POPULARITY
Categories
Toys ‘R' Us, Nintendo, Sotheby's, Pirelli Tyres, Air France and your AI girlfriend are all having a rather bad week!
Your daily news in under three minutes. At Al Jazeera Podcasts, we want to hear from you, our listeners. So, please head to https://www.aljazeera.com/survey and tell us your thoughts about this show and other Al Jazeera podcasts. It only takes a few minutes! Connect with us: @AJEPodcasts on X, Instagram, Facebook, and YouTube
Guest: Jibran Ilyas, Director for Incident Response at Google Cloud Topics: What is this tabletop thing, please tell us about running a good security incident tabletop? Why are tabletops for incident response preparedness so amazingly effective yet rarely done well? This is cheap/easy/useful so why do so many fail to do it? Why are tabletops seen as kind of like elite pursuit? What's your favorite Cloud-centric scenario for tabletop exercises? Ransomware? But there is little ransomware in the cloud, no? What are other good cloud tabletop scenarios? Resources: EP60 Impersonating Service Accounts in GCP and Beyond: Cloud Security Is About IAM? EP179 Teamwork Under Stress: Expedition Behavior in Cybersecurity Incident Response EP222 From Post-IR Lessons to Proactive Security: Deconstructing Mandiant M-Trends EP177 Cloud Incident Confessions: Top 5 Mistakes Leading to Breaches from Mandiant EP158 Ghostbusters for the Cloud: Who You Gonna Call for Cloud Forensics EP98 How to Cloud IR or Why Attackers Become Cloud Native Faster?
CISA, F5, PNC, Canadian Tire, Discord and so much more are all part of breaches of the week!
Brewery Breach Brings Bitter Blow to Beer Buffs. Windowless Wonders: Digital Daylight for the Jet Set. Collar Communication: Cows Connect Through Clever, Cloud-Controlled Collars. Clever Cameras or Cautious Concerns: Can AI Eyes Really Protect Our Homes? Cleaning Conqueror: The Deebot Delivers Dirt-Defying Design and Drive. Flash, Fuse, and Frame: Gemini's Generative Genius Gets a Photoshop-Free Future. Talking Tech: Translating Travel through Tongues and Tech. Call Combat: Clever Call-Screening Cuts Cold-Caller Chaos. Shark Shield or Style Statement? Scientists Suit Up for Bite-Resistant Breakthroughs.
Three hosts. Gamecubes, Apple Updates, Campers, and Breaches.
Richard Ford – Group Chief Technology Officer (SA), Integrity360 SAfm Market Update - Podcasts and live stream
Tonight we explore whether SA is in line for a rerating with Investec chief economist Annabel Bishop, we discuss the growing financial impact of cyber breaches on companies with Richard Ford from Integrity360, Nedbank's Terence G Sibiya explains how finance can act as a lever for systemic development across Africa, and in our Executive Lounge segment we chat with ABB SA's Graham Abrahams about his sales journey and career passions. SAfm Market Update - Podcasts and live stream
Nintendo, Qantas, SonicWall and how lying is hacking our brains are all part of this week.
Orini Kaipara gave her maiden speech in Parliament yesterday, and she's just the sort of person you want to see entering politics – she's young, she's smart, she's passionate. And I don't know about you, but I love seeing an electorate MP, somebody who has been overwhelmingly selected by voters, given a mandate by voters to be their person in Parliament, as opposed to sliding in on the list. But when she agreed to enter Parliament, surely she is agreeing then to the rules and conventions that govern Parliament. Her maiden speech focused on the importance of te reo and that we must respect and honour everybody, despite the colour of their skin, despite the language that they speak. All well and good. But the message was marred by a number of violations of House rules. Her maiden speech ran well over time, causing clear frustration for Speaker Gerry Brownlee. Maiden speeches are allocated 15 minutes of Parliament's time, and Kaipara's went well over that. "This is not on," the Speaker thundered, as he rang the bell for a third time to signal she had run out of time for her speech. I have no doubt she felt moved to tell the House and her supporters what it had taken to get her there, what inspired her, her reason for being there. But every maiden MP has a story. Every maiden MP from every party has a group of people who have guided them to where they are today and their very, very real reasons for being there. Kaipara's are important, but no more important than any other MPs from any other party in the House. Then, after a waiata and a haka followed her overlong speech, Gerry Brownlee had enough and suspended the House. He had given permission for a waiata, but not a haka. Permission has to be sought before you can do either. And before anyone jumps up and down and says a haka should be able to be performed anytime, anywhere, whenever the wairua takes you, rules are rules, man. As Brownlee put it, when the House resumed after half an hour, "We have a protocol here. This is our tikanga. That tikanga is based on agreement." He said there'd been no agreement for the haka, nor for the speech to go on and on as it did. And he said he was going to investigate whether the haka had been spontaneous —I suspect it was, that's what you do at graduation ceremonies and the like and as a sign of enormous respect— or planned by a political party. He says for people to decide they are not going to participate in that process, they put themselves very firmly in contempt of Parliament. Would Te Pāti Māori members accept breaches of protocol on the marae? Continued breaches of protocol? I doubt it – especially if they were deliberate. Ignorance you can kind of accept. It's annoying that people don't know the rules of your church or your golf club or your marae or your Parliament, but hey ho, that's life. Gentle correction and people are back on course. Continual breaches, when you know better, it's a different story. That's contempt. If a person or a group of people continually stick two fingers to your organisation and the way you do things, would you keep them in that organisation? So what does the Speaker do about Te Pāti Māori, who have made it abundantly clear time and time again that they simply do not respect the values and the rules of Parliament? See omnystudio.com/listener for privacy information.
APAC stocks trade mixed with demand hampered following the negative handover from the US; European futures flat.RBNZ cut rates by 50bps and kept the door open to further rate cuts.US President Trump said a lot of things will be eliminated due to the shutdown, and he will tell us about the eliminated jobs in four or five days.USD remains on the front foot, NZD lags post-RBNZ, JPY digests soft real cash earnings data.Spot gold continued its advances, in which spot prices climbed above the USD 4,000/oz level.Looking ahead, highlights include German Industrial Output (Aug), Swedish CPIF Flash (Sep), NBP Policy Announcements, FOMC Minutes (Sep), BoE's Pill, ECB's Elderson & Lagarde, Fed's Musalem, Barr, Goolsbee & Kashkari, Supply from UK, Germany & US.Read the full report covering Equities, Forex, Fixed Income, Commodites and more on Newsquawk
In this episode of the Security Squawk Podcast, Bryan Hornung, Randy Bryan, and Reginald Andre dissect three headline-making cybersecurity incidents that highlight how threats keep evolving—just in different directions. Randy kicks things off with WestJet's massive data breach, where over 1.2 million customers had their information exposed, showing how even major airlines struggle with protecting sensitive data in 2025. Andre dives into a shocking story out of Australia—the NSW government accidentally uploading flood victims' personal data to ChatGPT, revealing how AI misuse and data mishandling can turn into a privacy nightmare overnight. Bryan closes with the latest findings showing ransomware attacks are rising again—just as fewer companies renew their cyber insurance policies, setting up the perfect storm for costly business disruptions. The team breaks down what these stories mean for business owners, from growing AI data risks to the real cost of skipping cybersecurity insurance. Expect practical takeaways, sharp insights, and a few laughs along the way as the guys decode what's really happening behind the headlines. ️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! https://streamyard.com/pal/d/65161790...
Education Standards Board CEO Benn Gramola and mother of children at the Edge Early Learning Centre in Plympton Eliza Tsakiris joined David & Will to discuss how the closure will impact local families. See omnystudio.com/listener for privacy information.
Breaches of the Week; Welcoming CERN to HIBP; Latest Pilot Jobs and HomeRefill Data Breaches; Brainstorming the Breach Pipeline; Sponsored by Report URI https://www.troyhunt.com/weekly-update-472/See omnystudio.com/listener for privacy information.
Discord, Salesforce, Red Hat, Oracle (again), Renault, Comcast and the US Air Force all made this is just an insane week for breaches!
This conversation delves into the complexities of contract law, focusing on performance, breach, and conditions. It outlines a structured approach to understanding these concepts, emphasizing the differences between common law and UCC standards, the importance of express versus constructive conditions, and the various excuses for non-performance. The discussion also covers anticipatory breach and repudiation, providing a comprehensive framework for law students preparing for exams.Navigating the complexities of contract law can be daunting, especially when it comes to understanding performance standards. Whether you're preparing for a law exam or dealing with real-world contracts, grasping the differences between Common Law and the Uniform Commercial Code (UCC) is crucial. Let's delve into these distinctions and their implications.Common Law Performance Standards: Under Common Law, particularly in service or construction contracts, the principle of substantial performance prevails. This means that as long as the core obligations are met, minor defects do not constitute a breach. The focus is on whether the essence of the contract has been fulfilled, allowing for some flexibility in performance.UCC and the Perfect Tender Rule: In contrast, the UCC, which governs the sale of goods, enforces the perfect tender rule. This strict standard requires that goods delivered must conform exactly to the contract specifications. Any deviation, however minor, can allow the buyer to reject the goods. However, the UCC also provides a right to cure, giving sellers a chance to correct non-conformities under certain conditions.Conditions and Breach: Understanding conditions is vital in both frameworks. Express conditions require strict compliance, while constructive conditions allow for substantial performance. Breaches under Common Law are categorized as minor or material, affecting the remedies available. Under the UCC, non-conforming goods trigger the buyer's rights, but the seller's right to cure can mitigate this.The distinction between Common Law and UCC performance standards highlights the importance of context in contract law. Whether dealing with services or goods, understanding these frameworks can guide you in drafting, negotiating, and enforcing contracts effectively. As you navigate these legal waters, remember that the key lies in the details and the specific terms agreed upon by the parties involved.Subscribe now to stay updated on the latest insights in contract law and more.TakeawaysContracts get intense after formation, especially performance.Understanding performance obligations is crucial for legal analysis.The distinction between common law and UCC standards is vital.Material breach vs. minor breach directly affects remedies.The materiality test determines the severity of a breach.Express conditions require strict compliance, unlike constructive conditions.Impossibility and impracticability are key excuses for non-performance.Anticipatory repudiation allows immediate action by the non-breaching party.The right to cure can mitigate strict performance requirements.Legal drafting can significantly impact risk allocation in contracts.law school, contracts, performance, breach, conditions, UCC, common law, legal analysis, exam preparation
CannCon kicks off solo before Alpha finally rolls in late, and together they tear through the chaos of the day. From a deep dive into Tina Peters' ongoing imprisonment to the DOJ's shady firings, Secret Service failures, and the weaponization of Big Tech, the hosts spotlight the corruption hiding in plain sight. They break down President Trump's moves against corporate embeds like Lisa Monaco, unpack the latest twists in the government shutdown, and call out the hypocrisy of the establishment. With sidebars on Malibu's stalled rebuild, a bizarre NYPD infiltration at the Ryder Cup, and AOC's strange rise, the episode is equal parts sharp analysis and raw banter. Sponsors include Comet by Perplexity, Soft Disclosure, Native Path Collagen, Patriot Injury Lawyers, and Pickaxe.
Breach notification letters set to flood North America's mailboxes New bug in classic Outlook only fixed via Microsoft support Air Force admits SharePoint privacy issue over breach Huge thanks to our sponsor, Nudge Security AI notetakers like Otter AI spread fast. In fact, one Nudge Security customer discovered 800 new accounts created in only 90 days. Viral AI notetakers introduce a slew of data privacy risks by gaining access to calendars and adding themselves to every meeting. Nudge Security can help. Within minutes of starting a free trial, you'll see every AI app, account, and integration, even those created in the past. And, smart automation helps you clean up unwanted accounts and guide users towards approved alternatives. See how you can regain control today at nudgesecurity.com/stopotter
In this episode of the podcast, Ryan Williams Sr. and Shannon Tynes discuss the latest cybersecurity news, including CISA's emergency directive regarding Cisco vulnerabilities, the rise of SIM farms threatening US infrastructure, and the alarming trend of cybercriminals targeting children's data for ransom. They emphasize the importance of cybersecurity awareness and the evolving landscape of cyber threats while also sharing personal updates and reflections on their experiences in the field. Article: CISA orders feds to patch Cisco flaws used in multiple agency hacks https://www.cybersecuritydive.com/news/cisa-emergency-directive-cisco-vulnerabilities-arcanedoor/761150/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExd2lleHdWb1RWbEFZTDBJeQEenjZcbYPfTEpDqYpskC1y_ATnQjy8Xs0O_lBm9CqOYVx3jY2IWAuVe19i1Rk_aem_QN5KLONSnHGtBgaVUXEsXw ‘SIM Farms' Are a Spam Plague. A Giant One in New York Threatened US Infrastructure, Feds Say https://www.wired.com/story/sim-farm-new-york-threatened-us-infrastructure-feds-say/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExd2lleHdWb1RWbEFZTDBJeQEenLyO6lHFipbOSiGb3VydzS5_tY3hL7Z4kXKi86wzH_Qcfc3tyl4x1uELPgk_aem_KHOxgSVa-qn4XeXt7xdiKQ Nursery hackers threaten to publish more children's profiles online https://www.bbc.com/news/articles/c07vxv8v89lo.amp?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExd2lleHdWb1RWbEFZTDBJeQEetWzL8TMJE9U0bVS7Uy0EJFnJXxX0Xf7BQRXxJw-U4fatP_ilEnBIKdE6tQc_aem_OaAnjTw17cUrAzhvv9ShRw Buy the guide: www.theothersideofthefirewall.com Please LISTEN
Are we already living in a post-data privacy world? Breaches are everywhere, data is constantly being leaked, and GDPR fines haven’t stopped surveillance capitalism or shady data brokers. In this episode of the Analyst Chat, Matthias Reinwarth is joined by Mike Small and Jonathan Care to explore whether privacy still has meaning — or if resilience and risk management are the only ways forward. They debate: ✅ Is privacy truly dead, or just evolving?✅Why regulations like GDPR often miss the mark ⚖️✅How cyber resilience is becoming more critical than “traditional” privacy✅The personal, societal, and legal dimensions of privacy✅What organizations (and individuals) can still do to protect data
Edition No249 | 28-09-2025 - Today we turn the spotlight squarely on Russia's propaganda machinery — and how its most vicious threats now extend even to Britain's ancient universities. Solovyov has threatened to wipe out the town where I live in an atomic inferno, for no other reason that we refuse to allow Russia to erase Ukraine from the world map. Perhaps he's also upset he can't get to his Italian villas since 2022. So, Russia's foremost propagandist has threatened to wipe out one of the most ancient seats of learning and civilisation, and by extension threaten to kill me. Apart from the bluster and vicious hatred, it's such utterances that show Russia has fallen far from what could be considered civilisation, civilised language and behaviour, and that no regime hack or representative should be allowed in civilised company, at least for the lifetime of the current regime. That ban should also extend to all the minions and enablers of the regime. We'll explore how that fits into a broader pattern: Russia's imperial ambitions, its civilizational decline, and the accelerating slide in global norms under pressure from China, Russia, and their allies — but also how Ukraine and its global backers confront this – showing that resistance, and a reassertion of civilised values is possible – though it comes at a steep price.We begin — shockingly — with Vladimir Solovyov's threat to bomb Oxford and Cambridge.----------This is super important. There are so many Battalions in Ukraine, fighting to defend our freedoms, but lack basics such as vehicles. These are destroyed on a regular basis, and lack of transport is costs lives, and Ukrainian territory. Once again Silicon Curtain has teamed up with Car4Ukraine and a group of wonderful creators to provide much-needed assistance: https://car4ukraine.com/campaigns/autumn-harvest-silicon-curtainAutumn Harvest: Silicon Curtain (Goal€22,000)We'll be supporting troops in Pokrovsk, Kharkiv, and other regions where the trucks are needed the most. 93rd Brigade "Kholodnyi Yar", Black Raven Unmanned Systems Battalionhttps://car4ukraine.com/campaigns/autumn-harvest-silicon-curtain----------SOURCES: “Russia should ‘bomb Oxford', key Putin ally says,” UK News / Yahoo, Sept 2025“Top Russian propagandist issues threat to drop nuclear bombs …” LADbible, Sept 2025 Nancy Ries, *Russia's Atrocity Rhetoric During Its War on Ukraine* (RCIN) An Independent Legal Analysis of the Russian Federation's Breaches of the Genocide Convention (New Lines Institute) “Holding Putin's propagandists accountable for crimes in Ukraine,” Atlantic Council UkraineAlert, June 2024 “Dmitry Medvedev says editors of The Times are ‘legitimate military targets',” The Guardian, Dec 2024 “Russia is at war with Britain …”, The Guardian / Fiona Hill commentary, June 2025 “International Criminal Court arrest warrants for Russian leaders,” Wikipedia / ICC context “Andrey Gurulyov,” Wikipedia (remarks on bombing Britain)----------SILICON CURTAIN LIVE EVENTS - FUNDRAISER CAMPAIGN Events in 2025 - Advocacy for a Ukrainian victory with Silicon Curtainhttps://buymeacoffee.com/siliconcurtain/extrasOur events of the first half of the year in Lviv, Kyiv and Odesa were a huge success. Now we need to maintain this momentum, and change the tide towards a Ukrainian victory. The Silicon Curtain Roadshow is an ambitious campaign to run a minimum of 12 events in 2025, and potentially many more. Any support you can provide for the fundraising campaign would be gratefully appreciated. https://buymeacoffee.com/siliconcurtain/extras----------SUPPORT THE CHANNEL:https://www.buymeacoffee.com/siliconcurtainhttps://www.patreon.com/siliconcurtain----------
Harrods, Stellantis, Volvo, the Canadian Government and so much more is why these segments are ALWAYS open bar!
Roger Stone: The Rise in Security Breaches and Assassinations (6 min) Learn more about your ad choices. Visit megaphone.fm/adchoices
AP correspondent Charles de Ledesma reports NATO warns Russia it will use all means to defend against airspace breaches.
Tiffany, SonicWall, Crowdstrike, SonicWall, Aetna CVS, The Social Security Administration and every financial advisor in Canada and so much more are why we want off this planet this week...
Kevin and Kieran discuss the news that Chelsea have been hit with 74 charges over alleged agent rule breaches, and find out why Inverness Caledonian Thistle are now out of administration. Follow Kevin on X - @kevinhunterday Follow Kieran on X - @KieranMaguire Follow The Price of Football on X - @pof_pod Send in a question: questions@priceoffootball.com Join The Price of Football CLUB: https://priceoffootball.supportingcast.fm/ Check out the Price of Football merchandise store: https://the-price-of-football.backstreetmerch.com/ Visit the website: https://priceoffootball.com/ For sponsorship email - info@adelicious.fm The Price of Football is a Dap Dip production: https://dapdip.co.uk/ contact@dapdip.co.uk Learn more about your ad choices. Visit podcastchoices.com/adchoices
NATO allies confer after Russian incursions, Brad Littlejohn on holding Apple accountable, and Collin Garbarino reviews Downton Abbey: The Grand Finale. Plus, a Boy Scout saves a life, Matthew West's new song offers hope, and the Tuesday morning newsSupport The World and Everything in It today at wng.org/donateAdditional support comes from Planted Gap Year, where young adults combine Bible classes, hands-on farming, and outdoor adventure. More at plantedgapyear.orgFrom PrayMore, a new app for churches to share prayer requests with members and send reminders to pray. Free trial available at praymore.com/worldAnd from iWitness. Powerful audio dramas bringing faith, courage, and history to life in unforgettable ways. iwitnesspod.com
In this episode of The President's Daily Brief: New revelations about Charlie Kirk's accused assassin, Tyler Robinson, and the chilling way he mocked investigators in real time. NATO airspace violated by a Russian drone again, this time over Romania, as President Zelensky warns the latest breach shows the war is spreading. President Trump says he won't impose new U.S. sanctions on Russia unless NATO allies first cut off their purchases of Russian oil. And in today's Back of the Brief—the UN General Assembly votes overwhelmingly for a two-state solution declaration—while also condemning Hamas, managing to call them out and hand them exactly what they want in the same breath. To listen to the show ad-free, become a premium member of The President's Daily Brief by visiting PDBPremium.com.Please remember to subscribe if you enjoyed this episode of The President's Daily Brief.YouTube: youtube.com/@presidentsdailybrief Jacked Up Fitness: Get the all-new Shake Weight by Jacked Up Fitness at https://JackedUpShakeWeight.comTriTails Premium Beef: Reclaim dinner from the jaws of school-year chaos Visit https://trybeef.com/PDB.American Financing: NMLS 182334, nmlsconsumeraccess.org. APR for rates in the 5s start at 6.327% for well qualified borrowers. Call 866-885-1881 for details about credit costs and terms. Visit http://www.AmericanFinancing.net/PDB. Learn more about your ad choices. Visit megaphone.fm/adchoices
Headlines: – Welcome to Mo News (02:00) – Inside The Arrest Of Suspect In Charlie Kirk's Murder (06:00) – Rubio Meets Netanyahu Amid Qatar Strike Fallout (28:15) – Russian Drone Entered Romania's Airspace After Poland Incident (34:15) – Trade Schools Benefit From Trump's Ivy League Fight (37:15) – America's Sex Recession: Record Lows In Intimacy (40:00) – TV's Biggest Night: Recapping The 77th Emmy Awards (44:45) – On This Day In History (48:00) Thanks To Our Sponsors: – LMNT - Free Sample Pack with any LMNT drink mix purchase– Industrious - Coworking office. 50% off day pass | Promo Code: MONEWS50 – Surfshark - 4 additional months of Surfshark VPN | Code: MONEWS – Leesa – 25% off mattress, plus extra $50 off | Promo Code: MONEWS – Factor Meals – 50% your first box plus free shipping | Promo Code: monews50off – Monarch Money - 50% off your first year | Promo Code: MONEWS
The Great Firewall of China, Jaguar Land Rover, Workday, Facebook, Tenable and Qualys, HackerOne and so much more are all part of this week's breaches!
This week on Security Squawk, Bryan Hornung and Randy Bryan break down two hard-hitting cybersecurity stories. Jaguar Land Rover's production lines grind to a halt after a massive cyberattack, showing how ransomware directly disrupts global manufacturing. Meanwhile, CISOs face mounting pressure to stay silent about breaches, raising serious questions about transparency, accountability, and corporate risk. Tune in for sharp insights, real-world lessons, and a dose of wit as we unpack what these stories mean for businesses, IT pros, and MSPs. ️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! https://streamyard.com/pal/d/65161790...
Palo Alto Networks, Zscaler, Cloudflare, Navy Fed, AT&T, more Salesforce fallout and now these segments are officially open bar...
Google, Transunion, Farmer's Insurance and even DOGE are part of this week's mess.
Dan Bowden, Marsh McLennan Global Business CISO, and Erik Decker, Intermountain Health VP & CISO, join host Charlie Osborne in this episode to discuss their approach to establishing trust and preventing breaches across organizations. Marsh is the world's most trusted and innovative cyber risk advisor, simplifying complexity while delivering unmatched results. To learn more about our sponsor, visit https://marsh.com and click on “cyber risk.”
Organizations today face escalating cyber risks spanning state-sponsored attacks, supply chain compromises, and malicious apps. ShinyHunters' breaches of Salesforce platforms (impacting Google and Farmers Insurance) show how social engineering—like voice phishing—can exploit trusted vendors. Meanwhile, Russian actors (FSB-linked “Static Tundra”) continue to leverage old flaws, such as a seven-year-old Cisco Smart Install bug, to infiltrate U.S. infrastructure. Malicious apps on Google Play (e.g., Joker, Anatsa) reached millions of downloads before removal, proving attackers' success in disguising malware. New technologies bring fresh vectors: Perplexity's Comet browser allowed prompt injection–driven account hijacking, while malicious RDP scanning campaigns exploit timing to maximize credential theft.Responses vary between safeguarding and asserting control. The FTC warns U.S. firms against weakening encryption or enabling censorship under foreign pressure, citing legal liability. By contrast, Russia mandates state-backed apps like MAX Messenger and RuStore, raising surveillance concerns. Microsoft, facing leaks from its bug-sharing program, restricted exploit code access to higher-risk countries. Open-source projects like LibreOffice gain traction as sovereignty tools—privacy-first, telemetry-free, and free of vendor lock-in.AI-powered wearables such as Halo X smart glasses blur lines between utility and surveillance. Their ability to “always listen” and transcribe conversations augments human memory but erodes expectations of privacy. The founders' history with facial recognition raises additional misuse concerns. As AI integrates directly into conversation and daily life, the risks of pervasive recording, ownership disputes, and surveillance intensify.Platforms like Bluesky are strained by conflicting global regulations. Mississippi's HB 1126 requires universal age verification, fines for violations, and parental consent for minors. Lacking resources for such infrastructure, Bluesky withdrew service from the state. This illustrates the tension between regulatory compliance, resource limits, and preserving open user access.AI adoption is now a competitive imperative. Coinbase pushes aggressive integration, requiring engineers to embrace tools like GitHub Copilot or face dismissal. With one-third of its code already AI-generated, Coinbase aims for 50% by quarter's end, supported by “AI Speed Runs” for knowledge-sharing. Yet, rapid adoption risks employee dissatisfaction and AI-generated security flaws, underscoring the need for strict controls alongside innovation.Breaches at Farmers Insurance (1.1M customers exposed) and Google via Salesforce illustrate the scale of third-party risk. Attackers exploit trusted platforms and human error, compromising data across multiple organizations at once. This shows security depends not only on internal defenses but on continuous vendor vetting and monitoring.Governments often demand access that undermines encryption, privacy, and transparency. The FTC warns that backdoors or secret concessions—such as the UK's (later retracted) request for Apple to weaken iCloud—violate user trust and U.S. law. Meanwhile, Russia's mandatory domestic apps exemplify sovereignty used for surveillance. Companies face a global tug-of-war between privacy, compliance, and open internet principles.Exploited legacy flaws prove that vulnerabilities never expire. Cisco's years-old Smart Install bug, still unpatched in many systems, allows surveillance of critical U.S. sectors. Persistent RDP scanning further highlights attackers' patience and scale. The lesson is clear: proactive patching, continuous updates, and rigorous audits are essential. Cybersecurity demands ongoing vigilance against both emerging and legacy threats.
While everyone obsesses over AI security, the old-school cyber threats are piling up. In this episode of the Security Squawk Podcast, hosts Bryan Hornung and Randy Bryan break down four major incidents that prove ransomware, breaches, and network shutdowns aren't going anywhere. We cover: Nevada state offices crippled by a major security incident Farmers Insurance data breach affecting over 1 million people Data I/O ransomware attack shutting down systems Nissan's design studio breach claimed by the Qilin ransomware gang Plus, we connect the dots to show why ransomware attacks have surged nearly threefold in 2024 — and what businesses need to do to avoid being the next headline. Stay sharp, stay informed, and don't let the AI hype distract you from the real threats hitting businesses every day. ️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! https://streamyard.com/pal/d/65161790...
PayPal, Workday, Panera, Manpower, Intel, Canada's House of Commons, and so much more are part of this week's breaches!
In this episode of Hashtag Trending, host Jim Love covers the recent downturn in tech stocks on Wall Street spurred by an MIT report indicating that 95% of corporate AI projects lack financial benefits. Google announces the launch of its Gemini smart speaker, aiming to enhance user interaction with advanced AI features. Significant privacy breaches in AI systems make headlines, with Elon Musk's AI firm Grok inadvertently exposing user conversations and exhibiting disturbing behavior patterns. The episode also discusses deep seek's new AI model's competitive performance and Microsoft's efforts to address SSD failures linked to a recent Windows update. 00:00 Introduction and Market Overview 00:35 AI Stocks and Market Reactions 02:30 Google's Gemini Smart Speaker 04:48 AI Privacy Concerns 08:15 Deep Seek vs. Claude in AI 10:24 Microsoft's SSD Bug Fix 11:12 Show Conclusion and Upcoming Content
SBS Finance Editor Ricardo Gonçalves speaks with Gemma Dale from nabtrade about the ASX 200's record close, and takes a closer look at Rebel Sport's theft problem.
In today's episode of 'Cybersecurity Today,' hosted by Jim Love, we cover several key issues in the cybersecurity landscape. Firstly, a breach involving Workday and social engineering attacks targeting Salesforce customers is discussed. Next, the risks posed by a recent Windows update potentially causing data corruption on SSDs and HDDs are highlighted. We also delve into a critical infrastructure breach where Russian hackers remotely accessed a Norwegian dam's control system. Additionally, the episode covers Google's vulnerabilities in its AI and Gmail services, and finally, Apple's significant privacy victory against the UK's backdoor encryption mandate. The episode concludes with a call for listener support through donations to sustain the program. 00:00 Introduction and Headlines 00:23 Workday Data Breach Explained 02:15 Windows Update Issues 04:05 Norwegian Dam Cyber Attack 05:49 Google's Security Challenges 07:12 Apple's Privacy Victory 08:19 Conclusion and Listener Support
Columbia University, Google, Salesforce, Air France, Pandora, Cisco, Chanel and so much more insanity are all part of this week's segment..
Send us a textOn this week of Serious Privacy, Paul Breitbarth, Ralph O'Brien of Reinbo Consulting, and Dr. K Royal talk about a slew of breaches and what to do if your data is breached. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
In this episode of 'Cybersecurity Today,' host David Chipley discusses several major security incidents and threats. Hamilton, Ontario faces a $5 million insurance denial following a ransomware attack due to incomplete deployment of Multi-Factor Authentication (MFA). The episode also highlights a severe vulnerability, CVE-2025-54135, in the AI-powered Code Editor 'Cursor', which could allow prompt injection attacks. Further topics include a new ransomware attack exploiting Microsoft SharePoint vulnerabilities investigated by Palo Alto Networks, and a campaign leveraging fake OAuth apps to compromise Microsoft 365 accounts. The episode underscores the importance of robust security measures, emphasizing MFA, OAuth hygiene, and prompt patching. 00:00 Introduction and Headlines 00:38 Hamilton's Ransomware Attack and Insurance Denial 02:52 AI-Powered Code Editor Vulnerability 04:57 Palo Alto Networks Investigates SharePoint Exploitation 06:51 Fake OAuth Apps and Microsoft 365 Breaches 08:48 Conclusion and Upcoming Events
Dior (again), Nascar (again), Dollar Tree, Audi, IBM's amazing breach report and a breach so bad the military was called in.
In this thought leadership session, ITSPmagazine co-founders Sean Martin and Marco Ciappelli moderate a dynamic conversation with five industry leaders offering their take on what will dominate the show floor and side-stage chatter at Black Hat USA 2025.Leslie Kesselring, Founder of Kesselring Communications, surfaces how media coverage is shifting in real time—no longer driven solely by talk submissions but now heavily influenced by breaking news, regulation, and public-private sector dynamics. From government briefings to cyberweapon disclosures, the pressure is on to cover what matters, not just what's scheduled.Daniel Cuthbert, member of the Black Hat Review Board and Global Head of Security Research at Banco Santander, pushes back on the hype. He notes that while tech moves fast, security research often revisits decades-old bugs. His sharp observation? “The same bugs from the ‘90s are still showing up—sometimes discovered by researchers younger than the vulnerabilities themselves.”Michael Parisi, Chief Growth Officer at Steel Patriot Partners, shifts the conversation to operational risk. He raises concern over Model-Chained Prompting (MCP) and how AI agents can rewrite enterprise processes without visibility or traceability—especially alarming in environments lacking kill switches or proper controls.Richard Stiennon, Chief Research Analyst at IT-Harvest, offers market-level insights, forecasting AI agent saturation with over 20 vendors already present in the expo hall. While excited by real advancements, he warns of funding velocity outpacing substance and cautions against the cycle of overinvestment in vaporware.Rupesh Chokshi, SVP & GM at Akamai Technologies, brings the product and customer lens—framing the security conversation around how AI use cases are rolling out fast while security coverage is still catching up. From OT to LLMs, securing both AI and with AI is a top concern.This episode is not just about placing bets on buzzwords. It's about uncovering what's real, what's noise, and what still needs fixing—no matter how long we've been talking about it.___________Guests:Leslie Kesselring, Founder at Cyber PR Firm Kesselring Communications | On LinkedIn: https://www.linkedin.com/in/lesliekesselring/“This year, it's the news cycle—not the sessions—that's driving what media cover at Black Hat.”Daniel Cuthbert, Black Hat Training Review Board and Global Head of Security Research for Banco Santander | On LinkedIn: https://www.linkedin.com/in/daniel-cuthbert0x/“Why are we still finding bugs older than the people presenting the research?”Richard Stiennon, Chief Research Analyst at IT-Harvest | On LinkedIn: https://www.linkedin.com/in/stiennon/“The urge to consolidate tools is driven by procurement—not by what defenders actually need.”Michael Parisi, Chief Growth Officer at Steel Patriot Partners | On LinkedIn: https://www.linkedin.com/in/michael-parisi-4009b2261/“Responsible AI use isn't a policy—it's something we have to actually implement.”Rupesh Chokshi, SVP & General Manager at Akamai Technologies | On LinkedIn: https://www.linkedin.com/in/rupeshchokshi/“The business side is racing to deploy AI—but security still hasn't caught up.”Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
You know that moment when someone casually slides a contract across the table and says, “Just sign here”? Yeah, don't do that—especially when it's a Business Associate Agreement. This episode is a deep dive into the dark corners of BAAs, the traps they hide, and why you should read every line like it's a ransom note. From ping floods to passive-aggressive breach clauses, we unpack the weird, wild world of healthcare contracts. Oh, and stick around—because just when you think it can't get any messier, a breach shows up to ruin everyone's day. More info at HelpMeWithHIPAA.com/519
The Trump administration has unveiled a new AI action plan that emphasizes deregulation and the promotion of American AI exports, raising concerns among regulated industries. The initiative aims to foster American leadership in the AI sector by reducing environmental regulations for data centers and advocating for the export of AI technologies. However, the plan lacks specific details on how to establish global alliances or enforce export restrictions effectively, leading to uncertainty for businesses operating in regulated environments. This shift away from oversight marks a significant departure from the previous administration's safety standards for AI technology.Recent research has revealed alarming findings regarding AI training data, indicating that even seemingly safe datasets can lead to harmful AI outputs. A study conducted by Truthful AI and the Anthropic Fellows Program demonstrated that models trained on benign data could still develop undesirable behaviors, such as endorsing violence. This phenomenon, termed subliminal learning, raises questions about the reliability of synthetic data in AI training, especially as projections suggest that synthetic data may soon surpass real data in AI models.The podcast also discusses the impact of AI-generated summaries on online news traffic, with some websites experiencing a dramatic decline in click-through rates. Research indicates that sites ranked first in search results could see traffic drop by nearly 80% if their links appear below AI-generated summaries. This trend has sparked concerns among media owners, who view it as a potential existential threat to their operations, prompting calls for regulatory action to address the challenges posed by AI in the news industry.Finally, the episode highlights the rapid adoption of virtual Chief Information Security Officer (vCISO) services among managed service providers, driven by the integration of AI technologies. A report reveals a 300% increase in vCISO adoption, with many providers experiencing significant reductions in workload and labor time due to AI. This shift indicates a growing demand for scalable and efficient cybersecurity solutions, but it also raises concerns about commoditization in the market, emphasizing the need for differentiation and strategic insight in service offerings. Four things to know today 00:00 “America First” Meets A.I.: Trump's Action Plan Prioritizes Deregulation, Exports, and Ideological Scrutiny03:23 AI Gone Wrong: Subliminal Learning, Search Traffic Collapse, and Academic Manipulation Underscore Oversight Gap07:28 vCISO Adoption Surges 300% as AI Transforms Cybersecurity Into a Scalable Growth Strategy09:34 SharePoint Exploit Breaches 400+ Orgs, Including U.S. Nuclear Agency, in Ongoing Zero-Day Attack Supported by: https://syncromsp.com/ Tell us about a newsletter!https://bit.ly/biztechnewsletter All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
Microsoft issues emergency updates for zero-day SharePoint flaws. Alaska Airlines resumes operations following an IT outage. The UK government reconsiders demands for Apple iCloud backdoors. A French Senate report raises concerns over digital sovereignty. Meta declines to sign the EU's new voluntary AI code of practice. A new report claims last year's CrowdStrike outage disrupted over 750 hospitals. The World Leaks extortion group has breached Dell's Customer Solution Centers. Hewlett-Packard Enterprise (HPE) issues a critical warning about two severe security flaws in Aruba Instant On Access Points. A single compromised password leads to a UK transport company's demise. An AI assistant falls for fake metadata magic. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Maria Varmazis, host of T-Minus Space Daily, joins Dave Bittner to unpack AST SpaceMobile's request to use amateur radio spectrum for satellite communications. They explore what this means for ham radio users, the role of secondary spectrum access, and why the amateur community is pushing back. It's a nuanced look at spectrum sharing, space tech, and regulatory tensions. Selected Reading Global hack on Microsoft product hits U.S., state agencies, researchers say (The Washington Post) Microsoft releases emergency patches for SharePoint RCE flaws exploited in attacks (Bleeping Computer) Alaska Airlines requests all flights to be grounded: FAA (ABC News) UK government seeks way out of clash with US over Apple encryption (Financial Times) Digital vassals? French Government ‘exposes citizens' data to US' (Brussels Signal) Meta snubs the EU's voluntary AI guidelines (The Verge) At Least 750 US Hospitals Faced Disruptions During Last Year's CrowdStrike Outage, Study Finds (WIRED) Dell confirms breach of test lab platform by World Leaks extortion group (Bleeping Computer) HPE warns of hardcoded passwords in Aruba access points (Bleeping Computer) Weak password allowed hackers to sink a 158-year-old company (BBC News) Claude Jailbroken to Mint Unlimited Stripe Coupons (General Analysis) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
An exploited iOS iMessage vulnerability Apple denies? The NPM repository is under siege with no end in sight. Were Comcast and Digital Realty compromised? Don't ask them. Matthew Green agrees: XChat does not offer true security. We may know how Russia is convicting Telegram users. Microsoft finally decides to block two insane Outlook file types. 40,000 openly available video camera are online. Who owns them? Running SpinRite on encrypted drives. An LLM describes Steve's (my) evolution on Microsoft security. What do we know about the bots that are scanning the Internet? Show Notes - https://www.grc.com/sn/SN-1030-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: joindeleteme.com/twit promo code TWIT bitwarden.com/twit material.security drata.com/securitynow bigid.com/securitynow