Podcasts about Attackers

  • 1,390PODCASTS
  • 2,587EPISODES
  • 38mAVG DURATION
  • 1DAILY NEW EPISODE
  • Oct 10, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Attackers

Show all podcasts related to attackers

Latest podcast episodes about Attackers

Hacker Valley Studio
How AI Elevates Cyber Hygiene with Jason Rebholz

Hacker Valley Studio

Play Episode Listen Later Oct 10, 2025 21:32


What if protecting your digital twin becomes the new cyber hygiene? In this week's episode, Ron welcomes back cybersecurity leader Jason Rebholz, CEO of Evoke, to discuss how AI is reshaping the fundamentals of cyber hygiene. From data breaches and deepfakes to everyday habits that protect our digital lives, Jason shares how small actions and smarter use of AI can make all the difference. Together, they uncover how our growing digital footprints are giving rise to digital twins, AI replicas that can mirror our behaviors, voices, and even decisions, and what that means for the future of trust, identity, and security. Impactful Moments: 00:00 - Introduction 01:00 - The Neon app data leak story 03:00 - Why our voices are the new passwords 05:00 - How AI can strengthen cyber hygiene 07:00 - Jason's mission to secure AI systems 09:00 - AI as a force multiplier for defenders 11:00 - Deepfakes and the new social engineering playbook 13:00 - Attackers' use of AI and what it means for us 15:00 - The rise of digital twins and identity threats 19:00 - How to defend against “yourself” online 20:00 - Final reflection: Trust in the AI age   Links: Connect with Jason on LinkedIn: https://www.linkedin.com/in/jrebholz/ Check out the TechCrunch article on the Neon app data leak story: https://techcrunch.com/2025/09/25/viral-call-recording-app-neon-goes-dark-after-exposing-users-phone-numbers-call-recordings-and-transcripts/   Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/  

98FM's Dublin Talks
*Trigger Warning* Siobhan Reveals Horror Of Bumping Into Her Sex Attacker On Night Out

98FM's Dublin Talks

Play Episode Listen Later Oct 10, 2025 41:55


Warning - This episode contains material that may be triggering. This is one of the most harrowing interviews we've ever done on the podcast. A brave listener, Siobhan, contacted us to talk about how her sex attacker is still walking the streets and even approached her on a night out to intimidate her even more

The Tech Blog Writer Podcast
3447: How DXC Is Using AI to Outsmart Cybercriminals

The Tech Blog Writer Podcast

Play Episode Listen Later Oct 9, 2025 28:36


In this episode, Mike Baker, Vice President and Global CISO at DXC Technology, says the cyber industry has been focusing on the wrong side of AI. He believes too many companies use it only to block threats instead of studying how criminals use it to scale phishing, bypass defenses, and deploy adaptive malware. Attackers are learning faster than ever, and security teams must catch up. Mike argues that defenders need to think differently and use AI as both protection and opportunity. He shares how DXC is already doing this. The company has brought autonomous AI agents into its security operations through a partnership with 7AI. These agents process alerts that used to require hours of human effort. The result is faster detection, less burnout, and more time for analysts to investigate real threats. By cutting manual work by more than eighty percent, DXC has shown how AI can make cybersecurity teams stronger, not smaller. Zero Trust remains a core part of DXC's strategy. Mike calls it a journey that never ends. It needs cultural change, constant learning, and leadership that keeps security invisible to end users. AI now plays a role here too, improving identity checks and spotting access issues in real time. Yet, he reminds us, AI still needs people in the loop for oversight and judgment. We also talk about supply chain risks. Too many companies still treat risk assessments as one-time tasks. Mike pushes for continuous monitoring and close collaboration with suppliers. He closes the conversation on a hopeful note. AI will not replace people in cybersecurity, he says. It will make their work more meaningful and more effective if used with care and common sense.

The Dana Show with Dana Loesch
Absurd Truth: Kavanaugh's Trans Attacker Got Off EASY

The Dana Show with Dana Loesch

Play Episode Listen Later Oct 6, 2025 24:11 Transcription Available


The Transgender man who planned to assassinate Brett Kavanaugh will serve just 8 years. Steak ‘n Shake announces it is installing "the tallest and biggest American flag that local governments will allow" at every restaurant across the country. Disney CEO Bob Iger reinstated Jimmy Kimmel after the cancellation threatened a glitzy party he and his wife were hosting.Thank you for supporting our sponsors that make The Dana Show possible…Noble Gold https://NobleGoldInvestments.com/DanaOpen a new qualified IRA or cash account with Noble Gold and get a free 10-ounce Silver Flag Bar plus a Silver American Eagle Proof Coin.Webroothttps://Webroot.com/danaChange your October from cyber-scary to cyber-secure with 60% off Webroot Total Protection.AmmoSquaredhttps://AmmoSquared.comDon't get caught without ammo and be sure to tell them you heard about Ammo Squared on this show. HumanNhttps://HumanN.comStart supporting your cardiovascular health with SuperBeets now available at your local Walmart. ChapterFor free and unbiased Medicare help from my partners Chapter, dial #250 and say keyword “My Medicare”Chapter and its affiliates are not connected with or endorsed by any government entity or the federal Medicare program. Chapter Advisory, LLC represents Medicare Advantage HMO, PPO, and PFFS organizations and stand-alone prescription drug plans that have a Medicare contract. Enrollment depends on the plan's contract renewal. While we have a database of every Medicare plan nationwide and can help you search among all plans, we have contracts with many but not all plans. As a result, we do not offer every plan available in your area. Currently, we represent 50 organizations which offer 18,160 products nationwide. We search and recommend all plans, even those we don't directly offer. You can contact a licensed Chapter agent to find out the number of products available in your specific area. Please contact Medicare.gov, 1-800-Medicare, or your local State Health Insurance Program (SHIP) to get information on all of your options.PreBornhttps://PreBorn.com/DANA Or DIAL #250 Say the keyword BABY. That's #250, BABY. Together, we can save lives — one mom and one baby at a time.Keltechttps://KelTecWeapons.comKelTec builds every KS7 GEN2 right here in the USA with American materials and workers—upgrade your home defense today. All Family Pharmacyhttps://AllFamilyPharmacy.com/Dana Don't wait until flu season knocks at your door. Use code DANA10 at checkout to save 10%. Relief Factorhttps://ReliefFactor.com OR CALL 1-800-4-RELIEFTurn the clock back on pain with Relief Factor. Get their 3-week Relief Factor Quick Start for only $19.95 today! Byrnahttps://Byrna.com/danaGet your hands on the new compact Byrna CL. Visit Byrna.com/Dana to receive 10% off Patriot Mobilehttps://PatriotMobile.com/DanaDana's personal cell phone provider is Patriot Mobile. Get a FREE MONTH of service code DANA

Bear Attack
S7E9: K-Pop Bear Wranglers

Bear Attack

Play Episode Listen Later Oct 6, 2025 100:17


Happy spooky season Attackers! Normally this time of year we do a halloween themed episode, however this year we decided to be a little more broad and talk about Korean demons and crap related to that.On this episode we discuss Korean Grim Reaper hats, have a wild time with asian rock music and review Netflix's K-Pop Demon Hunters.Please share our show with your friends and hit us up on socials with ideas and stuff.

Global News Podcast
Manchester synagogue attacker named

Global News Podcast

Play Episode Listen Later Oct 3, 2025 29:35


Police have named the man who killed two people at a synagogue in Manchester. Jihad Al-Shamie, a 35-year-old British man of Syrian descent, was shot and killed by officers outside the Heaton Park Hebrew Congregation Synagogue. Also, Donald Trump has declared the US is now in an armed conflict with drug smugglers in the Caribbean Sea. A man alleged to be a high-up figure in the Tren de Aragua gang has been arrested in Colombia. A former Israeli hostage who was held in captivity in Gaza for 16 months has called on Hamas to sign President Trump's peace plan. The disgraced rapper, Sean Diddy Combs, is set to be sentenced on prostitution charges. Luxembourg's Grand Duke Henri is formally abdicating his throne. There is a rogue planet gobbling up gas and dust at an unprecedented rate. Open AI's Sora app raises yet more concerns about artificial intelligence and copyright.The Global News Podcast brings you the breaking news you need to hear, as it happens. Listen for the latest headlines and current affairs from around the world. Politics, economics, climate, business, technology, health – we cover it all with expert analysis and insight. Get the news that matters, delivered twice a day on weekdays and daily at weekends, plus special bonus episodes reacting to urgent breaking stories. Follow or subscribe now and never miss a moment. Get in touch: globalpodcast@bbc.co.uk

Rebel News +
EZRA LEVANT | Rebel News caught suspected Antifa church attacker (INSIDE the Defence department?!)

Rebel News +

Play Episode Listen Later Oct 2, 2025 29:34


The Rebel News podcasts features free audio-only versions of select RebelNews+ content and other Rebel News long-form videos, livestreams, and interviews. Monday to Friday enjoy the audio version of Ezra Levant's daily TV-style show, The Ezra Levant Show, where Ezra gives you his contrarian and conservative take on free speech, politics, and foreign policy through in-depth commentary and interviews. Wednesday evenings you can listen to the audio version of The Gunn Show with Sheila Gunn Reid the Chief Reporter of Rebel News. Sheila brings a western sensibility to Canadian news. With one foot in the oil patch and one foot in agriculture, Sheila challenges mainstream media narratives and stands up for Albertans. If you want to watch the video versions of these podcasts, make sure to begin your free RebelNewsPlus trial by subscribing at http://www.RebelNewsPlus.com

New England Soccer Weekly w/ Tom Quinlan
RIFC Manager Khano Smith, Midfielder Zach Herivaux, Attacker JJ Williams

New England Soccer Weekly w/ Tom Quinlan

Play Episode Listen Later Oct 2, 2025 17:38


Tom catches up with Coach Khano, Midfielder Zachary Herivaux and Forward JJ Williams this week. The guys talk about the teams form heading into the final four matches, how the attack has improved and the growth of RIFC in the community after year 1 at Centerville Bank Stadium.See omnystudio.com/listener for privacy information.

AWS for Software Companies Podcast
Ep153: From Minutes to Seconds: How AI-Native Cybersecurity is Winning the Speed War Against Attackers

AWS for Software Companies Podcast

Play Episode Listen Later Oct 2, 2025 21:52


John Skinner of Vectra AI shares how cyber attackers are democratizing sophisticated attacks using dark web tools, and why AI-powered hybrid defense is now essential for enterprise security.Topics Include:Vectra AI: 13-year-old cybersecurity company founded as "AI native" from day oneBuilt on machine learning assumption while competitors treated AI as afterthoughtGenerative AI represents the latest evolution in their comprehensive AI journeyStarted pairing threat researchers with ML developers to codify attack behaviorsAdded agentic AI in 2018 for correlation across space and timeUses AWS Security Lake, GuardDuty, and recently became AWS Bedrock customerSuccess measured by reducing "dwell time" from initial attack to detectionAchieved 60% faster alerts, 51% faster monitoring, 50% faster investigation timesCustomers should evaluate vendor's data science quality and algorithm training yearsEvolved hybrid defense approach as attacks start anywhere, go everywhereAI handles high-volume correlation while humans focus on analytical decisionsFuture challenge: democratized cyber attacks using readily available dark web toolsParticipants:John Skinner – Vice President Corporate/Business Development, Vectra AIFurther Links:Vectra AI: Website – LinkedIn – AWS Marketplace - YouTubeSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon.com/isv/

AP Audio Stories
Police say attacker who killed 2 people and injured 2 at a British synagogue has been killed

AP Audio Stories

Play Episode Listen Later Oct 2, 2025 0:21


AP correspondent Karen Chammas reports on a deadly vehicle and stabbing attack outside a synagogue in Manchester, England.

The Vermont Conversation with David Goodman
Cynthia Miller-Idriss on 'the common thread' of misogyny and violent extremism

The Vermont Conversation with David Goodman

Play Episode Listen Later Oct 2, 2025 42:21


The assassination of conservative activist Charlie Kirk is the latest in a growing list of incidents of political violence. There have been 150 politically motivated attacks just this year, and a 2000% increase in targeted violent plots over the past two decades.What explains this surge in political violence?Extremism expert Cynthia Miller-Idriss confirms that this is “the worst moment of political violence since the 1970s,” adding, "We are in an era of mass shootings." She argues that rising polarization and “the common thread" of misogyny links many recent attacks. Miller-Idriss is the founding director of the Polarization and Extremism Research Innovation Lab at American University, where she is also a professor in the School of Public Affairs and the School of Education. Her latest book is “Man Up: The New Misogyny and the Rise of Violent Extremism.” She is an MSNBC columnist and regular commentator who appears frequently on CNN, PBS and other news outlets.President Donald Trump has vowed to mount a government assault on “the left” in response to Kirk's assassination. But a recent study by the Center for Strategic and International Studies shows that despite a small uptick in “left-wing” violence this year, ”right-wing” terrorism has far exceeded all other forms of political violence in the number of fatalities and attacks in the past decade.Miller-Idriss contends that most mass shooters, terrorists and violent extremists have two things in common: Nearly all are men, and they are almost always “virulent misogynists, homophobes or transphobes.” She says that the media — herself included — have long overlooked this link between political violence and misogyny.The U.S. now averages more than one mass shooting per day. “Virtually every mass shooter in the U.S. has a history of gender-based violence in some way,” with 60% of them having documented histories of domestic violence or “stalking, harassment, rape threats, cyber porn, revenge porn, sexual assault, rape, anti-LGBTQ violence,” Miller-Idriss said. “Even when the targets are not very clearly women or the LGBTQ community … gender or homophobia really significantly play a role.”Miller-Idriss highlighted two factors that make this era of political violence unique — the proliferation of guns and online communities that traffic in hate.“We have a lot of shootings that don't seem to have any ideological motivation at all but are really at the hands of extraordinarily online young people … who spend a lot of time in online spaces, in gaming spaces, in very meme-driven, irony laden spaces,” she said. Attackers “are kind of communicating, almost in a way that may be detached from reality, with online communities as part of the attack.” Shooters are “not just highly online but expressing a lot of online misogyny and gender-based harms or harassing teenage girls online,” she said.Miller-Idriss said that even “everyday forms of misogyny” that she and other women face are linked to more extreme forms. She said she observed that in the hate mail that she receives that there was “a very clear pattern of containment, that what they wanted was for me to not be front and center.”“There's some sort of anger there about a person, a woman, being in a public space at all, and it makes you realize that phrases like ‘lock her up,' ‘send them back,' ‘get back in the closet,' ‘get back in the kitchen' (are) containment metaphors (that) are very, very common in everyday life directed toward women or LGBTQ folks who are seen as being too public or too flamboyant or too out,” she said.Everyday misogyny “can evolve into a trajectory in which some young men are conditioned through online influencers to believe that they have lost their rightful place, that women belong in a more submissive role,” Miller-Idriss said.“Some men are so easily mobilized to anger if they're denied what they think they're entitled to (and) that might escalate eventually into rage in a more public way,” she said.Miller-Idriss and her colleagues at the Polarization and Extremism Research Innovation Lab work with young people to “off-ramp” violent online hate. “If you start to recognize that part of the problem of mass shootings and mass violence is rooted in very everyday harms, then you can take action on those everyday harms,” she said. “It should be an empowering message to say, ‘Let's have a conversation about what this looks like, and let's have a conversation about the experience of boys compared to girls.'”

The World Tonight
Manchester police name synagogue attacker as two confirmed dead

The World Tonight

Play Episode Listen Later Oct 2, 2025 47:40


Manchester police have named the man they say attacked a synagogue in the city as 35-year-old Jihad Al-Shamie, a British citizen of Syrian descent. The car ramming and stabbing attack left two Jewish men dead. We hear some of the shock and fear in Europe's biggest Jewish neighbourhood and ask if counter-terrorism legislation is up to date.Also on the programme:A former chief of staff for Conservative Prime Minister Theresa May says the pledge by new leader Kemi Badenoch to scrap the 2008 Climate Change Act if she gets into office is "bad policy and bad politics".And 75 years since the first edition of Peanuts, with its lovable main character Charlie Brown, we speak to artist and fan Andy Holden.

WhatCulture Wrestling
WWE NXT Review - CHAOS Ahead Of NXT Showdown! Mustafa Ali RETURNS To NXT! Mystery Attacker REVEALED! The Showdown Summit?!

WhatCulture Wrestling

Play Episode Listen Later Oct 1, 2025 89:42


The Dadley Boyz review last night's episode of NXT and discuss...CHAOS ahead of NXT Showdown!Mustafa Ali RETURNS to NXT!Mystery attacker REVEALED!Je'Von Evans & Leon Slater team up!The Showdown Summit?!ENJOY!Follow us on Twitter:@AdamWilbourn@MichaelHamflett@MSidgwick@WhatCultureWWEFor more awesome content, check out: whatculture.com/wwe Hosted on Acast. See acast.com/privacy for more information.

Kevin Kietzman Has Issues
Who Will Notice Shutdown?, Frank White is Out, KS Schools Embarrass, T-Mobile Attacker Charged, Chiefs Have Top CB, Sporting KC's Bold Move, Tom Watson Takes a Stand, Record Setting Bridge

Kevin Kietzman Has Issues

Play Episode Listen Later Oct 1, 2025 54:21


   I can think of a thousand things that if they were shutdown today I would notice.  The federal government isn't one of them.   So here we go, will this be another shutdown about nothing that we all forget about or will President Trump make this a shutdown to remember?    Frank White is out as Jackson County Executive... wait until you hear how badly he got smoked at the polls.  Now, who's next and what does it mean for the Royals and Chiefs.  At the same time, a lawsuit in Missouri is likely headed to the state's Supreme Court to keep the Royals and Chiefs from using tax revenue to build.    Kansas schools are becoming the embarrassment of the land as a young, portly principal with blue hair at an Olathe grade school takes a liberal stand.  And a sex ed teacher in Derby is arrested for child endangerment.  Why is this happening in Kansas so often and not Missouri?    The teenager that attacked the usher at T-Mobile Center ten days ago has been charged on two counts of assault but his real punishment may be coming from his school.    The Chiefs have the top cornerback in the league through four games and it's not Trent McDuffie.  Sporting KC makes a big, bold hire to run soccer operations.  Tom Watson has some very strong opinions about the fans at the Ryder Cup while Paul Azinger has strong words for Rory McIlroy.    And our Final Final is a new bridge that is the highest and longest in the world.

The Tech Trek
How Attackers Are Using AI to Outpace Defenses

The Tech Trek

Play Episode Listen Later Oct 1, 2025 27:42


Jonathan DiVincenzo, co-founder and CEO of Impart Security, joins the show to unpack one of the fastest growing risks in tech today: how AI is reshaping the attack surface. From prompt injections to invisible character exploits hidden inside emojis, JD explains why security leaders can't afford to treat AI as “just another tool.” If you're an engineering or security leader navigating AI adoption, this conversation breaks down what's hype, what's real, and where the biggest blind spots lie.Key Takeaways• Attackers are now using LLMs to outpace traditional defenses, turning old threats like SQL injection into live problems again• The attack surface is “iterating,” with new vectors like emoji-based smuggling exposing unseen vulnerabilities• Frameworks have not caught up. While OWASP has listed LLM threats, practical solutions are still undefined• The biggest divide in AI coding is between senior engineers who can validate outputs and junior developers who may lack that context• Security tools must evolve quickly, but rollout cannot create performance hits or damage business systemsTimestamped Highlights01:44 Why runtime security has always mattered and why APIs were not enough04:00 How attackers use LLMs to regenerate and adapt attacks in real time06:59 Proof of concept vs. security and why both must be treated as first priorities09:14 The rise of “emoji smuggling” and why hidden characters create a Trojan horse effect13:24 Iterating attack surfaces and why patches are no longer enough in the AI era20:29 Is AI really writing production code and what risks does that createA thought worth holding onto“AI is great, but the bad actors can use AI too, and they are.”Call to ActionIf this episode gave you new perspective on AI security, share it with a colleague who needs to hear it. Follow the show for more conversations with the leaders shaping the future of tech.

The Neatcast
Episode 189 (Ft. Mark) - THRILLternships, Non-Human Attackers, and The Beast of Brusco

The Neatcast

Play Episode Listen Later Sep 29, 2025 108:14


Click Here to Text us. Yes really, you totally can.Click Here to Text us. Yes really, you totally can.Guess WhatGet yourself a THRILLTERNSHIPThe Toy Hall of Fame's list, made by a 300 year old manEven WeirderIt landed in my truck, it's not human!Aliens are driving around in gigantic English letters again...New BUGA SPHERE news!Beyond The PaleThe Beast of Brusco! A turtle that could do nothing but take Massive W's when put head to head against a angry landowner...WhatchaAre these Baseball player names real or made up?? This game is harder than you think, because they're baseball players so they all have names that sound like lewd limericks. Check Out Our Website!Join our Discord!Check out our Merch Store HERE!Follow us @theneatcast on TikTok!Follow us @neatcastpod on BlueskyFollow us @neatcastpod on Twitter!Follow us @neatcastpod on Instagram!Follow us @theneatcast on Facebook!

Cyber Briefing
September 29, 2025 - Cyber Briefing

Cyber Briefing

Play Episode Listen Later Sep 29, 2025 9:34


If you like what you hear, please subscribe, leave us a review and tell a friend!Attackers exploited Cisco firewall zero-days, Medusa and Akira ransomware hit Comcast and SonicWall VPNs, and Ohio's Union County suffered a ransomware attack affecting 45,000 people. Meanwhile, Dutch teens spied for pro-Russian hackers, US investors plan to take over TikTok operations, and a vital cyber data-sharing law may expire amid a government shutdown, while a South Korean data center fire took 600+ government websites offline.

AI + a16z
When Deepfakes Steal $30M: The New Edge of Cybercrime

AI + a16z

Play Episode Listen Later Sep 26, 2025 22:11


AI is transforming both sides of the cybersecurity cat-and-mouse game. Attackers are using LLMs to scale impersonation, phishing, and even deepfake fraud—while defenders are racing to automate detection and takedowns at the same speed.In this episode, a16z partner Joel de la Garza talks with Kevin Tian, cofounder & CEO of Doppel Security (and former Uber engineer), about building in this new landscape. They cover:Why outsider founders sometimes build the most effective security companiesThe “3 V's” framework for today's social engineering attacks: volume, velocity, varietyHow Doppel uses reasoning models and reinforcement fine-tuning to cut false positives and improve precisionSimulation tools like “vibe phishing” to train employees on real attacker tacticsThe shift from manual cyber-intelligence services to AI-driven, software-margin businessesWhy the biggest bottleneck now isn't model cost—but engineering time to deliver the right contextIf you're building security products or exploring how AI can automate tough edge cases, this is a ground-level look at what's working—and what comes next. Check out everything a16z is doing with artificial intelligence here, including articles, projects, and more podcasts. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Canary Cry News Talk
ANTI-ICE SHOOTING! Left-Wing Terrorism on the RISE, Trump Attacker Spills Blood in Court | CCNT 879

Canary Cry News Talk

Play Episode Listen Later Sep 25, 2025 136:43


ANTI-ICE SHOOTINGS - 09.24.2025 - #879 Take the Survey: https://tiny.cc/cc879 BestPodcastintheMetaverse.com Canary Cry News Talk #879 - 09.24.2025 - Recorded Live to 1s and 0s Deconstructing World Events from a Biblical Worldview Declaring Jesus as Lord amidst the Fifth Generation War! CageRattlerCoffee.com SD/TC email Ike for discount https://CanaryCry.Support   Send address and shirt size updates to canarycrysupplydrop@gmail.com   4TH ANNIVERSARY OF SENJESS AND COOLRUNNINGSMON!    Join the Canary Cry Roundtable This Episode was Produced By:   SIR KULLEN ANDERSON HOBO OF THE AMERICA'S   Executive Producers Sir LX Protocol V2 Baron of the Berrean Protocol*** Felicia D***   Producers of TREASURE (CanaryCry.Support) Malik, American Hobo   Producers of TIME Timestampers: Jade Bouncerson, Morgan E Clankoniphius Links: JAM   SHOW NOTES Greg on X even knew yesterday was the Rapture (X)   PROPAGANDA/IMMIGRANTS BREAKING: 2 dead, 1 shot at ICE facility in Texas (Guardian) Kash Patel Releases Photo of Anti-Ice “clip”  MSNBC GENIUS on Anti-ICE shooter (X/MSNBC)   → Clip: DHS uses Pokemon theme, gotta catch em all, deportation (X) → Clip: DHS uses Theo Von banger deportation video (X) → Post: Theo Von expresses frustration, DHS complies and takes down video (X)    → Trump and Epstein best friends statues, taken down (NY Post/X) → Trump Bitcoin statue    TRUMP/ASSASSANATION  Routh tries to stab himself in the neck after verdict    PROPAGANDA Left-Wing Terrorism Is on the Rise (Atlantic)   SPACE Nasa plans first manned moon mission in February 2026 (BBC)   EXECUTIVE PRODUCERS TALENT/TIME END

Dirshu Mishnah Brurah Yomi
MB3 170a: Dealing with Attackers on Shabbos (329:3-9)

Dirshu Mishnah Brurah Yomi

Play Episode Listen Later Sep 25, 2025


SuperHits 103.7 COSY-FM
Serial Attacker SQUIRREL! Daily BuZz!!

SuperHits 103.7 COSY-FM

Play Episode Listen Later Sep 25, 2025 4:51


Fat Bear Week. The 'cost' of the 'American Dream' today. And ROAD RAGE. It's contagious! That's what Paul is BuZzin' about today on the Daily BuZz!!See omnystudio.com/listener for privacy information.

Black Hills Information Security
Kerberoasting Goes to Washington – 2025-09-15

Black Hills Information Security

Play Episode Listen Later Sep 20, 2025 62:58


???? Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com 00:00 - PreShow Banter™ — Enter Dark John03:15 - Kerberoasting Goes to Washington – BHIS - Talkin' Bout [infosec] News 2025-09-1503:49 - Story # 1: Senator blasts Microsoft for making default Windows vulnerable to “Kerberoasting”12:46 - Story # 2: How an Attacker's Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations32:42 - Story # 3: Some JLR suppliers ‘face bankruptcy' due to hack crisis41:30 - Story # 4: AI-Powered Villager Pen Testing Tool Hits 11,000 PyPI Downloads Amid Abuse Concerns46:07 - Story # 5: All your vulns are belong to us! CISA wants to maintain gov control of CVE program49:55 - Story # 6: Qantas penalizes executives for July cyberattack51:15 - Story # 7: America's second largest egg producer breached, claim hackers54:55 - Story # 8: Undocumented Radios Found in Solar-Powered Devices

Paul's Security Weekly
Safes, Hackers, and Web Servers - PSW #892

Paul's Security Weekly

Play Episode Listen Later Sep 18, 2025 132:25


This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on disposable vapes NPM worms and token stealing Attackers make mistakes too AI podcasts Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-892

Paul's Security Weekly TV
Safes, Hackers, and Web Servers - PSW #892

Paul's Security Weekly TV

Play Episode Listen Later Sep 18, 2025 132:25


This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on disposable vapes NPM worms and token stealing Attackers make mistakes too AI podcasts Show Notes: https://securityweekly.com/psw-892

Paul's Security Weekly (Podcast-Only)
Safes, Hackers, and Web Servers - PSW #892

Paul's Security Weekly (Podcast-Only)

Play Episode Listen Later Sep 18, 2025 132:25


This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on disposable vapes NPM worms and token stealing Attackers make mistakes too AI podcasts Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-892

Paul's Security Weekly (Video-Only)
Safes, Hackers, and Web Servers - PSW #892

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Sep 18, 2025 132:25


This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on disposable vapes NPM worms and token stealing Attackers make mistakes too AI podcasts Show Notes: https://securityweekly.com/psw-892

Paul's Security Weekly
Board Priority But Lack of Access & CISO Pressure, 360 Privacy and Pentera Interviews - Chuck Randolph, Tom Pore - BSW #413

Paul's Security Weekly

Play Episode Listen Later Sep 17, 2025 70:10


In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more! Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a gripping conversation about the evolution of executive protection in the digital age. With over 30 years of experience, Chuck shares how targeted violence has shifted from physical threats to online ideation—and why it now starts with a click. From PII abuse to unregulated data brokers, generative AI manipulation, and real-world convergence of cyber and physical risks—this is a must-watch for CISOs, CSOs, CEOs, and anyone navigating modern threat landscapes. Hear real-world examples, including shocking stories of doxxing, AI-fueled radicalization, and the hidden dangers of digital exhaust. Whether you're in cyber, physical security, or executive leadership, this interview lays out the urgent need for converged risk strategies, narrative control, and a new approach to duty of care in a remote-first world. Learn what every security leader needs to do now to protect key personnel, prevent exploitation, and build a unified, proactive risk posture. This segment is sponsored by 360 Privacy. Learn how to integrate privacy and protective intelligence to get ahead of the next threat vector at https://securityweekly.com/360privacybh! In this exclusive Black Hat 2025 interview, CyberRisk TV host Matt Alderman sits down with Tom Pore, AVP of Sales Engineering at Pentera, to dive into the rapidly evolving world of AI-driven cyberattacks. What's happening? Attackers are already using AI and LLMs to launch thousands of attacks per second—targeting modern web apps, exploiting PII, and bypassing traditional testing methods. Tom explains how automated AI payload generation, context-aware red teaming, and language/system-aware attack modeling are reshaping the security landscape. The twist? Pentera flips the script by empowering security teams to think like an attacker—using continuous, AI-powered penetration testing to uncover hidden risks before threat actors do. This includes finding hardcoded credentials, leveraging leaked identities, and pivoting across systems just like real adversaries. To learn more about Pentera's proactive Ransomware testing please visit: https://securityweekly.com/penterabh Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-413

Reimagining Cyber
NPM Hack, Supply Chain Chaos - Ep 167

Reimagining Cyber

Play Episode Listen Later Sep 17, 2025 11:39


This week on Reimagining Cyber, we unpack one of the biggest supply chain attacks of the year: the NPM hack. Attackers compromised widely used packages like Chalk and Debug—billions of weekly downloads—slipping in code that silently hijacked crypto transactions. Tyler Moffitt joins us to explain how it happened, who's most at risk, and the practical steps every developer and security leader should take right now.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70 Chief Information Security Officer CISO Podcasts rankings.

Paul's Security Weekly TV
Board Priority But Lack of Access & CISO Pressure, 360 Privacy and Pentera Interviews - Chuck Randolph, Tom Pore - BSW #413

Paul's Security Weekly TV

Play Episode Listen Later Sep 17, 2025 70:10


In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more! Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a gripping conversation about the evolution of executive protection in the digital age. With over 30 years of experience, Chuck shares how targeted violence has shifted from physical threats to online ideation—and why it now starts with a click. From PII abuse to unregulated data brokers, generative AI manipulation, and real-world convergence of cyber and physical risks—this is a must-watch for CISOs, CSOs, CEOs, and anyone navigating modern threat landscapes. Hear real-world examples, including shocking stories of doxxing, AI-fueled radicalization, and the hidden dangers of digital exhaust. Whether you're in cyber, physical security, or executive leadership, this interview lays out the urgent need for converged risk strategies, narrative control, and a new approach to duty of care in a remote-first world. Learn what every security leader needs to do now to protect key personnel, prevent exploitation, and build a unified, proactive risk posture. This segment is sponsored by 360 Privacy. Learn how to integrate privacy and protective intelligence to get ahead of the next threat vector at https://securityweekly.com/360privacybh! In this exclusive Black Hat 2025 interview, CyberRisk TV host Matt Alderman sits down with Tom Pore, AVP of Sales Engineering at Pentera, to dive into the rapidly evolving world of AI-driven cyberattacks. What's happening? Attackers are already using AI and LLMs to launch thousands of attacks per second—targeting modern web apps, exploiting PII, and bypassing traditional testing methods. Tom explains how automated AI payload generation, context-aware red teaming, and language/system-aware attack modeling are reshaping the security landscape. The twist? Pentera flips the script by empowering security teams to think like an attacker—using continuous, AI-powered penetration testing to uncover hidden risks before threat actors do. This includes finding hardcoded credentials, leveraging leaked identities, and pivoting across systems just like real adversaries. To learn more about Pentera's proactive Ransomware testing please visit: https://securityweekly.com/penterabh Show Notes: https://securityweekly.com/bsw-413

Business Security Weekly (Audio)
Board Priority But Lack of Access & CISO Pressure, 360 Privacy and Pentera Interviews - Chuck Randolph, Tom Pore - BSW #413

Business Security Weekly (Audio)

Play Episode Listen Later Sep 17, 2025 70:10


In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more! Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a gripping conversation about the evolution of executive protection in the digital age. With over 30 years of experience, Chuck shares how targeted violence has shifted from physical threats to online ideation—and why it now starts with a click. From PII abuse to unregulated data brokers, generative AI manipulation, and real-world convergence of cyber and physical risks—this is a must-watch for CISOs, CSOs, CEOs, and anyone navigating modern threat landscapes. Hear real-world examples, including shocking stories of doxxing, AI-fueled radicalization, and the hidden dangers of digital exhaust. Whether you're in cyber, physical security, or executive leadership, this interview lays out the urgent need for converged risk strategies, narrative control, and a new approach to duty of care in a remote-first world. Learn what every security leader needs to do now to protect key personnel, prevent exploitation, and build a unified, proactive risk posture. This segment is sponsored by 360 Privacy. Learn how to integrate privacy and protective intelligence to get ahead of the next threat vector at https://securityweekly.com/360privacybh! In this exclusive Black Hat 2025 interview, CyberRisk TV host Matt Alderman sits down with Tom Pore, AVP of Sales Engineering at Pentera, to dive into the rapidly evolving world of AI-driven cyberattacks. What's happening? Attackers are already using AI and LLMs to launch thousands of attacks per second—targeting modern web apps, exploiting PII, and bypassing traditional testing methods. Tom explains how automated AI payload generation, context-aware red teaming, and language/system-aware attack modeling are reshaping the security landscape. The twist? Pentera flips the script by empowering security teams to think like an attacker—using continuous, AI-powered penetration testing to uncover hidden risks before threat actors do. This includes finding hardcoded credentials, leveraging leaked identities, and pivoting across systems just like real adversaries. To learn more about Pentera's proactive Ransomware testing please visit: https://securityweekly.com/penterabh Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-413

Business Security Weekly (Video)
Board Priority But Lack of Access & CISO Pressure, 360 Privacy and Pentera Interviews - Chuck Randolph, Tom Pore - BSW #413

Business Security Weekly (Video)

Play Episode Listen Later Sep 17, 2025 70:10


In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more! Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a gripping conversation about the evolution of executive protection in the digital age. With over 30 years of experience, Chuck shares how targeted violence has shifted from physical threats to online ideation—and why it now starts with a click. From PII abuse to unregulated data brokers, generative AI manipulation, and real-world convergence of cyber and physical risks—this is a must-watch for CISOs, CSOs, CEOs, and anyone navigating modern threat landscapes. Hear real-world examples, including shocking stories of doxxing, AI-fueled radicalization, and the hidden dangers of digital exhaust. Whether you're in cyber, physical security, or executive leadership, this interview lays out the urgent need for converged risk strategies, narrative control, and a new approach to duty of care in a remote-first world. Learn what every security leader needs to do now to protect key personnel, prevent exploitation, and build a unified, proactive risk posture. This segment is sponsored by 360 Privacy. Learn how to integrate privacy and protective intelligence to get ahead of the next threat vector at https://securityweekly.com/360privacybh! In this exclusive Black Hat 2025 interview, CyberRisk TV host Matt Alderman sits down with Tom Pore, AVP of Sales Engineering at Pentera, to dive into the rapidly evolving world of AI-driven cyberattacks. What's happening? Attackers are already using AI and LLMs to launch thousands of attacks per second—targeting modern web apps, exploiting PII, and bypassing traditional testing methods. Tom explains how automated AI payload generation, context-aware red teaming, and language/system-aware attack modeling are reshaping the security landscape. The twist? Pentera flips the script by empowering security teams to think like an attacker—using continuous, AI-powered penetration testing to uncover hidden risks before threat actors do. This includes finding hardcoded credentials, leveraging leaked identities, and pivoting across systems just like real adversaries. To learn more about Pentera's proactive Ransomware testing please visit: https://securityweekly.com/penterabh Show Notes: https://securityweekly.com/bsw-413

Ekot
Ekot 08:00 Israels attacker mot Gaza stad har trappats upp under natten

Ekot

Play Episode Listen Later Sep 16, 2025 15:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

Irish Tech News Audio Articles
Attackers Up Their Game with Ultra-Realistic PDF Invoice Lures, HP Finds

Irish Tech News Audio Articles

Play Episode Listen Later Sep 12, 2025 5:15


HP Wolf Security research shows attackers chaining living-off-the-land techniques to exploit detection weak spots HP Inc has issued its latest Threat Insights Report, revealing how age-old living-off-the-land (LOTL) and phishing techniques are evolving to bypass traditional detection-based security tools. LOTL techniques - where attackers use legitimate tools and features built into a computer to carry out their attacks - have long been a staple of the threat actor toolkit. However, HP Threat Researchers now warn that the growing use of multiple, often uncommon, binaries in a single campaign is making it even harder to distinguish malicious versus legitimate activity. The report provides an analysis of real-world cyberattacks, helping organisations to keep up with the latest techniques cybercriminals are using to evade detection and breach PCs in the fast-changing cybercrime landscape. Based on the millions of endpoints running HP Wolf Security1, notable campaigns identified by HP Threats Researchers include: · Fake Adobe Reader Invoice Signals New Wave of Ultra-Polished Social Engineering Lures: Attackers embedded a reverse shell - a script that grants attackers control over a victim's device. The script was embedded in a small SVG image, disguised as a very realistic Adobe Acrobat Reader file, complete with a fake loading bar - giving the illusion of an ongoing upload, increasing the chances victims will open it and trigger an infection chain. Attackers also geofenced the download to German-speaking regions to limit exposure, hinder automated analysis systems and delay detection. · Attackers Hiding Malware in Pixel Image Files: Attackers used Microsoft Compiled HTML Help files to hide malicious code within image pixels. The files, disguised as project documents, concealed an XWorm payload in the pixel data, which was then extracted and used to execute a multi-step infection chain involving multiple LOTL techniques. PowerShell was also used to run a CMD file that deleted evidence of files once they'd been downloaded and executed. · Resurgent Lumma Stealer Spreads via IMG Archives: Lumma Stealer was one of the most active malware families observed in Q2. Attackers distributed it through multiple channels, including IMG Archive attachments that use LOTL techniques to bypass security filters and exploit trusted systems. Despite a law enforcement crackdown in May 2025, campaigns continued in June and that the group is already registering more domains and building infrastructure. Alex Holland, Principal Threat Researcher, HP Security Lab, comments:?"Attackers aren't reinventing the wheel, but they are refining their techniques. Living-off-the-land, reverse shells, and phishing have been around for decades, but today's threat actors are sharpening these methods. We're seeing more chaining of living-off-the-land tools and use of less obvious file types, such as images, to evade detection. Take reverse shells as an example - you don't have to drop a fully-fledged RAT when a simple, lightweight script will achieve the same effect. It's simple, fast and often slips under the radar because it's so basic." These campaigns show how creative and adaptive threat actors have become. By hiding malicious code in images, abusing trusted system tools, and even tailoring attacks to specific regions, they're making it harder for traditional detection tools to spot threats. By isolating threats that have evaded detection tools on PCs - but still allowing malware to detonate safely inside secure containers - HP Wolf Security has specific insight into the latest techniques used by cybercriminals. To date, HP Wolf Security customers have clicked on over 55 billion email attachments, web pages, and downloaded files with no reported breaches. The report, which examines data from April-June 2025, details how cybercriminals continue to diversify attack methods to bypass security tools that rely on detection, such as: · At least 13% of email threats ide...

Cyber Security Today
iCloud Calendar Invites Disguise New Phishing Campaigns

Cyber Security Today

Play Episode Listen Later Sep 10, 2025 10:05 Transcription Available


Phishing Scams, Leaked Stream Keys, Zero-Day Android Vulnerabilities, and Bounties on Russian Hackers In this episode of Cybersecurity Today, host Jim Love discusses several critical cybersecurity issues. Attackers are using iCloud calendar invites for phishing scams, leveraging Apple's system to bypass security checks. The US Department of Defense has exposed livestream credentials, risking hijack and fake content insertion. Billions of Android phones are vulnerable due to unpatched critical zero days, and Google has only fixed issues for Pixel devices so far. Additionally, the US State Department has placed a $10 million bounty on three Russian FSB hackers responsible for attacks on energy companies. Jim emphasizes the importance of securing digital assets and maintaining strong cybersecurity practices. 00:00 Introduction and Headlines 00:24 Phishing Scam via iCloud Calendar Invites 03:18 US Department of Defense Livestream Vulnerabilities 05:53 Critical Android Zero-Day Vulnerabilities 07:38 US Bounty on Russian FSB Hackers 09:42 Conclusion and Contact Information

The Howie Carr Radio Network
Aaron Chadbourne: What Was The Charlotte Attacker Doing On The Street | 9.9.25 - The Grace Curley Show Hour 1

The Howie Carr Radio Network

Play Episode Listen Later Sep 9, 2025 38:57


Justin Filler joins the show to discuss the Charlotte murder, and how was the attacker even on the streets?  Visit the Howie Carr Radio Network website to access columns, podcasts, and other exclusive content.

rSlash
r/Nuclearrevenge He Killed His Sister's Attacker

rSlash

Play Episode Listen Later Sep 8, 2025 21:12


0:00 Intro 0:07 Unaliving 6:33 Army revenge 15:10 Credit card Learn more about your ad choices. Visit megaphone.fm/adchoices

Ekot
Ekot 08:00 Omfattande attacker mot Kiev

Ekot

Play Episode Listen Later Sep 7, 2025 5:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

The Cyber Threat Perspective
Episode 148: Securing Windows: Common Misconfigurations That Give Attackers The Advantage

The Cyber Threat Perspective

Play Episode Listen Later Sep 5, 2025 54:45


This is the webinar I gave in August 2025 on the topic of common Windows misconfigurations I see during internal pentests. Make sure you grab your free gifts!https://securit360.com/free-giftshttps://links.spenceralessi.com/credshttps://go.spenceralessi.com/windows-slidesBlog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com

Love and Murder
“She Played Dead”: How a 12-Year-Old Outsmarted Her Attacker | Gwendolyn Girard

Love and Murder

Play Episode Listen Later Sep 5, 2025 7:18 Transcription Available


On May 26, 2025, a 911 call out of Punta Gorda, Florida, sent deputies racing to the Cecil Webb Wildlife Management Area. In the woods, they found a 12-year-old girl bleeding from multiple stab wounds, barely alive.What happened next left even veteran investigators speechless. The girl survived long enough to whisper who had attacked her—and the name she gave stunned everyone.Her account of how she escaped is as shocking as it is heartbreaking. And the suspect's arrest, just hours later, only raised more questions about motive, mental health, and how far a case like this will go in court.This is the story of a child who fought to survive, and a mother, Gwendolyn Girard, accused of doing the unthinkable.If you suspect child abuse, call the Childhelp National Child Abuse Hotline at 1-800-4-A-Child or 1-800-422-4453, or go to www.childhelp.org. All calls are toll-free and confidential. The hotline is available 24/7 in more than 170 languages.Visit my site for more resources: https://wp.me/PdbuVw-X4f**************************************Do you have thoughts about this case, or is there a specific true crime case you'd like to hear about? Let me know with an email or a voice message: https://murderandlove.com/contactFind the sources used in this episode and learn more about how to support Love and Murder: Heartbreak to Homicide and gain access to even more cases, including bonus episodes, ad-free and intro-free cases, case files and more at: https://murderandlove.comMusic:℗ lesfreemusicBecome a supporter of this podcast: https://www.spreaker.com/podcast/love-and-murder-heartbreak-to-homicide--4348896/support.

Paul's Security Weekly
Lasagna DoS, AI Slop, Hacker Ultimatums - PSW #890

Paul's Security Weekly

Play Episode Listen Later Sep 4, 2025 124:36


In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The Salesloft breach TP-Link Zero Days US DoD using Russian software? The Lasagna DoS attack Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-890

Paul's Security Weekly TV
Lasagna DoS, AI Slop, Hacker Ultimatums - PSW #890

Paul's Security Weekly TV

Play Episode Listen Later Sep 4, 2025 124:36


In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The Salesloft breach TP-Link Zero Days US DoD using Russian software? The Lasagna DoS attack Show Notes: https://securityweekly.com/psw-890

Easy Prey
Hackers Are Winning

Easy Prey

Play Episode Listen Later Sep 3, 2025 45:20


Cyberattacks aren't just about hackers in hoodies anymore. Today, we're up against professionalized, well-funded organizations that run like businesses. They use AI to crack defenses, run labs that simulate the tools we rely on, and rake in trillions while defenders struggle to keep pace. The scary part? Even the strongest companies and governments can fall behind when the threat landscape moves this fast. My guest, Evan Powell, has spent nearly 30 years in the cybersecurity world. He's the founder and CEO of Deep Tempo, and a serial entrepreneur who's helped industries from cloud data to resilience engineering make big transitions. Evan knows what it looks like when attackers have the upper hand, and he's seen firsthand how enterprises try to shift the balance. In this conversation, Evan explains why compliance checkboxes aren't enough, why raising the cost of an attack is often more realistic than stopping one outright, and how AI is reshaping both sides of the fight. He also shares the creative ways defenders are adapting, from honeypots to sock puppets, and the simple steps every one of us can take to make life harder for attackers. Show Notes: [00:57] Evan Powell introduces himself as founder and CEO of Deep Tempo, with nearly 30 years in cybersecurity and tech innovation. [02:39] He recalls a high-profile spearphishing case where the CIA director's AOL email and home router were compromised. [03:51] Attackers are professionalizing, running AI-powered labs, and making trillions while defenders spend billions and still fall behind. [07:06] Evan contrasts compliance-driven “checkbox security” with threat-informed defense that anticipates attacker behavior. [09:40] Enterprises deploy creative tactics like honeypots and sock puppet employees to study attackers in action. [12:22] Raising the cost of attack through stronger habits, better routers, and multi-factor authentication can make attacks less profitable. [15:01] Attackers are using AI to morph and simulate defenses, while defenders experiment with anomaly detection and adaptive models. [20:56] Evan explains why security vendors themselves can become attack vectors and why data should sometimes stay inside customer environments. [24:50] He draws parallels between fraud rings and cybercrime, where different groups handle exploits, ransomware, and money laundering. [26:29] The debate over “hacking back” raises legal and policy questions about whether enterprises should strike attackers directly. [30:18] Network providers struggle with whether they should act as firewalls to protect compromised consumer devices. [34:59] Data silos across 50+ vendors per enterprise create “Franken-stacks,” slowing real-time defense and collaboration. [37:28] AI agents may help unify security systems by querying across silos and tightening the OODA loop for faster response. [39:10] MITRE's ATT&CK framework and open-source collaboration are pushing the industry toward more shared knowledge. [41:05] Evan acknowledges burnout in cybersecurity roles but sees automation and better tools improving day-to-day work. [42:59] Final advice: corporations should rethink from first principles with data-centric solutions, and consumers must build protective habits like MFA and secret family phrases. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Evan Powell - DeepTempo Evan Powell - LinkedIn

Paul's Security Weekly
Dave Lewis talks M&A due diligence, TBD topic, the weekly news - Dave Lewis - ESW #422

Paul's Security Weekly

Play Episode Listen Later Sep 1, 2025 106:21


Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organizational value throughout the M&A process. Topic: The Challenge of Breach Transparency Every industry concerned with safety has a process for publishing the details of accidents, incidents, and failures. Cybersecurity has yet to reach this milestone, and hiding the details of failures is holding us back. This talk will argue for the need for breach details to go public, and share strategies for finding and using some little-known sources of detailed breach data. Weekly Enterprise News Finally, in the enterprise security news, A funding, a few acquisitions, and an IPO for the first time in forever! Attackers are really actually starting to use AI now Some researcher spent all of August poking holes in all the AI tools Someone got Microsoft Copilot to be an accomplice in a coverup Microsoft is making a big change in Azure that will probably break some stuff No, Flipper Zero can't help you steal your car (just the stuff in it) Domain names are free to register now, maybe? Disgruntled former employee goes to jail AI tricked into doing more bad things All that and more, on this episode of Enterprise Security Weekly. This segment is sponsored by 1Password. Visit https://securityweekly.com/1password to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-422

Enterprise Security Weekly (Audio)
Dave Lewis talks M&A due diligence, TBD topic, the weekly news - Dave Lewis - ESW #422

Enterprise Security Weekly (Audio)

Play Episode Listen Later Sep 1, 2025 106:21


Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organizational value throughout the M&A process. Topic: The Challenge of Breach Transparency Every industry concerned with safety has a process for publishing the details of accidents, incidents, and failures. Cybersecurity has yet to reach this milestone, and hiding the details of failures is holding us back. This talk will argue for the need for breach details to go public, and share strategies for finding and using some little-known sources of detailed breach data. Weekly Enterprise News Finally, in the enterprise security news, A funding, a few acquisitions, and an IPO for the first time in forever! Attackers are really actually starting to use AI now Some researcher spent all of August poking holes in all the AI tools Someone got Microsoft Copilot to be an accomplice in a coverup Microsoft is making a big change in Azure that will probably break some stuff No, Flipper Zero can't help you steal your car (just the stuff in it) Domain names are free to register now, maybe? Disgruntled former employee goes to jail AI tricked into doing more bad things All that and more, on this episode of Enterprise Security Weekly. This segment is sponsored by 1Password. Visit https://securityweekly.com/1password to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-422

Paul's Security Weekly TV
Dave Lewis talks M&A due diligence, TBD topic, the weekly news - Dave Lewis - ESW #422

Paul's Security Weekly TV

Play Episode Listen Later Sep 1, 2025 106:21


Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organizational value throughout the M&A process. Topic: The Challenge of Breach Transparency Every industry concerned with safety has a process for publishing the details of accidents, incidents, and failures. Cybersecurity has yet to reach this milestone, and hiding the details of failures is holding us back. This talk will argue for the need for breach details to go public, and share strategies for finding and using some little-known sources of detailed breach data. Weekly Enterprise News Finally, in the enterprise security news, A funding, a few acquisitions, and an IPO for the first time in forever! Attackers are really actually starting to use AI now Some researcher spent all of August poking holes in all the AI tools Someone got Microsoft Copilot to be an accomplice in a coverup Microsoft is making a big change in Azure that will probably break some stuff No, Flipper Zero can't help you steal your car (just the stuff in it) Domain names are free to register now, maybe? Disgruntled former employee goes to jail AI tricked into doing more bad things All that and more, on this episode of Enterprise Security Weekly. This segment is sponsored by 1Password. Visit https://securityweekly.com/1password to learn more about them! Show Notes: https://securityweekly.com/esw-422

The Alan Cox Show
Road Runner, Orgy Dome, Dandered Teats, Pickle Predicament, Ding Dong Mold, Trigger Warning, Cracker Attacker, Kotter's Field

The Alan Cox Show

Play Episode Listen Later Aug 27, 2025 175:25


The Alan Cox Show
Road Runner, Orgy Dome, Dandered Teats, Pickle Predicament, Ding Dong Mold, Trigger Warning, Cracker Attacker, Kotter's Field

The Alan Cox Show

Play Episode Listen Later Aug 27, 2025 171:43


The Jason Rantz Show
Hour 1: Attacker of WSU Trump supporter gets jail time, Belltown crime, Labor Day travel

The Jason Rantz Show

Play Episode Listen Later Aug 26, 2025 46:51


After a WSU Trump supporter was assaulted over a hat, a judge is sending the attacker (a WSU grad student) to jail. Crime is rampant in Seattle’s Belltown neighborhood. Sea-Tac airport is bracing for Labor Day travel. Voter registration numbers for the Democrats are dismal. President Trump issued an executive order aimed at ending cashless bail. // The Democrats continued to show that they’re completely out of touch at the annual DNC summer meeting. The great redistricting fight continues. // Trump is rolling out the National Guard all across the country to crack down on illegal immigration.

Tim Conway Jr. on Demand
“Cracker Barrel Tanks $100M, DTLA Homeless Crisis Boils Over, and Rose Bowl Attacker Nabbed”

Tim Conway Jr. on Demand

Play Episode Listen Later Aug 23, 2025 39:18 Transcription Available


Erik Menendez was denied parole at his first-ever hearing—36 years and a day after he and his brother Lyle killed their parents, Jose and Kitty Menendez. The board pointed to his prison behavior, past burglaries before the murders, and especially the killing of his mother in their decision. Now, all eyes are on Lyle's parole outcome. Michael Monks and members of the DTLA Residents Association met with city officials and business leaders to address one of downtown's toughest challenges: homelessness tied to acute mental illness episodes. Cracker Barrel lost nearly $100 million in market value after unveiling a new logo, sending shockwaves through investors. A man accused of attacking three people at a Rose Bowl concert has been arrested. Crozier shared his own story of recently having to step in during a similar confrontation.

Graham Allen’s Dear America Podcast
Leftist Media Outlets ADMIT Trump Was Right…Again + BIG BALLS Attacker REVEALED!

Graham Allen’s Dear America Podcast

Play Episode Listen Later Aug 12, 2025 62:14


Check out our sponsors: ✅ Patriot Mobile - https://patriotmobile.com/partners/chad Episode Description: Chad unloads on the latest bombshells rocking the political world! Leftist media outlets are forced to eat crow as they admit—yet again—that President Trump was right all along about tariffs, the economy, etc.  Plus, one of the "BIG BALLS" attackers is revealed, and Chad's got the unfiltered scoop. Buckle up for hard-hitting commentary, razor-sharp wit, and the truth they don't want you to hear! Learn more about your ad choices. Visit megaphone.fm/adchoices