Podcasts about cisa

  • 838PODCASTS
  • 3,968EPISODES
  • 39mAVG DURATION
  • 1DAILY NEW EPISODE
  • Dec 26, 2025LATEST

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about cisa

Show all podcasts related to cisa

Latest podcast episodes about cisa

Security Conversations
Quiet Wins, Loud Failures: A Year-End Cybersecurity Reckoning

Security Conversations

Play Episode Listen Later Dec 26, 2025 199:04


(Presented by ThreatLocker (https://threatlocker.com/threebuddyproblem): Allow what you need. Block everything else by default, including ransomware and rogue code.) Three Buddy Problem - Episode 78: We close out the year with a no-budget, no-permission awards show, spotlighting the cybersecurity stories that actually mattered. Plus, a bizarre polygraph scandal at CISA, Chinese APT research dumps, ransomware pre-notification hiccups, foreign drone bans, and the growing gap between cyber theater and real operational value. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).

Cyber Briefing
December 23, 2025 - Cyber Briefing

Cyber Briefing

Play Episode Listen Later Dec 23, 2025 9:12


If you like what you hear, please subscribe, leave us a review and tell a friend!

X22 Report
Criminal Syndicate Is Being Exposed In Each State, [DS] Countered Again, Think Emissaries – Ep. 3802

X22 Report

Play Episode Listen Later Dec 22, 2025 84:01


Watch The X22 Report On Video No videos found (function(w,d,s,i){w.ldAdInit=w.ldAdInit||[];w.ldAdInit.push({slot:17532056201798502,size:[0, 0],id:"ld-9437-3289"});if(!d.getElementById(i)){var j=d.createElement(s),p=d.getElementsByTagName(s)[0];j.async=true;j.src="https://cdn2.decide.dev/_js/ajs.js";j.id=i;p.parentNode.insertBefore(j,p);}})(window,document,"script","ld-ajs");pt> Click On Picture To See Larger PictureThe [CB][WEF] is struggling, Trump and team has designated the offshore wind projects as a national security risk. They have been paused. The people are still struggling with the [CB] system, soon the people will get their buying power back. The [CB] will try to stop Trump’s new economic system, it will fail. The [DS] is feeling the pain every step of the way. The criminal syndicate money laundering system is being exposed is the blue states. The people are waking up to the real system that has been hidden from them. The [DS] continues to tax the people for the money laundering system. Trump is continually countering the [DS], he is using Emissaries to negotiate the peace deals. The [DS] is blind to the conversation. Economy Trump Administration Announces Change to Offshore Wind Construction  President Donald Trump's Department of the Interior is pausing offshore wind project construction due to “national security risks.” “Due to national security concerns identified by the Department of War, Interior is PAUSING leases for 5 expensive, unreliable, heavily subsidized offshore wind farms!” Interior Secretary Doug Burgum wrote on X. “ONE natural gas pipeline supplies as much energy as these 5 projects COMBINED,” Burgum added. “POTUS is bringing common sense back to energy policy & putting security FIRST!” Leases with Vineyard Wind1, Revolution Wind, CVOW, Sunrise Wind, and Empire Wind will be paused. Source: dailysignal.com https://twitter.com/elonmusk/status/2002605302932517339?s=20 Gas is About to Get Expensive . . . A gallon of gas costs about twice as much in California as it does pretty much anywhere else in the United States. The reason why, of course, is that California makes it cost about twice as much – by reducing supply and by adding costs, chiefly for “environmental” reasons. This includes a new requirement – going into effect very soon (Dec. 31) that all gas stations must either replace single-walled underground storage tanks or permanently close them – no matter whether the tanks are actually leaking and no matter how much it costs to replace them. It is estimated that about 473 gas stations in California are going to close – because the owners cannot afford the mandatory underground storage tank upgrade costs or the $5,000 per day fines for non-compliance. At the same time, the state's regulatory bureaucracy has essentially shut down supply by denying 97 percent of permits for new refineries to supply the extra-special (and extra-expensive) gasoline formulations that all gas stations in California are required to sell. If this hypothetical scenario ends up becoming the actual scenario it could result in the collapse of California as a state. Source:  ericpetersautos.com  https://twitter.com/KobeissiLetter/status/2003104230945464505?s=20  As a % of total employment, multiple jobholders rose to 5.8%, nearly matching the 2 previous highs seen over the last 25 years. At the same time, Americans working primary full-time and secondary part-time jobs jumped to 5.3 million, the 2nd-highest in history. As a % of employment, this metric now stands at 3.4%, the 2nd-highest since 2000. The cost of living crisis is real.   (function(w,d,s,i){w.ldAdInit=w.ldAdInit||[];w.ldAdInit.push({slot:18510697282300316,size:[0, 0],id:"ld-8599-9832"});if(!d.getElementById(i)){var j=d.createElement(s),p=d.getElementsByTagName(s)[0];j.async=true;j.src="https://cdn2.decide.dev/_js/ajs.js";j.id=i;p.parentNode.insertBefore(j,p);}})(window,document,"script","ld-ajs"); https://twitter.com/KobeissiLetter/status/2003109247232655382?s=20 Political/Rights Teary-Eyed Bus Driver Speaks Out After Getting FIRED for Posting a ‘Racially Insensitive' Sign on School Bus Window In Response to Unruly Spanish-Speaking Kid – DOJ to Launch Investigation (VIDEO) An elderly bus driver terminated earlier this year for posting a so-called ‘racially insensitive' sign toward a Spanish-speaking kid has broken her silence and the DOJ is launching an investigation. The note on the window read, “Out of respect to English-only students, there will be no speaking Spanish on this bus.” Crawford, who had served the school district as a bus driver for more than 30 years, was promptly suspended and later lost her job posting the note.  https://twitter.com/_johnnymaga/status/2002937980013650119?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E2002937980013650119%7Ctwgr%5E9387ff3c86f279c9837393510bf08034917fc6bd%7Ctwcon%5Es1_c10&ref_url=https%3A%2F%2Fwww.thegatewaypundit.com%2F2025%2F12%2Fteary-eyed-bus-driver-speaks-after-getting-fired%2F https://twitter.com/AAGDhillon/status/2002952621032677759?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E2002952621032677759%7Ctwgr%5E9387ff3c86f279c9837393510bf08034917fc6bd%7Ctwcon%5Es1_c10&ref_url=https%3A%2F%2Fwww.thegatewaypundit.com%2F2025%2F12%2Fteary-eyed-bus-driver-speaks-after-getting-fired%2F Source: thegatewaypundit.com https://twitter.com/EndWokeness/status/2002782448191693130?s=20 https://twitter.com/C_3C_3/status/2002906389560414648?s=20 SEATTLE https://twitter.com/KeenanPeachy/status/2002902633439445012?s=20 https://twitter.com/PressSec/status/2003099681778499980?s=20 https://twitter.com/FBIDirectorKash/status/2002822669507379549?s=20   This is part of a year long effort FBI has undertaken with state and local law enforcement all across the country to crack down on child abusers and take them off the street. That work has seen historic results. -6,000 children located or reduced – up 22% from 2024 -Nearly 2,000 child predators arrested – up 10% -300+ human traffickers arrested – up 15% Lives being saved. We're not letting up. DOGE Geopolitical https://twitter.com/elonmusk/status/2002602838149697684?s=20 https://twitter.com/AlboMP/status/2002974532475490578?s=20 https://twitter.com/visegrad24/status/2003101218076545039?s=20 Cyberattack disrupts France’s postal service, banking during Christmas rush A suspected cyberattack has knocked France's national postal service and its banking arm offline during the busy Christmas season The postal service, called La Poste, said in a statement that a distributed denial of service incident, or DDoS, “rendered its online services inaccessible.” It said the incident had no impact on customer data, but disrupted package and mail delivery. There was no immediate claim of responsibility.   France and other European allies of Ukraine allege that Russia is waging “hybrid warfare” against them, using sabotage, assassinations, cyberattacks, disinformation and other hostile acts that are often hard to quickly trace back to Moscow. Source:  tribdem.com  War/Peace Kushner and Witkoff Reportedly Draft $112B Plan to Turn Gaza Into ‘Smart City' With Beach Resorts, High-Speed Rail, and AI Grids — U.S. Pushes Back on Claims It Would Foot $60B    Project Sunrise,” envisions a decade-long, $112.1 billion redevelopment effort featuring beachside luxury resorts, high-speed rail, and AI-optimized infrastructure. The draft proposal was developed by a team led by Jared Kushner, President Trump's son-in-law, and U.S. special envoy Steve Witkoff, along with senior White House aide Josh Gruenbaum and other administration officials. The plan is being presented to prospective donor governments via a 32-slide PowerPoint labeled “sensitive but unclassified,” U.S. officials told the Journal. According to the presentation, Project Sunrise would convert Gaza's devastated landscape into a modern coastal metropolis. New Rafah (Credit: Wall Street Journal) Smart City (Credit: Wall Street Journal) However, the proposal does not specify which governments or private entities would ultimately finance the project, nor does it detail where Gaza's roughly two million displaced residents would live during reconstruction, according to WSJ. The draft estimates total costs at $112.1 billion over 10 years, including humanitarian relief, infrastructure rebuilding, and public-sector payrolls. https://twitter.com/StateDept_NEA/status/2002545412729942278?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E2002545412729942278%7Ctwgr%5Ef3310cb42b34b4ad502fd5957962a1d8fbe38397%7Ctwcon%5Es1_c10&ref_url=https%3A%2F%2Fwww.thegatewaypundit.com%2F2025%2F12%2Fkushner-witkoff-reportedly-draft-112b-plan-turn-gaza%2F The proposal also assumes that Gaza could begin to self-fund portions of the development in later years, eventually paying down debt as economic activity expands. Source: thegatewaypundit.com https://twitter.com/disclosetv/status/2003088356876677484?s=20 Macron Seeks New Talks With Putin, Forcing ‘Alternative’ Path To Stalled US Negotiations Suddenly French President Emmanuel Macron is deciding to revive his diplomacy with Moscow and is     Macron wants to step in to force France’s say in any future outcome or settlement, rather than wait on the diplomatic sidelines. Arming Kiev to the teeth has done nothing but prolong the needless killing, and perhaps at least some European capitals are beginning to realize this. Source: zerohedge.com https://twitter.com/BRICSinfo/status/2003114957060137421?s=20   to be killed in a bombing this year.” Russian General Killed By Car Bomb In Moscow, Marks 3rd Top Officer Assassinated In A Year This adds to a growing list of high profile assassinations related to the Ukraine war. To review: —Darya Dugina was killed in a car bombing in 2022 which was likely meant for her father, prominent political thinker and often dubbed “Putin ally” Aleksandr Dugin. —Gen Igor Kirillov died in December 2024 outside of his residence when a bomb planted in a nearby scooter detonated. —Gen Yaroslav Moskalik, who served as deputy head of the Main Operations Directorate of the General Staff of the Russian Armed Forces, was killed in a car bomb attack last April. A “homemade” explosive device detonated under his Volkswagen Golf in a residential neighborhood. Throughout the course of the war there’s been a string of these high profile assassinations on Russian soil involving car and even cafe bombs. America’s CIA or Britain’s MI6 has long been suspected of being involved in these targeted killings, or at least assisting in such brazen Ukrainian-linked operations, but ultimately little has been uncovered or proven in terms of a potential Western hidden hand in this ongoing ‘dirty war’. Source: zerohedge.com https://twitter.com/LeadingReport/status/2002809124674035943?s=20  Medical/False Flags [DS] Agenda DOJ Charges California Food Stamp Official for Sending Benefits to Dead People – Then Spending Them Federal prosecutors have charged a longtime California welfare worker with carrying out a multi-year fraud scheme involving food assistance benefits and dead people. The U.S. Department of Justice announced the arrest of former Madera County benefits eligibility worker Leticia Mariscal, 55, of Madera. Prosecutors alleged that Mariscal stole tens of thousands of dollars in CalFresh benefits by exploiting her access to county databases. CalFresh is California's version of the Supplemental Nutrition Assistance Program. According to the Justice Department, the alleged scheme took place between December 2020 and April 2025. https://twitter.com/FBISacramento/status/1999625371268886611?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1999625371268886611%7Ctwgr%5Ee26f93739a10984d47aeb35b0088270daeb01aef%7Ctwcon%5Es1_c10&ref_url=https%3A%2F%2Fwww.thegatewaypundit.com%2F2025%2F12%2Fdoj-charges-california-food-stamp-official-sending-benefits%2F Source: thegatewaypundit.com https://twitter.com/KevinKileyCA/status/2002791344566411594?s=20   “high-risk.” This means they exhibit serious “waste, fraud, abuse, or mismanagement,” costing taxpayers billions. The number has doubled during Newsom’s tenure. I bet you California fraud is 10 times worse than Minnesota. https://twitter.com/EricLDaugh/status/2002457150904238280?s=20   taxpayer dollars, per NYP. A HUD audit found that at least 221 deceased people received grants. MORE FRAUD! Expose it all! (VIDEO) Thomas Massie and Ro Khanna Announce Plans to Bring Inherent Contempt Charges Against Attorney General Pam Bondi Over Epstein Files – “We're Building a Bipartisan Coalition”  Reps. Thomas Massie (R-KY) and Ro Khanna (D-CA), the authors of the Epstein Files Transparency Act, signed into law by President Trump last month, announced their intention to bring charges for inherent contempt against Attorney General Pam Bondi.  Under the rarely used congressional power, “the House or Senate has its Sergeant-At-Arms, or deputy, take a person into custody for proceedings to be held in Congress,” according to the National Constitution Center. However, it is unclear how effective this would be in the face of legal challenges and the executive branch's power. This is the latest in an escalating saga of threats, with Massie and Khanna claiming the DOJ has not complied fully with the law due to redactions in the files and not releasing every document available. Deputy Attorney General Todd Blanche appeared on NBC's Meet the Press this morning, where he dared Massie and Khanna to “bring it on,” maintaining that the DOJ is simply following the law and taking the necessary time to make redactions before releasing all of the files. Blanche told NBC's Kristen Welker that ensuring victim information is redacted “very much Trumps some deadline in the statute,” and he dared Khanna and Massie to file Articles of Impeachment. “We are complying with the statute, we will continue to comply with the statute, and if by complying with the statute, we don't produce everything on Friday, we produce things next week, and the week after, that's still compliance with the statute,” Blanche added. Source: thegatewaypundit.com Trump is ‘bored, tired and running on fumes’ — and he’s given up the fight: analyst A year into his second term, Donald Trump has undergone a major change in “tactics” as he deflects questions about his policies — and it’s an indication that he is now “just running on fumes,” an analyst wrote Monday. Salon's Amanda Marcotte pointed out that the president has developed an over-reliance on deflecting questions while claiming he is not up to speed on the topic or person he is being asked about, and that often begins with, “I don't know…” That is a change from his previous deflections, where he promised everything would sort itself out in “two weeks.”  Source: rawstory.com President Trump's Plan https://twitter.com/amuse/status/2002836773236306381?s=20   polygraph which they claim he failed to justify keeping their activities secret from Trump’s team. Scott isn’t blocking Plankey because he’s unqualified, he’s blocking him until Trump restores a Coast Guard shipbuilding contract for one of his major political donors Brian D'Isernia – he’s the CEO of Eastern Shipbuilding Group. Scott's hold has blocked Plankey from being included in the bipartisan nominations package the Senate GOP leadership is advancing before year-end. Because the Senate is winding down for the session, that procedural blockage likely means Plankey's nomination will expire unless resubmitted in the next Congress. Career staff at CISA repeatedly denied Acting Director Madhu Gottumukkala access to intelligence programs and urged him not to ask questions. After arranging an illegal polygraph, they used a claimed failure to freeze him out and leak to reporters. DHS acting security chief Michael Boyajian suspended at least six officials for misleading leadership and blocking classified access needed to run the agency. Trump to replace nearly 30 career diplomats in ambassadorial positions with ‘America First' allies The U.S. chiefs of mission in at least 29 countries were informed last week that their tenures would end in January 2026; all of them had taken up their posts in the Biden administration The Trump administration is recalling nearly 30 career diplomats from ambassadorial and other senior embassy posts as it moves to reshape the U.S. diplomatic posture abroad with personnel deemed fully supportive of President Donald Trump's “America First” priorities. All of them had taken up their posts in the Joe Biden administration but had survived an initial purge in the early months of Mr. Trump's second term that targeted mainly political appointees. That changed on Wednesday (December 17, 2025) when they began to receive notices from officials in Washington about their imminent departures.  How Trump shifted America's policy in a week Ambassadors serve at the pleasure of the President, although they typically remain at their posts for three to four years. Those affected by the shake-up are not losing their foreign service jobs but will be returning to Washington for other assignments should they wish to take them, the officials said. Africa is the continent most affected by the removals, with ambassadors from 13 countries being removed: Burundi, Cameroon, Cape Verde, Gabon, Ivory Coast, Madagascar, Mauritius, Niger, Nigeria, Rwanda, Senegal, Somalia and Uganda. Second is Asia, with ambassadorial changes coming to six countries: Fiji, Laos, the Marshall Islands, Papua New Guinea, the Philippines and Vietnam affected. Four countries in Europe (Armenia, Macedonia, Montenegro and Slovakia) are affected; as are two each in the Middle East (Algeria and Egypt); South and Central Asia (Nepal and Sri Lanka); and the Western Hemisphere (Guatemala and Suriname). Source: thehindu.com  Denmark Furious After Trump Names Special Envoy To Greenland Following Landry’s appointment, Rasmussen told Reuters in an emailed statement, “The appointment confirms the continued American interest in Greenland. However, we insist that everyone—including the U.S.—must show respect for the territorial integrity of the Kingdom of Denmark.” This prompted Denmark to summon the U.S. ambassador. Danish officials also summoned the U.S. ambassador in August after a report that at least three people with connections to Trump carried out covert influence operations in Greenland. Source: zerohedge.com Deep State Apoplectic with Trump's Use of Emissaries to Deliver Results President Trump is ducking and weaving through some of the deepest Machiavellian constructs, while maintaining forward progress. To put context to it, these creeps have had four years to strategize how to control Trump and manipulate policy with their retention of all sorts of government agencies in alignment with the status quo.  Yet, remarkably President Trump is dancing through their deep state minefield while keeping dozens of plates spinning on sticks.  The use of non-traditional emissaries is really making them angry.  , the use of emissaries outside the govt framework of traditional policy was going to be a key facet in any America-First agenda. The Deep State does not like President Trump's use of emissaries to conduct foreign policy.  In fact, they oppose it strongly; they hate it. The “emissary” is the person who carries the word of President Trump to any person identified by President Trump.  The emissary is very much like a tape recording of President Trump in human form.  The emissary travels to a location, meets a particular person or group, and then recites the opinion of the President.  The words spoken by the emissary, are the words of President Trump. The IC cannot inject themselves into this dynamic; that is why it is so valuable. The emissary then hears the response from the intended person or group, repeats it back to them to ensure he/she will return with clarity of intent as expressed, and then returns to the office of the presidency and repeats the reply for the President.  The emissary recites back exactly what he was /is told. This process is critical when you understand how thoroughly compromised the full Executive Branch is.  More importantly, this process becomes even more critical when you accept the Intelligence Community will lie to the office of the President to retain their power and position. (read more) Source: theconservativetreehouse.com https://twitter.com/TheStormRedux/status/2002736237996646560?s=20   signature on the absentee ballot he didn't even ask for. It was clearly forged. @GaSecofState please explain how this is a “clerical error.” https://twitter.com/CynicalPublius/status/2002795573490143432?s=20   3. The Congress of the United States shall determine the type and nature of documents that qualify as valid proof of citizenship for purposes of voting in federal elections. 4. Any federal, state or local official who knowingly allows any person to vote in federal elections without such proof of citizenship being validly presented shall be subject to such criminal penalties as the Congress of the United States may prescribe. 5. In the event of any conflict between this Amendment and Article 1, Section 4, the terms of this Amendment shall control. (function(w,d,s,i){w.ldAdInit=w.ldAdInit||[];w.ldAdInit.push({slot:13499335648425062,size:[0, 0],id:"ld-7164-1323"});if(!d.getElementById(i)){var j=d.createElement(s),p=d.getElementsByTagName(s)[0];j.async=true;j.src="//cdn2.customads.co/_js/ajs.js";j.id=i;p.parentNode.insertBefore(j,p);}})(window,document,"script","ld-ajs");

The CyberWire
Everything old is new again.

The CyberWire

Play Episode Listen Later Dec 22, 2025 31:40


NATO suspects Russia is developing a new anti-satellite weapon to disrupt the Starlink network. A failed polygraph sparks a DHS probe and deepens turmoil at CISA. A look back at Trump's cyber policy shifts. MacSync Stealer adopts a stealthy new delivery method.  Researchers warn a popular open-source server monitoring tool is being abused. Cyber criminals are increasingly bypassing technical defenses by recruiting insiders. Scripted Sparrow sends millions of BEC emails each month. Federal prosecutors take down a global fake ID marketplace. Monday business brief. Our guest is Eric Woodruff, Chief Identity Architect at Semperis, discussing "NoAuth Abuse Alert: Full Account Takeover." Atomic precision meets Colorado weather. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today on our Industry Voices, we are joined by Eric Woodruff, Chief Identity Architect at Semperis, discussing "NoAuth Abuse Alert: Full Account Takeover." Tune into the full conversation here. Selected Reading Starlink in the crosshairs: How Russia could attack Elon Musk's conquering of space (AP News) Project West Ford (Wikipedia) Acting CISA director failed a polygraph. Career staff are now under investigation (POLITICO) Dismantling Defenses: Trump 2.0 Cyber Year in Review (Krebs on Security) MacSync macOS Malware Distributed via Signed Swift Application (SecurityWeek) From ClickFix to code signed: the quiet shift of MacSync Stealer malware (Jamf)  Hackers Abuse Popular Monitoring Tool Nezha as a Stealth Trojan (Hackread) Cyber Criminals Are Recruiting Insiders in Banks, Telecoms, and Tech (Check Point) Scripted Sparrow Sends Millions of BEC Emails Each Month (Infosecurity Magazine) FBI Seizes Fake ID Template Domains Operating from Bangladesh (Hackread) Adaptive Security raises $81 million in a Series B round led by Bain Capital Ventures. (N2K Pro) NIST tried to pull the pin on NTP servers after blackout caused atomic clock drift (The Register) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
Where encryption meets executive muscle.

The CyberWire

Play Episode Listen Later Dec 19, 2025 27:37


Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure.  LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Amazon blocks more than 1,800 North Korean operatives from joining its workforce. CISA releases nine new Industrial Control Systems advisories. The U.S. Sentencing Commission seeks public input on deepfakes. Prosecutors indict 54 in a large-scale ATM jackpotting conspiracy. Our guest is Nitay Milner, CEO of Orion Security, discussing the issue with data leaking into AI tools, and how CISOs must prioritize DLP. Riot Games finds cheaters hiding in the BIOS. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Nitay Milner, CEO of Orion Security, discusses the issue with data leaking into AI tools, and how CISOs must prioritize DLP. Selected Reading Trump signs defense bill allocating millions for Cyber Command, mandating Pentagon phone security (The Record) Denmark blames Russia for destructive cyberattack on water utility (Bleeping Computer) New China-linked hacker group spies on governments in Southeast Asia, Japan (The Record) 'Kimwolf' Android Botnet Ensnares 1.8 Million Devices (SecurityWeek) New critical WatchGuard Firebox firewall flaw exploited in attacks (Bleeping Computer) Amazon blocked 1,800 suspected DPRK job applicants (The Register) CISA Releases Nine Industrial Control Systems Advisories (CISA.gov) U.S. Sentencing Commission seeks input on criminal penalties for deepfakes (CyberScoop) US Charges 54 in Massive ATM Jackpotting Conspiracy (Infosecurity Magazine) Riot Games found a motherboard security flaw that helps PC cheaters (The Verge) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Risky Business
Risky Business #819 -- Venezuela (credibly?!) blames USA for wiper attack

Risky Business

Play Episode Listen Later Dec 17, 2025 54:05


In the final show of 2025, Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: React2Shell attacks continue, surprising no one The unholy combination of OAuth consent phishing, social engineering and Azure CLI Venezuela's state oil firm gets ransomware'd, blames US… but what if it really is a US cyber op?! Russian junk-hacktivist gets indicted for cybering critical… err… a car wash and a fountain Microsoft finally turns RC4 off by default in Active Directory Kerberos Traefik's TLS verify=on … turns it off, whoopsie

Blue Security
Microsoft Bug Bounty, CISA hiring surge, US goes offensive in cyber ops, OWASP Top 10

Blue Security

Play Episode Listen Later Dec 16, 2025 42:22


SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant updates in cybersecurity, including Microsoft's overhaul of its bug bounty program, CISA's hiring strategy amidst workforce challenges, the US's shift towards a more aggressive cyber strategy, and insights from the updated OWASP Top 10 vulnerabilities. The conversation emphasizes the importance of security research, the evolving landscape of cybersecurity threats, and the need for organizations to prioritize basic security practices.----------------------------------------------------YouTube Video Link: https://youtu.be/dgAjUunyiKE----------------------------------------------------Documentation:https://www.theregister.com/2025/12/12/microsoft_more_bug_payouts/https://www.cybersecuritydive.com/news/cisa-hiring-workforce-strategy/805733/https://www.darkreading.com/cyber-risk/us-makes-cyber-strategy-changeshttps://owasp.org/Top10/2025/0x00_2025-Introduction/----------------------------------------------------Contact Us:Website: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/company/bluesecpodYouTube: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/andyjaw/Email: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠andy@bluesecuritypod.com⁠----------------------------------------------------Adam BrewerTwitter: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/ajbrewerLinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/adamjbrewer/Email: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠adam@bluesecuritypod.com

Federal Drive with Tom Temin
The Federal Drive with Terry Gerton - - Tuesday, December 16, 2025

Federal Drive with Tom Temin

Play Episode Listen Later Dec 16, 2025 50:15


Today on the Federal Drive with Terry Gerton Emily Murphy is here with her insights on how federal acquisition changed in 2025 and what's likely to be coming in 2026 There are some hopeful signs of stability for the federal work force as retirement backlogs are easing, RIF protections are holding, and a modest 2026 payraise looks likely From NASA to CISA, she's shaped the federal workforce for three decades, and now Elizabeth Kolmstetter is joining the ranks of NAPA FellowsSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

nasa cisa rif federal drive
Federal Drive with Tom Temin
From NASA to CISA, she's shaped the federal workforce for three decades

Federal Drive with Tom Temin

Play Episode Listen Later Dec 16, 2025 11:53


Elizabeth Kolmstetter has led talent strategy across nine agencies, launched programs in engagement and analytics, and earned some of government's highest honors. Now she's joining the ranks of Fellows of the National Academy of Public Administration. She joins me today to reflect on her career and the future of public administration.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

OMAG All Access
Cybersecurity For Municipalities - Expert Insights From CISA (ft Mark Kirby)

OMAG All Access

Play Episode Listen Later Dec 16, 2025 40:33


Cybersecurity threats are growing - and municipalities across Oklahoma are not immune. In this episode of OMAG All Access, host Matt Jacobson sits down with Mark Kirby, CISA's Cybersecurity Advisor for Oklahoma and Arkansas, to talk about real-world risks facing cities and towns, from phishing scams to ransomware attacks.Mark shares practical, no-cost resources available through CISA, offers guidance on how to improve cybersecurity with limited budgets, and explains why regular training and layered defenses matter more than ever. If you serve in local government and want to better protect your community's digital infrastructure, this episode is for you.Contact informaiton for CISA staff:Mark Kirby, CISSP, PMP & A|CISOSupervisor Cybersecurity Advisor (Arkansas & Oklahoma)Cybersecurity and Infrastructure Security AgencyIntegrated Operations Division / Region 6 Office: 501-519-2680E-Mail: mark.kirby@cisa.dhs.govCalvin HarleyCybersecurity State Coordinator (Oklahoma)Cybersecurity and Infrastructure Security AgencyIntegrated Operations Division / Region 6Office: 405-568-5843Email: calvin.harley@cisa.dhs.gov

The Gate 15 Podcast Channel
The Gate 15 Interview EP 65: Year-end ISAC Extravaganza!

The Gate 15 Podcast Channel

Play Episode Listen Later Dec 15, 2025 56:01


In this episode of The Gate 15 Interview, Andy Jabbour speaks with leaders from the Information Sharing and Analysis Center (ISAC) community on the Cybersecurity Information Sharing Act, the government shutdown, the role and future of ISACs and what to look forward to in 2026. Experts include:Errol Weiss, CSO, Health-ISACAdam Gruszcynski, IT Director at Potawatomi Casino Hotel & Tribal-ISAC Steering Committee MemberKimberly Denbow, Vice President, Security and Operations, AGA & Executive Director, DNG-ISACChris Anderson, Principal Advisor, National Security and Emergency Preparedness at LumenIn the discussion the panel covers:The Cybersecurity Information Sharing Act of 2015 (CISA 2015), it's recent and potential lapse and how it impacted cyber threat information sharing and collaboration.The recent and potentially upcoming federal government shutdown and how the ISACs operated and were impacted.From the TribalNet Cybersecurity Summit to the Natural Gas Exercise 2026 (NGX-2026), operationalizing AI, and growing critical global partnerships – the group discusses some of the many things that they're excited about heading into 2026.Plus! The team plays one question! Warren G: Regulators! And more!Selected links:Health-ISACTribal-ISACDNG-ISACCongress extends CISA 2015, but path to long-term reauthorization remains murky

The CyberWire
One rule to rule them all.

The CyberWire

Play Episode Listen Later Dec 12, 2025 28:47


A new executive order targets states' AI regulations, while the White House shifts course on an NSA deputy director pick. The UK fines LastPass over inadequate security measures. Researchers warn of active attacks against Gladinet CentreStack instances. OpenAI outlines future cybersecurity plans. MITRE ranks the top 25 vulnerabilities of 2025. CISA orders U.S. federal agencies to urgently patch a critical GeoServer vulnerability. An anti-piracy coalition shuts down one of India's most popular illegal streaming services. Our guest Mark Lance, Vice President, DFIR & Threat Intelligence, GuidePoint Security, unpacks purple team table top exercises to prepare for AI-generated attacks. Hackers set their sights on DNA. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Mark Lance, Vice President, DFIR & Threat Intelligence, GuidePoint Security, is discussing purple team table top exercises to prepare for AI-generated attacks. Selected Reading Trump Signs Executive Order to Block State AI Regulations (SecurityWeek) Announced pick for No. 2 at NSA won't get the job as another candidate surfaces (The Record) LastPass Data Breach — Insufficient Security Exposed 1.6 Million Users (Forbes) Gladinet CentreStack Flaw Exploited to Hack Organizations (SecurityWeek) OpenAI lays out its plan for major advances in AI cybersecurity features (SC Media) MITRE Releases 2025 List of Top 25 Most Dangerous Software Vulnerabilities (SecurityWeek) CISA orders feds to patch actively exploited Geoserver flaw (Bleeping Computer) MKVCinemas streaming piracy service with 142M visits shuts down (Bleeping Computer) The Unseen Threat: DNA as Malware (BankInfoSecurity) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Federal Drive with Tom Temin
CISA looks for ‘deep engagement' with innovators via new platform

Federal Drive with Tom Temin

Play Episode Listen Later Dec 12, 2025 8:47


The Cybersecurity and Infrastructure Security Agency doesn't want to leave companies hanging when they reach out with a bold new innovation or tech development. So CISA this month unveiled its “Industry Engagement Platform,” where people can sign up to communicate directly with agency officials. For more on the new platform, Federal News Network's Justin Doubleday spoke with the chief information officer at CISA, Bob Costello.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Decipher Security Podcast
More React Bugs Reaction, the Challenge of Vulnerability Management, and CI Attacks

Decipher Security Podcast

Play Episode Listen Later Dec 12, 2025 24:00


This week gave us the gift of some more React Server Components vulnerabilities  and further exploitation of the previously disclosed bugs by a variety of threat groups. There were also a long list of vulnerabilities disclosed by Microsoft, Adobe, and others, which we discuss in the context of how difficult vulnerability management is right now. Finally, we discuss CISA's warning about continued Russian targeting of US critical infrastructure.GreyNoise report: https://info.greynoise.io/hubfs/At-The-Edge/Weekly-Intelligence-Brief-120825.pdf?_ga=2.212724369.466870115.1765553789-1325891860.1765553788Support the show

The CyberWire
Weak passwords meet strong motives

The CyberWire

Play Episode Listen Later Dec 11, 2025 31:10


CISA warns that pro-Russia hacktivist groups are targeting US critical infrastructure. Google patches three new Chrome zero-day vulnerabilities. North Korean actors exploit React2Shell to deploy a new backdoor.  Researchers claim Docker Hub secret leakage is now a systemic problem. Attackers exploit an unpatched zero-day in Gogs, the self-hosted Git service. IBM patches more than 100 vulnerabilities across its product line. Storm-0249 abuses endpoint detection and response tools. The DOJ indicts a former Accenture employee for allegedly misleading federal customers about cloud security. Our guest is Kavitha Mariappan, Chief Transformation Officer at Rubrik, talking about understanding & building resilience against identity-driven threats. A malware tutor gets schooled by the law. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On today's Industry Voices segment, we are joined by Kavitha Mariappan, Chief Transformation Officer at Knowledge Partner Rubrik, talking about understanding and building resilience against identity-driven threats. Tune into Kavitha's full conversation here.  New Rubrik Research Finds Identity Resilience is Imperative as AI Wave Floods the Workplace with AI Agents (Press release) The Identity Crisis: Understanding and Building Resilience Against Identity-Driven Threats (Report)  Agentic AI and Identity Sprawl (Data Security Decoded podcast episode) Host Caleb Tolin and guest ⁠Joe Hladik⁠, Head of Rubrik Zero Labs, to unpack the findings from their the report Kavitha addresses.  Resources: Rubrik's Data Security Decoded podcast airs semi-monthly on the N2K CyberWire network with host Caleb Tolin. You can catch new episodes twice a month on Tuesdays on your favorite podcast app. Selected Reading CISA: Pro-Russia Hacktivists Target US Critical Infrastructure New cybersecurity guidance paves the way for AI in critical infrastructure | CyberScoop Google Releases Critical Chrome Security Update to Address Zero-Days - Infosecurity Magazine North Korea-linked ‘EtherRAT' backdoor used in React2Shell attacks | SC Media Thousands of Exposed Secrets Found on Docker Hub - Flare Hackers exploit unpatched Gogs zero-day to breach 700 servers IBM Patches Over 100 Vulnerabilities - SecurityWeek Ransomware IAB abuses EDR for stealthy malware execution US charges former Accenture employee with misleading feds on cloud platform's security - Nextgov/FCW Man gets jail for filming malware tutorials for syndicate; 129 Singapore victims lost S$3.2m - CNA Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Business of Tech
AI for MSPs: Navigating Adoption Challenges and Governance in 2025

Business of Tech

Play Episode Listen Later Dec 11, 2025 15:15


Microsoft's analysis of 37.5 million de-identified conversations from its CoPilot feature indicates that AI assistants are becoming increasingly integrated into daily life, with users frequently seeking health-related advice and engaging in programming discussions during weekdays. However, despite this growing reliance on AI, CoPilot only commands about 3% of the AI chatbot market, significantly overshadowed by ChatGPT's 80% share. Deloitte's recent report highlights persistent barriers to AI adoption, including data privacy concerns and regulatory challenges, revealing that only 25% of organizations have fully integrated AI into their operations as of late 2025.The U.S. Navy's investment of $448 million in an AI system designed to streamline submarine shipbuilding processes exemplifies successful AI implementation. This initiative, which reduces planning times from 160 hours to just 10 minutes, underscores the importance of having the right infrastructure and oversight in place for AI to thrive. The Navy's approach contrasts sharply with the broader industry, where many organizations struggle to align AI technologies with existing systems and compliance requirements.In addition to these developments, Anthropic's donation of its Model Context Protocol (MCP) to the Linux Foundation signals a shift towards standardization in AI interactions. This protocol aims to facilitate communication between AI systems and applications, potentially transforming user experiences. However, the move raises concerns about the concentration of risk associated with shared protocols, as any flaws could impact all users. Furthermore, CISA's launch of a new industry engagement platform aims to enhance collaboration with tech innovators, particularly in light of increasing mandatory cyber incident reporting.For Managed Service Providers (MSPs) and IT service leaders, these developments highlight the critical need for robust governance and infrastructure to support AI technologies. As organizations increasingly turn to AI for operational efficiency, MSPs must focus on establishing the necessary frameworks for data management, compliance, and security. The evolving landscape emphasizes the importance of being proactive in developing policies and workflows that address the complexities of AI integration, ensuring that clients can navigate the challenges and leverage AI effectively.Four things to know today00:00 AI Use Soars but Readiness Lags: Microsoft's Copilot Data, Deloitte's Enterprise Findings, and the Navy's Structured Deployment Show the Gap05:41 Anthropic's MCP Move Signals Shift Toward Unified AI Agent Infrastructure Under Linux Foundation08:01 CISA Expands Industry Engagement as Microsoft Broadens Bug Bounties — Raising the Bar for Security GovernanceAND10:48 Accenture Taps Anthropic as Enterprise AI Partner While Pax8 Adds Google Cloud for ANZ MSPsThis is the Business of Tech.   Supported by:  https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorshiphttps://timezest.com/mspradio/

Explain to Shane
CISA vs. CISA: How Cybersecurity Legislation Is Being Held Hostage by Politics (with Caitlin Clarke, Cristin Flynn Goodwin, and Jim Lewis)

Explain to Shane

Play Episode Listen Later Dec 11, 2025 55:40


One of the most important cybersecurity laws in the country quietly expired last October with no sign of reauthorization on the horizon. Instead, the conflation between the 2015 Cybersecurity Information Sharing Act and the Cybersecurity and Infrastructure Security Agency has led to a political standstill that will only have negative impacts on American cybersecurity. What implications will not reauthorizing CISA 2015 have on national security? And how much risk are we taking on by letting protections for information sharing between the private sector and the government lapse?In this episode, Shane Tews is joined by Caitlin Clarke, Cristin Flynn Goodwin, and James Andrew Lewis. In this conversation, they unpack how confusion between the 2015 information-sharing law and the Cybersecurity and Infrastructure Security Agency (CISA) makes Americans vulnerable to foreign cyberattacks, how rescinded liability and FOIA protections are already slowing down cyber defense, and why speed matters more than ever as AI accelerates malicious actors.

Risky Business
Risky Business #818 -- React2Shell is a fun one

Risky Business

Play Episode Listen Later Dec 10, 2025 58:27


In this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: There's a CVSS 10/10 remote code exec in the React javascript server. JS server? U wot mate? China is out popping shells with it Linux adds support for PCIe bus encryption Amnesty International says Intellexa can just TeamViewer into its customers' surveillance systems …and a Belgian murder suspect complains that GrapheneOS's duress wipe feature failed him? This week's episode is sponsored by Kroll Cyber. Simon Onyons is Managing Director at Kroll's Cyber and Data Resilience arm, and he discusses a problem near to many of our hearts. Just how do you explain cyber risk to the board? This episode is also available on Youtube. Show notes Risky Bulletin: APTs go after the React2Shell vulnerability within hours - Risky Business Media Guillermo Rauch on X: "React2Shell" / X React2Shell-CVE-2025-55182-original-poc/README.md at main · lachlan2k/React2Shell-CVE-2025-55182-original-poc · GitHub Hydrogen: Shopify's headless commerce framework Researchers track dozens of organizations affected by React2Shell compromises tied to China's MSS | The Record from Recorded Future News Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary Three hacking groups, two vulnerabilities and all eyes on China | The Record from Recorded Future News Risky Bulletin: Linux adds PCIe encryption to help secure cloud servers Sean Plankey nomination to lead CISA appears to be over after Thursday vote | CyberScoop

Forward Observer Dispatch
CISA: Pro-Russia Hacktivists Targeting Infrastructure

Forward Observer Dispatch

Play Episode Listen Later Dec 10, 2025 60:56


Cyber Briefing
December 10, 2025 - Cyber Briefing

Cyber Briefing

Play Episode Listen Later Dec 10, 2025 8:41


If you like what you hear, please subscribe, leave us a review and tell a friend!

What the Hack with Adam Levin
Episode 229: Why Most Cybersecurity Advice Is Wrong

What the Hack with Adam Levin

Play Episode Listen Later Dec 9, 2025 46:51


How do you stay safe online? (Wrong answers only.) Avoid public Wi-Fi, QR codes, charging stations. Cyber OG Bob Lord (Yahoo, DNC, CISA) wrote an open letter tackling the real harm caused by bad advice, and offering a better path with proven practices to stay safe online.Check out https://www.hacklore.org/letter Learn more about your ad choices. Visit megaphone.fm/adchoices

The Cybersecurity Defenders Podcast
#273 - Intel Chat: Tomiris cyber-espionage group, OpenPLC ScadaBR flaw, NPM manipulating AI-driven scanners & MuddyWater

The Cybersecurity Defenders Podcast

Play Episode Listen Later Dec 9, 2025 30:51


In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.For for more information about Cybersecurity Cares, visit cybersecurity-cares.comThe Tomiris cyber-espionage group, which has been under Kaspersky's watch since 2021, has evolved its tactics in a new wave of attacks observed in early 2025. Article #2.CISA has recently added CVE-2021-26829 to its known exploited vulnerabilities, or KEV catalog, marking it as a confirmed threat based on real world exploitation. Researchers at KOI Security have identified a malicious NPM package, which not only performs typical credential stealing behavior, but also includes a new, subtle tactic attempting to manipulate AI-driven security scanners via embedded prompt engineering. Article #2.Iranian state sponsored threat group MuddyWater has launched a new wave of cyber espionage attacks targeting Israeli organizations across sectors including academia, civil infrastructure, engineering, technology and utilities.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform.This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.

The Segment: A Zero Trust Leadership Podcast
The Monday Microsegment for the week of 12/8/2025

The Segment: A Zero Trust Leadership Podcast

Play Episode Listen Later Dec 8, 2025 7:14


The Monday Microsegment for the week of December 8th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.CISA uncovers a new Chinese backdoor in U.S. networks.A massive breach hits South Korea's largest e-commerce platform.And a record-breaking DDoS attack pounds the financial sectorAnd Gary Barlet joins us for his 2026 predictions! Head to The Zero Trust Hub: hub.illumio.comDownload The 2025 Global Cloud Detection and Response Report: https://www.illumio.com/resource-center/global-cloud-detection-and-response-report-2025 

@BEERISAC: CPS/ICS Security Podcast Playlist
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 7, 2025 59:02


Podcast: Security Weekly Podcast Network (Audio) (LS 47 · TOP 1% what is this?)Episode: Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359Pub date: 2025-12-02Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationFor OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-232 over Wi-Fi!?) to limited budgets. They talk about the different domains where OT appears and provide some examples of how the next generation of builders and breakers can start learning about this space. Segment Resources: Free Cyber OT Training (INL): https://ics-training.inl.gov/ Free Cyber Hygiene Training (CISA): https://www.cisa.gov/cyber-hygiene-services Recommendations for network hardening (CISA): https://www.cisa.gov/shields-up More OT and ICS resources: https://github.com/biero-el-corridor/OTICSressource_list   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-359The podcast and artwork embedded on this page are from Security Weekly Productions, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Risky Business News
Risky Bulletin: APTs go after the React2Shell vulnerability within hours

Risky Business News

Play Episode Listen Later Dec 7, 2025 8:18


APTs go after the React2Shell vulnerability just hours after public disclosure. CISA remains without a director after the nomination stalls again, NSA is down 2,000 staff this year, and Intellexa is still active despite sanctions. Show notes

Cyber Briefing
December 05, 2025 - Cyber Briefing

Cyber Briefing

Play Episode Listen Later Dec 5, 2025 9:41


If you like what you hear, please subscribe, leave us a review and tell a friend!

The CyberWire
Pay cuts and a personnel freefall.

The CyberWire

Play Episode Listen Later Dec 4, 2025 27:39


CISA staff may see pay cuts in 2026. Threat actors advertise a full chain zero-day exploit for iOS. A US-led international coalition releases joint guidance on integrating AI into operational technology. Microsoft lowers sales growth targets for its agentic AI products. A major fintech provider suffers a ransomware-linked breach. Arizona's Attorney General sues Temo over data collection practices. Lessons learned from Capita's handling of Black Basta. The UK sanctions Russia's GRU. My guest is Dave Baggett, co-founder and CEO of INKY (recently acquired by Kaseya), about the challenges of email security. A U.S. Bankruptcy Court insists on AI transparency. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today, Dave Bittner speaks with Dave Baggett, co-founder and CEO of INKY (recently acquired by Kaseya), about the need to update email security that was built on a 1971 design. Selected Reading US Slashes Pay Incentives at Already Weakened Cyber Agency (Bloomberg) Zero-Day Alert: Alleged iOS 26 Full Chain Exploit for Sale (Dataminr) Principles for the Secure Integration of Artificial Intelligence in Operational Technology (CISA) Microsoft drops AI sales targets in half after salespeople miss their quotas (Ars Technica) Marketing and Compliance Software Vendor to Banks Breached (Data Breach Today) Arizona attorney general sues Chinese online retailer Temu over data theft claims (AP News) What organisations can learn from the record breaking fine over Capita's ransomware incident (DoublePulsar) UK cracks down on Russian intelligence agency authorised by Putin to target Skripals (GOV.UK) General Order 210: Filings Using Generative Artificial Intelligence (Southern District of California, United States Bankruptcy Court) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Paul's Security Weekly
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359

Paul's Security Weekly

Play Episode Listen Later Dec 2, 2025 59:02


For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-232 over Wi-Fi!?) to limited budgets. They talk about the different domains where OT appears and provide some examples of how the next generation of builders and breakers can start learning about this space. Segment Resources: Free Cyber OT Training (INL): https://ics-training.inl.gov/ Free Cyber Hygiene Training (CISA): https://www.cisa.gov/cyber-hygiene-services Recommendations for network hardening (CISA): https://www.cisa.gov/shields-up More OT and ICS resources: https://github.com/biero-el-corridor/OTICSressource_list   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-359

Paul's Security Weekly TV
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359

Paul's Security Weekly TV

Play Episode Listen Later Dec 2, 2025 59:02


For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-232 over Wi-Fi!?) to limited budgets. They talk about the different domains where OT appears and provide some examples of how the next generation of builders and breakers can start learning about this space. Segment Resources: Free Cyber OT Training (INL): https://ics-training.inl.gov/ Free Cyber Hygiene Training (CISA): https://www.cisa.gov/cyber-hygiene-services Recommendations for network hardening (CISA): https://www.cisa.gov/shields-up More OT and ICS resources: https://github.com/biero-el-corridor/OTICSressource_list   Show Notes: https://securityweekly.com/asw-359

Application Security Weekly (Audio)
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359

Application Security Weekly (Audio)

Play Episode Listen Later Dec 2, 2025 59:02


For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-232 over Wi-Fi!?) to limited budgets. They talk about the different domains where OT appears and provide some examples of how the next generation of builders and breakers can start learning about this space. Segment Resources: Free Cyber OT Training (INL): https://ics-training.inl.gov/ Free Cyber Hygiene Training (CISA): https://www.cisa.gov/cyber-hygiene-services Recommendations for network hardening (CISA): https://www.cisa.gov/shields-up More OT and ICS resources: https://github.com/biero-el-corridor/OTICSressource_list   Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-359

Application Security Weekly (Video)
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359

Application Security Weekly (Video)

Play Episode Listen Later Dec 2, 2025 59:02


For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-232 over Wi-Fi!?) to limited budgets. They talk about the different domains where OT appears and provide some examples of how the next generation of builders and breakers can start learning about this space. Segment Resources: Free Cyber OT Training (INL): https://ics-training.inl.gov/ Free Cyber Hygiene Training (CISA): https://www.cisa.gov/cyber-hygiene-services Recommendations for network hardening (CISA): https://www.cisa.gov/shields-up More OT and ICS resources: https://github.com/biero-el-corridor/OTICSressource_list   Show Notes: https://securityweekly.com/asw-359

The CyberWire
From cryptomixers to recipe mixers.

The CyberWire

Play Episode Listen Later Dec 1, 2025 25:40


European authorities take down an illegal cryptomixer. An Australian man is sentenced for running an airport evil twin WiFi campaign. Researchers unmask a Scattered LAPSUS$ Hunters impresario. CISA flags a cross-site scripting flaw in OpenPLC ScadaBR. A major South Korean retailer suffers a data breach affecting over 33 million customers. Threat actors abuse digital calendar subscription features. New York's new hospital cybersecurity mandates may raise the bar nationwide. Scammers target Cyber Monday shoppers. Monday business brief. Ann Johnson speaks with Microsoft's Amy Hogan-Burney on the Afternoon Cyber Tea segment. Google gets caught reheating someone else's holiday recipe.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, ⁠Daily Briefing⁠, and you'll never miss a beat. And be sure to follow CyberWire Daily on ⁠LinkedIn⁠. Afternoon Cyber Tea segment Afternoon Cyber Tea host Ann Johnson speaks with Amy Hogan-Burney, Corporate Vice President of Customer Trust and Security at Microsoft, about how Microsoft Is redefining global cyber defense. Ann and Amy discuss Microsoft's evolving approach to combating global cybercrime and the importance of collaboration across the private and public sectors. You can listen to their full conversation here and catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app.  Selected Reading Cryptomixer crypto laundering service taken down by law enforcement (Help Net Security) Man behind in-flight Evil Twin WiFi attacks gets 7 years in prison (Bleeping Computer) Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters' (Krebs on Security) U.S. CISA adds an OpenPLC ScadaBR flaw to its Known Exploited Vulnerabilities catalog (Security Affairs) Data breach hits 'South Korea's Amazon,' potentially affecting 65% of country's population (The Record) Threat Actors Exploit Calendar Subscriptions for Phishing and Malware (Infosecurity Magazine) New York Hospital Cyber Rules to 'Raise the Bar' Nationwide (GovInfo Security) Over 2,000 Fake Shopping Sites Spotted Before Cyber Monday (Hackread) Guardio secures $80 million in new funding. (N2K Pro Business Briefing) Google deletes X post after getting caught using a ‘stolen' AI recipe infographic (Bleeping Computer) Share your feedback.What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.   Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Segment: A Zero Trust Leadership Podcast
The Monday Microsegment for the week of 12/1/2025

The Segment: A Zero Trust Leadership Podcast

Play Episode Listen Later Dec 1, 2025 6:14


The Monday Microsegment for the week of November 17th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.CISA flags new risks in both cloud and industrial systems.Congress calls Anthropic to explain AI-enabled threats.And a real-estate tech breach may spill into major U.S. banks.And John Kindervag joins us for his 2026 predictions! Head to The Zero Trust Hub: hub.illumio.comDownload The 2025 Global Cloud Detection and Response Report: https://www.illumio.com/resource-center/global-cloud-detection-and-response-report-2025 

The CyberWire
AI in the GRC: What's real, what's risky and what's next. [Special Edition]

The CyberWire

Play Episode Listen Later Nov 30, 2025 62:46


Join us for a timely and insightful live discussion on the evolving role of artificial intelligence in governance, risk, and compliance. Host Dave Bittner from N2K | CyberWire is joined by Kayne McGladrey from Hyperproof, Matthew Cassidy, PMP, CISA from Grant Thornton (US), and Alam Ali from Hyperproof to explore the current state of artificial intelligence in governance, risk, and compliance. The panel will discuss what AI is truly doing well today, the risks and challenges organizations need to watch for, and how AI is poised to influence the future of GRC. They will also share practical insights and real-world guidance for teams looking to adopt AI responsibly and effectively. Don't miss this timely conversation as our experts break down what's real, what's risky, and what's next in AI for GRC. Learn more about your ad choices. Visit megaphone.fm/adchoices

Security Conversations
Shai-Hulud 2.0, Russia GRU Intrusions, and Microsoft's Regulatory Capture

Security Conversations

Play Episode Listen Later Nov 29, 2025 117:12


(Presented by Material Security (https://material.security): We protect your company's most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.) Three Buddy Problem - Episode 74: We attempt to parse the rumor-fog around Microsoft's CISO at CYBERWARCON and what it reveals about the company's shifting posture on intel sharing, regulation, and its outsized grip on the security ecosystem. Plus, coverage of the Shai-Hulud npm supply-chain mess, CISA's mobile spyware guidance, NSO's legal contortions, a sharp new GRU-linked intrusion from Arctic Wolf. We also discuss the FCC retreating on telco security rules, and the emerging AI arms race shaping how cloud giants hunt threats and how Washington misunderstands all of it. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).

Cyber Security Headlines
CISA warns of app break-ins, StealC V2 spread through blender files, Russian entrepreneur arrested for treason

Cyber Security Headlines

Play Episode Listen Later Nov 26, 2025 7:09


CISA warns of app break-ins StealC V2 spread through blender files Russia arrests cybersecurity entrepreneur for treason Huge thanks to our episode sponsor, KnowBe4 Cybersecurity isn't just a tech problem—it's a human one.   That's why KnowBe4's Human Risk Management platform allows you to measure, quantify and actually reduce human risk across your organization.   With AI-powered risk scoring, automated coaching and reporting, HRM+ helps you surface your highest risk users and reduce the risk of data breaches and cyberattacks proactively. Ready to move from awareness to action? Request a demo of HRM+ today at knowbe4.com.

Insuring Cyber Podcast - Insurance Journal TV
How CISA Data Is Shaping Smarter Cyber Risk Decisions

Insuring Cyber Podcast - Insurance Journal TV

Play Episode Listen Later Nov 26, 2025 1:57


CISA's threat data helps companies and insurers sharpen their cyber-risk strategies by sharing real-time insights on attack patterns, emerging threats, and proactive defense tactics. Watch this sneak peek … Read More » The post How CISA Data Is Shaping Smarter Cyber Risk Decisions appeared first on Insurance Journal TV.

The CyberWire
Message in the malware.

The CyberWire

Play Episode Listen Later Nov 25, 2025 23:50


CISA warns of spyware targeting messaging apps. CodeRED, this is not a test. Infostealer campaign spreads via malicious Blender files. Shai-Hulud's second coming. Real estate finance firm SitusAMC investigates breach. Dartmouth College discloses Oracle EBS breach. Dave Bittner is joined by Tim Starks, Senior reporter from CyberScoop, to discuss the Trump administration's upcoming cyber strategy. And tis the season for deals — and digital deception. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Dave Bittner is joined by Tim Starks, Senior reporter from CyberScoop, to discuss the Trump administration's upcoming cyber strategy. Read Tim's piece on the topic “Completed draft of cyber strategy emphasizes imposing costs, industry partnership”. Selected Reading ​​Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications​ (CISA) CodeRED cyber attack leaves emergency notification system down, exposes user data (First Alert 4) Morphisec Thwarts Russian-Linked StealC V2 Campaign Targeting Blender Users via Malicious .blend Files (Morphisec) Shai-Hulud's Second Coming: NPM Malware Attack Evolved (Checkmarx) SitusAMC confirms breach of client data after cyberattack (The Register) Clop's Oracle EBS rampage reaches Dartmouth College (The Register) 2025 Retail Holiday Threat Report: Scams and Impersonation Attacks Targeting Retailers (BforeAI) The data privacy costs of Black Friday bargains: 100 Black Friday apps analyzed (Comparitech) 2025 Ransomware Holiday Risk Report (Semperis) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Cyber Security Headlines
CISA orders feds to patch OIM, Delta Dental incurs breach, Ukraine postal operator systems down

Cyber Security Headlines

Play Episode Listen Later Nov 25, 2025 7:31


CISA orders feds to patch OIM Delta Dental of Virginia incurs data breach Systems down at postal operator in Ukraine Huge thanks to our episode sponsor, KnowBe4 Cybersecurity isn't just a tech problem—it's a human one.   That's why KnowBe4's Human Risk Management platform allows you to measure, quantify and actually reduce human risk across your organization.   With AI-powered risk scoring, automated coaching and reporting, HRM+ helps you surface your highest risk users and reduce the risk of data breaches and cyberattacks proactively. Ready to move from awareness to action? Request a demo of HRM+ today at knowbe4.com.

Caveat
AI arms race meets nation-state mayhem.

Caveat

Play Episode Listen Later Nov 20, 2025 44:49


This week, Ethan Cook, N2K lead analyst and editor of the Caveat newsletter joins Dave and Ben with a rapid-fire download from Public Sector Ignite — from CISA's strategic pivot to the evolving threat landscape across China, Russia, Iran, and North Korea. He teases major takeaways on quantum risk and the ticking clock to “Q-Day,” why telecoms remain a soft underbelly, and how AI is turbocharging both defenders and attackers. While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney.  Get the weekly Caveat Briefing delivered to your inbox. Like what you heard? Be sure to check out and subscribe to our ⁠⁠⁠⁠⁠⁠⁠⁠⁠Caveat Briefing⁠⁠⁠⁠⁠⁠⁠⁠⁠, a weekly newsletter available exclusively to ⁠⁠⁠⁠⁠⁠⁠⁠⁠N2K Pro⁠⁠⁠⁠⁠⁠⁠⁠⁠ members on ⁠⁠⁠⁠⁠⁠⁠⁠⁠N2K CyberWire's⁠⁠⁠⁠⁠⁠⁠⁠⁠ website. N2K Pro members receive our Thursday wrap-up covering the latest in privacy, policy, and research news, including incidents, techniques, compliance, trends, and more. This week's ⁠⁠⁠⁠This week's ⁠⁠⁠⁠⁠Caveat Briefing⁠⁠⁠⁠⁠ covers Europe's unexpected shift toward loosening its once-aggressive tech rules, as policymakers move to simplify GDPR, delay parts of the A.I. Act, and ease data-use restrictions to boost competitiveness. The move signals a major tone change in Brussels, raising questions about whether scaling back oversight will spark innovation — or weaken one of the world's strongest digital privacy regimes. Curious about the details? Head over to the ⁠⁠⁠⁠⁠⁠⁠⁠⁠Caveat Briefing⁠⁠⁠⁠⁠⁠⁠⁠⁠ for the full scoop and additional compelling stories. Got a question you'd like us to answer on our show? You can send your audio file to ⁠⁠⁠⁠⁠⁠⁠⁠⁠caveat@thecyberwire.com⁠⁠⁠⁠⁠⁠⁠⁠⁠. Hope to hear from you. Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
The oversized file that stalled the internet.

The CyberWire

Play Episode Listen Later Nov 19, 2025 29:46


Cloudflare's outage is rooted in an internal configuration error. The Trump administration is preparing a new national cyber strategy. CISA gives federal agencies a week to secure a new Fortinet flaw. MI5 warns that China is using LinkedIn headhunters and covert operatives to target lawmakers. Experts question the national security risks of TP-Link routers. The China-aligned PlushDaemon threat group hijacks software updates. Researchers discover WhatsApp's entire global member directory accessible online without protection. LG Energy Solution confirms a ransomware attack. ShinySp1d3r makes its debut. Rotem Tsadok, Director of Security Operations and Forensics at Varonis, is sharing lessons learned from thousands of forensics investigations. A judge says Google's claims to water use secrecy are all wet.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Industry Voices segment, we are joined by Rotem Tsadok, Director of Security Operations and Forensics at Varonis, sharing lessons learned from thousands of forensics investigations. Listen to Rotem's full conversation here. Selected Reading Cloudflare blames this week's massive outage on database issues (Bleeping Computer) National cyber strategy will include focus on ‘shaping adversary behavior,' White House official says (The Record) CISA gives govt agencies 7 days to patch new Fortinet flaw (Bleeping Computer) Chinese Spies Are Using LinkedIn to Target U.K. Lawmakers, MI5 Warns (The New York Times) No evidence that TP-Link routers are a Chinese security threat (CSO Online) PlushDaemon compromises network devices for adversary-in-the-middle attacks (welivesecurity) 3.5 Billion Accounts: Complete WhatsApp Directory Retrieved and Evaluated (heise online) LG Energy Solution reports ransomware attack, hackers claim theft of 1.7 terabytes of data (beyondmachines) Meet ShinySp1d3r: New Ransomware-as-a-Service created by ShinyHunters (Bleeping Computer) Google Strives To Keep Data Center Water Use Secret After Judge Orders Records Released (Roanoke Rambler) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Risky Business
Risky Business #815 -- Anthropic's AI APT report is a big deal

Risky Business

Play Episode Listen Later Nov 19, 2025 51:24


In this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: Anthropic says a Chinese APT orchestrated attacks using its AI It's a day ending in -y, so of course there are shamefully bad Fortinet exploits in the wild Turns out slashing CISA was a bad idea, now it's time for a hiring spree Researchers brute force entire phone number space against Whatsapp contact discovery API DOJ figures out how to make SpaceX turn off scam compounds' Starlink service This week's episode is sponsored by Mastercard. Senior Vice President of Mastercard Cybersecurity Urooj Burney joins to talk about how the roles of fraud and cyber teams in the financial sector are starting to converge. Mastercard also recently acquired Recorded Future, and Urooj talks about how they aim to integrate cyber threat intelligence into the financial world. This episode is also available on Youtube. Show notes Full report: Disrupting the first reported AI-orchestrated cyber espionage campaign Researchers question Anthropic claim that AI-assisted attack was 90% autonomous - Ars Technica China's ‘autonomous' AI-powered hacking campaign still required a ton of human work | CyberScoop Amazon discovers APT exploiting Cisco and Citrix zero-days | AWS Security Blog CISA gives federal agencies one week to patch exploited Fortinet bug | The Record from Recorded Future News PSIRT | FortiGuard Labs CISA, eyeing China, plans hiring spree to rebuild its depleted ranks | Cybersecurity Dive This Is the Platform Google Claims Is Behind a 'Staggering' Scam Text Operation | WIRED A Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone Numbers | WIRED DOJ Issued Seizure Warrant to Starlink Over Satellite Internet Systems Used at Scam Compound | WIRED Multiple US citizens plead guilty to helping North Korean IT workers earn $2 million | The Record from Recorded Future News Cyberattack leaves Jaguar Land Rover short of £680 million | The Record from Recorded Future News FBI: Akira gang has received nearly $250 million in ransoms | The Record from Recorded Future News Operation Endgame: Police reveal takedowns of three key cybercrime tools | The Record from Recorded Future News Inside a Wild Bitcoin Heist: Five-Star Hotels, Cash-Stuffed Envelopes, and Vanishing Funds | WIRED

The CyberWire
A morning without Cloudflare.

The CyberWire

Play Episode Listen Later Nov 18, 2025 34:54


Cloudflare suffers a major outage. Google issues an emergency Chrome update. Logitech discloses a data breach. CISA plans a major hiring push. The House renews the State and Local Cybersecurity Grant Program. The GAO warns military personnel are oversharing online. Tech groups urge governments worldwide to reject proposals that weaken or bypass encryption. Australian authorities blame outdated software for the death of a telecom customer. An alleged Void Blizzard hacker faces extradition to the US. Our guest is Kevin Kennedy from ManTech discussing the future battlefield and the importance of integrating non-kinetic effects. AI meets the IRS. What could possibly go wrong? Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Industry Voices segment, we are joined by ⁠Kevin Kennedy⁠ from ⁠ManTech⁠ discussing the future battlefield and the importance of integrating non-kinetic effects. You can hear Kevin's full conversation here. Selected Reading Cloudflare outage causes error messages across the internet (The Guardian) Google releases emergency Chrome update to patch actively exploited vulnerability (Beyond Machines) Logitech discloses data breach after Clop claims (The Record) CISA, eyeing China, plans hiring spree to rebuild its depleted ranks (Cybersecurity Dive) Full renewal of state and local cyber grants program passes in House (The Record) Pentagon and soldiers let too many secrets slip on socials (The Register) Dozens of groups call for governments to protect encryption (CyberScoop) Australia's TPG Telecom links customer's death to outdated Samsung phone (Reuters) Alleged Void Blizzard hacker arrested in Thailand (SC Media) Intuit signs $100M+ deal with OpenAI to bring its apps to ChatGPT (TechCrunch) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Badlands Media
Why We Vote Ep. 149: The Pardon Memo That Changes Everything

Badlands Media

Play Episode Listen Later Nov 15, 2025 94:25


CannCon and Ashe in America break down Ed Martin's explosive comprehensive pardon memo...a document they call one of the most important filings since the 2020 election. They walk through Martin's sweeping legal argument detailing years of election-law violations, unconstitutional rule changes, mass censorship, mail-in ballot failures, fraudulent registrations, chain-of-custody breaches, and the refusal of courts to hear evidence. The hosts trace how contingent electors operated within constitutional authority, how historical precedent supports their actions, and why prosecutions in Michigan, Georgia, Nevada, and Arizona are collapsing. They highlight Brad Raffensperger's revealing 2020 interview, the censorship regime driven by CISA and EIP, and the way lawfare was weaponized against attorneys, electors, whistleblowers, and everyday citizens. Packed with legal analysis, historical context, and fiery commentary, this episode lays out the full scope of election misconduct, and why accountability is finally coming into focus.

Security Conversations
Anthropic Claude Code automating APT hacks, KnownSec leak, Chinese buses with remote access

Security Conversations

Play Episode Listen Later Nov 14, 2025 132:38


Presented by Material Security: We protect your company's most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices. Three Buddy Problem - Episode 72: We unpack Anthropic's conflicting self-promotion around the “first AI-orchestrated cyberattack” using Claude Code and the future of automated APT attacks. Plus, Chinese cyber vendor KnownSec falls victim to data breach, fresh accusations that the U.S. stole billions in Bitcoin, Amazon warning about Cisco/Citrix zero-days, Google's new Private AI Compute and Microsoft kernel zero-day marked as "actively exploited." Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).

Business of Tech
U.S. Cyber Defense Weakens as CISA Faces Cuts; EU Eases GDPR for AI; UK Tightens Cybersecurity Laws

Business of Tech

Play Episode Listen Later Nov 12, 2025 15:15


The expiration of the Cybersecurity Information Sharing Act (CISA) on September 30, 2025, has resulted in a notable decline in U.S. cyber defense capabilities, with a reported drop of over 70% in the sharing of threat indicators. This lapse has created a legal and operational vacuum, leading to increased delays in alert dissemination and a rise in cyber threats, particularly in critical sectors such as healthcare and energy. Federal agencies and private companies are now hesitant to report incidents without the liability protections that CISA previously provided, resulting in a fragmented response to cyber threats.In response to the growing concerns over cybersecurity, the U.S. Congress has included a provision in the federal government shutdown legislation to extend CISA through the end of January 2026. This extension is crucial for facilitating the sharing of threat data between businesses and government agencies. Meanwhile, the Cybersecurity and Resilience Bill introduced in the UK mandates that medium and large IT management and cybersecurity service providers comply with minimum security standards, reflecting a shift towards greater accountability in protecting critical infrastructure.Additionally, Microsoft and 1Password are advancing passwordless technology, with Microsoft enabling the syncing of passkeys across devices and 1Password integrating a new native Passkeys plugin API for Windows 11. These developments aim to enhance user convenience and security, signaling a shift away from traditional password reliance. EasyDMARC has also launched Touchpoint, an AI-driven sales enablement tool for MSPs, while Enable has introduced a cyber warranty program offering financial protection for cyber incidents.For MSPs and IT service leaders, these developments underscore the importance of adapting to evolving cybersecurity regulations and technologies. The expiration of CISA highlights the need for private networks and MSPs to fill the intelligence gap left by government agencies. As compliance requirements tighten in the UK and the U.S., MSPs that can navigate these changes and assist clients in maintaining security and compliance will find significant opportunities in a rapidly changing landscape. Three things to know today00:00 U.S. Cyber Defense Falters as CISA Act Expires, Threat Sharing Plummets 70% Amid Budget Cuts04:35 Compliance Crossroads: New EU, UK, and U.S. Rules Reshape Data Protection and Cybersecurity for MSPs09:42 Vendors Push Simpler, Smarter Security: Microsoft Syncs Passkeys, N-able Adds Cyber Warranty, EasyDMARC Targets MSP Sales This is the Business of Tech.     Supported by:  https://getflexpoint.com/msp-radio/https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship

RAISING HER CONFIDENTLY | Parenting Teens, How to Talk to Teens,  Family Communication, Raising Teen Girls
283\\ Strategies to Keep Your Teen Safe From Online Predators with Cyber Security Expert Tom Arnold

RAISING HER CONFIDENTLY | Parenting Teens, How to Talk to Teens, Family Communication, Raising Teen Girls

Play Episode Listen Later Nov 10, 2025 46:38


Confused about when to let you teen girl have a TikTok account?  Is she old enough for an Instagram account? Are you frustrated by your teenage daughter's constant use of her phone? Today I have cybersecurity expert Tom Arnold on with some tips on keeping your teens safe from online predators and the conversations you can have with her.   Tom Arnold (CISSP, ISSMP, CISA, CFS, GCFE-Gold, GNFA, GWEB, GBFA) is a cybersecurity expert, digital forensics investigator, and educator. He lectures on digital forensics and incident response at San Jose State University and the University of Nevada, Las Vegas, where he is also helping to develop a new digital evidence and forensics degree program. A co-founder of Payment Software Company (PSC), now part of NCC Group, Arnold has led large-scale breach investigations—some involving more than 7,000 servers—and served as lead investigator in complex threat-hunting operations. He has testified before the U.S. Senate and House on cybersecurity legislation and sits on the steering committee for the Las Vegas branch of the USSS/Cyber Fraud Task Force. He also serves as Operations Manager at Cloud 10 Studios, a full-service animation studio that creates original series, long-form content, and commercial projects. His novel The Digital Detective: First Intervention was inspired by a real-life cybersecurity scare when Arnold's grandson was approached by a stranger on Roblox despite parental controls. That moment launched Arnold's mission to help families and schools recognize hidden online dangers—and to give kids the tools they need to stay safe in the digital world.   Are you looking for ways to communicate with your girl so she can start opening up to you? Do you want to understand why is it so hard to approach your girl? Are you stuck on how to approach your teenage daughter in conversation without her freaking out?   SIGN UP FOR TALK TO YOUR TEEN GIRL FRAMEWORK!!  A 6-WEEK JOURNEY TO SHIFT HOW YOU COMMUNICATE SO SHE CAN COME TO YOU!   You'll walk away with a deeper understanding the changes happening to your girl, Equipped in your new role as COACH in this teen stage, and establish better communication pathways to connect and grow closer with your daughter   Imagine if you and your daughter can finally have conversations at a level where she doesn't need to hide anything from you! Plus, you'll get to meet other mamas who are all in the same boat.... SIGN UP HERE!      You can find me here: Work with me:  www.talktyourteengirl.com Connect: hello@jeanniebaldomero.com Instagram:   https://www.instagram.com/raisingherconfidently Free mom support community: www.raisingherconfidently.com  

The CyberWire
Stomping out critical bugs.

The CyberWire

Play Episode Listen Later Nov 6, 2025 23:07


Cisco patches critical vulnerabilities in its Unified Contact Center Express (UCCX) software. CISA lays off 54 employees despite a federal court order halting workforce reductions. Gootloader malware returns. A South Korean telecom is accused of concealing a major malware breach. Russia's Sandworm launches multiple wiper attacks against Ukraine. China hands out death sentences to scam compound kingpins. My guest is Dr. Sasha O'Connell, Senior Director for Cybersecurity Programs at Aspen Digital. Meta's moral compass points to profit. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Dr. Sasha O'Connell, Senior Director for Cybersecurity Programs at Aspen Digital, joins us to preview her Caveat podcast interview about "10 Years of Cybersecurity Progress & What Comes Next." Listen to Sasha and Dave's full conversation on this week's Caveat episode.  Selected Reading Critical Cisco UCCX flaw lets attackers run commands as root (Bleeping Computer) CISA plans to fire 54 employees despite court injunction (Metacurity) CISA reports active exploitation of critical vulnerability in CentOS Web Panel (Beyond Machines) Gootloader malware is back with new tricks after 7-month break (Bleeping Computer) KT accused of concealing major malware infection, faces probe over customer data breach (The Korea Times) Sandworm hackers use data wipers to disrupt Ukraine's grain sector (Bleeping Computer) ⁠China sentences 5 Myanmar scam kingpins to death ⁠(The Record) ⁠“Hackers” rig elections to IAN executive committee⁠ (Mumbai News) Meta is earning a fortune on a deluge of fraudulent ads, documents show (Reuters) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.   Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
CISA's steady hand in a stalled senate.

The CyberWire

Play Episode Listen Later Oct 31, 2025 24:55


CISA says cooperation between federal agencies and the private sector remains steady. Long-standing Linux kernel vulnerability in active ransomware campaigns confirmed. A Chinese-linked group targets diplomatic organizations in Hungary, Belgium, and other European nations. A government contractor breach exposes data of over 10 million Americans. Luxury fashion brands fall victim to impersonation scams. Phishing shifts from email to LinkedIn. Advocacy groups urge the FTC to block Meta from using chatbot interactions to target ads. A man pleads guilty to selling zero-days to the Russians. Emily Austin, Principal Security Researcher at Censys, discusses why nation state attackers continue targeting critical infrastructure. When M&S went offline, shoppers hit ‘Next'. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Emily Austin, Principal Security Researcher at Censys, as she discusses why nation state attackers continue targeting critical infrastructure. Selected Reading Cyber info sharing ‘holding steady' despite lapse in CISA 2015, official says (The Record) CISA: High-severity Linux flaw now exploited by ransomware gangs (Bleeping Computer) CISA and NSA share tips on securing Microsoft Exchange servers (Bleeping Computer) UNC6384 Weaponizes ZDI-CAN-25373 Vulnerability to Deploy PlugX Against Hungarian and Belgian Diplomatic Entities (Arctic Wolf) More than 10 million impacted by breach of government contractor Conduent (The Record) Luxury Fashion Brands Face New Wave of Threats in Lead-up to 2025 Holiday Shopping Season (BforeAI) LinkedIn phishing targets finance execs with fake board invites (Bleeping Computer) Coalition calls on FTC to block Meta from using chatbot interactions to target ads, personalize content (The Record) Ex-L3Harris exec pleads guilty to selling zero-day exploits to Russian broker (CyberScoop) Business rival credits cyberattack on M&S for boosting profits (The Record) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
Logging off in Myawaddy.

The CyberWire

Play Episode Listen Later Oct 29, 2025 28:27


Explosions rock a shuttered Myanmar cybercrime hub. The Aisuru botnet shifts from DDoS to residential proxies. Dentsu confirms data theft at Merkle. Boston bans biometrics. Proton restores journalists' email accounts after backlash. Memento labs admits Dante spyware is theirs. Australia accuses Microsoft of improperly forcing users into AI upgrades. CISA warns of active exploitation targeting manufacturing management software. A covert cyberattack during Trump's first term disabled Venezuela's intelligence network. Our guest is Ben Seri, Co-Founder and CTO of Zafran, discussing the trend of AI native attacks. New glasses deliver fashionable paranoia. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today's guest is Ben Seri, Co-Founder and CTO of Zafran, discussing the trend of AI native attacks and how defenders should use AI to defend and remediate. Selected Reading Stragglers from Myanmar scam center raided by army cross into Thailand as buildings are blown up (AP News) Aisuru Botnet Shifts from DDoS to Residential Proxies (Krebs on Security) Advertising giant Dentsu reports data breach at subsidiary Merkle (Bleeping Computer) Boston Police Can No Longer Use Facial Recognition Software (Built in Boston) Proton Mail Suspended Journalist Accounts at Request of Cybersecurity Agency (The Intercept) CEO of spyware maker Memento Labs confirms one of its government customers was caught using its malware (TechCrunch) Australia sues Microsoft for forcing Copilot AI onto Office 365 customers (Pivot to AI) CISA warns of actively exploited flaws in Dassault DELMIA Apriso manufacturing software (Beyond Machines) CIA cyberattacks targeting the Maduro regime didn't satisfy Trump in his first term. Now the US is flexing its military might (CNN Politics) Zenni's Anti-Facial Recognition Glasses are Eyewear for Our Paranoid Age (404 Media) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices