POPULARITY
Categories
In the electric chaos of DEF CON—where dial tones, solder smoke, and hacker legends collide—one figure stands out: John Aff, aka PANDA.A veteran in the hacker community, he moves effortlessly between challenge design, telephony wizardry, mesh networking experiments, and the culture that surrounds it all.Behind the reputation is a journey that started with game hacking, shifted into enterprise security, and evolved into a life built around creativity, community, and technical obsession. It's also a story of identity—of finding a place where personal expression and professional skill finally intersected.This conversation pulls back the curtain on a mind shaped by curiosity, lived experience, and a deep love for the craft.CHAPTERS00:00 - Introduction to Barcode Podcast00:24 - Meet Panda: Cybersecurity Icon01:47 - Panda's Journey into Cybersecurity10:12 - Creating Interactive Challenges for Conferences22:11 - Badge Building: The Art and Science28:00 - Lessons from Offensive Security for Defenders30:11 - Winning the TeleChallenge: A Team Effort35:10 - Nostalgia in Gaming: The Phone Verse Experience37:30 - Understanding LoRa and Mesh Networking43:20 - Real-World Applications of MeshTastic Technology49:14 - The Intersection of Furry Culture and Cybersecurity56:54 - Community Building and Future Aspirations in TechLINKSTeleFreak – https://telefreak.org Home of the legendary TeleChallenge and a cornerstone of phreaking culture at DEF CON.DEF CON – https://defcon.org The world's largest hacker conference and the backdrop for many of Panda's stories, competitions, and breakthroughs.RedSeer Security – https://redseersecurity.com The security practice Panda supports on the defensive and strategic side.Assura, Inc. – https://assurainc.com Where Panda leads offensive security operations and continuous testing programs.MeshTastic – https://meshtastic.org Open-source long-range mesh communication project central to Panda's community work.Comms For All – https://commsforall.com Panda's initiative focused on mesh networking, LoRa radios, and community education.B-Sides Jax – https://bsidesjax.org Conference where Panda built the interactive phone-based badge challenge.HackSpaceCon – https://hackspacecon.com The first conference where you and Panda crossed paths; a major Florida hacker gathering.JLCPCB – https://jlcpcb.com PCB manufacturing service used for producing custom badge hardware.EasyEDA – https://easyeda.com Design tool Panda uses to create the multilayer art and circuitry for badges.Vectorizer.AI – https://vectorizer.ai The AI-powered tool Panda relies on to convert artwork into vector format for PCB badge design.KiCad – https://kicad.org Open-source PCB design suite used for laying out circuits and prototyping badge hardware.Adtran – https://www.adtran.com Telecom hardware vendor whose legacy gateways were used in the BSides Jax phone challenge.QueerCon – https://www.queercon.org Long-running LGBTQ+ hacker community at DEF CON that collaborated with Panda on early badge projects.National Cyber Games (NCA Cyber Games) – https://nationalcybergames.org Competition platform where Panda designed MeshTastic-based CTF challenges.UNF Osprey Security – https://www.unf.edu University of North Florida's student security group that runs CTFs and collaborated locally with Panda.HackRedCon – https://hackredcon.com Security conference where Panda volunteers and participates in community events.Jax2600 – https://2600.com Local chapter of the classic 2600 hacker community, part of Panda's long-term involvement in grassroots infosec groups.Backdoors & Breaches – https://blackhillsinfosec.com/projects/backdoors-breaches Incident response card game Panda used for blue team development and tabletop exercises.
Joseph Avanzato is the Security Operations and Forensics Group Leader at Varonis. In this episode, he joins host Paul John Spaulding to discuss the common tactics attackers exploit and mistakes made by enterprises that lead breaches, as well as how Varonis is uniquely positioned to help public and private customers around the world investigate, contain, and evict attackers from their network. This episode is brought to you by Varonis, whose AI-powered data security platform secures your data at scale – across IaaS, SaaS, and hybrid cloud environments. To learn more about our sponsor, visit https://www.Varonis.com.
Hyundai, Kia, Genesis Logitech, Princeton, The Washington Post, DoorDash and so much more is part of this week's breaches!
When a young engineer uncovered a sizeable click fraud situation at Google, he discovered a bigger problem; namely, the perverse ingenuity that drives online fraud and scams. "Big Breaches" author Neil Daswani joined us to talk click farms, data breaches, AI exploits, and the big picture of cybercrime today. Learn more about your ad choices. Visit megaphone.fm/adchoices
PREVIEW. Hezbollah Rises Again: Unfinished Business and Ceasefire Breaches in Lebanon. Edmund Fitton-Brown described Hezbollah as a "punched out fighter on the mat getting up slowly," rearming to a new scale of threat. There is definitely "unfinished business in Lebanon." Hezbollah intends to break the ceasefire, which is monitored by the United States and Israel. The Lebanese state has shown reluctance to disarm Hezbollah, which the ceasefire requires. 1899 BEIRUT
A very special Breaches of the Week segment!
Send us a textIn this episode of Privacy Please, host Cameron Ivey discusses significant security threats, including a critical vulnerability in Microsoft's WSUS, a major data breach at the University of Pennsylvania, and the emergence of sophisticated malware known as Glassworm. The conversation highlights the importance of cybersecurity measures and the potential consequences of negligence in IT security. Support the show
The index slipped below its 20-day EMA, flashing the first real sign of caution in weeks. This technical breach hints at short-term fatigue, yet the underlying structure still shows selective strength in defensive and high-beta pockets.With global sentiment mixed and domestic flows steady, traders should stay alert for false breakdowns and intraday reversals — the kind that often mark short-term bottoms.In this episode, Neel Parekh decodes the technical setup, outlines profit-protection strategies, and highlights where smart money might quietly re-enter if volatility spikes.
The index slipped below its 20-day EMA, flashing the first real sign of caution in weeks. This technical breach hints at short-term fatigue, yet the underlying structure still shows selective strength in defensive and high-beta pockets.With global sentiment mixed and domestic flows steady, traders should stay alert for false breakdowns and intraday reversals — the kind that often mark short-term bottoms.In this episode, Neel Parekh decodes the technical setup, outlines profit-protection strategies, and highlights where smart money might quietly re-enter if volatility spikes.
The index slipped below its 20-day EMA, flashing the first real sign of caution in weeks. This technical breach hints at short-term fatigue, yet the underlying structure still shows selective strength in defensive and high-beta pockets.With global sentiment mixed and domestic flows steady, traders should stay alert for false breakdowns and intraday reversals — the kind that often mark short-term bottoms.In this episode, Neel Parekh decodes the technical setup, outlines profit-protection strategies, and highlights where smart money might quietly re-enter if volatility spikes.
Tom Lyons of business website, The Currency, discusses the Central Bank's fining of cryptocurrency exchange, Coinbase Europe over €21 million for breaching anti-money laundering and counter-terrorist monitoring obligations.
Google, HSBC, Conduent, Tesla, Penn, EY, Tata Motors, the Iranian Government, and so many more were in the crosshairs of attackers this week!
Toys ‘R' Us, Nintendo, Sotheby's, Pirelli Tyres, Air France and your AI girlfriend are all having a rather bad week!
Your daily news in under three minutes. At Al Jazeera Podcasts, we want to hear from you, our listeners. So, please head to https://www.aljazeera.com/survey and tell us your thoughts about this show and other Al Jazeera podcasts. It only takes a few minutes! Connect with us: @AJEPodcasts on X, Instagram, Facebook, and YouTube
Guest: Jibran Ilyas, Director for Incident Response at Google Cloud Topics: What is this tabletop thing, please tell us about running a good security incident tabletop? Why are tabletops for incident response preparedness so amazingly effective yet rarely done well? This is cheap/easy/useful so why do so many fail to do it? Why are tabletops seen as kind of like elite pursuit? What's your favorite Cloud-centric scenario for tabletop exercises? Ransomware? But there is little ransomware in the cloud, no? What are other good cloud tabletop scenarios? Resources: EP60 Impersonating Service Accounts in GCP and Beyond: Cloud Security Is About IAM? EP179 Teamwork Under Stress: Expedition Behavior in Cybersecurity Incident Response EP222 From Post-IR Lessons to Proactive Security: Deconstructing Mandiant M-Trends EP177 Cloud Incident Confessions: Top 5 Mistakes Leading to Breaches from Mandiant EP158 Ghostbusters for the Cloud: Who You Gonna Call for Cloud Forensics EP98 How to Cloud IR or Why Attackers Become Cloud Native Faster?
CISA, F5, PNC, Canadian Tire, Discord and so much more are all part of breaches of the week!
Brewery Breach Brings Bitter Blow to Beer Buffs. Windowless Wonders: Digital Daylight for the Jet Set. Collar Communication: Cows Connect Through Clever, Cloud-Controlled Collars. Clever Cameras or Cautious Concerns: Can AI Eyes Really Protect Our Homes? Cleaning Conqueror: The Deebot Delivers Dirt-Defying Design and Drive. Flash, Fuse, and Frame: Gemini's Generative Genius Gets a Photoshop-Free Future. Talking Tech: Translating Travel through Tongues and Tech. Call Combat: Clever Call-Screening Cuts Cold-Caller Chaos. Shark Shield or Style Statement? Scientists Suit Up for Bite-Resistant Breakthroughs.
Three hosts. Gamecubes, Apple Updates, Campers, and Breaches.
Richard Ford – Group Chief Technology Officer (SA), Integrity360 SAfm Market Update - Podcasts and live stream
Tonight we explore whether SA is in line for a rerating with Investec chief economist Annabel Bishop, we discuss the growing financial impact of cyber breaches on companies with Richard Ford from Integrity360, Nedbank's Terence G Sibiya explains how finance can act as a lever for systemic development across Africa, and in our Executive Lounge segment we chat with ABB SA's Graham Abrahams about his sales journey and career passions. SAfm Market Update - Podcasts and live stream
Nintendo, Qantas, SonicWall and how lying is hacking our brains are all part of this week.
Crypto scams and security breaches reached $2.3 billion in 2024 with AI deepfakes and state-sponsored attacks on the rise. Learn how everyday investors can spot early warning signs, protect their wallets, and stay ahead of increasingly sophisticated threats targeting personal crypto holdings. JCH Digital City: Quesnel Address: Blair Street Website: https://www.jchdigital.ca/
APAC stocks trade mixed with demand hampered following the negative handover from the US; European futures flat.RBNZ cut rates by 50bps and kept the door open to further rate cuts.US President Trump said a lot of things will be eliminated due to the shutdown, and he will tell us about the eliminated jobs in four or five days.USD remains on the front foot, NZD lags post-RBNZ, JPY digests soft real cash earnings data.Spot gold continued its advances, in which spot prices climbed above the USD 4,000/oz level.Looking ahead, highlights include German Industrial Output (Aug), Swedish CPIF Flash (Sep), NBP Policy Announcements, FOMC Minutes (Sep), BoE's Pill, ECB's Elderson & Lagarde, Fed's Musalem, Barr, Goolsbee & Kashkari, Supply from UK, Germany & US.Read the full report covering Equities, Forex, Fixed Income, Commodites and more on Newsquawk
In this episode of the Security Squawk Podcast, Bryan Hornung, Randy Bryan, and Reginald Andre dissect three headline-making cybersecurity incidents that highlight how threats keep evolving—just in different directions. Randy kicks things off with WestJet's massive data breach, where over 1.2 million customers had their information exposed, showing how even major airlines struggle with protecting sensitive data in 2025. Andre dives into a shocking story out of Australia—the NSW government accidentally uploading flood victims' personal data to ChatGPT, revealing how AI misuse and data mishandling can turn into a privacy nightmare overnight. Bryan closes with the latest findings showing ransomware attacks are rising again—just as fewer companies renew their cyber insurance policies, setting up the perfect storm for costly business disruptions. The team breaks down what these stories mean for business owners, from growing AI data risks to the real cost of skipping cybersecurity insurance. Expect practical takeaways, sharp insights, and a few laughs along the way as the guys decode what's really happening behind the headlines. ️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! https://streamyard.com/pal/d/65161790...
Breaches of the Week; Welcoming CERN to HIBP; Latest Pilot Jobs and HomeRefill Data Breaches; Brainstorming the Breach Pipeline; Sponsored by Report URI https://www.troyhunt.com/weekly-update-472/See omnystudio.com/listener for privacy information.
Discord, Salesforce, Red Hat, Oracle (again), Renault, Comcast and the US Air Force all made this is just an insane week for breaches!
This conversation delves into the complexities of contract law, focusing on performance, breach, and conditions. It outlines a structured approach to understanding these concepts, emphasizing the differences between common law and UCC standards, the importance of express versus constructive conditions, and the various excuses for non-performance. The discussion also covers anticipatory breach and repudiation, providing a comprehensive framework for law students preparing for exams.Navigating the complexities of contract law can be daunting, especially when it comes to understanding performance standards. Whether you're preparing for a law exam or dealing with real-world contracts, grasping the differences between Common Law and the Uniform Commercial Code (UCC) is crucial. Let's delve into these distinctions and their implications.Common Law Performance Standards: Under Common Law, particularly in service or construction contracts, the principle of substantial performance prevails. This means that as long as the core obligations are met, minor defects do not constitute a breach. The focus is on whether the essence of the contract has been fulfilled, allowing for some flexibility in performance.UCC and the Perfect Tender Rule: In contrast, the UCC, which governs the sale of goods, enforces the perfect tender rule. This strict standard requires that goods delivered must conform exactly to the contract specifications. Any deviation, however minor, can allow the buyer to reject the goods. However, the UCC also provides a right to cure, giving sellers a chance to correct non-conformities under certain conditions.Conditions and Breach: Understanding conditions is vital in both frameworks. Express conditions require strict compliance, while constructive conditions allow for substantial performance. Breaches under Common Law are categorized as minor or material, affecting the remedies available. Under the UCC, non-conforming goods trigger the buyer's rights, but the seller's right to cure can mitigate this.The distinction between Common Law and UCC performance standards highlights the importance of context in contract law. Whether dealing with services or goods, understanding these frameworks can guide you in drafting, negotiating, and enforcing contracts effectively. As you navigate these legal waters, remember that the key lies in the details and the specific terms agreed upon by the parties involved.Subscribe now to stay updated on the latest insights in contract law and more.TakeawaysContracts get intense after formation, especially performance.Understanding performance obligations is crucial for legal analysis.The distinction between common law and UCC standards is vital.Material breach vs. minor breach directly affects remedies.The materiality test determines the severity of a breach.Express conditions require strict compliance, unlike constructive conditions.Impossibility and impracticability are key excuses for non-performance.Anticipatory repudiation allows immediate action by the non-breaching party.The right to cure can mitigate strict performance requirements.Legal drafting can significantly impact risk allocation in contracts.law school, contracts, performance, breach, conditions, UCC, common law, legal analysis, exam preparation
CannCon kicks off solo before Alpha finally rolls in late, and together they tear through the chaos of the day. From a deep dive into Tina Peters' ongoing imprisonment to the DOJ's shady firings, Secret Service failures, and the weaponization of Big Tech, the hosts spotlight the corruption hiding in plain sight. They break down President Trump's moves against corporate embeds like Lisa Monaco, unpack the latest twists in the government shutdown, and call out the hypocrisy of the establishment. With sidebars on Malibu's stalled rebuild, a bizarre NYPD infiltration at the Ryder Cup, and AOC's strange rise, the episode is equal parts sharp analysis and raw banter. Sponsors include Comet by Perplexity, Soft Disclosure, Native Path Collagen, Patriot Injury Lawyers, and Pickaxe.
Breach notification letters set to flood North America's mailboxes New bug in classic Outlook only fixed via Microsoft support Air Force admits SharePoint privacy issue over breach Huge thanks to our sponsor, Nudge Security AI notetakers like Otter AI spread fast. In fact, one Nudge Security customer discovered 800 new accounts created in only 90 days. Viral AI notetakers introduce a slew of data privacy risks by gaining access to calendars and adding themselves to every meeting. Nudge Security can help. Within minutes of starting a free trial, you'll see every AI app, account, and integration, even those created in the past. And, smart automation helps you clean up unwanted accounts and guide users towards approved alternatives. See how you can regain control today at nudgesecurity.com/stopotter
In this episode of the podcast, Ryan Williams Sr. and Shannon Tynes discuss the latest cybersecurity news, including CISA's emergency directive regarding Cisco vulnerabilities, the rise of SIM farms threatening US infrastructure, and the alarming trend of cybercriminals targeting children's data for ransom. They emphasize the importance of cybersecurity awareness and the evolving landscape of cyber threats while also sharing personal updates and reflections on their experiences in the field. Article: CISA orders feds to patch Cisco flaws used in multiple agency hacks https://www.cybersecuritydive.com/news/cisa-emergency-directive-cisco-vulnerabilities-arcanedoor/761150/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExd2lleHdWb1RWbEFZTDBJeQEenjZcbYPfTEpDqYpskC1y_ATnQjy8Xs0O_lBm9CqOYVx3jY2IWAuVe19i1Rk_aem_QN5KLONSnHGtBgaVUXEsXw ‘SIM Farms' Are a Spam Plague. A Giant One in New York Threatened US Infrastructure, Feds Say https://www.wired.com/story/sim-farm-new-york-threatened-us-infrastructure-feds-say/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExd2lleHdWb1RWbEFZTDBJeQEenLyO6lHFipbOSiGb3VydzS5_tY3hL7Z4kXKi86wzH_Qcfc3tyl4x1uELPgk_aem_KHOxgSVa-qn4XeXt7xdiKQ Nursery hackers threaten to publish more children's profiles online https://www.bbc.com/news/articles/c07vxv8v89lo.amp?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExd2lleHdWb1RWbEFZTDBJeQEetWzL8TMJE9U0bVS7Uy0EJFnJXxX0Xf7BQRXxJw-U4fatP_ilEnBIKdE6tQc_aem_OaAnjTw17cUrAzhvv9ShRw Buy the guide: www.theothersideofthefirewall.com Please LISTEN
Are we already living in a post-data privacy world? Breaches are everywhere, data is constantly being leaked, and GDPR fines haven’t stopped surveillance capitalism or shady data brokers. In this episode of the Analyst Chat, Matthias Reinwarth is joined by Mike Small and Jonathan Care to explore whether privacy still has meaning — or if resilience and risk management are the only ways forward. They debate: ✅ Is privacy truly dead, or just evolving?✅Why regulations like GDPR often miss the mark ⚖️✅How cyber resilience is becoming more critical than “traditional” privacy✅The personal, societal, and legal dimensions of privacy✅What organizations (and individuals) can still do to protect data
Edition No249 | 28-09-2025 - Today we turn the spotlight squarely on Russia's propaganda machinery — and how its most vicious threats now extend even to Britain's ancient universities. Solovyov has threatened to wipe out the town where I live in an atomic inferno, for no other reason that we refuse to allow Russia to erase Ukraine from the world map. Perhaps he's also upset he can't get to his Italian villas since 2022. So, Russia's foremost propagandist has threatened to wipe out one of the most ancient seats of learning and civilisation, and by extension threaten to kill me. Apart from the bluster and vicious hatred, it's such utterances that show Russia has fallen far from what could be considered civilisation, civilised language and behaviour, and that no regime hack or representative should be allowed in civilised company, at least for the lifetime of the current regime. That ban should also extend to all the minions and enablers of the regime. We'll explore how that fits into a broader pattern: Russia's imperial ambitions, its civilizational decline, and the accelerating slide in global norms under pressure from China, Russia, and their allies — but also how Ukraine and its global backers confront this – showing that resistance, and a reassertion of civilised values is possible – though it comes at a steep price.We begin — shockingly — with Vladimir Solovyov's threat to bomb Oxford and Cambridge.----------This is super important. There are so many Battalions in Ukraine, fighting to defend our freedoms, but lack basics such as vehicles. These are destroyed on a regular basis, and lack of transport is costs lives, and Ukrainian territory. Once again Silicon Curtain has teamed up with Car4Ukraine and a group of wonderful creators to provide much-needed assistance: https://car4ukraine.com/campaigns/autumn-harvest-silicon-curtainAutumn Harvest: Silicon Curtain (Goal€22,000)We'll be supporting troops in Pokrovsk, Kharkiv, and other regions where the trucks are needed the most. 93rd Brigade "Kholodnyi Yar", Black Raven Unmanned Systems Battalionhttps://car4ukraine.com/campaigns/autumn-harvest-silicon-curtain----------SOURCES: “Russia should ‘bomb Oxford', key Putin ally says,” UK News / Yahoo, Sept 2025“Top Russian propagandist issues threat to drop nuclear bombs …” LADbible, Sept 2025 Nancy Ries, *Russia's Atrocity Rhetoric During Its War on Ukraine* (RCIN) An Independent Legal Analysis of the Russian Federation's Breaches of the Genocide Convention (New Lines Institute) “Holding Putin's propagandists accountable for crimes in Ukraine,” Atlantic Council UkraineAlert, June 2024 “Dmitry Medvedev says editors of The Times are ‘legitimate military targets',” The Guardian, Dec 2024 “Russia is at war with Britain …”, The Guardian / Fiona Hill commentary, June 2025 “International Criminal Court arrest warrants for Russian leaders,” Wikipedia / ICC context “Andrey Gurulyov,” Wikipedia (remarks on bombing Britain)----------SILICON CURTAIN LIVE EVENTS - FUNDRAISER CAMPAIGN Events in 2025 - Advocacy for a Ukrainian victory with Silicon Curtainhttps://buymeacoffee.com/siliconcurtain/extrasOur events of the first half of the year in Lviv, Kyiv and Odesa were a huge success. Now we need to maintain this momentum, and change the tide towards a Ukrainian victory. The Silicon Curtain Roadshow is an ambitious campaign to run a minimum of 12 events in 2025, and potentially many more. Any support you can provide for the fundraising campaign would be gratefully appreciated. https://buymeacoffee.com/siliconcurtain/extras----------SUPPORT THE CHANNEL:https://www.buymeacoffee.com/siliconcurtainhttps://www.patreon.com/siliconcurtain----------
Harrods, Stellantis, Volvo, the Canadian Government and so much more is why these segments are ALWAYS open bar!
Roger Stone: The Rise in Security Breaches and Assassinations (6 min) Learn more about your ad choices. Visit megaphone.fm/adchoices
AP correspondent Charles de Ledesma reports NATO warns Russia it will use all means to defend against airspace breaches.
Tiffany, SonicWall, Crowdstrike, SonicWall, Aetna CVS, The Social Security Administration and every financial advisor in Canada and so much more are why we want off this planet this week...
Kevin and Kieran discuss the news that Chelsea have been hit with 74 charges over alleged agent rule breaches, and find out why Inverness Caledonian Thistle are now out of administration. Follow Kevin on X - @kevinhunterday Follow Kieran on X - @KieranMaguire Follow The Price of Football on X - @pof_pod Send in a question: questions@priceoffootball.com Join The Price of Football CLUB: https://priceoffootball.supportingcast.fm/ Check out the Price of Football merchandise store: https://the-price-of-football.backstreetmerch.com/ Visit the website: https://priceoffootball.com/ For sponsorship email - info@adelicious.fm The Price of Football is a Dap Dip production: https://dapdip.co.uk/ contact@dapdip.co.uk Learn more about your ad choices. Visit podcastchoices.com/adchoices
NATO allies confer after Russian incursions, Brad Littlejohn on holding Apple accountable, and Collin Garbarino reviews Downton Abbey: The Grand Finale. Plus, a Boy Scout saves a life, Matthew West's new song offers hope, and the Tuesday morning newsSupport The World and Everything in It today at wng.org/donateAdditional support comes from Planted Gap Year, where young adults combine Bible classes, hands-on farming, and outdoor adventure. More at plantedgapyear.orgFrom PrayMore, a new app for churches to share prayer requests with members and send reminders to pray. Free trial available at praymore.com/worldAnd from iWitness. Powerful audio dramas bringing faith, courage, and history to life in unforgettable ways. iwitnesspod.com
In this episode of The President's Daily Brief: New revelations about Charlie Kirk's accused assassin, Tyler Robinson, and the chilling way he mocked investigators in real time. NATO airspace violated by a Russian drone again, this time over Romania, as President Zelensky warns the latest breach shows the war is spreading. President Trump says he won't impose new U.S. sanctions on Russia unless NATO allies first cut off their purchases of Russian oil. And in today's Back of the Brief—the UN General Assembly votes overwhelmingly for a two-state solution declaration—while also condemning Hamas, managing to call them out and hand them exactly what they want in the same breath. To listen to the show ad-free, become a premium member of The President's Daily Brief by visiting PDBPremium.com.Please remember to subscribe if you enjoyed this episode of The President's Daily Brief.YouTube: youtube.com/@presidentsdailybrief Jacked Up Fitness: Get the all-new Shake Weight by Jacked Up Fitness at https://JackedUpShakeWeight.comTriTails Premium Beef: Reclaim dinner from the jaws of school-year chaos Visit https://trybeef.com/PDB.American Financing: NMLS 182334, nmlsconsumeraccess.org. APR for rates in the 5s start at 6.327% for well qualified borrowers. Call 866-885-1881 for details about credit costs and terms. Visit http://www.AmericanFinancing.net/PDB. Learn more about your ad choices. Visit megaphone.fm/adchoices
Headlines: – Welcome to Mo News (02:00) – Inside The Arrest Of Suspect In Charlie Kirk's Murder (06:00) – Rubio Meets Netanyahu Amid Qatar Strike Fallout (28:15) – Russian Drone Entered Romania's Airspace After Poland Incident (34:15) – Trade Schools Benefit From Trump's Ivy League Fight (37:15) – America's Sex Recession: Record Lows In Intimacy (40:00) – TV's Biggest Night: Recapping The 77th Emmy Awards (44:45) – On This Day In History (48:00) Thanks To Our Sponsors: – LMNT - Free Sample Pack with any LMNT drink mix purchase– Industrious - Coworking office. 50% off day pass | Promo Code: MONEWS50 – Surfshark - 4 additional months of Surfshark VPN | Code: MONEWS – Leesa – 25% off mattress, plus extra $50 off | Promo Code: MONEWS – Factor Meals – 50% your first box plus free shipping | Promo Code: monews50off – Monarch Money - 50% off your first year | Promo Code: MONEWS
The Great Firewall of China, Jaguar Land Rover, Workday, Facebook, Tenable and Qualys, HackerOne and so much more are all part of this week's breaches!
This week on Security Squawk, Bryan Hornung and Randy Bryan break down two hard-hitting cybersecurity stories. Jaguar Land Rover's production lines grind to a halt after a massive cyberattack, showing how ransomware directly disrupts global manufacturing. Meanwhile, CISOs face mounting pressure to stay silent about breaches, raising serious questions about transparency, accountability, and corporate risk. Tune in for sharp insights, real-world lessons, and a dose of wit as we unpack what these stories mean for businesses, IT pros, and MSPs. ️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! https://streamyard.com/pal/d/65161790...
Palo Alto Networks, Zscaler, Cloudflare, Navy Fed, AT&T, more Salesforce fallout and now these segments are officially open bar...
Google, Transunion, Farmer's Insurance and even DOGE are part of this week's mess.
Dan Bowden, Marsh McLennan Global Business CISO, and Erik Decker, Intermountain Health VP & CISO, join host Charlie Osborne in this episode to discuss their approach to establishing trust and preventing breaches across organizations. Marsh is the world's most trusted and innovative cyber risk advisor, simplifying complexity while delivering unmatched results. To learn more about our sponsor, visit https://marsh.com and click on “cyber risk.”
PayPal, Workday, Panera, Manpower, Intel, Canada's House of Commons, and so much more are part of this week's breaches!
SBS Finance Editor Ricardo Gonçalves speaks with Gemma Dale from nabtrade about the ASX 200's record close, and takes a closer look at Rebel Sport's theft problem.
In today's episode of 'Cybersecurity Today,' hosted by Jim Love, we cover several key issues in the cybersecurity landscape. Firstly, a breach involving Workday and social engineering attacks targeting Salesforce customers is discussed. Next, the risks posed by a recent Windows update potentially causing data corruption on SSDs and HDDs are highlighted. We also delve into a critical infrastructure breach where Russian hackers remotely accessed a Norwegian dam's control system. Additionally, the episode covers Google's vulnerabilities in its AI and Gmail services, and finally, Apple's significant privacy victory against the UK's backdoor encryption mandate. The episode concludes with a call for listener support through donations to sustain the program. 00:00 Introduction and Headlines 00:23 Workday Data Breach Explained 02:15 Windows Update Issues 04:05 Norwegian Dam Cyber Attack 05:49 Google's Security Challenges 07:12 Apple's Privacy Victory 08:19 Conclusion and Listener Support
Microsoft issues emergency updates for zero-day SharePoint flaws. Alaska Airlines resumes operations following an IT outage. The UK government reconsiders demands for Apple iCloud backdoors. A French Senate report raises concerns over digital sovereignty. Meta declines to sign the EU's new voluntary AI code of practice. A new report claims last year's CrowdStrike outage disrupted over 750 hospitals. The World Leaks extortion group has breached Dell's Customer Solution Centers. Hewlett-Packard Enterprise (HPE) issues a critical warning about two severe security flaws in Aruba Instant On Access Points. A single compromised password leads to a UK transport company's demise. An AI assistant falls for fake metadata magic. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Maria Varmazis, host of T-Minus Space Daily, joins Dave Bittner to unpack AST SpaceMobile's request to use amateur radio spectrum for satellite communications. They explore what this means for ham radio users, the role of secondary spectrum access, and why the amateur community is pushing back. It's a nuanced look at spectrum sharing, space tech, and regulatory tensions. Selected Reading Global hack on Microsoft product hits U.S., state agencies, researchers say (The Washington Post) Microsoft releases emergency patches for SharePoint RCE flaws exploited in attacks (Bleeping Computer) Alaska Airlines requests all flights to be grounded: FAA (ABC News) UK government seeks way out of clash with US over Apple encryption (Financial Times) Digital vassals? French Government ‘exposes citizens' data to US' (Brussels Signal) Meta snubs the EU's voluntary AI guidelines (The Verge) At Least 750 US Hospitals Faced Disruptions During Last Year's CrowdStrike Outage, Study Finds (WIRED) Dell confirms breach of test lab platform by World Leaks extortion group (Bleeping Computer) HPE warns of hardcoded passwords in Aruba access points (Bleeping Computer) Weak password allowed hackers to sink a 158-year-old company (BBC News) Claude Jailbroken to Mint Unlimited Stripe Coupons (General Analysis) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security