Podcasts about Attackers

  • 1,405PODCASTS
  • 2,633EPISODES
  • 38mAVG DURATION
  • 1DAILY NEW EPISODE
  • Nov 10, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Attackers

Show all podcasts related to attackers

Latest podcast episodes about Attackers

SharkPreneur
Episode 1210: Your Network's Already Under Attack with Scott Alldridge

SharkPreneur

Play Episode Listen Later Nov 10, 2025 20:57


The threat that puts you out of business probably won't look like a movie hack, it'll look like a normal email from your CEO.   In this episode of Sharkpreneur, Seth Greene interviews Scott Alldridge, CEO of IP Services and bestselling author of the Visible Ops series, who explains how modern cybercrime actually works and why most small and mid-sized companies are far more vulnerable than they think. Scott shares real breach stories, including how something as simple as leaving a printer password as “1234” led to a $187,000 theft and forced a firm into a merger. He breaks down why cybersecurity is now a board-level issue, how AI is being weaponized by attackers, and what leaders need to be doing right now to protect their data, their money, and their survival.   Key Takeaways: → Most companies think “we're too small to be a target,” but attackers actively go after businesses with as few as 100 employees — and even under $1M in revenue. → Only about 1 in 7 cybersecurity breaches ever gets reported, so what you read in the news is a tiny fraction of what's actually happening. → A single weak password (like “1234” on a networked printer) can give a threat actor a doorway into your entire system. → Attackers don't smash and grab; they sit quietly for weeks or months, watch how you communicate, then imitate leadership to trigger wire transfers that look totally normal. → The “human layer” is still the biggest risk: phishing, social engineering, and reused or weak credentials are where most compromises begin.   Scott Alldridge has spent three decades on the frontlines of cyber warfare—turning escalating threats intocompetitive advantage for business leaders. As co-founder of the IT Process Institute and creator of the globally adopted VisibleOps framework (400,000+ copies sold), he shaped how enterprises worldwide secure and scale technology.   His Amazon bestseller, VisibleOps Cybersecurity, is the definitive roadmap for integrating Zero Trust principles into real business results. Today, as CEO of IP Services, one of America's most trusted MSSPs, Scott helps executives verify—not just trust—their cybersecurity posture.   Driven by both expertise and altruism, Scott's mission is to ensure businesses of all sizes are resilient and protected—not only to safeguard revenue, but to prevent the devastating personal and professional fallout of cyberattacks. A globally recognized thought leader with 618K+ social media followers, he leverages his platform to raise awareness, share real-world breach stories, and arm leaders with actionable strategies that save companies before it's too late.   Connect With Scott Aldridge: Website: https://ipservices.com/ Instagram: https://www.instagram.com/scottalldridge1/?hl=en LinkedIn: https://www.linkedin.com/in/scott-alldridge-1a976/ Learn more about your ad choices. Visit megaphone.fm/adchoices

Paul's Security Weekly
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432

Paul's Security Weekly

Play Episode Listen Later Nov 10, 2025 98:17


Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don't care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals' plans nicely. In this interview, we discuss the challenge of securing OT systems with Todd Peterson and Joshua Hay from Junto Security. This segment is sponsored by Junto Security. Visit https://securityweekly.com/junto to learn more! Segment 2: Topic - Spotting Red Flags in Online Posts This week's topic segment is all about tuning your 'spidey sense' to spot myths and misconceptions online so we can avoid amplifying AI slop, scams, and other forms of Internet bunk. It was inspired by this LinkedIn post, but we've got a cybersecurity story in the news that we could have easily used for this as well (the report from MIT). Segment 3: Weekly Enterprise News Finally, in the enterprise security news, Some interesting fundings Some more interesting acquisitions a new AI-related term has been coined: cyberslop the latest insights from cyber insurance claims The AI security market isn't nearly as big as it might seem cybercriminals are targeting trucking and logistics to steal goods Sorry dads, science says the smarts come from mom All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-432

Enterprise Security Weekly (Audio)
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432

Enterprise Security Weekly (Audio)

Play Episode Listen Later Nov 10, 2025 98:17


Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don't care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals' plans nicely. In this interview, we discuss the challenge of securing OT systems with Todd Peterson and Joshua Hay from Junto Security. This segment is sponsored by Junto Security. Visit https://securityweekly.com/junto to learn more! Segment 2: Topic - Spotting Red Flags in Online Posts This week's topic segment is all about tuning your 'spidey sense' to spot myths and misconceptions online so we can avoid amplifying AI slop, scams, and other forms of Internet bunk. It was inspired by this LinkedIn post, but we've got a cybersecurity story in the news that we could have easily used for this as well (the report from MIT). Segment 3: Weekly Enterprise News Finally, in the enterprise security news, Some interesting fundings Some more interesting acquisitions a new AI-related term has been coined: cyberslop the latest insights from cyber insurance claims The AI security market isn't nearly as big as it might seem cybercriminals are targeting trucking and logistics to steal goods Sorry dads, science says the smarts come from mom All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-432

Paul's Security Weekly TV
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432

Paul's Security Weekly TV

Play Episode Listen Later Nov 10, 2025 98:17


Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don't care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals' plans nicely. In this interview, we discuss the challenge of securing OT systems with Todd Peterson and Joshua Hay from Junto Security. This segment is sponsored by Junto Security. Visit https://securityweekly.com/junto to learn more! Segment 2: Topic - Spotting Red Flags in Online Posts This week's topic segment is all about tuning your 'spidey sense' to spot myths and misconceptions online so we can avoid amplifying AI slop, scams, and other forms of Internet bunk. It was inspired by this LinkedIn post, but we've got a cybersecurity story in the news that we could have easily used for this as well (the report from MIT). Segment 3: Weekly Enterprise News Finally, in the enterprise security news, Some interesting fundings Some more interesting acquisitions a new AI-related term has been coined: cyberslop the latest insights from cyber insurance claims The AI security market isn't nearly as big as it might seem cybercriminals are targeting trucking and logistics to steal goods Sorry dads, science says the smarts come from mom All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-432

Ekot
Ekot 08:00:Omfattande attacker mot staden Dnipro i Ukraina

Ekot

Play Episode Listen Later Nov 8, 2025 5:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

The Devlin Radio Show
David Williams: Former Wellington Phoenix attacker reflects on season with the team

The Devlin Radio Show

Play Episode Listen Later Nov 8, 2025 14:15 Transcription Available


Tonight's NZ derby has sparked some memories for a former Wellington Phoenix player. Former attacker David Williams only spent one season in Wellington, but he quickly became a fan favourite in the 2018-2019 season. He most recently played for Perth Glory and now is looking for his next opportunity. He joined Piney on the show to chat about where his career has taken him since his Wellington days and to reflect on his time in the capital. “It's one of those journeys that I've really, really enjoyed. And to this day, my wife and I still speak about my time in Wellington.” LISTEN ABOVE See omnystudio.com/listener for privacy information.

Hot Off The Wire
Supreme Court justices appear skeptical of tariffs; Starbucks' union workers plan strike

Hot Off The Wire

Play Episode Listen Later Nov 6, 2025 18:30


On today's episode: Conservative Supreme Court justices appear skeptical of Trump’s sweeping unilateral tariffs. FAA says it will list airports where it is reducing flights during the government shutdown. Israel identifies latest hostage remains returned by Hamas from Gaza as those of a Tanzanian student. After battering the Philippines, deadly Typhoon Kalmaegi moves toward Vietnam. Judge orders improvements at a Chicago-area immigration facility after claims of inhumane conditions. FDA issues warning to 18 websites selling unapproved Botox. Trump putting a positive spin on the economy after voters rebuked his performance. Judge in Comey case scolds prosecutors as he orders them to produce records from probe. 11 dead after engine fell off UPS plane that crashed and exploded in Kentucky. Mamdani announces transition leaders, vows to deliver on ambitious agenda. Starbucks' union workers plan strike next week unless company agrees to a contract. Wall Street gains ground amid steady flow of earnings reports, upbeat economic updates. The NHL’s all-time leading goal scorer reaches a new milestone in Washington’s blowout win, a big scoring night in the NBA is sparked by an unusual source in Cleveland’s victory over Philadelphia, and an NFL star quarterback in Arizona is being shelved with an injury. NBA staff members meet congressional staffers to discuss gambling scandals, AP sources say. Bill Belichick among 9 coaching semifinalists for Pro Football Hall of Fame's 2026 class. Tiger Woods' son is an All-American as Charlie honored by American Junior Golf Association. Attackers board a ship off the coast of Somalia after firing rocket-propelled grenades. Putin orders Russian officials to submit proposals for possible resumption of nuclear tests. The German government has banned a Muslim group over accusations of violating human rights. —The Associated Press About this program Host Terry Lipshetz is managing editor of the national newsroom for Lee Enterprises. Besides producing the daily Hot off the Wire news podcast, Terry conducts periodic interviews for this Behind the Headlines program, co-hosts the Streamed & Screened movies and television program and is the former producer of Across the Sky, a podcast dedicated to weather and climate. Theme music The News Tonight, used under license from Soundstripe. YouTube clearance: ZR2MOTROGI4XAHRX

Crime Bit with Danelle Hallan
Woman testifies against her attacker at HER OWN MURDER TRIAL | Judy Malinowski

Crime Bit with Danelle Hallan

Play Episode Listen Later Nov 5, 2025 41:13


In this episode of Crime Bit with Danelle Hallan, we look into the case of Judy Malinowski, a mother from Ohio whose story changed U.S. law.After surviving a brutal attack by her boyfriend, Judy fought for two years in the hospital, becoming the first person in history to testify at her own murder trial. Her strength not only brought her attacker to justice but also inspired Judy's Law, protecting future victims of violent crime.How did one woman's fight for her life become a fight for change?Join us as we uncover the story of Judy Malinowski on Crime Bit with Danelle Hallan.

Coffee Moaning
TRUMP ANGER as NYC Prepares for New MAYOR MAMDANI; Train Attacker on CCTV; Kids & Weight Loss Jabs

Coffee Moaning

Play Episode Listen Later Nov 4, 2025 68:06


COFFEE MOANING the PODCAST ON APPLE PODCASTS: https://podcasts.apple.com/gb/podcast/coffee-moaning/id1689250679ON SPOTIFY: https://open.spotify.com/show/3p6z4A1RbhidO0pnOGGZl2?si=IqwD7REzTwWdwsbn2gzWCg&nd=1HOW TO STAY MARRIED (SO FAR) the PODCASTON SPOTIFY: https://open.spotify.com/show/57MT4cv2c3i06ryQlIpUXc?si=1b5ed24f40c54ebaON APPLE PODCASTS: https://podcasts.apple.com/gb/podcast/how-to-stay-married-so-far/id1294257563 Hosted on Acast. See acast.com/privacy for more information.

Bear Attack
S7E10: Bear Attack Sports Report!

Bear Attack

Play Episode Listen Later Nov 3, 2025 103:45


We are down a bear this month, listen to find out who! Due to a certain bear's absence we discuss sport's of the redneck and rich person varieties!We also have a jumbo sized B.A.R. inspired by sports!Attacker's let's get ready to rumble and start your engines! See you in December for our annual yearly wrap up.As always comment, share and spread wide the almighty Beardom!

Highlights from The Pat Kenny Show
The many who don't get the chance to take their attacker to court

Highlights from The Pat Kenny Show

Play Episode Listen Later Oct 31, 2025 14:09


Back at the end of august we revealed on this show that over the past 10 years the Director of Public Prosecutions chose not to prosecute over 67 percent of sexual offence cases submitted to it by gardaí. The information was received under a freedom of information request, and it showcased the burden of proof needed for justice, what it takes to build a case, and importantly, the thousands of people who don't get the chance to take their attacker to court.Our reporter Jessica Woodlock has been looking into these figures and reported for us.

That Millwall Podcast
Femi Azeez: Millwall's New No Fear Attacker | Full Interview

That Millwall Podcast

Play Episode Listen Later Oct 30, 2025 33:03


Learn more about your ad choices. Visit podcastchoices.com/adchoices

ITSPmagazine | Technology. Cybersecurity. Society
CI/CD Pipeline Security: Why Attackers Breach Your Software Pipeline and Own Your Build Before Production | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 4 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 29, 2025 3:38


Organizations pour millions into protecting running applications—yet attackers are targeting the delivery path itself.This episode of AppSec Contradictions reveals why CI/CD and cloud pipelines are becoming the new frontline in cybersecurity.

Investec Focus Radio
NOW Ep 113: The new era of cyber risk

Investec Focus Radio

Play Episode Listen Later Oct 29, 2025 15:42


Deepfakes that fool the eye. Voices that sound real. Attacks that never sleep. As artificial intelligence reshapes both offence and defence, cyber risk has gone mainstream. In this episode of No Ordinary Wednesday, Jeremy Maggs speaks with Investec cybersecurity experts Nomalizo Hlazo and Tash van den Heever about the new era of digital resilience where trust, adaptability and awareness are your strongest defences. Podcast key moments 00:00 - Introduction 01:27 - AI on both sides – Attackers and defenders in the digital arms race 02:52 - 2025: The year cyber risk went mainstream 03:46 - Why digital risk is compounding 05:05 - Building resilience through third-party and supply chain visibility 07:15 - Regulation tightens – Balancing compliance and agility 08:57 - Critical infrastructure under threat 10:32 - Building digital trust in a diverse and connected market 11:48 - The future of cybersecurity: Integrity, speed, and adaptability 13:16 - Quantum computing, AI agents, and hyperconnectivity 13:58 - Cybersecurity as a life skill 14:56 - Closing remarks Read more on www.investec.com/now Hosted by seasoned broadcaster, Jeremy Maggs, the No Ordinary Wednesday podcast unpacks the latest economic, business, and political news in South Africa, with an all-star cast of investment and wealth managers, economists, and financial planners from Investec. Listen in every second Wednesday for an in-depth look at what's moving markets, shaping the economy, and changing the game for your wallet and your business. Investec Focus Radio SA

Redefining CyberSecurity
CI/CD Pipeline Security: Why Attackers Breach Your Software Pipeline and Own Your Build Before Production | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 4 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE

Redefining CyberSecurity

Play Episode Listen Later Oct 29, 2025 3:38


Organizations pour millions into protecting running applications—yet attackers are targeting the delivery path itself.This episode of AppSec Contradictions reveals why CI/CD and cloud pipelines are becoming the new frontline in cybersecurity.

TechTimeRadio
273: TechTime Radio: Tech turns terrifying: cloud crashes, robot takeovers, satellite leaks, AI love, ghost-seeing Teslas, doorbell surveillance, and blockchain malware. One failure can haunt everything. Tune in—if you dare. | Air Date: 10/28 - 11/3/25

TechTimeRadio

Play Episode Listen Later Oct 28, 2025 61:53 Transcription Available


Want a Halloween scare that sticks with you after the candy's gone? We're pouring a glass and pulling back the curtain on the creepiest corners of everyday tech: a cloud outage that toppled major apps and smart beds, a Prime refund saga with fine-print timelines, and Amazon's bold plan to swap 600,000 human jobs for robots by 2033. The number that matters isn't the 30 cents shaved off a product; it's the blast radius when a single point of failure hits everything from payments to sleep pods.We go deeper with cybersecurity expert Nick Espinosa to map the new threat surface. He breaks down a jaw-dropping study showing unencrypted geostationary satellite traffic—airline passenger data, critical infrastructure chatter, even U.S. and Mexican military communications—floating for the taking. Then we connect the surveillance dots: Ring's partnership with Flock could feed millions of doorbells into a searchable police network. With Ring's track record, do you want your front porch in a national database accessible by natural-language prompts?The uncanny valley gets crowded too. A widower claims an AI replica of Suzanne Somers “feels indistinguishable,” while OpenAI prepares to allow “mature” content for verified adults. We weigh the supposed benefits against the hard psychology: isolation, distorted attachment, and empathy atrophy. For a lighter fright, we test the viral claim that Teslas see “ghosts” in cemeteries—spoiler: that's what a cautious perception model looks like when tombstones confuse it. The real nightmare? Attackers hiding malware inside blockchain smart contracts, using decentralization to dodge takedowns and $2 fees to keep it cheap.From airline IT meltdowns to smart contract exploits, the pattern is clear: concentration of power and data magnifies risk. Redundancy, privacy-by-design, and failure-aware engineering aren't nice-to-haves—they're the only way through. Grab your headphones and your favorite pour, then join us for a tour of the haunted infrastructure underneath daily life.Enjoyed the ride? Follow, share with a friend, and leave a quick review so more curious listeners can find the show. What scared you most—and what would you fix first?Support the show

Ekot
Ekot 17:45 Netanyahu beordrar nya attacker mot Gaza

Ekot

Play Episode Listen Later Oct 28, 2025 20:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

The Anfield Index Podcast
David Lynch On 75m Attacker Linked To Liverpool

The Anfield Index Podcast

Play Episode Listen Later Oct 23, 2025 21:13


Dave Davis is joined by David Lynch to discuss: •⁠ ⁠⁠Off the field issues around injuries and ticketing •⁠ ⁠⁠Semenyo and Mac Allister links Learn more about your ad choices. Visit podcastchoices.com/adchoices

Ben Fordham: Highlights
‘Can't believe it' - Victim reacts after accused attacker allegedly strikes again

Ben Fordham: Highlights

Play Episode Listen Later Oct 21, 2025 6:10


See omnystudio.com/listener for privacy information.

Alan Jones Daily Comments
‘Can't believe it' - Victim reacts after accused attacker allegedly strikes again

Alan Jones Daily Comments

Play Episode Listen Later Oct 21, 2025 6:10


See omnystudio.com/listener for privacy information.

KentOnline
Podcast: Attacker ‘saw red' at his Folkestone bar Picklebacks and stabbed man with broken bottle

KentOnline

Play Episode Listen Later Oct 21, 2025 19:51


A court has heard a man “saw red” on the night his town centre bar was closing down and thrust a broken bottle into another man's head.Steven Harwood-Brown threw one of his employees to the floor at Folkestone venue Picklebacks, before stabbing the victim, who had intervened to stop the fight.Also in today's podcast, pressure is growing on the leader of Kent County Council after seven MPs demanded she quit and an eighth labelled her behaviour ‘unacceptable.'In a letter to Reform leader Nigel Farage, the Labour MPs said Cllr Linden Kemkaran was ‘clearly not up to the job. Two Kent women who survived domestic abuse are starting a community project to provide clothing and toiletries for other victims.The DV Closet, in Sevenoaks, is a safe space where those who've fled abuse can get the support they need.Long-harboured plans to build a new reservoir in the Kent countryside are finally moving forward as contractors carry out the first phase of ground investigation works.South East Water is planning to build a 200-acre facility on farmland near Canterbury - you can hear from the project manager. And a Kent farmer's told us he's pleased to be able to give apples he grows to charity - to avoid them going to waste.The crop at Hazel Street Farm is no longer financially viable, so the orchard has been handed over to a food project. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Active Self Protection Podcast
POM STOPS Machete-Weilding Attacker! -Alec

Active Self Protection Podcast

Play Episode Listen Later Oct 17, 2025 21:22


This week on the Active Self Protection Podcast we sit down with security professional Alec and discuss the day he was working his shift at a strip mall when he was alerted to the presence of a man holding a machete and how he put himself and a can of POM OC spray in between the attacker and the young people working at the mall that day.  Active Self Protection exists to help good, sane, sober, moral, prudent people in all walks of life to more effectively protect themselves and their loved ones from criminal violence. On the ASP Podcast you will hear the true stories of life or death self defense encounters from the men and women that lived them. If you are interested in the Second Amendment, self defense and defensive firearms use, martial arts or the use of less lethal tools used in the real world to defend life and family, you will find this show riveting.  Join host and career federal agent Mike Willever as he talks to real life survivors and hear their stories in depth. You'll hear about these incidents and the self defenders from well before the encounter occurred on through the legal and emotional aftermath. Music: bensound.com

The Cyber Threat Perspective
Episode 153: How to Prove Your Security Works Before Attackers Do

The Cyber Threat Perspective

Play Episode Listen Later Oct 17, 2025 33:04


In this episode, we dig into how to move from “we think we're secure” to “we can prove it.” We'll lay out a practical loop for validating controls, gathering evidence, and tracking results that leadership understands. If you've ever wondered how to demonstrate security value beyond dashboards and audits, this is your playbook.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal assume breach pentesting here.

77 WABC Early News
So, who won the big debate last night? A Bronx attacker should have never been on the streets.

77 WABC Early News

Play Episode Listen Later Oct 17, 2025 45:01


So, who won the big debate last night? A Bronx attacker should have never been on the streets. Learn more about your ad choices. Visit megaphone.fm/adchoices

Reboot IT - 501(c) Technology
Cybersecurity Maturity: What Associations Need to Know

Reboot IT - 501(c) Technology

Play Episode Listen Later Oct 16, 2025 39:17


In this episode of Reboot IT, host Dave Coriale sits down with Ben Muscolino, CEO of Breezio, Data Sangria, and co-founder at Vortacity, and Ryan O'Donnell, CTO at Vortacity, to demystify cybersecurity for associations and nonprofits. They explore the evolving threat landscape, the importance of proactive security measures, and how organizations can build a culture of cybersecurity without fear or shame. From phishing-resistant MFA to red team engagements, this conversation is packed with practical advice for leaders and IT professionals alike. Themes and Topics: Cybersecurity Culture and Leadership Cybersecurity must be embraced across the organization, not just by IT. Leaders should foster a “shameless and blameless” environment for open dialogue. Culture impacts how teams respond to threats and education efforts. Phishing and Account Takeover Risks Phishing remains the most common entry point for breaches. Attackers often dwell silently before exploiting access. Social engineering tactics are becoming more sophisticated. Cybersecurity Maturity  Organizations should progress from asset inventory to vulnerability scans, pen tests, and red team engagements. Skipping foundational steps can lead to ineffective or costly security efforts. Tailoring assessments to organizational needs is key. Penetration Testing and Red Teaming Pen tests simulate real-world attacks to expose vulnerabilities. Red team engagements test people, processes, and systems under stealth conditions. Trusted agents within the organization coordinate red team efforts discreetly. Deception Technology and Canary Tokens Canary tokens act as tripwires to detect post-compromise behavior. These tools are low-cost and high-impact for early breach detection. Ideal for organizations with limited cybersecurity resources. Budgeting and Advocacy for Cybersecurity Cybersecurity is often the first to be cut during budget reviews. IT leaders must communicate risk in terms of cost and organizational responsibility. Starting small is better than doing nothing—get from zero to one.

Hacker Valley Studio
How AI Elevates Cyber Hygiene with Jason Rebholz

Hacker Valley Studio

Play Episode Listen Later Oct 10, 2025 21:32


What if protecting your digital twin becomes the new cyber hygiene? In this week's episode, Ron welcomes back cybersecurity leader Jason Rebholz, CEO of Evoke, to discuss how AI is reshaping the fundamentals of cyber hygiene. From data breaches and deepfakes to everyday habits that protect our digital lives, Jason shares how small actions and smarter use of AI can make all the difference. Together, they uncover how our growing digital footprints are giving rise to digital twins, AI replicas that can mirror our behaviors, voices, and even decisions, and what that means for the future of trust, identity, and security. Impactful Moments: 00:00 - Introduction 01:00 - The Neon app data leak story 03:00 - Why our voices are the new passwords 05:00 - How AI can strengthen cyber hygiene 07:00 - Jason's mission to secure AI systems 09:00 - AI as a force multiplier for defenders 11:00 - Deepfakes and the new social engineering playbook 13:00 - Attackers' use of AI and what it means for us 15:00 - The rise of digital twins and identity threats 19:00 - How to defend against “yourself” online 20:00 - Final reflection: Trust in the AI age   Links: Connect with Jason on LinkedIn: https://www.linkedin.com/in/jrebholz/ Check out the TechCrunch article on the Neon app data leak story: https://techcrunch.com/2025/09/25/viral-call-recording-app-neon-goes-dark-after-exposing-users-phone-numbers-call-recordings-and-transcripts/   Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/  

98FM's Dublin Talks
*Trigger Warning* Siobhan Reveals Horror Of Bumping Into Her Sex Attacker On Night Out

98FM's Dublin Talks

Play Episode Listen Later Oct 10, 2025 41:55


Warning - This episode contains material that may be triggering. This is one of the most harrowing interviews we've ever done on the podcast. A brave listener, Siobhan, contacted us to talk about how her sex attacker is still walking the streets and even approached her on a night out to intimidate her even more

The Tech Blog Writer Podcast
3447: How DXC Is Using AI to Outsmart Cybercriminals

The Tech Blog Writer Podcast

Play Episode Listen Later Oct 9, 2025 28:36


In this episode, Mike Baker, Vice President and Global CISO at DXC Technology, says the cyber industry has been focusing on the wrong side of AI. He believes too many companies use it only to block threats instead of studying how criminals use it to scale phishing, bypass defenses, and deploy adaptive malware. Attackers are learning faster than ever, and security teams must catch up. Mike argues that defenders need to think differently and use AI as both protection and opportunity. He shares how DXC is already doing this. The company has brought autonomous AI agents into its security operations through a partnership with 7AI. These agents process alerts that used to require hours of human effort. The result is faster detection, less burnout, and more time for analysts to investigate real threats. By cutting manual work by more than eighty percent, DXC has shown how AI can make cybersecurity teams stronger, not smaller. Zero Trust remains a core part of DXC's strategy. Mike calls it a journey that never ends. It needs cultural change, constant learning, and leadership that keeps security invisible to end users. AI now plays a role here too, improving identity checks and spotting access issues in real time. Yet, he reminds us, AI still needs people in the loop for oversight and judgment. We also talk about supply chain risks. Too many companies still treat risk assessments as one-time tasks. Mike pushes for continuous monitoring and close collaboration with suppliers. He closes the conversation on a hopeful note. AI will not replace people in cybersecurity, he says. It will make their work more meaningful and more effective if used with care and common sense.

Cyber Security Headlines
North Korean attackers steal crypto. Who's sending UK phones to China? Avnet confirms data breach

Cyber Security Headlines

Play Episode Listen Later Oct 8, 2025 7:35


North Korean hackers steal more than $2B in crypto Group suspected of sending stolen UK phones to China Avnet confirms breach, says stolen data unreadable Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero-trust endpoint protection platform, ThreatLocker fills the gaps traditional solutions leave behind, giving your business stronger security and control. Don't just react to threats — stop them with ThreatLocker. Learn more at ThreatLocker.com.

RIMScast
National Cybersecurity Awareness Month with Gwenn Cujdik

RIMScast

Play Episode Listen Later Oct 7, 2025 46:20


Welcome to RIMScast. Your host is Justin Smulison, Business Content Manager at RIMS, the Risk and Insurance Management Society.   In this episode, Justin interviews Gwenn Cujdik, the Incident Response and Cyber Services Lead for North America at AXA XL. Justin and Gwenn cover various cybersecurity topics, and how her 15 years as an Assistant District Attorney prepared her for her current role of responding to cyber attacks. Listen for tips on securing your organization, large or small, from cyber attacks and responding when, not if, they come. Gwenn shares her experiences and some advice.   Listen for Gwenn's insights to help you be vigilant and prepared against cybercrime.   Key Takeaways: [:01] About RIMS and RIMScast. [:14] With great sadness, the RIMS family lost a true leader in September. Susan Meltzer was an exceptional risk professional and passionate volunteer with RIMS. She served as the Society's President in 1999 and 2000. [:29] RIMS has established a scholarship fund in her name. You can donate to that fund through RIMS, The Foundation for Risk Management®, at RIMS.org/FRM. [:46] About this episode of RIMScast. This is our National Cybersecurity Awareness Month episode. Here to lend her insight on all things cyber is Gwenn Cujdik. She is the Incident Response and Cyber Services Lead for North America at AXA XL. [1:19] We're also going to talk about her fascinating career that antedates her time in cyber. [1:24] RIMS-CRMP Prep Workshops! The next RIMS CRMP Prep Workshops will be held on October 29th and 30th and led by John Button. [1:36] The next RIMS-CRMP-FED Virtual Workshop will be held on November 11th and 12th and led by Joseph Mayo. Links to these courses can be found through the Certifications page of RIMS.org and through this episode's show notes. [1:53] RIMS Virtual Workshops! RIMS has launched a new course, “Intro to ERM for Senior Leaders.” It will be held again on November 4th and 5th and will be led by Elise Farnham. [2:07] On November 11th and 12th, Chris Hansen will lead “Fundamentals of Insurance”. It features everything you've always wanted to know about insurance but were afraid to ask. Fear not; ask Chris Hansen! RIMS members always enjoy deep discounts on virtual workshops! [2:26] The full schedule of virtual workshops can be found on the RIMS.org/education and RIMS.org/education/online-learning pages. A link is also in this episode's notes. [2:37] Several RIMS Webinars are being hosted this Fall. On October 9th, Global Risk Consultants returns to deliver “Natural Hazards: A Data-Driven Guide to Improving Resilience and Risk Financing Outcomes”. [2:51] On October 16th, Zurich returns to deliver “Jury Dynamics: How Juries Shape Today's Legal Landscape”. On October 30th, Swiss Re will present “Parametric Insurance: Providing Financial Certainty in Uncertain Times”. [3:08] On November 6th, HUB will present “Geopolitical Whiplash — Building Resilient Global Risk Programs in an Unstable World”. Register at RIMS.org/Webinars. [3:20] On with the show! It's National Cybersecurity Awareness Month here in the U.S. and in many places around the world. Cyber continues to be a top risk among organizations of all sizes in the public and private sectors. [3:35] Joining me today to discuss cybersecurity awareness is Gwenn Cujdik. You may remember her from the RIMS AXA XL webinar on September 4th, “Lock Down & Level Up.” [3:52] During that webinar, we had a brief, fascinating discussion about her time as an Assistant District Attorney in Pennsylvania. [4:01] I wanted to learn more about how someone transitions from a colorful career to cybersecurity and eventually becomes the Incident Response and Cyber Services Lead for North America at AXA XL. [4:15]  She's got a lot on her plate. She's got a huge risk radar. We're going to talk all about it and help all the risk managers out there use her insight and perspective to protect their organizations. Let's get to it! [4:28] Interview! Gwenn Cujdik, welcome to RIMScast! [5:09] Gwenn is Incident Response and Cyber Services Lead for North America at AXA XL. When a client has a cyber breach, they call AXA XL and work with Gwenn's teams. [5:42] Gwenn works on training her teams to be able to respond, setting up procedures and processes to make the response seamless and collaborative, and making sure the clients get consistent service, whoever handles the call. [6:16] Gwen's team has 18. Four are in leadership with 14 more team members. Two managers directly supervise the teams to help them with answers to questions about unusual situations. [6:50] Gwenn helps the teams understand massive events and how they might affect AXA XL and their clients, how to interact with brokers, and technical matters. She helps the team understand coverages when it comes to something unique. “It's all hands on deck for us!” [7:55] Gwenn says, Fighting crime is a part of who I am. She is driven by helping others get through some terrible times. She has seen the worst of the worst. Sometimes it takes just one helping hand to get people through tough times. She has seen how impactful that can be. [8:44] Sometimes, in a crisis, how people interact with the victim could be the recipe for them to recover fully from that event. Gwenn has seen people recover, take back their lives, move forward, and be survivors. She has seen corporations and companies do so and become better. [9:39] Justin repeats that Gwenn has seen the worst of the worst: homicides, murders, abuses of women and children, arson, and more. She has seen it all, including things that she wishes she hadn't seen. [10:27] Gwenn compares cyber incident response to her ADA work. A prosecutor has to be able to handle things under pressure. The best prosecutors are looking to do the right thing. Gwenn has met many people who, absent the crime, would have been friends. [11:06] You have to be able to see there's a human on the other side, and there are humans that they hurt. You do right by understanding that there are a lot of players involved, who are humans. [11:26] It helps you understand where somebody might be coming from. It helps you understand why they might be screaming at you. “I'm just the messenger, but let's talk about why you're so upset.” [11:39] Gwenn says one of the cool things about being a prosecutor is that every case you have presents a different set of facts and circumstances. There's a law that's intertwined with it, and that's interesting for Gwenn. [11:54] The first time Gwenn had an arson case, she had to work with the Fire Marshals to understand how they knew the fire started here. How did they know it was a chemical? She started with the Fire Marshals and then went to the crime scene to talk to Forensic Chemists. [12:11] The Forensic Investigators explained the chemistry behind the Molotov Cocktail that was thrown through the window. This was how the fire started, and then it enveloped the room. [12:22] When Gwenn first worked with DNA, she found it to be incredibly complicated. She had to learn it to be able to explain it. Her job was to explain to 12 people why DNA mattered, why it's this guy, and not anybody else, that committed this crime; the numbers are insane. [12:44] It could be one in a hundred quadrillion that it's another person. Those numbers are insane, and it's really hard to understand. [12:56] Gwenn was in the DA's office when cell site analysis came around; being able to triangulate where someone is, using cell towers. The Philadelphia Field Office had one of the pioneers in that science. Gwenn learned from him. [13:13] One of Gwenn's matters was a homicide. They tracked the defendant from the scene of the crime, through public transportation, back to his house, using cell site triangulation. While they were mapping, the actor Joe Piscopo came by, touring the building. Gwenn was an SNL fan. [14:23] Gwenn's prosecutorial experience translates to cyber in that each matter is a little different. There's a bad guy at the other end. Gwenn is not sympathetic to the bad guys because they are anonymous. Nobody sees them or knows them. It's usually a criminal enterprise. [14:59] It's a group of people working together, motivated by money and wreaking havoc on people who are trying to make a living and support their families. The bad guys want to extort millions of dollars and put businesses and livelihoods in danger. [15:42] In Philadelphia, the elite of the elite prosecutors worked in homicide. Some spend 20 or 30 years there. Gwenn was an ADA for 15 years, but couldn't see herself doing it for 20 or 30 years. She wanted to stay positive and be a force for good when she was dealing with bad. [16:34] She wondered where she could go to have a similar impact for good, investigating, and helping people get through an awful time. [16:45] Gwenn had a friend who worked with her in the Family Violence and Sexual Assault Unit. She had left the office to work for a new law firm doing cyber incident response. She called Gwenn and said she would be really good at it. She explained it to Gwenn. [17:50] Gwenn interviewed with the firm and got an offer the day she interviewed. She realized that was what she wanted to do. Some former prosecutors were doing it. There were some amazing people, and she wanted to be a part of that, something new, interesting, and growing. [18:15] Gwenn wanted to be challenged and get to help people. Once she discovered it, she couldn't think of a better transition for people who are in law enforcement than going into cybersecurity. [18:39] RIMS Events! On November 17th and 18th, join us in Seattle, Washington, for the RIMS ERM Conference 2025. The agenda is live. Check out Episode 357 for Justin's dialogue with ERM Conference Keynote Presenter Dan Chuparkoff on AI and the future of risk. [18:59] Visit the Events page of RIMS.org to register. [19:02] RISKWORLD 2026 will be in Philadelphia, Pennsylvania, from May 3rd through May 6th. RIMS members can now lock in the 2025 rate for a full conference pass to RISKWORLD 2026 when you register by October 30th! [19:16] This also lets you enjoy earlier access to the RISKWORLD hotel block. Register by October 30th, and you will also be entered to win a $500 raffle! Do not miss out on this chance to plan and score some of these extra perks! [19:30] The members-only registration link is in this episode's show notes. If you are not yet a member, this is the time to join us! Visit RIMS.org/Membership and build your network with us here at RIMS! [19:42] Let's return to our interview with Gwenn Cujdik! [20:14] Gwenn says cybersecurity takes a village. What she learned in criminal prosecution is that as long as there have been humans, there has been crime. We're fortunate as a society to have laws, law enforcement, governing bodies, and organizations to keep crime down. [20:54] It's not dissimilar to cybersecurity. If Gwenn were talking to a board, she would say, It takes everybody in your community, in your organization, to build resilience, protect yourself from cybercrime, and react to it. [21:12] Gwenn says a big mistake people often make is thinking incident response is a job for just their tech team. The IT team is not trained in all the various fields you need to be an expert in to get through a cyber incident. [21:41] Your IT team will be able to get you up and running, collaborate, and be a good foundation for the incident response, working with outside experts. It takes people who understand the law and who understand communications. [21:54] It takes people who understand the brand, who are the heart of the organization, to be able to respond. Your CISO may say, Here's how I think that we should respond, but your CEO may say, This isn't how I think we would respond to an event like this. Keep in mind who we are. [22:32] Your legal team is there to say, Here's why we can't do that, the risk is too great; It will be worse if you do X, Y, Z; You shouldn't do that because you need to be compliant with the law. [23:11] Gwenn says good leaders lead best when they model. If you expect people to be open-minded and collaborative, you need to be the same. For the most part, organization leadership is very aware that cybersecurity is an important part of who they are and will be. [23:55] Gwenn has met a ton of CEOs who admit they don't know what they don't know and ask for help to understand cybersecurity so they can help their organizations in the best way possible. Some CEOs are thinking ahead and putting teams together that understand their role. [24:20] Gwenn has encountered CEOs who are just messing up the process. One wanted to invite his wife, not an employee, to the conversation because she would like to hear about it.  From a legal and business perspective, it's very risky for the company. [25:04] One Final Break! The Spencer Educational Foundation's goal to help build a talent pipeline of risk management and insurance professionals is achieved, in part, by its collaboration with risk management and insurance educators across the U.S. and Canada. [25:23] Since 1999, Spencer has awarded over $2.9 million to create more than 570 Risk Management Internships. The Internship Grants application process is now open through October 15th, 2025. [25:39] To be eligible, risk managers must be based in the U.S., Canada, or Bermuda. A link to the Internship Grants page is in this episode's show notes. You can always visit SpencerEd.org, as well. [25:53] Let's Conclude Our National Cybersecurity Awareness Month Interview with Gwenn Cujdik! [26:05] It's National Cybersecurity Awareness Month 2025, here in the U.S. It's a big month for everyone in Gwenn's house; they have to pull their own weight a little more because she's traveling a lot, she's out a lot, and there are a lot of conferences and meetings going on! [26:29] Gwenn tries not to shove everything cyber just into October. October is busy, and she loves it. [26:56] On October 29th, at the Sheraton New York Times Square Hotel in Manhattan, Gwenn will be the Conference Co-Chair for the Zywave Cyber Risk Insights New York event. It's a full day with a lot of very knowledgeable individuals from a range of companies. [27:50] It is one of Gwenn's favorite events. It's a day packed with good information. She would love to see more risk managers and CISOs join it. The amount of information you can get in one day is almost unbelievable. The content is pretty diverse. [28:21] It covers claims, the state of the market, the different ways threat actors are attacking, how to prepare better for attacks and for business continuity, and how to organize invoices and costs as you're going through an incident response. [29:01] Gwenn says, Get the small things right so you can deal with the big things. While you tackle the small things, you can talk about whether or not the law requires you to file notifications to seven million people and how to get through that as a company. [29:22] Gwen says it's a great event. Gwenn will be there, giving opening remarks. Justin will be there, after attending a heavy metal concert the night before. The link is in this episode's show notes. [30:52] When Gwenn entered the cybersecurity field, she was surprised at the female presence. One of the managing partners who interviewed her was a female. There are also savvy female hackers out there. [31:35] Gwenn says that in criminal law, people have trouble understanding that women can commit crimes, the same way that men can. Gwenn points out Elizabeth Holmes and the book Bad Blood, about Theranos. [32:23] Gwenn mentions a woman in government who embezzled $22 million from her community to show horses. [32:42] Gwenn says, in terms of cybersecurity being a male-dominated field, we're all learning together; anybody who tries and is committed to it can do it. Because it's new, people come from different backgrounds with diverse experiences. [33:11] Gwenn says, We're seeing value in people coming from different careers and different industries and seeing their skillsets translate to cybersecurity. In this field, you need great diversity with people from all different backgrounds to be able to tackle this. [33:38] It's not one-size-fits-all. There are personalities involved. There are different businesses involved, from small to large, public to government. You have to be able to understand a huge variety of people and businesses. You have to understand a huge amount of technology. [34:00] Gwenn talks about the differences between cybersecurity and other industries. eDiscovery for cyber is not the same as eDiscovery for litigation. You need special people and tooling, and you have to understand what the tooling is, which helps you figure out timing. [34:43] Technology is always developing. Gwenn compares it to cat and mouse. We're constantly chasing the bad guys to figure out what they're doing. Sometimes it's reactive. They'll think of something new, and we've never seen it before. This is how we get through it. [35:04] The tools and a skillset you've used dealing with everything before help you tackle what's coming. Even the way we investigate and respond to things has changed. [35:16] Gwenn says when we came on the scene, we would grab images of all the computers. If there were 50 computers, you would have 50 images, which would mean people going through a massive amount of data, taking a really long time. [35:30] We don't do that now. We have tools and technology that can get through a system programmatically, to pull the evidence we need to do these investigations without having to go into a shop and take copies of laptops or servers to get through that. [35:49] That makes a potential difference of millions of dollars in responding. It's the difference between months and a month to respond. [36:15] Gwenn has not seen a malicious actor with technology or an algorithm that is beyond what she has seen before. She says, We have the technology they have. You'd be surprised how much private industry gives to our community in terms of intelligence and technology. [36:35] Gwenn adds, We work with the government to find out solutions. The industry is armed pretty well. Gwenn has seen some things that have impressed her. One attacker was pulling searches from a legal hold, getting into sensitive information. [37:16] Their searches looked legitimate, like what an attorney would look for, so it didn't set off bells and whistles. Gwenn wonders how they knew to look in a legal hold. Were they lawyered? That was something small but ingenious to Gwenn. [37:46] Seeing a smart attack invigorates Gwenn to use her brain and try to be as smart or smarter. She says that's what is great about this job. It's constantly changing. You're constantly moving. It's not for weak minds. [38:11] To excel, you have to be smart, tenacious, and love learning. You have to love that you may be an expert in this, but you may become obsolete. You've got to keep your game up.  Gwenn says she is just a big nerd for it. [38:33] Attackers are using AI more. Gwenn recalls two incidents recently where two different groups, for two different reasons, were attacking Salesforce. That's the rub of being popular. One group used AI to search quickly for sensitive information to leverage attacks on companies. [39:27] Unfortunately, people are reusing passwords, and the bad guys know that. Gwenn says you'd better not! [39:57] Justin comments that AI being used for a cyber attack should be on companies' risk radars. How can they adjust defense strategies to stay ahead of something like that? [40:08] Gwenn is dealing with that at this moment. If you are a big company with subsidiaries and locations around the country or the world, segregate the networks. If an attack hits your facility in Oklahoma, they won't have access to your facility in Belgium. [40:38] If your locations are networked, it's a domino effect. If one goes down, they all go down. In terms of business resilience, that is the one factor that can tumble everything with the press of a button. [40:55] The tools that bad guys are using are meant to get them through fast. They get in, use AI to conduct reconnaissance, and get terabytes of data out quickly. It's important to take every effort to reduce the severity of an attack in its spread and the amount of data stolen. [41:40] Can they move laterally within a company or elevate privileges by getting to the admin, who has access to everything? It's great to focus on how to prevent it, but the reality is, they're going to find a way. It's not if, it's when. [42:09] While you have to prevent the attack from happening, and be vigilant. If you get an attack, you have to make sure it's small, you respond quickly, and it's not going to hit every facet of your company. Attacks that hit every facet of the company are the most devastating. [42:39] Justin says you've been wonderful. You've given us so much to think about when it comes to National Cybersecurity Awareness Month. You do great work! I look forward to seeing you in more AXA XL RIMS collaborative webinars! [42:55] We'll see you in the city for the Zywave Cyber Risk Insights New York, on  October 29th, delivering the opening address and mingling with attendees. [43:04] Gwenn says, I'll be there all day, attending sessions, supporting my friends on panels, my cyber family, and for folks who want to meet me. I'm always happy to talk cyber! [43:24] Justin says, Lock Down & Level Up: Turn Up Your Cybersecurity Game Against Creative Cyber Criminals. [43:30] You've been such a wonderful guest, and I appreciate all your time and insight today. Thank you, Gwenn! [43:43] Special thanks to Gwenn Cujdik of AXA XL for joining us here to discuss all things cyber. The AXA XL RIMS webinar, “Lock Down & Level Up: Turn Up Your Cybersecurity Game Against Creative Cyber Criminals,” is now available on demand through the RIMS.org/Webinars page. [44:05] A link is also in this episode's show notes. [44:07] Gwenn will deliver the opening address at the Zywave Cyber Risks Insights New York Conference on October 29th in Manhattan. A link is in this episode's show notes. [44:19] Plug Time! You can sponsor a RIMScast episode for this, our weekly show, or a dedicated episode. Links to sponsored episodes are in the show notes. [44:47] RIMScast has a global audience of risk and insurance professionals, legal professionals, students, business leaders, C-Suite executives, and more. Let's collaborate and help you reach them! Contact pd@rims.org for more information. [45:05] Become a RIMS member and get access to the tools, thought leadership, and network you need to succeed. Visit RIMS.org/membership or email membershipdept@RIMS.org for more information. [45:23] Risk Knowledge is the RIMS searchable content library that provides relevant information for today's risk professionals. Materials include RIMS executive reports, survey findings, contributed articles, industry research, benchmarking data, and more. [45:39] For the best reporting on the profession of risk management, read Risk Management Magazine at RMMagazine.com. It is written and published by the best minds in risk management. [45:54] Justin Smulison is the Business Content Manager at RIMS. Please remember to subscribe to RIMScast on your favorite podcasting app. You can email us at Content@RIMS.org. [46:06] Practice good risk management, stay safe, and thank you again for your continuous support!   Links: RIMS ERM Conference 2025 — Nov. 17‒18 Spencer Internship Program — Registration Open Through Oct. 15. RISKWORLD 2026 — Members-only early registration through Oct 30! RIMS-Certified Risk Management Professional (RIMS-CRMP) The Strategic and Enterprise Risk Center RIMS Diversity Equity Inclusion Council RISK PAC | RIMS Advocacy | RIMS Legislative Summit SAVE THE DATE — March 18‒19, 2026 RIMS Risk Management magazine | Contribute RIMS Now Zywave's 2025 Cyber Risk Insights Conference — Oct. 29, 2025 | New York City StaySafeOnline.org “RIMS Issues Statement on the Passing of Legendary Risk Leader and Former RIMS President Susan Meltzer” Upcoming RIMS Webinars: RIMS.org/Webinars Natural Hazards: A Data-Driven Guide to Improving Resilience and Risk Financing Outcomes | Oct. 9 | Sponsored by Global Risk Consultants Jury Dynamics: How Juries Shape Today's Legal Landscape | Oct. 16, 2025 | Sponsored by Zurich Parametric Insurance: Providing Financial Certainty in Uncertain Times | Oct. 30, 2025 | Sponsored by Swiss Re Geopolitical Whiplash — Building Resilient Global Risk Programs in an Unstable World | Nov. 6 | Sponsored by Hub “Lock Down & Level Up: Turn Up Your Cybersecurity Game Against Creative Cyber Criminals”   Upcoming RIMS-CRMP Prep Virtual Workshops: RIMS-CRMP Virtual Exam Prep — Oct. 29‒30, 2025 RIMS-CRMP-FED Exam Prep Virtual Workshop — November 11‒12 Full RIMS-CRMP Prep Course Schedule “Risk Appetite Management” | Oct 22‒23 | Instructor: Ken Baker “Intro to ERM for Senior Leaders” | Nov. 4‒5 | Instructor: Elise Farnham “Fundamentals of Insurance” | Nov. 11‒12 | Instructor: Chris Hansen “Leveraging Data and Analytics for Continuous Risk Management (Part I)” | Dec 4. See the full calendar of RIMS Virtual Workshops RIMS-CRMP Prep Workshops   Related RIMScast Episodes about Cyber: “AI Risks and Compliance with Chris Maguire” “Data Privacy and Protection with CISA Chief Privacy Officer James Burd” “Cyberrisk Trends in 2025 with Tod Eberle of Shadowserver”   Sponsored RIMScast Episodes: “The New Reality of Risk Engineering: From Code Compliance to Resilience” | Sponsored by AXA XL (New!) “Change Management: AI's Role in Loss Control and Property Insurance” | Sponsored by Global Risk Consultants, a TÜV SÜD Company “Demystifying Multinational Fronting Insurance Programs” | Sponsored by Zurich “Understanding Third-Party Litigation Funding” | Sponsored by Zurich “What Risk Managers Can Learn From School Shootings” | Sponsored by Merrill Herzog “Simplifying the Challenges of OSHA Recordkeeping” | Sponsored by Medcor “Risk Management in a Changing World: A Deep Dive into AXA's 2024 Future Risks Report” | Sponsored by AXA XL “How Insurance Builds Resilience Against An Active Assailant Attack” | Sponsored by Merrill Herzog “Third-Party and Cyber Risk Management Tips” | Sponsored by Alliant “RMIS Innovation with Archer” | Sponsored by Archer “Navigating Commercial Property Risks with Captives” | Sponsored by Zurich “Breaking Down Silos: AXA XL's New Approach to Casualty Insurance” | Sponsored by AXA XL “Weathering Today's Property Claims Management Challenges” | Sponsored by AXA XL “Storm Prep 2024: The Growing Impact of Convective Storms and Hail” | Sponsored by Global Risk Consultants, a TÜV SÜD Company “Partnering Against Cyberrisk” | Sponsored by AXA XL “Harnessing the Power of Data and Analytics for Effective Risk Management” | Sponsored by Marsh “Accident Prevention — The Winning Formula For Construction and Insurance” | Sponsored by Otoos “Platinum Protection: Underwriting and Risk Engineering's Role in Protecting Commercial Properties” | Sponsored by AXA XL “Elevating RMIS — The Archer Way” | Sponsored by Archer   RIMS Publications, Content, and Links: RIMS Membership — Whether you are a new member or need to transition, be a part of the global risk management community! RIMS Virtual Workshops On-Demand Webinars RIMS-Certified Risk Management Professional (RIMS-CRMP) RISK PAC | RIMS Advocacy RIMS Strategic & Enterprise Risk Center RIMS-CRMP Stories — Featuring RIMS President Kristen Peed!   RIMS Events, Education, and Services: RIMS Risk Maturity Model®   Sponsor RIMScast: Contact sales@rims.org or pd@rims.org for more information.   Want to Learn More? Keep up with the podcast on RIMS.org, and listen on Spotify and Apple Podcasts.   Have a question or suggestion? Email: Content@rims.org.   Join the Conversation! Follow @RIMSorg on Facebook, Twitter, and LinkedIn.   About our guest: Gwenn Cujdik, Incident Response and Cyber Services Lead for North America at AXA XL Production and engineering provided by Podfly.  

The Dana Show with Dana Loesch
Absurd Truth: Kavanaugh's Trans Attacker Got Off EASY

The Dana Show with Dana Loesch

Play Episode Listen Later Oct 6, 2025 24:11 Transcription Available


The Transgender man who planned to assassinate Brett Kavanaugh will serve just 8 years. Steak ‘n Shake announces it is installing "the tallest and biggest American flag that local governments will allow" at every restaurant across the country. Disney CEO Bob Iger reinstated Jimmy Kimmel after the cancellation threatened a glitzy party he and his wife were hosting.Thank you for supporting our sponsors that make The Dana Show possible…Noble Gold https://NobleGoldInvestments.com/DanaOpen a new qualified IRA or cash account with Noble Gold and get a free 10-ounce Silver Flag Bar plus a Silver American Eagle Proof Coin.Webroothttps://Webroot.com/danaChange your October from cyber-scary to cyber-secure with 60% off Webroot Total Protection.AmmoSquaredhttps://AmmoSquared.comDon't get caught without ammo and be sure to tell them you heard about Ammo Squared on this show. HumanNhttps://HumanN.comStart supporting your cardiovascular health with SuperBeets now available at your local Walmart. ChapterFor free and unbiased Medicare help from my partners Chapter, dial #250 and say keyword “My Medicare”Chapter and its affiliates are not connected with or endorsed by any government entity or the federal Medicare program. Chapter Advisory, LLC represents Medicare Advantage HMO, PPO, and PFFS organizations and stand-alone prescription drug plans that have a Medicare contract. Enrollment depends on the plan's contract renewal. While we have a database of every Medicare plan nationwide and can help you search among all plans, we have contracts with many but not all plans. As a result, we do not offer every plan available in your area. Currently, we represent 50 organizations which offer 18,160 products nationwide. We search and recommend all plans, even those we don't directly offer. You can contact a licensed Chapter agent to find out the number of products available in your specific area. Please contact Medicare.gov, 1-800-Medicare, or your local State Health Insurance Program (SHIP) to get information on all of your options.PreBornhttps://PreBorn.com/DANA Or DIAL #250 Say the keyword BABY. That's #250, BABY. Together, we can save lives — one mom and one baby at a time.Keltechttps://KelTecWeapons.comKelTec builds every KS7 GEN2 right here in the USA with American materials and workers—upgrade your home defense today. All Family Pharmacyhttps://AllFamilyPharmacy.com/Dana Don't wait until flu season knocks at your door. Use code DANA10 at checkout to save 10%. Relief Factorhttps://ReliefFactor.com OR CALL 1-800-4-RELIEFTurn the clock back on pain with Relief Factor. Get their 3-week Relief Factor Quick Start for only $19.95 today! Byrnahttps://Byrna.com/danaGet your hands on the new compact Byrna CL. Visit Byrna.com/Dana to receive 10% off Patriot Mobilehttps://PatriotMobile.com/DanaDana's personal cell phone provider is Patriot Mobile. Get a FREE MONTH of service code DANA

Bear Attack
S7E9: K-Pop Bear Wranglers

Bear Attack

Play Episode Listen Later Oct 6, 2025 100:17


Happy spooky season Attackers! Normally this time of year we do a halloween themed episode, however this year we decided to be a little more broad and talk about Korean demons and crap related to that.On this episode we discuss Korean Grim Reaper hats, have a wild time with asian rock music and review Netflix's K-Pop Demon Hunters.Please share our show with your friends and hit us up on socials with ideas and stuff.

Global News Podcast
Manchester synagogue attacker named

Global News Podcast

Play Episode Listen Later Oct 3, 2025 29:35


Police have named the man who killed two people at a synagogue in Manchester. Jihad Al-Shamie, a 35-year-old British man of Syrian descent, was shot and killed by officers outside the Heaton Park Hebrew Congregation Synagogue. Also, Donald Trump has declared the US is now in an armed conflict with drug smugglers in the Caribbean Sea. A man alleged to be a high-up figure in the Tren de Aragua gang has been arrested in Colombia. A former Israeli hostage who was held in captivity in Gaza for 16 months has called on Hamas to sign President Trump's peace plan. The disgraced rapper, Sean Diddy Combs, is set to be sentenced on prostitution charges. Luxembourg's Grand Duke Henri is formally abdicating his throne. There is a rogue planet gobbling up gas and dust at an unprecedented rate. Open AI's Sora app raises yet more concerns about artificial intelligence and copyright.The Global News Podcast brings you the breaking news you need to hear, as it happens. Listen for the latest headlines and current affairs from around the world. Politics, economics, climate, business, technology, health – we cover it all with expert analysis and insight. Get the news that matters, delivered twice a day on weekdays and daily at weekends, plus special bonus episodes reacting to urgent breaking stories. Follow or subscribe now and never miss a moment. Get in touch: globalpodcast@bbc.co.uk

Rebel News +
EZRA LEVANT | Rebel News caught suspected Antifa church attacker (INSIDE the Defence department?!)

Rebel News +

Play Episode Listen Later Oct 2, 2025 29:34


The Rebel News podcasts features free audio-only versions of select RebelNews+ content and other Rebel News long-form videos, livestreams, and interviews. Monday to Friday enjoy the audio version of Ezra Levant's daily TV-style show, The Ezra Levant Show, where Ezra gives you his contrarian and conservative take on free speech, politics, and foreign policy through in-depth commentary and interviews. Wednesday evenings you can listen to the audio version of The Gunn Show with Sheila Gunn Reid the Chief Reporter of Rebel News. Sheila brings a western sensibility to Canadian news. With one foot in the oil patch and one foot in agriculture, Sheila challenges mainstream media narratives and stands up for Albertans. If you want to watch the video versions of these podcasts, make sure to begin your free RebelNewsPlus trial by subscribing at http://www.RebelNewsPlus.com

New England Soccer Weekly w/ Tom Quinlan
RIFC Manager Khano Smith, Midfielder Zach Herivaux, Attacker JJ Williams

New England Soccer Weekly w/ Tom Quinlan

Play Episode Listen Later Oct 2, 2025 17:38


Tom catches up with Coach Khano, Midfielder Zachary Herivaux and Forward JJ Williams this week. The guys talk about the teams form heading into the final four matches, how the attack has improved and the growth of RIFC in the community after year 1 at Centerville Bank Stadium.See omnystudio.com/listener for privacy information.

AWS for Software Companies Podcast
Ep153: From Minutes to Seconds: How AI-Native Cybersecurity is Winning the Speed War Against Attackers

AWS for Software Companies Podcast

Play Episode Listen Later Oct 2, 2025 21:52


John Skinner of Vectra AI shares how cyber attackers are democratizing sophisticated attacks using dark web tools, and why AI-powered hybrid defense is now essential for enterprise security.Topics Include:Vectra AI: 13-year-old cybersecurity company founded as "AI native" from day oneBuilt on machine learning assumption while competitors treated AI as afterthoughtGenerative AI represents the latest evolution in their comprehensive AI journeyStarted pairing threat researchers with ML developers to codify attack behaviorsAdded agentic AI in 2018 for correlation across space and timeUses AWS Security Lake, GuardDuty, and recently became AWS Bedrock customerSuccess measured by reducing "dwell time" from initial attack to detectionAchieved 60% faster alerts, 51% faster monitoring, 50% faster investigation timesCustomers should evaluate vendor's data science quality and algorithm training yearsEvolved hybrid defense approach as attacks start anywhere, go everywhereAI handles high-volume correlation while humans focus on analytical decisionsFuture challenge: democratized cyber attacks using readily available dark web toolsParticipants:John Skinner – Vice President Corporate/Business Development, Vectra AIFurther Links:Vectra AI: Website – LinkedIn – AWS Marketplace - YouTubeSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon.com/isv/

AP Audio Stories
Police say attacker who killed 2 people and injured 2 at a British synagogue has been killed

AP Audio Stories

Play Episode Listen Later Oct 2, 2025 0:21


AP correspondent Karen Chammas reports on a deadly vehicle and stabbing attack outside a synagogue in Manchester, England.

The Vermont Conversation with David Goodman
Cynthia Miller-Idriss on 'the common thread' of misogyny and violent extremism

The Vermont Conversation with David Goodman

Play Episode Listen Later Oct 2, 2025 42:21


The assassination of conservative activist Charlie Kirk is the latest in a growing list of incidents of political violence. There have been 150 politically motivated attacks just this year, and a 2000% increase in targeted violent plots over the past two decades.What explains this surge in political violence?Extremism expert Cynthia Miller-Idriss confirms that this is “the worst moment of political violence since the 1970s,” adding, "We are in an era of mass shootings." She argues that rising polarization and “the common thread" of misogyny links many recent attacks. Miller-Idriss is the founding director of the Polarization and Extremism Research Innovation Lab at American University, where she is also a professor in the School of Public Affairs and the School of Education. Her latest book is “Man Up: The New Misogyny and the Rise of Violent Extremism.” She is an MSNBC columnist and regular commentator who appears frequently on CNN, PBS and other news outlets.President Donald Trump has vowed to mount a government assault on “the left” in response to Kirk's assassination. But a recent study by the Center for Strategic and International Studies shows that despite a small uptick in “left-wing” violence this year, ”right-wing” terrorism has far exceeded all other forms of political violence in the number of fatalities and attacks in the past decade.Miller-Idriss contends that most mass shooters, terrorists and violent extremists have two things in common: Nearly all are men, and they are almost always “virulent misogynists, homophobes or transphobes.” She says that the media — herself included — have long overlooked this link between political violence and misogyny.The U.S. now averages more than one mass shooting per day. “Virtually every mass shooter in the U.S. has a history of gender-based violence in some way,” with 60% of them having documented histories of domestic violence or “stalking, harassment, rape threats, cyber porn, revenge porn, sexual assault, rape, anti-LGBTQ violence,” Miller-Idriss said. “Even when the targets are not very clearly women or the LGBTQ community … gender or homophobia really significantly play a role.”Miller-Idriss highlighted two factors that make this era of political violence unique — the proliferation of guns and online communities that traffic in hate.“We have a lot of shootings that don't seem to have any ideological motivation at all but are really at the hands of extraordinarily online young people … who spend a lot of time in online spaces, in gaming spaces, in very meme-driven, irony laden spaces,” she said. Attackers “are kind of communicating, almost in a way that may be detached from reality, with online communities as part of the attack.” Shooters are “not just highly online but expressing a lot of online misogyny and gender-based harms or harassing teenage girls online,” she said.Miller-Idriss said that even “everyday forms of misogyny” that she and other women face are linked to more extreme forms. She said she observed that in the hate mail that she receives that there was “a very clear pattern of containment, that what they wanted was for me to not be front and center.”“There's some sort of anger there about a person, a woman, being in a public space at all, and it makes you realize that phrases like ‘lock her up,' ‘send them back,' ‘get back in the closet,' ‘get back in the kitchen' (are) containment metaphors (that) are very, very common in everyday life directed toward women or LGBTQ folks who are seen as being too public or too flamboyant or too out,” she said.Everyday misogyny “can evolve into a trajectory in which some young men are conditioned through online influencers to believe that they have lost their rightful place, that women belong in a more submissive role,” Miller-Idriss said.“Some men are so easily mobilized to anger if they're denied what they think they're entitled to (and) that might escalate eventually into rage in a more public way,” she said.Miller-Idriss and her colleagues at the Polarization and Extremism Research Innovation Lab work with young people to “off-ramp” violent online hate. “If you start to recognize that part of the problem of mass shootings and mass violence is rooted in very everyday harms, then you can take action on those everyday harms,” she said. “It should be an empowering message to say, ‘Let's have a conversation about what this looks like, and let's have a conversation about the experience of boys compared to girls.'”

The World Tonight
Manchester police name synagogue attacker as two confirmed dead

The World Tonight

Play Episode Listen Later Oct 2, 2025 47:40


Manchester police have named the man they say attacked a synagogue in the city as 35-year-old Jihad Al-Shamie, a British citizen of Syrian descent. The car ramming and stabbing attack left two Jewish men dead. We hear some of the shock and fear in Europe's biggest Jewish neighbourhood and ask if counter-terrorism legislation is up to date.Also on the programme:A former chief of staff for Conservative Prime Minister Theresa May says the pledge by new leader Kemi Badenoch to scrap the 2008 Climate Change Act if she gets into office is "bad policy and bad politics".And 75 years since the first edition of Peanuts, with its lovable main character Charlie Brown, we speak to artist and fan Andy Holden.

WhatCulture Wrestling
WWE NXT Review - CHAOS Ahead Of NXT Showdown! Mustafa Ali RETURNS To NXT! Mystery Attacker REVEALED! The Showdown Summit?!

WhatCulture Wrestling

Play Episode Listen Later Oct 1, 2025 89:42


The Dadley Boyz review last night's episode of NXT and discuss...CHAOS ahead of NXT Showdown!Mustafa Ali RETURNS to NXT!Mystery attacker REVEALED!Je'Von Evans & Leon Slater team up!The Showdown Summit?!ENJOY!Follow us on Twitter:@AdamWilbourn@MichaelHamflett@MSidgwick@WhatCultureWWEFor more awesome content, check out: whatculture.com/wwe Hosted on Acast. See acast.com/privacy for more information.

Kevin Kietzman Has Issues
Who Will Notice Shutdown?, Frank White is Out, KS Schools Embarrass, T-Mobile Attacker Charged, Chiefs Have Top CB, Sporting KC's Bold Move, Tom Watson Takes a Stand, Record Setting Bridge

Kevin Kietzman Has Issues

Play Episode Listen Later Oct 1, 2025 54:21


   I can think of a thousand things that if they were shutdown today I would notice.  The federal government isn't one of them.   So here we go, will this be another shutdown about nothing that we all forget about or will President Trump make this a shutdown to remember?    Frank White is out as Jackson County Executive... wait until you hear how badly he got smoked at the polls.  Now, who's next and what does it mean for the Royals and Chiefs.  At the same time, a lawsuit in Missouri is likely headed to the state's Supreme Court to keep the Royals and Chiefs from using tax revenue to build.    Kansas schools are becoming the embarrassment of the land as a young, portly principal with blue hair at an Olathe grade school takes a liberal stand.  And a sex ed teacher in Derby is arrested for child endangerment.  Why is this happening in Kansas so often and not Missouri?    The teenager that attacked the usher at T-Mobile Center ten days ago has been charged on two counts of assault but his real punishment may be coming from his school.    The Chiefs have the top cornerback in the league through four games and it's not Trent McDuffie.  Sporting KC makes a big, bold hire to run soccer operations.  Tom Watson has some very strong opinions about the fans at the Ryder Cup while Paul Azinger has strong words for Rory McIlroy.    And our Final Final is a new bridge that is the highest and longest in the world.

The Tech Trek
How Attackers Are Using AI to Outpace Defenses

The Tech Trek

Play Episode Listen Later Oct 1, 2025 27:42


Jonathan DiVincenzo, co-founder and CEO of Impart Security, joins the show to unpack one of the fastest growing risks in tech today: how AI is reshaping the attack surface. From prompt injections to invisible character exploits hidden inside emojis, JD explains why security leaders can't afford to treat AI as “just another tool.” If you're an engineering or security leader navigating AI adoption, this conversation breaks down what's hype, what's real, and where the biggest blind spots lie.Key Takeaways• Attackers are now using LLMs to outpace traditional defenses, turning old threats like SQL injection into live problems again• The attack surface is “iterating,” with new vectors like emoji-based smuggling exposing unseen vulnerabilities• Frameworks have not caught up. While OWASP has listed LLM threats, practical solutions are still undefined• The biggest divide in AI coding is between senior engineers who can validate outputs and junior developers who may lack that context• Security tools must evolve quickly, but rollout cannot create performance hits or damage business systemsTimestamped Highlights01:44 Why runtime security has always mattered and why APIs were not enough04:00 How attackers use LLMs to regenerate and adapt attacks in real time06:59 Proof of concept vs. security and why both must be treated as first priorities09:14 The rise of “emoji smuggling” and why hidden characters create a Trojan horse effect13:24 Iterating attack surfaces and why patches are no longer enough in the AI era20:29 Is AI really writing production code and what risks does that createA thought worth holding onto“AI is great, but the bad actors can use AI too, and they are.”Call to ActionIf this episode gave you new perspective on AI security, share it with a colleague who needs to hear it. Follow the show for more conversations with the leaders shaping the future of tech.

The Neatcast
Episode 189 (Ft. Mark) - THRILLternships, Non-Human Attackers, and The Beast of Brusco

The Neatcast

Play Episode Listen Later Sep 29, 2025 108:14


Click Here to Text us. Yes really, you totally can.Click Here to Text us. Yes really, you totally can.Guess WhatGet yourself a THRILLTERNSHIPThe Toy Hall of Fame's list, made by a 300 year old manEven WeirderIt landed in my truck, it's not human!Aliens are driving around in gigantic English letters again...New BUGA SPHERE news!Beyond The PaleThe Beast of Brusco! A turtle that could do nothing but take Massive W's when put head to head against a angry landowner...WhatchaAre these Baseball player names real or made up?? This game is harder than you think, because they're baseball players so they all have names that sound like lewd limericks. Check Out Our Website!Join our Discord!Check out our Merch Store HERE!Follow us @theneatcast on TikTok!Follow us @neatcastpod on BlueskyFollow us @neatcastpod on Twitter!Follow us @neatcastpod on Instagram!Follow us @theneatcast on Facebook!

Cyber Briefing
September 29, 2025 - Cyber Briefing

Cyber Briefing

Play Episode Listen Later Sep 29, 2025 9:34


If you like what you hear, please subscribe, leave us a review and tell a friend!Attackers exploited Cisco firewall zero-days, Medusa and Akira ransomware hit Comcast and SonicWall VPNs, and Ohio's Union County suffered a ransomware attack affecting 45,000 people. Meanwhile, Dutch teens spied for pro-Russian hackers, US investors plan to take over TikTok operations, and a vital cyber data-sharing law may expire amid a government shutdown, while a South Korean data center fire took 600+ government websites offline.

Canary Cry News Talk
ANTI-ICE SHOOTING! Left-Wing Terrorism on the RISE, Trump Attacker Spills Blood in Court | CCNT 879

Canary Cry News Talk

Play Episode Listen Later Sep 25, 2025 136:43


ANTI-ICE SHOOTINGS - 09.24.2025 - #879 Take the Survey: https://tiny.cc/cc879 BestPodcastintheMetaverse.com Canary Cry News Talk #879 - 09.24.2025 - Recorded Live to 1s and 0s Deconstructing World Events from a Biblical Worldview Declaring Jesus as Lord amidst the Fifth Generation War! CageRattlerCoffee.com SD/TC email Ike for discount https://CanaryCry.Support   Send address and shirt size updates to canarycrysupplydrop@gmail.com   4TH ANNIVERSARY OF SENJESS AND COOLRUNNINGSMON!    Join the Canary Cry Roundtable This Episode was Produced By:   SIR KULLEN ANDERSON HOBO OF THE AMERICA'S   Executive Producers Sir LX Protocol V2 Baron of the Berrean Protocol*** Felicia D***   Producers of TREASURE (CanaryCry.Support) Malik, American Hobo   Producers of TIME Timestampers: Jade Bouncerson, Morgan E Clankoniphius Links: JAM   SHOW NOTES Greg on X even knew yesterday was the Rapture (X)   PROPAGANDA/IMMIGRANTS BREAKING: 2 dead, 1 shot at ICE facility in Texas (Guardian) Kash Patel Releases Photo of Anti-Ice “clip”  MSNBC GENIUS on Anti-ICE shooter (X/MSNBC)   → Clip: DHS uses Pokemon theme, gotta catch em all, deportation (X) → Clip: DHS uses Theo Von banger deportation video (X) → Post: Theo Von expresses frustration, DHS complies and takes down video (X)    → Trump and Epstein best friends statues, taken down (NY Post/X) → Trump Bitcoin statue    TRUMP/ASSASSANATION  Routh tries to stab himself in the neck after verdict    PROPAGANDA Left-Wing Terrorism Is on the Rise (Atlantic)   SPACE Nasa plans first manned moon mission in February 2026 (BBC)   EXECUTIVE PRODUCERS TALENT/TIME END

Black Hills Information Security
Kerberoasting Goes to Washington – 2025-09-15

Black Hills Information Security

Play Episode Listen Later Sep 20, 2025 62:58


???? Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com 00:00 - PreShow Banter™ — Enter Dark John03:15 - Kerberoasting Goes to Washington – BHIS - Talkin' Bout [infosec] News 2025-09-1503:49 - Story # 1: Senator blasts Microsoft for making default Windows vulnerable to “Kerberoasting”12:46 - Story # 2: How an Attacker's Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations32:42 - Story # 3: Some JLR suppliers ‘face bankruptcy' due to hack crisis41:30 - Story # 4: AI-Powered Villager Pen Testing Tool Hits 11,000 PyPI Downloads Amid Abuse Concerns46:07 - Story # 5: All your vulns are belong to us! CISA wants to maintain gov control of CVE program49:55 - Story # 6: Qantas penalizes executives for July cyberattack51:15 - Story # 7: America's second largest egg producer breached, claim hackers54:55 - Story # 8: Undocumented Radios Found in Solar-Powered Devices

Paul's Security Weekly
Safes, Hackers, and Web Servers - PSW #892

Paul's Security Weekly

Play Episode Listen Later Sep 18, 2025 132:25


This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on disposable vapes NPM worms and token stealing Attackers make mistakes too AI podcasts Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-892

The Howie Carr Radio Network
Aaron Chadbourne: What Was The Charlotte Attacker Doing On The Street | 9.9.25 - The Grace Curley Show Hour 1

The Howie Carr Radio Network

Play Episode Listen Later Sep 9, 2025 38:57


Justin Filler joins the show to discuss the Charlotte murder, and how was the attacker even on the streets?  Visit the Howie Carr Radio Network website to access columns, podcasts, and other exclusive content.

rSlash
r/Nuclearrevenge He Killed His Sister's Attacker

rSlash

Play Episode Listen Later Sep 8, 2025 21:12


0:00 Intro 0:07 Unaliving 6:33 Army revenge 15:10 Credit card Learn more about your ad choices. Visit megaphone.fm/adchoices