POPULARITY
Categories
It's episode 333! What a number! Nice round edges, repeating, it's big...ah, what a day. With GGG announcing PoE 1 and Path of Exile 2 news in the same week, they provided lots of content to throw around. We have Breaches, Vaal thingies, screen-hopping, Atlas stuff, mapping, checkpoints...nothing like a good checkpoint! Just chatting with a buddy about our favourite game for the 333rd time. Good times. Thanks for being a part this week (and so many others). We love that you're here. You're the best.Forever Exiled Info:www.foreverexiled.comPatreonTwitter @ForeverExiled82Path of Exile WebsiteWrecker of Days Builds ListDiscord...FE Merch StoreFE Nexus Store
The Dutch Police, Salesforce, CarGurus, Adidas, Canada Goose are all part of this week's fun! FYI, I'm trying a new format for info delivery in this segment. If you're a regular Breaches watcher/listener, I'd love feedback (good or bad!)
This week on Driving Law, Kyla Lee discusses appearing at the Supreme Court of Canada on behalf of Women in Canadian Criminal Defence (WiCCD) in a case about compelled accident statements and the right to silence. The episode explores how roadside detention laws disproportionately impact women and marginalized people. Kyla and Paul also break down a major B.C. Court of Appeal decision upholding the Privacy Commissioner's authority to ban Clearview AI's facial recognition scraping in British Columbia, and discuss privacy breaches connected to the Lapu-Lapu Day tragedy. Plus, a Florida Jaguar driver wedges a convertible under a school bus and somehow survives — Ridiculous Driver of the Week. Check out the "Lawyer Told Me Not To Talk To You" T-shirts and hoodies at Lawyertoldme.com and "Sit Still Jackson" at sitstilljackson.com.
The safety net is gone. Nifty has violated its previous swing low, signaling that the bearish trend isn't just continuing—it's intensifying. When a swing low breaks, it triggers a cascade of sell orders. Vidnyan Sawant explains why this specific breach changes the game and reveals the next major support level where the bleeding might stop.
The safety net is gone. Nifty has violated its previous swing low, signaling that the bearish trend isn't just continuing—it's intensifying. When a swing low breaks, it triggers a cascade of sell orders. Vidnyan Sawant explains why this specific breach changes the game and reveals the next major support level where the bleeding might stop.
The safety net is gone. Nifty has violated its previous swing low, signaling that the bearish trend isn't just continuing—it's intensifying. When a swing low breaks, it triggers a cascade of sell orders. Vidnyan Sawant explains why this specific breach changes the game and reveals the next major support level where the bleeding might stop.
Volvo, Comcast, the entire population of Senegal, Telegram, an AI Chat App, and Russia's state required messaging platform are all the reasons why we should just quit the internet...
This week on Driving Law, Kyla Lee and Paul Doroshenko break down a constitutional challenge out of Nunavut arguing that mandatory driving prohibitions amount to cruel and unusual punishment for Inuit hunters. They also analyze a major B.C. impaired driving decision involving multiple Charter breaches and what it means for roadside investigations going forward. Plus, a discussion about proposed changes to allow paralegals to handle serious driving offences — and Florida earns Ridiculous Driver of the Week. Check out the "Lawyer Told Me Not To Talk To You" T-shirts and hoodies at Lawyertoldme.com and "Sit Still Jackson" at sitstilljackson.com.
This episode was first published on 18 July 2025.Cyber attacks can feel a layer detached from the real world. Yes, businesses frequently see IP stolen, get frozen out of systems, or have data wiped by malicious actors. But if you haven't got your finger on the pulse, cyber attacks can also fail to register in your day to day.But there are instances where cyber attacks come crashing into the lives of everyday people, and become impossible to ignore: when attackers go after critical infrastructure and operational technology. Breaches and malware attacks at power and water plants, against core supply chain organizations, or against transport networks can all cause catastrophic damage, enormous financial losses – and even lead to deaths.In this episode, Rory speaks with Magpie Graham, technical director of intel and services at Dragos, to discuss attacks on operational technology, critical infrastructure, and the future of large-scale cyber attacks.Read more:What is operational technology – and why is it at risk?Manufacturing firms are struggling to handle rising OT security threatsWhen everything connects, everything's at riskFormer NCSC head says the Jaguar Land Rover attack was the 'single most financially damaging cyber event ever to hit the UK' as impact laid bareCISA shares lessons learned from Polish power grid hack – and how to prevent disaster striking again
Flickr, Substack, Panera, Iron Mountain, Harvard, roughly every Chinese citizen and AI Social Network Moltbook are all part of this week's breaches insanity!
10 - Hate crimes law breaches covenants it pledges to uphold by Australian Citizens Party
Welcome to the second annual Florida February, where the stories get dumber, the dramatics get louder, and our sound-FX machine is working overtime. Trevin falls for another brilliant marketing trap courtesy of Lil Dicky's Buzzballs commercials and arrives with a “celebratory” beverage. Amanda dresses up for a fancy work New Year party, only to crash in her makeup and wake up with her acne in full goblin mode. We kick things off with Killer Facts from the Sunshine State. Amanda spotlights the adorable oddity of the world's smallest police station in Carrabelle, Florida, while Trevin heads to Quincy, where Pat Munroe's Coca-Cola hunch turned a tiny town into a community of soda millionaires. Our first story dives into the Wreck Bar in Fort Lauderdale, home to performing mermaids Whitney Fair and Mia Mellies. Their years-long rivalry involves nudity, alleged witchcraft, and multiple visits from law enforcement. You may have seen this case on HBO's It's Florida, Man—but you've never heard it like this. And yes, we've got an update. Then Trevin takes us to St. Petersburg and the offices of 1-800Accountant, where a new HR director's petty streak and serious attitude problem spiral into an unauthorized access nightmare that threatens the entire company. Two Florida stories, one shared theme: system breaches fueled by pure pettiness. So hack into your podcast app of choice and dive in. Welcome to Florida. Today's Stories: • A Mermaid Scorned • HR Nightmare Join our Facebook Group: https://www.facebook.com/groups/livelaughlarcenydoomedcrew For ad-free episodes and lots of other bonus content, join our Patreon! https://www.patreon.com/LiveLaughLarceny Check out our website: Here Follow us on Instagram: Here Follow us on Facebook: Here Follow us on TikTok: Here If you have a crime you'd like to hear on our show OR have a personal petty story, email us at livelaughlarceny@gmail.com or send us a DM on any of our socials! Learn more about your ad choices. Visit podcastchoices.com/adchoices
Guest Samantha Schalk, LMSW, CAADC, CIMHP, shares common HIPAA compliance gaps therapists often miss, including missing written policies, skipped security risk analyses, and weak device and website security. She also offers practical guidance on preventing breaches and staying compliant through simple, ongoing check-ins and documentation. Learn more about today's guest here: https://www.guardianclinicalessentials.com/ & https://www.facebook.com/people/Guardian-Clinical-Essentials/61580153491733/ Sponsored by TherapyNotes®: Looking to switch EHRs? Try TherapyNotes® for 2 months free by using promo code ABUNDANT at therapynotes.com. Ready to fill your practice faster? Join the Abundance Party today and get 99% off your first month with promo code PODCAST: www.abundancepracticebuilding.com/abundanceparty
Hackers aren't stealing passwords anymore. They're stealing what makes companies valuable.We cover: • The European Space Agency breach and why even elite organizations aren't safe • Pig butchering romance scams and how social engineering targets human psychology • The Nike data breach where attackers stole intellectual property, not customer data • AI voice cloning, deepfake scams, and real-world fraud attempts • Why modern cybercrime looks more like organized crime than traditional hacking.If you care about cybersecurity threats, ransomware groups, AI scams, social engineering attacks, or how hackers actually operate today, this episode will change how you think about risk.Cybercrime is evolving fast. Most defenses aren't.CHAPTERS00:00 – Hackers stopped stealing passwords and started stealing everything 01:50 – Welcome to Chaos + panel intros 03:40 – Meme culture, cold weather, and why Dino has too much free time 04:25 – European Space Agency hacked twice in one month 06:00 – If rocket scientists can't keep hackers out… 07:10 – Space nerds, Carl Sagan, and stardust detour 08:15 – Romance scams and pig butchering explained 09:20 – “Wrong number” texts and how the scam really starts 10:50 – How victims are slowly manipulated into crypto scams 12:25 – The 764 gang and psychological weaponization 13:40 – The dark twist: scammers as human trafficking victims 16:40 – Luxury lifestyles, urgency, and fake success 18:20 – Why victims don't report scams 23:30 – Fake job offers and too-good-to-be-true salaries 24:20 – Nike breach isn't what you think 25:45 – Why hackers skipped customer data entirely 27:10 – WorldLeaks, ransomware evolution, and pure extortion 28:35 – 1.4TB of stolen intellectual property 30:30 – Stealing what actually makes Nike… NikeQuestions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us.Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
Panera Bread, Canada Computers, Stellantis, Match, Hinge, OKcupid, Krispy Kreme, Bumble and one Kiwi's desire to get some teeth are all part of this week's breaches!
Max and Q cover the latest happenings in the world of Bitcoin, privacy and much more. AOBBusy BoyFTF: New Year. New Freedom Tech GoalsSamourai reminderBitcoin/Crypto donations now available14.8 k SignaturesThird letter from Keonne now available via The RageNEWSBanter Rule UK- https://www.dailymail.co.uk/news/article-15454419/Labour-banter-ban-cost-firms-60million-enforce.html A French company that helps calculate taxes on crypto has been breached and it's suspected that info on 50,000 clients has been leaked.- https://www.leparisien.fr/faits-divers/cryptomonnaies-la-plate-forme-waltio-victime-de-tentative-dextorsion-par-les-mysterieux-shiny-hunters-23-01-2026-KBCBLDCHANDMDIUM6W2JIMJHMM.php Bitcoin hashrate drops 8% as US miners curtail during Winter Storm Fern- https://blockspace.media/insight/bitcoin-hashrate-drops-8-as-us-miners-curtail-during-winter-storm-fern/ Meet John Lick: Stealer of Stolen Funds - https://x.com/zachxbt/status/2014685263327351116 Write a letter of support for Roman Storm- https://freeromanstorm.com/write-letterFrom "A developer": I'm not going to post this on socials as I'm done arguing with plebs who can't verify and read the code for themself, but FYI, I just read through the BIP110 activation client code and: Contrary to the activation parameters as written in the BIP (BIP9 style activation, miner activated), the actual activation client has an additional BIP148 style enforcement starting around August 1st. When the threshold of 55% blocks signaling for bip110 in a single window (2016 blocks) has not been reached, any block that is not signaling for BIP110 after August 1st will be rejected by the activation client, basically splitting themself of, or even coming to a complete halt if there's no hashpower. Looking at the node counts and virtue signaling on X, this is going to be interesting to watch.https://github.com/dathonohm/bitcoin/commit/10bb4479dff1b9cb833795df5e6fab27c71def6d#diff-97c3a52bc5fad452d82670a7fd291800bae20c7bc35bb82686c2c0a4ea7b5b98R4652UPDATES/RELEASESPhoenixd Dashboard: New Analytics Page- https://x.com/_miguelmedeiros/status/2013989529196060902Bithypha: New auto-analysis - display all taint paths between transactions, clusters, and addresses.- https://x.com/bithypha/status/2014650957611561356Envoy 2.2.1: Prime Connectivity- https://x.com/FOUNDATIONdvcs/status/2014679768365482491MyNymBox- DNS Management and Client Portal Merged (https://x.com/mynymbox/status/2015141559239356477)- New Docs Site (https://docs.mynymbox.io/)- Tons of New Templates (https://mynymbox.io/apptemplates)Clawdbot: The New AI Frenzy- https://x.com/damianplayer/status/2015105669620269373MapleAI: Connect Your Clawdbot- https://x.com/marksuman/status/2015653223504269602Crypto Privacy Tracker: Tracking private cryptocurrency value across coins and protocols- https://x.com/cryptoprvcy/status/2014439254592462999Peach: BTC Payserver Plugin- https://x.com/peachbitcoin/status/2015791375854321702Zeus: Adds Stealth Mode- https://x.com/ZeusLN/status/2015782022439190639EDUCATIONEscape the Technocracy: 3D Printing for Radicals Course- https://escapethetechnocracy.com/product-3d-printing-video-course/Cryptography Mathematics Course by Fundamentals ( https://cryptography-xi.vercel.app/)Sparrow Wallet Course by Fundamentals (https://sparrow-deploy.vercel.app/)HELP GET SAMOURAI A PARDONSIGN THE PETITION ----> https://www.change.org/p/stand-up-for-freedom-pardon-the-innocent-coders-jailed-for-building-privacy-tools DONATE TO THE FAMILIES ----> https://www.givesendgo.com/billandkeonneSUPPORT ON SOCIAL MEDIA ---> https://billandkeonne.org/VALUE FOR VALUEThanks for listening you Ungovernable Misfits, we appreciate your continued support and hope you enjoy the shows.You can support this episode using your time, talent or treasure.TIME:- create fountain clips for the show- create a meetup- help boost the signal on social mediaTALENT:- create ungovernable misfit inspired art, animation or music- design or implement some software that can make the podcast better- use whatever talents you have to make a contribution to the show!TREASURE:- BOOST IT OR STREAM SATS on the Podcasting 2.0 apps @ https://podcastapps.com- DONATE via Monero @ https://xmrchat.com/ugmf- BUY SOME STICKERS @ https://www.ungovernablemisfits.com/shop/FOUNDATIONhttps://foundation.xyz/ungovernableFoundation builds Bitcoin-centric tools that empower you to reclaim your digital sovereignty.As a sovereign computing company, Foundation is the antithesis of today's tech conglomerates. Returning to cypherpunk principles, they build open source technology that “can't be evil”.Thank you Foundation Devices for sponsoring the show!Use code: Ungovernable for $10 off of your purchaseCAKE WALLEThttps://cakewallet.comCake Wallet is an open-source, non-custodial wallet available on Android, iOS, macOS, and Linux.Features:- Built-in Exchange: Swap easily between Bitcoin and Monero.- User-Friendly: Simple interface for all users.Monero Users:- Batch Transactions: Send multiple payments at once.- Faster Syncing: Optimized syncing via specified restore heights- Proxy Support: Enhance privacy with proxy node options.Bitcoin Users:- Coin Control: Manage your transactions effectively.- Silent Payments: Static bitcoin addresses- Batch Transactions: Streamline your payment process.Thank you Cake Wallet for sponsoring the show!MYNYMBOXhttps://mynymbox.ioYour go-to for anonymous server hosting solutions, featuring: virtual private & dedicated servers, domain registration and DNS parking. We don't require any of your personal information, and you can purchase using Bitcoin, Lightning, Monero and many other cryptos.Explore benefits such as No KYC, complete privacy & security, and human support.(00:00:00) INTRO(00:00:57) THANK YOU FOUNDATION(00:01:38) THANK YOU CAKE WALLET(00:02:42) Crunch Time, Stress & Coffee(00:07:03) Pardon Samourai Updates(00:09:57) UK "Banter Ban" (00:12:47) French Crypto Tax Business Hacked(00:15:03) Crypto Thieves Flex, ZachXBT Traces Funds(00:20:14) US Winter Storm Leads Hashrate Loss(00:28:38) BIP 110 Activation Drama(00:40:26) Letter of Support for Roman(00:41:44) BOOSTS(00:48:33) PhoenixD Dashboard Analytics(00:51:39) Bithypha: New Auto-Analysis(00:54:14) Envoy 2.2.1: Prime Connectivity(00:55:21) MyNymBox Updates(00:56:55) Clawdbots...Now Moltbots(01:04:54) MapleMoltBots(01:07:09) Crypto Privacy Tracker(01:08:13) Peach BTC Pay Plugin(01:09:45) ZEUS Stealth Mode(01:11:17) ETT: 3D Printing for Radicals(01:13:46) Cryptography Mathematics Course by Fundamentals(01:14:47) Sparrow Wallet Course by Fundamentals(01:17:51) THANK YOU MYNYMBOX
This week we've heard about another privacy breach. We don't tell strangers on the street everything about ourselves but for some reason, when a business does it online, who we also don't know or trust, you just cannot shut us up. Name and address? Sure. Phone number? Why not. Signature? Fill ya boots. Don't even get me started credit cards and debit cards. I was talking to tech expert this week on the show. What he said has been playing on my mind for two reasons. 1. We've lost trust and faith in companies to manage our data now, I reckon. Trust is dead, and it's very hard to earn back. And nothing's sacred - we know that after the health hack. In Finland, a psychologist's notes were hacked so patients had all their secrets out there for ransom online. 2. The penalties for businesses leaving the backdoor open for scammers is very low - the maximum fine is apparently just $10,000. So if a business gets your data stolen and then doesn't tell you, the maximum fine is $10,000. The Privacy Commissioner can also get involved and award compensation of up to $350k, but that's for a serious breach which causes serious harm. Whatever that means. But I reckon they should make the fine so massive, so enormous, so crippling, that businesses just stop asking for all your information. Let it all be anonymous. Assign people a number. You don't need all the information you collect, so just don't. If the fines don't deter the behaviour and behaviour doesn't stop, trust will further erode and nobody will be handing over their data anyway. The internet's just one big funnel collecting and spitting your privacy. Now, I don't mean to just pick on the businesses here, of course the scammers are the real jerks, but they're too hard to chase down. Although I note this morning that China executed 11 scammers from Myanmar, which even though I'm against it, may put people off doing it more than a fine? See omnystudio.com/listener for privacy information.
Got a question or comment? Message us here!Insider threats don't start with malware ... they start with access. From disgruntled employees to overlooked contractors, this episode breaks down real-world cases, common patterns, and how organizations can better protect what matters most.
This episode of Security Squawk breaks down a familiar and dangerous pattern in cybersecurity. Major brands are losing data. Attackers are moving fast. And companies are still relying on silence and delay as a response strategy. We cover hackers auctioning stolen source code from a major retailer, an unprotected database exposing millions of Gmail and Instagram records, ransomware claims involving Nike and Under Armour, and a gas station breach that exposed Social Security numbers. This is not about advanced hacking techniques or rare exploits. It is about basic security failures, weak response decisions, and the real business impact of hesitation after data exposure. If you are a business owner, executive, or IT leader, this episode explains why modern breaches cause damage long before confirmation and why waiting to respond often shifts risk onto customers and employees
The following article of the Health industry is: “Healthcare Cyberattacks: Severe Breaches and Risks to Human Life” by Sneer Rozenfeld, CEO, Yahalomn Foundation.
Gmail, Nike, Under Armour, McDonald's, Apple, Nvidia, LG, Tesla, SoundCloud, Crunchbase and whole bunch of fines are all part of this week's mess...
President Donald Trump is set to be at the World Economic Forum in Davos with Greenland top of the agenda. Lindsey Halligan is stepping away from her as US Attorney role. The Justice Department admits that DOGE employees have inappropriately handled sensitive data. Israeli Prime Minister Benjamin Netanyahu has joined Trump's “Board of Peace” for Gaza. Plus, the man who assassinated Japan's former Prime Minister has been sentenced. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Kaiser Permanente, Oracle (again), Petco, JPMorgan, Eurail, the AI agents use and love(?) and about a billion lawsuits are all part of this week's breaches!
Mentor Sessions Ep. 047: Human Hacking Bitcoin Wallets, Deadly Social Engineering Scams & Nuclear Breaches | Christopher HadnagyWhat if one phone call could drain your Bitcoin wallet like MGM's $190M ransomware nightmare, or social engineering tricks from Jamaican bank heists expose why Bitcoin's human element is your biggest security flaw? In this episode of BTC Sessions, world-renowned human hacking expert Christopher Hadnagy reveals how AI-fueled scams like sextortion are exploding, and targeting Bitcoin holders with FOMO, romance frauds, and voice phishing that bypasses security. He breaks down wild stories of tailgating, breaking into nuclear facilities and owning bank servers with just a clipboard, proving no system is safe from psychological manipulation. Chris warns of dark web guides and shares pro defenses like code words, MFA, and OSINT to hack-proof your sats. From QR phishing to AI accent-erasing vishing, he exposes how hackers spoof LinkedIn for $250K Bitcoin thefts. As founder of Innocent Lives Foundation, Chris flips his skills to hunt predators worldwide, rescuing kids from exploitation rings. If you're self-custodying BTC, this is your must-watch guide to human hacking threats, social engineering secrets, and Bitcoin security mastery—don't let hackers own you!About Christopher HadnagyWebsite: https://www.social-engineer.com/Podcast: https://www.social-engineer.org/podcast/X: @humanhackerInnocent Lives Foundation: https://www.innocentlivesfoundation.org/Chapters:00:00:00 Teaser & Intro00:01:35 Guest Intro & Social Engineering Definition00:02:58 Jamaican Bank Heist00:09:21 Heist Reflections00:10:19 Tactics: OSINT, Pretexts & Influence00:14:51 Bitcoin's Human Flaw00:16:31 Common Pretexts & LinkedIn Scams00:20:57 Scam Losses & Global Impact00:22:55 Motivations: FOMO, Romance & Sextortion00:28:42 AI's Role in Scams00:32:35 Vectors: Phishing, Vishing & MGM00:35:17 Generational Shifts: Smishing/QR00:38:53 Defenses: Verification, Code Words & MFA00:42:19 Breaches & Security Failures00:45:51 Sovereign Computing & Nostr00:47:22 Nuclear Facility Stories00:53:57 Innocent Lives Foundation Origins00:58:06 ILF Mission, Impact & Resources01:02:46 Podcast, Class & ClosingPrevious Episode:Mentor Sessions Ep. 046: Bitcoin 2026 Bull Run, TradFi Myths & Fed Liquidity Secrets | Joe Consorti: https://youtu.be/7p16VXpyEpU⚡ POWERED by Abundant Mines: Fully managed Bitcoin mining. Learn more at https://qrco.de/bgYKPB
Today on Security Squawk we are breaking down three different incidents that all point to the same underlying issue. Basic security failures with real consequences. An Oregon state agency exposes personal information tied to environmental complaints. Nissan suffers a ransomware incident that leaks nearly 900 gigabytes of internal data. And an Illinois government agency exposes sensitive information connected to more than 700,000 individuals. Randy Bryan, Reginald Andre, and Bryan Hornung walk through what actually happened, why these incidents keep repeating across industries, and what they mean for businesses that assume they are too small or too quiet to be targeted. If government agencies and global manufacturers are struggling with access control, monitoring, and accountability, the real question is what that means for your organization. Join us live to understand the risks and what to do next. Join Randy Bryan, Reginald Andre, and Bryan Hornung live and be part of the conversation.
The FBI warns of Kimsuky quishing. Singapore warns of a critical vulnerability in Advantech IoT management platforms. Russia's Fancy Bear targets energy research, defense collaboration, and government communications. Malaysia and Indonesia suspend access to X. Researchers warn a large-scale fraud operation is using AI-generated personas to trap mobile users in a social engineering scam. BreachForums gets breached. The NSA names a new Deputy Director. Monday Biz Brief. Our guest is Sasha Ingber, host of the International Spy Museum's SpyCast podcast. The commuter who hacked his scooter. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Sasha Ingber, host of the International Spy Museum's SpyCast podcast, on the return of SpyCast to the N2K CyberWire network. Selected Reading North Korea–linked APT Kimsuky behind quishing attacks, FBI warns (Security Affairs) Advantech patches maximum-severity SQL injection flaw in IoT products (Beyond Machines) Russia's APT28 Targeting Energy Research, Defense Collaboration Entities (SecurityWeek) Malaysia and Indonesia block X over deepfake smut (The Register) New OPCOPRO Scam Uses AI and Fake WhatsApp Groups to Defraud Victim (Hackread) BreachForums hacking forum database leaked, exposing 324,000 accounts (Bleeping Computer) Former NSA insider Kosiba brought back as spy agency's No. 2 (The Record) Vega raises $120 million in a Series B round led by Accel. Reverse engineering my cloud-connected e-scooter and finding the master key to unlock all scooters (Rasmus Moorats) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
NordVPN, Hardware wallet giant Ledger, Instagram, 5 major countries are all part of this week's mess.
Microsoft to enforce MFA for Microsoft 365 admin center sign-ins Cisco patches ISE security vulnerability after PoC release Illinois state agency breaches itself Huge thanks to our sponsor, Hoxhunt A small tip for CISOs: if you're unsure whether your security training is actually reducing phishing risk, check out what Qualcomm achieved with Hoxhunt. They took their 1,000 highest-risk users from consistent under-performers to outperforming the rest of the company, driving measurable human risk reduction and earning a CSO50 Award. See the Qualcomm case at hoxhunt.com/qualcomm Find the stories behind the headlines at CISOseries.com.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Barracuda, Oracle, Aflac, The European Space Agency, Wired and the "Tinder for N*zis" are all part of this week's insanity...
A new year - and so much to do! To start 2026, Richard flies solo again to discuss the issues he's seen on sysadmins' minds as we head into the new year. Obviously, AI is eating up a lot of the conversation from many different angles: tools that can help us be more productive, security issues in our organizations due to misuse, and now, AI-driven hacking. Security still looms large, and not just from an AI perspective - the latest round of supply chain attacks has led to litigation, putting new emphasis on making sure you're secure. Windows has a new leader, things are changing there, and there's the ongoing migration to the cloud. Does it still make sense? There seems to be more concern about data sovereignty than ever, and some meaningful conversations to have. Happy New Year!LinksAzure SRE Agents with Deepthi ChelupatiMicrosoft PurviewThe M365 Copilot Data Readiness Checklist with Nikki ChappleQuering for Breaches with Mark MorowcyznskiManaging Vendor Incidents with Mandi WallsIncident Management and the Crowdstrike event with Lieam WestleyMicrosoft IntuneMicrosoft Entra IDMicrosoft Defender for EndpointMicrosoft Entra ID Protection with Corissa KoopmansWindows Server 2025Upgrading to Windows Server 2025 with Robert SmitRecorded December 20, 2025
LastPass, SoundCloud, Pornhub, a lot of credit unions and so much more are all part of this week's mess!
We're going around the world to look at the worst breaches out there, including the possible worst breach ever in the internet age!
Rishi Bhargava is CEO of Descope, an identity management platform for customers and AI agents. They've raised $88M in funding from investors such as Notable Capital, Lightspeed, Unusual Ventures. The two previous he founded were acquired by Palo Alto Networks and McAfee. (00:01) Introduction(00:08) Origin story: why identity and passwords needed a rethink(02:59) Passwords vs passkeys explained in plain English(05:06) Why logging in is still painful (and why passwords persist)(09:06) Account takeovers explained: how hacks actually happen(11:59) Building security products: philosophy vs regular software(14:24) The ideal login experience: from frustration to seamless access(16:40) What is an AI agent? Defining agent identity simply(21:54) Good bots vs bad bots: trust, access, and control in an agent world(25:03) Breaches and blast radius: security before vs after Descope(27:55) Company building lessons from Demisto to Descope(30:15) AI trends that matter most for enterprise products(32:40) Rapid Fire Round--------Where to find Rishi Bhargava: LinkedIn: https://www.linkedin.com/in/bhargavarishi/--------Where to find Prateek Joshi: Website: https://prateekj.com Research Column: https://www.infrastartups.comLinkedIn: https://www.linkedin.com/in/prateek-joshi-infiniteX: https://x.com/prateekj
Meghan has finally managed to get a private letter to her father after days of trying to reach him, with her team accusing the Daily Mail of making discreet contact nearly impossible. An Express columnist criticises the email approach, calling it a “box-ticking exercise” while revisiting the long-running tensions inside the Markle family. Harry and Meghan also release a statement praising Australia's ban on under-sixteens using social media, saying the move protects children but doesn't solve tech's deeper problems. The couple add a surprise new Netflix documentary to their slate, Masaka Kids, A Rhythm Within, celebrating a Ugandan dance collective they've long supported. A PR expert argues Meghan should embrace the Hollywood model more openly. Meanwhile, King Charles launches a new line of royal Christmas ornaments and attends an Advent service at Westminster Abbey, speaking of “light, hope and peace.” Princess Anne earns praise for signing her Christmas card simply as “Anne and Tim,” a modest gesture that fans call quintessentially her.Hear our new show "Crown and Controversy: Prince Andrew" here.Check out "Palace Intrigue Presents: King WIlliam" here.
23andMe (again), Washington Post, hundreds of banks (again), ASUS, multiple politicians in Canada, and a breach so bad that someone had to move to the other side of the planet(!) are all part of this week's breaches!
What happens when a HIPAA Business Associate Agreement gets tested in court after a ransomware attack? And what can we learn from it? Let's find out with your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates. "New HIPAA Security Rule" episode: https://cr-map.com/podcast/178
OpenAI, CodeRED, Dartmouth, DoorDash, 23andMe, Amazon, Walmart and so many more are part of this week's breaches!
In this episode, the host addresses a previous mistake in naming a company involved in a breach, correcting SitusAMC for Ascensus, and extends apologies. Key topics include US banks assessing a breach fallout from financial tech vendor SitusAMC, ransomware group CioP targeting Broadcom through Oracle's vulnerabilities, a new malware campaign hiding in Blender 3D models named SteelC, supply chain attacks in the JavaScript ecosystem through NPM packages with Shai-Hulud malware, and a phishing scam using lookalike domains to deceive Microsoft account holders. Listeners are reminded to manually type URLs to avoid phishing scams, and are informed about the Thanksgiving weekend schedule change. 00:00 Introduction and Apology 01:26 Cybersecurity Headlines 02:13 US Banks Data Theft Incident 03:44 Broadcom and Oracle ERP Breach 05:29 Blender Malware Campaign 07:45 Shai-Hulud NPM Package Attack 09:41 Phishing Campaign Targeting Microsoft Accounts 11:39 Final Thoughts and Thanksgiving Wishes
This episode focuses on a security incident that prompts an honest discussion about transparency, preparedness, and the importance of strong processes. Sean Martin speaks with Viktor Petersson, Founder and CEO of Screenly, who shares how his team approaches digital signage security and how a recent alert from their bug bounty program helped validate the strength of their culture and workflows.Screenly provides a secure digital signage platform used by organizations that care deeply about device integrity, uptime, and lifecycle management. Healthcare facilities, financial services, and even NASA rely on these displays, which makes the security posture supporting them a priority. Viktor outlines why security functions best when embedded into culture rather than treated as a compliance checkbox. His team actively invests in continuous testing, including a structured bug bounty program that generates a steady flow of findings.The conversation centers on a real event: a report claiming that more than a thousand user accounts appeared in a public leak repository. Instead of assuming the worst or dismissing the claim, the team mobilized within hours. They validated the dataset, built correlation tooling, analyzed how many records were legitimate, and immediately reset affected accounts. Once they ruled out a breach of their systems, they traced the issue to compromised end user devices associated with previously known credential harvesting incidents.This scenario demonstrates how a strong internal process helps guide the team through verification, containment, and communication. Viktor emphasizes that optional security features only work when customers use them, which is why Screenly is moving to passwordless authentication using magic links. Removing passwords eliminates the attack vector entirely, improving security for customers without adding friction.For listeners, this episode offers a clear look at what rapid response discipline looks like, how bug bounty reports can add meaningful value, and why passwordless authentication is becoming a practical way forward for SaaS platforms. It is a timely reminder that transparency builds trust, and security culture determines how confidently a team can navigate unexpected events.Learn more about Screenly: https://itspm.ag/screenly1oNote: This story contains promotional content. Learn more.GUESTViktor Petersson, Co-founder of Screenly | On LinkedIn: https://www.linkedin.com/in/vpetersson/RESOURCESLearn more and catch more stories from Screenly: https://www.itspmagazine.com/directory/screenlyLinkedIn Post: https://www.linkedin.com/posts/vpetersson_screenly-security-incident-response-how-activity-7393741638918971392-otkkBlog: Security Incident Response: How We Investigated a Data Leak and What We're Doing Next: https://www.screenly.io/blog/2025/11/10/security-incident-response-magic-links/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Spotlight Brand Story: https://www.studioc60.com/content-creation#spotlightKeywords: sean martin, marco ciappelli, viktor petersson, security, authentication, bugbounty, signage, incidentresponse, breaches, cybersecurity, brand story, brand marketing, marketing podcast, brand story podcast, brand spotlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Record (?) HIBP Traffic Month; The Week in Breaches; IoT Water Meter Reader with Home Assistant and AI; Sponsored by 1Password https://www.troyhunt.com/weekly-update-479/See omnystudio.com/listener for privacy information.
Several Major US Banks are all caught up this week in breaches. DON'T PANIC.
In the electric chaos of DEF CON—where dial tones, solder smoke, and hacker legends collide—one figure stands out: John Aff, aka PANDA.A veteran in the hacker community, he moves effortlessly between challenge design, telephony wizardry, mesh networking experiments, and the culture that surrounds it all.Behind the reputation is a journey that started with game hacking, shifted into enterprise security, and evolved into a life built around creativity, community, and technical obsession. It's also a story of identity—of finding a place where personal expression and professional skill finally intersected.This conversation pulls back the curtain on a mind shaped by curiosity, lived experience, and a deep love for the craft.CHAPTERS00:00 - Introduction to Barcode Podcast00:24 - Meet Panda: Cybersecurity Icon01:47 - Panda's Journey into Cybersecurity10:12 - Creating Interactive Challenges for Conferences22:11 - Badge Building: The Art and Science28:00 - Lessons from Offensive Security for Defenders30:11 - Winning the TeleChallenge: A Team Effort35:10 - Nostalgia in Gaming: The Phone Verse Experience37:30 - Understanding LoRa and Mesh Networking43:20 - Real-World Applications of MeshTastic Technology49:14 - The Intersection of Furry Culture and Cybersecurity56:54 - Community Building and Future Aspirations in TechLINKSTeleFreak – https://telefreak.org Home of the legendary TeleChallenge and a cornerstone of phreaking culture at DEF CON.DEF CON – https://defcon.org The world's largest hacker conference and the backdrop for many of Panda's stories, competitions, and breakthroughs.RedSeer Security – https://redseersecurity.com The security practice Panda supports on the defensive and strategic side.Assura, Inc. – https://assurainc.com Where Panda leads offensive security operations and continuous testing programs.MeshTastic – https://meshtastic.org Open-source long-range mesh communication project central to Panda's community work.Comms For All – https://commsforall.com Panda's initiative focused on mesh networking, LoRa radios, and community education.B-Sides Jax – https://bsidesjax.org Conference where Panda built the interactive phone-based badge challenge.HackSpaceCon – https://hackspacecon.com The first conference where you and Panda crossed paths; a major Florida hacker gathering.JLCPCB – https://jlcpcb.com PCB manufacturing service used for producing custom badge hardware.EasyEDA – https://easyeda.com Design tool Panda uses to create the multilayer art and circuitry for badges.Vectorizer.AI – https://vectorizer.ai The AI-powered tool Panda relies on to convert artwork into vector format for PCB badge design.KiCad – https://kicad.org Open-source PCB design suite used for laying out circuits and prototyping badge hardware.Adtran – https://www.adtran.com Telecom hardware vendor whose legacy gateways were used in the BSides Jax phone challenge.QueerCon – https://www.queercon.org Long-running LGBTQ+ hacker community at DEF CON that collaborated with Panda on early badge projects.National Cyber Games (NCA Cyber Games) – https://nationalcybergames.org Competition platform where Panda designed MeshTastic-based CTF challenges.UNF Osprey Security – https://www.unf.edu University of North Florida's student security group that runs CTFs and collaborated locally with Panda.HackRedCon – https://hackredcon.com Security conference where Panda volunteers and participates in community events.Jax2600 – https://2600.com Local chapter of the classic 2600 hacker community, part of Panda's long-term involvement in grassroots infosec groups.Backdoors & Breaches – https://blackhillsinfosec.com/projects/backdoors-breaches Incident response card game Panda used for blue team development and tabletop exercises.
In this episode, James Maude sits down with Chris Neuwirth, VP of Cyber Risk at Networks Group, whose path into cybersecurity might be the most unconventional you'll ever hear—from delivering babies as a teenage EMT to penetration testing critical infrastructure today. Chris's journey includes serving as an LAPD officer at Venice Beach, responding to 9/11 at the Pentagon, managing IT during Hurricane Sandy, and running operations as assistant commissioner at New Jersey's Department of Health during COVID-19. Along the way, he's been hacking everything he could get his hands on—from war driving through Manhattan in the early 2000s to conducting sophisticated penetration tests at hospitals and airports today. Chris discusses the importance of organizations being prepared and shares the uncomfortable truth: sometimes the easiest way past your defenses is just showing up and plugging in.
Joseph Avanzato is the Security Operations and Forensics Group Leader at Varonis. In this episode, he joins host Paul John Spaulding to discuss the common tactics attackers exploit and mistakes made by enterprises that lead breaches, as well as how Varonis is uniquely positioned to help public and private customers around the world investigate, contain, and evict attackers from their network. This episode is brought to you by Varonis, whose AI-powered data security platform secures your data at scale – across IaaS, SaaS, and hybrid cloud environments. To learn more about our sponsor, visit https://www.Varonis.com.
Hyundai, Kia, Genesis Logitech, Princeton, The Washington Post, DoorDash and so much more is part of this week's breaches!
When a young engineer uncovered a sizeable click fraud situation at Google, he discovered a bigger problem; namely, the perverse ingenuity that drives online fraud and scams. "Big Breaches" author Neil Daswani joined us to talk click farms, data breaches, AI exploits, and the big picture of cybercrime today. Learn more about your ad choices. Visit megaphone.fm/adchoices
PREVIEW. Hezbollah Rises Again: Unfinished Business and Ceasefire Breaches in Lebanon. Edmund Fitton-Brown described Hezbollah as a "punched out fighter on the mat getting up slowly," rearming to a new scale of threat. There is definitely "unfinished business in Lebanon." Hezbollah intends to break the ceasefire, which is monitored by the United States and Israel. The Lebanese state has shown reluctance to disarm Hezbollah, which the ceasefire requires. 1899 BEIRUT
NATO allies confer after Russian incursions, Brad Littlejohn on holding Apple accountable, and Collin Garbarino reviews Downton Abbey: The Grand Finale. Plus, a Boy Scout saves a life, Matthew West's new song offers hope, and the Tuesday morning newsSupport The World and Everything in It today at wng.org/donateAdditional support comes from Planted Gap Year, where young adults combine Bible classes, hands-on farming, and outdoor adventure. More at plantedgapyear.orgFrom PrayMore, a new app for churches to share prayer requests with members and send reminders to pray. Free trial available at praymore.com/worldAnd from iWitness. Powerful audio dramas bringing faith, courage, and history to life in unforgettable ways. iwitnesspod.com