspected to be the Akira gang—used it to gain access, encrypt systems, and demand a £5 million ransom. Unable to pay, the company lost all its data and folded, putting 700 employees out of work. The breach underscores how weak access controls can have catastrophic consequences.To counter massive botnets, Google is now combining technical defenses with legal action. Its lawsuit against the “BadBox 2.0” operators marks a major shift: targeting criminals behind malware that infected over 10 million Android devices. Google's strategy includes leveraging the CFAA and RICO Act to not just stop malware but dismantle the entire criminal infrastructure—signaling a more aggressive, litigation-driven cybersecurity era.Meanwhile, a new malware delivery method is exploiting DNS—a common but often under-monitored network function. Attackers hide malware in DNS TXT records, break it into chunks, and reassemble it on target systems using standard DNS queries. Since DNS traffic is rarely scrutinized, this technique bypasses traditional defenses, making DNS monitoring essential for comprehensive protection.Travelers to China face serious privacy risks. Authorities are using malware like “Massistant” to extract sensitive data from mobile phones during inspections. Developed by Chinese firm Meiya Pico, the software accesses encrypted texts, location history, and even Signal messages upon installation. Though evidence of compromise may remain, the intrusion happens before detection, raising concerns for anyone bringing devices into the country.China has also shifted its cyberattack strategy by outsourcing operations to private firms. These companies now discover and sell zero-day vulnerabilities to government agencies. This model, which evolved from loosely affiliated hacker groups, blurs the line between state and private enterprise, making attribution difficult. As a result, China-linked hackers increasingly infiltrate U.S. critical infrastructure while masking their origins, and exposure alone no longer seems to deter them.In response to national security concerns, Microsoft has removed China-based engineers from U.S. military cloud projects. A ProPublica investigation revealed their prior involvement, prompting a Pentagon ban on such support. Previously, Chinese engineers worked under U.S. supervision, a practice now deemed too risky for defense-related systems.Microsoft's SharePoint is also under siege. Chinese state actors exploited a critical flaw dubbed “ToolShell” to compromise at least 54 organizations, including those in critical infrastructure. The attack allowed for deep system access, extraction of encryption keys, and installation of web shells—despite prior patches. The incident stresses the need for rapid patching and vigilance, even on widely used enterprise platforms.Cyberwarfare is influencing real-world military dynamics. Ukrainian cyber operatives claim to have digitally crippled a major Russian drone manufacturer, deleting 47TB of production data and disabling access systems. Allegedly backed by military intelligence, the attack highlights how digital sabotage can directly disrupt military production and reshape conflict outcomes. Code is now as consequential as conventional weapons on the modern battlefield.
The Medcurity Podcast: Security | Compliance | Technology | Healthcare
The domain looks right. The logo checks out. Even the login page feels familiar. But it isn't what it seems.Attackers are using subtle domain tricks—like typos, lookalike characters, and spoofed subdomains—to mimic trusted names in healthcare. These aren't high-tech hacks. They rely on speed, habit, and trust.Once you know what to watch for, they're easier to stop. Listen to the latest Medcurity Podcast for real examples and smart ways to stay ahead.Learn more about Medcurity here: https://medcurity.com#Healthcare #Cybersecurity #Compliance #HIPAA #SecurityRiskAnalysis
In this dynamic episode of The Segment, two of cybersecurity's biggest names reunite with host, Raghu Nandakumara, for a no-holds-barred conversation: John Kindervag, the godfather of Zero Trust, and Dr. Chase Cunningham, aka Dr. Zero Trust. What unfolds is a fast-paced, insight-packed dialogue that spans decades of hard-earned wisdom, unexpected humor, and a shared mission to demystify modern cyber defense.John and Chase reflect on the global evolution of Zero Trust—from its scrappy beginnings to its widespread adoption by Fortune 500s, military leaders, and even elder care facilities. They dive into why context-driven maps are now indispensable, how graph-based security is reshaping the cyber terrain, and where AI and automation can give defenders a real edge. Expect candid takes on the limits of SIEMs, the failure of red teaming without strategy, and why defenders need to start thinking like attackers if they want to win.There's personal reflection too—Chase shares why he was reluctant to pick up the Zero Trust torch, and John opens up about the real heart behind the strategy. With wit, war stories, and straight talk, they make a clear case: cybersecurity isn't about perfection—it's about deterrence, resilience, and knowing what truly matters. Topics Covered:The origin and global adoption of Zero Trust Why “good maps” are critical for cyber resilience Real-world applications of AI in cyber defense Why attackers often outmaneuver defenders—and how to change that The psychology of leadership in cybersecurity strategy From Chick-fil-A to Bletchley Park: the unexpected places Zero Trust shows up Chase's take on stock-picking based on breach trends (yes, really) Resources Mentioned:Think Like an Attacker by Dr. Chase Cunningham John Kindervag's Zero Trust 5-Step Model “Zero Trust Terrain & Holding the High Ground” LinkedIn Live Stay Connected with our host, Raghu on LinkedInFor more information about Illumio, check out our website at illumio.com
This week on The Home Defense Show Skip and Sara discuss why Sara's throwing all his stuff away. Then we talk with Gil Maza about violence against ICE agents and we wrap up with Steve Sulze on the advisability of using karate against an armed attacker.
Attackers are increasingly abusing the same remote access tools that IT teams rely on every day. In this episode, Hazel sits down with Talos security researcher Pierre Cadieux to unpack why these legitimate tools have become such an effective tactic for adversaries.Pierre explains how the flexibility, legitimacy, and built-in capabilities of remote access management tools make them ideal for attackers who want to stay under the radar. They discuss trends Talos Incident Response is seeing in the field, examples of commonly abused tools, and the challenges defenders face when trying to detect misuse.You'll also hear practical advice on what defenders and IT teams can do today to better secure their environments — and what the rise of remote access management tool abuse tells us about attacker behavior and the current state of cybercrime.Resources mentioned:Talos Incident Response Quarterly Trends ReportWhen Legitimate Tools Go Rogue (Talos Blog)
Jimmy Barrett takes you through the stories that matter the most on the morning of 07/16/25.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Congressman Max Miller joins Bob to talk about charges being filed against the man accused of an antisemitic attack that took place in Ricky River on June 19. Rep. Miller discusses the danger he was placed in, and that of his family if his child had been in the car, as well as the political violence committed in the name of antisemitism and anti-Zionism in general. The Westlake doctor who tried to run him off the road and threatened to kill him has been charged with 2 felonies and several misdemeanors.See omnystudio.com/listener for privacy information.
Senator Craughwell leads the charge to a secure digital future Ireland's digital progress has been extraordinary. From online banking and healthcare systems to remote learning and connected infrastructure, the nation has embraced digitalisation across every sector. However, this transformation has come at a cost. As our digital footprint expands, so too does our exposure to cyber threats. Cybersecurity is no longer just a technical issue. It is a public concern and a national responsibility. We often picture cyberattacks as distant or unlikely events, something that happens to big tech companies or foreign governments. Attacks in recent years have shown that Ireland is not immune. Irish institutions - such as the HSE in 2021 - have faced serious disruptions, but so too have countless smaller businesses. Many incidents never make headlines but the reality is that companies' systems, data, personal privacy, financial assets, and systems managed by IT and OT (operational technology) are under continuous threat. What makes these attacks so dangerous is not just their sophistication. It's how easily they succeed. In most cases, breaches begin with one thing: human error. It can be as simple as an employee opening a fraudulent email, a manager misunderstanding a digital risk, or a staff member who is unaware that their actions have consequences far beyond their screen. Awareness is the missing link Awareness is the critical missing link in our national defence. Most successful cyberattacks don't rely on elite hacking tools; they rely on people not being prepared. Attackers exploit gaps in understanding - gaps that exist in homes, schools, businesses and public services. Awareness needs to be treated as a core component of Ireland's cybersecurity response. Without it, no software or firewall can offer enough protection. Ireland's small and medium-sized enterprises (SMEs) are particularly vulnerable. They make up most of the country's enterprises and employ the majority of our workforce. Yet, many of these organisations do not have dedicated cybersecurity teams or robust training in place. The same applies to charities, community organisations, and voluntary services - sectors that handle sensitive data and are crucial to local life but often lack the resources or know-how to defend against threats. The risk is real. The consequences are national. Partnered with CJHNetwork, Data Edge have participated in conducting cyber reviews across Ireland. We found that a number of SMEs within critical supply chains have already been targeted by cyberattacks. These organisations support navigation, satellite communication, and other essential infrastructure which are of strategic importance. This highlights the growing vulnerabilities in sectors vital to public safety and national services. Building national cyber resilience Cyber risk is not theoretical. It is here, it is growing, and it is reaching into the heart of our critical infrastructure. So, what must Ireland do? How do we build resilience before the next wave of attacks hits us harder? We need a coordinated national effort - one that combines public awareness, skilled training, and long-term investment. It should also ensure consistent funding and empower policy makers to deliver widespread public engagement. This includes strengthening support for SMEs and community organisations, expanding cybersecurity training and awareness across all levels of society, and building a skilled and diverse workforce through education, outreach, and accelerated recruitment. Ireland must also invest in the infrastructure, tools, and partnerships that will enable long-term resilience and readiness. Our active involvement as part of a national cybersecurity consortium includes participation in discussions at Leinster House and ongoing collaboration with policymakers, and we recognise that collective insights and local experience are key to shaping Ireland's cybersecurity landscape. Currently, a positio...
FBI has launched a criminal investigation of James Comey and John Brennan for their roles in investigating the alleged collusion between Trump and Russia. Visit the Howie Carr Radio Network website to access columns, podcasts, and other exclusive content.
Connor Southwell (@cjsouthwell1902) is joined by Brøndby IF fan and writer Toke Theilade (@TokeTheilade) to discuss Norwich City's seventh first-team summer signing. *** With thanks to our podcast sponsor - First Bus. ** Picture: Norwich City FC *** You can also hear the Pink Un Podcast on Norwich's Community radio station, Future Radio 107.8FM. *** To get in touch with the podcast now and in future, send any comments and questions into the crew with an email to norfolksport@archant.co.uk or get in touch with us @pinkun on Twitter, where our direct messages are open. And if you're interested in sponsoring the pod, or placing an advert in one of our shows, email connor.southwell@newsquest.co.uk ALSO FIND US AT THE FOLLOWING: Subscribe: pinkun.com/podcast Twitter: twitter.com/pinkun Facebook: fb.me/thepinkun Instagram: instagram.com/the_pinkun Find more details on how you can sign up to Pink Un+ here: https://www.pinkun.com/pinkunplus/ #ncfc #norwichcity #norwich
Dan and Jay discuss who they would like to see in Chelsea's attack next season!
On this episode of the podcast, Harry Symeou discusses all the latest arsenal news. We talk Eberechi Eze after it was confirmed by both David Ornstein and Fabrizio Romano that Arsenal have made contact with the player's representatives. It's the 1st July and so we'll discuss the need for the Gunners to make a decision on the striker front and accelerate the process of signing either Benjamin Sesko or Viktor Gyökeres (the 2 most likely at the time of recording). Plus, we'll talk wanting THREE attackers and the challenge Andrea Berta faces this summer, his first as the Gunners' sporting director. All that and loads more! Viktor Gyökeres Scouting Video: https://www.patreon.com/posts/scouting-session-131522551?utm_medium=clipboard_copy&utm_source=copyLink&utm_campaign=postshare_creator&utm_content=join_link Benjamin Sesko Scouting Video: https://www.patreon.com/posts/scouting-session-130983051?utm_medium=clipboard_copy&utm_source=copyLink&utm_campaign=postshare_creator&utm_content=join_link Martin Zubimendi Scouting Video: https://www.patreon.com/posts/scouting-session-132096321?utm_medium=clipboard_copy&utm_source=copyLink&utm_campaign=postshare_creator&utm_content=join_link Christian Norgaard Scouting Video: https://www.patreon.com/posts/scouting-session-132712509?utm_medium=clipboard_copy&utm_source=copyLink&utm_campaign=postshare_creator&utm_content=join_link Support the podcast & access benefits by joining our Patreon page: https://patreon.com/thechroniclesofagooner?utm_medium=unknown&utm_source=join_link&utm_campaign=creatorshare_creator&utm_content=copyLink Learn more about your ad choices. Visit podcastchoices.com/adchoices
This week we're joined by Julia Fallon, Executive Director of the State Educational Technology Directors Association (SETDA) and she shines a light on the appeal of school systems to cyber attackers. (HINT: it is access to PII to open credit cards, mortgages and more in the name of children that often is only detected many years later.) We also discuss the connection between schools and insurance companies, trends in how school systems are fortifying their security measures, the evolution of infosec to become a front office issue, and what schools can do to integrate cybersecurity into curriculums to both bolster security and lay a pathway for future cyber professionals. Julia Fallon is the Executive Director of the State Educational Technology Directors Association (SETDA), where she works with U.S. state and territorial digital learning leaders to empower the education community to leverage technology for learning, teaching, and school operations. Involved with learning technologies since 1989, her professional interest lies in making the case for public school systems wherein educators are able to optimize technology-rich learning environments to equitably engage the learners who fill their classrooms. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e339
An ex obliterates a mom's jaw in a deadly attack; triggering a wild manhunt that culminates in bizarre, hours-long showdown with cops...while perched in a tree. A Louisiana mom is accused of injecting his mom with meth before beating her to death & discarding her in the trash. Plus, a domestic violence situation that really stinks. Jennifer Gould reports. See omnystudio.com/listener for privacy information.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Quick Password Brute Forcing Evolution Statistics After collecting usernames and passwords from our ssh and telnet honeypots for about a decade, I took a look back at how scans changed. Attackers are attempting more passwords in each scans than they used to, but the average length of passwords did not change. https://isc.sans.edu/diary/Quick%20Password%20Brute%20Forcing%20Evolution%20Statistics/32068 Introducing FileFix A New Alternative to ClickFix Attacks Attackers may trick the user into copy/pasting strings into file explorer, which will execute commands similar to the ClickFix attack that tricks users into copy pasting the command into the start menu s cmd feature. https://www.mobile-hacker.com/2025/06/24/introducing-filefix-a-new-alternative-to-clickfix-attacks/ Threat Actors Modify and Re-Create Commercial Software to Steal User s Information A fake Sonicwall Netextender clone will steal user s credentials https://www.sonicwall.com/blog/threat-actors-modify-and-re-create-commercial-software-to-steal-users-information
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.A new malware strain known as OtterCookie, developed by the North Korean APT group Lazarus, has been dissected in a detailed technical analysis by offensive security expert Mauro Eldritch. Attackers are currently exploiting a critical vulnerability in the Langflow platform — an open-source Python-based web app used to build AI workflows and agents — to deliver a new botnet called Flodrix.A new campaign from an emerging threat group named Water Curse is targeting the software supply chain by leveraging GitHub repositories that masquerade as legitimate security tools. The threat actor known as Scattered Spider, also tracked as UNC3944 by Google and Mandiant, has apparently shifted its operational focus from the retail sector to the US insurance industry, according to a new alert from Google's Threat Intelligence Group.
International law enforcement takes down a darknet drug marketplace. The Washington Post is investigating a cyberattack targeting several journalists' email accounts. Anubis ransomware adds destructive capabilities. The GrayAlpha threat group uses fake browser update pages to deliver advanced malware. Researchers uncover a stealthy malware campaign that hides a malicious payload in a JPEG image. Tenable patches three high-severity vulnerabilities in Nessus Agent. Attackers can disable Secure Boot on many Windows devices by exploiting a firmware flaw. Lawmakers introduce a bipartisan bill to strengthen coordination between CISA and HHS. Harry Coker reflects on his tenure as National Cyber Director. Maria Varmazis checks in with Brandon Karpf on agentic AI. When online chatbots overshare, it's no laughing Meta. CyberWire Guest Joining us today to discuss Agentic AI and it relates to cybersecurity and space with T-Minus Space Daily host Maria Varmazis is Brandon Karpf, friend of the show, founder of T-Minus Space Daily, and cybersecurity expert. Selected Reading Police seizes Archetyp Market drug marketplace, arrests admin (Bleeping Computer) Washington Post investigating cyberattack on journalists' email accounts, source says (Reuters) Anubis Ransomware Packs a Wiper to Permanently Delete Files (SecurityWeek) GrayAlpha Hacker Group Weaponizes Browser Updates to Deploy PowerNet Loader and NetSupport RAT (Cyber Security News) Malicious Payload Uncovered in JPEG Image Using Steganography and Base64 Obfuscation (Cyber Security News) Tenable Fixes Three High-Severity Flaws in Vulnerability Scanner Nessus (Infosecurity Magazine) Microsoft-Signed Firmware Module Bypasses Secure Boot (Gov Infosecurity) Bipartisan bill aims to create CISA-HHS liaison for hospital cyberattacks (The Record) Coker: We can't have economic prosperity or national security without cybersecurity (The Record) The Meta AI app is a privacy disaster (TechCrunch) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
A new White House executive Order overhauls U.S. cybersecurity policy. The EU updates its “cybersecurity blueprint”. The Pentagon's inspector general investigates Defense Secretary Hegseth's Signal messages. Chinese hackers target U.S. smartphones. A new Mirai botnet variant drops malware on vulnerable DVRs. 17 popular Gluestack packages on NPM have been compromised. Attackers exploit vulnerabilities in Fortigate security appliances to deploy Qilin ransomware. A Nigerian man gets five years in prison for a hacking and fraud scheme. Our guest is Tim Starks from CyberScoop, discussing Sean Cairncross' journey toward confirmation as the next National Cyber Director. Fire Stick flicks spark a full-on legal blitz. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Tim Starks from CyberScoop, to discuss Sean Cairncross, who's bringing a focus on policy coordination if confirmed as the next National Cyber Director. Selected Reading Trump Administration Revises Cybersecurity Rules, Replaces Biden Order (Infosecurity Magazine) Europe arms itself against cyber catastrophe (Politico) Pentagon watchdog investigates if staffers were asked to delete Hegseth's Signal messages (Associated Press) Chinese hackers and user lapses turn smartphones into a 'mobile security crisis' (Associated Press) iMessage Zero-Click Attacks Suspected in Targeting of High-Value EU, US Individuals (SecurityWeek) New Mirai botnet infect TBK DVR devices via command injection flaw (Bleeping Computer) Malware found in NPM packages with 1 million weekly downloads (Bleeping Computer) Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware (Cyber Security News) Nigerian Involved in Hacking US Tax Preparation Firms Sentenced to Prison (SecurityWeek) Hacked Fire Sticks now come with more than just malware – a possible jail sentence (Cybernews) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Bill O'Reilly talks about new crime stats for New York City. Learn more about your ad choices. Visit megaphone.fm/adchoices