POPULARITY
Categories
This week's Security Squawk episode isn't about phishing. It's about structural weakness. Three separate incidents. Three different industries. One uncomfortable pattern: the systems organizations trust most are expanding risk quietly — and in some cases, architecturally. First, a lawsuit that should make every board member pay attention. Marquis Software Solutions, a fintech serving 74 U.S. banks, is suing SonicWall. The allegation centers on SonicWall's cloud backup system, where firewall configuration backups were allegedly accessible and contained credentials — including MFA scratch codes. Those backups were reportedly used to compromise Marquis, leading to a ransomware incident and downstream exposure. What began as a scoped 5% customer exposure was later reported as potentially impacting all customers. This is not a misconfigured endpoint. This is a control-plane failure. For CEOs, this reframes vendor risk. It's no longer a questionnaire exercise. It's a litigation vector. If a security provider's design exposes authentication artifacts, your internal diligence may not matter. The liability chain now includes vendors and MSPs in a very direct way. For IT Directors, the operational question is simple: what exactly is inside your firewall backups? Are reusable authentication artifacts stored? Who can access vendor-hosted exports? If attackers obtain your configuration backups, can they replay your defenses? For MSPs, the exposure is real. If you manage firewall exports or MFA deployments, you are part of the architecture. And potentially part of the courtroom. Then we shift to UFP Technologies, a medical device manufacturer. Intrusion detected. Billing and shipping label systems disrupted. Data stolen or destroyed. Insurance expected to offset financial impact. But this isn't primarily a data story. Attackers disrupted order-to-cash and fulfillment velocity. In healthcare supply chains, slowing billing and labeling can create immediate executive escalation without touching the factory floor. Modern ransomware groups increasingly target business process choke points — ERP, labeling, scheduling — because leverage doesn't require full encryption anymore. For CEOs, “no material impact expected” is accounting language. Customers measure impact in delayed shipments. For IT leaders, the question becomes operational: can billing, labeling, and fulfillment functions recover independently? Are those systems segmented? Tested? Immutable? For risk managers and insurers, this represents a shift in underwriting focus — from endpoints to process resilience. Finally, the University of Hawaiʻi Cancer Center ransomware incident. Roughly 87,000 study participants directly impacted. But historical datasets, including Social Security numbers collected from driver's license and voter registration data dating back to 1998, expanded potential exposure to nearly 1.2 million individuals. They engaged the threat actors. They received a decryptor. They received “assurances” that data was destroyed. That's not verification. That's negotiation. The uncomfortable truth: legacy identity data becomes modern ransom currency. Research environments often have weaker governance than clinical systems, yet they can contain decades of sensitive identifiers. For boards, the issue isn't just security posture. It's data retention discipline. What obsolete identity data are you still holding? Why? For how long? And who owns the risk? Across these stories, three themes emerge: Control-plane trust is fragile. Operational choke points are the new leverage strategy. Data retention is compounded liability. Cybersecurity is no longer just about stopping intrusion. It's about architectural accountability and governance maturity. If you value independent, executive-level analysis without vendor spin, support the show at: buymeacoffee.com/securitysquawk The real question is this: Are your greatest cyber risks coming from external attackers — or from design decisions you haven't revisited in years?
Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radios app.
Today is Monday, March 2, 2026. Welcome to In Case You Missed It, our weekly five-minute rundown of important channel news stories that might have flown under the radar last week. In this edition: Component shortages start hitting the channel: Rising memory and storage costs are prompting vendors to revisit pricing and deal protections, highlighted by a letter from Cisco to partners and reinforced by warnings from other vendors, distributors, and suppliers as availability tightens across servers, storage, and PCs. Pure Storage rebrands as Everpure: Pure Storage has rebranded to Everpure, signaling a shift toward AI-ready data management and rolling out partner program changes aimed at supporting subscription services and platform-led growth. WatchGuard targets MSPs with enterprise-grade security: WatchGuard says new platform enhancements allow MSPs to deliver enterprise-level security outcomes — including zero trust, MDR, and unified management — without enterprise-level complexity. AWS threat research highlights AI-driven attacks: New findings from Amazon Web Services show attackers using AI-assisted techniques to accelerate exploitation of perimeter devices, including firewalls, underscoring how rapidly the threat landscape is evolving. Read Full Transcript Hello and welcome to In Case You Missed It from ChannelBuzz.ca, your Monday morning recap where we catch you up on some of the channel news and trend headlines you may have missed in the last week. I’m Robert Dutt, editor of ChannelBuzz.ca. Today is Monday, March 2, 2026. Let’s get your week started right. This week, the IT channel is being forced to confront an uncomfortable reality. Global components shortages and memory price spikes are fundamentally reshaping how hardware deals are negotiated and fulfilled, and vendors are already updating partner policies as they try to cope. At the center of the storm is a note from Cisco Systems to partners, which was obtained by CRN, in which Cisco says it’ll adjust partner contract terms in response to rapidly rising memory costs and supply volatility. The company now reserves the right to cancel compute orders up to 45 days prior to shipment and to adjust pricing between order and shipment date if component costs, tariffs, or other external factors shift dramatically. That’s a significant departure from the traditional price protection norms. And this isn’t isolated. Executives from major distributors told CRN that memory and storage shortages, particularly DRAM and SSDs, are pushing prices up and tightening supplies across servers, storage, and PC portfolios. Memory prices are reported to have doubled year over year in early 2026, and are expected to continue rising, leading many distributors to shorten their own validities and revisit backlog pricing with vendors. Vendors themselves are directly advising partners of pricing shifts too. Lenovo has warned partners that select PC and server products will see price hikes in March unless orders are placed and shipped promptly, reflecting those costs. And hardware availability is also tightening in real terms. For example, Western Digital says its entire 2026 hard drive production capacity is already spoken for, with most allocations locked up in long-term agreements with hyperscale cloud and AI customers, a trend that could push prices higher and leave less inventory for channel projects. As memory, storage, and other components become harder to source and pricier to procure, partners may face shortened quote windows, less pricing certainty, and project timing risk, compelling MSPs and VARs to rethink their own quoting strategies, accelerate their sales cycles, and build supply chain agility into their roadmaps. Good luck out there. Also worth noting, Everpure, the company formerly known as Pure Storage, has completed a major strategic evolution, rebranding itself to signal a transition from traditional storage vendor to a broader AI-ready data management platform and announcing changes that partners should really pay attention to. The name change, which takes effect on the New York Stock Exchange March 5, reflects the company’s push into enterprise data orchestration and intelligence beyond simply shipping storage hardware and arrays. Central to this transformation is Everpure’s planned acquisition of data intelligence firm 1touch, a move designed to bring automated data discovery, classification, and semantic enrichment capabilities into its portfolio. This expands the enterprise data cloud vision, equipping enterprises to make data inherently AI-ready and more valuable across hybrid environments. Alongside that rebrand, Everpure has updated its partner engagement model with a new tiering structure that gives MSPs, resellers, and distributors clearer pathways to profitability and growth, reflecting the broader mission of the company going forward. Recent results show that the demand for data management and subscription services are driving double-digit growth, the company says, underscoring why partners should lean into Everpure’s evolving platform play. For channel pros, the message is that Everpure sees partners as critical to selling data-centric solutions in the AI era and is aligning its incentives and program structure accordingly. Up next, WatchGuard is positioning its latest platform updates as a way for MSPs to deliver what it calls enterprise-grade security to small and mid-sized customers, without the complexity typically associated with large enterprise tools. The company says the enhancements are focused on unifying endpoint, network, identity, and MDR capabilities into a single manageable platform designed for service providers. Key to the message is simplification. WatchGuard is emphasizing centralized management, automated threat response, and bundled security services that allow MSPs to deploy advanced protection like zero-trust network access, AI-driven threat detection, and 24/7 monitoring at scale and under predictable pricing models. For MSPs, the pitch is that this closes a long-standing gap, giving smaller customers access to security capabilities that more rival enterprise deployments, while still fitting MSP operational and margin requirements. WatchGuard argues that as threats become more sophisticated, the ability to offer enterprise-grade outcomes without enterprise-grade overhead is becoming a baseline expectation rather than a premium add-on. And speaking of more sophisticated threats to bring this week’s roundup home, new threat research from Amazon Web Services adding to the evidence that AI is actively changing how attacks are carried out, not just how they’re defended against. AWS researchers report seeing threat actors use AI-assisted techniques to more quickly identify and exploit vulnerabilities in perimeter devices, including Fortinet FortiGate firewalls, reducing the time between disclosure and real-world exploitation. The finding reinforces a growing concern for solution providers. Attackers are using AI to scale reconnaissance, speed up exploit development, and adapt attacks faster than traditional defenses expect. For MSPs and VARs, the implication is clear. Staying ahead now requires faster patching cycles, continuous monitoring, and security platforms that assume AI-accelerated threats are the norm and not an edge case. Those are some of the things we were paying attention to last week. This week on the podcast, expect to hear how Citrix is thinking of partners as it hands off more of its channel management to Arrow Electronics, a look at the role of identity in taming shadow AI, and how startup Lexful is aiming to redefine how MSPs think about documentation. I’m Robert Dutt for ChannelBuzz.ca. Have a great week!
Hosted on Acast. See acast.com/privacy for more information.
(Presented by Thinkst Canary: Most Companies find out way too late that they've been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching 'em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.) Three Buddy Problem - Episode 87: We wake up to news of U.S./Israel military action against Iran and the expected fallout, including Tehran's cyber capabilities and proxy risks. Plus: Anthropic's clash with the Pentagon over AI use in warfare, market shockwaves from AI-driven security tools, mass layoffs tied to automation, Trenchant exec sentencing and sanctions in the exploit trade, and fresh questions around Cisco's SD-WAN breach and supply-chain trust. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.
JohannaGrüter på P3 Nyheter förklarar morgonens stora nyheter, alltid tillsammans med programledarna för Morgonpasset i P3: Branne Pavlovic och Margret Atladottir. Lyssna på alla avsnitt i Sveriges Radios app. Vid 07 på lördagsmorgonen, svensk tid, kom dom första rapporterna om explosioner i Irans huvudstad Teheran. Israel meddelade att de inlett en "förebyggande attack", och USA:s president Trump bekräftade senare att landet deltar i attacken.
* Sponsor read Bart Merrick Team and market confusion * Longtime advertiser becomes platinum client * Advice on buying and selling during rate changes * Friday Free Show opening * BDM Appreciation Week announced * $5 shirt presale and signup info * April 11 members party details * Dad hat merch sale * Construction noise outside studio * Seth absent due to renovation stress * Discussion of stress tolerance and burnout * Stress without recovery worsens coping * Beard turning gray conversation * Biggest regret was starting renovation * Previous mansion sale repair disputes * Video tour of unfinished house * Smart fridge ovens and propane range * Expensive decorative upgrades * Range caused house fire incident * Gaudy luxury house jokes * Wood ceiling beams and playroom prep * Project far behind schedule * Screaming in car lost voice * Wrong appliance finish frustration * Bad contractor work and service issues * Smart oven wifi and Sabbath mode * Limestone tile sealed incorrectly * Entire floor covered in hardened spots * Contractors refused repair job * Chemical strip then mechanical polish * Repair cost about five thousand * Regret selling old house * Marriage strain and cramped rental life * Wife now works at Disney hotel * Increased workload at dojo * Castleberry neighborhood comparison * Broken ride on car giveaway * Boat dock lift completed * Boat stuck in driveway tire issues * Childcare juggling during move * Sleep Number bed delivery trouble * Plumbing and wiring disputes * Move in maybe one to two weeks * Six figures over budget * Savings emotionally drained * Pool dig discovered large root * Extra charges expected * Spiral staircase delivery problems * Karate of Orlando business plug * Dojo pricing confusion email * Premium materials admiration * Tease armed speedboat near Cuba * Cuban Coast Guard shootout story * No child on the boat * Armed men attacked patrol boat * Cuba labeled infiltration * Attackers killed after gunfire exchange * Amateur invasion disbelief * Miami exile groups discussed * Childhood neighbors ran drills * Teen transporting guns to Everglades * Shooting watermelons no ear protection * Guns and Melons joke * Parent loss reflection * Growing up minority in Miami * Kids had access to guns and alcohol * Debate nature vs parenting influence * Listener sent Bentons country ham * Country ham traditions and funerals * Quick fry biscuits serving method * Anniversary restaurant indecision * Tease feeding alcohol to hawk * Man gave BuzzBall to hawk arrested * Alcohol toxic to birds * Old beer drinking camel story * Animals seeking intoxicants discussion * Mid level cruelty debate * Marijuana smoke harms birds * Dead pelican car prank * Amoeba infection fears * Pee hole fish myth debunked * Amazon travel fears comparison * Upcoming show plugs and events ### Social Media [https://tomanddan.com](https://tomanddan.com) [https://twitter.com/tomanddanlive](https://twitter.com/tomanddanlive) [https://facebook.com/amediocretime](https://facebook.com/amediocretime) [https://instagram.com/tomanddanlive](https://instagram.com/tomanddanlive) Tom & Dan on Real Radio 104.1 Apple Podcasts: [https://podcasts.apple.com/us/podcast/a-corporate-time/id975258990](https://podcasts.apple.com/us/podcast/a-corporate-time/id975258990) Google Podcasts: [https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fjb3Jwb3JhdGV0aW1lL3BvZGNhc3QueG1s](https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2Fjb3Jwb3JhdGV0aW1lL3BvZGNhc3QueG1s) TuneIn: [https://tunein.com/podcasts/Comedy/A-Corporate-Time-p1038501/](https://tunein.com/podcasts/Comedy/A-Corporate-Time-p1038501/) Exclusive Content [https://tomanddan.com/registration](https://tomanddan.com/registration)
Nyheterna Radio 08.00
On the latest episode of Media Matters, David Lynch joins Dave Davis for all the latest on Liverpool's transfer activity, including the Reds' desire for much-needed fresh wingers and attacking threat with pace and much more! Learn more about your ad choices. Visit podcastchoices.com/adchoices
Threat actors break out in under 30 minutes Claude allegedly hit with distillation attacks DeFi platform shutting down after crypto theft Get links to all of today's news in our show notes here: https://cisoseries.com/cybersecurity-news-hacked-in-30-minutes-claude-distillation-defi-shutdown-after-attack/ Thanks to today's episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first security awareness platform built to stop AI-powered social engineering. Attackers don't need malware anymore; they need trust. Tip: set a simple passphrase for high-risk actions, like wire requests or "urgent" account recovery – especially within finance teams and families. If the caller can't answer it, pause and verify. Adaptive runs deepfake and vishing simulations so employees practice this before it's real. adaptivesecurity.com.
SolarWinds patches four critical remote code execution vulnerabilities. A ransomware attack on Conduant puts the data of over 25 million Americans at risk. RoguePilot enables Github repository takeovers. ZeroDayRat targets Android and iOS devices. North Korea's Lazarus group deploy Medusa ransomware against organizations in the U.S. and the Middle East. Attackers' breakout times drop to under half an hour. CISA maintains its mission despite staffing challenges. Russian satellites draw fresh scrutiny. Two South Korean teenagers are charged with breaching Seoul's public bike service. Krishna Sai, CTO at SolarWinds, discusses why leaders should focus less on speculating about an AI bubble, and more on how to quantify AI's tangible contributions. The Pope pushes prayerful priests past predictable programs. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Krishna Sai, CTO at SolarWinds, discussing why leaders should focus less on speculating about an AI bubble, and more on how to quantify AI's tangible contributions. Selected Reading Critical SolarWinds Serv-U flaws offer root access to servers (Bleeping Computer) Massive Conduent Data Breach Exfiltrates 8 TB Affects Over 25 Million Americans (GB Hackers) GitHub Issues Abused in Copilot Attack Leading to Repository Takeover (SecurityWeek) New ZeroDayRAT Malware Claims Full Monitoring of Android and iOS Devices (Hackread) North Korean state hackers seen using Medusa ransomware in attacks on US, Middle East (The Record) CrowdStrike says attackers are moving through networks in under 30 minutes (CyberScoop) Shutdown at D.H.S. Extends to Cyber Agency, Adding to Setbacks (The New York Times) From Cold War interceptors to Ukraine: how Russia came to park spy satellites next to the West's most sensitive tech in orbit (Meduza) Korean cops charge two teens over Seoul bike hire breach (The Register) Pope tells priests to use their brains, not AI, to write homilies (EWTN News) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Cybercrime's escalation has reached a projected $12.2 trillion annual impact by 2031, with a notable surge in remote monitoring and management (RMM) tool abuse—up 277% year-over-year, according to Huntress and supporting vendor reports. Attackers utilize legitimate IT tools to facilitate stealthier ransomware and phishing campaigns, amplifying structural vulnerabilities within MSP technology stacks. Key metrics from Acronis, WatchGuard, and Vectra AI indicate a shift to smaller, more evasive malware campaigns, longer times to ransomware deployment (averaging 20 hours), and widespread unaddressed security alerts, raising questions about the adequacy of current defenses and incident response practices. Vendor-supplied threat intelligence further shows that MSPs' reliance on signature-based platforms and insufficient visibility leaves them exposed to evolving attack techniques. Data reviewed suggests phishing footholds can quickly compromise cross-client environments, and legal ramifications heavily fall on the service provider when RMM or monitoring tools act as entry points. Notably, only about 58-60% of organizations report full visibility across their systems, with a majority of alerts remaining unaddressed, underscoring gaps in operational maturity and preparedness. Adjacent coverage highlighted Microsoft Copilot's repeated security control failures within regulated environments, specifically its inability to enforce sensitivity labels and boundaries across emails—most recently affecting the UK's National Health Service. The lack of vendor-announced architectural changes calls into question the viability of deploying AI tools in compliance-driven contexts. Separately, political and public backlash against surveillance technologies (such as Flock cameras) demonstrates that unchecked data collection is no longer a manageable passive risk, as data becomes increasingly actionable and retains liability beyond technical considerations. The practical takeaway for MSPs and IT leaders is a need to prioritize audit, documentation, and enforcement of controls within their technology stacks, especially where vendor tools or AI-driven automation intersect with compliance and client trust. Preserving operational optionality and scrutinizing vendor terms—particularly data sharing and architectural enforcement—are essential to reduce exposure. Waiting for vendor patches, disregarding documented control failures, or underestimating public scrutiny elevate liability across legal, reputational, and client relationship domains. Four things to know today: 00:00 Vendor Threat Reports Converge on One Risk MSPs Can't Outsource: The RMM as Breach Vector 05:11 Copilot Failed Compliance Controls Twice in Eight Months — A Patch Won't Fix That 07:03 Flock Backlash Exposes the Liability Hidden in Every Vendor Data-Sharing Contract 09:42 GTDC Summit: Distributors Pitch AI On-Ramp as Hyperscalers Compress Their Margin Sponsored by:
Hospital Shutdown, Ransomware Surge, Fortinet Failures A hospital doesn't cancel chemotherapy appointments because of a “technical issue.” They cancel them because they've lost operational control. This week, the University of Mississippi Medical Center shut down its entire network after a ransomware attack disrupted systems — including Epic. Clinics closed. Elective procedures paused. Outpatient services halted. Emergency operations activated. Leadership described the shutdown as precautionary. But here's the real question executives should be asking: Why was a full network shutdown necessary? If segmentation is validated… If identity governance is enforced… If lateral movement detection is operationalized… Why does the only safe option become “turn it all off”? In this episode of Security Squawk, we break down what this incident signals about containment confidence, governance maturity, and operational resilience — not just in healthcare, but across every industry that depends on uptime. And we zoom out. Because UMMC isn't happening in isolation. According to TechRadar, ransomware groups have reached an all-time high in 2025. The victim growth rate has doubled. Qilin and other affiliate-driven operators are scaling aggressively. This isn't random chaos. It's industrialization. More fragmentation. More specialization. More execution discipline on the criminal side. Healthcare, public sector, and critical infrastructure are being economically targeted because downtime equals leverage. When systems go dark, negotiation pressure spikes. Then we connect it to something many leaders are still underestimating: Fortinet exploitation patterns. Edge vulnerabilities. VPN credential harvesting. Reinfection cycles months after patches were released. The vulnerability itself isn't the story. The response maturity is. Attackers are repeatedly probing whether organizations: – Patch fast enough – Rotate exposed credentials – Reset trust boundaries after compromise – Validate segmentation integrity – Rebuild identity confidence When those governance steps are skipped, attackers come back. That's not a tooling failure. That's a leadership failure. This episode translates three headlines into one hard truth: Ransomware is no longer just a malware problem. It's a containment confidence problem. For CEOs: If you cannot isolate an intrusion without shutting down revenue operations, your resilience model is fragile. For IT Directors: Active Directory recovery is not a restore-from-backup event. It's a trust re-establishment event. For MSPs: Client environments are operating in a denser criminal ecosystem. Tool stacking without maturity validation will not scale. For Risk Leaders: Financial exposure is no longer limited to ransom. Revenue interruption, regulatory scrutiny, and reputational damage compound quickly — especially in healthcare. We also discuss: • Why attacker communication often signals a second phase • Why affiliate ransomware models are accelerating • Why segmentation validation will become a board-level metric • Why detection speed does not equal governance strength Security Squawk exists to translate cybersecurity chaos into business reality — without vendor spin and without hype. If you value that kind of analysis and want to support independent, executive-focused cybersecurity conversations, you can back the show at: buymeacoffee.com/securitysquawk Your support helps us keep this live, timely, and unfiltered. Because criminals are already running maturity audits. And they invoice in operational shutdown. The question is simple: If it happened to you tomorrow, could you contain it — or would you turn the lights off?
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.A financially motivated threat actor known as GS7 is conducting a large-scale phishing campaign called Operation DoppelBrand, targeting Fortune 500 companies by impersonating their corporate login portals.Kaspersky researchers have analyzed a newly identified Android malware strain named Keenadu that provides attackers with remote control over infected devices.Application Programming Interfaces continue to be a primary attack surface, and new research from Wallarm shows the problem is accelerating as AI adoption expands.Hacker News outlines cybersecurity technology priorities for 2026, framing the environment as one of continuous instability rather than periodic disruption.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform.This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.
Open Tech Talks : Technology worth Talking| Blogging |Lifestyle
Episode # 183 Today's Guest: Adriel Desautels, Founder & CEO, Netragard Adriel is a leader in cybersecurity with over 20 years of experience. Adriel founded Secure Network Operations and the SNOsoft Research Team, whose vulnerability research helped shape modern responsible disclosure practices. He later launched Netragard, pioneering Realistic Threat Penetration Testing, which he now call Red Teaming, and expanding into a broad range of security services. Website: Netregard X/Twitter: Netregard What Listeners Will Learn: Why "AI penetration testing" is often closer to automated scanning than real offensive testing How AI changes security risk mainly through volume and speed, not necessarily sophistication Where organizations get misled into a false sense of security Why "preventing breach" is unrealistic and why limiting damage paths matters more What cybersecurity professionals should focus on to stay relevant in the LLM era How AI may influence vulnerability research, but still struggles with novel exploitation thinking Resources: Netregard
Your email gateway isn't enough anymore, attackers are already inside the workspace through OAuth apps, browser extensions, and account takeover. In this episode, Ron sits down with Rajan Kapoor, VP of Security at Material Security, to break down the real risks hiding inside Google Workspace and Microsoft 365. They cover how phishing has evolved into full-blown business email compromise, why malicious OAuth apps are the new favorite attack vector, and what security teams, especially lean ones, can do right now to lock down their cloud workspace. Rajan also drops practical advice on passkeys, document sharing hygiene, and why data lifecycle management is a problem no one is solving well enough. Impactful Moments 00:00 – Introduction 03:30 – The current state of phishing 05:30 – Outbound email compromise risk 09:30 – OAuth apps as attack vectors 15:00 – AI agents accessing your workspace 16:00 – Prompt injection is the new SQL injection 18:00 – Allow listing apps immediately 24:30 – Google Workspace vs Microsoft 365 security 27:30 – Custom detections require API expertise 28:00 – Why passkeys matter right now 32:00 – Data lifecycle management for shared docs Links Connect with our guest, Rajan Kapoor, on LinkedIn: https://www.linkedin.com/in/rajankkapoor/ Learn more about Material Security: https://material.security ___ Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/ Check out our upcoming events: https://www.hackervalley.com/livestreams Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
(Presented by Thinkst Canary: Most Companies find out way too late that they've been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching 'em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.) Three Buddy Problem - Episode 85: Top stories this week include drone incursions over El Paso and the murky line between cartel activity, anti-drone tech testing, and full-blown hybrid warfare; updates on the Notepad++ supply chain fallout; Microsoft's zero-day treadmill and AI-enabled attack surfaces; and Apple's “extremely sophisticated” iOS exploits. Plus, Europe's growing appetite for offensive cyber, Palo Alto and the uncomfortable politics of cyber attribution, Singapore on telco intrusions, and the economics of end-of-life infrastructure. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.
Podcast: Exploited: The Cyber Truth Episode: The OT Mistakes Attackers Count On—And How to Fix Them Before They DoPub date: 2026-02-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security CEO Joseph M. Saunders and OT/ICS security expert Mike Holcomb, founder of UTILSEC, for a candid discussion about the weaknesses attackers exploit inside industrial environments. Mike shares what he repeatedly finds during assessments of large OT and ICS networks: no effective firewall between IT and OT, flat networks with little segmentation, stale Windows domains, shared engineering credentials, exposed HMIs, and OT protocols that will accept commands from any reachable host. He explains how attackers move from IT into OT using familiar enterprise techniques before pivoting into PLCs, RTUs, safety systems, and historians. Joe outlines why secure-by-design practices, higher software quality, and “secure by demand” procurement are critical to long-term resilience—especially as cloud connectivity and AI accelerate modernization in industrial environments. Together, they explore: Why a missing or misconfigured IT/OT firewall remains the most common and dangerous gapHow micro-segmentation and unidirectional architectures reduce blast radiusThe risks of web-enabled HMIs and long-lived legacy systemsWhy monitoring PLC programming traffic and historian queries mattersHow the Cyber Resilience Act is reshaping accountability for OT vendors If you're responsible for industrial operations, plant uptime, or product security, this episode shows how attackers actually move through OT environments—and how to eliminate the mistakes they depend on.The podcast and artwork embedded on this page are from RunSafe Security, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Industrial Cybersecurity InsiderEpisode: Former NSA now Founder & CTO Breaks Cybersecurity Down: Satellites to ManufacturingPub date: 2026-02-10Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationDino sits down with Dick Wilkinson, CTO and co-founder of Proof Labs, to explore the intersection of space technology and industrial cybersecurity.Dick shares his 20-year journey in the U.S. Army with the National Security Agency, transitioning from signals intelligence to becoming a CISO for critical infrastructure organizations, including New Mexico's Supreme Court and the Albuquerque water authority.The conversation dives deep into the challenges of securing satellite systems with onboard intrusion detection and the persistent gap between IT and OT security teams. We also explore why the "castle wall" perimeter security model is dangerously outdated.Dick reveals how AI is lowering the barrier to entry for both attackers and defenders, and discusses the real-world applications of satellite communications in oil and gas operations.He also introduces a revolutionary physical layer-one air gap device called Goldilock Secure, which could transform how we protect remote industrial assets.This episode is essential listening for CISOs, CTOs, and security leaders looking to understand emerging threats in space-based infrastructure and practical solutions for securing distributed industrial environments.Chapters:(00:00:00) - Dick's Journey: From NSA to Space Cybersecurity(00:04:32) - What is Proof Labs and Why Space Security Matters(00:08:15) - Satellites as OT Assets: Oil, Gas, and Critical Infrastructure(00:12:47) - How Onboard Intrusion Detection Works in Spacecraft(00:16:23) - The Castle Wall Problem: Moving Beyond Perimeter Security(00:19:41) - IT vs OT: Bridging the Gap in Manufacturing Cybersecurity(00:24:18) - AI's Impact: Lowering the Barrier for Attackers and Defenders(00:27:35) - The Visibility Challenge: Why Most Plants Don't Know Their Assets(00:30:12) - Goldilock Firebreak: A Physical Air Gap Device That Changes Everything(00:35:20) - Real-World Applications for Remote Industrial Asset ProtectionLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Dick Wilkinson on LinkedInProof Labs WebsiteIndustrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radios app.
Got a question or comment? Message us here!Attackers are hiding remote access trojans (RATs) inside malicious MSI installers disguised as legit software, and it's surging in early 2026. We break down how these phishing attacks bypass EDR, what to look for, and how SOC teams can stop them before they turn into full-blown breaches. Support the showWatch full episodes at youtube.com/@aliascybersecurity.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.
Chris Phillips, former head of the National Counter Terrorism Security Office, and Debbie Hayton, journalist and author, come on The Julia Hartley-Brewer Show to discuss two tragedies - a stabbing in London and a school shooting in Canada.Two boys, aged 12 and 13, have been left seriously injured after the attack in Brent, London. It is currently being investigated by a counter-terrorism unit. Chris Phillips discusses how to reduce knife crime, how to keep children safe, and how to improve policing to prevent incidents like this occurring again. Debbie Hayton discusses the Canadian school shooting, after the killer was described as a “gunperson” and an active shooter alert was described as a “female in a dress”. Nine people have died and twenty-five have been injured in the attack in a small village in British Columbia. The shooter was found dead with self-inflicted wounds. Rumours swirled about the perpetrator's sexual identity - which at the time of publishing was yet to be confirmed. Also: Chris Phillips on how pro-palestine protests are inhibiting officers from doing their job - as a report reveals that they are only on the beat for three days a week because of the demands of managing regular demonstrations. And Debbie Hayton on the Scottish National Party spending £1m on legal fees to defend gender self-identification in Scotland. Julia Hartley-Brewer broadcasts on Talk from Monday to Thursday, 10AM to 1PM. Available on YouTube and streaming platforms, along with DAB+ radio and your smart speaker. Hosted on Acast. See acast.com/privacy for more information.
In the world of Generative AI, natural language has become the new executable. Attackers no longer need complex code to breach your systems, sometimes, asking for a "poem" is enough to steal your passwords .In this episode, Eduardo Garcia (Global Head of Cloud Security Architecture at Check Point) joins Ashish to explain the paradigm shift in AI security. He shares his experience building AI-powered fraud detection systems and why traditional security controls fail against intent-based attacks like prompt injection and data poisoning .We dive deep into the reality of Shadow AI, where employees unknowingly train public models with sensitive corporate data , and the sophisticated world of Deepfakes, where attackers can bypass biometric security using AI-generated images unless you're tracking micro-movements of the eye .Guest Socials - Eduardo's LinkedinPodcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-Cloud Security Podcast- Youtube- Cloud Security Newsletter If you are interested in AI Security, you can check out our sister podcast - AI Security Podcast(00:00) Introduction(01:55) Who is Eduardo Garcia? (Check Point)(03:00) Defining Security for GenAI: The Focus on Prompts (05:20) Why Natural Language is the New Executable (08:50) Multilingual Attacks: Bypassing Filters with Mandarin (12:00) Shift Left vs. Shift Right: The 70/30 Rule for AI Security (15:30) The "Poem Hack": Stealing Passwords with Creative Prompts (21:00) Shadow AI: The "HR Spreadsheet" Leak Scenario (25:40) Security vs. Compliance in a Blurring World (28:00) The Conflict: "My Budget Doesn't Include Security" (34:00) The 5 V's of AI Data: Volume, Veracity, Velocity (40:00) Deepfakes & Biometrics: Detecting Micro-Movements (43:40) Fun Questions: Soccer, Family, and Honduran Tacos
Last time we spoke about The Battle of Suixian–Zaoyang-Shatow. Following the brutal 1938 capture of Wuhan, Japanese forces aimed to solidify their hold by launching an offensive against Chinese troops in the 5th War Zone, a rugged natural fortress in northern Hubei and southern Henan. Under General Yasuji Okamura, the 11th Army deployed three divisions and cavalry in a pincer assault starting May 1, 1939, targeting Suixian and Zaoyang to crush Nationalist resistance and secure flanks. Chinese commander Li Zongren, leveraging terrain like the Dabie and Tongbai Mountains, orchestrated defenses with over 200,000 troops, including Tang Enbo's 31st Army Group. By May 23, they recaptured Suixian and Zaoyang, forcing a Japanese withdrawal with heavy losses, over 13,000 Japanese casualties versus 25,000 Chinese, restoring pre-battle lines. Shifting south, Japan targeted Shantou in Guangdong to sever supply lines from Hong Kong. In a massive June 21 amphibious assault, the 21st Army overwhelmed thin Chinese defenses, capturing the port and Chao'an despite guerrilla resistance led by Zhang Fakui. Though losses mounted, Japan tightened its blockade, straining China's war effort amid ongoing attrition. #188 From Changkufeng to Nomonhan Welcome to the Fall and Rise of China Podcast, I am your dutiful host Craig Watson. But, before we start I want to also remind you this podcast is only made possible through the efforts of Kings and Generals over at Youtube. Perhaps you want to learn more about the history of Asia? Kings and Generals have an assortment of episodes on history of asia and much more so go give them a look over on Youtube. So please subscribe to Kings and Generals over at Youtube and to continue helping us produce this content please check out www.patreon.com/kingsandgenerals. If you are still hungry for some more history related content, over on my channel, the Pacific War Channel where I cover the history of China and Japan from the 19th century until the end of the Pacific War. Well hello again, and yes you all have probably guessed we are taking another detour. Do not worry I hope to shorten this one a bit more so than what became a sort of mini series on the battle of Changkufeng or Battle of Lake Khasan. What we are about to jump into is known in the west as the battle of khalkin Gol, by the Japanese the Nomohan incident. But first I need to sort of set the table up so to say. So back on August 10th, 1938 the Litvinov-Shigemitsu agreement established a joint border commission tasked with redemarcating the disputed boundary between the Soviet Union and Japanese-controlled Manchukuo. However, this commission never achieved a mutually agreeable definition of the border in the contested area. In reality, the outcome was decided well before the group's inaugural meeting. Mere hours after the cease-fire took effect on the afternoon of August 11, General Grigory Shtern convened with a regimental commander from Japan's 19th Division to coordinate the disengagement of forces. With the conflict deemed "honorably" concluded, Japan's Imperial General Headquarters mandated the swift withdrawal of all Japanese troops to the west bank of the Tumen River. By the night of August 13, as the final Japanese soldier crossed the river, it effectively became the de facto border. Soviet forces promptly reoccupied Changkufeng Hill and the adjacent heights—a move that would carry unexpected and profound repercussions. Authoritative Japanese military analyses suggest that if negotiations in Moscow had dragged on for just one more day, the 19th Division would likely have been dislodged from Changkufeng and its surrounding elevations. Undoubtedly, General Shtern's infantry breathed a sigh of relief as the bloodshed ceased. Yet, one can't help but question why Moscow opted for a cease-fire at a juncture when Soviet troops were on the cusp of total battlefield triumph. Perhaps Kremlin leaders deemed it wiser to settle for a substantial gain, roughly three-quarters of their objectives, rather than risk everything. After all, Japan had mobilized threatening forces in eastern Manchuria, and the Imperial Army had a history of impulsive, unpredictable aggression. Moreover, amid the escalating crisis over Czechoslovakia, Moscow may have been wary of provoking a broader Asian conflict. Another theory posits that Soviet high command was misinformed about the ground situation. Reports of capturing a small segment of Changkufeng's crest might have been misinterpreted as control over the entire ridge, or an imminent full takeover before midnight on August 10. The unexpected phone call from Foreign Minister Maxim Litvinov to the Japanese embassy that night—proposing a one-kilometer Japanese retreat in exchange for a cease-fire along existing lines—hints at communication breakdowns between Shtern's headquarters and the Kremlin. Ironically, such lapses may have preserved Japanese military honor, allowing the 19th Division's evacuation through diplomacy rather than defeat. Both sides endured severe losses. Initial Japanese press reports claimed 158 killed and 740 wounded. However, the 19th Division's medical logs reveal a grimmer toll: 526 dead and 914 injured, totaling 1,440 casualties. The true figure may have climbed higher, possibly to 1,500–2,000. Following the armistice, the Soviet news agency TASS reported 236 Red Army fatalities and 611 wounded. Given Shtern's uphill assaults across open terrain against entrenched positions, these numbers seem understated. Attackers in such scenarios typically suffered two to three times the defenders' losses, suggesting Soviet casualties ranged from 3,000 to 5,000. This aligns with a Soviet Military Council investigation on August 31, 1938, which documented 408 killed and 2,807 wounded. Japanese estimates placed Soviet losses even higher, at 4,500–7,000. Not all victims perished in combat. Marshal Vasily Blyukher, a decorated Soviet commander, former warlord of the Far East, and Central Committee candidate, was summoned to Moscow in August 1938. Relieved of duty in September and arrested with his family in October, he faced charges of inadequate preparation against Japanese aggression and harboring "enemies of the people" within his ranks. On November 9, 1938, Blyukher died during interrogation a euphemism for torture-induced death.Other innocents suffered as well. In the wake of the fighting, Soviet authorities deported hundreds of thousands of Korean rice farmers from the Ussuri region to Kazakhstan, aiming to eradicate Korean settlements that Japanese spies had allegedly exploited. The Changkufeng clash indirectly hampered Japan's Wuhan offensive, a massive push to subdue China. The influx of troops and supplies for this campaign was briefly disrupted by the border flare-up. Notably, Kwantung Army's 2nd Air Group, slated for Wuhan, was retained due to the Soviet threat. Chiang Kai-shek's drastic measure, breaching the Yellow River dikes to flood Japanese advance routes—further delayed the assault. By October 25, 1938, when Japanese forces captured Hankow, Chiang had relocated his capital to distant Chungking. Paradoxically, Wuhan's fall cut rail links from Canton inland, heightening Chiang's reliance on Soviet aid routed overland and by air from Central Asia. Japan secured a tactical win but missed the decisive blow; Chinese resistance persisted, pinning down a million Japanese troops in occupation duties. What was the true significance of Changkufeng? For General Koiso Suetaka and the 19th Division, it evoked a mix of bitterness and pride. Those eager for combat got their share, though not on their terms. To veterans mourning fallen comrades on those desolate slopes, it might have felt like senseless tragedy. Yet, they fought valiantly under dire conditions, holding firm until a retreat that blended humiliation with imperial praise, a bittersweet inheritance. For the Red Army, it marked a crucial trial of resolve amid Stalin's purges. While Shtern's forces didn't shine brilliantly, they acquitted themselves well in adversity. The U.S. military attaché in Moscow observed that any purge-related inefficiencies had been surmounted, praising the Red Army's valor, reliability, and equipment. His counterpart in China, Colonel Joseph Stilwell, put it bluntly: the Soviets "appeared to advantage," urging skeptics to rethink notions of a weakened Red Army. Yet, by World War II's eve, many British, French, German, and Japanese leaders still dismissed it as a "paper tiger." Soviet leaders appeared content, promoting Shtern to command the Transbaikal Military District and colonel general by 1940, while honoring "Heroes of Lake Khasan" with medals. In a fiery November 7, 1938, speech, Marshal Kliment Voroshilov warned that future incursions would prompt strikes deep into enemy territory. Tokyo's views diverged sharply. Many in the military and government saw it as a stain on Imperial Army prestige, especially Kwantung Army, humiliated on Manchukuo soil it swore to protect. Colonel Masanobu Tsuji Inada, however, framed it as a successful reconnaissance, confirming Soviet border defense without broader aggression, allowing the Wuhan push to proceed safely. Critics, including Major General Gun Hashimoto and historians, questioned this. They argued IGHQ lacked contingency plans for a massive Soviet response, especially with Wuhan preparations underway since June. One expert warned Japan had "played with fire," risking Manchuria and Korea if escalation occurred. Yet, Japanese commanders gleaned few lessons, downplaying Soviet materiel superiority and maintaining disdain for Red Army prowess. The 19th Division's stand against outnumbered odds reinforced this hubris, as did tolerance for local insubordination—attitudes that would prove costly. The Kremlin, conversely, learned Japan remained unpredictable despite its China quagmire. But for Emperor Hirohito's intervention, the conflict might have ballooned. Amid purges and the Czech crisis, Stalin likely viewed it as a reminder of eastern vulnerabilities, especially with Munich advancing German threats westward. Both sides toyed with peril. Moderation won in Tokyo, but Kwantung Army seethed. On August 11, Premier Fumimaro Konoye noted the need for caution. Kwantung, however, pushed for and secured control of the disputed salient from Chosen Army by October 8, 1938. Even winter's chill couldn't quench their vengeful fire, setting the stage for future confrontations. A quick look at the regional map reveals how Manchukuo and the Mongolian People's Republic each jut into the other's territory like protruding salients. These bulges could be seen as aggressive thrusts into enemy land, yet they also risked encirclement and absorption by the opposing empire. A northward push from western Manchuria through Mongolia could sever the MPR and Soviet Far East from the USSR's heartland. Conversely, a pincer movement from Mongolia and the Soviet Maritime Province might envelop and isolate Manchukuo. This dynamic highlights the frontier's strategic volatility in the 1930s. One particularly tense sector was the broad Mongolian salient extending about 150 miles eastward into west-central Manchukuo. There, in mid-1939, Soviet-Japanese tensions erupted into major combat. Known to the Japanese as the Nomonhan Incident and to the Soviets and Mongolians as the Battle of Khalkhin Gol, this clash dwarfed the earlier Changkufeng affair in scale, duration, and impact. Spanning four months and claiming 30,000 to 50,000 casualties, it amounted to a small undeclared war, the modern era's first limited conflict between great powers. The Mongolian salient features vast, semiarid plains of sandy grassland, gently rolling terrain dotted with sparse scrub pines and low shrubs. The climate is unforgivingly continental: May brings hot days and freezing nights, while July and August see daytime highs exceeding 38°C (100°F in American units), with cool evenings. Swarms of mosquitoes and massive horseflies necessitate netting in summer. Rainfall is scarce, but dense morning fogs are common in August. Come September, temperatures plummet, with heavy snows by October and midwinter lows dipping to –34°C. This blend of North African aridity and North Dakotan winters supports only sparse populations, mainly two related but distinct Mongol tribes. The Buriat (or Barga) Mongols migrated into the Nomonhan area from the northwest in the late 17th to early 18th centuries, likely fleeing Russian expansion after the 1689 Treaty of Nerchinsk. Organized by Manchu emperors between 1732 and 1735, they settled east of the river they called Khalkhin Gol (Mongolian for "river"), in lands that would later become Manchukuo. The Khalkha Mongols, named for the word meaning "barrier" or "shield," traditionally guarded the Mongol Empire's northern frontiers. Their territories lay west of the Buriats, in what would become the MPR. For centuries, these tribes herded livestock across sands, river crossings, and desert paths, largely oblivious to any formal borders. For hundreds of years, the line dividing the Mongolian salient from western Manchuria was a hazy administrative divide within the Qing Empire. In the 20th century, Russia's detachment of Outer Mongolia and Japan's seizure of Manchuria transformed this vague boundary into a frontline between rival powers. The Nomonhan Incident ignited over this contested border. Near the salient's northeastern edge, the river, called Khalkhin Gol by Mongols and Soviets, and Halha by Manchurians and Japanese, flows northwest into Lake Buir Nor. The core dispute: Was the river, as Japan asserted, the historic boundary between Manchukuo and the MPR? Soviet and MPR officials insisted the line ran parallel to and 10–12 miles east of the river, claiming the intervening strip. Japan cited no fewer than 18 maps, from Chinese and Japanese sources, to support the river as the border, a logical choice in such barren terrain, where it served as the sole natural divider. Yet, Soviets and Mongolians countered with evidence like a 1919 Chinese postal atlas and maps from Japanese and Manchukuoan agencies (1919–1934). Unbeknownst to combatants, in July 1939, China's military attaché in Moscow shared a 1934 General Staff map with his American counterpart, showing the border east of the river. Postwar Japanese studies of 18th-century Chinese records confirm that in 1734, the Qing emperor set a boundary between Buriat and Khalkha Mongols east of the river, passing through the hamlet of Nomonhan—as the Soviets claimed. However, Kwantung Army Headquarters dismissed this as non-binding, viewing it as an internal Qing affair without Russian involvement. Two former Kwantung Army officers offer a pragmatic explanation: From 1931 to 1935, when Soviet forces in the Far East were weak, Japanese and Manchukuoan authorities imposed the river as the de facto border, with MPR acquiescence. By the mid- to late 1930s, as Soviet strength grew, Japan refused to yield, while Mongolians and Soviets rejected the river line, sparking clashes. In 1935, Kwantung Army revised its maps to align with the river claim. From late that year, the Lake Buir Nor–Halha sector saw frequent skirmishes between Manchukuoan and MPR patrols. Until mid-1938, frontier defense in northwestern Manchukuo fell to the 8th Border Garrison Unit , based near Hailar. This 7,000-man force, spread thin, lacked mobility, training, and, in Kwantung Army's eyes, combat readiness. That summer, the newly formed 23rd Division, under Kwantung Army, took station at Hailar, absorbing the 8th BGU under its command, led by Lieutenant General Michitaro Komatsubara. At 52, Komatsubara was a premier Russian specialist in the Imperial Army, with stints as military attaché in the USSR and head of Kwantung's Special Services Agency in Harbin. Standing 5'7" with a sturdy build, glasses, and a small mustache, he was detail-oriented, keeping meticulous diaries, writing lengthy letters, and composing poetry, though he lacked combat experience. Before departing Tokyo in July 1938, Komatsubara received briefings from Colonel Masazumi Inada, AGS Operations Section chief. Amid planning for Changkufeng, Inada urged calm on the Manchukuo-MPR border given China's ongoing campaigns. Guidelines: Ignore minor incidents, prioritize intelligence on Soviet forces east of Lake Baikal, and study operations against the Soviet Far East's western sector. Familiar with the region from his Harbin days, Komatsubara adopted a low-key approach. Neither impulsive nor aggressive, he kept the green 23rd Division near Hailar, delegating patrols to the 8th BGU. An autumn incident underscores his restraint. On November 1, 1938, an 8th BGU patrol was ambushed by MPR forces. Per Japanese accounts, the three-man team, led by a lieutenant, strayed too close to the border and was attacked 50 meters inside Manchukuo. The lieutenant escaped, but his men died. Komatsubara sent an infantry company to secure the site but forbade retaliation. He pursued body recovery diplomatically, protested to MPR and Soviet officials, and disciplined his officers: garrison leaders got five days' confinement for poor troop training, the lieutenant thirty days. Despite this caution, pressures at AGS and KwAHQ were mounting, poised to thrust the 23rd Division into fierce battle. Modern militaries routinely develop contingency plans against potential adversaries, and the mere existence of such strategies doesn't inherently signal aggressive intentions. That said, shifts in Japan's operational planning vis-à-vis the Soviet Union may have inadvertently fueled the Nomonhan Incident. From 1934 to 1938, Japanese war scenarios emphasized a massive surprise assault in the Ussuri River region, paired with defensive holding actions in northwestern Manchuria. However, between mid-1938 and early 1939, a clandestine joint task force from the Army General Staff and Kwantung Army's Operations Departments crafted a bold new blueprint. This revised strategy proposed containing Soviet forces in the east and north while unleashing a full-scale offensive from Hailar, advancing west-northwest toward Chita and ultimately Lake Baikal. The goal: sever the Transbaikal Soviet Far East from the USSR's core. Dubbed Plan Eight-B, it gained Kwantung Army's endorsement in March 1939. Key architects—Colonels Takushiro Hattori and Masao Terada, along with Major Takeharu Shimanuki—were reassigned from AGS to Kwantung Army Headquarters to oversee implementation. The plan anticipated a five-year buildup before execution, with Hattori assuming the role of chief operations staff officer. A map review exposes a glaring vulnerability in Plan Eight-B: the Japanese advance would leave its southern flank exposed to Soviet counterstrikes from the Mongolian salient. By spring 1939, KwAHQ likely began perceiving this protrusion as a strategic liability. Notably, at the outbreak of Nomonhan hostilities, no detailed operational contingencies for the area had been formalized. Concurrently, Japan initiated plans for a vital railroad linking Harlun Arshan to Hailar. While its direct tie to Plan Eight-B remains unclear, the route skirted perilously close to the Halha River, potentially heightening KwAHQ's focus on the disputed Mongolian salient. In early 1939, the 23rd Division intensified reconnaissance patrols near the river. Around this time, General Grigory Shtern, freshly appointed commander of Soviet Far Eastern forces, issued a public warning that Japan was gearing up for an assault on the Mongolian People's Republic. As Plan Eight-B took shape and railroad proposals advanced, KwAHQ issued a strikingly confrontational set of guidelines for frontier troops. These directives are often cited as a catalyst for the Nomonhan clash, forging a chain linking the 1937 Amur River incident, the 1938 Changkufeng debacle, and the 1939 conflict.Resentment had festered at KwAHQ over perceived AGS meddling during the Amur affair, which curtailed their command autonomy. This frustration intensified at Changkufeng, where General Kamezo Suetaka's 19th Division endured heavy losses, only for the contested Manchukuoan territory to be effectively ceded. Kwantung Army lobbied successfully to wrest oversight of the Changkufeng salient from Chosen Army. In November 1938, Major Masanobu Tsuji of KwAHQ's Operations Section was sent to survey the site. The audacious officer was dismayed: Soviet forces dominated the land from the disputed ridge to the Tumen River. Tsuji undertook several winter reconnaissance missions. His final outing in March 1939 involved leading 40 men to Changkufeng's base. With rifles slung non-threateningly, they ascended to within 200 yards of Soviet lines, formed a line, and urinated in unison, eliciting amused reactions from the enemy. They then picnicked with obentos and sake, sang army tunes, and left gifts of canned meat, chocolates, and whiskey. This theatrical stunt concealed Tsuji's real aim: covert photography proving Soviet fortifications encroached on Manchukuoan soil. Tsuji was a singular figure. Born of modest means, he embodied a modern samurai ethos, channeling a sharp intellect into a frail, often ailing body through feats of extraordinary daring. A creative tactician, he thrived in intelligence ops, political scheming, aerial scouting, planning, and frontline command—excelling across a tumultuous career. Yet, flaws marred his brilliance: narrow bigotry, virulent racism, and capacity for cruelty. Ever the ambitious outsider, Tsuji wielded outsized influence via gekokujo—Japan's tradition of subordinates steering policy from below. In 1939, he was a major, but his pivotal role at Nomonhan stemmed from this dynamic. Back in Hsinking after his Changkufeng escapade, Tsuji drafted a response plan: negotiate border "rectification" with the Soviets; if talks failed, launch an attack to expel intruders. Kwantung Army adopted it. Deputy Chief of Staff Major General Otozaburo Yano flew to Tokyo with Tsuji's photos, seeking AGS approval. There, he was rebuffed—Changkufeng was deemed settled, and minor violations should be overlooked amid Tokyo's aversion to Soviet conflict. Yano's plea that leniency would invite aggression was countered by notes on Europe's tensions restraining Moscow. Yano's return sparked outrage at KwAHQ, seen as AGS thwarting their imperial duty to safeguard Manchukuo. Fury peaked in the Operations Section, setting the stage for Tsuji's drafting of stringent new frontier guidelines: "Principles for the Settlement of Soviet-Manchukuoan Border Disputes." The core tenet: "If Soviet troops transgress the Manchukuoan frontiers, Kwantung Army will nip their ambitions in the bud by completely destroying them." Specific directives for local commanders included: "If the enemy crosses the frontiers … annihilate him without delay, employing strength carefully built up beforehand. To accomplish our mission, it is permissible to enter Soviet territory, or to trap or lure Soviet troops into Manchukuoan territory and allow them to remain there for some time… . Where boundary lines are not clearly defined, area defense commanders will, upon their own initiative, establish boundaries and indicate them to the forward elements… . In the event of an armed clash, fight until victory is won, regardless of relative strengths or of the location of the boundaries. If the enemy violates the borders, friendly units must challenge him courageously and endeavor to triumph in their zone of action without concerning themselves about the consequences, which will be the responsibility of higher headquarters." Major Tsuji Masanobu later justified the new guidelines by pointing to the "contradictory orders" that had hamstrung frontier commanders under the old rules. They were tasked with upholding Manchukuo's territorial integrity yet forbidden from actions that might spark conflict. This, Tsuji argued, bred hesitation, as officers feared repercussions for decisive responses to incursions. The updated directives aimed to alleviate this "anxiety," empowering local leaders to act boldly without personal liability. In truth, Tsuji's "Principles for the Settlement of Soviet-Manchukuoan Border Disputes" were more incendiary than conciliatory. They introduced provocative measures: authorizing commanders to unilaterally define unclear boundaries, enforce them with immediate force "shoot first, ask questions later", permit pursuits into enemy territory, and even encourage luring adversaries across the line. Such tactics flouted both government policy and official army doctrine, prioritizing escalation over restraint. The proposals sparked intense debate within Kwantung Army's Operations Section. Section chief Colonel Takushiro Hattori and Colonel Masao Terada outranked Tsuji, as did Major Takeharu Shimanuki, all recent transfers from the Army General Staff. Tsuji, however, boasted longer tenure at Kwantung Army Headquarters since April 1936 and in Operations since November 1937, making him the de facto veteran. Hattori and Terada hesitated to challenge the assertive major, whose reputation for intellect, persuasion, and deep knowledge of Manchuria commanded respect. In a 1960 interview, Shimanuki recalled Tsuji's dominance in discussions, where his proactive ideas often swayed the group. Unified, the section forwarded Tsuji's plan to Kwantung Army Command. Commander Lieutenant General Kenkichi Ueda consulted Chief of Staff General Rensuke Isogai and Vice Chief General Otozaburo Yano, seasoned leaders who should have spotted the guidelines' volatility. Yet, lingering grudges from AGS "interference" in past incidents like the Amur River and Changkufeng clouded their judgment. Ueda, Isogai, and Tsuji shared history from the 1932 Shanghai Incident: Tsuji, then a captain, led a company in the 7th Regiment under Colonel Isogai, with Yano as staff officer and Ueda commanding the 9th Division. Tsuji was wounded there, forging bonds of camaraderie. This "clique," which grew to include Hattori, Terada, and Shimanuki, amplified Tsuji's influence. Despite Isogai's initial reservations as the group's moderate voice, the guidelines won approval. Ueda issued them as Kwantung Army Operations Order 1488 on April 25, 1939, during a division commanders' conference at KwAHQ. A routine copy reached AGS in Tokyo, but no formal reply came. Preoccupied with the China War and alliance talks with Germany, AGS may have overlooked border matters. Colonel Masazumi Inada, AGS Operations head, later noted basic acceptance of Order 1488, with an informal expectation—relayed to Hattori and Terada—of prior consultation on violations. KwAHQ dismissed this as another Tokyo intrusion on their autonomy. Some Japanese analysts contend a stern AGS rejection might have prevented Nomonhan's catastrophe, though quelling Kwantung's defiance could have required mass staff reassignments, a disruptive step AGS avoided. Tsuji countered that permitting forceful action at Changkufeng would have deterred Nomonhan altogether, underscoring the interconnectedness of these clashes while implicitly critiquing the 1939 battle's location. Undeniably, Order 1488's issuance on April 25 paved the way for conflict three weeks later. Japanese records confirm that Khalkha Mongols and MPR patrols routinely crossed the Halha River—viewed by them as internal territory, 10 miles from the true border. Such crossings passed uneventfully in March and April 1939. Post-Order 1488, however, 23rd Division commander General Michitaro Komatsubara responded aggressively, setting the stage for escalation. The Nomonhan Incident ignited with a border clash on May 11–12, 1939, that rapidly spiraled into a major conflict. Over a dozen "authoritative" accounts exist, varying in viewpoint, focus, and specifics. After cross-referencing these sources, a coherent timeline emerges. On the night of May 10–11, a 20-man Mongolian People's Republic border patrol crossed eastward over the Halha River (known as Khalkhin Gol to Mongols and Soviets). About 10 miles east, atop a 150-foot sandy hill, lay the tiny hamlet of Nomonhan, a cluster of crude huts housing a few Mongol families. Just south flowed the Holsten River, merging westward into the broader Halha. By morning on May 11, Manchukuoan forces spotted the MPR patrol north of the Holsten and west of Nomonhan. In the MPR/Soviet perspective, Nomonhan Hill marked the Mongolia-Manchuria border. To Manchukuoans and Japanese, it sat 10 miles inside Manchukuo, well east of the Halha. A 40-man Manchukuoan cavalry unit repelled the Mongolians back across the river, inflicting initial casualties on both sides—the Manchukuoans drawing first blood. The MPR patrol leader exaggerated the attackers as 200 strong. The next day, May 12, a 60-man MPR force under Major P. Chogdan evicted the Manchukuoans from the disputed zone, reestablishing positions between the Halha and Nomonhan. The Manchukuoans, in turn, reported facing 700 enemies. Sporadic skirmishes and maneuvering persisted through the week. On May 13, two days post-clash, the local Manchukuoan commander alerted General Michitaro Komatsubara's 23rd Division headquarters in Hailar. Simultaneously, Major Chogdan reported to Soviet military command in Ulaanbaatar, Mongolia's capital. What began as a Mongolian-Manchukuoan spat was poised to draw in Soviet and Japanese patrons. Attributing the May 10–11 violation hinges on border interpretations: both sides claimed the Halha-Nomonhan strip. Yet, most accounts concur that Manchukuoan forces initiated the fighting. Post-May 13 notifications to Moscow and Tokyo clarify the record thereafter. Midday on May 13, Komatsubara was leading a staff conference on the newly issued Kwantung Army Operations Order 1488—Major Tsuji Masanobu's aggressive border guidelines. Ironically, the first Nomonhan combat report arrived mid-discussion. Officers present recall Komatsubara deciding instantly to "destroy the invading Outer Mongolian forces" per Order 1488. That afternoon, he informed Kwantung Army Headquarters of the incident and his intent to eradicate the intruders, requesting air support and trucks. General Kenkichi Ueda, Kwantung commander, approved Komatsubara's "positive attitude," dispatching six scout planes, 40 fighters, 10 light bombers, two anti-aircraft batteries, and two motorized transport companies. Ueda added a caveat: exercise "extreme caution" to prevent escalation—a paradoxical blend of destruction and restraint, reflective of KwAHQ's fervent mood. Ueda relayed the details to Tokyo's Army General Staff, which responded that Kwantung should handle it "appropriately." Despite Kwantung's impulsive reputation, Tokyo deferred, perhaps trusting the northern strategic imbalance, eight Japanese divisions versus 30 Soviet ones from Lake Baikal to Vladivostok, would enforce prudence. This faith proved misguided. On May 14, Major Tsuji flew from KwAHQ for aerial reconnaissance over Nomonhan, spotting 20 horses but no troops. Upon landing, a fresh bullet hole in his plane confirmed lingering MPR presence east of the Halha. Tsuji briefed 23rd Division staff and reported to Ueda that the incident seemed minor. Aligning with Order 1488's spirit, Komatsubara deployed a force under Lieutenant Colonel Yaozo Azuma: an armored car company, two infantry companies, and a cavalry troop. Arriving at Nomonhan on May 15, Azuma learned most MPR forces had retreated westward across the Halha the prior night, with only token elements remaining, and those withdrawing. Undeterred, he pursued. The advance met scant resistance, as foes had crossed the river. However, Japanese light bombers struck a small MPR concentration on the west bank, Outpost Number 7, killing two and wounding 15 per MPR reports; Japanese claimed 30–40 kills. All agree: the raid targeted undisputed MPR territory. Hearing of May 15's events, Komatsubara deemed the Mongolians sufficiently rebuked and recalled Azuma to Hailar on May 16. KwAHQ concurred, closing the matter. Soviet leaders, however, saw it differently. Mid-May prompted Soviet support for the MPR under their 1936 Mutual Defense Pact. The Red Army's 57th Corps, stationed in Mongolia, faced initial disarray: Commander Nikolai Feklenko was hunting, Chief of Staff A. M. Kushchev in Ulan Ude with his ill wife. Moscow learned of clashes via international press from Japanese sources, sparking Chief of Staff Boris Shaposhnikov's furious inquiry. Feklenko and Kushchev rushed back to Ulaanbaatar, dispatching a mixed force—a battalion from the 149th Infantry Regiment (36th Division), plus light armor and artillery from the 11th Tank Brigade—to Tamsag Bulak, 80 miles west of the Halha. Led by Major A. E. Bykov, it bolstered the MPR's 6th Cavalry Division. Bykov and Cavalry Commander Colonel Shoaaiibuu inspected the site on May 15, post-Azum's departure. The cavalry arrived two days later, backed by Bykov (ordered to remain west of the river and avoid combat if possible). Some MPR troops recrossed, occupying the disputed zone. Clashes with Manchukuoan cavalry resumed and intensified. Notified of renewed hostilities, Komatsubara viewed it as defiance, a personal affront. Emboldened by Order 1488, he aimed not just to repel but to encircle and annihilate. The incident was on the verge of major expansion. I would like to take this time to remind you all that this podcast is only made possible through the efforts of Kings and Generals over at Youtube. Please go subscribe to Kings and Generals over at Youtube and to continue helping us produce this content please check out www.patreon.com/kingsandgenerals. If you are still hungry after that, give my personal channel a look over at The Pacific War Channel at Youtube, it would mean a lot to me. The ghosts of the Changufeng incident have come back to haunt both the USSR and Japan. Those like Tsuji Masanobu instigated yet another border clash that would erupt into a full blown battle that would set a precedent for both nations until the very end of WW2.
A psychiatrist who treated the Westfield Bondi Junction attacker has been referred for review by the coroner investigating the mass killing in 2024. New South Wales State Coroner Teresa O'Sullivan criticised the care of Joel Cauchi's former psychiatrist for failing to adequately respond to a schizophrenia relapse in the years before the mass stabbing, which saw six people killed and 10 injured. She has made 23 recommendations, including a call for the Health Ombudsman of Queensland to review the psychiatrist's care and treatment of Joel Cauchi. - सिड्नीको बोन्डाइस्थित वेस्टफिल्डमा सन् २०२४ मा ६ जनाको मृत्यु हुने गरी भएको सामूहिक हत्याको छानबिन गरिरहेकी कोरोनरले घटनामा संलग्न भनिएका आक्रमणकारीको उपचार गर्ने मनोचिकित्सकले आफ्नो जिम्मेवारी ठिक सँग पुरा गरे नगरेको बारेमा समीक्षाका लागि सिफारिस गरेकी छन् । यद्यपि कोरोनरले उक्त घटनाका पछाडि मनोचिकित्सकको मात्र दोष नरहेको भन्दै २३ सिफारिस पनि दिएकी छन्। एक रिपोर्ट।
Attackers are moving faster and faster every day, and the challenge of keeping pace is a daunting one. But it's not impossible. watchTowr's Ryan Dewhurst joins Dennis Fisher to talk about how the "magic" of computers first captured his imagination when he was young, how defenders can learn from attackers' tactics and adapt, and how the AI revolution is accelerating vulnerability disclosure and exploitation.Support the show
(Presented by Thinkst Canary: Most Companies find out way too late that they've been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching 'em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.) Three Buddy Problem - Episode 84: We process the cybersecurity fallout from the latest Epstein document dump, focusing on why redactions fail in the AI era and how quickly modern tools can unravel them. The conversation moves from sloppy redaction practices and exploit mythology to harder questions about ethics, accountability, and silence within the infosec community. Plus, inside the Notepad++ supply-chain compromise attributed to a known Chinese APT, Microsoft's security executive changes, Anthropic's AI-driven vulnerability discovery, China-linked network implants, and Lockdown Mode thwarting FBI investigators. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.
Sinister Christian Nationalist pastor Doug Wilson gets interviewed by chunky conservative media lolcow Ross Douthat. Amazingly, the person who comes out of this horrifying development looking worst is... Sam Harris? CONTENT WARNINGS. BECAUSE DOUG WILSON SAYING STUFF. EPISODE NOTES: Christian Nationalism vs Clown World | Interesting Times with Ross Douthat https://www.youtube.com/watch?v=WAYWbbSeIhE Dogma, Tribe, and Truth (Sam Harris, Making Sense Ep. 449) https://www.youtube.com/watch?v=nmtTAlbGv_M I Don't Speak German: 139: Bad Faith Discussion; Doug Wilson talks to Sam Harris https://idontspeakgerman.libsyn.com/139-bad-faith-discussion-doug-wilson-talks-to-sam-harris EXTRA NOTES re WILSON: Sons of Patriarchy Podcast - YouTube https://www.youtube.com/@SonsofPatriarchy Inside the Church That Preaches 'Wives Need to Be Led with a Firm Hand' https://www.vice.com/en/article/inside-the-church-that-preaches-wives-need-to-be-led-with-a-firm-hand/ At Doug Wilson's DC Church Plant, 'Worship Is Warfare' - Christianity Today https://www.christianitytoday.com/2025/07/christ-church-dc-doug-wilson-pete-hegseth/ Doug Wilson: The New Right's Favorite Pastor - POLITICO https://www.politico.com/news/magazine/2025/05/23/doug-wilson-new-right-pastor-hegseth-trump-officials-00355376 Examining Doug Wilson & Moscow - YouTube https://www.youtube.com/@ExaminingMoscow Sexual Abuse is Inevitable in Christian Patriarchy; Just Take a Look at Doug Wilson's Christ Church, and its New 'Documentary' 'Eve in Exile: The Restoration of Femininity' | Religion Dispatches https://religiondispatches.org/2022/05/31/sexual-abuse-inevitable-christian-patriarchy-just-take-look-doug-wilsons-christ-church Culture war and the evangelical church: Doug Wilson's "No Quarter November" hit the mainstream this year. https://slate.com/human-interest/2023/12/evangelical-church-doug-wilson-idaho-culture-war-no-quarter-november.html Doug Wilson Says https://dougwilsonsays.com/ 5 Part interview with Doug Wilson at Darren Doane's podcast / channel https://www.youtube.com/@allmyfriendsareheretics1354/featured Doug Wilson's Religious Empire Expanding in the Northwest https://www.splcenter.org/resources/reports/doug-wilsons-religious-empire-expanding-northwest/ Rachel Shubin: Analyzing Douglas Wilson's Handling of the Steven Sitler and Jamin Wight Cases https://www.moscowid.net/wp-content/uploads/2016/09/Analyzing-DWs-Response-to-Sitler-and-Wight-Cases.pdf Doug Wilson Archive | Champion of child rapists, Attacker of victims, Pastor of Christ Church in Moscow, Idaho, Presiding Minister of the Communion of Reformed Evangelical Churches (CREC) https://dougwilsonarchive.wordpress.com/ Doug Wilson Believes - Quotes from the Moscow, Idaho Pastor https://dougwilsonbelieves.com/ Fundie Fridays: Doug Wilson, the Final Boss of Christian Nationalism https://youtu.be/6dhaNeJ9UDw?si=SbAJoNEqnhOg8ckF Confronting Doug Wilson - by Kristin Du Mez https://kristindumez.substack.com/p/confronting-doug-wilson In an Idaho college town, Doug Wilson envisions an American theocracy : Up First from NPR : NPR https://www.npr.org/transcripts/1224382120 Bible Experts React To Viral CNN Christian Segment | HuffPost UK Life https://www.huffingtonpost.co.uk/entry/doug-wilson-pete-hegseth_l_689a2042e4b0be3f5edc4799 SHOW NOTES: Please consider donating to help us make the show and stay ad-free and independent. Patrons get exclusive access to at least one full extra episode a month plus all backer-only back-episodes. Daniel's Patreon: https://www.patreon.com/danielharper/posts Jack's Patreon: https://www.patreon.com/user?u=4196618&fan_landing=true IDSG Twitter: https://twitter.com/idsgpod Daniel's Twitter: @danieleharper Jack's (Locked) Twitter: @_Jack_Graham_ Jack's Bluesky: @timescarcass.bsky.social Daniel's Bluesky: @danielharper.bsky.social IDSG on Apple Podcasts: https://podcasts.apple.com/us/podcast/i-dont-speak-german/id1449848509?ls=1
Jeff & Shannon break the Benghazi suspect extradition, slam Hillary's mockery of the attack, expose Collins bloodline ties, and react to Bill Maher's QAnon apology question. Part 5 exclusive on Rumble Premium. Tune in at Rumble, YouTube, X and Red State Talk Radio now! Rise up, patriots—@intheMatrixxx and @shadygrooove deliver another unfiltered truth bomb in Season 8, Episode 025, “Benghazi Attacker Arrested and in US Custody; Part 5: Follow the Bloodlines,” tearing into Attorney General Pam Bondi's announcement that suspected 2012 Benghazi participant Zubar Al-Bakash has been captured and extradited to U.S. custody—finally delivering on Trump's long-standing demand for justice after four Americans were murdered while Hillary Clinton infamously scoffed, “what difference at this point does it make?” The hosts spotlight the glaring hypocrisy and question why establishment media continues to minimize or ignore this major win. In the second hour—available exclusively as Rumble Premium Content—they dive deeper into Part 5: Follow the Bloodlines, reading directly from historical sources to trace the Collins family's documented path from 1630s New England witchcraft accusations through elite financial networks, generational wealth transfers, and connections to powerful modern political and banking dynasties. They also react to Bill Maher publicly asking, “Where does QAnon go for the apology?” after recent revelations lent credence to long-ridiculed claims about elite networks—proof that real research eventually surfaces even on mainstream stages. The truth is learned, never told—the constitution is your weapon—tune in at noon-0-five Eastern LIVE to stand with Trump! MG Show: America First MAGA Podcast & Conservative Talk Show Launched in 2019 and now in Season 8, the MG Show is your go-to source for unfiltered truth on Trump policies, border security, economic nationalism, and exposing globalist psyops. Hosted by Jeffrey Pedersen (@InTheMatrixxx) and Shannon Townsend (@ShadyGrooove), it champions sovereignty, traditional values, and critiques of establishment politics. Tune in weekdays at 12pm ET / 9am PT for patriotic insights strengthening the Republic under President Trump's America First agenda. Hosts - Jeffrey Pedersen (@InTheMatrixxx): Expert in political analysis and exposing hidden agendas, with a focus on Trump's diplomatic wins and media bias. - Shannon Townsend (@ShadyGrooove): Delivers sharp insights on intelligence operations, Constitutional rights, and defenses of Trump's strategies against mainstream critiques. Where to Watch & Listen Catch live episodes or on-demand replays packed with MAGA victories like inflation drops, border awards, Trump pardons, and psyop exposures: - Live Streams: https://rumble.com/mgshow for premium America First content. - Radio: https://mgshow.link/redstate on Red State Talk Radio. - X Live: https://x.com/inthematrixxx for real-time pro-Trump discussions. - Podcasts: Search "MG Show" on PodBean, Apple Podcasts, Pandora, and Amazon Music. - YouTube: Full episodes at https://youtube.com/c/inthematrixxx and https://www.youtube.com/c/TruthForFreedom. Follow for daily pro-Trump alerts: - X: @InTheMatrixxx (https://x.com/inthematrixxx) and @ShadyGrooove (https://x.com/shadygrooove). Support the MG Show Fuel the MAGA movement against establishment lies: - Donate: https://mg.show/support or contribute at https://givesendgo.com/helpmgshow. - Merch: https://merch.mg.show for official gear. - MyPillow Special: Use code MGSHOW at https://mypillow.com/mgshow. - Crypto: https://mgshow.link/rumblewallet. All Links Everything MG Show Related: https://linktr.ee/mgshow. MG Show Anthem Get chills with the patriotic track: https://youtu.be/SyfI8_fnCAs
A psychiatrist who treated the Westfield Bondi Junction attacker has been referred for review by the coroner investigating the mass killing in 2024. New South Wales State Coroner Teresa O'Sullivan criticised the care of Joel Cauchi's former psychiatrist for failing to adequately respond to a schizophrenia relapse in the years before the mass stabbing, which saw six people killed and 10 injured. She has made 23 recommendations, including a call for the Health Ombudsman of Queensland to review the psychiatrist's care and treatment of Joel Cauchi. - Опубликованы результаты расследования массового нападения с ножом в торговом центре Westfield Bondi Junction в Сиднее. 13 апреля 2024 года Каучи нанес ножевые ранения 10 людям, убив шестерых, прежде чем был застрелен инспектором полиции Нового Южного Уэльса Эми Скотт. Психиатр из Квинсленда доктор Андреа Борос-Лавак лечила Каучи от хронической шизофрении с марта 2012 года.
Fiery Fridays are BACK and it's a good one this week!In today's episode, Alex Crook absolutely HAMMERS Christian Romero and his leadership, Adrian Durham and Angelina Kelly CLASH over whether Bruno Fernandes is the best player on the planet right now and Adrian redesigns the way promotion and relegation should work between the Premier League and Championship as he is just simply SICK of Burnley!As you know by now every Friday, it's all about bold opinions, strong feelings, and arguments just waiting to happen. Because as the week winds down, we're turning the heat all the way up… That's another three HUGE opinions… no sitting on the fence… and absolutely no fear of things getting a little heated.Produced by: Daniel KaneEdited by: Daniel Kane Hosted on Acast. See acast.com/privacy for more information.
This episode of Going In Raw is sponsored by BetterHelp and Tempo! Give online therapy a try at http://www.betterhelp.com/raw and get on your way to being your best self. Go to http://www.tempomeals.com/raw to get 60% off your first box! Consider joining Friendo Club by clicking JOIN ($5/month) OR becoming a $5+ Patron at http://www.patreon.com/steveandlarson!
In the security news this week: Residential proxy abuse is everywhere this week: from Google's takedown of IPIDEA to massive Citrix NetScaler scanning and the Badbox 2.0 botnet Supply chain fun time: Notepad++ updates were hijacked Attackers set their sights on: Ivanti EPMM, Dell Unity storage, Fortinet VPNs/firewalls, and ASUSTOR NAS devices Russian state hackers went after Poland's grid Is ICE on a surveillance shopping spree and into hacking anti-ICE apps? Ukraine's war-time Starlink problem is turning into a policy and controls experiment The AI security theme is alive and well with exposed LLM endpoints, OpenClaw/Moltbot/Moltbook fiasco, and letting anyone hijack agents Signed forensic driver for Windows is still an EDR killer The Trump administration's rollback of software security attestation National Cyber Director Sean Cairncross says: “less regulation, more cooperation.” Finally, there are some “only in infosec” human stories: * pen testers arrested in Iowa now getting a settlement, * a Google engineer convicted over stolen AI IP, * Booz Allen losing Treasury work over intentional insider leaks, * and an “AI psychosis” saga at an adult-content platform. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-912
Detective Chief Superintendent Seamus Boland, Head of the Garda's Drugs and Organised Crime Bureau, speaks to Crime Correspondent, Paul Reynolds, about the intelligence failure ahead of the Regency Hotel attack ten years ago.
In the security news this week: Residential proxy abuse is everywhere this week: from Google's takedown of IPIDEA to massive Citrix NetScaler scanning and the Badbox 2.0 botnet Supply chain fun time: Notepad++ updates were hijacked Attackers set their sights on: Ivanti EPMM, Dell Unity storage, Fortinet VPNs/firewalls, and ASUSTOR NAS devices Russian state hackers went after Poland's grid Is ICE on a surveillance shopping spree and into hacking anti-ICE apps? Ukraine's war-time Starlink problem is turning into a policy and controls experiment The AI security theme is alive and well with exposed LLM endpoints, OpenClaw/Moltbot/Moltbook fiasco, and letting anyone hijack agents Signed forensic driver for Windows is still an EDR killer The Trump administration's rollback of software security attestation National Cyber Director Sean Cairncross says: "less regulation, more cooperation." Finally, there are some "only in infosec" human stories: * pen testers arrested in Iowa now getting a settlement, * a Google engineer convicted over stolen AI IP, * Booz Allen losing Treasury work over intentional insider leaks, * and an "AI psychosis" saga at an adult-content platform. Show Notes: https://securityweekly.com/psw-912
A psychiatrist who treated the Westfield Bondi Junction attacker has been referred for review by the coroner investigating the mass killing in 2024. New South Wales State Coroner Teresa O'Sullivan criticised the care of Joel Cauchi's former psychiatrist for failing to adequately respond to a schizophrenia relapse in the years before the mass stabbing, which saw six people killed and 10 injured. She has made 23 recommendations, including a call for the Health Ombudsman of Queensland to review the psychiatrist's care and treatment of Joel Cauchi.
In the security news this week: Residential proxy abuse is everywhere this week: from Google's takedown of IPIDEA to massive Citrix NetScaler scanning and the Badbox 2.0 botnet Supply chain fun time: Notepad++ updates were hijacked Attackers set their sights on: Ivanti EPMM, Dell Unity storage, Fortinet VPNs/firewalls, and ASUSTOR NAS devices Russian state hackers went after Poland's grid Is ICE on a surveillance shopping spree and into hacking anti-ICE apps? Ukraine's war-time Starlink problem is turning into a policy and controls experiment The AI security theme is alive and well with exposed LLM endpoints, OpenClaw/Moltbot/Moltbook fiasco, and letting anyone hijack agents Signed forensic driver for Windows is still an EDR killer The Trump administration's rollback of software security attestation National Cyber Director Sean Cairncross says: "less regulation, more cooperation." Finally, there are some "only in infosec" human stories: * pen testers arrested in Iowa now getting a settlement, * a Google engineer convicted over stolen AI IP, * Booz Allen losing Treasury work over intentional insider leaks, * and an "AI psychosis" saga at an adult-content platform. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-912
Brenton Harrison Tarrant was jailed for life in August 2020, with no possibility of parole, after he plead guilty to the murder of 51 people and wounding 40 in the Christchurch terror attack. Tarrant is now, five years later, attempting to overturn his conviction with claims he was not in a rational state when he plead guilty. Criminal defence lawyer Steve Cullen spoke to Andrew Dickens about the appeal saying, "It's a very difficult situation for all, but we have to let the wheels of justice grind on and let it be dealt with properly so that hopefully, whatever the outcome is, we'll get finality and closure this time." LISTEN ABOVESee omnystudio.com/listener for privacy information.
With Ben in the medic bay, Joshis joined by Venny to talk about all the content we've had since TOTY. Icon Swaps, Future Stars, Academy Evo's and much much more: 01:41 Pound for Pound Powerhouse 08:31 Future Stars Player Reviews 17:46 Which Future Stars SBC's Are Worth Doing 28:13 How Does Future Stars Academy Evo Work? 34:42 Best Playstyle Choices for Defenders 40:24 Best Playstyle Choices for Midfielders 47:17 Best Playstyle Choices for Attackers 54:32 Icon Swaps: Overview and Strategies 01:00:19 Evaluating Icon Rewards and Player Choices 01:06:46 Final Thoughts on Team of the Year Get these episodes in your podcast app: bit.ly/podfeedhelpDiscord (for Gold & Icon) Supporters: bit.ly/poddiscordhelpImprove your connection: bit.ly/connectionspecial Thank you as always for making FUT Weekly possible! Learn more about your ad choices. Visit podcastchoices.com/adchoices
OpenClaw targets ClawHub users Notepad++ update delivers malware APT28 attackers abuse Microsoft Office zero-day Get the show notes here: https://cisoseries.com/cybersecurity-news-openclaw-targets-clawhub-users-notepad-update-delivers-malware-apt28-attackers-abuse-microsoft-office-zero-day/ Huge thanks to our sponsor, Strike48 It's no secret that AI is only as good as the data available to it. Strike48 unifies agentic AI with unmatched log visibility while avoiding the typical hefty price tag. Build and deploy agents for phishing detection, alert triage, threat correlation and more. Queries existing logs where they currently live, so you can keep the technology you already have. Learn more at Strike48.com.
Cyber risk is escalating fast, and most business leaders are still operating with outdated assumptions. This episode of Security Squawk confronts that reality head on. Ransomware is no longer limited to encrypted files and downtime calculations. Threat actors are escalating pressure tactics into the physical world, including intimidation and direct threats against employees and executives. That shift fundamentally changes the risk profile for organizations. Once physical safety enters the equation, cybersecurity stops being a technical issue and becomes a leadership, legal, and duty of care problem. Companies that are unprepared for this escalation expose themselves to serious liability, regulatory scrutiny, and reputational damage that insurance alone cannot fix. At the same time, businesses are quietly introducing new risks through personal AI agents and automation tools. These tools are often adopted without security review, legal oversight, or compliance consideration. Marketed as productivity enhancers, personal AI agents frequently operate with broad access to email, files, customer data, and internal systems. When these agents mishandle or leak data, responsibility does not fall on the software vendor or the employee experimenting with automation. It falls squarely on the business. Regulators, insurers, and courts do not accept ignorance or convenience as a defense. We also examine why extortion groups like ShinyHunters continue to succeed even as companies invest heavily in security controls. This is not about sophisticated hacking techniques. It is about business pressure. Attackers understand deadlines, brand risk, customer trust, and executive fear. They exploit supply chains, third party vendors, and disclosure obligations to force decisions under time constraints. Paying extortion may feel like resolution, but it often increases long term risk, invites repeat targeting, and complicates regulatory reporting. Throughout this episode, the focus is not on tools, vendors, or technical jargon. It is on decision making. Who owns cyber risk inside the organization? How prepared is leadership to respond when incidents move beyond IT into legal, HR, and physical security territory? And how does a board defend its actions when regulators or plaintiffs start asking questions after an incident? This conversation is designed for CEOs, business owners, board members, and senior leaders who understand that cybersecurity is inseparable from operational risk, financial exposure, and executive accountability. If your strategy relies on cyber insurance, compliance checklists, or the belief that serious incidents only happen to larger companies, this episode will challenge that thinking. Security Squawk cuts through vendor noise and fear driven messaging to focus on what actually matters to businesses making real decisions. Support the show at https://buymeacoffee.com/securitysquawk
Cybersecurity Today: Google's Proxy Network Takedown, AI Agent Hijack, and More In today's episode of Cybersecurity Today, host David Shipley covers major cybersecurity stories, including Google's disruption of the massive residential proxy network IP Idea, the hijacking vulnerability of AI agent platform MT Book, and attackers abusing single sign-on platforms. We also delve into the coordinated cyber attack on Poland's energy sector by Russian state-linked actors and the misuse of eScan antivirus updates to deliver malware. Stay informed about the latest in cybersecurity with us! Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst 00:00 Introduction and Sponsor Message 00:52 Massive Residential Proxy Network Disrupted by Google 02:41 AI Agent Platform Security Flaw Exposed 04:46 Single Sign-On Platforms Targeted by Attackers 06:28 Coordinated Cyber Attack on Poland's Energy Sector 08:15 Antivirus Software Compromised by Attackers 09:45 Conclusion and Call to Action 10:13 Sponsor Message and Closing Remarks
North Korean hackers with the Lazarus Group have stolen over $300 million with this Telegram phishing scam. Subscribe to the Blockspace newsletter! Welcome back to The Blockspace Podcast! Today, Taylor Monahan, a security lead at MetaMask, joins us to talk about a highly sophisticated $300M phishing attack linked to North Korea's Lazarus Group. Taylor shares how the Lazarus Group hijacks Telegram accounts to lure victims into fake Zoom meetings and download a Trojan horse malware program. We break down the hackers' strategy, how the malware works, which wallet types are most vulnerable to theft, and what users can do to protect themselves if they have fallen prey to the scam or not. Tune in to learn how to identify these red flags and implement better digital hygiene for your crypto assets. Check out this article for a deep dive into how the malware works; plus, follow Taylor for updates on X and keep track of Laars Group's history of hacks via her Github. Subscribe to the newsletter! https://newsletter.blockspacemedia.com Notes: * Lazarus Group stole over $300M in the last year. * Attackers hijack Telegram accounts. * Scammers use fake Zoom links to deploy malware. * Malware often bypasses paid antivirus software. * Sandbox architecture on iOS offers more safety. * Software wallets and browser wallets are most vulnerable. * 2FA remains critical for sensitive account access. Timestamps: 00:00 Start 03:51 Telegram attack 11:30 2 Factor Authenticators 13:48 Losses 16:38 Calculating losses 19:08 North Korea 21:52 Malware 24:17 Malware detection 25:16 EDR 27:12 Wallets 34:21 Is verifying addresses enough? 39:28 Wallet malware design 44:11 What do they want? 54:16 Taylor stealing payloads 1:01:49 Steps to protect
We take an extended deep dive into the Ilhan Omar story and her "attacker"Former Viking Matt Kalil is now suing his ex-wife over too much information.The new Trump accounts are an interesting idea for newborns.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
We take an extended deep dive into the Ilhan Omar story and her "attacker"Former Viking Matt Kalil is now suing his ex-wife over too much information. The new Trump accounts are an interesting idea for newborns. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Get the stories from today's show in THE STACK: https://justinbarclay.comJoin Justin in the MAHA revolution - http://HealthWithJustin.comProTech Heating and Cooling - http://ProTechGR.com New gear is here! Check out the latest in the Justin Store: https://justinbarclay.com/storeKirk Elliott PHD - FREE consultation on wealth conservation - http://GoldWithJustin.comTry Cue Streaming for just $2 / day and help support the good guys https://justinbarclay.com/cueUp to 80% OFF! Use promo code JUSTIN http://MyPillow.com/JustinPatriots are making the Switch! What if we could start voting with our dollars too? http://SwitchWithJustin.com
Hour 1 of the Chris Hand Show | Wednesday 01-28-26 See omnystudio.com/listener for privacy information.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
"How many states are there in the United States?" Attackers are actively scanning for LLMs, fingerprinting them using the query How many states are there in the United States? . https://isc.sans.edu/diary/%22How%20many%20states%20are%20there%20in%20the%20United%20States%3F%22/32618 Closing the Door on Net-NTLMv1: Releasing Rainbow Tables to Accelerate Protocol Deprecation Mandiant is publicly releasing a comprehensive dataset of Net-NTLMv1 rainbow tables to underscore the urgency of migrating away from this outdated protocol. https://cloud.google.com/blog/topics/threat-intelligence/net-ntlmv1-deprecation-rainbow-tables Out-of-band update to address issues observed with the January 2026 Windows security update Microsoft has identified issues upon installing the January 2026 Windows security update. To address these issues, an out-of-band (OOB) update was released today, January 17, 2026 https://learn.microsoft.com/en-us/windows/release-health/windows-message-center
What happens when we finally admit that stopping every cyberattack was never realistic in the first place? That is the thread running through this conversation, recorded at the start of the year when reflection tends to be more honest and the noise dial is turned down a little. I was joined by returning guest Raghu Nandakumara from Illumio, nearly three years after our last discussion, to pick up a question that has aged far too well. How do organizations talk about cybersecurity value when breaches keep happening anyway? This episode is less about shiny tools and more about uncomfortable truths. We spend time unpacking why security teams still struggle to show value, why prevention-only thinking keeps setting leaders up for disappointment, and why the conversation is slowly shifting toward resilience and containment. Raghu is refreshingly direct on why reducing cyber risk, rather than chasing impossible guarantees, is the only metric that really holds up under boardroom scrutiny. We also talk about the strange contradiction playing out across industries. Attackers are often using familiar paths like misconfigurations, excessive permissions, and missing patches, yet many organizations still fail to close those gaps. The issue, as Raghu explains, is rarely a lack of tools. It is usually fragmented coverage, outdated processes, and a talent pipeline that blocks capable people from entering the field while claiming there is a skills shortage. One of the most practical parts of this conversation centers on mindset. Instead of asking whether an attacker got in, Raghu argues that leaders should be asking how far they were able to go once inside. That shift alone changes how success is measured, how teams prepare for incidents, and how pressure-filled P1 moments are handled when boards want answers every fifteen minutes. We also touch on how legal action, public claims campaigns, and customer lawsuits are changing the stakes after a breach, forcing executives to rethink how they frame cyber investment. From there, Raghu shares how Illumio has been working with Microsoft to strengthen internal resilience at massive scale, and why visibility and segmentation are becoming harder to ignore. This is a conversation about realism, responsibility, and growing up as an industry. If cybersecurity is really about safety and not slogans, what would you want your organization to stop saying, and what would you rather hear instead? Please feel free to upload the podcast. Here are also the links we discussed on the call: Useful Links Connect with Raghu Nandakumara on LinkedIn and Twitter Learn more about Illumio Lateral Movement in Cyberattacks Illumio Podcast Follow on Facebook, Twitter, LinkedIn, and YouTube Thanks to our sponsors, Alcor, for supporting the show.