Podcasts about Attackers

  • 1,341PODCASTS
  • 2,351EPISODES
  • 38mAVG DURATION
  • 1DAILY NEW EPISODE
  • May 21, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Attackers

Show all podcasts related to attackers

Latest podcast episodes about Attackers

Total Soccer Show: USMNT, EPL, MLS, Champions League and more ...
Dest! Jedi! Wide attackers? Breaking down the USMNT Gold Cup provisional roster | USMNT Weekly

Total Soccer Show: USMNT, EPL, MLS, Champions League and more ...

Play Episode Listen Later May 21, 2025 59:38


We have the latest 60-player provisional roster for the USMNT, and we also have... waaaay too many thoughts about it. Surprise inclusions and omissions, our preferred final rosters and starting elevens, and a deeper look at what the pool itself reveals about the state of the program.WE HAVE A YOUTUBE CHANNEL!⁠⁠⁠⁠⁠⁠We're posting all our episodes here⁠⁠⁠⁠⁠⁠! Smash the like and subscribe etc.!JOIN THE TSS+ PATREON!Check out our Patreon, which houses bonus podcasts, access to our exclusive Discord, blog posts, videos, and much more. Hosted on Acast. See acast.com/privacy for more information.

The John Batchelor Show
Preview Colleague Ambassador Husain Haqqani asks for more information regarding the Kashmir terror attackers who provoked the nuclear talk drama. More later.

The John Batchelor Show

Play Episode Listen Later May 19, 2025 2:09


Preview Colleague Ambassador Husain Haqqani asks for more information regarding the Kashmir terror attackers who provoked the nuclear talk drama. More later. 1965 PAKISTAN-INDIA WAR 

Ekot
Ekot 12:30 Många döda i nya israeliska attacker mot Gaza

Ekot

Play Episode Listen Later May 18, 2025 20:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

Snacks
Is Debinha running away with NWSL MVP? A look into the current top candidates

Snacks

Play Episode Listen Later May 15, 2025 19:07


On this week's episode, Claire presents her MVP candidate shortlist as the NWSL season dips into the second third of the year. Attackers have been reigning supreme, but which pros and cons could lead to the biggest individual award of 2025?

Paul's Security Weekly
Ransomware in your CPU - PSW #874

Paul's Security Weekly

Play Episode Listen Later May 15, 2025 118:19


This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversing with Hopper Supercharge your Ghidra with AI Pretending to be an anti-virus to bypass anti-virus macOS RCE - perfect colors End of life routers are a hackers dream, and how info sharing sucks Ransomware in your CPU Disable ASUS DriverHub Age verification and privacy concerns Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-874

Paul's Security Weekly (Podcast-Only)
Ransomware in your CPU - PSW #874

Paul's Security Weekly (Podcast-Only)

Play Episode Listen Later May 15, 2025 118:19


This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversing with Hopper Supercharge your Ghidra with AI Pretending to be an anti-virus to bypass anti-virus macOS RCE - perfect colors End of life routers are a hackers dream, and how info sharing sucks Ransomware in your CPU Disable ASUS DriverHub Age verification and privacy concerns Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-874

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Tuesday, May 12th: Apple Patches; Unipi Technologies Scans;

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later May 13, 2025 6:29


Apple Updates Everything Apple patched all of its operating systems. This update ports a patch for a recently exploited vulnerability to older versions of iOS and macOS. https://isc.sans.edu/diary/31942 It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stupid 2013 Router Vulnerabilities Versions of the Mirai botnet are attacking devices made by Unipi Technology. These devices are using a specific username and password combination. In addition, this version of the Mirai botnet will also attempt exploits against an old Netgear vulnerability. https://isc.sans.edu/diary/It%20Is%202025%2C%20And%20We%20Are%20Still%20Dealing%20With%20Default%20IoT%20Passwords%20And%20Stupid%202013%20Router%20Vulnerabilities/31940 Output Messenger Vulnerability The internal messenger application Output Messenger is currently used in sophisticated attacks. Attackers are exploiting a path traversal vulnerability that has not been fixed. https://www.outputmessenger.com/cve-2025-27920/ Commvault Correction Commvault s patch indeed fixes the recent vulnerability. The Pioneer Release Will Dormann used to experiment will only offer patches after it has been registered, which leads to an error when assessing the patch s efficacy. https://www.darkreading.com/application-security/commvault-patch-works-as-intended

The Gate 15 Podcast Channel
Weekly Security Sprint EP 111. Ransomware, Extremist reporting, plus the future of FEMA support, and geopolitical impacts

The Gate 15 Podcast Channel

Play Episode Listen Later May 13, 2025 20:12


On this week's Security Sprint, Dave and Andy covered the following topics:Warm Open:• ICYMI: REGISTER NOW! WaterISAC's 2025 H2OSecCon! (20 May) From cybersecurity to climate resilience, operational continuity to public trust, we must collaborate across sectors to build smarter, stronger, and more adaptive systems. That's why we're inviting leaders like you to join the WaterISAC's 2025 H2OSecCon. Connect with peers and leaders committed to enhancing the resilience of our nation's critical systems.Main Topics:Ransomware & Data Breaches: • Monday was Anti-Ransomware Day 2025! What a great time to invest in ransomware resilience! Contact Gate 15 today to get to work building your Cyber Incident Response Plan and ransomware procedures, to start planning your next ransomware workshop or tabletop exercise, to plan for post-incident analysis or to take advantage of our new very price-friendly ransomware exercise for executives – designed especially for small and medium businesses! • Explore the latest cyber risks and claims trends from Coalition. LockBit ransomware gang hacked, victim negotiations exposed• Reminder! Criminals lie and NEVER DELETE YOUR DATA! School boards hit with ransom demands linked to PowerSchool cyberattack• M&S 'had no plan' for cyber attacks, insider claims, with 'staff left sleeping in the office amid paranoia and chaos' • The Very Real Costs of Ransomware: IT warning after hackers close 160-year-old firm. Extremism:• Ohio Man Charged with Threatening State Public Officials • Texas Man Convicted of Making Threats to Kill Nashville District Attorney Glenn Funk • FBI has opened 250 investigations tied to violent online network '764' that preys on teens, top official says• Teenage Terrorists Are a Growing Threat to Europe's SecurityUSG Transitions• Trump's 2026 budget proposes $163 billion cut to non-defense spending, slashes CISA and FEMA funding• White House Proposes $500 Million Cut to CISA• Hegseth orders Pentagon to cut number of senior generals by 20%• Lawmakers question Noem over cuts to CISA, FEMA, TSA• Lawmakers grill Noem over CISA funding cuts, demand Trump cyber plan• NSA to cut up to 2,000 civilian roles as part of intel community downsizing• NIST loses key cyber experts in standards and researchIndia strikes Pakistan over tourist killings, Pakistan says it will retaliate• Kashmir crisis live: Pakistan PM authorises armed forces to undertake ‘corresponding action' after India strikes kill 26• Pakistan vows to respond after India launches strikes in wake of Kashmir massacre• Pakistan claims to have downed Indian warplanes, vows response to strikes• China urges restraint as India-Pakistan tensions escalate with military strikes• A Timeline of Tensions Between India and Pakistan Over Kashmir• India, Pakistan accuse each other of attacks as hostilities rise• AlQaeda Statement On Indian Strikes In PakistanQuick Hits:• Crypto millionaires targeted in brutal kidnappings across France and Europe; Attackers' modus operandi: cutting off victims' fingers to pressure payments. • The father of a cryptocurrency entrepreneur was kidnapped in Paris and found held captive with his finger severed. (article in French)• Assessing the U.S. Climate in April 2025Assessing the U.S. Climate in April 2025• FBI PSA - Cyber Criminal Proxy Services Exploiting End of Life Routers• FBI FLASH: Cyber Criminal Services Target End-of-Life Routers to Launch Attacks and Hide Their Activities (PDF)• Risky Bulletin: France says Russian influence operations are getting better, achieving results• Unsophisticated Cyber Actor(s) Targeting Operational Technology • Primary Mitigations to Reduce Cyber Threats to Operational Technology• US Warns of Hackers Targeting ICS/SCADA at Oil and Gas Organizations• Primary Mitigations to Reduce Cyber Threats to Operational Technology• UK NCSC: UK pioneering global move away from passwords• Classic Rock - Hunting A Botnet That Preys On The Old

Martina Thun
Attacker mot sjukvårdsinrättningar

Martina Thun

Play Episode Listen Later May 13, 2025 10:04


Idag har Mia Hejdenberg, som är medicinsk humanitär rådgivare på Läkare Utan Gränser, gästat studion. Dagens ämne har handlat om attacker mot sjukvårdsinrättningar som ökar i krig och konflikter, och vad kan det få för konsekvenser? Det har även pratats om bl.a vad det kan bero på, att attackerna har ökat?

Fightful | MMA & Pro Wrestling Podcast
Alexa Bliss Returns; Orton & Mystery Attacker Target Cena! | WWE Smackdown 5/9/25 Full Show Review

Fightful | MMA & Pro Wrestling Podcast

Play Episode Listen Later May 10, 2025 95:50


Kate (@MissKatefabe) and Alex (@_AlexisCardoza) discuss tonight's episode of Smackdown, May 9, 2025 including:-John Cena returns-Damian Priest and LA Knight vs. Solo Sikoa and Jacob Fatu-No. 1 Contender's Match for the WWE Women's Championship: Jade Cargill vs. Nia JaxGrab your EXCLUSIVE NordVPN Deal by going to http://nordvpn.com/fightful to get a Huge Discount off your NordVPN Plan + a Bonus Gift! It's completely risk free with Nord's 30 day money-back guarantee! ➼ https://nordvpn.com/fightful Try it risk-free now with a 30-day money-back guarantee!All of the odds we speak about on Fightful come from our official partner, BetOnline! Check them out at http://BetOnline.AG for the fastest payouts and earliest lines on sports, wrestling and more!Our Sponsors:* Check out Cigars International and use my code FIGHTFUL for a great deal: https://www.cigarsinternational.com* Check out Hims: https://hims.com/FIGHTFULSupport this podcast at — https://redcircle.com/fightful-pro-wrestling-and-mma-podcast/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

Cybercrime Magazine Podcast
Ransomware Minute. Attackers Target Food & Agriculture Industry. Scott Schober, WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later May 9, 2025 3:19


The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.

The Cyber Threat Perspective
Episode 133: How Cyber Attackers Steal Credentials & Hijack Sessions

The Cyber Threat Perspective

Play Episode Listen Later May 9, 2025 31:51


In this episode of The Cyber Threat Perspective, we break down how attackers steal credentials and hijack sessions to gain unauthorized access to systems and data. From phishing to cookie stealing to session token theft, we'll explore the most common techniques and how to defend against them. Whether you're an IT admin or security pro, you'll walk away with practical tips to help protect your users and your organization.Recommended Conditional Access Policies to protect against account compromise: https://x.com/techspence/status/1919815226158932119Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Spencer's Twitter: https://x.com/techspenceSpencer's LinkedIn: https://linkedin.com/in/SpencerAlessi Work with Us: https://securit360.com

Everyday Miracles Podcast
163. A Miraculous Survival - Priest Stabbed in the Chest Forgives His Attacker!

Everyday Miracles Podcast

Play Episode Listen Later May 8, 2025 38:43


Join the Everyday Miracles podcast with Julie Hedenborg as she welcomes Father Matt Marino from St. Augustine, Florida. In this powerful episode, Father Matt shares his incredible testimony of survival after a brutal and unexpected stabbing. He details the miraculous events and divine intervention that saved his life, his journey of faith, and the profound sense of peace and forgiveness that he felt throughout this harrowing experience. Father Matt's story is a testament to the power of community, the miraculous nature of faith, and the importance of forgiveness. Stay tuned for an inspiring prayer for those struggling with fear and unforgiveness.      00:00 Preview   02:00 Father Matt's Background   06:05 The Attack before breakfast   16:13 The Aftermath and Medical Miracle   27:54 Forgiveness and Reflection   30:42 Startling discovery of demonic voices heard by attacker   32:40 Returning to Normalcy   36:21 Final and Prayer     Ephesians 4:32 "Be kind and compassionate to one another, forgiving each other, just as in Christ God forgave you."      How to reach Father Matt:   https://www.trinitysta.org/    About Father Matt:   An adolescent atheist turned Episcopal priest, Matt likes to drink coffee, talk about Jesus, and will shamelessly invite himself aboard your sailboat. Matt has been rector of Trinity since April Fools day, 2019. Also on Matt's resume: Basketball coach, history teacher, recovery planner, Young Life Area Director, summer camp program architect, youth/young adult director for the Diocese of Arizona, seminary instructor, church planter, consultant, and ballboy for the Phoenix Suns. Each of those experiences has left him more in wonder at the grandeur of the One who made us and calls us home through the cross and empty tomb. Matt and Kari have two grown children, Gabrielle and Luke, who love God and his church. Matt blogs at thegospelside.com

Ekot
Ekot 08:00 Minst 26 personer har dödats i indiska attacker mot Pakistan

Ekot

Play Episode Listen Later May 7, 2025 15:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

Chattinn Cyber
Beyond MFA: How Deepfakes Are Hacking Humans

Chattinn Cyber

Play Episode Listen Later May 6, 2025 12:10


Summary On this episode of Chattinn Cyber, Marc is chattin' with Aaron Painter, a seasoned enterprise tech executive with years at Microsoft and experience leading operations in China and the UK, shares the origin story of his company, Nametag. After observing the rise in identity theft among friends and family, Aaron was struck by how outdated and vulnerable identity verification processes had become—especially the ease with which attackers could answer common security questions using publicly available data. The conversation turns to the evolution of cyber threats, particularly social engineering and deepfake-enabled attacks. Painter outlines a disturbing trend where attackers bypass even sophisticated technological protections like multi-factor authentication (MFA) by exploiting weak points in human processes, such as IT help desks. One example he highlights is the MGM breach, where a phone-based social engineering tactic led to significant damage. Painter emphasizes that many organizations' defenses rely on trust in video verification—such as Zoom or Teams calls—but that these platforms are now susceptible to real-time deepfake emulation. Attackers can impersonate employees or candidates using advanced visual spoofing tools, bypassing traditional verification methods and gaining access to critical systems. To address these vulnerabilities, Nametag offers a mobile-first identity verification solution that leverages smartphone cryptography and biometric tools to take three-dimensional selfies and securely scan IDs. This process ensures stronger identity proofing, even under conditions that would normally be vulnerable to deepfake deception or impersonation. The episode concludes with Painter warning HR professionals about the increasing threat of hiring fraud—where bad actors impersonate real candidates using deepfakes. He advises that companies don't need to replace existing systems like Workday or Okta but should instead implement layered solutions that complement current infrastructure and close critical security gaps. Key Points Cybersecurity Gaps Are Human, Not Just Technical: Despite widespread use of MFA, social engineering attacks targeting help desk personnel remain a primary threat vector. Deepfakes Are Evolving Rapidly: Attackers increasingly use deepfake technologies to impersonate employees or job applicants on video calls, rendering basic visual verification untrustworthy. Nametag's Mobile-First Approach: Nametag strengthens identity verification by using mobile devices' cryptographic and biometric capabilities to combat real-time deepfake impersonation. Hiring Fraud Is a Growing Threat: Criminals, sometimes state-sponsored, use deepfake tools to impersonate legitimate job candidates, gain access to internal systems, and cause serious security breaches. Enterprise Integration Over Replacement: Painter advocates for bolting on new security layers rather than replacing entire systems—filling in gaps while preserving operational continuity. Key Quotes “All you have to do is call and pretend to be the account holder and say you were locked out. Then there's a clear vulnerability. And that vulnerability is a social one or human one.” “The platforms weren't really built to prevent against deepfakes… You've got that person showing up completely different on the video call.” “95% of the background check providers do it with a Social Security number and no identity verification.” “We invented the same concept of scan your ID and take a selfie—but we do it exclusively on mobile.” “I knew identity verification was a hot area. I had no idea it would be this hot.” About Our Guest Aaron Painter is the visionary CEO of Nametag Inc., the pioneering identity verification platform dedicated to protecting users from impersonators and AI-generated deepfakes. With a mission to enhance online authenticity and foster trusted relationships,

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Thursday, May 1st: Sonicwall Attacks; Cached Windows RDP Credentials

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later May 1, 2025 6:28


Web Scanning for Sonicwall Vulnerabilities CVE-2021-20016 For the last week, scans for Sonicwall API login and domain endpoints have skyrocketed. These attacks may be exploiting an older vulnerability or just attempting to brute force credentials. https://isc.sans.edu/diary/Web%20Scanning%20Sonicwall%20for%20CVE-2021-20016/31906 The Wizards APT Group SLAAC Spoofing Adversary in the Middle Attacks ESET published an article with details regarding an IPv6-linked attack they have observed. Attackers use router advertisements to inject fake recursive DNS servers that are used to inject IP addresses for hostnames used to update software. This leads to the victim downloading malware instead of legitimate updates. https://www.welivesecurity.com/en/eset-research/thewizards-apt-group-slaac-spoofing-adversary-in-the-middle-attacks/ Windows RDP Access is Possible with Old Credentials Credential caching may lead to Windows allowing RDP logins with old credentials. https://arstechnica.com/security/2025/04/windows-rdp-lets-you-log-in-using-revoked-passwords-microsoft-is-ok-with-that/?comments-page=1#comments

Easy Prey
DDoS Attacks

Easy Prey

Play Episode Listen Later Apr 30, 2025 49:46


Scammers are getting smarter, understanding the psychology behind social engineering and the challenges companies face every day can help keep networks secure. This episode will show how to anticipate these threats and secure networks against ever-changing vulnerabilities. We'll focus on practical, real-world solutions to protect data and trust. Dr. Jared Smith joins us to share his insights from his role leading research and development at SecurityScorecard. He also co-founded UnCat, a B2B accounting technology company serving thousands of customers and teaches as an adjunct professor at the University of Tennessee, Knoxville and NYU. His experience shows why social engineering is so effective and how companies can adapt to a world where attackers are always refining their techniques. This episode shows how even small oversights or minor issues can lead to big breaches. Dr. Smith shares concrete steps to strengthen defenses, and why we need both technical solutions and employee awareness. By looking at the psychology behind the attacks, he'll show that staying one step ahead depends on using smart security tools and a culture that recognizes vigilance at every level. Show Notes: [01:19] Jared is a distinguished thought researcher at SecurityScorecard. He's built systems and helps vendors monitor and secure their networks. He also has a PHD in computer science. He focuses on Border Gateway Protocol or BGP.  [02:16] He was also a high clearance government national security researcher. [03:02] Jared shares a story about how sophisticated phishing scams are becoming. [08:43] How large language models are making more sophisticated social engineering possible. [10:26] The importance of thinking about cybersecurity needed in the next 10 years. [11:02] BGP is like the plumbing of the internet. BGP poisoning breaks the typical internet traffic route. It's very nuanced traffic engineering that uses the Border Gateway Protocol. [13:34] BGP is also useful when you have multiple internet connections and one goes down. [14:20] The most sophisticated DDoS works are called link flooding attacks, where they identify links that have a certain amount of bandwidth, and they flood that specific border gateway protocol link, effectively segmenting the internet in those places. [15:39] Managing DDOS attacks and where the traffic comes from. [16:02] Being aware of botnets, because they are what's rented out or being used for these attacks. [17:32] Lizard Squad launched DDoS as a service.  [21:00] Attackers try to get the actual IP addresses from behind a CDN. [23:41] How AWS has the ability to manage large amounts of traffic. [25:24] There are some DDoS that just require sending enough traffic to fill up the buffers on the other side of the application. [28:15] The size of a botnet for DDoS to take down a big network like X. We explore potential paths for these attacks. [32:21] We talk about the uptick on attacks during tax season. A large accounting firm with a lot of clients could be spoofed. [36:50] The predominant attacks are coming from organized cybercrime groups and ransomware groups. [45:40] The vast majority of large networks taken out are usually a result of user error. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Jared M. Smith Dr. Jared Smith - SecurityScorecard Dr. Jared Smith - LinkedIn Uncat Evasive AI Jared Smith - X

Nick Ferrari - The Whole Show
Police investigate Leeds 'massacre' plans as crossbow attacker dies following rampage

Nick Ferrari - The Whole Show

Play Episode Listen Later Apr 30, 2025 168:07


On Nick Ferrari at Breakfast.Environment Secretary Steve Reed defends government's environmental policies amid criticism from Tony Blair.Nick Ferrari gets the latest after three have been injured in Forest Gate shooting with two arrested.Shadow environment Victoria Atkins joins us after accusing the Labour government of breaking Purdah rules with Defra's fly tipping press release.All of this and more on Nick Ferrari: The Whole Show Podcast.

ThePrint
CutTheClutter: Modi chairs key security meet as India's forces 'spot' Pahalgam attackers,& tech used by LeT in J&K

ThePrint

Play Episode Listen Later Apr 29, 2025 28:18


#cuttheclutter A week since Pahalgam terror attack that claimed 26 lives, top level huddles are underway in Delhi to calibrate India's response. PM Modi chaired a key meeting with the Defence Minister, NSA, CDS & Chiefs of the three Armed Forces on Tuesday. In Kashmir, India's security forces have reportedly ‘spotted' terrorists behind the attack. ThePrint Editor-In-Chief Shekhar Gupta discusses the key developments on this big story, with Defence Editor Snehesh Alex Philip, in Episode 1650 of #CutTheClutter. They also discuss how Pakistani terrorists, especially LeT have upped the communication battle in Jammu & Kashmir. --------------------------------------------------------------------------------------------- Produced By: Mahira Khan

The Quicky
Bondi Attacker's Search History Revealed At Inquest

The Quicky

Play Episode Listen Later Apr 28, 2025 3:32 Transcription Available


Anthony Albanese has announced a $20 million plan to set up a trauma recovery centre for women and children on the NSW Central Coast; An inquest has heard the man who killed six people at Bondi Junction Westfield was seriously unwell and hadn’t had any mental health treatment in five years; A tragic car ramming attack at a Filipino heritage festival in Vancouver has left 11 people dead and dozens injured; Cyndi Lauper, Chubby Checker and Soundgarden are among the artists set to be inducted into the Rock & Roll Hall of Fame this year. The Quicky is the easiest and most enjoyable way to get across the news every day. And it’s delivered straight to your ears in a daily podcast so you can listen whenever you want, wherever you want...at the gym, on the train, in the playground or at night while you're making dinner. Support independent women's media CREDITS Host/Producer: Tahli Blackman Audio Producer: Lu Hill Become a Mamamia subscriber: https://www.mamamia.com.au/subscribeSee omnystudio.com/listener for privacy information.

The Briefing
Jacqui Lambie slams the majors + Bondi attacker's massacre obsession

The Briefing

Play Episode Listen Later Apr 28, 2025 23:27


Tuesday Headlines: National security, environment and dealing with a minority government firmly on the agenda, the first day of the Bondi Junction stabbings inquest, Vladimir Putin announces a three-day ceasefire, and Bluey’s World in Brisbane has been extended! Deep Dive: As more Australians look beyond the major parties, independent and minor party candidates are making their mark on the political landscape, and this election, it looks like their influence will continue to grow. In this episode of The Briefing, Chris Spyrou is joined by Tasmanian Senator, Jacqui Lambie and Legalise Cannabis’ lead candidate in the NSW Senate, Miles Hunt, to explore why voters are turning away from Labor and the Coalition and what a more independent parliament could mean for you. Follow The Briefing: TikTok: @listnrnewsroom Instagram: @listnrnewsroom @thebriefingpodcast YouTube: @LiSTNRnewsroom Facebook: @LiSTNR NewsroomSee omnystudio.com/listener for privacy information.

20/20
True Crime Vault: Slender Man Attackers

20/20

Play Episode Listen Later Apr 26, 2025 47:31


Interviews with key people connected to the 2014 case in which two 12-year-olds stabbed their friend 19 times and left her for dead, in an effort to appease the mysterious fictional character known as Slender Man. Originally aired: 02/09/18 Learn more about your ad choices. Visit podcastchoices.com/adchoices

Cyber Security Headlines
Russian army map malware, edge tech attack report, Commvault flaw

Cyber Security Headlines

Play Episode Listen Later Apr 25, 2025 8:12


Russian army targeted by Android malware hidden in mapping app Attackers hit security device defects hard in 2024 Critical Commvault Command Center flaw warning Huge thanks to our sponsor, Dropzone AI Alert investigation is eating up your security team's day—30 to 40 minutes per alert adds up fast. Dropzone AI's SOC Analyst transforms this reality by investigating every alert with expert-level thoroughness at machine speed. Our AI SOC Analyst gathers evidence, connects the dots across your security tools, and delivers clear reports with recommended actions—all in minutes. No playbooks to build, no code to write. Just consistent, high-quality investigations that free your team to focus on what matters: stopping actual threats. Meet us at RSA Booth ESE-60. Find the stories behind the headlines at CISOseries.com.

Galway Bay FM - Sports
SOCCER: Galway United attacker Sean Kerrigan with Galway Bay FM's Mike Rafferty after their 2-1 Premier Division win over Drogheda

Galway Bay FM - Sports

Play Episode Listen Later Apr 25, 2025 2:00


SOCCER: Galway United attacker Sean Kerrigan with Galway Bay FM's Mike Rafferty after their 2-1 Premier Division win over Drogheda

Ekot
Ekot 12:30 Hårda attacker mot Ukraina

Ekot

Play Episode Listen Later Apr 24, 2025 25:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

HT Daily News Wrap
Indian intelligence agencies have traced the digital footprints of the Pahalgam attackers to safehouses in Muzaffarabad and Karachi

HT Daily News Wrap

Play Episode Listen Later Apr 24, 2025 4:24


Indian intelligence agencies have traced the digital footprints of the Pahalgam attackers to safehouses in Muzaffarabad and Karachi, India has summoned Saad Ahmad Warraich, Pakistan's top diplomat in Delhi, and handed over the formal persona non grata note for its military diplomats, US President Donald Trump on Wednesday said that Russia has agreed to a deal to end the war in Ukraine, while lashing out at his Ukrainian counterpart, Volodymyr Zelensky, for prolonging the conflict by resisting ceding Crimea, Several Pakistani celebrities, including Fawad Khan, Hania Aamir, and Mawra Hocane, have joined voices to condemn the Pahalgam terror attack, Former India cricketers Virender Sehwag and Navjot Singh Sidhu had contrasting views on Sunrisers Hyderabad batter Ishan Kishan's bizarre dismissal in the match against Mumbai Indians on Wednesday at the Rajiv Gandhi International Stadium.

The Automotive Troublemaker w/ Paul J Daly and Kyle Mountsier
Nissan's Tariff Plan, Working Man's Cybertruck, Cybercriminals Mimic Google

The Automotive Troublemaker w/ Paul J Daly and Kyle Mountsier

Play Episode Listen Later Apr 22, 2025 14:31


Shoot us a Text.Episode #1025: We cover Nissan's plan to hold vehicle prices through early June and increase U.S. production in response to tariffs. Plus we examine Tesla's strategic repositioning of the Cybertruck and how cybercriminals are creating a realistic-looking phishing campaign using Google's own tools.Show Notes with links:Nissan is staying steady on pricing through June 2 and looking to its underused U.S. factories to soften the blow of auto tariffs. The strategy focuses on affordability and domestic production leverage.Nissan has a 3-month supply of tariff-free vehicles and won't raise prices yet.The company plans to boost output at Smyrna, TN and Canton, MS plants, all of which operated at half their capacity in 2024.Rogue production will jump by 54% over the next year, adding 60,000 units, while price cuts of $1K on 2025 Rogue and Pathfinder aim to drive demand.Nissan is incentivizing retailers with its April and May dealer volume bonus program, which pays extra cash to stores that meet sales targets.“We count all the cars [toward the sales target], but we only pay on the U.S.-made cars because we want to give [them a] tailwind,” said Nissan Americas Chair Christian MeunierTesla is quietly shifting the Cybertruck's identity from status symbol to workhorse after early hype faded, trucks stockpiled, and political ties turned divisive. The new approach aims to resonate with a more traditional truck-buying audience.Cybertruck deliveries remain under 50,000; demand has sharply declined with sales dropping 50% in Q1.Tesla updated the product page with rugged, utilitarian imagery, aligning with Ford's F-150 ads.Sales teams report it's harder to sell the truck to actual truck buyers; its novelty isn't enough."They need to advertise durability. It needs to be used and abused, and all of the capabilities that make it a work truck need to be on full display," said Edmunds' Ivan Drury.Cybercriminals are exploiting Google's own “Sites” app to run a phishing campaign that convincingly mimics law enforcement subpoenas and bypasses email authentication safeguards.Emails appear from “no-reply@google.com” and claim law enforcement access to your account.Attackers use Google Sites to create convincing portals that evade DKIM checks.DomainKeys Identified Mail (DKIM) authentication is passed since the emails originate from Google's own infrastructure.Google has acknowledged the issue and is deploying mitigations while encouraging 2FA and passkeys.Join Paul J Daly and Kyle Mountsier every morning for the Automotive State of the Union podcast as they connect the dots across car dealerships, retail trends, emerging tech like AI, and cultural shifts—bringing clarity, speed, and people-first insight to automotive leaders navigating a rapidly changing industry.Get the Daily Push Back email at https://www.asotu.com/ JOIN the conversation on LinkedIn at: https://www.linkedin.com/company/asotu/

AI in Action
Agentic AI: The emerging challenge in cybersecurity

AI in Action

Play Episode Listen Later Apr 22, 2025 27:39


The rise of agentic AI is significantly expanding and widening the attack surface for cybersecurity threats. As AI systems become more capable of autonomous decision-making and action, they simultaneously introduce newer vulnerabilities across workflows, data pipelines and third-party integrations. In this episode, Wendi Whitmore, Senior Vice President of Unit 42 at Palo Alto Networks, shares her views on how agentic AI is redefining the cybersecurity game for both sides: attackers and defenders. Attackers have already started leveraging agentic AI to make the cyberattack process faster and more efficient. Now, the onus is on cyber defenders to quickly harness agentic AI and build security controls that not just match but outpower the speed, sophistication and scale of new age, AI-driven cyberthreats. The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.

KMJ's Afternoon Drive
Fresno worker attacker had arrest warrant. Should have been jailed

KMJ's Afternoon Drive

Play Episode Listen Later Apr 18, 2025 18:18


Suspect in attack on Fresno worker had open felony. Why wasn’t he in custody? Please Subscribe + Rate & Review KMJ’s Afternoon Drive with Philip Teresi & E. Curtis Johnson wherever you listen! --- KMJ’s Afternoon Drive with Philip Teresi & E. Curtis Johnson is available on the KMJNOW app, Apple Podcasts, Spotify, Amazon Music or wherever else you listen. --- Philip Teresi & E. Curtis Johnson – KMJ’s Afternoon Drive --- Weekdays 2-6 PM Pacific on News/Talk 580 & 105.9 KMJ DriveKMJ.com | Podcast | Facebook | X | Instagram --- Everything KMJ: kmjnow.com | Streaming | Podcasts | Facebook | X | Instagram See omnystudio.com/listener for privacy information.

Philip Teresi Podcasts
Fresno worker attacker had arrest warrant. Should have been jailed

Philip Teresi Podcasts

Play Episode Listen Later Apr 18, 2025 18:18


Suspect in attack on Fresno worker had open felony. Why wasn’t he in custody? Please Subscribe + Rate & Review KMJ’s Afternoon Drive with Philip Teresi & E. Curtis Johnson wherever you listen! --- KMJ’s Afternoon Drive with Philip Teresi & E. Curtis Johnson is available on the KMJNOW app, Apple Podcasts, Spotify, Amazon Music or wherever else you listen. --- Philip Teresi & E. Curtis Johnson – KMJ’s Afternoon Drive --- Weekdays 2-6 PM Pacific on News/Talk 580 & 105.9 KMJ DriveKMJ.com | Podcast | Facebook | X | Instagram --- Everything KMJ: kmjnow.com | Streaming | Podcasts | Facebook | X | Instagram See omnystudio.com/listener for privacy information.

The Education Of A Weaponized Man
How many strikes to stop an attacker?

The Education Of A Weaponized Man

Play Episode Listen Later Apr 18, 2025 49:38


What is the SECRET to fight stopping power? What Techniques have proven most effective? Find out what the experts say….And why I think they are all full of shit….

The Michael Knowles Show
BLM 2.0 - Metcalf's Attacker BLOWS GoFundMe Money On A NEW HOUSE

The Michael Knowles Show

Play Episode Listen Later Apr 16, 2025 45:33


President Trump threatens to obliterate Harvard, the family of the teenager who allegedly murdered Austin Metcalf is using his GoFundMe money to buy a new house, and Katy Perry officially becomes a space cadet.Click here to join the member-exclusive portion of my show: https://bit.ly/4biDlriEp.1716- - -DailyWire+:We're leading the charge again and launching a full-scale push for justice. Go to https://PardonDerek.com right now and sign the petition.Now is the time to join the fight. Watch the hit movies, documentaries, and series reshaping our culture. Go to https://dailywire.com/subscribe today.Live Free & Smell Fancy with The Candle Club: https://thecandleclub.com/michael- - -Today's Sponsors:Balance of Nature - Go to https://balanceofnature.com and use promo code KNOWLES for 35% off your first order PLUS get a free bottle of Fiber and Spice.Birch Gold - Text KNOWLES to 989898 for your free information kit.Done With Debt - Start building the life you deserve! Visit https://donewithdebt.com and talk with one of their strategists. It's FREE!- - -Socials:Follow on Twitter: https://bit.ly/3RwKpq6Follow on Instagram: https://bit.ly/3BqZLXAFollow on Facebook: https://bit.ly/3eEmwygSubscribe on YouTube: https://bit.ly/3L273Ek

Rich Zeoli
Report: Shapiro Attacker Motivated by Anti-Israel Hatred

Rich Zeoli

Play Episode Listen Later Apr 16, 2025 36:45


The Rich Zeoli Show- Hour 3: 5:05pm- During a press briefing on Wednesday, White House Press Secretary Karoline Leavitt was joined by Patty Morin—mother of Rachel Morin who was killed by MS-13 gang member Victor Martinez. Morin called out Senator Chris Van Hollen (D-MD) for failing to reach out to her family but finding time to rail against the Trump Administration for deporting dangerous migrants who entered the country unlawfully. Leavitt revealed that the wife of Kilmar Abrego Garcia sought a restraining order against him in 2021, citing domestic abuse. Abrego Garcia—a migrant who was in the United States illegally before being deported to El Salvador—was allegedly a member of MS-13, according to the Trump White House. 5:15pm- Cody Balmer, a 38-year-old Harrisburg man, was charged with setting fire to the Pennsylvania Governor's mansion. Balmer threw two Molotov cocktails into the residence and planned to beat Governor Josh Shapiro with a hammer. Thankfully, Shapiro and his family were unharmed. According to reports, Balmer was motivated by his support for Palestine—and his disdain for Shapiro's Jewish faith and support for Israel. Rich notes: Democrats clearly have an anti-Semitism problem. 5:30pm- During a press conference on Wednesday, Secretary of Health and Human Services Robert Kennedy Jr. announced that his department is planning a series of new studies to identify the cause of Autism. 5:40pm- According to Politico, Congresswoman Alexandria Ocasio Cortez (D-NY) has raised $9.6 million in 3-months. Should she be considered the new frontrunner to win the 2028 Democratic nomination for president? Weekday afternoons on Talk Radio 1210 WPHT, Rich Zeoli gives the expert analysis and humorous take that we need in this crazy political climate. Along with Executive Producer Matt DeSantis and Justin Otero, the Zeoli show is the next generation of talk radio and you can be a part of it weekday afternoons 3-7pm.

Morning Cup Of Murder
To Fight Your Attacker - April 15 2025

Morning Cup Of Murder

Play Episode Listen Later Apr 15, 2025 10:28


Learn more about your ad choices. Visit megaphone.fm/adchoices

Mark Simone
Mark's 11am Monologue.

Mark Simone

Play Episode Listen Later Apr 15, 2025 14:44


The Attacker that went after Governor Josh Shapiro's home over the weekend pulled a similar stunt that almost happened to Nancy Pelosi's Husband. NPR and PBS are at jeopardy of getting their funding cut from the government. Forest Hills Queens got the permits to have concerts in New York after controversy hit months ago to cancel them.

Mark Simone
Hour 2: NPR and PBS are in Jeopardy.

Mark Simone

Play Episode Listen Later Apr 15, 2025 35:53


The Attacker that went after Governor Josh Shapiro's home over the weekend pulled a similar stunt that almost happened to Nancy Pelosi's Husband. NPR and PBS are at jeopardy of getting their funding cut from the government. Forest Hills Queens got the permits to have concerts in New York after controversy hit months ago to cancel them. Mark Takes Your Calls! Mark Interviews Political Consultant Ed Rollins. Ed explains how President Trump needs to clarify the Tariff plan to stop the uncertainty. Mark and Ed talk about how Trump operates as a billionaire and what's good and bad about it.

Mark Simone
Mark's 11am Monologue.

Mark Simone

Play Episode Listen Later Apr 15, 2025 14:45


The Attacker that went after Governor Josh Shapiro's home over the weekend pulled a similar stunt that almost happened to Nancy Pelosi's Husband. NPR and PBS are at jeopardy of getting their funding cut from the government. Forest Hills Queens got the permits to have concerts in New York after controversy hit months ago to cancel them. See omnystudio.com/listener for privacy information.

Mark Simone
Hour 2: NPR and PBS are in Jeopardy.

Mark Simone

Play Episode Listen Later Apr 15, 2025 34:36


The Attacker that went after Governor Josh Shapiro's home over the weekend pulled a similar stunt that almost happened to Nancy Pelosi's Husband. NPR and PBS are at jeopardy of getting their funding cut from the government. Forest Hills Queens got the permits to have concerts in New York after controversy hit months ago to cancel them. Mark Takes Your Calls! Mark Interviews Political Consultant Ed Rollins. Ed explains how President Trump needs to clarify the Tariff plan to stop the uncertainty. Mark and Ed talk about how Trump operates as a billionaire and what's good and bad about it. See omnystudio.com/listener for privacy information.

Mark Simone
FULL SHOW: Trump's Physical, Harvard Is In Trouble, Shapiro's Home.

Mark Simone

Play Episode Listen Later Apr 15, 2025 68:26


No coverage from most of the Media for President Trump's Physical that came back good. Joe Biden returns to the national stage to speak about Social Security and Disability. Harvard University has had 2 billion dollars frozen due to not getting rid of activism on campus. Katy Perry, Gayle King, and more went to space yesterday! Mark Interviews Streaming Host Bill O'Reilly. Bill believes that China has used money they charge other countries in tariffs to strengthen the military. The Financial Markets will get better once the tariff controversy calms down.  The Attacker that went after Governor Josh Shapiro's home over the weekend pulled a similar stunt that almost happened to Nancy Pelosi's Husband. NPR and PBS are at jeopardy of getting their funding cut from the government. Forest Hills Queens got the permits to have concerts in New York after controversy hit months ago to cancel them. Mark Interviews Political Consultant Ed Rollins. Ed explains how President Trump needs to clarify the Tariff plan to stop the uncertainty. Mark and Ed talk about how Trump operates as a billionaire and what's good and bad about it. See omnystudio.com/listener for privacy information.

Mark Simone
FULL SHOW: Trump's Physical, Harvard Is In Trouble, Shapiro's Home.

Mark Simone

Play Episode Listen Later Apr 15, 2025 69:42


No coverage from most of the Media for President Trump's Physical that came back good. Joe Biden returns to the national stage to speak about Social Security and Disability. Harvard University has had 2 billion dollars frozen due to not getting rid of activism on campus. Katy Perry, Gayle King, and more went to space yesterday! Mark Interviews Streaming Host Bill O'Reilly. Bill believes that China has used money they charge other countries in tariffs to strengthen the military. The Financial Markets will get better once the tariff controversy calms down.  The Attacker that went after Governor Josh Shapiro's home over the weekend pulled a similar stunt that almost happened to Nancy Pelosi's Husband. NPR and PBS are at jeopardy of getting their funding cut from the government. Forest Hills Queens got the permits to have concerts in New York after controversy hit months ago to cancel them. Mark Interviews Political Consultant Ed Rollins. Ed explains how President Trump needs to clarify the Tariff plan to stop the uncertainty. Mark and Ed talk about how Trump operates as a billionaire and what's good and bad about it.

Cyber Security Today
Fortinet Exploits, Windows INET Folder, and AI Code Risks: Cyber Security Today for April 14

Cyber Security Today

Play Episode Listen Later Apr 14, 2025 6:46 Transcription Available


In this episode of Cybersecurity Today, host David Shipley discusses several pressing concerns in the cybersecurity landscape. Attackers have been exploiting Fortinet VPN devices to maintain access even after patches were applied; administrators are urged to upgrade and follow recovery guidance. Microsoft has created a new INET Pub folder through its latest Windows update, advising users not to delete it due to a linked security flaw. Lastly, AI-generated code dependencies are becoming a serious supply chain risk, with attackers creating malicious packages based on AI hallucinations. Users are advised to thoroughly review AI-generated code to avoid 'slop squatting'. 00:00 Introduction and Fortinet VPN Exploits 02:46 Microsoft's INET Pub Folder Issue 04:57 AI Hallucinations and Code Dependencies 06:22 Conclusion and Contact Information

GeekVerse Podcast
Andor Season 2 Predictions | Fantastic 4 New Details & Rumors : Weekly Geek

GeekVerse Podcast

Play Episode Listen Later Apr 11, 2025 84:54


Topics-Andor Season 2 Predictions-Darth Maul Animated Show In The Works-Jodie Comer In Talks For Gosling's Star Wars-Jesse Plemons Rumoured For Villain In Star Wars Project-New F4 Details & Rumours-Taylor Has Information On Travis's Attacker!Enjoy Ad-Free, Early, & Exclusive Episodes! https://www.patreon.com/GeekVerseSupport Our Patreon To Help Us Grow The Podcast and Create New Content Guest On Shows, Pick Films For Us To Review, Send Topics & More!GeekVerse.ca is where you can find all the info on the show and where you can find it!Come Chat With The Hosts, Join Our Discord! https://discord.gg/GMBM3yucBecome a supporter of this podcast: https://www.spreaker.com/podcast/geekverse-podcast--4201268/support.

Cold Case Files
REOPENED: Midnight Attacker

Cold Case Files

Play Episode Listen Later Apr 10, 2025 25:22


From 1997 to 2002, Long Beach, CA detectives attempt to track down a serial predator known as the Belmont Shore Rapist.Greenlight: Start your risk-free trial today at Greenlight.com/coldcaseSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Cloud Security Podcast
How Attackers Stay Hidden Inside Your Azure Cloud

Cloud Security Podcast

Play Episode Listen Later Apr 10, 2025 35:27


In this episode, Ashish sits down with Christian Philipov, Principal Security Consultant at WithSecure, to explore the stealth tactics threat actors are using in Azure and why many of these go undetected.Christian breaks down the lesser-known APIs like Ibiza and PIM, how Microsoft Graph differs from legacy APIs, and what this means for defenders.The 3 common ways attackers stay stealthy in AzureWhy read-only enumeration activity often isn't loggedWhat detection is possible and how to improve itHow conditional access and logging configuration can help defendersWhy understanding Microsoft Graph matters for security opsGuest Socials: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Christian's LinkedinPodcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Podcast- Youtube⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠If you are interested in AI Cybersecurity, you can check out our sister podcast -⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ AI Cybersecurity PodcastQuestions asked:(00:00) Introduction(02:09) A bit about Christian(02:39) What is considered stealthy in Azure?(04:39) Which services are stealthy in Azure?(06:25) PIM and Ibiza API(12:53) The role of Defender for Cloud(18:04) Does the Stealthy API approach scale?(19:26) Preventing Stealthy API attacks(21:49) Best Practices for Prevention in Azure(25:47) Behaviour Analysis in Azure(29:31) The Fun SectionResources spoken about during the interview:Christian's fwd:cloudsec talk - Staying Sneaky in Microsoft AzureChristian's Disobey Talk

Easy Prey
Understanding Ransomware and Defense Strategies

Easy Prey

Play Episode Listen Later Apr 9, 2025 41:20


When it comes to cybersecurity, most people think about firewalls, passwords, and antivirus software. But what about the attackers themselves? Understanding how they operate is just as important as having the right defenses in place. That's where Paul Reid comes in. As the Vice President of Adversary Research at AttackIQ, Paul and his team work to stay one step ahead of cybercriminals by thinking like them and identifying vulnerabilities before they can be exploited.   In this episode, we dive into the world of cyber threats, ransomware, and the business of hacking. Paul shares insights from his 25+ years in cybersecurity, including his experience tracking nation-state attackers, analyzing ransomware-as-a-service, and why cybercrime has become such a highly organized industry. We also talk about what businesses and individuals can do to protect themselves, from understanding threat intelligence to why testing your backups might save you from disaster. Whether you're in cybersecurity or just trying to keep your data safe, this conversation is packed with insights you won't want to miss. Show Notes: [00:58] Paul is the VP of Adversary Research at AttackIQ.  [01:30] His team wants to help their customers be more secure. [01:52] Paul has been in cybersecurity for 25 years. He began working in Novell Networks and then moved to directory services with Novell and Microsoft, Active Directory, LDAP, and more.  [02:32] He also helped design classification systems and then worked for a startup. He also ran a worldwide threat hunting team. Paul has an extensive background in networks and cybersecurity.  [03:49] Paul was drawn to AttackIQ because they do breach attack simulation. [04:22] His original goal was actually to be a banker. Then he went back to his original passion, computer science. [06:05] We learn Paul's story of being a victim of ransomware or a scam. A company he was working for almost fell for a money transfer scam. [09:12] If something seems off, definitely question it. [10:17] Ransomware is an economically driven cybercrime. Attackers try to get in through social engineering, brute force attack, password spraying, or whatever means possible. [11:13] Once they get in, they find whatever is of value and encrypt it or do something else to extort money from you. [12:14] Ransomware as a service (RaaS) has brought ransomware to the masses. [13:49] We discuss some ethics in these criminal organizations. Honest thieves? [16:24] Threats look a lot more real when you see that they have your information. [17:12] Paul shares a phishing scam story with just enough information to make the potential victim click on it.  [18:01] There was a takedown of LockBit in 2020, but they had a resurgence. It's a decentralized ransomware as a service model that allows affiliates to keep on earning, even if the main ones go down. [20:14] Many of the affiliates are smash and grab, the nation states are a little more patient.  [21:11] Attackers are branching out into other areas and increasing their attack service, targeting Linux and macOS. [22:17] The resiliency of the ransomware as a service setup and how they've distributed the risk across multiple affiliates. [23:42] There's an ever growing attack service and things are getting bigger. [25:06] AttackIQ is able to run emulations in a production environment. [26:20] Having the ability to continuously test and find new areas really makes networks more cyber resilient. [29:55] We talk about whether to pay ransoms and how to navigate these situations.  [31:05] The best solution is to do due diligence, updates, patches, and separate backups from the system.  [35:19] Dealing with ransomware is a no win situation. Everyone is different. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Paul Reid - Vice President, Adversary Research AttackIQ Paul Reid on LinkedIn AttackIQ Academy Understanding Ransomware Threat Actors: LockBit

Privacy Please
S6, E239 - Russian Hackers, Leaked Military Secrets, and Your DNA

Privacy Please

Play Episode Listen Later Apr 7, 2025 20:54 Transcription Available


Send us a textPrivacy threats continue to escalate as human error undermines even the most secure systems, from military officials accidentally exposing classified information to Russian hackers targeting encrypted messaging apps.• Signal security breach occurred when defense officials accidentally added a reporter to their encrypted group chat discussing sensitive military operations• Russian-linked attackers targeting Signal users through QR code vulnerabilities, tricking users into linking their secure accounts to attacker-controlled instances• QR codes present broader security concerns as users can't verify where they lead before scanning them• Attackers can place malicious QR codes over legitimate ones in public spaces like restaurants and airports• 23andMe's bankruptcy raises critical questions about the fate of genetic data from 15 million users• When companies holding sensitive personal information go bankrupt, data ownership and protection becomes uncertain• Human error remains the primary vulnerability in most privacy and security systems• Always consider the long-term implications when sharing personal information with any serviceRemember to think beyond the present when sharing your data – consider what might happen to that information in 10, 20, or even 30 years from now. Support the show

Paul's Security Weekly TV
How attackers exploit identity gaps to get into your cloud and SaaS - Paul Nguyen - ESW #401

Paul's Security Weekly TV

Play Episode Listen Later Apr 7, 2025 43:15


You might know them from their excellent research work on groups like Scattered Spider, or their refreshing branding/marketing style, but Permiso is laying some impressive groundwork for understanding and defending against identity and cloud-based attacks. In this interview, we talk with co-founder and co-CEO Paul Nguyen about understanding the threats against some of cybercriminals' favorite attack surface, insider threats, and non-human identity compromise. Segment Resources: This blog post from our threat research team on Scattered Spider shows how threat actors move laterally in an environment across identity providers, Iaas, PaaS and SaaS environments, and how this lateral movement ultimately creates blind spots for many security teams This great talk by Ian Ahl, from fwd:cloudsec 2024, touches on a lot of great TTPs used by attackers in IDPs and in the cloud Another blog, When AI Gets Hijacked: Exploiting Hosted Models for Dark Roleplaying and another, What Security Teams Can Learn From The Rippling/Deel Lawsuit: Intent Lies in Search Logs Show Notes: https://securityweekly.com/esw-401

Prime Time with Alex Stein
Ep 298 | UT Dallas Trans Attacker Story GOES NATIONAL After ARREST!

Prime Time with Alex Stein

Play Episode Listen Later Mar 28, 2025 65:19


Today, we've got another action-packed episode of "Prime Time with Alex Stein," and we will be getting some updates on the trans activist who was arrested after attacking Jimmy and a few Turning Point activists. Yella Beezy, a Dallas rapper, was arrested, and Alex went to try to get him bailed out of jail. He'll share some details on that story. Tony Ortiz of Current Revolt has been reporting on paid influencer campaigns by Influenceable, so he'll give us some insight into that story. We're joined in studio by Jim Pfaff, president of the Conservative Caucus, Tony Ortiz, and impressionist Blake Giunta. Sponsors: PureHealth Just go to PureHealthResearch.com and use coupon code ALEX at checkout. With its 365-day money-back guarantee, there's zero risk in trying something new. So why wait? Head over to PureHealthResearch.com now, explore the 45 amazing supplements, and save 35% before this deal ends with coupon code ALEX. Don't miss this chance to start the year feeling your best!  Learn more about your ad choices. Visit megaphone.fm/adchoices

The President's Daily Brief
March 26th, 2025: FBI Zeroes In On Tesla Attackers & Washington Lifts Taliban Bounties

The President's Daily Brief

Play Episode Listen Later Mar 26, 2025 22:30


In this episode of The President's Daily Brief: The FBI launches a new task force targeting a surge in attacks on Tesla vehicles—but critics say the Justice Department is being politically weaponized. The U.S. quietly removes multimillion-dollar bounties on senior Haqqani network leaders, including the Taliban's current interior minister. Turkey's president intensifies his crackdown on pro-democracy protests as demonstrations continue following the arrest of his top political rival. In today's Back of the Brief: China unveils a deep-sea cable-cutting device capable of severing the world's most secure underwater communication lines—raising fears of digital sabotage. To listen to the show ad-free, become a premium member of The President's Daily Brief by visiting PDBPremium.com. Please remember to subscribe if you enjoyed this episode of The President's Daily Brief. YouTube: youtube.com/@presidentsdailybrief Stash Financial: Go to https://Get.Stash.com/PDB Learn more about your ad choices. Visit megaphone.fm/adchoices

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Thursday Mar 20th: Cisco Smart Licensing Attacks; Vulnerable Drivers again; Synology Advisories Updated

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Mar 20, 2025 7:09


Exploit Attempts for Cisco Smart Licensing Utility CVE-2024-20439 CVE-2024-20440 Attackers added last September's Cisco Smart Licensing Utility vulnerability to their toolset. These attacks orginate most likely from botnets and the same attackers are scanning for a wide range of additional vulnerabilities. The vulnerability is a static credential issue and trivial to exploit after the credentials were published last fall. https://isc.sans.edu/diary/Exploit%20Attempts%20for%20Cisco%20Smart%20Licensing%20Utility%20CVE-2024-20439%20and%20CVE-2024-20440/31782 Legacy Driver Exploitation Through Bypassing Certificate Verification Ahnlab documented a new type of "bring your own vulnerable driver" vulnerability. In this case, an old driver used by an anit-malware and anti-rootkit system can be used to shut down arbitrary processeses, including security related processeses. https://asec.ahnlab.com/en/86881/ Synology Vulnerability Updates Synology updates some security advisories it release last year adding addition details and vulnerable systems. https://www.synology.com/en-global/security/advisory/Synology_SA_24_20 https://www.synology.com/en-global/security/advisory/Synology_SA_24_24