POPULARITY
Categories
Seth takes a closer look at Donald Trump responding to Russia's invasion of Poland's airspace by giving an ultimatum to NATO instead of Vladimir Putin.Then, Jessica Chastain talks about her decision to go back to school to get her Master's in Public Administration at Harvard, what it was like to get a star on the Hollywood Walk of Fame and her experience meeting the person that loosely inspired her role in The Savant.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Jaguar Land Rover has extended its production shutdown until at least 24 September as it struggles with the fallout from a major cyber-attack. Also, Indian and US officials hold their first talks since Washington hit Delhi with a 50% tariff over Russian oil and weapons purchases.And Argentina's president Javier Milei insists ‘the worst is over' as he unveils a new budget.
For the last 30 years, email security has been stuck in the past, focusing almost entirely on stopping bad things from getting into the inbox. In this episode, Rajan Kapoor, Field CISO at Material Security and former Director of Security at Dropbox, argues that this pre-breach mindset is dangerously outdated. The real challenge today is post-breach: protecting the sensitive data that already lives inside your mailboxes.The conversation explores why we must evolve from "email security" to the broader concept of "workspace security" . Rajan explains how interconnected productivity suites like Google Workspace and Microsoft 365 have turned the inbox into a gateway to everything else Drive, accounts, and sensitive company data. We also discuss how the rise of AI co-pilots will create new risks, as they can instantly find and surface over-shared data that was previously hidden in plain sight .Guest Socials - Rajan's LinkedinPodcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-Cloud Security Podcast- Youtube- Cloud Security Newsletter - Cloud Security BootCampIf you are interested in AI Cybersecurity, you can check out our sister podcast - AI Security PodcastQuestions asked:(00:00) Introduction(02:00) Who is Rajan Kapoor? Field CISO at Material Security(02:38) What is Email Security in 2025? The 30-Year-Old Problem(03:20) The Critical Shift: From Pre-Breach to Post-Breach Protection(04:20) The Rise of Workspace Security: Beyond the Inbox(06:00) Why Focusing on Email is "Not Even Half" The Problem(06:50) Are Microsoft 365 Security Challenges Different from Google's?(09:30) Rethinking the Approach to Email Security(11:40) How AI Co-Pilots Will Exploit Your Over-Shared Data(13:30) A Real-World Attack: From Email to Malicious OAuth App(17:00) How Should CISOs Structure Their Teams for Workspace Security?(19:25) The Role of CASB vs. API-Based Security for Data at Rest(23:10) How CISOs Can Separate Signal From Noise in a Crowded Market(24:45) Final Questions: Home Automation, Career Risks, and Ethiopian Food
What does cyberwarfare really look like behind the headlines? This week, Roo sits down with Hayley Benedict, a cyber intelligence analyst at RANE, to explore the evolving world of digital conflict. From hacktivists to disinformation specialists, Hayley shares how nation states, criminals, and ideologically driven groups are blurring lines — and why data theft, disruption, and doubt remain the weapons of choice.
In this episode of The Segment, host Raghu Nandakumara sits down with Greg Mitchell, Application Administration Manager at Spokane Teachers Credit Union (STCU), for a candid, insightful look at what it really takes to drive security and innovation inside a modern, mission-driven financial institution.Greg shares how his team is building resilience from the inside out—applying zero trust principles not as a buzzword, but as a practical, culture-driven framework for protecting core systems. From his roots in school district IT to leading major modernization efforts at STCU, Greg walks us through what it means to lead with intention, assume breach, and drive results with lean teams and strong partnerships.You'll learn:Why disaster recovery isn't a one-time exercise, but a team muscle worth training How segmentation led to better cross-team relationships—not just better security The power of small wins (and small apps) to kickstart transformation Why enforcement beats perfection when it comes to securing infrastructure What zero trust really looks like in day-to-day operations—and how to start using tools you already have How STCU is approaching cloud expansion with Illumio
We've mentioned him on many episodes. He's a young and fascinating whale, a social butterfly and sometimes a troublemaker. On this episode of After the Breach, Jeff and Sara are joined once again by Monika Wieland Shield of the Orca Behavior Institute to talk about T65A5 “Indy”. This young male has been dispersed since he was five years old and we talk about his history, his family, and some of his more interesting predicaments. We always ask the question, where and with whom will Indy be next? He was invited to join this episode of the podcast to tell his story but we did not receive a reply. After our discussion about Indy, we chat about some of the latest summer sightings here in the Salish Sea! If you are enjoying listening to our podcast, please share this with your friends, follow/subscribe, and leave us feedback/reviews wherever you listen to podcasts! And if you'd like to join Jeff and Sara on a whale watching tour, please reach out to Maya's Legacy Whale Watching to book! You can also find us on Instagram, Facebook and Youtube. Please send us feedback or questions at afterthebreachpodcast@gmail.com. And remember, stay safe out there. Links from this episode: Orca Behavior Institute: https://www.orcabehaviorinstitute.org/ Maya's Legacy Whale Watching: https://sanjuanislandwhalewatch.com/ Photos: T65A5 Indy in 2014. Photo by Sara Hysong Shimazu T65A5 Indy Sept 2025. Photo by April Ryan, Maya's Legacy Whale Watching.
Welcome to the Backlog Busters, Season 8 - Episode 35. Mathman, Hootz, and BlazeKnight discuss Murderbot, corn and chili, frozen La Croix, Monarch butterflies, and yardwork. At the end of the episode, we dish out top secret tips for Abadox (NES) and Chip's Challenge (Lynx). We also played some games...Mike - Shining Force IIHootz -Another Crab's Treasure, Monster Hunter Wilds, TempopoRyan - Shovel Knight, Into the Breach, BalatroIf you were a patron, you would hear all the stuff we talk about before and after the theme music. You never what you'll hear!If you would like to have more of the Backlog Busters in your life, head on over to the socials and follow these fine folks:Blue SkyBacklog BustersMathman1024BlazeKnightSkinnyMattAlso, don't forget to join the Discord and be part of the fun.Patreon link -->patreon.com/BacklogBustersSkinnyMatt's Extra Life page --> here
Rob is back for this latest episode of Remap Radio, which kicks off with Janet, Chia, Rob, and Patrick mulling their early days online via dial-up. Real ones remember the days of RealPlayer. But we also dig into the future of Firaxis and Civilization in light of ongoing studio layoffs, before we dive deep into our initial impressions of Hollow Knight: Silksong. Plus, Patrick's been messing around with the clever new puzzler Öoo and trying to finish Shinobi: Art of Vengeance. (If you think the end of that conversation sounds odd, it's because Patrick's internet cut out and listen past the outro if you want to hear what everyone heard on the call!)Discussed: Layoffs at Firaxis 18:07, Layoff Trends in the Game Industry 51:05, Silksong 1:11:16, Shinobi: Art of Vengeance, 2:32:33, Öoo 2:34:12, The Question Bucket 2:41:28, Outro and Announcements 3:06:22 See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Thousands had data leaked in blood center ransomware attack UK Electoral Commission recovers, 3 years after China hack Npm packages with 2 billion weekly downloads targeted in supply chain attack Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines.
In this enlightening episode, we delve into the intricacies of statutes of limitation and repose, unraveling their significance in the legal landscape. Discover how these legal timeframes impact both plaintiffs and defendants, and why understanding them is crucial for navigating the justice system effectively. Join us as we explore real-world examples and expert insights to shed light on these often misunderstood legal concepts.Imagine you're involved in a legal dispute, and just when you think you're ready to take action, you find out that time has run out. This is where the concepts of statutes of limitation and repose come into play. These legal timeframes can make or break a case, and understanding them is essential for anyone navigating the legal system.Understanding Statutes of Limitation: Statutes of limitation set the maximum time after an event within which legal proceedings may be initiated. As legal expert Jane Doe explains, "These statutes are designed to ensure fairness by preventing the indefinite threat of a lawsuit." They vary by jurisdiction and type of claim, so it's crucial to know the specific limitations that apply to your case.The Role of Statutes of Repose: While similar to statutes of limitation, statutes of repose serve a different purpose. They provide a final deadline for filing a lawsuit, regardless of when the harm was discovered. John Smith, a seasoned attorney, notes, "Statutes of repose are about providing certainty and finality, especially in industries like construction and manufacturing."Real-World Implications: Consider a scenario where a construction defect is discovered years after a building is completed. The statute of repose may bar any legal action, even if the defect was hidden. This highlights the importance of understanding these legal timeframes and seeking timely legal advice.Navigating the complexities of statutes of limitation and repose can be daunting, but it's a critical aspect of legal strategy. By understanding these concepts, individuals and businesses can better protect their rights and make informed decisions. Subscribe now to stay informed about more legal insights and updates.TakeawaysStatutes of limitation are essential for fairness and efficiency in law.The discovery rule allows for fairness in cases of hidden injuries.Civil statutes of limitation apply to various types of claims, including torts and contracts.Breach of contract claims have specific limitation periods that must be adhered to.Medical malpractice cases often involve complex interactions between statutes of limitation and repose.Criminal law has its own set of statutes of limitation that protect defendants' rights.Certain serious crimes have no statute of limitations, reflecting societal interests in justice.Tolling provisions can pause the statute of limitations under specific circumstances.Continuing violations can reset the limitation period for ongoing wrongs.Understanding these legal timeframes is crucial for effective client representation.statutes of limitation, statutes of repose, legal doctrines, discovery rule, civil law, criminal law, medical malpractice, breach of contract, tolling provisions, legal strategy
Is any publicity good publicity? On today’s News Roundup we talk about how Salesloft, which makes the Drift chat agent that’s been used as a jumping-off point for credential harvesting and data breach attacks against a bunch of big-name companies, is testing that proposition. We also discuss bugs affecting industrial refrigeration controllers, and Microsoft making... Read more »
Is any publicity good publicity? On today’s News Roundup we talk about how Salesloft, which makes the Drift chat agent that’s been used as a jumping-off point for credential harvesting and data breach attacks against a bunch of big-name companies, is testing that proposition. We also discuss bugs affecting industrial refrigeration controllers, and Microsoft making... Read more »
In this episode, we discuss a recent significant cyber attack where Palo Alto Networks experienced a data breach through their Salesforce environment due to a compromised SalesLoft drift integration. Throughout the discussion, we highlight why Salesforce, a crucial CRM platform for many businesses, is becoming a prime target for supply chain attackers. The hosts discuss […] The post Salesforce Under Fire: The Salesloft Drift Supply-Chain Breach appeared first on Shared Security Podcast.
Sit back as Mike and Colin relax and talk about whatever is on their minds, usually leading back to music in some way or another! This week, Colin and Mike talk about Colin's trip to see My Chemical Romance in Chicago, and first impressions of the new album from twenty one pilots, Breach, after a listening party.
Share your thoughts and comments by sending me a text messageS.12 E.23 In Boston, the left-wing politicians are using the Trust Act to prevent local law enforcement from cooperating with federal agents. In this episode, talk about the Boston Trust Act, and explain why it should be called the "Breach of Trust Act."ABOUT: Tawsif Anam is a nationally published writer, award-winning public policy professional, and speaker. He has experience serving in the private, public, and nonprofit sectors in United States and overseas. Anam earned a Bachelor of Arts degree in Political Science and a Master of Public Affairs degree from the University of Wisconsin – Madison. Tawsif Anam's opinions have been published by national, state, and local publications in the United States, such as USA Today, Washington Examiner, The Washington Times, The Western Journal, The Boston Globe, Pittsburgh Post-Gazette, Milwaukee Journal Sentinel, Wisconsin State Journal, The Capital Times, and The Dodgeville Chronicle. His writings have also appeared in major publications in Bangladesh including, but not limited to, The Daily Star and The Financial Express. Visit my website www.tawsifanam.net Visit my blog: https://tawsifanam.net/blog/ Read my published opinions: https://tawsifanam.net/published-articles/ Check out my books: https://tawsifanam.net/books/
Send us a textThe digital world can be treacherous, especially when you're looking for a safe space to share your most vulnerable thoughts. Today's story about the Tea app breach will make you rethink every "anonymous" platform you've ever trusted.Tea promised women complete anonymity, a digital sanctuary where they could share dating horror stories, relationship struggles, and deeply personal confessions too raw for other platforms. Thousands believed this promise, uploading personal photos and sharing intimate details of their lives. Then security researchers made a chilling discovery: Tea's entire database sat completely unprotected on the internet. No password required. The numbers are staggering: 72,000 private images including selfies and IDs, plus 1.1 million direct messages containing confessions about abortion, sexual assault, infidelity, and more, all exposed. But the story takes an even darker turn when someone created "T-Spill," weaponizing this stolen data by turning private photos into ranking games and mapping personal information to real locations. This wasn't just a technical failure; it was a profound betrayal that turned a supposed sanctuary into what can only be described as a predator's playground.As the FBI investigates and lawsuits mount, we're left with uncomfortable questions about digital trust. How do we balance our need for connection with the reality that our most vulnerable moments are only as protected as the people building these platforms? The next time an app promises total privacy, remember Tea and maybe wait to see how they handle their first crisis before sharing your deepest secrets. Subscribe to Privacy Plays for more deep dives into breaches that expose the very human cost of our connected world, and check out our expanded content on the Problem Lounge Network. Support the show
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Link to episode page This week's Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Ray Espinoza, vp of information security, Elite Technology Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO. All links and the video of this episode can be found on CISO Series.com
Sparks Fly At NatCon5 Non-Interventionist Conservatives Storm The Breach! by Ron Paul Liberty Report
The digital house of cards continues to collapse as our personal data faces unprecedented vulnerability. This week, we reveal how the Department of Government Efficiency's reckless handling of over 300 million Americans' Social Security numbers could lead to a massive security crisis. After repeatedly warning about these dangers, our predictions are unfortunately coming true - just as we've seen with Taco Bell's embarrassing AI drive-thru experiment.Remember when Microsoft promised Windows 10 would be "the last operating system you'd ever need"? That promise expires October 14th, 2025, when support officially ends. But don't panic - we break down exactly how to secure free extended security updates through 2026 using Microsoft Rewards points. With nearly half of all PC users worldwide still running Windows 10, Microsoft has been forced to create options for those who can't or won't upgrade to Windows 11.The technology failures continue mounting as TransUnion joins Equifax and Experian in the data breach hall of shame. Despite claims of "limited exposure," dark web samples reveal the credit bureau leaked names, addresses, phone numbers, and unredacted Social Security numbers for 4.4 million Americans. When all three major credit reporting agencies have been compromised, who can we trust with our most sensitive information?Our Two Truths and a Lie segment challenges listeners to separate fact from fiction in today's outlandish tech landscape, while Mike's Mesmerizing Moment examines why the constant pursuit of new technology doesn't actually make us happier. We also take a nostalgic journey back to 1977 when Pioneer 11 made history as the first human-made object to fly past Saturn.Grab your favorite whiskey and join us as we navigate this technological minefield together. Whether you're concerned about your digital privacy, struggling with Windows upgrade decisions, or just want to hear which bourbon earned our unanimous approval this week, Tech Time Radio delivers the insights you need with the humor that makes complex tech digestible.Support the show
This episode of After the Breach is a special one—it was our first recording with a live audience! In celebration of the Orca Behavior Institute's 10th Anniversary we joined Monika Wieland Shields and Michael Weiss at the Center for Whale Research's Outreach Center with some of OBI's biggest fans in attendance. We talk about bad whale movies (courtesy of Michael), we learn about OBI's history, research, and plans for the future, and of course, we take audience questions! It was a lot of fun and there were a lot of laughs! If you are enjoying listening to our podcast, please share this with your friends, follow/subscribe, and leave us feedback/reviews wherever you listen to podcasts! And if you'd like to join Jeff and Sara on a whale watching tour, please reach out to Maya's Legacy Whale Watching to book! You can also find us on Instagram, Facebook and Youtube. Please send us feedback or questions at afterthebreachpodcast@gmail.com. And remember, stay safe out there.
Secondary school teacher Enoch Burke has been ordered to pay a total of €225,000 in fines for breaching a court order directing him to stay away from the school where he worked. Orla O'Donnell, Legal Affairs Correspondent, reports.
Activist and journalist Benjamin Nolan has witnessed a shift in Police tactics over the past two years, particularly in how they deal with Palestinian solidarity protestors. Toronto Police won't admit to any of it and mainstream media fail to tell both sides, which has left an obvious gap in report Ben wants to step up and help fill.He goes over his recent piece in The Grind, Police Chief Plays Loose with the Truth in Call in Show, which opens up a lot of discussions about police violence, their use of the knee-on-neck technique and just what TPS thinks 'proportionate' responses are to peaceful protests.Ben also provides firsthand accounts of Police overreaching their authority and not following the law, as well as reports back on the amount of injuries Hosted by: Jessa McLeanCalls to Action:Support the Toronto Community Justice Fund; and,Attend a Fundraiser Seminar in support of the Community Justice Collective, Copaganda: How Police and Media Manipulate our NewsRelated Episodes: Unverified: The Grind Exposes New Lows in Canadian Media (Oct 2024), Dave Grey-Donald goes over his months long investigation into the reporting surrounding October 7, 2023; Neighborhoods for Palestine (May 2024), Ben's first appearance on the show alongside four comrades organizing close to home for a Free Palestine.Weaponizing Canadian Law for Israel (Jul 2024), Martin Lukacs from the Breach talks about Project Resolute and the secret committee that drives it.More Resources: Bubble Zones: Confiding ProtestsBBC: Palestine Action Protest Arrests Over 500Inside Project Resolute, Canada's crack down on Palestine speechThe Breach: Inside the ‘shocking' police operation targeting pro-Palestine activists in TorontoToronto Police “Caused a Riot” Outside 51 Division After Pro-Palestinian Protest of UJA Event - The Grind MagazineAll of our content is free - made possible by the generous sponsorships of our Patrons. If you would like to support our work through monthly...
Welcome to the Identity Theft Resource Center's (ITRC) Weekly Breach Breakdown for September 5, 2025. I'm Tatiana Cuadras, Communications Assistant for the ITRC. Thanks to Sentilink for supporting the ITRC and this podcast. Each week, we look at the most recent events and trends related to data security and privacy. Today, we are going to look at how identity criminals are using QR code phishing in new attacks. Many of you probably have heard the phrase “Gone Fishing” before. For those who have not, “Gone Fishing” is another way someone might say one is absent, left or no longer present. It can also be an excuse for not being around. The hackers are not “Gone Fishing”; they are “Gone Quishing”. See what I did there? On a more serious note, that is the title of this week's podcast because they are weaponizing QR codes in new “quishing” attacks. Follow on LinkedIn: www.linkedin.com/company/idtheftcenter/ Follow on Twitter: twitter.com/IDTheftCenter
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: The Salesloft breach and why OAuth soup is a problem The Salt Typhoon telco hackers turn out to be Chinese private sector, but state-directed Google says it will stand up a “disruption unit” Microsoft writes up a ransomware gang that's all-in on the cloud future Aussie firm hot-mics its work-from-home employees' laptops Youtube scam baiters help the feds take down a fraud ring This episode is sponsored by Dropzone.AI. Founder and CEO Edward Wu joins the show to talk about how AI driven SOC tools can help smaller organisations claw their way above the “security poverty line”. A dedicated monitoring team, threat hunting and alert triage, in a company that only has a couple of part time infosec people? Yes please! This episode is also available on Youtube. Show notes The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft – Krebs on Security Salesloft: The Leading AI Revenue Orchestration Platform Palo Alto Networks, Zscaler customers impacted by supply chain attacks | Cybersecurity Dive The impact of the Salesloft Drift breach on Cloudflare and our customers China used three private companies to hack global telecoms, U.S. says CSA_COUNTERING_CHINA_STATE_ACTORS_COMPROMISE_OF_NETWORKS.PDF Google previews cyber ‘disruption unit' as U.S. government, industry weigh going heavier on offense | CyberScoop Ransomware gang takedowns causing explosion of new, smaller groups | The Record from Recorded Future News Hundreds of Swedish municipalities impacted by suspected ransomware attack on IT supplier | The Record from Recorded Future News Storm-0501's evolving techniques lead to cloud-based ransomware | Microsoft Security Blog The Era of AI-Generated Ransomware Has Arrived | WIRED Between Two Nerds: How threat actors are using AI to run wild - YouTube Affiliates Flock to ‘Soulless' Scam Gambling Machine – Krebs on Security UK sought broad access to Apple customers' data, court filing suggests ICE reactivates contract with spyware maker Paragon | TechCrunch WhatsApp fixes 'zero-click' bug used to hack Apple users with spyware | TechCrunch Safetrac turned staff laptops into covert recording devices to monitor WFH Risky Bulletin: YouTubers unmask and help dismantle giant Chinese scam ring - Risky Business Media
We're back! its like WW2 on the internet jeebus lol
Researchers disrupt a cyber campaign by Russia's Midnight Blizzard. The Salesloft Drift breach continues to ripple outward. WhatsApp patches a critical flaw in its iOS and Mac apps. A fake PDF editing tool delivers the TamperChef infostealer. A hacker finds crash data Tesla claimed not to have. Spain cancels a €10 million contract with Huawei. A fraudster bilks Baltimore for over $1.5 million. We've got a breakdown of the latest Business news. In our Threat Vector segment, Michael Sikorski and guest Thomas P. Bossert explore the path from policy and national security strategy to building operational cyber defense. We preview our spicy new episode of Only Malware in the Building. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.Threat Vector Segment In our Threat Vector segment, host David Moulton hands the mic over to Michael Sikorski and guest Thomas P. Bossert, President of Trinity Cyber and former Homeland Security Advisor. They explore the path from policy and national security strategy to building operational cyber defense. Listen to the full conversation here and find new episodes of Threat Vector each Thursday on the N2K CyberWire network and in your favorite podcast app.CyberWire Guest Today, our podcast producer Liz Stokes speaks with N2K Director of Enterprise Content Strategy Ma'ayan Plaut about our spicy new episode of Only Malware in the Building. You can find the audio version of Only Malware episode here, but we recommend you view the episode for added enjoyment! Selected Reading Amazon disrupts Russian APT29 hackers targeting Microsoft 365 (Bleeping Computer) The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft (Krebs on Security) Zscaler swiftly mitigates a security incident impacting Salesloft Drift (Zscaler) WhatsApp fixes 'zero-click' bug used to hack Apple users with spyware (TechCrunch) TamperedChef infostealer delivered through fraudulent PDF Editor (Bleeping Computer) Heimdal Investigation: European Organizations Hit by PDF Editor Malware Campaign (Heimdal Security) Tesla said it didn't have critical data in a fatal crash. Then a hacker found it. (The Washington Post) Spanish government cancels €10m contract using Huawei equipment (The Record) Scammer steals $1.5 million from Baltimore by spoofing city vendor (The Record) N2K Pro Business Briefing update (N2K Networks) Taco Bell rethinks AI drive-through after man orders 18,000 waters (BBC) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Want to work in cybersecurity but don't know where to begin? Or just curious what it takes to break into the field? This week, we're joined by the internet's very own Heath Adams, better known as The Cyber Mentor. He demystifies the application process and what it takes to build a career in cybersecurity – no matter your background.
Cybersecurity Today: Major Attacks on NX Build System, Sitecore, and Salesforce In this episode, David Shipley covers a string of significant cybersecurity breaches and vulnerabilities. Highlights include a compromise of the NX build system affecting over 1000 developers, remote code execution flaws in Sitecore's experience platform, and escalating Salesforce data theft attacks. The episode underscores the amplified risk introduced by AI in development, emphasizes the need for stringent security practices, and highlights sophisticated attacks by nation-state actors and criminal groups. Practical advice given includes the importance of patching systems, securing integrations, and educating teams on evolving threats. 00:00 Introduction and Headlines 00:28 NX Build System Compromise 01:54 AI-Driven Development Risks 04:25 Sitecore Vulnerabilities 05:36 Nation-State Threats 07:00 Salesforce Data Theft Campaign 09:51 Conclusion and Sign-Off
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Todd Ogasawara, Jon Westfall, and Sven Johannsen discussed the widespread alerts about a Google data breach urging Gmail password changes, which Todd noted he had not personally received despite seeing numerous reports. The conversation quickly moved to their personal tech upgrades, with both Todd and Sven having recently acquired new Pixel phones—Todd upgraded from a Pixel 7a to a Pixel 10 Pro, and Sven opted for a Pixel 10 Pro XL. They praised the Pixel 10 line's advanced AI features, including the ProRes 100x digital zoom, which Todd found "shockingly good" and "fantastic" for capturing distant details with clarity, even if tech blogs might deem it "fuzzy". Other impressive AI integrations include Live Translate, which Todd's wife found amusing in its word choices, and Call Notes for transcribing phone conversations. Todd also highlighted the benefit of a one-year Google One AI Pro subscription that came with his Pixel and applauded the new Pixel Snap feature, confirming its compatibility with Apple MagSafe chargers. Further expanding on accessories and broader tech, Todd expressed excitement about the Pixel 10 Pro's new temperature-taking capability, useful for both body and object temperatures. He also shared his experience with the Anker Nano Power Bank (5K, MagGo, Slim), an ultra-slim, Qi2 Certified 15W Max MagSafe-compatible portable charger with a 5,000mAh capacity. Despite being marketed primarily for iPhones, Todd found it worked with his Pixel, appreciating its design and color, though he observed lower-than-expected charging wattage with both his Pixel and iPhone. Sven recommended the Doohoeek Updated Charging Case for Oura Ring 4 & 3 Charger, a portable wireless power station featuring a 1000mAh battery that converts the official wired charger into a convenient portable solution, providing up to five full charges for the Oura Ring. Jon, an Oura ring user, weighed in on the practicality of such a case, also mentioning the recent controversy surrounding Aura's partnership with Palantir and concerns about consumer data privacy. The discussion also touched upon the desire for easier switching between mobile ecosystems and the evolving understanding of AI's capabilities and limitations.
Upcoming Events in Singapore; TheSqua[.]re Breach; Home Assistant, Ubiquiti and AI; Sponsored by Report URI https://www.troyhunt.com/weekly-update-467/See omnystudio.com/listener for privacy information.
Check the self-paced AI Business Transformation course > https://multiplai.ai/self-paced-online-course/ Is AI about to replace your design team, your video team… and maybe your job?This week's episode is a masterclass in both excitement and existential dread. From Google's hilariously-named (yet wildly powerful) Nano Banana model to major shifts in enterprise AI, Isar Meitis pulls back the curtain on the biggest news, breakthroughs, and business implications in AI from the past week.In this session, you'll discover:What the heck is Nano Banana and why it's a game-changer in image/video generationThe 3 major gaps in AI-generated visuals and how close we are to closing themWhy AI-native startups hit $18.5B in revenue and what that means for legacy companiesThe truth behind job loss vs. job creation in the age of AIMorgan Stanley's bold $920B AI forecast for the S&P 500Real-world enterprise AI use cases (yes, one reduced a 15-week process to 10 minutes)Scary security lapses in major LLMs, and the surprising players working to fix itRobots learning just by watching videos and what that means for your operationsAI lawsuits, government deals, and macro-level power plays shaping the futureAbout Leveraging AI The Ultimate AI Course for Business People: https://multiplai.ai/ai-course/ YouTube Full Episodes: https://www.youtube.com/@Multiplai_AI/ Connect with Isar Meitis: https://www.linkedin.com/in/isarmeitis/ Join our Live Sessions, AI Hangouts and newsletter: https://services.multiplai.ai/events If you've enjoyed or benefited from some of the insights of this episode, leave us a five-star review on your favorite podcast platform, and let us know what you learned, found helpful, or liked most about this show!
The FBI shares revelations on Salt Typhoon's reach. Former NSA and FBI directors sound alarm on infrastructure cybersecurity gaps. Google is launching a new cyber “disruption unit”. A new report highlights cyber risks to the maritime industry. A Pennsylvania healthcare provider suffers a data breach affecting over six hundred thousand individuals. Citrix patches a critical vulnerability under active exploitation. The U.S. sanctions a North Korean-linked fraud network. Ransomware is rapidly evolving with generative AI. Our guest is Brandon Karpf, speaking with T-Minus host Maria Varmazis connecting three seemingly disparate stories. Who needs a tutor when you've got root access? Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is Brandon Karpf, friend of the show, founder of T-Minus Space Daily, and cybersecurity expert talking with T-Minus host Maria Varmazis. Brandon decided to do a stump the host play for this month's space and cybersecurity segment. Selected Reading Chinese Spies Hit More Than 80 Countries in ‘Salt Typhoon' Breach, FBI Reveals (WSJ) NSA and Others Provide Guidance to Counter China State-Sponsored Actors Targeting Critical Infrastructure Organizations (NSA) Critical Infrastructure Leaders and Former National Security Officials Address Escalating Cyber Threats at Exclusive GCIS Security Briefing (Business Wire) Google previews cyber ‘disruption unit' as U.S. government, industry weigh going heavier on offense (CyberScoop) Maritime cybersecurity is the iceberg no one sees coming (Help Net Security) Healthcare Services Group reports data breach exposing information of over 624 K individuals (Beyond Machines) Over 28,000 Citrix devices vulnerable to new exploited RCE flaw (Bleeping Computer) US sanctions fraud network used by North Korean 'remote IT workers' to seek jobs and steal money (TechCrunch) The Era of AI-Generated Ransomware Has Arrived (WIRED) Spanish police arrest student suspected of hacking school system to change grades (The Record) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Chris and Hector break down a new bill proposing U.S. “cyber privateers,” the DOJ's takedown of the RapperBot botnet, and a zero-day flaw hitting millions of password manager users. They debate hackback authority, AI agents gone rogue, and why hoarding vulnerabilities always backfires. Join our new Patreon! https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com
If Salesforce flutters its wings in San Francisco... How is this still tricking people? From tagging to bagging Huge thanks to our sponsor, Prophet Security Security teams are drowning in alerts - many companies generate upwards of 1000 or more alerts a day, and nearly half go ignored. That's where Prophet Security comes in. Their AI SOC platform automatically triages and investigates alerts, so your team can focus on real threats instead of busywork. Faster response, less burnout, and lower risk to your business. Learn more atprophetsecurity.ai.
Martin Luther King Jr. famously stated, "The arc of the moral universe is long, but it bends toward justice." And there are numerous notable figures in our country's fight toward this justice, and then there is Rev. Dr. William J. Barber, II.rnrnFor decades, Rev. Barber has served as a powerful voice in movements that combined faith, morality, and activism. As the Co-Chair of the Poor People's Campaign: A National Call For Moral Revival, Rev. Barber has launched a new movement that aims to address the same issues that Martin Luther King Jr. spoke against in the original 1960s campaign.rnrnRev. Barber is also President and Senior Lecturer of Repairers of the Breach, and a Professor in the Practice of Public Theology and Public Policy and Founding Director of the Center for Public Theology and Public Policy at Yale Divinity School. The author of five books, including We Are Called To Be A Movement, his most recent book White Poverty: How Exposing Myths About Race and Class Can Reconstruct American Democracy explores how we can join together to take on poverty and economic injustice.rnrnIn a moment when the strength of democracy is tested, and our country's bend toward justice is questioned, join us as we hear from Rev. Dr. William J. Barber, II on how we can build social justice movements that uplift our deepest moral and constitutional values.
In this episode of Cybersecurity Today, host Jim Love covers a range of recent cybersecurity incidents. A major privacy failure has hit Elon Musk's Grok chatbot, exposing over 370,000 private conversations with sensitive information. Microsoft's recent security update has caused SSD and HDD failures, complicating data recovery. Hackers have exploited Microsoft's own login infrastructure to create phishing traps, making it difficult for users to spot fake login pages. The leader of the Wrapper Bot DDoS gang has been arrested following a detailed investigation. Finally, a hacker group claims to have 15.8 million PayPal credentials, although these claims are disputed by PayPal and security researchers. Jim also invites listeners to share their thoughts and comments through various contact methods. 00:00 Agro Leak Exposes 370,000 Chats 02:22 Microsoft Scrambles to Fix SSD Failures 03:52 Hackers Hijack Microsoft Infrastructure 05:40 Leader of Wrapper Bot DDoS Gang Arrested 07:14 Hackers Claim 15.8 Million PayPal Logins Stolen 08:34 Conclusion and Contact Information
This week's cybersecurity updates cover three critical stories: Workday discloses a data breach connected to ongoing Salesforce compromises by the Shiny Hunters group, CEO impersonation scams using deepfake technology surge past $200 million in Q1 losses, and transcription service Otter AI faces a class action lawsuit over alleged mishandling of sensitive meeting data. Drex emphasizes the importance of security awareness training, multi-factor authentication, and establishing "trust but verify" cultures that protect employees who take extra verification steps.Remember, Stay a Little Paranoid X: This Week Health LinkedIn: This Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer
Stephen Grootes speaks to Lawson Naidoo, former SA Tourism board member, about Tourism Minister Patricia de Lille’s move to dissolve the very board she had appointed – a decision that has sparked backlash from industry stakeholders, Outa, and the ousted board members. In other interviews, Shanna-Rae, owner and co-founder of Time Anchor Distillery chats about luxury side of craft gin making. The Money Show is a podcast hosted by well-known journalist and radio presenter, Stephen Grootes. He explores the latest economic trends, business developments, investment opportunities, and personal finance strategies. Each episode features engaging conversations with top newsmakers, industry experts, financial advisors, entrepreneurs, and politicians, offering you thought-provoking insights to navigate the ever-changing financial landscape. Thank you for listening to a podcast from The Money Show Listen live Primedia+ weekdays from 18:00 and 20:00 (SA Time) to The Money Show with Stephen Grootes broadcast on 702 https://buff.ly/gk3y0Kj and CapeTalk https://buff.ly/NnFM3Nk For more from the show, go to https://buff.ly/7QpH0jY or find all the catch-up podcasts here https://buff.ly/PlhvUVe Subscribe to The Money Show Daily Newsletter and the Weekly Business Wrap here https://buff.ly/v5mfetc The Money Show is brought to you by Absa Follow us on social media 702 on Facebook: https://www.facebook.com/TalkRadio702702 on TikTok: https://www.tiktok.com/@talkradio702702 on Instagram: https://www.instagram.com/talkradio702/702 on X: https://x.com/CapeTalk702 on YouTube: https://www.youtube.com/@radio702 CapeTalk on Facebook: https://www.facebook.com/CapeTalkCapeTalk on TikTok: https://www.tiktok.com/@capetalkCapeTalk on Instagram: https://www.instagram.com/CapeTalk on X: https://x.com/Radio702CapeTalk on YouTube: https://www.youtube.com/@CapeTalk567See omnystudio.com/listener for privacy information.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
This week: Kerry gets an enticing job offer in Miami, Gates brings Sarah to the ER for the day, Pratt and Hope's church clinic secret is revealed in the worst way, Alex is getting his criminal record started, Sam's grandma makes a surprise visit, and Luka's budget problems lead to a surprise firing.
UK agrees to drop 'backdoor' mandate for Apple devices Massive Allianz Life data breach impacts 1.1M people Speed cameras knocked out after cyber attack Huge thanks to our sponsor, Conveyor If portal questionnaires were a person, you'd block them by now. Endless clicks, bad navigation, and expanding questions stacked like russian nesting dolls, all add up to hours of your life you'll never get back. Conveyor's AI browser extension auto-completes any portal questionnaire without the copy and paste like those other browser extensions on the market. Spend less time battling portals and more time on work that matters. Learn more at www.conveyor.com.
This episode is a family-friendly extravaganza as we unpack the secrets to secure digital parenting. We're joined by Alanna Powers, a research specialist from the renowned Family Online Safety Institute (FOSI).
The mystery has been solved, but what is going to be done about it?Time to separate the cubs from the real warriors and time to see if the B&B pack really has what it takes, and to learn what this is al for.Want to Talk to us?Website: Rage Across the InternetJoin the Forums to get the Code for our discord and come chat with us!Email: rageacrosspodcast@gmail.comTwitter: @rageacrossFacebook: Rage Across the InternetWe've got a YouTube too, check it Right HereSeason 5's theme is: No Culture by Silent Partner
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Jowan Joseph. Chris and Jowan discuss the importance of effective communication, role adaptation, and the psychological aspects of crisis situations. The discussion emphasizes the need for proactive preparedness and building trust within teams to navigate challenges effectively. [Aug 18, 2025] 00:00 - Intro 00:32 - Jowan Joseph Intro 00:44 - New Format 01:24 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 03:08 - Tabletop...Child's Play 04:36 - Phase One: Assigning Roles 07:11 - Going Rogue 08:05 - Measuring Tone 09:22 - A Few More Twists 09:57 - Some Heads Are Gonna Roll 10:41 - Communication Breakdown 12:17 - Post Mortem 13:44 - Alignment at Scale 14:57 - Divide and Conquer... Together 17:31 - Proactive Instead of Reactive 20:21 - The Communication Gap 21:22 - Trust Factor 22:15 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
Featuring: Michael "Boston" Hannon, Paul “Moonpir” Smith, and John “MusiM” Beauchamp Running Time: 33:10 Livestream: YouTube This month the TVGP Game Club Crew joins our forces to take down some evil wizards in Tactical Breach Wizards! We chat about traffic wizards, breaching doors, surgery with bullets, seeing the future, and so much more! Our next game is and Roger!