POPULARITY
Categories
Breaches, Injunctions, Thoughts and Prayers; Teespring Sucks; Microsoft MVP and RD Again; Creams Cafe Breach; Sponsored by: Report URI https://www.troyhunt.com/weekly-update-461/See omnystudio.com/listener for privacy information.
Corrections has continued to put Invercargill prisoners at risk of self-harm or suicide in barren 'dry cells' - without toilets or running water - years after being told to stop. There has been another 14 instances of the practice since then-Chief Ombudsman Peter Boshier found it breached UN standards for prisoner treatment in 2019. Katie Todd reports.
Dell, Nascar, Louis Vuitton, AT&T, Christian Dior, a dating app disaster the UK government and so many more...
You know that moment when someone casually slides a contract across the table and says, “Just sign here”? Yeah, don't do that—especially when it's a Business Associate Agreement. This episode is a deep dive into the dark corners of BAAs, the traps they hide, and why you should read every line like it's a ransom note. From ping floods to passive-aggressive breach clauses, we unpack the weird, wild world of healthcare contracts. Oh, and stick around—because just when you think it can't get any messier, a breach shows up to ruin everyone's day. More info at HelpMeWithHIPAA.com/519
The Trump administration has unveiled a new AI action plan that emphasizes deregulation and the promotion of American AI exports, raising concerns among regulated industries. The initiative aims to foster American leadership in the AI sector by reducing environmental regulations for data centers and advocating for the export of AI technologies. However, the plan lacks specific details on how to establish global alliances or enforce export restrictions effectively, leading to uncertainty for businesses operating in regulated environments. This shift away from oversight marks a significant departure from the previous administration's safety standards for AI technology.Recent research has revealed alarming findings regarding AI training data, indicating that even seemingly safe datasets can lead to harmful AI outputs. A study conducted by Truthful AI and the Anthropic Fellows Program demonstrated that models trained on benign data could still develop undesirable behaviors, such as endorsing violence. This phenomenon, termed subliminal learning, raises questions about the reliability of synthetic data in AI training, especially as projections suggest that synthetic data may soon surpass real data in AI models.The podcast also discusses the impact of AI-generated summaries on online news traffic, with some websites experiencing a dramatic decline in click-through rates. Research indicates that sites ranked first in search results could see traffic drop by nearly 80% if their links appear below AI-generated summaries. This trend has sparked concerns among media owners, who view it as a potential existential threat to their operations, prompting calls for regulatory action to address the challenges posed by AI in the news industry.Finally, the episode highlights the rapid adoption of virtual Chief Information Security Officer (vCISO) services among managed service providers, driven by the integration of AI technologies. A report reveals a 300% increase in vCISO adoption, with many providers experiencing significant reductions in workload and labor time due to AI. This shift indicates a growing demand for scalable and efficient cybersecurity solutions, but it also raises concerns about commoditization in the market, emphasizing the need for differentiation and strategic insight in service offerings. Four things to know today 00:00 “America First” Meets A.I.: Trump's Action Plan Prioritizes Deregulation, Exports, and Ideological Scrutiny03:23 AI Gone Wrong: Subliminal Learning, Search Traffic Collapse, and Academic Manipulation Underscore Oversight Gap07:28 vCISO Adoption Surges 300% as AI Transforms Cybersecurity Into a Scalable Growth Strategy09:34 SharePoint Exploit Breaches 400+ Orgs, Including U.S. Nuclear Agency, in Ongoing Zero-Day Attack Supported by: https://syncromsp.com/ Tell us about a newsletter!https://bit.ly/biztechnewsletter All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
Send us a textWith Dr. K Royal off to Vegas, this week it's Paul Breitbarth and Ralph O'Brien of Reinbo Consulting catching up for the Serious Privacy podcast on all of the news. Two big topics this week: the hidden-until-now data breach of the UK ministry of Defence in Afghanistan and the mess that was the WeTransfer terms update (official blog post, Paul's Linkedin post). The guys also talk about this piece in the New York Times Wirecutter on disappearing from the internet. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
Noel Byrne, Environmental Protection Agency Programme Manager discusses their call for mandatory registration of private drinking water supplies
*Note: This is NOT a shaming podcast episode.... In the hyper-connected world, every click, like, and share carries a surprising weight, especially for those in professions built on trust. This week on ATYPICAL podcast with Amie Archibald-Varley RN, MN, we dive into the fascinating and often brutal "digital court of public opinion," sparked by the recent viral "kiss cam" incident involving CEO Andy Byron. His very public moment serves as a potent reminder that in our increasingly transparent society, no one truly lives in a glass house, and the stones we throw online can shatter careers. We'll explore: The Andy Byron Aftershock: How a seemingly personal, fleeting moment, amplified by social media, instantly transformed into a corporate crisis and a public spectacle, raising critical questions about leadership accountability and the blurred lines between private and professional lives. The Unforgiving Gaze: Why social media, while a powerful tool for connection, has also become a relentless arbiter of morality, where context is often lost, and judgment is swift and severe. We'll discuss the concept of "digital shaming" and the difficulty of escaping online reputations. Trust Under Threat: Nurses, Therapists, and the Public Eye: We'll turn our focus to the profound implications for trusting professions like nursing and therapy. Why are healthcare and social work professionals particularly vulnerable to social media missteps? We'll share real-life examples of nurses and therapists who have faced disciplinary action, job loss, or damaged reputations due to: Breaches of Confidentiality: Even seemingly innocuous details can identify patients. Unprofessional Conduct: Venting, mocking, or disparaging remarks about clients, colleagues, or the system. Blurring Boundaries: The tricky line between personal and professional interactions online. Building Digital Walls (or Better Yet, Digital Wisdom): What can individuals in these vital roles do to protect their professional integrity in an always-on world? We'll discuss the importance of understanding employer social media policies, ethical guidelines, and cultivating a mindful approach to online presence. A Call for Empathy: As we scrutinize others in the digital square, we reflect on the universal truth that "we all live in glass houses." Can we foster a more nuanced and forgiving online environment, even as we uphold professional standards? Join us for a candid conversation about personal choices, public perception, and the ever-evolving landscape where our online lives intersect with our professional futures. Dont forget to leave a comment or ask a question to Amie on Speakpipe about the episode! Leave Amie a Message here: https://www.speakpipe.com/AtypicalPodcastAmie Please Like, Leave a comment and Subscribe!! Apple Podcasts: https://podcasts.apple.com/ca/podcast/atypical-podcast-with-amie-archibald-varley/id1493290782 Amazon Music: https://music.amazon.ca/podcasts/d914ab3f-3dd0-42cb-818e-6c9bd5f8f162/atypical-podcast-with-amie-archibald-varley Audible: https://www.audible.ca/podcast/Atypical-Podcast-With-Amie-Archibald-Varley/B08K5VH59Y? Spotify: https://open.spotify.com/show/2IfBAFziaX6ibCaBK4yMxO?si=ddcb1dbbc6d940dc iHeartRadio: https://www.iheart.com/podcast/263-atypical-podcast-with-amie-59510370/ YouTube: https://www.youtube.com/channel/UCxlDaSr_D2fc-e3pV5pMEEg Goodpods: https://goodpods.com/podcasts/atypical-podcast-with-amie-archibald-varley-91241 Podchaser: https://www.podchaser.com/podcasts/atypical-podcast-with-amie-arc-2304724 Libsyn: https://atypicalpodcast.libsyn.com/ Amie Archibald-Varley's Official Website: https://www.amiearchibaldvarley.com/ FOLLOW ATYPICAL PODCAST ON Social Media Youtube: https://www.youtube.com/channel/UCxlDaSr_D2fc-e3pV5pMEEg Twitter (X): https://twitter.com/AtypicalAmiePod Instagram: https://www.instagram.com/atypicalwithamie/ Bluesky: https://bsky.app/profile/atypicalpodcast.bsky.social
Tim Batt joins Jesse to discuss the security breach affecting Microsoft's SharePoint, and also the company's plan to offset carbon emissions with a new deal with Vaulted Deep (via Tom's Hardware). It's a dual waste management solution designed to help remove carbon from the atmosphere in a bid to protect nearby towns from contamination, by burying a lot of waste deep underground.
Microsoft issues emergency updates for zero-day SharePoint flaws. Alaska Airlines resumes operations following an IT outage. The UK government reconsiders demands for Apple iCloud backdoors. A French Senate report raises concerns over digital sovereignty. Meta declines to sign the EU's new voluntary AI code of practice. A new report claims last year's CrowdStrike outage disrupted over 750 hospitals. The World Leaks extortion group has breached Dell's Customer Solution Centers. Hewlett-Packard Enterprise (HPE) issues a critical warning about two severe security flaws in Aruba Instant On Access Points. A single compromised password leads to a UK transport company's demise. An AI assistant falls for fake metadata magic. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Maria Varmazis, host of T-Minus Space Daily, joins Dave Bittner to unpack AST SpaceMobile's request to use amateur radio spectrum for satellite communications. They explore what this means for ham radio users, the role of secondary spectrum access, and why the amateur community is pushing back. It's a nuanced look at spectrum sharing, space tech, and regulatory tensions. Selected Reading Global hack on Microsoft product hits U.S., state agencies, researchers say (The Washington Post) Microsoft releases emergency patches for SharePoint RCE flaws exploited in attacks (Bleeping Computer) Alaska Airlines requests all flights to be grounded: FAA (ABC News) UK government seeks way out of clash with US over Apple encryption (Financial Times) Digital vassals? French Government ‘exposes citizens' data to US' (Brussels Signal) Meta snubs the EU's voluntary AI guidelines (The Verge) At Least 750 US Hospitals Faced Disruptions During Last Year's CrowdStrike Outage, Study Finds (WIRED) Dell confirms breach of test lab platform by World Leaks extortion group (Bleeping Computer) HPE warns of hardcoded passwords in Aruba access points (Bleeping Computer) Weak password allowed hackers to sink a 158-year-old company (BBC News) Claude Jailbroken to Mint Unlimited Stripe Coupons (General Analysis) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Scott Riley has worked with MSPs for over six years, helping them tighten up their security practices and take real control of their 365 tenancies. In this episode, be prepared for the shift in mindset that Scott encourages. The idea that you are too small or not interesting enough to be a target is no longer valid. The reality is that attackers are not selective. They cast a wide net. If your MSP gets breached, the damage can extend far beyond email. Your PSA, RMM, partner centre, licence platforms, password vaults, and all client environments are at risk. Scott Riley explains that token theft is one of the most common attack methods in play right now. A stolen login token can allow someone to log in as you without being challenged. If your global admin account is tied to your day-to-day login, the attacker has immediate access to your critical systems. Many MSPs still store MFA tokens inside password managers alongside usernames and passwords. It might seem convenient, but it undermines the whole point of multi-factor authentication. We explore the emotional and financial consequences of a breach. Scott shares a real-life case where criminals sat silently inside a business email system, watching communication styles and eventually mimicking the MD's tone to authorise fraudulent payments. The losses started small but escalated quickly. These attacks are personal and targeted. For a small business, losing six thousand pounds can be the difference between making payroll and laying people off. Scott stresses the importance of making this real for clients. He talks about positioning cybersecurity not as a technical need but as a business-critical risk conversation. Instead of relying on fear or jargon, help clients picture the consequences. What would happen if they were locked out of systems, lost money, or lost their reputation? Clients need to be educated through impact-based questions and examples they can relate to. We also cover the responsibility that MSPs carry themselves. Cybersecurity starts with you. It must be owned by the business and led from the top. While the technical work can be delegated, the responsibility cannot be passed on. Regular reviews, clear security standards, and the discipline to follow them are essential. Inside Agent, Scott's platform, helps MSPs quickly assess their Microsoft 365 environments and bring them up to best practice. It gives a live compliance score, offers guided fixes, and creates ongoing visibility. It is designed to simplify the process, not complicate it. We discuss why compliance frameworks such as Cyber Essentials Plus should be a minimum standard, and how the upcoming UK Cybersecurity and Resilience Bill is going to push MSPs to meet new legal requirements. With MSPs being seen as part of critical national infrastructure, business owners need to ensure that their internal environments are secure and compliant, not just their clients' systems. Scott Riley shares clear recommendations for securing 365 tenants. These include using hardware MFA tokens, enforcing location and device-based access policies, reviewing and removing unused app integrations, ensuring third parties such as accountants or offshore VAs have the right restrictions in place, and stopping the use of global admin accounts for daily operations. He encourages every MSP to sit with their team regularly and walk through breach scenarios to build internal clarity and confidence. The message is simple. Know where you are exposed. Fix what needs to be fixed. Get independent validation to confirm it. This episode is full of practical, plain-speaking advice that any MSP can follow. Scott Riley brings clarity, urgency, and support to an area that often gets ignored or pushed to the bottom of the list. If you want to protect your business, your team, and your clients, this episode is the reminder you need to act today. Thank you, Scott, for bringing such clear value to this conversation. Connect with Scott Riley on his LinkedIn profile by clicking HERE. Or you can also find out more about Inside Agent by clicking HERE. Make sure to check out our Ultimate MSP Growth Guide HERE, and remember that the help is out there. You just have to go get it. Connect on LinkedIn HERE with Ian and also with Stuart by clicking this LINK And when you're ready to take the next step in growing your MSP, come and take the Scale with Confidence MSP Mastery Quiz. In just three minutes, you'll get a 360-degree scan of your MSP and identify the one or two tactics that could help you find more time, engage & align your people, and generate more leads. OR To join our amazing Facebook Group of over 400 MSPs where we are helping you Scale Up with Confidence, then click HERE Until next time, look after yourself, and I'll catch up with you soon!
Chinese hackers use Cobalt Strike on Taiwan's semiconductor sector Salt Typhoon breaches National Guard and steals network configurations Congress considers Stuxnet to manage OT threats Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO. Find the stories behind the headlines at CISOseries.com.
Cyber attacks can feel a layer detached from the real world. Yes, businesses frequently see IP stolen, get frozen out of systems, or have data wiped by malicious actors. But if you haven't got your finger on the pulse, cyber attacks can also fail to register in your day to day.But there are instances where cyber attacks come crashing into the lives of everyday people, and become impossible to ignore: when attackers go after critical infrastructure and operational technology.Breaches and malware attacks at power and water plants, against core supply chain organizations, or against transport networks can all cause catastrophic damage, enormous financial losses – and even lead to deaths.What are some of the groups leading the charge against critical infrastructure, how are groups targeting operational technology – and what can we do to protect that infrastructure we hold most dear?In this episode, Rory speaks with Magpie Graham, technical director of intel and services at Dragos, to discuss attacks on operational technology, critical infrastructure, and the future of large-scale cyber attacks.
Any club that breaks the GFA Standard Player Contract should be suspended; it's time our players are treated fairly and the loss of talent to foreign clubs ceases - Kojo Addae-Mensah, CEO of Databank Group.
Salt Typhoon breaches a US state's National Guard, Ukrainian hackers wipe the servers of a Russian drone maker, the UK relocates Afghans caught up in a data leak, and Microsoft outsources some US government work to China. Show notes
Breaches aren’t just hitting companies — they’re hitting everyone connected to them. We’re seeing more attacks come through third parties, vendors, and service providers. So what now? Kavitha Mariappan, Chief Transformation Officer, Rubrik joins the Breakfast Show to discuss how AI is changing the cyber game, why supply chains are under siege, and how businesses can stay resilient and one step ahead.See omnystudio.com/listener for privacy information.
McDonald's, Ingram Micro, Prudential Financial, Nippon Steel and so much more is why we can't have nice things this past week!
Catherine Dupont-Gagnon revient sur la « Mother of all Breaches » qui désigne une gigantesque compilation de fuites anciennes regroupant plus de 16 milliards d'identifiants et mots de passe circulant sur le dark web. Aucune nouvelle attaque n'a eu lieu, mais la facilité d'accès à cette base organisée accroît les risques, surtout pour ceux qui réutilisent leurs vieux mots de passe. Elle recommande de vérifier ses courriels via des sites comme Have I Been Pwned, d'utiliser un gestionnaire de mots de passe, d'activer l'authentification à deux facteurs et de rester vigilant face aux courriels frauduleux.
Johnson Controls, Verizon, Qantas, Aflac, Medicare, Louis Vuitton and politically motivated hackers are all part of the last 2 weeks! Woo.
Mon Carnet, le podcast de Bruno Guglielminetti Vendredi 4 juillet 2025 Débrief avec Jérôme Colombain (3:05) Campagne « Osez l'IA » en France Entrevues : Michel-Marie Maudet et l'IA éthique (15:19) Luc Dupont : Le phénomène Jeff Bezos (35:26) Olivier Berthiaume-Bergé : La salle Hard Rock Live à Ottawa (56:10) Josephine Care, l'IA au service des aînés avec Sleiman Chahwan (1:15:18) Billets : Dupont-Gagnon : Mother of all Breaches (1:37:56) Ricoul : Le recul d'Ottawa sur la taxe numérique (1:42:46) Entrevue : Poulin : UX Total avec Daniel Lafrenière (1:52:12) Collaborateurs : Jérôme Colombain, Catherine Dupont-Gagnon, Stéphane Ricoul et Jean-François Poulin www.MonCarnet.com Une production de Guglielminetti.com Juillet 2025
Chris and Hector dive deep into the latest waves of cybercrime, from the FBI's battle with the Scattered Spider group targeting airlines, to takedowns of notorious data breach forums. The duo break down government responses, the real risks for average people, and share honest, hard-won advice for young hackers. Join our new Patreon! https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com
Welcome to the Identity Theft Resource Center's (ITRC) Weekly Breach Breakdown for July 3, 2025. I'm Timothy Walden. Thanks to SentiLink for their support of the ITRC and this podcast. Each week, we break down the latest data security incidents making headlines. Today, we're focusing on a significant lawsuit settlement— the AT&T data privacy settlement. This settlement affected millions of AT&T customers and underscores the increasing complexities of data breach litigation. Follow on LinkedIn: www.linkedin.com/company/idtheftcenter/ Follow on Twitter: twitter.com/IDTheftCenter
Today on the Security Squawk Podcast: We're diving into a high-impact lineup of cyber threats and breaches shaking up industries from healthcare to aviation: Aflac Breach – Social Security numbers, health claims, and personal data compromised. ✈️ FBI Alert: 'Scattered Spider' cybercrime gang now targeting major U.S. airlines. Hawaiian Airlines hit by a cyberattack—what it means for travelers. ️ Hungryroot Breach – Over 1.1 million user records reportedly up for sale on the dark web. Tenacious Marketing USA – 414,000 records exposed. Another day, another marketing firm breached. ️ Hosted by Bryan Hornung, Reginald Andre, and Randy Bryan, this episode delivers real-world analysis, breach breakdowns, and what your business should be doing right now to stay protected. Join us live. Ask questions. Stay ahead. ️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! https://streamyard.com/pal/d/65161790...
Daragh Mahon talks about driving competitive advantage, the importance of cybersecurity, real-time visibility & their 'Cloud First, Cloud Now' strategy. IN THIS EPISODE WE DISCUSS: [04.26] An overview of Werner, what they do, and how they help their customers. “We run all modes of transportation… And we've proven over and over again that we're excellent at every single one of them.” [05.24] Daragh's reflections on the first half of the year, why 2025 is the year of AI, and how Werner's digital transformation journey has positioned them for the future. “The first half of the year has been tough, we're still in this freight recession… There's a lot of volatility, but it does feel like it's leveling out a bit.” [12.22] From demand predictability and labor issues to sustainability and cyber security, the biggest challenges faced by Werner customers, the types of technologies they're looking for to tackle them, and why Werner tech is built around what their customers need most. “You combine all those things, and what you have is a very unpredictable environment. What we have to do… is help level out that playing field and give our customers technology that will help them in all of those places… so that everything is reliable, scalable and secure.” [16.56] Whether data security is being compromised because of increasingly large tech stacks. [20.26] How Werner customers can use their interactive tools to access insights, drive better decision-making and, ultimately, gain a competitive advantage. “Data is more real-time than it's ever been before… And when you give customers real-time access to visibility, that gives them a competitive advantage.” “It's crazy what the supply chain looks like today versus 20 years ago… It's night and day. And the beauty of it is that 20 months from now it will look different, and 20 years from now it will be unrecognizable. That's why I get so excited – especially at the pace we're moving at now.” [27.25] Werner's data access strategy, and how it helps with flexibility, speed, and decision-making support. “I think of data as the great equalizer.” [31.36] The issue of increasing cyber threats and cargo thefts, an overview of Werner's security and safety solutions and how they're protecting what matters most to customers. “You have to think about a cyber attack as ‘when' and not ‘if' – you have to think about how vulnerable you can be, and how you watch and shut down those vulnerabilities.” [36.46] Werner's ‘Cloud First, Cloud Now' strategy, what it means, and how it translates to results for customers. “The tech part is easy. It's the change management that gets really hard.” [40.42] Daragh's key takeaways from today's discussion. RESOURCES AND LINKS MENTIONED: Head over to Werner's website to find out more and discover how they could help you too. You can also connect with Werner and keep up to date with the latest over on LinkedIn, Facebook, YouTube, Instagram, or X (Twitter), or you can connect with Daragh on LinkedIn. If you enjoyed this episode and want to hear more from Werner, check out 446: Keep America Moving, with Werner or 460: Discover the Limitless Value of Dedicated Freight in Today's Market, with Werner.
Listen to a live recording of the podcast at Resolution National Conference with Ruth Dodsworth (journalist and presenter) and Professor Jane Monckton-Smith (Forensic Criminologist). Elaine Richardson wrote this review which we replicate to tell you all about the conversation.A review from Elaine Richardson who was at National Conference:A conversation that stopped the room.At the Resolution National Conference, we had the privilege of hearing a profoundly moving and eye-opening Keynote Live podcast hosted by Anita Mehta and Simon Blain. They were joined by Professor Jane Monckton-Smith and journalist Ruth Dodson—two voices whose insight and courage left a lasting impression.Ruth shared her personal story of surviving coercive and controlling behaviour in her marriage—an experience made even more striking by her words:“I'm one of you, and it happened to me.”As family justice professionals, that hit hard. It was a stark reminder that abuse does not discriminate—and denial can be part of survival.Professor Jane Monckton-Smith brought her ground-breaking research into focus, including the eight-stage homicide timeline that has transformed our understanding of domestic abuse, coercive control, and stalking. She shared that:“Coercive and controlling behaviour is made up of rules and expectations—and one rule you can't break is to separate. Separation just changes the type of control you are subjected to.”“Breaches of injunctions need to be treated much more seriously than they currently are.”Ruth spoke with raw honesty about the financial abuse she endured—how it stripped away her means to leave. And Jane reminded us that the most dangerous and common type of stalker is the “rejected stalker”—obsessed, fixated, and often missed.The audience was silent. Transfixed. Moved.This keynote was not just a session—it was a call to action. For those of us working in family justice, it was a powerful reminder: we must stay alert to the signs of coercive control, listen with care, and never underestimate the danger.
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
A fragile US-brokered ceasefire between Iran and Israel is holding after nearly two weeks of airstrikes and missile attacks. Both sides claim victory, but tensions remain high, with mutual accusations, disputed damage reports, and signs the conflict could easily reignite.
California has placed all Level III and Level IV state prisons under a modified lockdown after a rise in violent incidents, drug overdoses, and contraband smuggling. The California Department of Corrections and Rehabilitation (CDCR) is conducting an in-depth investigation.
Aflac, Krispy Creme, UBS, 23andMe, Zoomcar, Sysco, Optima Tax Relief, & a Mother's Day Brunch are all flying under the radar this week thanks to 16 BILLION recycled passwords!
Mother of all Breaches, Microsoft started blocking Chrome, Microsoft 365 Local!?! On-Prem M365! How do I get off the Cloud? Carolyn needs a new Printer, Windows 11 start up bug is a Vista Chime! Sebastian Maniscalco talks Internets!
In this episode of 'Cybersecurity Today,' host Jim Love discusses several alarming cybersecurity developments. A recent Washington Post breach raises critical questions about Microsoft 365's enterprise security as foreign government hackers compromised the email accounts of journalists. Additionally, a critical Linux flaw allows attackers to gain root access, making millions of systems vulnerable. Upgraded Godfather malware now creates virtual banking apps on infected Android devices to steal credentials in real-time. Moreover, a record-breaking data breach has exposed 16 billion logins, including Apple accounts, underscoring the fundamental flaws of password-based security. Finally, the episode addresses the systemic vulnerabilities of SMS-based two-factor authentication, advocating for a transition to app-based or hardware key solutions. 00:00 Introduction and Major Headlines 00:24 Microsoft 365 Security Breach 03:19 Critical Linux Vulnerabilities 05:59 Godfather Malware Evolution 08:18 Massive Data Breach Exposed 11:30 The Fall of SMS Two-Factor Authentication 13:21 Conclusion and Final Thoughts
An exploited iOS iMessage vulnerability Apple denies? The NPM repository is under siege with no end in sight. Were Comcast and Digital Realty compromised? Don't ask them. Matthew Green agrees: XChat does not offer true security. We may know how Russia is convicting Telegram users. Microsoft finally decides to block two insane Outlook file types. 40,000 openly available video camera are online. Who owns them? Running SpinRite on encrypted drives. An LLM describes Steve's (my) evolution on Microsoft security. What do we know about the bots that are scanning the Internet? Show Notes - https://www.grc.com/sn/SN-1030-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: joindeleteme.com/twit promo code TWIT bitwarden.com/twit material.security drata.com/securitynow bigid.com/securitynow
An exploited iOS iMessage vulnerability Apple denies? The NPM repository is under siege with no end in sight. Were Comcast and Digital Realty compromised? Don't ask them. Matthew Green agrees: XChat does not offer true security. We may know how Russia is convicting Telegram users. Microsoft finally decides to block two insane Outlook file types. 40,000 openly available video camera are online. Who owns them? Running SpinRite on encrypted drives. An LLM describes Steve's (my) evolution on Microsoft security. What do we know about the bots that are scanning the Internet? Show Notes - https://www.grc.com/sn/SN-1030-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: joindeleteme.com/twit promo code TWIT bitwarden.com/twit material.security drata.com/securitynow bigid.com/securitynow
An exploited iOS iMessage vulnerability Apple denies? The NPM repository is under siege with no end in sight. Were Comcast and Digital Realty compromised? Don't ask them. Matthew Green agrees: XChat does not offer true security. We may know how Russia is convicting Telegram users. Microsoft finally decides to block two insane Outlook file types. 40,000 openly available video camera are online. Who owns them? Running SpinRite on encrypted drives. An LLM describes Steve's (my) evolution on Microsoft security. What do we know about the bots that are scanning the Internet? Show Notes - https://www.grc.com/sn/SN-1030-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: joindeleteme.com/twit promo code TWIT bitwarden.com/twit material.security drata.com/securitynow bigid.com/securitynow
An exploited iOS iMessage vulnerability Apple denies? The NPM repository is under siege with no end in sight. Were Comcast and Digital Realty compromised? Don't ask them. Matthew Green agrees: XChat does not offer true security. We may know how Russia is convicting Telegram users. Microsoft finally decides to block two insane Outlook file types. 40,000 openly available video camera are online. Who owns them? Running SpinRite on encrypted drives. An LLM describes Steve's (my) evolution on Microsoft security. What do we know about the bots that are scanning the Internet? Show Notes - https://www.grc.com/sn/SN-1030-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: joindeleteme.com/twit promo code TWIT bitwarden.com/twit material.security drata.com/securitynow bigid.com/securitynow
An exploited iOS iMessage vulnerability Apple denies? The NPM repository is under siege with no end in sight. Were Comcast and Digital Realty compromised? Don't ask them. Matthew Green agrees: XChat does not offer true security. We may know how Russia is convicting Telegram users. Microsoft finally decides to block two insane Outlook file types. 40,000 openly available video camera are online. Who owns them? Running SpinRite on encrypted drives. An LLM describes Steve's (my) evolution on Microsoft security. What do we know about the bots that are scanning the Internet? Show Notes - https://www.grc.com/sn/SN-1030-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: joindeleteme.com/twit promo code TWIT bitwarden.com/twit material.security drata.com/securitynow bigid.com/securitynow
An exploited iOS iMessage vulnerability Apple denies? The NPM repository is under siege with no end in sight. Were Comcast and Digital Realty compromised? Don't ask them. Matthew Green agrees: XChat does not offer true security. We may know how Russia is convicting Telegram users. Microsoft finally decides to block two insane Outlook file types. 40,000 openly available video camera are online. Who owns them? Running SpinRite on encrypted drives. An LLM describes Steve's (my) evolution on Microsoft security. What do we know about the bots that are scanning the Internet? Show Notes - https://www.grc.com/sn/SN-1030-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: joindeleteme.com/twit promo code TWIT bitwarden.com/twit material.security drata.com/securitynow bigid.com/securitynow
An exploited iOS iMessage vulnerability Apple denies? The NPM repository is under siege with no end in sight. Were Comcast and Digital Realty compromised? Don't ask them. Matthew Green agrees: XChat does not offer true security. We may know how Russia is convicting Telegram users. Microsoft finally decides to block two insane Outlook file types. 40,000 openly available video camera are online. Who owns them? Running SpinRite on encrypted drives. An LLM describes Steve's (my) evolution on Microsoft security. What do we know about the bots that are scanning the Internet? Show Notes - https://www.grc.com/sn/SN-1030-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: joindeleteme.com/twit promo code TWIT bitwarden.com/twit material.security drata.com/securitynow bigid.com/securitynow
T-Mobile, Microsoft, a popular hookup app, and so much more are all part of this week's cyber insanity.
Total Soccer Show: USMNT, EPL, MLS, Champions League and more ...
The TSS Gang is here to answer your questions! On this episode we're asking what happened to Man City's points deduction woes, we're considering whether The USMNT should tank the Gold Cup, we're asking if there's a world where Man Utd gets its finances in order, and much more!WE HAVE A YOUTUBE CHANNEL!We're posting all our episodes here! Smash the like and subscribe etc.!JOIN THE TSS+ PATREON!Check out our Patreon, which houses bonus podcasts, access to our exclusive Discord, blog posts, videos, and much more. Hosted on Acast. See acast.com/privacy for more information.