POPULARITY
Categories
This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on disposable vapes NPM worms and token stealing Attackers make mistakes too AI podcasts Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-892
This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on disposable vapes NPM worms and token stealing Attackers make mistakes too AI podcasts Show Notes: https://securityweekly.com/psw-892
In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more! Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a gripping conversation about the evolution of executive protection in the digital age. With over 30 years of experience, Chuck shares how targeted violence has shifted from physical threats to online ideation—and why it now starts with a click. From PII abuse to unregulated data brokers, generative AI manipulation, and real-world convergence of cyber and physical risks—this is a must-watch for CISOs, CSOs, CEOs, and anyone navigating modern threat landscapes. Hear real-world examples, including shocking stories of doxxing, AI-fueled radicalization, and the hidden dangers of digital exhaust. Whether you're in cyber, physical security, or executive leadership, this interview lays out the urgent need for converged risk strategies, narrative control, and a new approach to duty of care in a remote-first world. Learn what every security leader needs to do now to protect key personnel, prevent exploitation, and build a unified, proactive risk posture. This segment is sponsored by 360 Privacy. Learn how to integrate privacy and protective intelligence to get ahead of the next threat vector at https://securityweekly.com/360privacybh! In this exclusive Black Hat 2025 interview, CyberRisk TV host Matt Alderman sits down with Tom Pore, AVP of Sales Engineering at Pentera, to dive into the rapidly evolving world of AI-driven cyberattacks. What's happening? Attackers are already using AI and LLMs to launch thousands of attacks per second—targeting modern web apps, exploiting PII, and bypassing traditional testing methods. Tom explains how automated AI payload generation, context-aware red teaming, and language/system-aware attack modeling are reshaping the security landscape. The twist? Pentera flips the script by empowering security teams to think like an attacker—using continuous, AI-powered penetration testing to uncover hidden risks before threat actors do. This includes finding hardcoded credentials, leveraging leaked identities, and pivoting across systems just like real adversaries. To learn more about Pentera's proactive Ransomware testing please visit: https://securityweekly.com/penterabh Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-413
This week on Reimagining Cyber, we unpack one of the biggest supply chain attacks of the year: the NPM hack. Attackers compromised widely used packages like Chalk and Debug—billions of weekly downloads—slipping in code that silently hijacked crypto transactions. Tyler Moffitt joins us to explain how it happened, who's most at risk, and the practical steps every developer and security leader should take right now.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70 Chief Information Security Officer CISO Podcasts rankings.
Nyheterna Radio 14.00
Phishing Scams, Leaked Stream Keys, Zero-Day Android Vulnerabilities, and Bounties on Russian Hackers In this episode of Cybersecurity Today, host Jim Love discusses several critical cybersecurity issues. Attackers are using iCloud calendar invites for phishing scams, leveraging Apple's system to bypass security checks. The US Department of Defense has exposed livestream credentials, risking hijack and fake content insertion. Billions of Android phones are vulnerable due to unpatched critical zero days, and Google has only fixed issues for Pixel devices so far. Additionally, the US State Department has placed a $10 million bounty on three Russian FSB hackers responsible for attacks on energy companies. Jim emphasizes the importance of securing digital assets and maintaining strong cybersecurity practices. 00:00 Introduction and Headlines 00:24 Phishing Scam via iCloud Calendar Invites 03:18 US Department of Defense Livestream Vulnerabilities 05:53 Critical Android Zero-Day Vulnerabilities 07:38 US Bounty on Russian FSB Hackers 09:42 Conclusion and Contact Information
Imagine waking up each day knowing that somewhere in the world, an unseen enemy is already at work—writing code, exploiting vulnerabilities, and using AI to launch attacks that could cripple businesses or compromise millions of people. For Nadav, Senior Director of Threat Research at Thales, this isn't science fiction. It's his daily reality. In this episode, we step inside his world—a world where every decision can mean the difference between safety and disaster, and where staying one step ahead of attackers is not just a job, it's a mission.
Tune in here to this Tuesday's edition of Breaking With Brett Jensen! Breaking Brett Jensen kicks the show off by talking about the newly filed federal charges in the murder of Iryna Zarutska and the emotional press conference held by U.S. Attorney Russ Ferguson and the FBI . Ferguson announced that the case would be supplemented with federal charges under a statute covering acts of violence on public transit—an unusual but serious move intended to send a clear message. He spoke about the impact of the crime on Charlotte’s public safety and the emotional conversation he had with Zarutska’s family, who had fled Ukraine for a better life. Ferguson made it clear: this case isn’t about politics—it’s about justice and restoring safety to a shaken community. The maximum penalty could be life without parole or the death penalty Later, Jensen is joined by Congressman Tim Moore to discuss the shocking murder of Iryna Zarutska and the legislative action he's taking in response. Representing parts of Mecklenburg County — including the area Zarutska called home — Moore expresses outrage over the magistrate judge’s decision to grant the suspect an unsecured bond, allowing him back on the streets. Moore outlines a newly introduced bill, co-sponsored with Congresswoman Elise Stefanik, that would allow federal funds to be withheld from cities or states with dangerous bail reform policies Listen here for all of this and more on Breaking With Brett Jensen. To be the first to hear about Breaking Brett Jensen's exclusives and more follow him on X @Brett_Jensen! See omnystudio.com/listener for privacy information.
Justin Filler joins the show to discuss the Charlotte murder, and how was the attacker even on the streets? Visit the Howie Carr Radio Network website to access columns, podcasts, and other exclusive content.
0:00 Intro 0:07 Unaliving 6:33 Army revenge 15:10 Credit card Learn more about your ad choices. Visit megaphone.fm/adchoices
Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.
This is the webinar I gave in August 2025 on the topic of common Windows misconfigurations I see during internal pentests. Make sure you grab your free gifts!https://securit360.com/free-giftshttps://links.spenceralessi.com/credshttps://go.spenceralessi.com/windows-slidesBlog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com
On May 26, 2025, a 911 call out of Punta Gorda, Florida, sent deputies racing to the Cecil Webb Wildlife Management Area. In the woods, they found a 12-year-old girl bleeding from multiple stab wounds, barely alive.What happened next left even veteran investigators speechless. The girl survived long enough to whisper who had attacked her—and the name she gave stunned everyone.Her account of how she escaped is as shocking as it is heartbreaking. And the suspect's arrest, just hours later, only raised more questions about motive, mental health, and how far a case like this will go in court.This is the story of a child who fought to survive, and a mother, Gwendolyn Girard, accused of doing the unthinkable.If you suspect child abuse, call the Childhelp National Child Abuse Hotline at 1-800-4-A-Child or 1-800-422-4453, or go to www.childhelp.org. All calls are toll-free and confidential. The hotline is available 24/7 in more than 170 languages.Visit my site for more resources: https://wp.me/PdbuVw-X4f**************************************Do you have thoughts about this case, or is there a specific true crime case you'd like to hear about? Let me know with an email or a voice message: https://murderandlove.com/contactFind the sources used in this episode and learn more about how to support Love and Murder: Heartbreak to Homicide and gain access to even more cases, including bonus episodes, ad-free and intro-free cases, case files and more at: https://murderandlove.comMusic:℗ lesfreemusicBecome a supporter of this podcast: https://www.spreaker.com/podcast/love-and-murder-heartbreak-to-homicide--4348896/support.
In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The Salesloft breach TP-Link Zero Days US DoD using Russian software? The Lasagna DoS attack Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-890
In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The Salesloft breach TP-Link Zero Days US DoD using Russian software? The Lasagna DoS attack Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-890
In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The Salesloft breach TP-Link Zero Days US DoD using Russian software? The Lasagna DoS attack Show Notes: https://securityweekly.com/psw-890
Vladimir Putin stod hand i hand med Xi Jinping och Narendra Modi på Shanghaiorganisationens möte i Kina. Kina och Indien, de två största köparna av rysk olja och gas, är avgörande för Rysslands ekonomi. Lyssna på alla avsnitt i Sveriges Radio Play. Ukrainas drönarattacker mot ryska oljeraffinaderier har blivit effektivare och har lett till långa bilköer utanför ryska bensinstationer, på sina håll uppges bensinen vara helt slut.För Ryssland är pengarna från oljeindustrin helt avgörande för att kunna fortsätta kriget i Ukraina, säger Torbjörn Becker.Programledare Johanna MelénMedverkande:Torbjörn Becker, chef för Östekonomiska institutet vid Handelshögskolan i StockholmFredrik Wadström, Sveriges Radios RysslandskorrespondentMaria Persson Löfgren, Sveriges Radios tidigare MoskvakorrespondentProducent: Stina Fischer
Cyberattacks aren't just about hackers in hoodies anymore. Today, we're up against professionalized, well-funded organizations that run like businesses. They use AI to crack defenses, run labs that simulate the tools we rely on, and rake in trillions while defenders struggle to keep pace. The scary part? Even the strongest companies and governments can fall behind when the threat landscape moves this fast. My guest, Evan Powell, has spent nearly 30 years in the cybersecurity world. He's the founder and CEO of Deep Tempo, and a serial entrepreneur who's helped industries from cloud data to resilience engineering make big transitions. Evan knows what it looks like when attackers have the upper hand, and he's seen firsthand how enterprises try to shift the balance. In this conversation, Evan explains why compliance checkboxes aren't enough, why raising the cost of an attack is often more realistic than stopping one outright, and how AI is reshaping both sides of the fight. He also shares the creative ways defenders are adapting, from honeypots to sock puppets, and the simple steps every one of us can take to make life harder for attackers. Show Notes: [00:57] Evan Powell introduces himself as founder and CEO of Deep Tempo, with nearly 30 years in cybersecurity and tech innovation. [02:39] He recalls a high-profile spearphishing case where the CIA director's AOL email and home router were compromised. [03:51] Attackers are professionalizing, running AI-powered labs, and making trillions while defenders spend billions and still fall behind. [07:06] Evan contrasts compliance-driven “checkbox security” with threat-informed defense that anticipates attacker behavior. [09:40] Enterprises deploy creative tactics like honeypots and sock puppet employees to study attackers in action. [12:22] Raising the cost of attack through stronger habits, better routers, and multi-factor authentication can make attacks less profitable. [15:01] Attackers are using AI to morph and simulate defenses, while defenders experiment with anomaly detection and adaptive models. [20:56] Evan explains why security vendors themselves can become attack vectors and why data should sometimes stay inside customer environments. [24:50] He draws parallels between fraud rings and cybercrime, where different groups handle exploits, ransomware, and money laundering. [26:29] The debate over “hacking back” raises legal and policy questions about whether enterprises should strike attackers directly. [30:18] Network providers struggle with whether they should act as firewalls to protect compromised consumer devices. [34:59] Data silos across 50+ vendors per enterprise create “Franken-stacks,” slowing real-time defense and collaboration. [37:28] AI agents may help unify security systems by querying across silos and tightening the OODA loop for faster response. [39:10] MITRE's ATT&CK framework and open-source collaboration are pushing the industry toward more shared knowledge. [41:05] Evan acknowledges burnout in cybersecurity roles but sees automation and better tools improving day-to-day work. [42:59] Final advice: corporations should rethink from first principles with data-centric solutions, and consumers must build protective habits like MFA and secret family phrases. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Evan Powell - DeepTempo Evan Powell - LinkedIn
Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organizational value throughout the M&A process. Topic: The Challenge of Breach Transparency Every industry concerned with safety has a process for publishing the details of accidents, incidents, and failures. Cybersecurity has yet to reach this milestone, and hiding the details of failures is holding us back. This talk will argue for the need for breach details to go public, and share strategies for finding and using some little-known sources of detailed breach data. Weekly Enterprise News Finally, in the enterprise security news, A funding, a few acquisitions, and an IPO for the first time in forever! Attackers are really actually starting to use AI now Some researcher spent all of August poking holes in all the AI tools Someone got Microsoft Copilot to be an accomplice in a coverup Microsoft is making a big change in Azure that will probably break some stuff No, Flipper Zero can't help you steal your car (just the stuff in it) Domain names are free to register now, maybe? Disgruntled former employee goes to jail AI tricked into doing more bad things All that and more, on this episode of Enterprise Security Weekly. This segment is sponsored by 1Password. Visit https://securityweekly.com/1password to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-422
Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organizational value throughout the M&A process. Topic: The Challenge of Breach Transparency Every industry concerned with safety has a process for publishing the details of accidents, incidents, and failures. Cybersecurity has yet to reach this milestone, and hiding the details of failures is holding us back. This talk will argue for the need for breach details to go public, and share strategies for finding and using some little-known sources of detailed breach data. Weekly Enterprise News Finally, in the enterprise security news, A funding, a few acquisitions, and an IPO for the first time in forever! Attackers are really actually starting to use AI now Some researcher spent all of August poking holes in all the AI tools Someone got Microsoft Copilot to be an accomplice in a coverup Microsoft is making a big change in Azure that will probably break some stuff No, Flipper Zero can't help you steal your car (just the stuff in it) Domain names are free to register now, maybe? Disgruntled former employee goes to jail AI tricked into doing more bad things All that and more, on this episode of Enterprise Security Weekly. This segment is sponsored by 1Password. Visit https://securityweekly.com/1password to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-422
Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organizational value throughout the M&A process. Topic: The Challenge of Breach Transparency Every industry concerned with safety has a process for publishing the details of accidents, incidents, and failures. Cybersecurity has yet to reach this milestone, and hiding the details of failures is holding us back. This talk will argue for the need for breach details to go public, and share strategies for finding and using some little-known sources of detailed breach data. Weekly Enterprise News Finally, in the enterprise security news, A funding, a few acquisitions, and an IPO for the first time in forever! Attackers are really actually starting to use AI now Some researcher spent all of August poking holes in all the AI tools Someone got Microsoft Copilot to be an accomplice in a coverup Microsoft is making a big change in Azure that will probably break some stuff No, Flipper Zero can't help you steal your car (just the stuff in it) Domain names are free to register now, maybe? Disgruntled former employee goes to jail AI tricked into doing more bad things All that and more, on this episode of Enterprise Security Weekly. This segment is sponsored by 1Password. Visit https://securityweekly.com/1password to learn more about them! Show Notes: https://securityweekly.com/esw-422
Desiree Lee, one of the Business CTOs at Armis, joins Amir to unpack one of the toughest realities in cybersecurity: the biggest risks aren't always technical, they're human. From phishing and deepfakes to the way AI is reshaping both attackers' and defenders' playbooks, Desiree shares hard-won insights on what companies should actually prioritize. If you're a tech leader navigating the expanding attack surface, this episode will sharpen how you think about security in the AI era.Key Takeaways• Most breaches stem from human behavior, not lack of technology.• Attackers adopt AI faster because there's no downside for them—defenders must catch up.• Fundamentals like patching and asset inventory still make or break resilience.• AI can reduce noise for security teams by spotting patterns in overwhelming data.• Small and midsize businesses will benefit from AI-driven tools that lower the barrier to effective security.Timestamped Highlights00:34 — How Armis evolved from asset inventory to full security solutions03:30 — Why security failures are more about psychology than technology07:32 — The deepfake CFO story and why training alone can't solve phishing risks09:18 — Why most enterprises struggle with basics like patching and automation11:41 — Where AI gives defenders an edge in processing massive data sets18:33 — Practical ways AI can ease alert fatigue and vulnerability management21:03 — The overlooked need to label assets by business criticalityA Moment Worth Remembering“There is no penalty on the attacking side for embracing AI. It's only good things for them. So they will adopt it quickly.” — Desiree LeeResources MentionedArmis: armis.comDesiree Lee on LinkedIn: linkedin.com/in/desireedleePro TipsTagging assets with their business criticality is one of the simplest, highest-impact steps companies can take. It turns asset inventories from static lists into real decision-making tools for AI-driven defense.Call to ActionIf you found this episode valuable, share it with a colleague who's thinking about security and AI. Subscribe on your favorite podcast platform so you never miss future conversations with tech leaders pushing the edge of what's possible.
Organizations today face escalating cyber risks spanning state-sponsored attacks, supply chain compromises, and malicious apps. ShinyHunters' breaches of Salesforce platforms (impacting Google and Farmers Insurance) show how social engineering—like voice phishing—can exploit trusted vendors. Meanwhile, Russian actors (FSB-linked “Static Tundra”) continue to leverage old flaws, such as a seven-year-old Cisco Smart Install bug, to infiltrate U.S. infrastructure. Malicious apps on Google Play (e.g., Joker, Anatsa) reached millions of downloads before removal, proving attackers' success in disguising malware. New technologies bring fresh vectors: Perplexity's Comet browser allowed prompt injection–driven account hijacking, while malicious RDP scanning campaigns exploit timing to maximize credential theft.Responses vary between safeguarding and asserting control. The FTC warns U.S. firms against weakening encryption or enabling censorship under foreign pressure, citing legal liability. By contrast, Russia mandates state-backed apps like MAX Messenger and RuStore, raising surveillance concerns. Microsoft, facing leaks from its bug-sharing program, restricted exploit code access to higher-risk countries. Open-source projects like LibreOffice gain traction as sovereignty tools—privacy-first, telemetry-free, and free of vendor lock-in.AI-powered wearables such as Halo X smart glasses blur lines between utility and surveillance. Their ability to “always listen” and transcribe conversations augments human memory but erodes expectations of privacy. The founders' history with facial recognition raises additional misuse concerns. As AI integrates directly into conversation and daily life, the risks of pervasive recording, ownership disputes, and surveillance intensify.Platforms like Bluesky are strained by conflicting global regulations. Mississippi's HB 1126 requires universal age verification, fines for violations, and parental consent for minors. Lacking resources for such infrastructure, Bluesky withdrew service from the state. This illustrates the tension between regulatory compliance, resource limits, and preserving open user access.AI adoption is now a competitive imperative. Coinbase pushes aggressive integration, requiring engineers to embrace tools like GitHub Copilot or face dismissal. With one-third of its code already AI-generated, Coinbase aims for 50% by quarter's end, supported by “AI Speed Runs” for knowledge-sharing. Yet, rapid adoption risks employee dissatisfaction and AI-generated security flaws, underscoring the need for strict controls alongside innovation.Breaches at Farmers Insurance (1.1M customers exposed) and Google via Salesforce illustrate the scale of third-party risk. Attackers exploit trusted platforms and human error, compromising data across multiple organizations at once. This shows security depends not only on internal defenses but on continuous vendor vetting and monitoring.Governments often demand access that undermines encryption, privacy, and transparency. The FTC warns that backdoors or secret concessions—such as the UK's (later retracted) request for Apple to weaken iCloud—violate user trust and U.S. law. Meanwhile, Russia's mandatory domestic apps exemplify sovereignty used for surveillance. Companies face a global tug-of-war between privacy, compliance, and open internet principles.Exploited legacy flaws prove that vulnerabilities never expire. Cisco's years-old Smart Install bug, still unpatched in many systems, allows surveillance of critical U.S. sectors. Persistent RDP scanning further highlights attackers' patience and scale. The lesson is clear: proactive patching, continuous updates, and rigorous audits are essential. Cybersecurity demands ongoing vigilance against both emerging and legacy threats.
The Alan Cox Show
The Alan Cox ShowSee omnystudio.com/listener for privacy information.
DOGE Put Critical Social Security Data at Risk, Whistle-Blower Says CISA warns of actively exploited Git code execution flaw Alleged mastermind behind K-Pop celebrity stock heist extradited to South Korea Huge thanks to our sponsor, Prophet Security Your security analysts didn't sign up to chase false alarms all day. With Prophet Security's AI SOC platform, they won't have to. It works like a tireless teammate—triaging and investigating alerts around the clock. Less burnout. Better coverage. And more time for meaningful work. Learn more atprophetsecurity.ai.
After a WSU Trump supporter was assaulted over a hat, a judge is sending the attacker (a WSU grad student) to jail. Crime is rampant in Seattle’s Belltown neighborhood. Sea-Tac airport is bracing for Labor Day travel. Voter registration numbers for the Democrats are dismal. President Trump issued an executive order aimed at ending cashless bail. // The Democrats continued to show that they’re completely out of touch at the annual DNC summer meeting. The great redistricting fight continues. // Trump is rolling out the National Guard all across the country to crack down on illegal immigration.
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.• Attackers are actively exploiting CVE-2023-46604, a remote code execution vulnerability in Apache ActiveMQ first disclosed in October 2023, that is used to compromise cloud-hosted Linux servers.• AshES Cybersecurity has publicly disclosed a critical zero-day vulnerability in Elastic's Endpoint Detection and Response (EDR) platform, specifically in the Microsoft-signed kernel driver elastic-endpoint-driver.sys.• At least a dozen ransomware groups are now deploying kernel-level EDR killers - tools designed specifically to disable endpoint detection and response solutions - as part of their malware arsenal.• Microsoft has released an in-depth technical analysis of PipeMagic, a modular backdoor linked to ransomware operations carried out by Storm-2460, a financially motivated threat group associated with RansomEXX.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform.This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.
Transgender ATTACKER FINDS OUT after AMBUSHING ICE Agents with a KNIFE! FAFO!
Erik Menendez was denied parole at his first-ever hearing—36 years and a day after he and his brother Lyle killed their parents, Jose and Kitty Menendez. The board pointed to his prison behavior, past burglaries before the murders, and especially the killing of his mother in their decision. Now, all eyes are on Lyle's parole outcome. Michael Monks and members of the DTLA Residents Association met with city officials and business leaders to address one of downtown's toughest challenges: homelessness tied to acute mental illness episodes. Cracker Barrel lost nearly $100 million in market value after unveiling a new logo, sending shockwaves through investors. A man accused of attacking three people at a Rose Bowl concert has been arrested. Crozier shared his own story of recently having to step in during a similar confrontation.
AP correspondent Charles de Ledesma reports a memorial tree in France has been destroyed.
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: CISA warns about the path from on-prem Exchange to the cloud Microsoft awards a crisp zero dollar bill for a report about what a mess its internal Entra-authed apps are Everyone and their dog seems to have a shell in US Federal Court information systems Google pays $250k for a Chrome sandbox escape Attackers use javascript in adult SVG files to … farm facebook likes?! SonicWall says users aren't getting hacked with an 0day… this time. This week's episode is sponsored by SpecterOps. Chief product officer Justin Kohler talks about how the flagship Bloodhound tool has evolved to map attack paths anywhere. Bring your own applications, directories and systems into the graph, and join the identity attacks together. This episode is also available on Youtube. Show notes CISA, Microsoft issue alerts on ‘high-severity' Exchange vulnerability | The Record from Recorded Future News Advanced Active Directory to Entra ID lateral movement techniques Consent & Compromise: Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications Cartels may be able to target witnesses after major court hack Federal judiciary tightens digital security as it deals with ‘escalated cyberattacks' | The Record from Recorded Future News Citrix NetScaler flaws lead to critical infrastructure breaches | Cybersecurity Dive DARPA touts value of AI-powered vulnerability detection as it announces competition winners | Cybersecurity Dive Buttercup is now open-source! HTTP/1.1 must die: the desync endgame US confirms takedown of BlackSuit ransomware gang that racked up $370 million in ransoms | The Record from Recorded Future News North Korean cyber-espionage group ScarCruft adds ransomware in recent attack | The Record from Recorded Future News Adult sites are stashing exploit code inside racy .svg files - Ars Technica Google pays 250k for Chromium sandbox escape SonicWall says recent attack wave involved previously disclosed flaw, not zero-day | Cybersecurity Dive Two groups exploit WinRAR flaws in separate cyber-espionage campaigns | The Record from Recorded Future News Tornado Cash cofounder dodges money laundering conviction, found guilty of lesser charge | The Record from Recorded Future News Hackers Hijacked Google's Gemini AI With a Poisoned Calendar Invite to Take Over a Smart Home | WIRED Malware in Open VSX: These Vibes Are Off How attackers are using Active Directory Federation Services to phish with legit office.com links Introducing our guide to phishing detection evasion techniques The State of Attack Path Management
As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Security Weekly to discuss how to defend trust and reputation in the age of AI. Santosh will cover both the company and executive challenges of defending against the latest AI attacks, including: Impersonations and Deepfakes Employee Scams Financial Fraud Segment Resources: - https://styxintel.com/blog/what-is-brand-protection/ - https://styxintel.com/blog/brand-impersonation-hurts-business/ - https://styxintel.com/blog/social-engineering-tactics/ In the leadership and communications section, Mind the overconfidence gap: CISOs and staff don't see eye to eye on security posture, Your AI Strategy Needs More Than a Single Leader, Avoid These Communication Breakdowns When Launching Strategic Initiatives, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-408
The All Local Afternoon Update for Wednesday August 13th 2025
As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Security Weekly to discuss how to defend trust and reputation in the age of AI. Santosh will cover both the company and executive challenges of defending against the latest AI attacks, including: Impersonations and Deepfakes Employee Scams Financial Fraud Segment Resources: - https://styxintel.com/blog/what-is-brand-protection/ - https://styxintel.com/blog/brand-impersonation-hurts-business/ - https://styxintel.com/blog/social-engineering-tactics/ In the leadership and communications section, Mind the overconfidence gap: CISOs and staff don't see eye to eye on security posture, Your AI Strategy Needs More Than a Single Leader, Avoid These Communication Breakdowns When Launching Strategic Initiatives, and more! Show Notes: https://securityweekly.com/bsw-408
Check out our sponsors: ✅ Patriot Mobile - https://patriotmobile.com/partners/chad Episode Description: Chad unloads on the latest bombshells rocking the political world! Leftist media outlets are forced to eat crow as they admit—yet again—that President Trump was right all along about tariffs, the economy, etc. Plus, one of the "BIG BALLS" attackers is revealed, and Chad's got the unfiltered scoop. Buckle up for hard-hitting commentary, razor-sharp wit, and the truth they don't want you to hear! Learn more about your ad choices. Visit megaphone.fm/adchoices
8-12 Adam and Jordana 11a hour
Welcome to the "Week in Review," where we delve into the true stories behind this week's headlines. Your host, Tony Brueski, joins hands with a rotating roster of guests, sharing their insights and analysis on a collection of intriguing, perplexing, and often chilling stories that made the news. This is not your average news recap. With the sharp investigative lens of Tony and his guests, the show uncovers layers beneath the headlines, offering a comprehensive perspective that traditional news can often miss. From high-profile criminal trials to in-depth examinations of ongoing investigations, this podcast takes listeners on a fascinating journey through the world of true crime and current events. Each episode navigates through multiple stories, illuminating their details with factual reporting, expert commentary, and engaging conversation. Tony and his guests discuss each case's nuances, complexities, and human elements, delivering a multi-dimensional understanding to their audience. Whether you are a dedicated follower of true crime, or an everyday listener interested in the stories shaping our world, the "Week in Review" brings you the perfect balance of intrigue, information, and intelligent conversation. Expect thoughtful analysis, informed opinions, and thought-provoking discussions beyond the 24-hour news cycle. Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Welcome to the "Week in Review," where we delve into the true stories behind this week's headlines. Your host, Tony Brueski, joins hands with a rotating roster of guests, sharing their insights and analysis on a collection of intriguing, perplexing, and often chilling stories that made the news. This is not your average news recap. With the sharp investigative lens of Tony and his guests, the show uncovers layers beneath the headlines, offering a comprehensive perspective that traditional news can often miss. From high-profile criminal trials to in-depth examinations of ongoing investigations, this podcast takes listeners on a fascinating journey through the world of true crime and current events. Each episode navigates through multiple stories, illuminating their details with factual reporting, expert commentary, and engaging conversation. Tony and his guests discuss each case's nuances, complexities, and human elements, delivering a multi-dimensional understanding to their audience. Whether you are a dedicated follower of true crime, or an everyday listener interested in the stories shaping our world, the "Week in Review" brings you the perfect balance of intrigue, information, and intelligent conversation. Expect thoughtful analysis, informed opinions, and thought-provoking discussions beyond the 24-hour news cycle. Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
Welcome to the "Week in Review," where we delve into the true stories behind this week's headlines. Your host, Tony Brueski, joins hands with a rotating roster of guests, sharing their insights and analysis on a collection of intriguing, perplexing, and often chilling stories that made the news. This is not your average news recap. With the sharp investigative lens of Tony and his guests, the show uncovers layers beneath the headlines, offering a comprehensive perspective that traditional news can often miss. From high-profile criminal trials to in-depth examinations of ongoing investigations, this podcast takes listeners on a fascinating journey through the world of true crime and current events. Each episode navigates through multiple stories, illuminating their details with factual reporting, expert commentary, and engaging conversation. Tony and his guests discuss each case's nuances, complexities, and human elements, delivering a multi-dimensional understanding to their audience. Whether you are a dedicated follower of true crime, or an everyday listener interested in the stories shaping our world, the "Week in Review" brings you the perfect balance of intrigue, information, and intelligent conversation. Expect thoughtful analysis, informed opinions, and thought-provoking discussions beyond the 24-hour news cycle. Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
Welcome to the "Week in Review," where we delve into the true stories behind this week's headlines. Your host, Tony Brueski, joins hands with a rotating roster of guests, sharing their insights and analysis on a collection of intriguing, perplexing, and often chilling stories that made the news. This is not your average news recap. With the sharp investigative lens of Tony and his guests, the show uncovers layers beneath the headlines, offering a comprehensive perspective that traditional news can often miss. From high-profile criminal trials to in-depth examinations of ongoing investigations, this podcast takes listeners on a fascinating journey through the world of true crime and current events. Each episode navigates through multiple stories, illuminating their details with factual reporting, expert commentary, and engaging conversation. Tony and his guests discuss each case's nuances, complexities, and human elements, delivering a multi-dimensional understanding to their audience. Whether you are a dedicated follower of true crime, or an everyday listener interested in the stories shaping our world, the "Week in Review" brings you the perfect balance of intrigue, information, and intelligent conversation. Expect thoughtful analysis, informed opinions, and thought-provoking discussions beyond the 24-hour news cycle. Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
This week on the Active Self Protection Podcast we sit down with South African Self Defender Tubs and discuss the day he was at work at his family restaurant when a commotion drew him to the parking lot just in time to see a man rushing innocent citizens with a large glass bottle and how he had to react to protect life. More Info: https://fhftc.orgTo Donate: https://fhftc.org/donate/To Sign Up: https://fhftc.org/bullets-bibles-conference/Active Self Protection exists to help good, sane, sober, moral, prudent people in all walks of life to more effectively protect themselves and their loved ones from criminal violence. On the ASP Podcast you will hear the true stories of life or death self defense encounters from the men and women that lived them. If you are interested in the Second Amendment, self defense and defensive firearms use, martial arts or the use of less lethal tools used in the real world to defend life and family, you will find this show riveting. Join host and career federal agent Mike Willever as he talks to real life survivors and hear their stories in depth. You'll hear about these incidents and the self defenders from well before the encounter occurred on through the legal and emotional aftermath. Music: bensound.com
Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00:00 - PreShow Banter™ — Stop Asking Wade if he's in Vegas00:02:16 - Perplexity Uses Stealth Crawlers to Evade No-Crawl Directives – 2025-08-0400:11:25 - Story # 1: Insurance won't cover $5M in City of Hamilton claims for cyberattack, citing lack of log-in security00:18:40 - Story # 2: States Enact Safe Harbor Laws that Provide Affirmative Defenses in Data Breach Litigation00:26:45 - Story # 3: Hackers Destroy Aeroflot's IT Infrastructure, Causing Over 42 Flight Cancellations00:34:18 - Story # 4: Attackers exploit link-wrapping services to steal Microsoft 365 logins00:40:09 - Story # 5: Mozilla flags phishing wave aimed at hijacking trusted Firefox add-ons00:42:18 - Wade's plugin recommendation00:44:39 - Story # 6: Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives00:51:11 - Story # 7: After Backlash, ChatGPT Removes Option to Have Private Chats Indexed by Google00:55:21 - AI 202701:01:01 - What's Ralph been up to?
Arkansas DA Is Protecting Child Predators By Prosecuting A Father Who Took Out Daughter's Attacker Description: What happens when the people who are supposed to prosecute predators instead turn their attention to the parents trying to stop them? In this explosive episode, we examine the disturbing implications of the case against Aaron Spencer, the Arkansas father who shot and killed Michael Fosler—the man accused of sexually assaulting and kidnapping his daughter. Defense attorney Bob Motta argues that this isn't just an overreach by prosecutors—it's a betrayal of public trust. Fosler had already been arrested on 43 felony counts including rape, grooming, and child pornography involving Spencer's 14-year-old daughter. Yet he walked out of jail on a $5,000 bond and went right back to contacting her, ultimately leading to her disappearance the night Spencer tracked down and fatally confronted him. Instead of thanking Spencer for saving his daughter, the Arkansas DA charged him with second-degree murder. Bob breaks down why this prosecution feels less like justice and more like protection for predators. He outlines the legal mechanisms that could—and should—shield Spencer under Arkansas's self-defense and stand-your-ground laws. And he asks a hard question the state doesn't seem eager to answer: why are they more invested in punishing a desperate father than preventing the next victim? If you're angry, you should be. If you're confused, you're not alone. This is a case where the system looks broken—and very few seem willing to fix it. #ProtectKidsNotPredators #AaronSpencer #TrueCrimeNews #ArkansasDA #HiddenKillers #BobMotta #StandYourGround #JusticeSystemFailure #ProsecutorialInjustice #ChildProtectionNow Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
Arkansas DA Is Protecting Child Predators By Prosecuting A Father Who Took Out Daughter's Attacker Description: What happens when the people who are supposed to prosecute predators instead turn their attention to the parents trying to stop them? In this explosive episode, we examine the disturbing implications of the case against Aaron Spencer, the Arkansas father who shot and killed Michael Fosler—the man accused of sexually assaulting and kidnapping his daughter. Defense attorney Bob Motta argues that this isn't just an overreach by prosecutors—it's a betrayal of public trust. Fosler had already been arrested on 43 felony counts including rape, grooming, and child pornography involving Spencer's 14-year-old daughter. Yet he walked out of jail on a $5,000 bond and went right back to contacting her, ultimately leading to her disappearance the night Spencer tracked down and fatally confronted him. Instead of thanking Spencer for saving his daughter, the Arkansas DA charged him with second-degree murder. Bob breaks down why this prosecution feels less like justice and more like protection for predators. He outlines the legal mechanisms that could—and should—shield Spencer under Arkansas's self-defense and stand-your-ground laws. And he asks a hard question the state doesn't seem eager to answer: why are they more invested in punishing a desperate father than preventing the next victim? If you're angry, you should be. If you're confused, you're not alone. This is a case where the system looks broken—and very few seem willing to fix it. #ProtectKidsNotPredators #AaronSpencer #TrueCrimeNews #ArkansasDA #HiddenKillers #BobMotta #StandYourGround #JusticeSystemFailure #ProsecutorialInjustice #ChildProtectionNow Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Twenty years after he tried to light the surrounding forests on fire, Japanese pilot Nobuo Fujita returned to Brookings as an honored guest and presented the town with his family's Samurai sword. (Brookings, Curry County; 1960s) (For text and pictures, see https://offbeatoregon.com/1305c-japanese-pilot-fujita-friendship-with-brookings.html)
Devils Den Attacker Andrew McGann, Was Also An Alleged Child Predator With Claims Ignored In this gripping episode, we delve into the chilling case of James Andrew McGann, the 28-year-old suspect in the brutal double homicide at Devil's Den State Park, Arkansas, where he allegedly stabbed a married couple to death in front of their young daughters. But the horror doesn't stop there—McGann, a former elementary school teacher who went by "Drew," faced ignored complaints of inappropriate behavior toward young female students during his brief career. Despite parental reports of him being "very touchy" with girls, placing them on his lap, and making unsettling comments, internal investigations in Texas found no substantiation, allowing him to resign quietly and shuffle between districts in Texas, Oklahoma, and Arkansas without red flags. We expose the systemic failures known as "passing the trash," where schools prioritize avoiding scandal over child safety, enabling potential predators to evade accountability. Featuring interviews with affected parents like Sierra Marcum and insights from experts on educator misconduct, this episode uncovers how warning signs were dismissed, leaving a trail of vulnerability that culminated in tragedy. #DevilsDenHomicide #AndrewMcGann #AllegedPredator #PassingTheTrash #SchoolSystemFailure #TeacherMisconduct #ChildSafety #TrueCrime #ArkansasMurder #IgnoredComplaints #EducatorAccountability #PodcastEpisode Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
Devils Den Attacker Andrew McGann, Was Also An Alleged Child Predator With Claims Ignored In this gripping episode, we delve into the chilling case of James Andrew McGann, the 28-year-old suspect in the brutal double homicide at Devil's Den State Park, Arkansas, where he allegedly stabbed a married couple to death in front of their young daughters. But the horror doesn't stop there—McGann, a former elementary school teacher who went by "Drew," faced ignored complaints of inappropriate behavior toward young female students during his brief career. Despite parental reports of him being "very touchy" with girls, placing them on his lap, and making unsettling comments, internal investigations in Texas found no substantiation, allowing him to resign quietly and shuffle between districts in Texas, Oklahoma, and Arkansas without red flags. We expose the systemic failures known as "passing the trash," where schools prioritize avoiding scandal over child safety, enabling potential predators to evade accountability. Featuring interviews with affected parents like Sierra Marcum and insights from experts on educator misconduct, this episode uncovers how warning signs were dismissed, leaving a trail of vulnerability that culminated in tragedy. #DevilsDenHomicide #AndrewMcGann #AllegedPredator #PassingTheTrash #SchoolSystemFailure #TeacherMisconduct #ChildSafety #TrueCrime #ArkansasMurder #IgnoredComplaints #EducatorAccountability #PodcastEpisode Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Headlines: – Welcome to Mo News (02:00) – National Chocolate Day: Chocolate Price Going Up (02:30) – Michigan Walmart Mass Stabbing Suspect Faces Terrorism Charge (06:40) – Israel Announces Daily Military Pause In Gaza Amid International Pressure, Aid Airdrops Resume (10:00) – U.S. And E.U. Reach Tariff Agreement As Friday Deadline Looms (18:20) – Thailand, Cambodia Set For Ceasefire Talks After Trump's Push (23:00) – Democrats Polling Their Worst With Voters In Decades (24:50) – U.S. Birth Rate Hits All-Time Low (27:30) – Gwyneth Paltrow Hired By Astronomer As Temp Spokesperson After Coldplay KissCam Scandal (33:30) – On This Day In History (35:50) Thanks To Our Sponsors: – LMNT - Free Sample Pack with any LMNT drink mix purchase – Industrious - Coworking office. 30% off day pass – Athletic Greens – AG1 Powder + 1 year of free Vitamin D & 5 free travel packs – Incogni - 60% off an annual plan| Promo Code: MONEWS