POPULARITY
Categories
Independent investigative journalism, broadcasting, trouble-making and muckraking with Brad Friedman of BradBlog.com
All Okta customers exposed in breach JAXA hit by cyberattack OpenAI's chatbots leak secrets Huge thanks to our sponsor, SpyCloud For some people ignorance is bliss – but that's not an option for those of us in cybersecurity. SpyCloud has a free tool that lets you check your company's darknet exposure, and you might find some things that are pretty alarming. Go to spycloud.com/ciso to see your company's exposure from data breaches and even infostealer malware infections that can open the door to ransomware. SpyCloud's focus is helping businesses act on what criminals are using right now to target them – addressing stolen passwords, cookies, and even API keys automatically to stop criminals in their tracks. To learn more and get your darknet exposure report, go to spycloud.com/ciso.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is sponsored by KnowBe4. To learn more about our sponsor, visit https://knowbe4.com • For more breaking news, visit https://cybercrimewire.com
We're bringing the Legal Briefs back. This is a bite-sized episode on a portion of a case, a hot pleading, a trending news topic, or a legal concept. This week's is about two motions Beauty Lab + Laser filed against Monica to seek a judgment on their Breach of Contract claim and knock Monica's counterclaims out of the case.Access our Patreon, Instagram, Website, YouTube, and more here: zez.am/thebravodocket The Bravo Docket podcast, the statements we make whether in our own media or elsewhere, and any content we post are for entertainment purposes only and do not provide legal advice. Any party consuming our information should consult a lawyer for legal advice. The podcast, our opinions, and our posts, are our own and are not associated with our employers, Bravo TV, or any other television network. Become a member at https://plus.acast.com/s/thebravodocket. Hosted on Acast. See acast.com/privacy for more information.
Sadly, the governments of the Western World have lost much of their credibility as a result of sharing tremendous amounts of misinformation, cherry-picked data, and even bald-faced lies. Outside of those who refuse to think for themselves or are ideologically driven to delusion, many people are coming to the realization that much of what the government and their sycophants in the mainstream media are telling them is falsehoods. Can we ever trust them again? Have they permanently broken “trust” with us? Now, do you believe in this ministry? If you do, you can keep us on the air as a radio program and as a podcast by visiting our website, https://truth2ponder.com/support. You can also mail a check payable to Ancient Word Radio, P.O. Box 510, Chilhowie, VA 24319. Thank you in advance for your faithfulness to this ministry. --- Send in a voice message: https://podcasters.spotify.com/pod/show/truth-to-ponder/message Support this podcast: https://podcasters.spotify.com/pod/show/truth-to-ponder/support
Should businesses be worried about the AI security threat? How do we protect our children's devices from malware? We dive into all that and more in Watchtower Weekly. Plus, we sat-down with Jason and Nimisha from Datadog to discuss some of the challenges of securing the cloud and why it's important to get cloud security right. We also unveil a new 1Password SIEM integration with Datadog that gives you greater visibility into the security posture of your business, all from one central location!
In this extended bonus episode of The Business of Tech, host Dave speaks with Robert Chiaffi, an MSP who experienced the Kaseya breach. They discuss the details of the attack, which targeted multiple MSPs and their customers through a supply chain ransomware attack. The hackers exploited a vulnerability in Kaseya's VSA software, infecting victims through an automatic software update. Tune in to hear firsthand accounts of the Kaseya incident and gain insights into what happens during a cybersecurity breach. Supported by : https://gozynta.com/Want to take my class? https://www.itspu.com/all-classes/classes/navigating-emerging-technologies-for-msps/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Support the show on Patreon: https://patreon.com/mspradio/Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.comFollow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftech
Silas relays his experience from the previous episode to the rest of Alpha team, and they set off on a new path to find the key to the next Breach. Back at Yanus, Vaux and June gather more information, and have a reunion with Alpha.Links to our social media and transcripts below.Directed & Produced by Stella "Rowan" OdomWritten by Ty VonEdited by Stella "Rowan" OdomTy Von as Silas CaldwellBeth Sage Phung as Cassius ThatcherMorgie Bee as Elizabeth BellangerJules Christine as Alyx YardElgin Smith as Jeremiah WoodsRenee' Helsel as June DawsonKaila Crockett as Miss Evelyn VauxJoe Cliff Thompson as Steve BeckettSyntax Logo by Anthony CrockettTranscripts are available on our website. Direct link: Google DocsWebsite: syntaxpodcast.comContact Us: twinstrangersproductions@gmail.comPatreon: patreon.com/twinstrangersproductionsTwitter: twitter.com/twinstrangerspReddit: reddit.com/r/syntaxpodTumblr: twinstrangersp.tumblr.comContent Warnings:Mentions of: psychosis, nightmares, auditory/visual hallucinations, religion, deities, death, paranoia, darkness, nyctophobia, statues, underwater creatures, cryptid creatures, significant blood loss, prosthetics, capital punishment, antipsychotic medication, drowning, murder, memory lossMisophonia: ocean waves, muffled noises, grinding metal, deep droning audio, discordant music, coughing/chokingExplicit languageLoud noisesSounds of ragged/heavy breathing, pain, crying, screaming, exertionSquishing soundsWhispered/Muffled dialogueGraphic violence (amputation)Bodily injuryUncanny valley/mimicry/puppetsVibrating audio (sine waves)Gore noises (slicing flesh, blood dripping, bone sawing/crunching, stabbing, ripping cloth, squelching)Distorted screaming/audioHypnosisDepiction of anxietyPsychiatric hospitalFaintingFirearms SFXSFX Provided by Soundsnap.orgSyntax by Twin Strangers Productions LLC is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Hosted on Acast. See acast.com/privacy for more information.
In this episode, Eleanor Manley, Co-Founder of Metta Space, delves into the critical issue of workplace misconduct and violence, shedding light on the startling statistics and the profound impact it has on organizations and individuals. Eleanor shares valuable insights into the importance of creating psychologically safe workplaces, the role of technology in preventing and resolving workplace misconduct, and the need for data-driven strategies to address this pervasive problem.Key Things Discussed: Creating Psychologically Safe Workplaces: Eleanor emphasizes the significance of fostering psychologically safe environments where employees can confidently report misconduct. Leveraging Technology for Prevention and Resolution: Eleanor explains how Metta Space employs technology, ensuring privacy and advocating for reduced resolution times in addressing workplace misconduct. Empowering Employees and Normalizing Reporting: Eleanor underscores the importance of empowering employees to report misconduct while challenging the misconception that fewer reports signify a safe workplace and discussing the complexities of addressing misconduct. Show Notes [00:00:00] Introduction to Workplace Violence and Harassment: Jenny introduces Eleanor Manley, CEO of Metta Space, discussing the complexities of defining workplace violence and harassment. [00:01:46] Identifying and Addressing Workplace Misconduct: Jenny and Eleanor explore various forms of workplace misconduct, highlighting its impact and the challenges of identification. [00:06:15] The Hidden Costs of Unreported Workplace Misconduct. Jenny and Eleanor discuss the financial consequences of unreported misconduct and the need for data-driven solutions. [00:07:56] Understanding the Root Causes of Workplace Misconduct. They delve into reasons behind the persistence of misconduct, including zero-tolerance approaches and cultural factors. [00:09:38] Legislation, Rights, and Resolution of Workplace Misconduct. Discussion on laws like POSH and the importance of swift internal resolution. [00:12:21] Addressing Workplace Misconduct at the Highest Levels. Jenny and Eleanor discuss Eleanor's invitation to speak at NATO on International Women's Day. They focus on the importance of addressing workplace misconduct to retain and empower women in STEM fields, including the challenges faced by military organizations in reporting misconduct. [00:13:47] The Crucial Role of Psychological Safety in Workplace Effectiveness. The role of psychological safety in workplace effectiveness and its impact on team productivity. [00:15:22] Leveraging Technology for Safer Work Environments. Eleanor discusses Metta Space and technology's role in prevention, reporting, and resolution. [00:20:16] Practical Steps for Creating Safe Work Environments. Jenny and Eleanor discuss practical steps that organizations and leaders can take to create safe work environments. Eleanor explains the importance of implementing clear goals and frameworks, breaking them down into pillars like prevention, reporting, and resolution. She also highlights the value of training to help employees empathize with different situations and understand the nuances of workplace misconduct. [00:22:45] Empowering Employees to Speak Up and Measuring Resolution Effectiveness. The importance of empowering employees to speak up and viewing case reporting positively. [00:24:27] Understanding the Distinction Between Breach of Code of Conduct and Breach of Law. Jenny and Eleanor discuss the distinction between a breach of a code of conduct and a breach of the law in the context of workplace misconduct. Eleanor explains that the majority of cases are breaches of a code of conduct, which may not necessarily require legal action. She emphasizes the importance of providing evidence gathering tools for individuals reporting misconduct to strengthen their case. [00:26:29] Envisioning a Future of Safe and Empowered Workplaces. Eleanor's goal of normalizing safe workplaces with data-driven support. [00:28:15] Strategies to Accelerate Resolution Time in Workplace Misconduct Cases. Strategies for organizations to reduce resolution time in misconduct cases. [00:33:00] Quick-Fire Questions for Eleanor Manley: What is your dream with a deadline? Normalize creating safe and empowered workplaces within all organizations through prevention, reporting, and resolution of workplace misconduct. What do you appreciate most about your team? Open communication, having each other's backs, and speaking up when something feels true and right. Greatest Challenge as a Leader: Lack of statistics on workplace misconduct and educating organizations about the need for data-driven approaches. Metta Space's Ideal Customer Profile: Organizations with more than 100 employees, especially those with limited HR resources. Starting with Workplace Misconduct Policies: Have strong policies and employee handbooks but ensure they are living documents with constant reminders. Intrinsic Motivation: Empowering more women in tech and creating safe workplaces where individuals can excel without facing misconduct. Contributing Factors to Exodus from STEM: Poor managerial relationships are a significant reason for people leaving organizations. Book That Shaped Your Thinking: "Blink" by Malcolm Gladwell, emphasizing trusting instincts and the power of intuition. Relevant links: The U.S. Surgeon General's Framework for Workplace Mental Health & Well-Being The U.S. Surgeon General Workplace Well-Being PoSH Act International Women's Day 2023: NATO Presents – Innovators and Game Changers: Women in Tech Shaping the Future Google's Project Aristotle “Blink: The Power of Thinking Without Thinking,” by Malcolm Gladwel About the Guest:Eleanor Manley is the CEO of Metta Space, which helps companies prevent, report & resolve workplace misconduct. Specializing in NLP, she heads up AI, Analytics & RevOps. She has been a guest speaker at NATO and Bosch. Personally, Eleanor advocates for more women and marginalized groups to join tech, both with Metta Space's mission and mentorship.Follow Our Guest:LinkedIn | Website | X Follow Dreams With Deadlines:Host | Company Website | Blog | Instagram | X
Guest: Andrzej Cetnarski, CEO and founder of Cyber Nation Central, trains and advises boards and c-suites on cybersecurity perspectives and best practices. On LinkedIn | https://www.linkedin.com/in/andrzejcetnarski/Host: Matthew RosenquistOn ITSPmagazine
We regularly cover significant breaches on this podcast, but it is rare that we have enough information about a major breach to cover in enough detail to devote an entire segment to. Today, we dive into lessons learned from the breach of Okta's customer support system that targeted some other major security vendors. This is part of a troubling trend, where the target of an attack only serves as a jumping off point to other organizations. China's 2023 attack of Microsoft is an example of this. It was easier to attack Microsoft 365, one of the world's largest business SaaS platforms, than to go after each of the 25 individual targets these Chinese actors needed access to. Traditionally, we've thought of lateral movement as something that happens within a network segment, or even within a single organization. Now, we're seeing lateral movement between SaaS platforms, between clouds, from third party vendors to customer, and even from open source project to open source adopters. In this segment, we'll cover five key lessons learned from Okta's breach, from information shared by Okta and three of its customers: 1Password, Cloudflare, and BeyondTrust. Protect Your Session Tokens Monitor for Unusual Behavior SaaS Vendors Are Common Targets Zero Trust Principles Work MFA Isn't a Binary (on or off) Control Segment Resources https://www.valencesecurity.com/resources/blogs/five-lessons-learned-from-oktas-support-site-breach Show Notes: https://securityweekly.com/esw-340
In today's podcast we cover four crucial cyber and technology topics, including: 1. Ukrainian scam gang arrested, face 12 years in Czech prison 2. Zimbra flaw abused after patch released to steal government data 3. City of Long Beach faces disruption amidst cyber-attack 4. Cryptocurrency miners found throughout Polish courthouse I'd love feedback, feel free to send your comments and feedback to | cyberandtechwithmike@gmail.com
YouTube cracks down on AI-generated deepfakes, then previews an AI tool that clones famous singers, Samsung admits to year-long data breach, X is accused of deceptive ad practices, and AI unlawfully rejects healthcare claims of patients.
We regularly cover significant breaches on this podcast, but it is rare that we have enough information about a major breach to cover in enough detail to devote an entire segment to. Today, we dive into lessons learned from the breach of Okta's customer support system that targeted some other major security vendors. This is part of a troubling trend, where the target of an attack only serves as a jumping off point to other organizations. China's 2023 attack of Microsoft is an example of this. It was easier to attack Microsoft 365, one of the world's largest business SaaS platforms, than to go after each of the 25 individual targets these Chinese actors needed access to. Traditionally, we've thought of lateral movement as something that happens within a network segment, or even within a single organization. Now, we're seeing lateral movement between SaaS platforms, between clouds, from third party vendors to customer, and even from open source project to open source adopters. In this segment, we'll cover five key lessons learned from Okta's breach, from information shared by Okta and three of its customers: 1Password, Cloudflare, and BeyondTrust. Protect Your Session Tokens Monitor for Unusual Behavior SaaS Vendors Are Common Targets Zero Trust Principles Work MFA Isn't a Binary (on or off) Control Segment Resources https://www.valencesecurity.com/resources/blogs/five-lessons-learned-from-oktas-support-site-breach Show Notes: https://securityweekly.com/esw-340
Since the Hamas terrorist attack on Israel on October 7, the prospect for a larger regional conflict has loomed. The Biden administration has sent two carrier strike groups to the region to “serve as a deterrent signal to Iran, Lebanese Hezbollah, and any other proxy across the region,” in the words of a senior defense official. At the same time, regional actors such as Iran have declared that they have “red lines” and that an Israeli ground campaign in Gaza would lead them and/or their proxies to respond. Whether such actors targeted US troops in Iraq or Syria, or whether US troops entered the war in the event of an escalation, there is a real risk of the United States entering another war in the Middle East. Does the president have the authority to bring the United States into the war? What are the dangers of such a conflict for the United States? Please join our diverse panel of experts for an examination of these questions. Hosted on Acast. See acast.com/privacy for more information.
Fortinet warns of critical command injection bug in FortiSIEM Another data breach for Samsung Rhysida warning from FBI and CISA Thanks to today's episode sponsor, Sysdig For businesses innovating in the cloud, every second counts. Sysdig strengthens cyber resilience by reducing the attack surface, detecting threats in real time, and accelerating incident response. Our platform correlates signals across cloud workloads, identities, and services to enable businesses to prioritize risks and act decisively. Sysdig. Secure every second. For the stories behind the headlines, head to CISOseries.com.
Welcome to the Identity Theft Resource Center's Weekly Breach Breakdown for November 17th, 2023. I'm Alex Achten. Thanks to Sentilink for supporting the ITRC and this podcast. Each week, we look at the most recent events and trends related to data security and privacy. Today, I will update you on a podcast we brought you over a year ago about Kochava suing the Federal Trade Commission (FTC) after a proposed complaint and settlement offer. I will also have the latest on the MOVEit data event and some of the top breaches in October. Follow on LinkedIn: www.linkedin.com/company/idtheftcenter/ Follow on Twitter: twitter.com/IDTheftCenter
In this podcast episode, cybersecurity experts discuss the activities of the Royal ransomware, a hacker group that has now successfully targeted 350 victims worldwide, amassing $275 million in ransom payments. They delve into the group's sophisticated tactics which made them successful in their cyber exploits. Additionally, the hosts shift the discussion to McLaren Healthcare, a Michigan-based healthcare provider that fell victim to a cyberattack by the Alfie ransomware gang. They highlight the severity of the breach, exposing which personal information was released to the cybercriminals. The episode concludes with a mention of the ransomware attack on the state of Maine, affecting approximately 1.3 million individuals. The hosts discuss the extensive data theft, the government's response, and the offer of two years of free credit monitoring and identity theft protection services to affected individuals.
In today's podcast we cover four crucial cyber and technology topics, including: 1. Postmeds company Truepill leaks customer data 2. Lockbit claims data breach against Finland's leading frozen food storage firm 3. U.S. asking for details about hacker “Nopaoh” in relation to 2016 heist 4. FBI says they have dismantled IPStorm proxy net I'd love feedback, feel free to send your comments and feedback to | cyberandtechwithmike@gmail.com
Bongani Bingwa speaks to Benedict Phiri, Legal Expert about whether Chief Justice Raymond Zondo breached the Judicial Code of Conduct.See omnystudio.com/listener for privacy information.
We're taking a trip to the movies this episode.
Harbinger Showcase is a weekly podcast featuring highlights from Canada's #1 coast-to-coast community of politically and socially progressive podcasts. On this week's episode we:explore the centenary of Germany's failed 2023 socialist revolution on VICTOR'S CHILDRENexamine the legal dimensions of Israel's escalating Gaza assault on THE BREACH SHOWunpack the unhinged resolutions at last week's UCP AGM on THE PROGRESS REPORTcelebrate the end of the 6 month long wildfire season on ALBERTA ADVANTAGEThe Harbinger Media Network includes more than 60 podcasts focusing on social, economic and environmental justice and featuring journalists, academics and activists on shows like Alberta Advantage, The Breach Show, Tech Won't Save Us, Press Progress Sources & more.Harbinger Showcase is syndicated for community and campus radio at CIUT 89.5FM in Toronto, CKUT 90.3FM in Montreal, CKUW 95.9FM in Winnipeg and at Vancouver Co-op Radio.Financial support on this episode is courtesy of The Alberta Advantage podcast and Between the Lines Books. Find out more a albertaadvantagepod.comand find this episode's featured new BTL release Kareem Khubchandani's 'Decolonize Drag' at btlbooks.comFind out more about the network, subscribe to the weekly newsletter and support our work at harbingermedianetwork.com
Introduction to Monetary Damages. Monetary damages, also known as compensatory damages, are the most common remedy for breach of contract. They aim to compensate the non-breaching party for their actual losses resulting from the breach. It's essential to understand the key principles of monetary damages: Direct Losses: Compensatory damages cover direct losses, such as the cost of completing the contract with another party. Foreseeability: Damages must have been foreseeable at the time of contract formation to be recoverable. Types of Monetary Damages. Monetary damages can take various forms, and it's crucial to comprehend the distinctions between them: General Damages: General damages compensate for the direct and natural losses that flow from the breach. They don't need to be specifically foreseeable but must arise in the usual course of events. Special Damages (Consequential Damages): Special damages go beyond direct losses and include additional costs or losses that result indirectly from the breach. Law students should understand the principles of consequential damages: Foreseeability: Like compensatory damages, consequential damages must have been foreseeable at the time of contract formation. Causation: There must be a clear causal link between the breach and the consequential damages. Incidental Damages: Incidental damages are the additional costs incurred by the non-breaching party as a result of the breach. These damages are typically recoverable when they are reasonably incurred to mitigate losses. Specific Performance. Introduction to Specific Performance. Specific performance is an equitable remedy available when monetary damages are inadequate to compensate for the breach. This remedy requires the breaching party to perform their contractual obligations. Law students should understand the key aspects of specific performance: Availability: Specific performance is typically available for contracts involving unique goods or services where monetary compensation would not adequately remedy the breach. Court Discretion: Courts have discretion in granting specific performance, considering factors like feasibility, fairness, and the unique nature of the contract. Restitution and Rescission. Restitution. Restitution is a remedy aimed at restoring the parties to their pre-contract positions. Law students should understand the principles of restitution: Return of Benefits: Restitution often requires the parties to return any benefits or consideration they received under the contract. Rescission. Rescission is the process of canceling or undoing a contract. It can occur by mutual agreement of the parties or by court order, typically due to factors like fraud, misrepresentation, or lack of capacity. Landmark Case: Lumley v Wagner (1852). The case of Lumley v Wagner is a notable example of specific performance. In this case, a singer contracted to perform exclusively at a particular venue. She later agreed to sing at a rival venue, breaching the exclusive contract. The court granted an injunction to prevent her from performing at the rival venue, enforcing specific performance of the contract. --- Send in a voice message: https://podcasters.spotify.com/pod/show/law-school/message Support this podcast: https://podcasters.spotify.com/pod/show/law-school/support
Episode:Title: Fast Food FootwearShow: ohmTown Daily - Science, Technology, & SocietySeason: 2Episode: 317Date: 11/13/2023Time: 6PM ET Sun-Sat, 8PM ET M-F@ohmTown Episode Article Election: https://www.ohmtown.com/elections/Past Episode Elections: https://www.ohmtown.com/past-elections/Live on Twitch: https://www.twitch.tv/ohmtownYoutube: https://www.youtube.com/ohmtownPodcast: https://podcasts.apple.com/us/podcast/ohmtown/id1609446592Patreon: https://www.patreon.com/ohmTownDiscord: https://discord.gg/vgUxz3XArticles Discussed:[0:00] Introductions...It's a Trap... street. https://www.ohmtown.com/groups/ofthegrape/f/d/heres-why-cartographers-planted-fake-places-on-their-maps/A new Drone Truck moves GE around. https://www.ohmtown.com/groups/ohmtowndaily/f/d/einrides-drone-truck-has-its-first-full-time-job-moving-ge-appliances-around/10 Cents per Order License Fee https://www.ohmtown.com/groups/technologytoday/f/d/seattle-wants-to-charge-doordash-and-other-gig-companies-10-cents-per-order-for-new-license-fee/Add your name to Europa Clipper. https://www.ohmtown.com/groups/mobble/f/d/time-is-running-out-to-add-your-name-to-nasas-europa-clipper/New Moth Discovered in Europe https://www.ohmtown.com/groups/mobble/f/d/mysterious-new-moth-species-discovered-in-europe/Fast Food Footware https://www.ohmtown.com/groups/hatchideas/f/d/mcdonalds-and-crocs-are-releasing-a-line-of-75-shoes-inspired-by-grimace-and-the-hamburglar/Another MOVEit related Breach. https://www.ohmtown.com/groups/hatchideas/f/d/a-u-s-state-was-hacked-in-a-massive-data-breach-and-every-single-resident-is-at-risk/Jump up Jump up and long jump robots. https://www.ohmtown.com/groups/technologytoday/f/d/the-long-jump-athletic-insect-scale-long-jumping-robots-reach-where-others-cant/I hear 3D Printed Buildings are blowing up. https://www.ohmtown.com/groups/constructagon/f/d/us-army-blows-up-3d-printed-buildings-in-latest-tests/That lab is SmartDope. https://www.ohmtown.com/groups/mobble/f/d/autonomous-lab-discovers-best-in-class-quantum-dot-in-hours-it-would-have-taken-humans-years/Broadcasted live on Twitch -- Watch live at https://www.twitch.tv/ohmtown
"Warning"- This film is full of very gross gore, tons of blood, and hideous mutant beings. Collin reviews the horror film The Breach directed by Rodrigo Gudiño based on Nick Cutter's novel of the same name. The film's plot is about a Canadian sheriff along with his ex-girlfriend and his rival investigating the death of an insane evil scientist whose experiments are beyond belief. --- Send in a voice message: https://podcasters.spotify.com/pod/show/collin-sugg/message
On this week's episode, Andy and Adam talk about the follow up investigation from Okta about their support system breach along with some lessons that listeners can take away. They also talk about passkeys going mainstream and what that means for the future of passwordless. ------------------------------------------- Youtube Video Link: https://youtu.be/5Cz07OKHAII ------------------------------------------- Documentation: https://arstechnica.com/information-technology/2023/11/no-okta-senior-management-not-an-errant-employee-caused-you-to-get-hacked/ https://support.google.com/chrome/a/answer/12129062?hl=en https://support.google.com/chrome/a/answer/9116814?hl=en https://www.washingtonpost.com/technology/2023/10/18/passkeys-explained-google/ ---------------------- Contact Us: Website: https://bluesecuritypod.com Twitter: https://twitter.com/bluesecuritypod Threads: https://www.threads.net/@bluesecuritypodcast Linkedin: https://www.linkedin.com/company/bluesecpod Youtube: https://www.youtube.com/c/BlueSecurityPodcast Twitch: https://www.twitch.tv/bluesecuritypod ------------------------------------------- Andy Jaw Mastodon: https://infosec.exchange/@ajawzero Twitter: https://twitter.com/ajawzero LinkedIn: https://www.linkedin.com/in/andyjaw/ Email: andy@bluesecuritypod.com ------------------------------------------- Adam Brewer Twitter: https://twitter.com/ajbrewer LinkedIn: https://www.linkedin.com/in/adamjbrewer/ Email: adam@bluesecuritypod.com --- Send in a voice message: https://podcasters.spotify.com/pod/show/blue-security-podcast/message
There are a few things that we can do as disciples to experience a "spiritual speed burst" in our maturing in Christ. One of those things is freedom in our finances. Join us as Pastor Josh unpacks what living generously can look like.
Veterans Day Events Across San Diego, City-Owned Land May Become Mixed-Use Homeless Shelter Site, Tri-City Medical Center Recovering from Cybersecurity BreachSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
DOJ and Pentagon emails hacked by Russians, OpenAI's DevDay announcements, when DeepMind thinks we'll see AGI, and more…
Former State Department Counsellor Eliot Cohen on how William Shakespeare can explain the rise, rule, and fall of present day leaders.
Ambulances Re-Routed Due to Cybersecurity Breach at Tri-City Medical Center, El Cajon Police Investigating Sexual Assault Involving Granite Hills HS Students, I-Team Identity Theft CaseSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Welcome to the Identity Theft Resource Center's Weekly Breach Breakdown for November 10th, 2023. I'm James Lee, and thanks to Sentilink for supporting this podcast. Each week, we look at the most recent events and trends related to data security and privacy. Today, we catch up on one of the most impactful cyberattacks in recent history – the attack against a widely used but not well-known by consumers, enterprise software. That's why we're calling this episode – Gone with the Solarwinds, named after the company targeted by Nation/State actors about this same time of year in 2020. Follow on LinkedIn: www.linkedin.com/company/idtheftcenter/ Follow on Twitter: twitter.com/IDTheftCenter
In this week's Throw Back Thursday episode from September 19, 2022 (Season 1 Episode 270), Ryan, Shannon, and LeVon discuss the government's new requirements for self-attestation after the SolarWinds breach. Please LISTEN
On this week's episode I cover a report by Forrester who predict a potential move away from the "extensive" VMware stack by many customers, I also cover a major update on the Okta breach and much more! Reference Links: https://www.rorymon.com/blog/vmware-explore-europe-announcements-major-okta-breach-update-cloudflare-outage/
Okta hasn't had a very good run of security headlines lately, and the latest is a breach that resulted in the theft of session tokens of several customers from Okta's customer support system. Though the number of customers was relatively low, the unauthorized access went undetected for over two weeks. The root cause seems to have come from an employee logging into their personal Google account and saving a username and password withing the Chrome browser. Time Stamps: 0:00 - Welcome to the Rundown 0:42 - ZEDEDA Deploys Kubernetes at The Edge 3:33 - CloudFlare Outage 6:04 - Palo Alto Buys Talon Cyber Security 9:49 - Using Google Calendar for Command and Control 12:58 - Updated Security Frameworks (CVSS 4.0 and MITRE ATT&CK 14) 18:12 - Okta Breach Blamed on User's Personal Google Login 28:27 - The Weeks Ahead 29:38 - Thanks for Watching Follow our Hosts on Social Media Tom Hollingsworth: https://www.twitter.com/NetworkingNerd Brian Knudtson: https://www.linkedin.com/in/bknudtson/ Follow Gestalt IT Website: https://www.GestaltIT.com/ Twitter: https://www.twitter.com/GestaltIT LinkedIn: https://www.linkedin.com/company/Gestalt-IT Tags: #Rundown, #Kubernetes, #Edge, #SASE, #Malware, @ZEDEDAEdge, @Cloudflare, @PaloAltoNetworks, @TalonCyber, @FIRSTdotOrg, @MITREcorp @Okta, @Google, #XFD10, #Security, @NetworkingNerd, @BKnudtson, @GestaltIT,
This week, we talk with Lawfare Legal Fellow and Courts Correspondent Anna Bower about the Georgia Bureau of Investigation's investigation into Coffee County voting machine breach and election interference in 2020. We have updates on Trump's testimony in his civil fraud trial in New York. NYPD did a wellness check the day before the FBI executed a search warrant on the home of a major fundraiser for New York City Mayor Eric Adams We also have updates on Rudy, Navarro, and the Republican Speaker of the House.The trial to keep Trump off the ballot pursuant to the 14th Amendment continues in Colorado.The Biden probe in the House is looking quite Durham-esque.The jury in the upcoming E. Jean Carroll trial will be anonymous due to the possibility of violence and intimidation by Trump supporters.Our guest:Anna Bowerhttps://twitter.com/AnnaBowerhttps://www.lawfaremedia.org/contributors/abowerAllison Gillhttps://post.news/@/MuellerSheWrotehttps://twitter.com/MuellerSheWrotePete Strzokhttps://twitter.com/petestrzokThe Podcasthttps://twitter.com/aisle45podWant to support this podcast and get it ad-free and early?Go to: https://www.patreon.com/aisle45podTell us about yourself and what you like about the show - http://survey.podtrac.com/start-survey.aspx?pubid=BffJOlI7qQcF&ver=short
Join our cybersecurity experts in this week's episode of the Security Squawk podcast as they unravel the complexities of these cybersecurity incidents and uncover the lessons learned for both businesses and individuals. In this episode, they discuss the ongoing Boeing cyber incident and provide updates on what has unfolded since the last episode. They also explore the actions taken by the Lockbit ransomware gang, their threats, and the impact on Boeing. Additionally, they investigate the case of Mr. Cooper's cyber attack, where a severe breach left millions unable to make mortgage payments. They analyze the aftermath of the breach and its implications for businesses and customers. Lastly, they shed light on the Cook County Health breach and its connection to a third-party service provider's cybersecurity vulnerabilities. Don't miss this informative and thought-provoking episode!
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is sponsored by KnowBe4. To learn more about our sponsor, visit https://knowbe4.com • For more breaking news, visit https://cybercrimewire.com
White Flag of Victory by Ty Braxton: https://www.amazon.com/White-Flag-Victory-Ty-Braxton/dp/B0CK3ZWYR3/ref=sr_1_2?crid=1PBK9YE1EXS7W&keywords=white+flag+of+victory&qid=1696613968&sprefix=white+flag+of+%2Caps%2C114&sr=8-2 To Donate: Venmo: @CharlieMikeIntlDonate Paypal: charliemike.me@gmail.com Shop: www.etsy.com/shop/CharlieMikeMerch For more videos: https://www.youtube.com/channel/UCO7u5mHOBX7TCaReVTwZC6w Facebook: https://www.facebook.com/charliemikeinternational Instagram: https://www.instagram.com/charliemikeintl/ Podcast Platforms we are on: Apple: https://podcasts.apple.com/us/podcast/the-breach/id1542623117?fbclid=IwAR3berLPvTkXXjoxW3dk1fPfzIyDK3TJYm5epuEPfWHcrkewr_TpV0mwJEs Spotify: https://open.spotify.com/show/3L6rL1x8J9loM7maBZXNWk?fbclid=IwAR0JEmwiV10nLMjhPQ0LJeYrYK68XggzDSN1Uo7Qzf2TzCqmXa6rMaiONxg Breaker: https://www.breaker.audio/the-breach-1?fbclid=IwAR13iwxEoDWKWyzzAhvFB4hvBDoH981E3IW3NHKL1td6HO74iY9rBmRib58 PocketCasts: https://pca.st/7ght6e4u?fbclid=IwAR2e_UvTdgCpbsOJW4ZsJloVM1ftP3OE20GRMLgW8iN4ksGUht1B0_nabh8 RadioPublic: https://radiopublic.com/the-breach-6p15yB?fbclid=IwAR3_JVfImENLiiFxmS5zVYK8KJq8wPcuQ30WuQvfKemBgSuz0Wfy5b1knsI Anchor: https://anchor.fm/charliemikeintl?fbclid=IwAR1kAU-Oo5pZrdoK9CiaDUzN3G7HPNgiznNlUDk3WuokIhY3GWhemMQ-y1k Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9lOWM4MmI0L3BvZGNhc3QvcnNz&fbclid=IwAR25DrD4lo0Lv6NaeTrld_N05d4zDBkParsfsn2J5PnuCtVfKPf7JaKm0D0 --- Support this podcast: https://podcasters.spotify.com/pod/show/charliemikeintl/support
Oh, the HARror! Sanitizing HAR files is not as easy as some might lead you to believe. CISA funds Cyber.org for K-12 cyber education and ORNL creates a Center for AI Security Research (CAISER). Cloudflare creates a tool out of spite, and CISA creates a tool you shouldn't use in production? Biden's EO on "Safe, Secure, and Trustworthy AI" and the Top Five Things you need to know about how GenAI is used in Security Tools. Five lessons learned form Okta's latest breach, should ransom payments be illegal, and why ransomware victims can't stop paying ransoms. We discuss the impact of the charges made against Solarwinds and its CISO by the SEC, the 2023 ISC2 Cybersecurity Workforce Survey, and Microsoft's latest open letter on security. Finally we wrap up discussing a delicious $8M Series A for better bagels! Show Notes: https://securityweekly.com/esw-338
Technology commentator Tony Grasso joins Kathryn to talk about popular password manager LastPass and how it's been breached five times - with the latest netting the release of credentials for users' crypto wallets.
Tonight, I'm talking to Eric Bishop, author of Ransomed Daughter. About Eric Bishop: Eric grew up in Connecticut, and relocated to the South after college. After becoming restless moves to the Rockies and the Pacific Northwest occurred before finally heading back East to raise a family. The wanderlust has never left Eric and he's always yearning for the next adventure. After many years in corporate America, he decided to turn his passion for the written word and dreams of crafting a novel into reality. Eric's debut novel The Body Man came out in 2021, the sequel Breach of Trust will be out in 2024. In September 2023 he released his first novella titled Ransomed Daughter. Eric lives in the foothills of South Carolina with with kids and dog. You can normally find him exploring the great outdoors most weekends, grilling out on his back deck, all the while dreaming up the next great novel. Ransomed Daughter A father will do anything to protect his daughter. One Girl. They warned him. Go to the local authorities, and your daughter dies. Report the abduction to anyone in the government, and we'll kill her. One Ransom. Faced with his worst nightmare, a wealthy father must decide how to respond. Follow the ransom demands and pay the abductors? Or use his connections to get his daughter back another way? One Solution. In his desperation, a father turns to a group that operates outside the purview of the United States government. The Omega Group. When Troy Evans and his elite team discover their latest mission is far more complex than rescuing an abducted girl, it's clear the consequences of failure will have much broader implications. Find Eric on X and IG @epbauthor or www.ericpbishop.com Don't forget to check out Brothers Keeper on amazon or where ever books are sold. Ty Benhoff two coming soon. Thanks to Crush Limbo for the music. Tripecoh Media LLC. --- Send in a voice message: https://podcasters.spotify.com/pod/show/thatscriminaljs/message Support this podcast: https://podcasters.spotify.com/pod/show/thatscriminaljs/support
How does it feel to find your first bug? What makes a good bug hunter? We get into all that and more with bug bounty hunter and face by the InsiderPhD YouTube channel, Katie Paxton-Fear.We also unpack the recent 23andMe data leak in Watchtower Weekly and share some fun and festive family-themed 1Password tricks in Did You Know?!
White Flag of Victory by Ty Braxton: https://www.amazon.com/White-Flag-Victory-Ty-Braxton/dp/B0CK3ZWYR3/ref=sr_1_2?crid=1PBK9YE1EXS7W&keywords=white+flag+of+victory&qid=1696613968&sprefix=white+flag+of+%2Caps%2C114&sr=8-2 To Donate: Venmo: @CharlieMikeIntlDonate Paypal: charliemike.me@gmail.com Shop: www.etsy.com/shop/CharlieMikeMerch For more videos: https://www.youtube.com/channel/UCO7u5mHOBX7TCaReVTwZC6w Facebook: https://www.facebook.com/charliemikeinternational Instagram: https://www.instagram.com/charliemikeintl/ Podcast Platforms we are on: Apple: https://podcasts.apple.com/us/podcast/the-breach/id1542623117?fbclid=IwAR3berLPvTkXXjoxW3dk1fPfzIyDK3TJYm5epuEPfWHcrkewr_TpV0mwJEs Spotify: https://open.spotify.com/show/3L6rL1x8J9loM7maBZXNWk?fbclid=IwAR0JEmwiV10nLMjhPQ0LJeYrYK68XggzDSN1Uo7Qzf2TzCqmXa6rMaiONxg Breaker: https://www.breaker.audio/the-breach-1?fbclid=IwAR13iwxEoDWKWyzzAhvFB4hvBDoH981E3IW3NHKL1td6HO74iY9rBmRib58 PocketCasts: https://pca.st/7ght6e4u?fbclid=IwAR2e_UvTdgCpbsOJW4ZsJloVM1ftP3OE20GRMLgW8iN4ksGUht1B0_nabh8 RadioPublic: https://radiopublic.com/the-breach-6p15yB?fbclid=IwAR3_JVfImENLiiFxmS5zVYK8KJq8wPcuQ30WuQvfKemBgSuz0Wfy5b1knsI Anchor: https://anchor.fm/charliemikeintl?fbclid=IwAR1kAU-Oo5pZrdoK9CiaDUzN3G7HPNgiznNlUDk3WuokIhY3GWhemMQ-y1k Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9lOWM4MmI0L3BvZGNhc3QvcnNz&fbclid=IwAR25DrD4lo0Lv6NaeTrld_N05d4zDBkParsfsn2J5PnuCtVfKPf7JaKm0D0 --- Support this podcast: https://podcasters.spotify.com/pod/show/charliemikeintl/support
This is a special edition episode because one of our hosts may have accidentally been under the influence of a certain adult gummy more than planned…Listen in for chaotic ramblings on senior citizen fantasy suites, Halloweekend FOMO, lazy reality show contestants, and no-source famous quotes. Support the show
DC Board of Elections breach may include entire voter roll LockBit claims Boeing breach StripedFly malware infects 1 million Windows and Linux hosts Thanks to today's episode sponsor, Hunters Hunters is a SIEM alternative, built for your security team. Hunters empowers companies to replace their SIEM with unlimited ingestion and normalization of security data at a predictable cost. Using Hunters, a CISO at a leading online retailer “tripled the amount of data ingested by her security team while cutting costs from a legacy SIEM provider by 75%.” To learn more about the benefits of replacing your legacy SIEM with Hunters visit hunters.security today. For the stories behind the headlines, head to CISOseries.com
On this week's episode, Andy and Adam talk the 23andMe and Okta breach that happened recently along with some recommendations on how organizations can try and prevent similar attacks in the future. They also talk about a revolutionary new feature in Microsoft Defender for Endpoint called Automatic Attack Disruption. They talk about how it works and how organizations can take advantage of it even if MDE is not your incumbent or primary EDR/XDR. ------------------------------------------- Youtube Video Link: https://youtu.be/2gUn1ZszQ-w ------------------------------------------- Documentation: https://techcrunch.com/2023/10/10/23andme-resets-user-passwords-after-genetic-data-posted-online/ https://www.wired.com/story/okta-support-system-breach-disclosure/ https://blog.1password.com/files/okta-incident/okta-incident-report.pdf https://www.microsoft.com/en-us/security/blog/2023/10/11/microsoft-defender-for-endpoint-now-stops-human-operated-attacks-on-its-own/ https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/automate-the-boring-for-your-soc-with-automatic-investigation/ba-p/1381038 ---------------------- Contact Us: Website: https://bluesecuritypod.com Twitter: https://twitter.com/bluesecuritypod Threads: https://www.threads.net/@bluesecuritypodcast Linkedin: https://www.linkedin.com/company/bluesecpod Youtube: https://www.youtube.com/c/BlueSecurityPodcast Twitch: https://www.twitch.tv/bluesecuritypod ------------------------------------------- Andy Jaw Mastodon: https://infosec.exchange/@ajawzero Twitter: https://twitter.com/ajawzero LinkedIn: https://www.linkedin.com/in/andyjaw/ Email: andy@bluesecuritypod.com ------------------------------------------- Adam Brewer Twitter: https://twitter.com/ajbrewer LinkedIn: https://www.linkedin.com/in/adamjbrewer/ Email: adam@bluesecuritypod.com --- Send in a voice message: https://podcasters.spotify.com/pod/show/blue-security-podcast/message
Ashley McGuire joins to discuss pop icon Britney Spears as she shared the news of the abortion she had at 19, a decision she said she felt forced into, calling it "one of the most agonizing things" she has experienced in her entire life. McGuire points to the reality that even wealth and fame don't save women from abortion pressure. With marriage in a decline, the Knights of Columbus are out with a new video series called 'Into the Breach,' we learn all about it with Damian O'Connor! Father Roger Landry also offers an insiring homily to prepare us for this Sunday's Gospel. Catch the show every Saturday at 7amET/5pmET on EWTN radio!
In this episode, former GOP Congressman Denver Riggleman joins to discuss the concerning election of far-right Republican Mike Johnson as Speaker of the House. Riggleman explains how Johnson's extreme views and embrace of election conspiracy theories pose a real "danger to democracy" given his position third in line to the presidency. Riggleman provides background on Johnson's surprise victory for Speaker, noting his "far, far, far right" stances and record promoting election fraud claims and QAnon conspiracies. He warns there is now a severe risk of Biden's impeachment efforts and undermining support for Ukraine under Johnson's leadership. _____ PLEASE SUPPORT OUR INDEPENDENT PODCASTS, AND YOUR DONATIONS ARE NOW TAX DEDUCTIBLE: PATREON.COM/NARATIV _____ Drawing on his investigative work for the January 6th committee, Riggleman reveals stunning insights from Mark Meadows' texts, which he argues provided a "roadmap to the insurrection." The messages spotlight connections between the Stop the Steal conspiracy theories and the Hunter Biden laptop disinformation campaign. Most alarmingly, Riggleman discloses that Ginni Thomas, wife of Supreme Court Justice Clarence Thomas, was embedded in these group texts coordinating with the White House on election challenges. He contends this suggests potential judicial branch involvement in subverting the election. Overall, Riggleman makes a compelling case that Johnson's rise to Speaker of the House signals the GOP's disturbing slide into extremism and tolerance of dangerous conspiracies. He surfaces the urgent need to counter these anti-democratic forces connected to January 6th that are still working to undermine the Biden presidency. Guest: Denver Riggleman, former GOP Congressman and author of "The Breach"
Subscribe on Twitch using Amazon Prime and watch us live: https://twitch.tv/brakesec Check out our VODs on Youtube: https://www.youtube.com/@BrakeSecEd Join the BrakeSecEd discord: https://discord.gg/brakesec News: https://www.darkreading.com/remote-workforce/1password-latest-victim-okta-customer-service-breach https://www.documentcloud.org/documents/24075435-bhi-notice https://www.bleepingcomputer.com/news/security/us-energy-firm-shares-how-akira-ransomware-hacked-its-systems/ https://www.bleepingcomputer.com/news/security/ransomware-isnt-going-away-the-problem-is-only-getting-worse/ https://www.shacknews.com/article/137505/ransomware-group-capcom-2020-arrested https://www.bleepingcomputer.com/news/security/flipper-zero-can-now-spam-android-windows-users-with-bluetooth-alerts/ https://www.nasdaq.com/articles/three-cybersecurity-sectors-that-resist-economic-downturns