POPULARITY
Categories
President Donald Trump is set to be at the World Economic Forum in Davos with Greenland top of the agenda. Lindsey Halligan is stepping away from her as US Attorney role. The Justice Department admits that DOGE employees have inappropriately handled sensitive data. Israeli Prime Minister Benjamin Netanyahu has joined Trump's “Board of Peace” for Gaza. Plus, the man who assassinated Japan's former Prime Minister has been sentenced. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Mentor Sessions Ep. 047: Human Hacking Bitcoin Wallets, Deadly Social Engineering Scams & Nuclear Breaches | Christopher HadnagyWhat if one phone call could drain your Bitcoin wallet like MGM's $190M ransomware nightmare, or social engineering tricks from Jamaican bank heists expose why Bitcoin's human element is your biggest security flaw? In this episode of BTC Sessions, world-renowned human hacking expert Christopher Hadnagy reveals how AI-fueled scams like sextortion are exploding, and targeting Bitcoin holders with FOMO, romance frauds, and voice phishing that bypasses security. He breaks down wild stories of tailgating, breaking into nuclear facilities and owning bank servers with just a clipboard, proving no system is safe from psychological manipulation. Chris warns of dark web guides and shares pro defenses like code words, MFA, and OSINT to hack-proof your sats. From QR phishing to AI accent-erasing vishing, he exposes how hackers spoof LinkedIn for $250K Bitcoin thefts. As founder of Innocent Lives Foundation, Chris flips his skills to hunt predators worldwide, rescuing kids from exploitation rings. If you're self-custodying BTC, this is your must-watch guide to human hacking threats, social engineering secrets, and Bitcoin security mastery—don't let hackers own you!About Christopher HadnagyWebsite: https://www.social-engineer.com/Podcast: https://www.social-engineer.org/podcast/X: @humanhackerInnocent Lives Foundation: https://www.innocentlivesfoundation.org/Chapters:00:00:00 Teaser & Intro00:01:35 Guest Intro & Social Engineering Definition00:02:58 Jamaican Bank Heist00:09:21 Heist Reflections00:10:19 Tactics: OSINT, Pretexts & Influence00:14:51 Bitcoin's Human Flaw00:16:31 Common Pretexts & LinkedIn Scams00:20:57 Scam Losses & Global Impact00:22:55 Motivations: FOMO, Romance & Sextortion00:28:42 AI's Role in Scams00:32:35 Vectors: Phishing, Vishing & MGM00:35:17 Generational Shifts: Smishing/QR00:38:53 Defenses: Verification, Code Words & MFA00:42:19 Breaches & Security Failures00:45:51 Sovereign Computing & Nostr00:47:22 Nuclear Facility Stories00:53:57 Innocent Lives Foundation Origins00:58:06 ILF Mission, Impact & Resources01:02:46 Podcast, Class & ClosingPrevious Episode:Mentor Sessions Ep. 046: Bitcoin 2026 Bull Run, TradFi Myths & Fed Liquidity Secrets | Joe Consorti: https://youtu.be/7p16VXpyEpU⚡ POWERED by Abundant Mines: Fully managed Bitcoin mining. Learn more at https://qrco.de/bgYKPB
The FBI warns of Kimsuky quishing. Singapore warns of a critical vulnerability in Advantech IoT management platforms. Russia's Fancy Bear targets energy research, defense collaboration, and government communications. Malaysia and Indonesia suspend access to X. Researchers warn a large-scale fraud operation is using AI-generated personas to trap mobile users in a social engineering scam. BreachForums gets breached. The NSA names a new Deputy Director. Monday Biz Brief. Our guest is Sasha Ingber, host of the International Spy Museum's SpyCast podcast. The commuter who hacked his scooter. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Sasha Ingber, host of the International Spy Museum's SpyCast podcast, on the return of SpyCast to the N2K CyberWire network. Selected Reading North Korea–linked APT Kimsuky behind quishing attacks, FBI warns (Security Affairs) Advantech patches maximum-severity SQL injection flaw in IoT products (Beyond Machines) Russia's APT28 Targeting Energy Research, Defense Collaboration Entities (SecurityWeek) Malaysia and Indonesia block X over deepfake smut (The Register) New OPCOPRO Scam Uses AI and Fake WhatsApp Groups to Defraud Victim (Hackread) BreachForums hacking forum database leaked, exposing 324,000 accounts (Bleeping Computer) Former NSA insider Kosiba brought back as spy agency's No. 2 (The Record) Vega raises $120 million in a Series B round led by Accel. Reverse engineering my cloud-connected e-scooter and finding the master key to unlock all scooters (Rasmus Moorats) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
NordVPN, Hardware wallet giant Ledger, Instagram, 5 major countries are all part of this week's mess.
Microsoft to enforce MFA for Microsoft 365 admin center sign-ins Cisco patches ISE security vulnerability after PoC release Illinois state agency breaches itself Huge thanks to our sponsor, Hoxhunt A small tip for CISOs: if you're unsure whether your security training is actually reducing phishing risk, check out what Qualcomm achieved with Hoxhunt. They took their 1,000 highest-risk users from consistent under-performers to outperforming the rest of the company, driving measurable human risk reduction and earning a CSO50 Award. See the Qualcomm case at hoxhunt.com/qualcomm Find the stories behind the headlines at CISOseries.com.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Barracuda, Oracle, Aflac, The European Space Agency, Wired and the "Tinder for N*zis" are all part of this week's insanity...
A new year - and so much to do! To start 2026, Richard flies solo again to discuss the issues he's seen on sysadmins' minds as we head into the new year. Obviously, AI is eating up a lot of the conversation from many different angles: tools that can help us be more productive, security issues in our organizations due to misuse, and now, AI-driven hacking. Security still looms large, and not just from an AI perspective - the latest round of supply chain attacks has led to litigation, putting new emphasis on making sure you're secure. Windows has a new leader, things are changing there, and there's the ongoing migration to the cloud. Does it still make sense? There seems to be more concern about data sovereignty than ever, and some meaningful conversations to have. Happy New Year!LinksAzure SRE Agents with Deepthi ChelupatiMicrosoft PurviewThe M365 Copilot Data Readiness Checklist with Nikki ChappleQuering for Breaches with Mark MorowcyznskiManaging Vendor Incidents with Mandi WallsIncident Management and the Crowdstrike event with Lieam WestleyMicrosoft IntuneMicrosoft Entra IDMicrosoft Defender for EndpointMicrosoft Entra ID Protection with Corissa KoopmansWindows Server 2025Upgrading to Windows Server 2025 with Robert SmitRecorded December 20, 2025
LastPass, SoundCloud, Pornhub, a lot of credit unions and so much more are all part of this week's mess!
We're going around the world to look at the worst breaches out there, including the possible worst breach ever in the internet age!
Rishi Bhargava is CEO of Descope, an identity management platform for customers and AI agents. They've raised $88M in funding from investors such as Notable Capital, Lightspeed, Unusual Ventures. The two previous he founded were acquired by Palo Alto Networks and McAfee. (00:01) Introduction(00:08) Origin story: why identity and passwords needed a rethink(02:59) Passwords vs passkeys explained in plain English(05:06) Why logging in is still painful (and why passwords persist)(09:06) Account takeovers explained: how hacks actually happen(11:59) Building security products: philosophy vs regular software(14:24) The ideal login experience: from frustration to seamless access(16:40) What is an AI agent? Defining agent identity simply(21:54) Good bots vs bad bots: trust, access, and control in an agent world(25:03) Breaches and blast radius: security before vs after Descope(27:55) Company building lessons from Demisto to Descope(30:15) AI trends that matter most for enterprise products(32:40) Rapid Fire Round--------Where to find Rishi Bhargava: LinkedIn: https://www.linkedin.com/in/bhargavarishi/--------Where to find Prateek Joshi: Website: https://prateekj.com Research Column: https://www.infrastartups.comLinkedIn: https://www.linkedin.com/in/prateek-joshi-infiniteX: https://x.com/prateekj
Meghan has finally managed to get a private letter to her father after days of trying to reach him, with her team accusing the Daily Mail of making discreet contact nearly impossible. An Express columnist criticises the email approach, calling it a “box-ticking exercise” while revisiting the long-running tensions inside the Markle family. Harry and Meghan also release a statement praising Australia's ban on under-sixteens using social media, saying the move protects children but doesn't solve tech's deeper problems. The couple add a surprise new Netflix documentary to their slate, Masaka Kids, A Rhythm Within, celebrating a Ugandan dance collective they've long supported. A PR expert argues Meghan should embrace the Hollywood model more openly. Meanwhile, King Charles launches a new line of royal Christmas ornaments and attends an Advent service at Westminster Abbey, speaking of “light, hope and peace.” Princess Anne earns praise for signing her Christmas card simply as “Anne and Tim,” a modest gesture that fans call quintessentially her.Hear our new show "Crown and Controversy: Prince Andrew" here.Check out "Palace Intrigue Presents: King WIlliam" here.
Notes: Contract Law Exam Ready GuideUnderstanding Contract Law: Performance, Breach, and ExcuseThis conversation delves into the complexities of contract law, focusing on performance, breach, and the various conditions that govern contractual obligations. It explores the tension between strict compliance and equitable considerations, the implications of anticipatory repudiation, and the legal frameworks that guide these issues under both common law and the UCC. The discussion emphasizes the importance of understanding the nuances of contract performance and the potential consequences of breaches, while also highlighting the role of good faith in contractual relationships.In the world of contract law, the journey doesn't end with the formation of a contract. The real challenge begins with performance, where the rubber meets the road. This blog post delves into the critical aspects of contract law, focusing on performance, breach, and the excuses that can arise.The Essence of Performance: At the heart of every contract lies the duty to perform. This duty is not just a formality; it's a legal obligation that binds parties to fulfill their promises. The question often arises: how perfect does this performance need to be? Under common law, the standard is substantial performance, allowing for minor deviations as long as the essential purpose is met. However, the Uniform Commercial Code (UCC) demands perfection, known as the perfect tender rule, where even a slight deviation can lead to rejection.Breach and Its Classifications: When performance falters, it leads to a breach. Breaches are classified based on their severity: minor, material, or total. A minor breach allows the contract to continue, with the non-breaching party entitled to damages. A material breach, however, is significant enough to suspend the non-breaching party's obligations, potentially leading to a total breach if not cured.Excuses and Defenses: Contract law also provides mechanisms to excuse performance under certain conditions. Impossibility, impracticability, and frustration of purpose are key defenses that can discharge duties when unforeseen events make performance unfeasible or pointless. Additionally, express conditions in contracts act as gatekeepers, determining when duties arise.Navigating the complexities of contract law requires a keen understanding of these principles. Whether you're a law student or a practicing attorney, mastering the nuances of performance, breach, and excuse is essential. Remember, the balance between strict rules and equitable outcomes is the cornerstone of high-level contract analysis.Subscribe now to stay updated on the latest insights in contract law.TakeawaysThis Deep Dive is for law students and bar candidates.Understanding conditions is crucial for determining performance obligations.Express conditions require strict compliance, while constructive conditions allow for substantial performance.Breach classification is essential: minor, material, or total.Anticipatory repudiation allows immediate claims for breach.Adequate assurances can clarify uncertain performance situations.Impossibility and frustration of purpose can excuse performance obligations.The implied covenant of good faith underpins all contracts.Discharge by subsequent agreement can end or change contracts.The perfect tender rule is a strict standard under the UCC. contract law, performance, breach, anticipatory repudiation, conditions, good faith, UCC, common law, legal obligations, contract analysis
23andMe (again), Washington Post, hundreds of banks (again), ASUS, multiple politicians in Canada, and a breach so bad that someone had to move to the other side of the planet(!) are all part of this week's breaches!
What happens when a HIPAA Business Associate Agreement gets tested in court after a ransomware attack? And what can we learn from it? Let's find out with your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates. "New HIPAA Security Rule" episode: https://cr-map.com/podcast/178
OpenAI, CodeRED, Dartmouth, DoorDash, 23andMe, Amazon, Walmart and so many more are part of this week's breaches!
In this episode, the host addresses a previous mistake in naming a company involved in a breach, correcting SitusAMC for Ascensus, and extends apologies. Key topics include US banks assessing a breach fallout from financial tech vendor SitusAMC, ransomware group CioP targeting Broadcom through Oracle's vulnerabilities, a new malware campaign hiding in Blender 3D models named SteelC, supply chain attacks in the JavaScript ecosystem through NPM packages with Shai-Hulud malware, and a phishing scam using lookalike domains to deceive Microsoft account holders. Listeners are reminded to manually type URLs to avoid phishing scams, and are informed about the Thanksgiving weekend schedule change. 00:00 Introduction and Apology 01:26 Cybersecurity Headlines 02:13 US Banks Data Theft Incident 03:44 Broadcom and Oracle ERP Breach 05:29 Blender Malware Campaign 07:45 Shai-Hulud NPM Package Attack 09:41 Phishing Campaign Targeting Microsoft Accounts 11:39 Final Thoughts and Thanksgiving Wishes
This episode focuses on a security incident that prompts an honest discussion about transparency, preparedness, and the importance of strong processes. Sean Martin speaks with Viktor Petersson, Founder and CEO of Screenly, who shares how his team approaches digital signage security and how a recent alert from their bug bounty program helped validate the strength of their culture and workflows.Screenly provides a secure digital signage platform used by organizations that care deeply about device integrity, uptime, and lifecycle management. Healthcare facilities, financial services, and even NASA rely on these displays, which makes the security posture supporting them a priority. Viktor outlines why security functions best when embedded into culture rather than treated as a compliance checkbox. His team actively invests in continuous testing, including a structured bug bounty program that generates a steady flow of findings.The conversation centers on a real event: a report claiming that more than a thousand user accounts appeared in a public leak repository. Instead of assuming the worst or dismissing the claim, the team mobilized within hours. They validated the dataset, built correlation tooling, analyzed how many records were legitimate, and immediately reset affected accounts. Once they ruled out a breach of their systems, they traced the issue to compromised end user devices associated with previously known credential harvesting incidents.This scenario demonstrates how a strong internal process helps guide the team through verification, containment, and communication. Viktor emphasizes that optional security features only work when customers use them, which is why Screenly is moving to passwordless authentication using magic links. Removing passwords eliminates the attack vector entirely, improving security for customers without adding friction.For listeners, this episode offers a clear look at what rapid response discipline looks like, how bug bounty reports can add meaningful value, and why passwordless authentication is becoming a practical way forward for SaaS platforms. It is a timely reminder that transparency builds trust, and security culture determines how confidently a team can navigate unexpected events.Learn more about Screenly: https://itspm.ag/screenly1oNote: This story contains promotional content. Learn more.GUESTViktor Petersson, Co-founder of Screenly | On LinkedIn: https://www.linkedin.com/in/vpetersson/RESOURCESLearn more and catch more stories from Screenly: https://www.itspmagazine.com/directory/screenlyLinkedIn Post: https://www.linkedin.com/posts/vpetersson_screenly-security-incident-response-how-activity-7393741638918971392-otkkBlog: Security Incident Response: How We Investigated a Data Leak and What We're Doing Next: https://www.screenly.io/blog/2025/11/10/security-incident-response-magic-links/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Spotlight Brand Story: https://www.studioc60.com/content-creation#spotlightKeywords: sean martin, marco ciappelli, viktor petersson, security, authentication, bugbounty, signage, incidentresponse, breaches, cybersecurity, brand story, brand marketing, marketing podcast, brand story podcast, brand spotlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
This episode focuses on a security incident that prompts an honest discussion about transparency, preparedness, and the importance of strong processes. Sean Martin speaks with Viktor Petersson, Founder and CEO of Screenly, who shares how his team approaches digital signage security and how a recent alert from their bug bounty program helped validate the strength of their culture and workflows.Screenly provides a secure digital signage platform used by organizations that care deeply about device integrity, uptime, and lifecycle management. Healthcare facilities, financial services, and even NASA rely on these displays, which makes the security posture supporting them a priority. Viktor outlines why security functions best when embedded into culture rather than treated as a compliance checkbox. His team actively invests in continuous testing, including a structured bug bounty program that generates a steady flow of findings.The conversation centers on a real event: a report claiming that more than a thousand user accounts appeared in a public leak repository. Instead of assuming the worst or dismissing the claim, the team mobilized within hours. They validated the dataset, built correlation tooling, analyzed how many records were legitimate, and immediately reset affected accounts. Once they ruled out a breach of their systems, they traced the issue to compromised end user devices associated with previously known credential harvesting incidents.This scenario demonstrates how a strong internal process helps guide the team through verification, containment, and communication. Viktor emphasizes that optional security features only work when customers use them, which is why Screenly is moving to passwordless authentication using magic links. Removing passwords eliminates the attack vector entirely, improving security for customers without adding friction.For listeners, this episode offers a clear look at what rapid response discipline looks like, how bug bounty reports can add meaningful value, and why passwordless authentication is becoming a practical way forward for SaaS platforms. It is a timely reminder that transparency builds trust, and security culture determines how confidently a team can navigate unexpected events.Learn more about Screenly: https://itspm.ag/screenly1oNote: This story contains promotional content. Learn more.GUESTViktor Petersson, Co-founder of Screenly | On LinkedIn: https://www.linkedin.com/in/vpetersson/RESOURCESLearn more and catch more stories from Screenly: https://www.itspmagazine.com/directory/screenlyLinkedIn Post: https://www.linkedin.com/posts/vpetersson_screenly-security-incident-response-how-activity-7393741638918971392-otkkBlog: Security Incident Response: How We Investigated a Data Leak and What We're Doing Next: https://www.screenly.io/blog/2025/11/10/security-incident-response-magic-links/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Spotlight Brand Story: https://www.studioc60.com/content-creation#spotlightKeywords: sean martin, marco ciappelli, viktor petersson, security, authentication, bugbounty, signage, incidentresponse, breaches, cybersecurity, brand story, brand marketing, marketing podcast, brand story podcast, brand spotlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Record (?) HIBP Traffic Month; The Week in Breaches; IoT Water Meter Reader with Home Assistant and AI; Sponsored by 1Password https://www.troyhunt.com/weekly-update-479/See omnystudio.com/listener for privacy information.
Several Major US Banks are all caught up this week in breaches. DON'T PANIC.
In the electric chaos of DEF CON—where dial tones, solder smoke, and hacker legends collide—one figure stands out: John Aff, aka PANDA.A veteran in the hacker community, he moves effortlessly between challenge design, telephony wizardry, mesh networking experiments, and the culture that surrounds it all.Behind the reputation is a journey that started with game hacking, shifted into enterprise security, and evolved into a life built around creativity, community, and technical obsession. It's also a story of identity—of finding a place where personal expression and professional skill finally intersected.This conversation pulls back the curtain on a mind shaped by curiosity, lived experience, and a deep love for the craft.CHAPTERS00:00 - Introduction to Barcode Podcast00:24 - Meet Panda: Cybersecurity Icon01:47 - Panda's Journey into Cybersecurity10:12 - Creating Interactive Challenges for Conferences22:11 - Badge Building: The Art and Science28:00 - Lessons from Offensive Security for Defenders30:11 - Winning the TeleChallenge: A Team Effort35:10 - Nostalgia in Gaming: The Phone Verse Experience37:30 - Understanding LoRa and Mesh Networking43:20 - Real-World Applications of MeshTastic Technology49:14 - The Intersection of Furry Culture and Cybersecurity56:54 - Community Building and Future Aspirations in TechLINKSTeleFreak – https://telefreak.org Home of the legendary TeleChallenge and a cornerstone of phreaking culture at DEF CON.DEF CON – https://defcon.org The world's largest hacker conference and the backdrop for many of Panda's stories, competitions, and breakthroughs.RedSeer Security – https://redseersecurity.com The security practice Panda supports on the defensive and strategic side.Assura, Inc. – https://assurainc.com Where Panda leads offensive security operations and continuous testing programs.MeshTastic – https://meshtastic.org Open-source long-range mesh communication project central to Panda's community work.Comms For All – https://commsforall.com Panda's initiative focused on mesh networking, LoRa radios, and community education.B-Sides Jax – https://bsidesjax.org Conference where Panda built the interactive phone-based badge challenge.HackSpaceCon – https://hackspacecon.com The first conference where you and Panda crossed paths; a major Florida hacker gathering.JLCPCB – https://jlcpcb.com PCB manufacturing service used for producing custom badge hardware.EasyEDA – https://easyeda.com Design tool Panda uses to create the multilayer art and circuitry for badges.Vectorizer.AI – https://vectorizer.ai The AI-powered tool Panda relies on to convert artwork into vector format for PCB badge design.KiCad – https://kicad.org Open-source PCB design suite used for laying out circuits and prototyping badge hardware.Adtran – https://www.adtran.com Telecom hardware vendor whose legacy gateways were used in the BSides Jax phone challenge.QueerCon – https://www.queercon.org Long-running LGBTQ+ hacker community at DEF CON that collaborated with Panda on early badge projects.National Cyber Games (NCA Cyber Games) – https://nationalcybergames.org Competition platform where Panda designed MeshTastic-based CTF challenges.UNF Osprey Security – https://www.unf.edu University of North Florida's student security group that runs CTFs and collaborated locally with Panda.HackRedCon – https://hackredcon.com Security conference where Panda volunteers and participates in community events.Jax2600 – https://2600.com Local chapter of the classic 2600 hacker community, part of Panda's long-term involvement in grassroots infosec groups.Backdoors & Breaches – https://blackhillsinfosec.com/projects/backdoors-breaches Incident response card game Panda used for blue team development and tabletop exercises.
In this episode, James Maude sits down with Chris Neuwirth, VP of Cyber Risk at Networks Group, whose path into cybersecurity might be the most unconventional you'll ever hear—from delivering babies as a teenage EMT to penetration testing critical infrastructure today. Chris's journey includes serving as an LAPD officer at Venice Beach, responding to 9/11 at the Pentagon, managing IT during Hurricane Sandy, and running operations as assistant commissioner at New Jersey's Department of Health during COVID-19. Along the way, he's been hacking everything he could get his hands on—from war driving through Manhattan in the early 2000s to conducting sophisticated penetration tests at hospitals and airports today. Chris discusses the importance of organizations being prepared and shares the uncomfortable truth: sometimes the easiest way past your defenses is just showing up and plugging in.
Joseph Avanzato is the Security Operations and Forensics Group Leader at Varonis. In this episode, he joins host Paul John Spaulding to discuss the common tactics attackers exploit and mistakes made by enterprises that lead breaches, as well as how Varonis is uniquely positioned to help public and private customers around the world investigate, contain, and evict attackers from their network. This episode is brought to you by Varonis, whose AI-powered data security platform secures your data at scale – across IaaS, SaaS, and hybrid cloud environments. To learn more about our sponsor, visit https://www.Varonis.com.
Leicester City are set to face a commission next week as they contest Premier League charges related to profitability and sustainability rules#LCFC #Leicester #Leicestercity #leicestercityfc #foxes #championship #efl #football #soccer #psr Hosted on Acast. See acast.com/privacy for more information.
Hyundai, Kia, Genesis Logitech, Princeton, The Washington Post, DoorDash and so much more is part of this week's breaches!
When a young engineer uncovered a sizeable click fraud situation at Google, he discovered a bigger problem; namely, the perverse ingenuity that drives online fraud and scams. "Big Breaches" author Neil Daswani joined us to talk click farms, data breaches, AI exploits, and the big picture of cybercrime today. Learn more about your ad choices. Visit megaphone.fm/adchoices
PREVIEW. Hezbollah Rises Again: Unfinished Business and Ceasefire Breaches in Lebanon. Edmund Fitton-Brown described Hezbollah as a "punched out fighter on the mat getting up slowly," rearming to a new scale of threat. There is definitely "unfinished business in Lebanon." Hezbollah intends to break the ceasefire, which is monitored by the United States and Israel. The Lebanese state has shown reluctance to disarm Hezbollah, which the ceasefire requires. 1899 BEIRUT
A very special Breaches of the Week segment!
Send us a textIn this episode of Privacy Please, host Cameron Ivey discusses significant security threats, including a critical vulnerability in Microsoft's WSUS, a major data breach at the University of Pennsylvania, and the emergence of sophisticated malware known as Glassworm. The conversation highlights the importance of cybersecurity measures and the potential consequences of negligence in IT security. Support the show
Tom Lyons of business website, The Currency, discusses the Central Bank's fining of cryptocurrency exchange, Coinbase Europe over €21 million for breaching anti-money laundering and counter-terrorist monitoring obligations.
Google, HSBC, Conduent, Tesla, Penn, EY, Tata Motors, the Iranian Government, and so many more were in the crosshairs of attackers this week!
Toys ‘R' Us, Nintendo, Sotheby's, Pirelli Tyres, Air France and your AI girlfriend are all having a rather bad week!
Your daily news in under three minutes. At Al Jazeera Podcasts, we want to hear from you, our listeners. So, please head to https://www.aljazeera.com/survey and tell us your thoughts about this show and other Al Jazeera podcasts. It only takes a few minutes! Connect with us: @AJEPodcasts on X, Instagram, Facebook, and YouTube
Guest: Jibran Ilyas, Director for Incident Response at Google Cloud Topics: What is this tabletop thing, please tell us about running a good security incident tabletop? Why are tabletops for incident response preparedness so amazingly effective yet rarely done well? This is cheap/easy/useful so why do so many fail to do it? Why are tabletops seen as kind of like elite pursuit? What's your favorite Cloud-centric scenario for tabletop exercises? Ransomware? But there is little ransomware in the cloud, no? What are other good cloud tabletop scenarios? Resources: EP60 Impersonating Service Accounts in GCP and Beyond: Cloud Security Is About IAM? EP179 Teamwork Under Stress: Expedition Behavior in Cybersecurity Incident Response EP222 From Post-IR Lessons to Proactive Security: Deconstructing Mandiant M-Trends EP177 Cloud Incident Confessions: Top 5 Mistakes Leading to Breaches from Mandiant EP158 Ghostbusters for the Cloud: Who You Gonna Call for Cloud Forensics EP98 How to Cloud IR or Why Attackers Become Cloud Native Faster?
CISA, F5, PNC, Canadian Tire, Discord and so much more are all part of breaches of the week!
Brewery Breach Brings Bitter Blow to Beer Buffs. Windowless Wonders: Digital Daylight for the Jet Set. Collar Communication: Cows Connect Through Clever, Cloud-Controlled Collars. Clever Cameras or Cautious Concerns: Can AI Eyes Really Protect Our Homes? Cleaning Conqueror: The Deebot Delivers Dirt-Defying Design and Drive. Flash, Fuse, and Frame: Gemini's Generative Genius Gets a Photoshop-Free Future. Talking Tech: Translating Travel through Tongues and Tech. Call Combat: Clever Call-Screening Cuts Cold-Caller Chaos. Shark Shield or Style Statement? Scientists Suit Up for Bite-Resistant Breakthroughs.
Three hosts. Gamecubes, Apple Updates, Campers, and Breaches.
Nintendo, Qantas, SonicWall and how lying is hacking our brains are all part of this week.
Breaches of the Week; Welcoming CERN to HIBP; Latest Pilot Jobs and HomeRefill Data Breaches; Brainstorming the Breach Pipeline; Sponsored by Report URI https://www.troyhunt.com/weekly-update-472/See omnystudio.com/listener for privacy information.
Discord, Salesforce, Red Hat, Oracle (again), Renault, Comcast and the US Air Force all made this is just an insane week for breaches!
CannCon kicks off solo before Alpha finally rolls in late, and together they tear through the chaos of the day. From a deep dive into Tina Peters' ongoing imprisonment to the DOJ's shady firings, Secret Service failures, and the weaponization of Big Tech, the hosts spotlight the corruption hiding in plain sight. They break down President Trump's moves against corporate embeds like Lisa Monaco, unpack the latest twists in the government shutdown, and call out the hypocrisy of the establishment. With sidebars on Malibu's stalled rebuild, a bizarre NYPD infiltration at the Ryder Cup, and AOC's strange rise, the episode is equal parts sharp analysis and raw banter. Sponsors include Comet by Perplexity, Soft Disclosure, Native Path Collagen, Patriot Injury Lawyers, and Pickaxe.
Breach notification letters set to flood North America's mailboxes New bug in classic Outlook only fixed via Microsoft support Air Force admits SharePoint privacy issue over breach Huge thanks to our sponsor, Nudge Security AI notetakers like Otter AI spread fast. In fact, one Nudge Security customer discovered 800 new accounts created in only 90 days. Viral AI notetakers introduce a slew of data privacy risks by gaining access to calendars and adding themselves to every meeting. Nudge Security can help. Within minutes of starting a free trial, you'll see every AI app, account, and integration, even those created in the past. And, smart automation helps you clean up unwanted accounts and guide users towards approved alternatives. See how you can regain control today at nudgesecurity.com/stopotter
Edition No249 | 28-09-2025 - Today we turn the spotlight squarely on Russia's propaganda machinery — and how its most vicious threats now extend even to Britain's ancient universities. Solovyov has threatened to wipe out the town where I live in an atomic inferno, for no other reason that we refuse to allow Russia to erase Ukraine from the world map. Perhaps he's also upset he can't get to his Italian villas since 2022. So, Russia's foremost propagandist has threatened to wipe out one of the most ancient seats of learning and civilisation, and by extension threaten to kill me. Apart from the bluster and vicious hatred, it's such utterances that show Russia has fallen far from what could be considered civilisation, civilised language and behaviour, and that no regime hack or representative should be allowed in civilised company, at least for the lifetime of the current regime. That ban should also extend to all the minions and enablers of the regime. We'll explore how that fits into a broader pattern: Russia's imperial ambitions, its civilizational decline, and the accelerating slide in global norms under pressure from China, Russia, and their allies — but also how Ukraine and its global backers confront this – showing that resistance, and a reassertion of civilised values is possible – though it comes at a steep price.We begin — shockingly — with Vladimir Solovyov's threat to bomb Oxford and Cambridge.----------This is super important. There are so many Battalions in Ukraine, fighting to defend our freedoms, but lack basics such as vehicles. These are destroyed on a regular basis, and lack of transport is costs lives, and Ukrainian territory. Once again Silicon Curtain has teamed up with Car4Ukraine and a group of wonderful creators to provide much-needed assistance: https://car4ukraine.com/campaigns/autumn-harvest-silicon-curtainAutumn Harvest: Silicon Curtain (Goal€22,000)We'll be supporting troops in Pokrovsk, Kharkiv, and other regions where the trucks are needed the most. 93rd Brigade "Kholodnyi Yar", Black Raven Unmanned Systems Battalionhttps://car4ukraine.com/campaigns/autumn-harvest-silicon-curtain----------SOURCES: “Russia should ‘bomb Oxford', key Putin ally says,” UK News / Yahoo, Sept 2025“Top Russian propagandist issues threat to drop nuclear bombs …” LADbible, Sept 2025 Nancy Ries, *Russia's Atrocity Rhetoric During Its War on Ukraine* (RCIN) An Independent Legal Analysis of the Russian Federation's Breaches of the Genocide Convention (New Lines Institute) “Holding Putin's propagandists accountable for crimes in Ukraine,” Atlantic Council UkraineAlert, June 2024 “Dmitry Medvedev says editors of The Times are ‘legitimate military targets',” The Guardian, Dec 2024 “Russia is at war with Britain …”, The Guardian / Fiona Hill commentary, June 2025 “International Criminal Court arrest warrants for Russian leaders,” Wikipedia / ICC context “Andrey Gurulyov,” Wikipedia (remarks on bombing Britain)----------SILICON CURTAIN LIVE EVENTS - FUNDRAISER CAMPAIGN Events in 2025 - Advocacy for a Ukrainian victory with Silicon Curtainhttps://buymeacoffee.com/siliconcurtain/extrasOur events of the first half of the year in Lviv, Kyiv and Odesa were a huge success. Now we need to maintain this momentum, and change the tide towards a Ukrainian victory. The Silicon Curtain Roadshow is an ambitious campaign to run a minimum of 12 events in 2025, and potentially many more. Any support you can provide for the fundraising campaign would be gratefully appreciated. https://buymeacoffee.com/siliconcurtain/extras----------SUPPORT THE CHANNEL:https://www.buymeacoffee.com/siliconcurtainhttps://www.patreon.com/siliconcurtain----------
Harrods, Stellantis, Volvo, the Canadian Government and so much more is why these segments are ALWAYS open bar!
Kevin and Kieran discuss the news that Chelsea have been hit with 74 charges over alleged agent rule breaches, and find out why Inverness Caledonian Thistle are now out of administration. Follow Kevin on X - @kevinhunterday Follow Kieran on X - @KieranMaguire Follow The Price of Football on X - @pof_pod Send in a question: questions@priceoffootball.com Join The Price of Football CLUB: https://priceoffootball.supportingcast.fm/ Check out the Price of Football merchandise store: https://the-price-of-football.backstreetmerch.com/ Visit the website: https://priceoffootball.com/ For sponsorship email - info@adelicious.fm The Price of Football is a Dap Dip production: https://dapdip.co.uk/ contact@dapdip.co.uk Learn more about your ad choices. Visit podcastchoices.com/adchoices
NATO allies confer after Russian incursions, Brad Littlejohn on holding Apple accountable, and Collin Garbarino reviews Downton Abbey: The Grand Finale. Plus, a Boy Scout saves a life, Matthew West's new song offers hope, and the Tuesday morning newsSupport The World and Everything in It today at wng.org/donateAdditional support comes from Planted Gap Year, where young adults combine Bible classes, hands-on farming, and outdoor adventure. More at plantedgapyear.orgFrom PrayMore, a new app for churches to share prayer requests with members and send reminders to pray. Free trial available at praymore.com/worldAnd from iWitness. Powerful audio dramas bringing faith, courage, and history to life in unforgettable ways. iwitnesspod.com
In this episode of The President's Daily Brief: New revelations about Charlie Kirk's accused assassin, Tyler Robinson, and the chilling way he mocked investigators in real time. NATO airspace violated by a Russian drone again, this time over Romania, as President Zelensky warns the latest breach shows the war is spreading. President Trump says he won't impose new U.S. sanctions on Russia unless NATO allies first cut off their purchases of Russian oil. And in today's Back of the Brief—the UN General Assembly votes overwhelmingly for a two-state solution declaration—while also condemning Hamas, managing to call them out and hand them exactly what they want in the same breath. To listen to the show ad-free, become a premium member of The President's Daily Brief by visiting PDBPremium.com.Please remember to subscribe if you enjoyed this episode of The President's Daily Brief.YouTube: youtube.com/@presidentsdailybrief Jacked Up Fitness: Get the all-new Shake Weight by Jacked Up Fitness at https://JackedUpShakeWeight.comTriTails Premium Beef: Reclaim dinner from the jaws of school-year chaos Visit https://trybeef.com/PDB.American Financing: NMLS 182334, nmlsconsumeraccess.org. APR for rates in the 5s start at 6.327% for well qualified borrowers. Call 866-885-1881 for details about credit costs and terms. Visit http://www.AmericanFinancing.net/PDB. Learn more about your ad choices. Visit megaphone.fm/adchoices
Headlines: – Welcome to Mo News (02:00) – Inside The Arrest Of Suspect In Charlie Kirk's Murder (06:00) – Rubio Meets Netanyahu Amid Qatar Strike Fallout (28:15) – Russian Drone Entered Romania's Airspace After Poland Incident (34:15) – Trade Schools Benefit From Trump's Ivy League Fight (37:15) – America's Sex Recession: Record Lows In Intimacy (40:00) – TV's Biggest Night: Recapping The 77th Emmy Awards (44:45) – On This Day In History (48:00) Thanks To Our Sponsors: – LMNT - Free Sample Pack with any LMNT drink mix purchase– Industrious - Coworking office. 50% off day pass | Promo Code: MONEWS50 – Surfshark - 4 additional months of Surfshark VPN | Code: MONEWS – Leesa – 25% off mattress, plus extra $50 off | Promo Code: MONEWS – Factor Meals – 50% your first box plus free shipping | Promo Code: monews50off – Monarch Money - 50% off your first year | Promo Code: MONEWS