POPULARITY
Categories
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
"How many states are there in the United States?" Attackers are actively scanning for LLMs, fingerprinting them using the query How many states are there in the United States? . https://isc.sans.edu/diary/%22How%20many%20states%20are%20there%20in%20the%20United%20States%3F%22/32618 Closing the Door on Net-NTLMv1: Releasing Rainbow Tables to Accelerate Protocol Deprecation Mandiant is publicly releasing a comprehensive dataset of Net-NTLMv1 rainbow tables to underscore the urgency of migrating away from this outdated protocol. https://cloud.google.com/blog/topics/threat-intelligence/net-ntlmv1-deprecation-rainbow-tables Out-of-band update to address issues observed with the January 2026 Windows security update Microsoft has identified issues upon installing the January 2026 Windows security update. To address these issues, an out-of-band (OOB) update was released today, January 17, 2026 https://learn.microsoft.com/en-us/windows/release-health/windows-message-center
What happens when we finally admit that stopping every cyberattack was never realistic in the first place? That is the thread running through this conversation, recorded at the start of the year when reflection tends to be more honest and the noise dial is turned down a little. I was joined by returning guest Raghu Nandakumara from Illumio, nearly three years after our last discussion, to pick up a question that has aged far too well. How do organizations talk about cybersecurity value when breaches keep happening anyway? This episode is less about shiny tools and more about uncomfortable truths. We spend time unpacking why security teams still struggle to show value, why prevention-only thinking keeps setting leaders up for disappointment, and why the conversation is slowly shifting toward resilience and containment. Raghu is refreshingly direct on why reducing cyber risk, rather than chasing impossible guarantees, is the only metric that really holds up under boardroom scrutiny. We also talk about the strange contradiction playing out across industries. Attackers are often using familiar paths like misconfigurations, excessive permissions, and missing patches, yet many organizations still fail to close those gaps. The issue, as Raghu explains, is rarely a lack of tools. It is usually fragmented coverage, outdated processes, and a talent pipeline that blocks capable people from entering the field while claiming there is a skills shortage. One of the most practical parts of this conversation centers on mindset. Instead of asking whether an attacker got in, Raghu argues that leaders should be asking how far they were able to go once inside. That shift alone changes how success is measured, how teams prepare for incidents, and how pressure-filled P1 moments are handled when boards want answers every fifteen minutes. We also touch on how legal action, public claims campaigns, and customer lawsuits are changing the stakes after a breach, forcing executives to rethink how they frame cyber investment. From there, Raghu shares how Illumio has been working with Microsoft to strengthen internal resilience at massive scale, and why visibility and segmentation are becoming harder to ignore. This is a conversation about realism, responsibility, and growing up as an industry. If cybersecurity is really about safety and not slogans, what would you want your organization to stop saying, and what would you rather hear instead? Please feel free to upload the podcast. Here are also the links we discussed on the call: Useful Links Connect with Raghu Nandakumara on LinkedIn and Twitter Learn more about Illumio Lateral Movement in Cyberattacks Illumio Podcast Follow on Facebook, Twitter, LinkedIn, and YouTube Thanks to our sponsors, Alcor, for supporting the show.
Dave Chatterjee, Adjunct Associate Professor at Duke University, explains how scale, speed, and surprise are reshaping cyber threats and why many organizations remain dangerously reactive. He shares his Commitment-Preparedness-Discipline (CPD) framework along with ways that leaders can move beyond checkbox compliance by treating cybersecurity as a strategic business priority. Key Takeaways: The three underestimated AI risks that leaders often overlook, and how AI must be used to defend against AI-driven cyber threats Why deepfake attacks represent a systemic risk at both the individual and organizational levels Practical steps individuals can take to reduce exposure to fraud, impersonation, and data loss How better cybersecurity hygiene creates trust, resilience, and competitive advantage Guest Bio: Dave Chatterjee, Ph.D., is a leading authority on cybersecurity strategy, governance, and AI security. As the creator of the Commitment-Preparedness-Discipline (CPD) framework, he helps organizations worldwide build resilient, high-performance security cultures. His recent work explores the convergence of artificial intelligence, cybersecurity, and business resilience, addressing challenges such as AI exploitation, deepfake manipulation, and the secure integration of intelligent systems. Dr. Chatterjee is the author of "Cybersecurity Readiness: A Holistic and High-Performance Approach" and the cybercrime-themed novel "The DeepFake Conspiracy", which illustrates the emerging risks and ethical dilemmas at the intersection of AI and cyber defense. His thought leadership has appeared in The Wall Street Journal, Forbes, USA Today, Business Insider, California Management Review, Business Horizons, MIS Quarterly, and Journal of Management Information Systems. As host of the acclaimed Cybersecurity Readiness Podcast Series, he has engaged leading practitioners, policymakers, and researchers in discussions on topics such as agentic AI, post-quantum readiness, and AI-driven threat detection. A trusted advisor to Fortune 500 firms and government agencies, Dr. Chatterjee delivers high-impact keynotes and moderates CXO panels worldwide, advancing dialogue on how to turn AI risk into organizational resilience. ---------------------------------------------------------------------------------------- About this Show: The Brave Technologist is here to shed light on the opportunities and challenges of emerging tech. To make it digestible, less scary, and more approachable for all! Join us as we embark on a mission to demystify artificial intelligence, challenge the status quo, and empower everyday people to embrace the digital revolution. Whether you're a tech enthusiast, a curious mind, or an industry professional, this podcast invites you to join the conversation and explore the future of AI together. The Brave Technologist Podcast is hosted by Luke Mulks, VP Business Operations at Brave Software—makers of the privacy-respecting Brave browser and Search engine, and now powering AI everywhere with the Brave Search API. Music by: Ari Dvorin Produced by: Sam Laliberte
A ransomware attack doesn't always announce itself with flashing warnings and locked screens. Sometimes it starts with a quiet system outage, a few unavailable servers, and a sinking realization days later that the threat actors were already inside. This conversation pulls back the curtain on what really happens when an organization believes it's dealing with routine failures only to discover it's facing a full-scale cyber extortion event. My guest today is Zachary Lewis, CIO and CISO for a Midwest university, a 40 Under 40 Business Leader, and a former Nonprofit CISO of the Year. Zachary shares the inside story of a LockBit ransomware attack that unfolded while his team was still building foundational security controls, forcing real-time decisions about recovery, disclosure, negotiations, and whether paying a ransom was even an option. We talk about the shame that keeps many cyber incidents hidden, the emotional weight leaders carry during these moments, and the practical realities that don't show up in tabletop exercises from buying bitcoin to restoring systems when password managers are encrypted. It's an honest, grounded discussion about resilience, preparedness, and why sharing these stories openly may be one of the most important defenses organizations have. Show Notes: [04:05] Zachary Lewis explains why the absence of an immediate ransom note delayed suspicion of an attack. [06:00] The first technical indicators suggest something more serious is unfolding. [07:45] Discovering encrypted hypervisors and realizing recovery won't be straightforward. [09:30] Zachary outlines when data exfiltration became a real concern. [11:05] Receiving the LockBit ransomware note confirms the organization has been compromised. [12:55] The 4:30 a.m. phone call pushes leadership into full crisis mode. [14:40] Zachary reflects on managing fear, responsibility, and decision fatigue mid-incident. [16:20] Executive expectations collide with technical realities during the breach. [18:05] Why "doing most things right" still doesn't guarantee protection. [19:55] Cyber insurance begins shaping early response decisions. [21:35] Bringing in incident response teams and legal counsel under tight timelines. [23:20] Zachary describes working with the FBI and understanding jurisdictional limits. [25:10] What law enforcement can and cannot realistically provide during ransomware events. [26:50] Opening communication channels with the threat actors. [28:35] The psychological pressure behind ransomware negotiations. [30:10] Attacker-imposed timelines force rapid, high-stakes decisions. [31:55] Zachary walks through the practical challenges of acquiring cryptocurrency. [33:40] Why encrypted password managers created unexpected recovery barriers. [35:15] Determining which systems could be restored first—and which could not. [37:00] Lessons learned about backup integrity and offline recovery. [38:45] The importance of clear internal communication during uncertainty. [40:25] Balancing transparency with legal and reputational concerns. [42:10] How staff reactions differed from executive responses. [43:55] Zachary discusses the stigma that keeps many ransomware incidents quiet. [45:40] Why sharing breach stories can strengthen collective defenses. [47:20] MFA gaps and configuration issues exposed by the attack. [49:05] Why tabletop exercises fall short of real-world incidents. [50:50] Long-term security changes made after recovery. [52:30] Zachary offers advice for CISOs facing their first major incident. [54:10] What preparedness really means beyond compliance checklists. [56:00] Why resilience and recovery deserve equal priority. [58:30] Final reflections on leadership, accountability, and learning in public. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Zachary Lewis - The Homesteading CISO Zach Lewis - LinkedIn
Disturbing details have emerged about the MN driver who attacked ICE: She was apparently a part of the "ICE WATCH" groups that tracked and stalked ICE agents. Border Patrol shot two Tren De Aragua gang members who tried to run them over in Portland. Iran's Islamic Regime cut off the internet to attempt to quell the massive protests taking over the country. Marco Rubio jokes that he will NOT be taking the Miami Dolphins Head Coaching job. LIVE CALLS: 631-527-4545 Join UNGOVERNED on LFA TV every MONDAY - FRIDAY from 10am to 11am EASTERN! www.FarashMedia.com www.LFATV.us www.OFPFarms.com www.SLNT.com/SHAWN
CNN has finally lifted its ban on allowing Stephen Miller on to talk about the Trump administration but they may be rethinking it. Miller was in the war room for the Maduro extraction and is obviously the guy who really has Trump's ear. Wait until you hear how it went with Jake Tapper. JD Vance had his home attacked by a rock throwing, hammer swinging psycho named William. He goes by another name but it's not Bill. Trump has lowered the vax schedule for American kids from 72 to 11. Great progress. Hilton hotels has a Bud Light problem on its hands. In sports, Chiefs DC Steve Spagnuola is getting some interest to be a head coach. Bill Self has some younger KU fans crawling all up in his kitchen right now over the Darryn Peterson situation. Texas Tech's new quarterback has a billionaire paying him more in one year than Shadeur Sanders will make with the Cleveland Browns in 4 years. The FCS title game was old school college fun and our Final Final is the end of the monkey business in Prairie Village.
NORDVPN OFFER EXCLUSIVE NordVPN Deal ➼https://nordvpn.com/ftlopm Try it risk-free with their 30-day money-back guarantee CTA: "To get the best discount on your NordVPN plan, go to https://nordvpn.com/ftlopm. Our link gives you 4 extra months on the 2-year plan. No risk with Nord's 30-day money-back guarantee! Please consider as it greatly helps us keep the show on the airhttps://nordvpn.com/ftlopm _____________________________________________________________ Please like and subscribe to our YT channel Special Affiliate Link for Official Aston Villa Merch: aston-villa-store.sjv.io/DVNAYd Special Affiliate Link for KitBag Aston Villa Merch https://kitbag.evyy.net/RyVR1a Gym + Coffee UK Link:https://bit.ly/3Ny1oHU Gym + Coffee Ireland & EU Link: https://bit.ly/3pjVJgL Gym + Coffee AUS & NZ Link: https://bit.ly/3NBHeNs Gym + Coffee US & Rest of World Link: https://bit.ly/3Jz4b2q Follow on Twitter: / lovemcgrathpod Subscribe to our Audio Pod: Apple Podcast: https://t.co/6Vhm3BMLT6 Spotify: https://t.co/ny4xO1w7Lf If you would like to support us please find us on Patreon: / fortheloveofpaulmcgrath Part of the Sport Social Podcast Network https://podcast.sport-social.co.uk/po... For the Love of Paul McGrath is an independent fan channel. Made for Villa fans by Villa fans, FTLoPMcG provides you with the latest Villa transfer news, match previews, match reviews and much more #AVFC #AstonVilla #Transfer #Transferwindow #EPL #UTV Learn more about your ad choices. Visit podcastchoices.com/adchoices
The threat that puts you out of business probably won't look like a movie hack, it'll look like a normal email from your CEO. In this episode of the Registered Investment Advisor Podcast, Seth Greene interviews Scott Alldridge, CEO of IP Services and bestselling author of the VisibleOps series, who explains how modern cybercrime actually works and why most small and mid-sized companies are far more vulnerable than they think. Scott shares real breach stories, including how something as simple as leaving a printer password as “1234” led to a $187,000 theft and forced a firm into a merger. He breaks down why cybersecurity is now a board-level issue, how AI is being weaponized by attackers, and what leaders need to be doing right now to protect their data, their money, and their survival. Key Takeaways: → Most companies think “we're too small to be a target,” but attackers actively go after businesses with as few as 100 employees — and even under $1M in revenue. → Only about 1 in 7 cybersecurity breaches ever gets reported, so what you read in the news is a tiny fraction of what's actually happening. → A single weak password (like “1234” on a networked printer) can give a threat actor a doorway into your entire system. → Attackers don't smash and grab; they sit quietly for weeks or months, watch how you communicate, then imitate leadership to trigger wire transfers that look totally normal. → The “human layer” is still the biggest risk: phishing, social engineering, and reused or weak credentials are where most compromises begin. Scott Alldridge has spent three decades on the frontlines of cyber warfare—turning escalating threats into competitive advantage for business leaders. As co-founder of the IT Process Institute and creator of the globally adopted VisibleOps framework (400,000+ copies sold), he shaped how enterprises worldwide secure and scale technology. His Amazon bestseller, VisibleOps Cybersecurity, is the definitive roadmap for integrating Zero Trust principles into real business results. Today, as CEO of IP Services, one of America's most trusted MSSPs, Scott helps executives verify—not just trust—their cybersecurity posture. Driven by both expertise and altruism, Scott's mission is to ensure businesses of all sizes are resilient and protected—not only to safeguard revenue, but to prevent the devastating personal and professional fallout of cyberattacks. A globally recognized thought leader with 618K+ social media followers, he leverages his platform to raise awareness, share real-world breach stories, and arm leaders with actionable strategies that save companies before it's too late. Connect With Scott: Website: https://ipservices.com/ Instagram: https://www.instagram.com/scottalldridge1/ LinkedIn: https://www.linkedin.com/in/scott-alldridge-1a976/ FREE OFFERSText "Secure25" to 1-541-359-1269 to receive your free Visible Ops Executive Companion book and a free Penetration Scan Test (first 3 listeners only) Learn more about your ad choices. Visit megaphone.fm/adchoices
In this annual Security Squawk tradition, we do two things most people avoid: accountability and predictions. First, we break down the top cyber-attacks of 2025 and translate them into what actually matters for business owners, IT pros, and MSPs. Then we grade our predictions from last year using real outcomes. No excuses. No hand waving. No “well technically.” Why does this episode matter? Because 2025 made one thing painfully clear. Most cyber damage does not come from genius hackers. It comes from predictable failures. Unpatched systems. Over-trusted third parties. Tokens and sessions that live too long. Help desks that can be socially engineered. And organizations that still treat cybersecurity like an IT issue instead of a business survival issue. We start with the Top 10 Cyber-Attacks of 2025 and pull out the patterns hiding behind the headlines. This year's list includes ransomware and extortion campaigns, software supply chain failures, identity and OAuth token abuse, and attacks that caused real operational disruption, not just data exposure. These stories show how attackers scale impact by targeting widely deployed platforms and trusted business tools, then turning that access into downtime, data theft, and brand damage. One of the biggest lessons of 2025 is simple: identity is the new perimeter. Many of the most important incidents were not break-in stories. They were log-in stories. Stolen sessions and OAuth tokens keep working because they let attackers bypass MFA, move quickly, and blend in as legitimate users. If your security strategy is focused only on blocking failed logins, you are watching the wrong signal. 2025 also reinforced how fragile third-party trust has become. Integrations are everywhere. They make businesses faster and more efficient, but they also expand the blast radius. When a third-party tool or service account is compromised, it can become a shortcut into systems that were never directly attacked. In this episode, we talk about practical steps like minimizing access scopes, eliminating unnecessary integrations, shortening token lifetimes, and having a real plan to revoke access when something looks off. We also dig into why on-prem enterprise tools continue to get hammered. Many organizations still run internet-facing platforms that are patched slowly and monitored poorly. Attackers love that combination. In 2025, we saw repeated exploitation of high-value enterprise software where a single weakness led to widespread compromise across industries. If your patching strategy is “we will get to it,” attackers already have. Another major theme this year was operational disruption. Some of the costliest incidents were not just about stolen data. They shut down production, halted sales, broke customer service systems, and created ripple effects across supply chains. That is where executives feel cyber risk the hardest. Data loss hurts. Downtime is a business emergency. Then we grade last year's predictions. Did AI take our jobs? Not even close. What it did do was raise the baseline for both attackers and defenders. AI improved phishing quality, accelerated scams, and forced organizations to confront the risks of adopting new tools without clear controls. We also review our call on token and session-based attacks. That prediction aged well. Identity-layer abuse dominated 2025. The issue was not a lack of MFA. The issue was that attackers did not need to defeat MFA if they could steal what comes after it. We also revisit regulation. It did not arrive all at once. It crept forward. Agencies and lawmakers continued tightening expectations, especially in sectors that keep getting hit. Businesses that wait for mandates before improving controls will pay more later, either through recovery costs, insurance pressure, or lost trust. Finally, we look ahead to 2026 with new predictions that are probable, not obvious. We discuss what is likely to change around identity, help desk security, SaaS governance, and how leaders measure cyber readiness. The short version is this: 2026 will reward companies that treat access as a living system and punish those that treat it like a one-time setup. If you like the show, help us grow it. Subscribe, leave a review, and share this episode with someone who still thinks cybersecurity is just antivirus and a firewall. And if you want to support the podcast directly, buy me a coffee at buymeacoffee.com/securitysquawk.
In this episode, Brad and Spencer from SecurIT360's Offensive Security group delve into the crucial reconnaissance phase attackers undertake before launching an attack. They discuss the real-world impact of seemingly harmless data leaks, how attackers chain them together to build a profile of your organization, and common misconceptions about what data is truly "sensitive" from an external attacker's perspective. Learn how organizations can realistically assess their external attack surface beyond automated scanning and discover creative OSINT techniques defenders can use to mimic attacker reconnaissance.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.
Hewlett Packard Enterprise patches a maximum-severity vulnerability in its OneView infrastructure management software. Cisco warns a critical zero-day is under active exploitation. An emergency Chrome update fixes two high-severity vulnerabilities. French authorities make multiple arrests. US authorities dismantle an unlicensed crypto exchange accused of money laundering. SonicWall highlights an exploited zero-day. Researchers earn $320,000 for demonstrating critical remote code execution flaws in cloud infrastructure components. A U.S. Senator urges electronic health record vendors to give patients greater control over who can access their medical data. Our guest is Larry Zorio, CISO from Mark43, discussing first responders and insider cyber risks. A right-to-repair group puts cash on the table. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Larry Zorio, CISO from Mark43, to discuss first responders sounding the alarm on insider cyber risks. To see the full report, check it out here. Selected Reading HPE warns of maximum severity RCE flaw in OneView software (Bleeping Computer) China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear (SecurityWeek) Google Chrome patches two high severity vulnerabilities in emergency update (Beyond Machines) France arrests 22-year-old over Interior Ministry hack (The Record) France arrests Latvian for installing malware on Italian ferry (Bleeping Computer) FBI dismantles alleged $70M crypto laundering operation (The Register) SonicWall Patches Exploited SMA 1000 Zero-Day (SecurityWeek) Zeroday Cloud hacking event awards $320,0000 for 11 zero days (Bleeping Computer) Senator Presses EHR Vendors on Patient Privacy Controls (Govinfosecurity) A nonprofit is paying hackers to unlock devices companies have abandoned (TechSpot) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Gregory Copley details how the Bondi Beach attackers trained in the Philippines' insurgent areas. While praising Australian intelligence agencies, he blames the Albanese government for encouraging anti-Israel sentiment, arguing this political stance has given license to radical groups and undermined public safety. 1929 PERTHB
In this episode, we discuss Saturday Night's Main Event, Monday Night Raw on Netflix, Mick Foley and WWE Relationship news, the mystery attacker reveal let down, and the rest of the day's news.Don't Forget to Support Our Sponsors:3WA - www.wwwawrestling.comSketchy People - Available now at thegamecrafter.comWrestler Unstoppable - available exclusively through Facebook!Become a supporter of this podcast: https://www.spreaker.com/podcast/fro-wrestling-podcast--2103073/support.
Naveed Akram, who carried out the attack with his father, has emerged from a coma after being shot by the police. Police said investigators expect to question the son once medication wears off and legal counsel is present.
Cyber attacks are no longer a future problem or a Silicon Valley issue. They are happening right now across the United States, quietly and relentlessly, targeting local governments, public agencies, schools, police departments, fire services, and critical infrastructure that most people rely on every day. In this episode of the Security Squawk Podcast, we break down the uncomfortable truth about the current cyber threat landscape and why much of it is flying under the radar. We start with a major data breach involving 700Credit, a financial services company widely used by car dealerships across the country. The breach impacted an estimated 5.8 million consumers, exposing sensitive personal information including names, addresses, birth dates, and Social Security numbers. What makes this incident especially troubling is that it originated through a third-party integration and went undetected until it was too late. This is a textbook example of how supply chain risk, weak API oversight, and poor third-party visibility continue to plague organizations of all sizes. For business owners, IT leaders, and managed service providers, this breach highlights a critical lesson. Security controls inside your own environment are meaningless if your partners, vendors, or integrations are not held to the same standard. Attackers know this, and they are exploiting it aggressively. Next, we shift to a growing and deeply concerning trend involving nation-state threat actors, particularly Russian-backed groups targeting network edge devices. Firewalls, VPN appliances, routers, and other edge infrastructure are now prime targets because they offer direct access to internal networks and often remain poorly monitored or improperly configured. These attacks are not always sophisticated zero-day exploits. In many cases, they succeed because of exposed management interfaces, outdated firmware, or weak credentials. This matters because edge devices sit at the front door of nearly every organization. Once compromised, they allow attackers to persist quietly, move laterally, and stage future attacks without triggering traditional endpoint defenses. The takeaway is clear. If you are not actively inventorying, patching, and monitoring your edge infrastructure, you are already behind. Then we pull the lens back even further and focus on what may be the most underreported cyber crisis happening today. Public sector organizations across the United States are under sustained cyber attack. Cities, towns, school districts, emergency services, and municipal agencies are being hit week after week. These incidents rarely make national headlines. Instead, they show up in small local news outlets, if they are reported at all. We discuss a real-world incident in Attleboro, Massachusetts, where a cybersecurity event disrupted online municipal services and briefly appeared on local television. Stories like this are happening everywhere. From ransomware attacks that shut down city services to breaches that expose resident data, public organizations are being targeted because attackers know they are often underfunded, understaffed, and slow to recover. Using data from ransomware.live and other tracking resources, we highlight how widespread these attacks really are. Thousands of U.S.-based victims are logged publicly, many of them tied to government or quasi-government entities. This is not random. It is a calculated strategy by cybercriminals who understand the pressure public agencies face to restore services quickly, often making them more likely to pay ransoms or quietly rebuild without public disclosure. Throughout the episode, we connect these stories to practical lessons for businesses, MSPs, and IT professionals. Cybersecurity is no longer about preventing every breach. It is about resilience, visibility, and response. It is about understanding where your real risk lies and taking proactive steps before an incident forces your hand. If you work in IT, run an MSP, manage infrastructure, or support public organizations, this episode delivers insight you can use immediately. We cut through the noise, skip the fear marketing, and focus on what actually matters in today's threat environment. Security Squawk exists to make cybersecurity real, relevant, and actionable. If this episode brings value to you, please subscribe, leave a review, and share it with someone who needs to hear it. And if you want to support the show directly, the easiest way is to buy us a coffee at https://buymeacoffee.com/securitysquawk Your support helps us keep producing honest conversations about the threats most people never see until it's too late.
Australian police say one of the Bondi attackers, Sajid Akram, was an Indian citizen. He and his son Naveed spent weeks in the Philippines, where there's been a long-running Islamist insurgency, before Sunday's deadly attack on a Jewish festival. Also: millions are at risk of starvation in Afghanistan this winter; peace talks continue in Berlin aimed at ending the Russia-Ukraine war; and the US says it has carried out more strikes on boats it suspects of trafficking drugs in the Pacific Ocean. The Global News Podcast brings you the breaking news you need to hear, as it happens. Listen for the latest headlines and current affairs from around the world. Politics, economics, climate, business, technology, health – we cover it all with expert analysis and insight. Get the news that matters, delivered twice a day on weekdays and daily at weekends, plus special bonus episodes reacting to urgent breaking stories. Follow or subscribe now and never miss a moment. Get in touch: globalpodcast@bbc.co.uk
In this episode of Security Matters, host David Puner welcomes back David Higgins, senior director in CyberArk's Field Technology Office, for a timely conversation about the evolving cyber threat landscape. Higgins explains why today's attackers aren't breaking in—they're logging in—using stolen credentials, AI-powered social engineering, and deepfakes to bypass traditional defenses and exploit trust.The discussion explores how the rise of AI is eroding critical thinking, making it easier for even seasoned professionals to fall for convincing scams. Higgins and Puner break down the dangers of instant answers, the importance of “never trust, always verify,” and why zero standing privilege is essential for defending against insider threats. They also tackle the risks of shadow AI, the growing challenge of misinformation, and how organizations can build a culture of vigilance without creating a climate of mistrust.Whether you're a security leader, IT professional, or just curious about the future of digital trust, this episode delivers actionable insights on identity security, cyber hygiene, and the basics that matter more than ever in 2026 and beyond.
A Hanukkah celebration in Sydney became a massacre and the panel on The Quad says this was no accident, no mystery and no coincidence. As at least 15 Jews are murdered at Bondi Beach, the slogan “Globalize the Intifada” is exposed for what it really is: a call to violence with real blood on its hands. The panel connects the dots between jihadist ideology, Western denial, media propaganda and the systematic failure of governments to protect Jewish communities. If you still think these chants are “just rhetoric,” this conversation will change your mind.
US turns to private firms in cyber offensive Microsoft updates cause queuing failures Phishing campaign delivers Phantom stealer Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Attackers don't need malware anymore; they need trust. Tip: set a simple passphrase for high-risk actions, like wire requests or "urgent" account recovery – especially within finance teams and families. If the caller can't answer it, pause and verify. Adaptive runs deepfake and vishing simulations so employees practice this before it's real. Learn more at adaptivesecurity.com.
Greg Brady spoke to Imam Mohamad Tawhidi, Governing Member of the Global Imams Council about Bondi gunmen inspired by ISIS, travelled to Philippines, Australia police say. Learn more about your ad choices. Visit megaphone.fm/adchoices
As Australia mourn the victims of a shooting, during a Jewish holiday gathering at Bondi Beach, its prime minister pledges solidarity.Anthony Albanese says the attackers were not part of a terror cell, but "clearly, they were motivated by this extremist ideology". The father of a Syrian bystander who was filmed wrestling a gun off an attacker has told the BBC he was driven by "conscience and humanity"Also in the programme: Ukraine's President Zelensky comes under more pressure to compromise at peace talks in Berlin, Chile elects a far-right leader who is an admirer of the dictator, Augusto Pinochet, and police in Los Angeles investigate the suspected murder of the celebrated Hollywood director, Rob Reiner.(Photo shows Australian prime minister Anthony Albanese speaks to the media during a press conference in Sydney, Australia on 15 December 2025. Credit: Steven Markham/EPA)
AP correspondent Donna Warder has an update on the killing of three U.S. citizens in Syria.
Attackers hit React defect as researchers quibble over proof
CISA warns that pro-Russia hacktivist groups are targeting US critical infrastructure. Google patches three new Chrome zero-day vulnerabilities. North Korean actors exploit React2Shell to deploy a new backdoor. Researchers claim Docker Hub secret leakage is now a systemic problem. Attackers exploit an unpatched zero-day in Gogs, the self-hosted Git service. IBM patches more than 100 vulnerabilities across its product line. Storm-0249 abuses endpoint detection and response tools. The DOJ indicts a former Accenture employee for allegedly misleading federal customers about cloud security. Our guest is Kavitha Mariappan, Chief Transformation Officer at Rubrik, talking about understanding & building resilience against identity-driven threats. A malware tutor gets schooled by the law. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On today's Industry Voices segment, we are joined by Kavitha Mariappan, Chief Transformation Officer at Knowledge Partner Rubrik, talking about understanding and building resilience against identity-driven threats. Tune into Kavitha's full conversation here. New Rubrik Research Finds Identity Resilience is Imperative as AI Wave Floods the Workplace with AI Agents (Press release) The Identity Crisis: Understanding and Building Resilience Against Identity-Driven Threats (Report) Agentic AI and Identity Sprawl (Data Security Decoded podcast episode) Host Caleb Tolin and guest Joe Hladik, Head of Rubrik Zero Labs, to unpack the findings from their the report Kavitha addresses. Resources: Rubrik's Data Security Decoded podcast airs semi-monthly on the N2K CyberWire network with host Caleb Tolin. You can catch new episodes twice a month on Tuesdays on your favorite podcast app. Selected Reading CISA: Pro-Russia Hacktivists Target US Critical Infrastructure New cybersecurity guidance paves the way for AI in critical infrastructure | CyberScoop Google Releases Critical Chrome Security Update to Address Zero-Days - Infosecurity Magazine North Korea-linked ‘EtherRAT' backdoor used in React2Shell attacks | SC Media Thousands of Exposed Secrets Found on Docker Hub - Flare Hackers exploit unpatched Gogs zero-day to breach 700 servers IBM Patches Over 100 Vulnerabilities - SecurityWeek Ransomware IAB abuses EDR for stealthy malware execution US charges former Accenture employee with misleading feds on cloud platform's security - Nextgov/FCW Man gets jail for filming malware tutorials for syndicate; 129 Singapore victims lost S$3.2m - CNA Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
This episode is presented by Create A Video – The accused murderer of Ukrainian refugee Iryna Zarutska made his first court appearance this morning. He will continue to be held with no bond. Subscribe to the podcast at: https://ThePetePod.com/ All the links to Pete's Prep are free: https://patreon.com/petekalinershow Media Bias Check: GroundNews promo code! Advertising and Booking inquiries: Pete@ThePeteKalinerShow.com Get exclusive content here!: https://thepetekalinershow.com/See omnystudio.com/listener for privacy information.
The Trump Administration’s new National Security Strategy and the debate on isolationism versus interventionism. The clashes between protestors and Immigration and Customs Enforcement (ICE) agents. Erika Kirk’s recent comments on those who are attacking Turning Point USA in the wake of the assassination of her husband three months ago. Historian Victor Davis Hanson’s New York Post piece, “Citizens are fed up with Dem-invited migrants who have disdain for US law and culture.”See omnystudio.com/listener for privacy information.
This episode is presented by Create A Video – The criminal illegal alien who stabbed a man on Charlotte's light rail train last week was cited for carrying a knife at a train station back in October. He was given a citation and released. Subscribe to the podcast at: https://ThePetePod.com/ All the links to Pete's Prep are free: https://patreon.com/petekalinershow Media Bias Check: GroundNews promo code! Advertising and Booking inquiries: Pete@ThePeteKalinerShow.com Get exclusive content here!: https://thepetekalinershow.com/See omnystudio.com/listener for privacy information.
Ransomware payments pass $4.5 billion Cybercrime networks orchestrate real-world violence Three arrested over possessing hacking tools Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Attackers don't need malware anymore; they need trust. Tip: set a simple passphrase for high-risk actions, like wire requests or "urgent" account recovery – especially within finance teams and families. If the caller can't answer it, pause and verify. Adaptive runs deepfake and vishing simulations so employees practice this before it's real. adaptivesecurity.com.
Attackers don't take holidays off. In this December Patch Tuesday episode, the Automox security team breaks down three high-impact vulnerabilities landing at the end of 2025. Ryan, Mat, and Seth unpack the React2Shell RCE hitting React Server Components, an Azure Monitor Agent flaw that turns the syslog user into a stealthy foothold, and a Windows File Explorer bug where a single click may trigger privilege escalation.You'll hear why light patch months aren't always low-risk, how bundled dependencies can expose you even if you don't “use” React, and why log pipelines remain a prime target for attackers looking to hide their tracks. The team also covers seasonal phishing trends and what to expect as skeleton crews head into the holidays.
Megyn Kelly is joined by Chamath Palihapitiya, co-host of the “All-In” podcast, to discuss the state of the Trump administration as 2025 comes to an end, ways he can focus on fixing the economy for different groups of Americans, what his plans should be ahead of the 2026 midterms, the viral clip about rich tech wives who focus on fighting for equity and climate change, whether they could better serve society by taking on other sorts of jobs, bombshell new reporting about the dangers of COVID vaccines, a potential cover-up of COVID vaccine-related deaths in children, and more. Then Dave Aronberg and Phil Holloway, MK True Crime contributors, join to discuss the Fani Willis criminal case against Trump officially ending, the drama of the case and how Ashleigh Merchant helped bring down Willis, the January 6 pipe bomber mystery, the Blaze report that's getting major pushback now, Will Smith's alleged friend suing Jada Pinkett Smith for millions, the wild lawsuit allegations, and more. Then NYU students Amelia Lewis and Summer Armstrong join to discuss the assault against Amelia on the street in NYC in broad daylight, how Summer helped find the video footage, the way Megyn and the X community helped get the alleged assailant arrested, his lengthy rap sheet, and more. Palihapitiya- https://x.com/chamathAronberg- https://substack.com/@davearonbergHolloway- https://x.com/PhilHollowayEsqLewis- https://www.tiktok.com/@amelia.lewis506 Subscribe to MK True Crime:Apple: https://podcasts.apple.com/us/podcast/mk-true-crime/id1829831499Spotify: https://open.spotify.com/show/4o80I2RSC2NvY51TIaKkJWYouTube: https://www.youtube.com/@MKTrueCrime?sub_confirmation=1Social: http://mktruecrime.com/ Geviti: Go to https://gogeviti.com/megynand get 20% off with code MEGYN.Tax Network USA: Call 1-800-958-1000 or visit https://TNUSA.com/MEGYNto speak with a strategist for FREE todaySelectQuote: Get the right life insurance for YOU, for LESS. Save more than 50% at https://selectquote.com/MEGYN Follow The Megyn Kelly Show on all social platforms:YouTube: https://www.youtube.com/MegynKellyTwitter: http://Twitter.com/MegynKellyShowInstagram: http://Instagram.com/MegynKellyShowFacebook: http://Facebook.com/MegynKellyShow Find out more information at:https://www.devilmaycaremedia.com/megynkellyshow Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Jesse Kelly honors the fallen on this edition of I'm Right following a horrific attack on America's National Guard. Who is truly responsible? Jesse breaks that down alongside Julio Rosas. This comes as the Democrats are working overtime to run an operation to get a key Trump official fired. What does it have to do with Venezuela? Jesse brings on Ammon Blair to discuss that and more. I'm Right with Jesse Kelly on The First TVMasa Chips: Ready to give MASA or Vandy a try? Get 25% off your first order by going to http://masachips.com/JESSETV and using code JESSETV. Beam: Visit https://shopbeam.com/JESSEKELLY and use code JESSEKELLY to get our exclusive discount of up to 40% off. Choq: Visit https://choq.com/jessetv for a 17.76% discount on your CHOQ subscription for lifeFollow The Jesse Kelly Show on YouTube: https://www.youtube.com/@TheJesseKellyShowSee omnystudio.com/listener for privacy information.
How The Afghan Attacker Could Have Been Stopped by Ron Paul Liberty Report
The case that shocked the country just took an even darker turn. New details have emerged about who Morgan Geyser escaped with, how she was able to break free from a supposedly supervised group home, and the massive systemic failures that let her travel across state lines before anyone realized she was gone. What we're learning now raises disturbing questions about supervision, risk assessment, and why someone with her violent history was ever placed in a neighborhood without warning. Tonight, we break down everything that's happened since her capture in Illinois — including the surprising statements from the man found with her. He claims she fled “because of him,” revealing a relationship that should never have been allowed in the first place. We examine what this connection tells us about her mindset, the breakdown of boundaries in her supervised release, and how a person once committed after a delusion-fueled attack was able to form this kind of attachment without the system catching it. We walk through the escape minute-by-minute: • The GPS monitor alert labeled as a “malfunction.” • The hours-long delay before anyone checked her location. • The missing-person report not reaching police until the next morning. • And the capture behind a truck stop more than 150 miles away. We look at what investigators have uncovered, what the group home missed, and why the Department of Corrections treated a tamper alert like a tech glitch instead of a high-risk event. And then — what happens next. Geyser has waived extradition. Wisconsin is preparing to take her back. Her conditional release is on the brink of being revoked. Multiple agencies are now under scrutiny, and lawmakers are already pushing for major changes to how high-risk supervised releases are handled. This isn't just an escape. It's a case study in how optimism, secrecy, and blind spots can collide in ways that put entire communities at risk. And it's a story that's far from over. Join us as we dig into the timeline, the failures, the psychology, and the fallout. #MorganGeyser #SlenderManCase #HiddenKillers #TrueCrimeNews #Wisconsin #CrimeAnalysis #JusticeSystem #PublicSafety #TrueCrimeToday #CrimeUpdates Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
The case that shocked the country just took an even darker turn. New details have emerged about who Morgan Geyser escaped with, how she was able to break free from a supposedly supervised group home, and the massive systemic failures that let her travel across state lines before anyone realized she was gone. What we're learning now raises disturbing questions about supervision, risk assessment, and why someone with her violent history was ever placed in a neighborhood without warning. Tonight, we break down everything that's happened since her capture in Illinois — including the surprising statements from the man found with her. He claims she fled “because of him,” revealing a relationship that should never have been allowed in the first place. We examine what this connection tells us about her mindset, the breakdown of boundaries in her supervised release, and how a person once committed after a delusion-fueled attack was able to form this kind of attachment without the system catching it. We walk through the escape minute-by-minute: • The GPS monitor alert labeled as a “malfunction.” • The hours-long delay before anyone checked her location. • The missing-person report not reaching police until the next morning. • And the capture behind a truck stop more than 150 miles away. We look at what investigators have uncovered, what the group home missed, and why the Department of Corrections treated a tamper alert like a tech glitch instead of a high-risk event. And then — what happens next. Geyser has waived extradition. Wisconsin is preparing to take her back. Her conditional release is on the brink of being revoked. Multiple agencies are now under scrutiny, and lawmakers are already pushing for major changes to how high-risk supervised releases are handled. This isn't just an escape. It's a case study in how optimism, secrecy, and blind spots can collide in ways that put entire communities at risk. And it's a story that's far from over. Join us as we dig into the timeline, the failures, the psychology, and the fallout. #MorganGeyser #SlenderManCase #HiddenKillers #TrueCrimeNews #Wisconsin #CrimeAnalysis #JusticeSystem #PublicSafety #TrueCrimeToday #CrimeUpdates Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
One National Guard member is dead and another is fighting for his life after an ambush-style attack in the nation's capital. Authorities say they plan to seek the death penalty against the suspect. Meanwhile, President Trump is pausing all immigration from dozens of countries in the wake of the attack. Also on this morning's show: New information is emerging from the devastating fire in Hong Kong as the death toll there continues to climb ... Trump threatens Venezuela, telling US troops a land attack could come very soon ... US negotiators head to Moscow amid new warnings from Vladimir Putin against telling Ukraine. Learn more about your ad choices. Visit podcastchoices.com/adchoices
This is the story Wisconsin never wanted to explain — how the girl who nearly took a child's life in the infamous Slender Man attack was quietly moved into a suburban neighborhood, supervised by nothing more than a plastic ankle monitor, and somehow slipped across state lines with a grown man before anyone sounded the alarm. Tonight, we're taking you through the full timeline of how Morgan Geyser — the attacker in the Slender Man stabbing — went from a secure psychiatric institution to a residential street in Madison. Not because she “served her time,” but because judges, doctors, and state agencies convinced themselves she was ready for “community reintegration,” despite red flags that would stop any other case in its tracks. We dig into the decisions that opened the door: • The court rulings that shifted her from a locked facility to a group home. • The warnings about disturbing reading material and troubling outside contacts. • The placement that got scrapped after residents found out who was coming. • The next placement, quietly sealed by the court to avoid public backlash. • The neighborhood full of families who had no idea she had moved in. • And the ankle-monitor alert that DOC brushed off as a “device glitch” while she walked freely into the night. And then — the escape. A missing GPS signal. A 12-hour communication delay. A 42-year-old man by her side. And a capture behind a truck stop in Illinois after officers realized the woman they found didn't want to say her name because she'd “done something really bad.” This isn't just a story about an escape. It's a story about a system that trusted a fragile treatment plan more than it trusted the memory of what she had already done. It's about the gap between courtroom optimism and real-world danger. And it's about how the people most affected — the victim's family, the neighbors, and the public — were kept in the dark until everything fell apart. If you've ever wondered how someone with a violent, delusion-driven history ends up living quietly next to families with no warning, this breakdown will answer that — and raise questions Wisconsin will be forced to confront. #SlenderManCase #MorganGeyser #TrueCrimeNews #HiddenKillers #CrimeAnalysis #JusticeSystem #Wisconsin #CrimeBreakdown #PublicSafety #TrueCrimeToday Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
This is the story Wisconsin never wanted to explain — how the girl who nearly took a child's life in the infamous Slender Man attack was quietly moved into a suburban neighborhood, supervised by nothing more than a plastic ankle monitor, and somehow slipped across state lines with a grown man before anyone sounded the alarm. Tonight, we're taking you through the full timeline of how Morgan Geyser — the attacker in the Slender Man stabbing — went from a secure psychiatric institution to a residential street in Madison. Not because she “served her time,” but because judges, doctors, and state agencies convinced themselves she was ready for “community reintegration,” despite red flags that would stop any other case in its tracks. We dig into the decisions that opened the door: • The court rulings that shifted her from a locked facility to a group home. • The warnings about disturbing reading material and troubling outside contacts. • The placement that got scrapped after residents found out who was coming. • The next placement, quietly sealed by the court to avoid public backlash. • The neighborhood full of families who had no idea she had moved in. • And the ankle-monitor alert that DOC brushed off as a “device glitch” while she walked freely into the night. And then — the escape. A missing GPS signal. A 12-hour communication delay. A 42-year-old man by her side. And a capture behind a truck stop in Illinois after officers realized the woman they found didn't want to say her name because she'd “done something really bad.” This isn't just a story about an escape. It's a story about a system that trusted a fragile treatment plan more than it trusted the memory of what she had already done. It's about the gap between courtroom optimism and real-world danger. And it's about how the people most affected — the victim's family, the neighbors, and the public — were kept in the dark until everything fell apart. If you've ever wondered how someone with a violent, delusion-driven history ends up living quietly next to families with no warning, this breakdown will answer that — and raise questions Wisconsin will be forced to confront. #SlenderManCase #MorganGeyser #TrueCrimeNews #HiddenKillers #CrimeAnalysis #JusticeSystem #Wisconsin #CrimeBreakdown #PublicSafety #TrueCrimeToday Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Canadian journalist Nora Loreto reads the latest headlines for Wednesday, November 26, 2025.TRNN has partnered with Loreto to syndicate and share her daily news digest with our audience. Tune in every morning to the TRNN podcast feed to hear the latest important news stories from Canada and worldwide.Find more headlines from Nora at Sandy & Nora Talk Politics podcast feed.Become a supporter of this podcast: https://www.spreaker.com/podcast/the-real-news-podcast--2952221/support.Help us continue producing radically independent news and in-depth analysis by following us and becoming a monthly sustainer.Follow us on:Bluesky: @therealnews.comFacebook: The Real News NetworkTwitter: @TheRealNewsYouTube: @therealnewsInstagram: @therealnewsnetworkBecome a member and join the Supporters Club for The Real News Podcast today!
The Slender Man case is back in the headlines for all the wrong reasons — and the questions raised this time are even more unsettling than the original crime. Morgan Geyser, one of the two girls responsible for the near-fatal 2014 Slender Man stabbing, walked out of a Wisconsin group home after cutting off her GPS monitor… and made it all the way to Illinois before anyone finally put a stop to it. Tonight, we break down how this even happened. Because if you think the system learned its lesson after the horror of that attack, think again. We trace the full timeline — from the original case, to the insanity rulings, to the step-downs from secure psychiatric care, to the judge's continued leniency despite red flags about violent material and questionable outside contacts. Then we examine the part that has people furious: how someone with this history was placed in a low-security setting with nothing more than a strap of plastic around her ankle standing between the public and another potential tragedy. This isn't fear-mongering. It's a real look at what happens when the legal system bends over backward to “treat” a violent offender while forgetting that protection of the public is supposed to come first. It's also a look at why the more extreme the delusions behind a violent act, the faster the system seems to nudge toward reintegration — instead of building genuine safeguards. Morgan Geyser is back in custody. But this is a wake-up call for Wisconsin, and honestly, for the entire country. When someone who committed one of the most disturbing attacks of the last decade can just walk out of supervised care and vanish across state lines, the problem isn't the individual — it's the system that allowed it. Join us as we break down what went wrong, how it could've been prevented, and why this case feels far too close to a real-life horror movie. #SlenderManCase #MorganGeyser #TrueCrimeNews #HiddenKillers #Wisconsin #JusticeSystem #CrimeAnalysis #PublicSafety #CrimeStories #TrueCrimeToday Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
The Slender Man case is back in the headlines for all the wrong reasons — and the questions raised this time are even more unsettling than the original crime. Morgan Geyser, one of the two girls responsible for the near-fatal 2014 Slender Man stabbing, walked out of a Wisconsin group home after cutting off her GPS monitor… and made it all the way to Illinois before anyone finally put a stop to it. Tonight, we break down how this even happened. Because if you think the system learned its lesson after the horror of that attack, think again. We trace the full timeline — from the original case, to the insanity rulings, to the step-downs from secure psychiatric care, to the judge's continued leniency despite red flags about violent material and questionable outside contacts. Then we examine the part that has people furious: how someone with this history was placed in a low-security setting with nothing more than a strap of plastic around her ankle standing between the public and another potential tragedy. This isn't fear-mongering. It's a real look at what happens when the legal system bends over backward to “treat” a violent offender while forgetting that protection of the public is supposed to come first. It's also a look at why the more extreme the delusions behind a violent act, the faster the system seems to nudge toward reintegration — instead of building genuine safeguards. Morgan Geyser is back in custody. But this is a wake-up call for Wisconsin, and honestly, for the entire country. When someone who committed one of the most disturbing attacks of the last decade can just walk out of supervised care and vanish across state lines, the problem isn't the individual — it's the system that allowed it. Join us as we break down what went wrong, how it could've been prevented, and why this case feels far too close to a real-life horror movie. #SlenderManCase #MorganGeyser #TrueCrimeNews #HiddenKillers #Wisconsin #JusticeSystem #CrimeAnalysis #PublicSafety #CrimeStories #TrueCrimeToday Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.” See omnystudio.com/listener for privacy information.
23-year-old Morgan Geyser has spent the past decade in a mental facility after stabbing her friend and classmate 19 times at the age of 12. Geyser’s story made international headlines after it was revealed that she and another 6th grader lured and attempted to murder their friend to impress a fictional online character “Slenderman” whom they believed to be real. On Sunday, Geyser was found with a 42-year-old man more than 100 miles away just months after being moved to a group home. Geyser fled the home by cutting off her ankle monitor this weekend, after prosecutors had warned the court earlier this year that she was having “violent conversations” with a man outside the facility.See omnystudio.com/listener for privacy information.
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.” See omnystudio.com/listener for privacy information.
23-year-old Morgan Geyser has spent the past decade in a mental facility after stabbing her friend and classmate 19 times at the age of 12. Geyser’s story made international headlines after it was revealed that she and another 6th grader lured and attempted to murder their friend to impress a fictional online character “Slenderman” whom they believed to be real. On Sunday, Geyser was found with a 42-year-old man more than 100 miles away just months after being moved to a group home. Geyser fled the home by cutting off her ankle monitor this weekend, after prosecutors had warned the court earlier this year that she was having “violent conversations” with a man outside the facility.See omnystudio.com/listener for privacy information.
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.” See omnystudio.com/listener for privacy information.
23-year-old Morgan Geyser has spent the past decade in a mental facility after stabbing her friend and classmate 19 times at the age of 12. Geyser’s story made international headlines after it was revealed that she and another 6th grader lured and attempted to murder their friend to impress a fictional online character “Slenderman” whom they believed to be real. On Sunday, Geyser was found with a 42-year-old man more than 100 miles away just months after being moved to a group home. Geyser fled the home by cutting off her ankle monitor this weekend, after prosecutors had warned the court earlier this year that she was having “violent conversations” with a man outside the facility.See omnystudio.com/listener for privacy information.
23-year-old Morgan Geyser has spent the past decade in a mental facility after stabbing her friend and classmate 19 times at the age of 12. Geyser’s story made international headlines after it was revealed that she and another 6th grader lured and attempted to murder their friend to impress a fictional online character “Slenderman” whom they believed to be real. On Sunday, Geyser was found with a 42-year-old man more than 100 miles away just months after being moved to a group home. Geyser fled the home by cutting off her ankle monitor this weekend, after prosecutors had warned the court earlier this year that she was having “violent conversations” with a man outside the facility.See omnystudio.com/listener for privacy information.
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.” See omnystudio.com/listener for privacy information.
Alex Berninger, Senior Manager of Intelligence at Red Canary, and Mike Wylie, Director, Threat Hunting at Zscaler, join to discuss four phishing lures in campaigns dropping RMM tools. Red Canary and Zscaler uncovered phishing campaigns delivering legitimate remote monitoring and management (RMM) tools—like ITarian, PDQ, SimpleHelp, and Atera—to gain stealthy access to victim systems. Attackers used four main lures (fake browser updates, meeting invites, party invitations, and fake government forms) and often deployed multiple RMM tools in quick succession to establish persistent access and deliver additional malware. The report highlights detection opportunities, provides indicators of compromise, and stresses the importance of monitoring authorized RMM usage, scrutinizing trusted services like Cloudflare R2, and enforcing strict network and endpoint controls. The research can be found here: You're invited: Four phishing lures in campaigns dropping RMM tools Learn more about your ad choices. Visit megaphone.fm/adchoices