Podcasts about cisa

  • 843PODCASTS
  • 4,012EPISODES
  • 39mAVG DURATION
  • 1DAILY NEW EPISODE
  • Feb 6, 2026LATEST

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about cisa

Show all podcasts related to cisa

Latest podcast episodes about cisa

The CyberWire
Patch or pull the plug.

The CyberWire

Play Episode Listen Later Feb 6, 2026 26:50


CISA cracks down on aging edge devices. Congress looks to sure up energy sector security. DHS facial recognition software may fall short. Romania's national oil pipeline operator suffers a cyberattack. The European Commission may fine TikTok for being addictive. DKnife is a China-linked threat actor operating a long-running adversary-in-the-middle framework. Researchers say OpenClaw is being abused at scale. Our guest is Mike Carr, Field CTO at Xona, talking about how Italy should be thinking about protecting the 2026 Winter Olympics. A BASE jumper attempts a daring AI alibi. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Mike Carr, Field CTO at Xona, talking about how Italy should be thinking about protecting the 2026 Winter Olympics. Selected Reading CISA: Remove EOL edge kit before cybercriminals strike (The Register) 5 Bills to Boost Energy Sector Cyber Defenses Clear House Panel (SecurityWeek) ICE and CBP's Face-Recognition App Can't Actually Verify Who People Are (WIRED) Romania's oil pipeline operator confirms cyberattack as hackers claim data theft (The Record)  Flickr discloses potential data breach exposing users' names, emails (Bleeping Computer) 17% of 3rd-Party Add-Ons for OpenClaw Used in Crypto Theft and macOS Malware (Hackread) EU says TikTok faces large fine over "addictive design" (Bleeping Computer) 'DKnife' Implant Used by Chinese Threat Actor for Adversary-in-the-Middle Attacks (SecurityWeek) All gas, no brakes: Time to come to AI church (Talos Intelligence)  Man who videotaped himself BASE jumping in Yosemite arrested, federal officials say. He says it was AI (LA Times) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Business of Tech
AI Fails to Deliver ROI for CEOs While Bot Traffic Surges and CISA Targets End-of-Life Devices

Business of Tech

Play Episode Listen Later Feb 6, 2026 14:37


A PwC survey of over 4,400 CEOs across 105 countries found that 56% report artificial intelligence has not delivered meaningful revenue growth or cost savings in the past year. Only one in eight organizations saw both benefits. The core issue, as highlighted by Dave Sobel, lies in poor integration—largely due to data quality challenges and legacy systems—leaving many businesses stuck in what PwC terms “experimentation purgatory.” Despite significant investment, AI infrastructure is often failing to produce measurable returns.This lack of operational discipline is mirrored by the rising incident of AI bots, which now account for 1 out of every 50 website visits, a sixfold increase from earlier reports. AI is successfully extracting value from enterprise infrastructure through sophisticated scraping, as companies pay for tools that return little and simultaneously fund infrastructure serving AI bots. The operational cost and exposure from bot traffic and ineffective AI tool adoption highlight the disconnect between hype and practical benefit.Adjacent stories expand on the governance gap and evolving expectations around risk. The U.S. and China declined to sign a non-binding declaration on military AI, underlining global regulatory fragmentation. In contrast, the Cybersecurity and Infrastructure Security Agency (CISA) issued a binding directive for federal civilian agencies to remove unsupported devices within a year, signaling substantial operational risk from end-of-life technology. These regulatory movements are expected to drive similar risk accountability into the private sector, primarily through insurance requirements.For MSPs and IT service providers, the takeaway is not to chase AI-powered offerings but to prioritize readiness, control, and cost accountability. Vendor partner programs (Cisco and 1Password) reward lifecycle management and customer retention, not AI sales. The practical competitive advantage is operational honesty—delivering realistic assessments, proactive client interactions, and transparent guidance. Automation should fund genuine client relationship activities, not replace them. The focus should remain on safeguarding operational integrity, controlling technology risk, and building customer success capability.Four things to know today:00:00 PwC Survey Finds Most Business Leaders Still Waiting for AI Payoff05:00 Federal Agencies Ordered to Eliminate End-of-Life Devices Over Cyber Threats08:06 Cisco and 1Password Launch Partner Programs Focused on Customer Success10:52 Harvard Business Review Says Human Touch Remains Critical Advantage Over AIThis is the Business of Tech.   Supported by:  Small Biz Thought Community 

The CyberWire
A softer touch on cyber.

The CyberWire

Play Episode Listen Later Feb 4, 2026 28:07


The White House preps a major overhaul of U.S. cybersecurity policy. A key Commerce security office loses staff as regulatory guardrails weaken. Lawmakers Press AT&T and Verizon after months of silence on Salt Typhoon. A vulnerability in the React Native Metro development server is under active exploitation. Amaranth Dragon leverages a WinRAR flaw. A coordinated reconnaissance campaign targets Citrix NetScaler infrastructure. CISA warns a SolarWinds Web Help Desk flaw is under active exploitation. Zach Edwards, Senior Threat Researcher at Silent Push, is discussing a hole in the kill chain leaving law enforcement empty-handed. Cops in Northern Ireland get an unwanted data breach encore.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Zach Edwards, Senior Threat Researcher at Silent Push, discussing a hole in the kill chain leaving law enforcement empty-handed. You can read more from Zach's team here. Selected Reading White House Cyber Director Charts New Course for Digital Defense Through Private Sector Partnership (Web Pro News) Another Misstep in U.S.-China Tech Security Policy (Lawfare) Cantwell claims telecoms blocked release of Salt Typhoon report (Cyberscoop) Hackers exploit critical React Native Metro bug to breach dev systems (Bleeping Computer) New Amaranth Dragon cyberespionage group exploits WinRAR flaw (Bleeping Computer) Wave of Citrix NetScaler scans use thousands of residential proxies (Bleeping Computer) Fresh SolarWinds Vulnerability Exploited in Attacks (SecurityWeek) ‘It defies belief': Names of PSNI officers published on court website in new breach (Belfast Telegraph) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Business of Tech
CISA Ransomware Intelligence Lag, Azure TLS Cutoff, and Risks from AI Skills Marketplaces

Business of Tech

Play Episode Listen Later Feb 4, 2026 14:52


The episode focuses on current security risks and limitations in industry intelligence, highlighting that CISA's Known Exploited Vulnerabilities (KEV) catalog often lags by years in tagging vulnerabilities exploited by ransomware. One cited vulnerability sat in the catalog for 1,353 days before being flagged as ransomware-exploited, illustrating a significant delay in actionable intelligence. This gap raises concerns for MSPs whose patching priorities rely on outdated catalogs, potentially leading to a misalignment between compliance activities and actual threat vectors.Supporting this, Dave Sobel underscores how evolving threat models frequently bypass traditional vulnerability management. The recent compromise of OpenClaw's skills marketplace, with a 12% malicious rate in submitted skills and basic post-facto reporting mechanisms, demonstrates that credential theft and malicious automation now present risks outside standard patch management. The core operational challenge for MSPs is not just software vulnerability but the governance of AI-enabled tools and uncontrolled marketplaces that can expose clients to breaches.Further contextualizing risk and automation, vendor launches include Lexful's AI-native documentation for MSPs and Cavelo Flash's agentless assessment tool. These offerings promise streamlined documentation and rapid risk assessment, but Dave Sobel notes their reliance on beta features, integration dependencies, and non-definitive compliance positions. Additionally, DocuSign's release of AI-generated contract summaries raises questions about liability, as inaccurate summaries can mislead signers, and responsibility defaults to the end user rather than the vendor.The primary implication for MSPs and technology leaders is the need to inventory all AI-powered tools with access to client environments, actively govern marketplace adoption, and critically evaluate automation claims. Compliance-focused patching is no longer sufficient; operational oversight must prioritize credential management and identity governance over checklist-based approaches. Caution is advised before rapid migration to beta solutions or locking into long-term contracts, as both reduce flexibility and increase exposure to emerging, non-traditional attack surfaces.Three things to know today00:00 CISA's Ransomware Tags Arrive Years Late While AI Tools Steal Credentials Now05:53 IT Glue Founder Launches AI Documentation Platform Lexful for MSPs at Right of Boom09:52 Cavelo and DocuSign Launch AI Tools That Automate Assessments and Contract ReviewsThis is the Business of Tech.   Supported by: Small Biz Thoughts Community

Computer Talk with TAB
Computer Talk 1-31-26 HR 2

Computer Talk with TAB

Play Episode Listen Later Jan 31, 2026 44:47


Frontier Fiber any good? EU is looking for “on-Prem” Data Centers vs a US Public Cloud. Open Source Excel - Libre Office, My computer upgraded itself now I need to upgrade the driver, Waymo hitting kids and other cars…., CISA defense chief “accidentally” uploaded government info into ChatGPT, Old HP Laptop updated and now my battery no longer works, How to configure OpenDNS on Win 11, iphone 11's what do I do? Iowa Sheriff costs the county $600,000.00 for defaming Red-Team hackers for doing their job.

Tore Says Show
Thu 29 Jan, 2026: Domestic Terror Cells - Medical Cover - Operational Methods - Anarchist Zines - Cover Ops - Most Banned - Mayhem Planning

Tore Says Show

Play Episode Listen Later Jan 30, 2026 211:30


The chat group story has gone crazy wild, and the reactions have been satisfying. Street protests are organized, dangerous and well planned. They are not dumb. When legitimacy shifts, power and control fail. License plate data is made accessible. They hide behind trusted roles. Never burn your persona. Hospitals collect data. They publish guides on how to occupy buildings, what's acceptable violence, and how to kill MAGA. Lots of fed employees involved. Onward and upward, is an owned slogan. Terrain dominance plans. Why didn't they do all this earlier? Good independent journalists are supported by the people. Stephen King admits the 2020 reality. Remember when Kammie bailed out the protesters? Arrest wills are what again? They even do pet sitting for those arrested. It's our tax dollars funding all this. Remember, Obama was behind CISA. A video on basic street care for injured radicals. Their presentations always obscure true intent. Role being played and good logistics. They want scrutiny. Hiding behind legit social groups. Planned immigration wars started with the Greeks. We're going to see more of this. Insane asylums to the rescue? Maybe. When the truth comes out, many people are going to lose their minds.

The CyberWire
Leaky chats collide with shifting security standards.

The CyberWire

Play Episode Listen Later Jan 30, 2026 25:16


A popular chatbot exposes millions of private user messages. The White House rescinds Biden-era federal software security guidance. A senior Secret Service official urges more scrutiny of domain registration. The President's NSA pick champions section 702. France looks to reduce reliance on U.S. digital infrastructure. CISA shares guidance on insider threats. Hugging Face infrastructure was abused to distribute an Android RAT. Ivanti discloses a pair of critical zero-days. Popular dating sites suffer a data breach. Our guest is Tim Starks from CyberScoop, discussing how the US looks to push its view of AI cybersecurity standards to the rest of the world. The Nobel Committee blames hackers for a spoiler alert.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest is Tim Starks from CyberScoop discussing how the US looks to push its view of AI cybersecurity standards to the rest of the world. You can read Tim's coverage here.  Selected Reading Massive AI Chat App Leaked Millions of Users Private Conversations (404 Media) White House Scraps 'Burdensome' Software Security Rules (SecurityWeek) The 'staggering' cybersecurity weakness that isn't getting enough focus, according to a top Secret Service official (CyberScoop) NSA pick champions foreign spying law as nomination advances (The Record) French Government To Replace Zoom and Teams With Visio, a Local Alternative (The New York Times) CISA Urges Critical Infrastructure Organizations to Take Action Against Insider Threats (HSToday) Hugging Face Abused to Deploy Android RAT (SecurityWeek) Ivanti warns of two EPMM flaws exploited in zero-day attacks (Bleeping Computer) Match Group breach exposes data from Hinge, Tinder, OkCupid, and Match (Bleeping Computer) Nobel Hacking Likely Leaked Peace Prize Winner Name, Probe Finds (Bloomberg) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Security Conversations
A destructive cyberattack in Poland raises NATO 'red-line' questions

Security Conversations

Play Episode Listen Later Jan 30, 2026 173:22


(Presented by Material Security: We protect your company's most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.) Three Buddy Problem - Episode 83: Poland's CERT documents a rare, explicit wiper attack on civilians in a NATO country, including detailed attribution of a Russian government op targeting the electric grid in the heart of winter. We examine why this crosses a long-avoided threshold, why attribution suddenly matters again, and what it says about pre-positioned access, vendor insecurity, and the shrinking gap between cyber operations and acts of war. Plus, another Fortinet fiasco, a new batch of Ivanti zero-days under attack, an emergency patch from Microsoft and the return of the mysterious KasperSekrets account. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Business of Tech
France Moves to Digital Sovereignty, South Korea's AI Law Challenges, and Microsoft Earnings Signal AI Dependence

Business of Tech

Play Episode Listen Later Jan 29, 2026 16:02


France's decision to discontinue American collaboration platforms such as Zoom and Microsoft Teams for government use—replacing them with the domestically developed Vizio platform—signals a shift toward digital sovereignty and data control within regulated jurisdictions. This move, formalized as part of France's Suite Numerique and to be implemented by 2027, highlights the increasing fragmentation of technology policy where national governments assert authority over platform selection and sensitive data handling. The development underscores operational risk for MSPs and IT service providers as assumptions of technology homogeneity across regions become unreliable.Supporting these shifts, South Korea enacted the world's first comprehensive AI legislation, requiring mandatory labeling of AI-generated content and risk assessments for high-impact systems, such as those in hiring and healthcare. According to the transcript, 98% of AI startups in South Korea report they are not prepared for compliance. Both developments reveal a pattern: early regulatory efforts tend to produce vague requirements, unclear enforcement, and real operational complexity. Providers operating in multiple jurisdictions must now anticipate compliance fragmentation and increased overhead as regulatory regimes diverge.Additional analysis focused on the continued evolution of the managed services stack, particularly through the lens of AI and workflow automation. Companies like Thrive are investing in enterprise platforms that embed AI-driven reasoning within workflow tools, shifting coordination away from traditional PSA ticketing systems. Meanwhile, integrations such as Quark Cyber with ScalePad's Lifecycle Manager X, and new partnerships between ServiceNow, TeamViewer, Anthropic, and OpenAI, illustrate a market splitting between providers focused on standardization and those managing more complex, enterprise-like environments. Microsoft's financial results further highlighted this trend, with record capital expenditure on AI infrastructure and increased reliance on proprietary chips to reduce dependency on external vendors like Nvidia and OpenAI.For MSPs, these developments raise practical governance and accountability questions. Shifts in regulatory authority and technology platforms create increased risk exposure for providers that do not proactively manage cross-jurisdictional compliance and secure defaults. Vendors are tightening control over platforms as AI becomes central to product architecture, often prioritizing internal risk management over shared upside with partners. Providers that fail to enforce robust data governance, understand cost drift, or plan for architectural lock-in are positioned less as strategic advisors and more as absorbers of client and vendor risk.Four things to know today00:00 France's Platform Ban and South Korea's AI Law Show Regulation Catching Up to Technology04:23 AI Is Reshaping the MSP Tool Stack as Thrive, ServiceNow, and ScalePad Take Different Paths07:37 Microsoft's SMTP AUTH Delay and CISA's AI Slip Show the Risk of Optional Security ControlsAND10:26 Earnings Show Microsoft Turning AI From Feature to Infrastructure as Partner Risk GrowsSponsored by: TimeZest 

The MisFitNation
Cait Conley: Combat Leadership, National Security, and the Call to Congress

The MisFitNation

Play Episode Listen Later Jan 29, 2026 64:01


In this powerful episode of The MisFitNation, host Rich LaMonica welcomes U.S. Army Veteran Cait Conley—a West Point graduate, Bronze Star recipient, counterterrorism leader, and candidate for Congress in New York's 17th District. A fourth-generation Hudson Valley native from working-class roots, Cait felt her calling to serve on September 11th while still in high school. That moment led her to the United States Military Academy at West Point, where she graduated in the top 2% of her class, later earning advanced degrees from MIT and Harvard. Cait served 16 years on active duty, deploying overseas six times to places like Iraq and Afghanistan and earning three Bronze Stars for exceptional leadership and performance in combat operations. After the military, her service continued at the highest levels of government—as Director of Counterterrorism on the National Security Council, at CISA, and working directly with Congress to protect America's national security, critical infrastructure, and democratic institutions. Now, Cait is once again answering the call—this time running for Congress to continue serving the people of her community and country. This episode dives deep into leadership, service, national security, sacrifice, and why veterans matter in public office.

Security Now (MP3)
SN 1062: AI-Generated Malware - Ireland Legalizes Spyware

Security Now (MP3)

Play Episode Listen Later Jan 28, 2026 161:34


Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security

The CyberWire
When the Director uses the wrong chat window.

The CyberWire

Play Episode Listen Later Jan 28, 2026 25:06


CISA's interim director uploaded sensitive government material into the public version of ChatGPT. The cyberattack on Poland's power grid compromised roughly 30 energy facilities. The EU and India sign a new partnership that includes expanded cyber cooperation. Meta rolls out enhanced WhatsApp security features. Researchers uncover a campaign targeting LLM service endpoints. Fortinet and OpenSSL patch multiple vulnerabilities. A high-severity WinRAR vulnerability continues to see widespread exploitation six months after it was patched. The SoundCloud data breach affected nearly 30 million users. Ben Yelin explains the California lawsuit accusing social media platforms of harming kids. A Spanish resort town gets hit with low-rent ransomware.   Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today, Dave is joined by his Caveat co-host Ben Yelin, Program Director for Public Policy & External Affairs at the University of Maryland Center for Cyber Health and Hazard Strategies, to discuss the upcoming trial where Meta and YouTube will make their case against accusations of social media being harmful to children. You can learn more here.  T-Minus Guest Host Our T-Minus Space Daily podcast team is in Orlando, FL this week covering Commercial Space Week. Yesterday while the crew was on travel making their way to the event, Dave Bittner took his first spin behind the mic on T-Minus. Tune in and let us know how Dave did! You can follow along with host Maria Varmazis and producers Alice Carruth and Liz Stokes for event coverage via our LinkedIn profile. Selected Reading Trump's acting cyber chief uploaded sensitive files into a public version of ChatGPT (POLITICO) Cyberattack on Poland's power grid hit around 30 energy facilities, new report says (The Record) Europe/India • Indian 'hackers for hire' to continue to thrive under Brussels-New Dehli trade deal (Intelligence Online) New WhatsApp lockdown feature protects high-risk users from hackers (Bleeping Computer) Hackers hijack exposed LLM endpoints in Bizarre Bazaar operation (Bleeping Computer) Fortinet Patches Exploited FortiCloud SSO Authentication Bypass (SecurityWeek) High-Severity Remote Code Execution Vulnerability Patched in OpenSSL (SecurityWeek) Cybercriminals and nation-state groups are exploiting a six-month old WinRAR defect (CyberScoop) SoundCloud breach added to HIBP, 29.8 million accounts exposed (CyberInsider) Spanish municipality Sanxenxo City Council calls hackers bluff as malware takes over network (Cryptopolitan) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Risky Business
Risky Business #822 -- France will ditch American tech over security risks

Risky Business

Play Episode Listen Later Jan 28, 2026 64:05


In this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news. They discuss: La France is tres sérieux about ditching US productivity software China's Salt Typhoon was snooping on Downing Street Trump wields the mighty DISCOMBOBULATOR ESET says the Polish power grid wiper was Russia's GRU Sandworm crew US cyber institutions CISA and NIST are struggling Voice phishing for MFA bypass is getting even more polished This episode is sponsored by Sublime Security. Brian Baskin is one of the team behind Sublime's 2026 Email Threat Research report. He joins to talk through what they see of attackers' use of AI, as well as the other trends of the year. This episode is also available on Youtube. Show notes France to ditch US platforms Microsoft Teams, Zoom for ‘sovereign platform' amid security concerns | Euronews Suite Numérique plan - Google Search China hacked Downing Street phones for years Cyberattack Targeting Poland's Energy Grid Used a Wiper Trump says U.S. used secret 'discombobulator' on Venezuelan equipment during Maduro raid | PBS News Risky Bulletin: Cyberattack cripples cars across Russia - Risky Business Media Lawmakers probe CISA leader over staffing decisions | CyberScoop Trump's acting cyber chief uploaded sensitive files into a public version of ChatGPT - POLITICO Acting CISA director failed a polygraph. Career staff are now under investigation. - POLITICO NIST is rethinking its role in analyzing software vulnerabilities | Cybersecurity Dive Federal agencies abruptly pull out of RSAC after organizer hires Easterly | Cybersecurity Dive Real-Time phishing kits target Okta, Microsoft, Google Phishing kits adapt to the script of callers On the Coming Industrialisation of Exploit Generation with LLMs – Sean Heelan's Blog GitHub - SeanHeelan/anamnesis-release: Automatic Exploit Generation with LLMs Overrun with AI slop, cURL scraps bug bounties to ensure "intact mental health" - Ars Technica Bypassing Windows Administrator Protection - Project Zero Task Failed Successfully - Microsoft's “Immediate” Retirement of MDT - SpecterOps Kubernetes Remote Code Execution Via Nodes/Proxy GET Permission WhatsApp's Latest Privacy Protection: Strict Account Settings - WhatsApp Blog Microsoft gave FBI a set of BitLocker encryption keys to unlock suspects' laptops: Reports | TechCrunch He Leaked the Secrets of a Southeast Asian Scam Compound. Then He Had to Get Out Alive | WIRED Key findings from the 2026 Sublime Email Threat Research Report

All TWiT.tv Shows (MP3)
Security Now 1062: AI-Generated Malware

All TWiT.tv Shows (MP3)

Play Episode Listen Later Jan 28, 2026 161:34


Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security

Security Now (Video HD)
SN 1062: AI-Generated Malware - Ireland Legalizes Spyware

Security Now (Video HD)

Play Episode Listen Later Jan 28, 2026


Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security

Security Now (Video HI)
SN 1062: AI-Generated Malware - Ireland Legalizes Spyware

Security Now (Video HI)

Play Episode Listen Later Jan 28, 2026


Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security

Radio Leo (Audio)
Security Now 1062: AI-Generated Malware

Radio Leo (Audio)

Play Episode Listen Later Jan 28, 2026 161:34


Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security

Security Now (Video LO)
SN 1062: AI-Generated Malware - Ireland Legalizes Spyware

Security Now (Video LO)

Play Episode Listen Later Jan 28, 2026


Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security

All TWiT.tv Shows (Video LO)
Security Now 1062: AI-Generated Malware

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Jan 28, 2026 161:34 Transcription Available


Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security

The CyberWire
“The hackers made me do it,” or did they?

The CyberWire

Play Episode Listen Later Jan 27, 2026 27:43


Microsoft rushes an emergency fix for an actively exploited Office zero-day. A suspected cyberattack halts rail service in Spain. The FBI probes Signal chats in Minnesota. The UK moves to overhaul policing for the cyber age. Romania investigates a hitman-for-hire site. A UK court awards $4.1 million in a Saudi spyware case. Google agrees to a voice assistant settlement. CISA maps post-quantum crypto readiness. Prosecutors charge an Illinois man over a Snapchat hacking scheme targeting hundreds of women. Our guest today is Cynthia Kaiser, SVP of the Ransomware Research Center at Halcyon, sharing some insight into the AI and quantum threats to cybersecurity and the national cyber strategy. A Best Buy guy tries a creative alibi.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is Cynthia Kaiser, SVP of the Ransomware Research Center at Halcyon, sharing some insight into the AI and quantum threats to cybersecurity and the national cyber strategy. Selected Reading Microsoft Issues Emergency Patch for Actively Exploited Office Zero-Day (Beyond Machines) Catalonia travel chaos: thousands stranded as suspected cyber attack disrupts rail network (The Olive Press)  FBI is investigating Minnesota Signal groups tracking ICE, Patel says (NBC News) UK plans sweeping overhaul of policing amid surge in online crimes (The Record) Romania probes two suspects over alleged hitman-for-hire website (The Record) Judge awards British critic of Saudis $4.1 million, finds the regime hacked his devices (The Record) Google to pay $68 million over allegations its voice assistant eavesdropped on users (CBS News) CISA releases technology readiness list for post-quantum cryptography (CSO Online) Illinois man charged with hacking Snapchat accounts to steal nude photos (Bleeping Computer) Savannah BSavannah Best Buy employee says 'hacker group' blackmailed him into theft ring scheme (WJCL 22) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.   Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Business of Tech
AI Adoption Stalls Among Workers While Leadership Advances and Organizational Risk Grows

Business of Tech

Play Episode Listen Later Jan 27, 2026 13:13


AI adoption within organizations is increasingly polarized, with Gallup data cited showing that while 77% of technology professionals use AI at work, overall workplace adoption rose only marginally from 45% to 46% in late 2025. This stagnation is attributed not to employee reluctance, but to aggressive uptake by leadership without corresponding redesign of roles and workflows at lower organizational levels. In the UK, research presented notes an 8% net job loss tied to AI alongside a 11.5% productivity increase, with younger workers expressing heightened concern over future employment security.Supporting analysis emphasizes that AI utilized only in decision-making circles can compress organizations, trading resilience for short-term efficiency. Dave Sobel cautions that celebrating productivity gains without acknowledging operational fragility introduces organizational brittleness, as headcount reductions outpace tangible capability improvements across all layers. The discussion underscores the risk in pitching AI as a leadership tool without regard for its broader impact.Additional topics include the risks of encryption practices—specifically Microsoft's BitLocker—and the limits of user control over recovery keys when stored in the cloud. Dave Sobel highlights governance failures when MSPs assume encryption equates to privacy without explicit decisions regarding key custody and authority, noting that silent trade-offs can expose organizations to privacy vulnerabilities. Furthermore, coverage of CISA's absence from RSA conference outlines how diminished federal engagement increases liability and ambiguity for MSPs tasked with interpreting security policy. New video authentication features from Ring are examined as evidence of a broader shift where provenance and chain of custody outweigh convenience, directly affecting the evidentiary value of managed data.The overarching implication for MSPs and IT providers is clear: risk, authority, and liability are being systematically reallocated within the supply chain and between vendors, government, and service providers. Operational preparedness now depends on explicit documentation, governance choices, and advance recognition of liability transfer. Failing to adapt—by leaving deployment decisions, key management, and evidentiary workflows unexamined—may result in organizational fragility, legal exposure, and loss of client trust. Four things to know today 00:00 Stalled AI Adoption and UK Job Losses Show Productivity Gains Are Not Broadly Shared04:06 BitLocker Encryption Allows Microsoft Access to Recovery Keys Stored in the Cloud06:21 CISA Breaks From Past Practice, Declines RSA Conference Appearance08:36 Ring Uses Cryptographic Seals to Verify Video Authenticity as Evidence Trust Becomes a Governance Issue This is the Business of Tech.    Supported by:  https://scalepad.com/dave/

The CyberWire
When encryption meets enforcement.

The CyberWire

Play Episode Listen Later Jan 26, 2026 32:03


Microsoft granted the FBI access to laptops encrypted with BitLocker. The EU opens an investigation into Grok's creation of sexually explicit images. Glimmers of access pierce Iran's internet blackout. Koi Security warns npm fixes fall short against PackageGate exploits. Some Windows 11 devices fail to boot after installing the January Patch Tuesday updates. CISA warns of active exploitation of  multiple vulnerabilities across widely used enterprise and developer software. ESET researchers have attributed the cyberattack on Poland's energy sector to Russia's Sandworm. This week's business breakdown. Brandon Karpf joins us to talk space and cyber. CISA sits out RSAC.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is cybersecurity executive and friend of the show Brandon Karpf with Dave Bittner and T-Minus Space Daily host Maria Varmazis, for our monthly space and cyber segment. Brandon, Maria and Dave discuss “No more free rides: it's time to pay for space safety.” Selected Reading FBI Accessed Windows Laptops After Microsoft Shared BitLocker Recovery Keys (Hackread) European Commission opens new investigation into X's Grok (The Register) Amid Two-Week Internet Blackout, Some Iranians Are Getting Back Online (New York Times) Hackers can bypass npm's Shai-Hulud defenses via Git dependencies (Bleeping Computer) Microsoft investigates Windows 11 boot failures after January updates (Bleeping Computer) CISA says critical VMware RCE flaw now actively exploited (Bleeping Computer) CISA confirms active exploitation of four enterprise software bugs (Bleeping Computer) ESET Research: Sandworm behind cyberattack on Poland's power grid in late 2025 (ESET)  Aikido secures $60 million in Series B funding. (N2K Pro Business Briefing) CISA won't attend infosec industry's biggest conference (The Register) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.   Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
TikTok lives to scroll another day.

The CyberWire

Play Episode Listen Later Jan 23, 2026 30:04


At long last, a TikTok deal. Officials urge lawmakers to keep an eye on the quantum ball. Fortinet confirms active exploitation of a critical authentication bypass flaw. Ireland plans to authorize spyware for law enforcement. Okta warns customers of sophisticated vishing kits. Under Armour investigates data breach claims. CISA adds a Zimbra Collaboration Suite flaw to the known exploited vulnerabilities list. Poor OpSec enables recovery of data stolen by the INC ransomware gang. The DOJ deports a pair of Venezuelans convicted of ATM jackpotting. Our guest is Chris Nyhuis, Founder and CEO of Vigilant, sharing practical steps to protect money, identity, and devices.  Curl pulls the plug on bug bounties after drowning in AI slop. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Chris Nyhuis, Founder and CEO of Vigilant, sharing "practical steps consumers can take in 2026 to protect their money, identity, and devices." Selected Reading TikTok Strikes Deal to Create New U.S. Entity and Loosen App's Ties to China (New York Times) US Officials Urge Congress to Reauthorize Key Quantum Law (BankInfo Security) Fortinet confirms critical FortiCloud auth bypass not fully patched (Bleeping Computer) Ireland plans law allowing law enforcement to use spyware (The Record) Okta SSO accounts targeted in vishing-based data theft attacks (Bleeping Computer) Under Armour Investigates Data Breach (Infosecurity Magazine) Organizations Warned of Exploited Zimbra Collaboration Vulnerability  (SecurityWeek) INC ransomware opsec fail allowed data recovery for 12 US orgs (Bleeping Computer) 2 Venezuelans Convicted in US for Using Malware to Hack ATMs (SecurityWeek) Curl ending bug bounty program after flood of AI slop reports (Bleeping Computer) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Security Conversations
Cheap, AI-generated zero-days and the real meaning of ‘advanced' malware

Security Conversations

Play Episode Listen Later Jan 23, 2026 129:06


(Presented by Material Security: We protect your company's most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.) Three Buddy Problem - Episode 82: We parse news that China-linked VoidLink is a malware framework created entirely by AI and the collapsing line between elite APT operations and everyday threat actors. Plus, a new Sean Heelan essay on low-cost exploit generation and why “AI guardrails” are mostly a comforting myth; AI slop overwhelming bug bounty programs; CISA's new Brickstorm YARA rules; and fresh research on a wiper-malware found in Russian attacks against Poland's electricity sector. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

The CyberWire
Stabilized but smaller.

The CyberWire

Play Episode Listen Later Jan 22, 2026 24:39


CISA's acting director assures Congress the agency has “stabilized”. Google and Cisco patch critical vulnerabilities. Fortinet firewalls are being hit by automated attacks that create rogue accounts. A global spam campaign leverages unsecured Zendesk support systems. LastPass warns of attempted account takeovers. Greek authorities make arrests in a sophisticated fake cell tower scam. Executives at Davos express concerns over AI. Pwn2Own Automotive proves profitable. Our guest is Kaushik Devireddy, AI data scientist at Fable Security, with insights on a fake ChatGPT installer. New password, same as the old password.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Kaushik Devireddy, AI data scientist at Fable Security, discussing their work on "How a fake ChatGPT installer tried to steal my password". Selected Reading CISA Is 'Trying to Get Back on Its Mission' After Trump Cuts (CISA) Google Patches High-Severity V8 Race Condition in Chrome 144 published: today (Beyond Machines) Cisco Patches Actively Exploited Flaw in Unified Communications Products (Beyond Machines) Hackers breach Fortinet FortiGate devices, steal firewall configs (Bleeping Computer) Zendesk ticket systems hijacked in massive global spam wave (Bleeping Computer) LastPass Warns of Phishing Campaign Attempting to Steal Master Passwords (Infosecurity Magazine) Greek Police Arrest Scammers in Athens Using Fake Cell Tower for SMS Phishing Operation (TechNadu) Execs at Davos say AI's biggest problem isn't hype — it's security (Business Insider) Hackers exploit 29 zero-days on second day of Pwn2Own Automotive (Bleeping Computer) Analysis of 6 Billion Passwords Shows Stagnant User Behavior (SecurityWeek) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Business of Tech
Authority Challenges for MSPs: Deepfake Risks, AI Security Shifts, and Vendor Accountability

Business of Tech

Play Episode Listen Later Jan 22, 2026 17:31


Escalating distrust in identity systems and misuse of AI are forcing a shift in security accountability for small and midsize businesses. Recent analysis highlights that the prevalence of deepfake-driven business email compromise and non-human digital identities is eroding confidence in traditional protective solutions. According to Techyle and supporting reports referenced by Dave Sobel, the ratio of non-human to human identities in organizations is now 144:1, further complicating authority and responsibility for managed service providers (MSPs). As trust in exclusive third-party control disintegrates, co-managed security models are becoming standard, repositioning decision-making and liability.The rise of AI-generated data—described as “AI slop”—has prompted increased adoption of zero trust models, with 84% of CIOs reportedly increasing funding for generative AI initiatives. However, as rogue AI agents are recognized as a significant insider threat, current security services are often ill-equipped to manage these new vulnerabilities. Regulatory bodies, including CISA, have issued guidance noting that the integration of AI into critical infrastructure introduces greater risk of outages and security breaches, particularly when governance remains ambiguous. High-profile vulnerabilities in open-source AI platforms used within cloud environments further highlight the persistence of operational risks.Adjacent technology updates include new releases from vendors such as 1Password, WatchGuard, JumpCloud, and ControlUp. These offerings focus on enhancing phishing prevention, expanding managed detection and response, and automating endpoint management for MSPs. However, Dave Sobel emphasizes that these tools introduce additional layers of automation and integration without adequately clarifying who ultimately holds authority and accountability when failures or breaches occur. There is a consistent warning that stacking solutions or outsourcing core functions without redefining operational control creates gaps between action and oversight.For MSPs and IT leaders, the key takeaway is that security risk is no longer defined by missing technology but by unclear governance, undefined authority, and misaligned incentives. Without explicit contractual and operational delineation of responsibility when deploying AI and automation, service providers are increasingly exposed to liability by default. The advice is to move beyond tool-centric strategies and focus on process clarity: define who authorizes, audits, and terminates non-human identities; establish which parties approve automation actions; and ensure clients understand shared responsibilities to mitigate silent risk accumulation. Four things to know today00:00 TechAisle Warns SMB Security Will Shift in 2026 as Identity Attacks and AI Agents Redefine Risk05:44 AI Moves Deeper Into Critical Infrastructure as Open-Source and Human Weaknesses Expand the Attack Surface09:35 MSP Security Platforms Automate Phishing Prevention and MDR—Outpacing Governance and Control Models12:12 AI-Powered MSP Tools Promise Control and Efficiency, But Shift Responsibility by Default This is the Business of Tech.    Supported by:  https://scalepad.com/dave/

Joey Pinz Discipline Conversations
#804 MSSP Alert Live - Valerie Cofield:

Joey Pinz Discipline Conversations

Play Episode Listen Later Jan 21, 2026 48:34


Send us a textIn this powerful and deeply insightful conversation, Joey Pinz sits down with national security leader Valerie Cofield to explore the past, present, and future of cybersecurity across government, critical infrastructure, and everyday life. With 26 years at the FBI, senior leadership at CISA, and her current mission at ICIT, Valerie brings unmatched clarity to the threats shaping our world—from nation-state attacks on rural water systems to AI-enabled scams targeting vulnerable populations.Valerie reflects on why critical infrastructure is now a primary battleground, how bipartisan policy work shaped U.S. cyber readiness, and why the private sector—not government—will be on the front lines of future conflicts. She also shares her personal journey as the daughter of South Korean immigrants, the gratitude that shaped her service, and the emotional weight of protecting the country that gave her family a second chance.Beyond cyber, Joey and Valerie discuss reading habits, mental health, misinformation, and the dangers social media poses to young people. Valerie also offers a heartfelt perspective on leadership, longevity, habits, exercise, and earning success through consistency—not perfection.

SECURE AF
CISA Retires 10 Emergency Directives – Progress for Feds, Wake-Up for the Rest of Us

SECURE AF

Play Episode Listen Later Jan 21, 2026 6:31


Got a question or comment? Message us here!CISA has officially retired 10 emergency directives ... marking real progress for federal cybersecurity

The CyberWire
Million-dollar hacks and a manhunt.

The CyberWire

Play Episode Listen Later Jan 20, 2026 23:12


Authorities pursue Black Basta. British authorities launch a new national service to fight fraud and cybercrime. LinkedIn private messages get infected with RATs. Researchers uncover a new malicious extension that intentionally crashes the browser. Ingram Micro discloses a ransomware-related data breach. A Jordanian man pleads guilty to selling stolen access to corporate networks. Business Breakdown. Tim Starks from CyberScoop discusses Sean Plankey's renomination to lead CISA.  Grave oversight in the funeral biz.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Tim Starks from CyberScoop as he is discussing Sean Plankey's renomination to lead CISA. You can use Tim's take on it here.   Selected Reading Police raid homes of alleged Black Basta hackers, hunt suspected Russian ringleader (The Record) UK launches landmark 'Report Fraud' service to tackle cybercrime and fraud (The Record) Linkedin Phishing Campaign Exploits Open-Source Pen Testing Tool to Compromise Business Execs (Infosecurity Magazine) Fake ad blocker extension crashes the browser for ClickFix attacks (Bleeping Computer) Ingram Micro reveals ransomware attack hit 42,000 people - here's how to find out more (TechRadar) Jordanian Man Pleads Fake ad blocker extension crashes the browser for ClickFix attacksGuilty to Selling Stolen Logins for 50 Companies (Hackread) CrowdStrike agrees to acquire SGNL for $740 million and Seraphic for $420 million. (N2K Pro) Exclusive: Funeral Industry Faces Security Gaps as Top Firms Lack Key Certifications (The Chosun Daily) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

O Assunto
Por que o Brasil está bebendo menos?

O Assunto

Play Episode Listen Later Jan 19, 2026 21:54


Convidada: Mariana Thibes, doutora em sociologia e coordenadora do Centro de Informações sobre Saúde e Álcool (CISA). O desafio começou no Reino Unido, em 2012, e depois se espalhou pelo mundo. O “Janeiro Seco” propõe que se passe o mês inteiro sem consumir uma só gota de álcool. A iniciativa é uma forma de “detox” depois das festas de fim de ano, e para conscientizar sobre os efeitos do álcool no organismo e no humor. É um movimento que pega carona em uma tendência global: a redução no consumo de bebidas alcoólicas. Fenômeno observado em especial no Brasil. É o que atesta uma pesquisa realizada pelo Ipsos-Ipec, com dados de 2025: 64% dos brasileiros declararam não ter bebido álcool durante todo o ano – em 2023, esse número era de 55%. E a queda é ainda mais acentuada entre os jovens: na faixa etária de 18 a 24 anos, a proporção dos que declaram não ter consumido álcool saltou de 46% para 64%. Para explicar as razões deste fenômeno, Natuza Nery conversa com Mariana Thibes, coordenadora do Centro de Informação sobre Saúde e Álcool (CISA). Doutora em sociologia, Mariana avalia que há um hiato geracional na forma como os mais jovens enxergam a bebida – como um problema para a saúde e um risco para as relações sociais. Mariana relembra a relação do brasileiro com as bebidas alcóolicas ao longo do tempo, e analisa os efeitos econômicos desta mudança de comportamento.

Security Conversations
Google Pixel 'zero-click' exploit caused by AI, mysterious Poland grid attacks, China bans US cybersecurity software

Security Conversations

Play Episode Listen Later Jan 16, 2026 144:36


(Presented by Material Security (https://material.security): We protect your company's most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.) Three Buddy Problem - Episode 81: We dissect New York Times reporting on the "precision" of US cyber operations in Venezuela, the competing narratives around offensive cyber capabilities and "letters of marque" for private hackers. Plus, a mysterious failed cyber attack on Poland's power grid, internet blackouts in Iran (with fascinating DNS telemetry revealing Chinese bank traffic and Russian website spikes), and news of China's ban on US/Israeli cybersecurity software. We also cover Check Point's research on "VoidLink" (is it a successor to ShadowPad?), Microsoft's threat intelligence sharing practices, and Google Project Zero's disclosure of zero-click vulnerabilities caused by AI-powered transcription features. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).

Caveat
Consent is not optional.

Caveat

Play Episode Listen Later Jan 15, 2026 46:18


This week, Ben and Dave discuss the ongoing controversy surrounding Grok and its ability to generate nonconsensual nude images, raising fresh concerns about AI safeguards, consent, and accountability, before turning to a conversation with Caitlin Clarke, Senior Director for Cybersecurity Services at Venable, who breaks down the Cybersecurity Information Sharing Act of 2015 (CISA). While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney.  Links to today's stories: ⁠There's One Easy Solution to the A.I. Porn Problem UK probes X over Grok CSAM scandal; Elon Musk cries censorship Get the weekly Caveat Briefing delivered to your inbox. Like what you heard? Be sure to check out and subscribe to our ⁠⁠⁠⁠⁠⁠⁠⁠⁠Caveat Briefing⁠⁠⁠⁠⁠⁠⁠⁠⁠, a weekly newsletter available exclusively to ⁠⁠⁠⁠⁠⁠⁠⁠⁠N2K Pro⁠⁠⁠⁠⁠⁠⁠⁠⁠ members on ⁠⁠⁠⁠⁠⁠⁠⁠⁠N2K CyberWire's⁠⁠⁠⁠⁠⁠⁠⁠⁠ website. N2K Pro members receive our Thursday wrap-up covering the latest in privacy, policy, and research news, including incidents, techniques, compliance, trends, and more. This week's ⁠⁠⁠⁠Caveat Briefing⁠⁠⁠⁠ covers ⁠⁠⁠⁠⁠⁠⁠⁠⁠India's proposed smartphone security rules that would require manufacturers like Apple and Samsung to share source code for government review, impose strict permission controls, mandate malware scanning and long-term log retention, and limit how devices can be updated or downgraded. Tech companies and industry groups are pushing back, warning the measures are impractical, lack global precedent, could harm performance and battery life, and may delay critical security updates that protect users. Curious about the details? Head over to the ⁠⁠⁠⁠⁠⁠⁠⁠⁠Caveat Briefing⁠⁠⁠⁠⁠⁠⁠⁠⁠ for the full scoop and additional compelling stories. Got a question you'd like us to answer on our show? You can send your audio file to ⁠⁠⁠⁠⁠⁠⁠⁠⁠caveat@thecyberwire.com⁠⁠⁠⁠⁠⁠⁠⁠⁠. Hope to hear from you. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Daily Scoop Podcast
Katie Arrington lands in industry as CIO of quantum company IonQ

The Daily Scoop Podcast

Play Episode Listen Later Jan 15, 2026 4:23


After leaving her role performing the duties of the chief information officer for the Department of Defense last month, Katie Arrington has taken a new position as CIO at quantum computing company IonQ. Arrington will step into the role Jan. 19, reporting to the company's COO and CFO Inder Singh, IonQ announced Wednesday. Kirsten Davies was nominated by President Donald Trump in May 2025 to be the Defense Department CIO, and it took most of the remainder of 2025 for the Senate to confirm her into the role. She was sworn in just before the Christmas holiday, at which point Arrington stepped away from her service to the Pentagon. In joining IonQ, Arrington will serve on the company's executive team. As CIO, Arrington will continue to support the U.S. military from a different vantage, leading modernization and security of IonQ's enterprise systems in support of its mission to deliver quantum capabilities to American warfighters. Before rejoining the Pentagon a year ago, then as deputy CIO for cybersecurity, Arrington had a previous stint as CISO in the Office of the Undersecretary of Defense for Acquisition and Sustainment, where she was largely responsible for the development of the Cybersecurity Maturity Model Certification (CMMC) program. Now: President Donald Trump re-nominated Sean Plankey to lead the Cybersecurity and Infrastructure Security Agency on Tuesday, after Plankey's bid for the position ended last year stuck in the Senate. It's not clear whether or how Plankey's resubmitted nomination will overcome the hurdles that left many observers convinced his chance of becoming CISA director had likely ended, but it does definitively signal that the Trump administration still wants Plankey to have the job. Plankey's nomination was included in a batch sent to the Senate announced on Tuesday. CISA spent all of 2025 under Trump without a permanent director. Trump nominated Plankey, who held a couple cybersecurity roles in the first Trump administration, to lead CISA in March. He got a Senate Homeland Security and Governmental Affairs Committee hearing in July, then won approval from that panel that same month. But Sen. Rick Scott, R-Fla., had placed a hold on Plankey's nomination over a Coast Guard contract that the Homeland Security Department had canceled in part. While he awaited confirmation, Plankey had been serving as a senior adviser to the secretary for the Coast Guard. A spokesperson for Scott did not immediately respond to a request for comment. North Carolina's GOP Senate delegation also had placed holds on DHS nominees related to disaster aid to their state. Sen. Thom Tillis, R-N.C., said last week that the holds would remain until Secretary Kristi Noem appeared before the Senate Judiciary Committee. A White House official had denied reports that Plankey's nomination was all but over last year. “President Trump has been clear that he wants all of his nominees confirmed as quickly as possible, including Sean Plankey, who will play a key role in ensuring a strong cyber defense infrastructure,” the official told CyberScoop. Asked Wednesday at the Surface Navy Association national symposium about what he was doing to convince senators to lift their holds, Plankey answered, “The administration, the White House has to say that this is a priority of us.” The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast  on Apple Podcasts, Soundcloud, Spotify and YouTube.

The CyberWire
CVEs don't sleep.

The CyberWire

Play Episode Listen Later Jan 14, 2026 23:29


Patch Tuesday fallout, China sidelines Western security vendors, and a critical flaw puts industrial switches at risk of remote takeover. A ransomware attack disrupts a Belgian hospital, crypto scams hit investment clients, and Eurail discloses a data breach. Analysts press Congress to go on offense in cyberspace, and Sean Plankey gets another shot at leading CISA. In our Threat Vector segment, David Moulton sits down with Ian Swanson, AI Security Leader at Palo Alto Networks about supply chain security. And, an AI risk assessment cites a football match that never happened. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment AI security is no longer optional, it's urgent. In this segment of Threat Vector, David Moulton sits down with Ian Swanson, former CEO of Protect AI and now the AI Security Leader at Palo Alto Networks. Ian shares how securing the AI supply chain has become the next frontier in cybersecurity and why every enterprise building or integrating AI needs to treat it like any other software pipeline—rife with dependencies, blind spots, and adversaries ready to exploit them. You can catch the full conversation here and listen to new episodes of Threat Vector every Thursday on your favorite podcast app. Selected Reading Patch Tuesday, January 2026 Edition (Krebs on Security) Adobe Patches Critical Apache Tika Bug in ColdFusion (SecurityWeek) Chrome 144, Firefox 147 Patch High-Severity Vulnerabilities (SecurityWeek) Fortinet Patches Critical Vulnerabilities in FortiFone, FortiSIEM (SecurityWeek) Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software, sources say (Reuters) Critical OpenSSH flaw exposes Moxa industrial switches to remote takeover (Beyond Machines) Cyberattack forces Belgian hospital to transfer critical care patients (The Record) Betterment confirms data breach after wave of crypto scam emails (Bleeping Computer) Passports, bank details compromised in Eurail data breach (The Register) Lawmakers Urged to Let US Take on 'Offensive' Cyber Role (Bank InfoSecurity) Sean Plankey re-nominated to lead CISA (CyberScoop) Police chief admits misleading MPs after AI used in justification for banning Maccabi Tel Aviv fans (BBC News) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Cyber Security Today
HPE Open View Vulnerability Hits CISA Known Exploited List

Cyber Security Today

Play Episode Listen Later Jan 14, 2026 10:58


Cybersecurity Today: Credit Card Skimming, Valley Rat Malware, WhatsApp Exploit & AI Defenses In this episode of Cybersecurity Today, hosted by Jim Love, we explore several critical cybersecurity threats and advancements. We cover a massive credit card skimming campaign active since early 2022, a severe bug in HPE OneView, the stealthy Valley Rat malware, and a potential zero-click exploit in WhatsApp. Additionally, we delve into AI-driven advancements in cybersecurity defense being developed at US National Laboratories. Stay informed and vigilant with the latest insights in cybersecurity. 00:00 Introduction and Sponsor Message 00:48 Credit Card Skimming Campaign Uncovered 02:49 Critical Vulnerability in HPE OneView 04:16 Valley Rat Malware Threat 06:22 Suspected Zero-Day Vulnerability in WhatsApp 08:29 AI-Powered Cyber Defenses in US National Labs 10:08 Conclusion and Sponsor Message

The CyberWire
Source code in the wild aisle.

The CyberWire

Play Episode Listen Later Jan 13, 2026 24:28


Stolen Target source code looks real. CISA pulls the plug on Gogs. SAP rushes patches for critical flaws. A suspected Russian spy emerges in Sweden, while Cloudflare threatens to walk away from Italy. Researchers flag a Wi-Fi chipset bug, a long-running Magecart skimming campaign, and a surge in browser-in-the-browser phishing against Facebook users. Mandiant releases a new Salesforce defense tool, and NIST asks how to secure agentic AI before it secures itself. Our guests are Christine Blake and Madison Farabaugh from Inside the Media Minds. Plus, a Dutch court says seven years is still the going rate for a USB-powered cocaine plot. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Christine Blake and Madison Farabaugh from W2 Communications and hosts of Inside the Media Minds podcast on their show joining the N2K CyberWire network. You can listen to the latest episode of Inside the Media Minds today and catch new installments every month on your favorite podcast app. Selected Reading Target employees confirm leaked code after ‘accelerated' Git lockdown (Bleeping Computer) Fed agencies urged to ditch Gogs as zero-day makes CISA list (The Register) SAP's January 2026 Security Updates Patch Critical Vulnerabilities (SecurityWeek) Sweden detains ex-military IT consultant suspected of spying for Russia (The Record) Cloudflare CEO threatens to pull out of Italy  (The Register) One Simple Trick to Knock Out the Wi-Fi Network (GovInfo Security) Google's Mandiant releases free Salesforce access control checker (iTnews) Global Magecart Campaign Targets Six Card Networks (Infosecurity Magazine) Facebook login thieves now using browser-in-browser trick (Bleeping Computer) NIST Calls for Public to Help Better Secure AI Agents (GovInfo Security) Appeal fails for hacker who opened port to coke smugglers (The Register) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

What the Hack with Adam Levin
Episode 234: The Ralph Naders of Cybercrime?

What the Hack with Adam Levin

Play Episode Listen Later Jan 13, 2026 52:19


Bob Lord (Yahoo, DNC, CISA) and Lauren Zarik (Harvard's Belfer Center, CISA) don't think cybersecuirty (or lack of it) should be the customer's problem. Drawing parallels to Ralph Nader's fight against unsafe cars, they explain how to fix the root of the problem. Learn more about your ad choices. Visit megaphone.fm/adchoices

Cyber Security Today
FBI Warns of QR Code Phishing & Europol's Major Cybercrime Crackdown CST Monday Jan 12 2026

Cyber Security Today

Play Episode Listen Later Jan 12, 2026 11:40


In this episode of Cybersecurity Today, host David Shipley covers the FBI's warning about North Korean state-sponsored QR code phishing campaigns targeting U.S. organizations. Additionally, he discusses Europol's arrest of 34 individuals in Spain tied to the infamous Black Acts crime syndicate and the uncertainty surrounding CISA's pre-ransomware notification initiative after the departure of its lead developer. Stay informed with the latest in cybersecurity news and learn how to protect yourself and your organization from emerging threats. Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst 00:00 Introduction and Sponsor Message 00:20 FBI Warns of QR Code Phishing 04:44 Europol's Major Crackdown on Black Acts 07:11 Uncertainty Over Ransomware Alerts Program 09:41 US Withdraws from Cybersecurity Organizations 10:25 Conclusion and Final Thoughts

The CyberWire
Is interim the new permanent?

The CyberWire

Play Episode Listen Later Jan 9, 2026 32:30


The NSA reshuffles its cybersecurity leadership. A new report unmasks ICE's latest surveillance system. CISA marks a milestone by retiring ten Emergency Directives. Trend Micro patches a critical vulnerability. Grok dials back the nudes, a bit. Cambodia extradites a cybercrime kingpin to China. Ghost Tap malware intercepts payment card data. Researchers disrupt a highly sophisticated VMware ESXi hypervisor exploit. European law enforcement arrest dozens of suspects linked to the international cybercriminal group Black Axe. Our guest is Sonali Shah, CEO of Cobalt, who says 2026 is the year AI stops being a concept and becomes the central battleground of cybersecurity. After firing the experts, DOGE hangs a help wanted sign. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today on our Industry Voices, we are joined by Sonali Shah, CEO of Cobalt, talking about 2026 is the year AI stops being a concept and becomes the central battleground of cybersecurity. Tune into the full conversation here. Selected Reading NSA cyber directorate gets new acting leadership (The Record) Inside ICE's Tool to Monitor Phones in Entire Neighborhoods (404 Media) CISA Retires Ten Emergency Directives, Marking an Era in Federal Cybersecurity (CISA.gov) Trend Micro warns of critical Apex Central RCE vulnerability (Bleeping Computer) X pulls Grok images after UK ban threat over undress tool (The Register) Alleged cyber scam kingpin arrested, extradited to China (The Record) Chinese Hackers Use NFC-Enabled Android Malware to Steal Payment Information (GB Hackers) The Great VM Escape: ESXi Exploitation in the Wild (Huntress) Europol Leads Global Crackdown on Black Axe Cybercrime Gang, 34 Arrest (Infosecurity Magazine) US DOGE Service is hiring following mass workforce losses across the government (Gov Exec) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
America goes solo on cyber.

The CyberWire

Play Episode Listen Later Jan 8, 2026 24:48


The US withdraws from global cybersecurity institutions. A maximum-severity vulnerability called Ni8mare allows full compromise of a workflow automation platform. Cisco patches ISE. Researchers uncover a sophisticated multi-stage malware campaign targeting manufacturing and government organizations in Italy, Finland, and Saudi Arabia. The growing rift of defining AI risk. Microsoft gives 365 admins a one-month deadline to enable MFA. The Illinois Department of Human Services inadvertently exposed personal and protected health information of more than 700,000 residents. An Illinois man is charged with hacking Snapchat accounts to steal nudes. Our guest is Caitlin Clarke, Senior Director for Cybersecurity Services at Venable, with insights on CISA 2015. Facial recognition that's bear-ly controversial.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Caitlin Clarke, Senior Director for Cybersecurity Services at Venable, for a conversation on CISA 2015 and its role in today's cybersecurity and policy landscape. If you enjoyed this conversation, be sure to tune into the full interview on the next Caveat. Selected Reading US announces withdrawal from dozens of international treaties (The Record) US To Leave Global Forum on Cyber Expertise (Infosecurity Magazine) Max severity Ni8mare flaw lets hackers hijack n8n servers (Bleeping Computer) Cisco warns of Identity Service Engine flaw with exploit code (Bleeping Computer) CISA tags max severity HPE OneView flaw as actively exploited (Bleeping Computer) Threat Actors Exploit Commodity Loader in Targeted Email Campaigns Against Organizations (GB Hackers) Are Copilot prompt injection flaws vulnerabilities or AI limits? (Bleeping Computer) Microsoft to enforce MFA for Microsoft 365 admin center sign-ins (Bleeping Computer) Illinois state agency exposed personal data of 700,000 people (The Record) Oswego man Kyle Svara, 26, allegedly hired by college coach Steve Waithe to get Snapchat access codes from nearly 600 women: FBI (ABC7 Chicago) How facial recognition for bears can help ecologists manage wildlife (The Conversation) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Paul's Security Weekly
No FlipperZeros Allowed - PSW #908

Paul's Security Weekly

Play Episode Listen Later Jan 8, 2026 125:29


This week in the security news: Supply chain attacks and XSS PS5 leaked keys Claude tips for security pros No Flipper Zeros allowed, or Raspberry PIs for that matter Kimwolf and your local network Linux is good now Removing unremovable apps without root Detecting lag catches infiltrators Defending your KVM Fixing some of the oldest code Deleting websites live on stage in costume It was a honeypot FCC is letting telecoms off easy Don't buy a Haribo power bank Ransomeware scum Fortinet vulns CISA warns about NVRs Patching MongoDB Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-908

Paul's Security Weekly TV
No FlipperZeros Allowed - PSW #908

Paul's Security Weekly TV

Play Episode Listen Later Jan 8, 2026 125:29


This week in the security news: Supply chain attacks and XSS PS5 leaked keys Claude tips for security pros No Flipper Zeros allowed, or Raspberry PIs for that matter Kimwolf and your local network Linux is good now Removing unremovable apps without root Detecting lag catches infiltrators Defending your KVM Fixing some of the oldest code Deleting websites live on stage in costume It was a honeypot FCC is letting telecoms off easy Don't buy a Haribo power bank Ransomeware scum Fortinet vulns CISA warns about NVRs Patching MongoDB Show Notes: https://securityweekly.com/psw-908

Paul's Security Weekly (Podcast-Only)
No FlipperZeros Allowed - PSW #908

Paul's Security Weekly (Podcast-Only)

Play Episode Listen Later Jan 8, 2026 125:29


This week in the security news: Supply chain attacks and XSS PS5 leaked keys Claude tips for security pros No Flipper Zeros allowed, or Raspberry PIs for that matter Kimwolf and your local network Linux is good now Removing unremovable apps without root Detecting lag catches infiltrators Defending your KVM Fixing some of the oldest code Deleting websites live on stage in costume It was a honeypot FCC is letting telecoms off easy Don't buy a Haribo power bank Ransomeware scum Fortinet vulns CISA warns about NVRs Patching MongoDB Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-908

The Gate 15 Podcast Channel
Weekly Security Sprint EP 140. Kicking off the New Year! Geo-politics, attacking the Grid, Ransomware, and more!

The Gate 15 Podcast Channel

Play Episode Listen Later Jan 6, 2026 18:54


In this week's Security Sprint, Dave and Andy covered the following topics:Warm Open:• Trump suggests US used cyberattacks to turn off lights in Venezuela during strikes• Protests in US cities over Trump's military intervention in Venezuela• Trump Ramps Up Incendiary Threats After Venezuela Strike• White House: RUBIO: This Is Our Hemisphere — and President Trump Will Not Allow Our Security to be Threatened• PMs of Greenland, Denmark tell Trump to stop U.S. takeover threatsMain Topics:Leftwing militants claim responsibility for arson attack on Berlin power grid. Protest over climate crisis and AI has cut power to tens of thousands of homes which may take days to fully restore. The Vulkangruppe (Volcano Group) said it had deliberately targeted some of the city's wealthiest districts.Ransomware:• Recorded Future: New ransomware tactics to watch out for in 2026• Semperis: What CISOs Need to Know About Fighting Ransomware in 2026 • Top 10 Ransomware Groups of 2025MFA: Dozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Risk. This report provides a granular reconstruction of the compromised assets. Furthermore, we demonstrate that these catastrophic security failures were not the result of zero-day exploits in the platform architecture, but rather the downstream effect of malware infections on employee devices combined with a critical failure to enforce Multi-Factor Authentication (MFA).• One criminal, 50 hacked organizations, and all because MFA wasn't turned on. "Because the organizations listed below did not enforce MFA, the attacker walks right in through the front door," the cybersecurity shop said in a Monday report. "No exploits, no cookies – just a password."• Cloud file-sharing sites targeted for corporate data theft attacksAI Deepfakes Are Impersonating Pastors to Try to Scam Their Congregations; Religious communities around the US are getting hit with AI depictions of their leaders sharing incendiary sermons and asking for donations. Quick Hits:• Bleeping Computer: The biggest cybersecurity and cyberattack stories of 2025 • Infosecurity's Top 10 Cybersecurity Stories of 2025• Supply chains, AI, and the cloud: The biggest failures (and one success) of 2025.• Two Americans Plead Guilty to Targeting Multiple U.S. Victims Using ALPHV BlackCat Ransomware• CISA Known Exploited Vulnerabilities Surged 20% in 2025; CISA's Known Exploited Vulnerabilities (KEV) Catalog Grew By 20% In 2025, Including 24 Vulnerabilities Exploited By Ransomware Groups

Security Conversations
Quiet Wins, Loud Failures: A Year-End Cybersecurity Reckoning

Security Conversations

Play Episode Listen Later Dec 26, 2025 199:04


(Presented by ThreatLocker (https://threatlocker.com/threebuddyproblem): Allow what you need. Block everything else by default, including ransomware and rogue code.) Three Buddy Problem - Episode 78: We close out the year with a no-budget, no-permission awards show, spotlighting the cybersecurity stories that actually mattered. Plus, a bizarre polygraph scandal at CISA, Chinese APT research dumps, ransomware pre-notification hiccups, foreign drone bans, and the growing gap between cyber theater and real operational value. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).

X22 Report
Criminal Syndicate Is Being Exposed In Each State, [DS] Countered Again, Think Emissaries – Ep. 3802

X22 Report

Play Episode Listen Later Dec 22, 2025 84:01


Watch The X22 Report On Video No videos found (function(w,d,s,i){w.ldAdInit=w.ldAdInit||[];w.ldAdInit.push({slot:17532056201798502,size:[0, 0],id:"ld-9437-3289"});if(!d.getElementById(i)){var j=d.createElement(s),p=d.getElementsByTagName(s)[0];j.async=true;j.src="https://cdn2.decide.dev/_js/ajs.js";j.id=i;p.parentNode.insertBefore(j,p);}})(window,document,"script","ld-ajs");pt> Click On Picture To See Larger PictureThe [CB][WEF] is struggling, Trump and team has designated the offshore wind projects as a national security risk. They have been paused. The people are still struggling with the [CB] system, soon the people will get their buying power back. The [CB] will try to stop Trump’s new economic system, it will fail. The [DS] is feeling the pain every step of the way. The criminal syndicate money laundering system is being exposed is the blue states. The people are waking up to the real system that has been hidden from them. The [DS] continues to tax the people for the money laundering system. Trump is continually countering the [DS], he is using Emissaries to negotiate the peace deals. The [DS] is blind to the conversation. Economy Trump Administration Announces Change to Offshore Wind Construction  President Donald Trump's Department of the Interior is pausing offshore wind project construction due to “national security risks.” “Due to national security concerns identified by the Department of War, Interior is PAUSING leases for 5 expensive, unreliable, heavily subsidized offshore wind farms!” Interior Secretary Doug Burgum wrote on X. “ONE natural gas pipeline supplies as much energy as these 5 projects COMBINED,” Burgum added. “POTUS is bringing common sense back to energy policy & putting security FIRST!” Leases with Vineyard Wind1, Revolution Wind, CVOW, Sunrise Wind, and Empire Wind will be paused. Source: dailysignal.com https://twitter.com/elonmusk/status/2002605302932517339?s=20 Gas is About to Get Expensive . . . A gallon of gas costs about twice as much in California as it does pretty much anywhere else in the United States. The reason why, of course, is that California makes it cost about twice as much – by reducing supply and by adding costs, chiefly for “environmental” reasons. This includes a new requirement – going into effect very soon (Dec. 31) that all gas stations must either replace single-walled underground storage tanks or permanently close them – no matter whether the tanks are actually leaking and no matter how much it costs to replace them. It is estimated that about 473 gas stations in California are going to close – because the owners cannot afford the mandatory underground storage tank upgrade costs or the $5,000 per day fines for non-compliance. At the same time, the state's regulatory bureaucracy has essentially shut down supply by denying 97 percent of permits for new refineries to supply the extra-special (and extra-expensive) gasoline formulations that all gas stations in California are required to sell. If this hypothetical scenario ends up becoming the actual scenario it could result in the collapse of California as a state. Source:  ericpetersautos.com  https://twitter.com/KobeissiLetter/status/2003104230945464505?s=20  As a % of total employment, multiple jobholders rose to 5.8%, nearly matching the 2 previous highs seen over the last 25 years. At the same time, Americans working primary full-time and secondary part-time jobs jumped to 5.3 million, the 2nd-highest in history. As a % of employment, this metric now stands at 3.4%, the 2nd-highest since 2000. The cost of living crisis is real.   (function(w,d,s,i){w.ldAdInit=w.ldAdInit||[];w.ldAdInit.push({slot:18510697282300316,size:[0, 0],id:"ld-8599-9832"});if(!d.getElementById(i)){var j=d.createElement(s),p=d.getElementsByTagName(s)[0];j.async=true;j.src="https://cdn2.decide.dev/_js/ajs.js";j.id=i;p.parentNode.insertBefore(j,p);}})(window,document,"script","ld-ajs"); https://twitter.com/KobeissiLetter/status/2003109247232655382?s=20 Political/Rights Teary-Eyed Bus Driver Speaks Out After Getting FIRED for Posting a ‘Racially Insensitive' Sign on School Bus Window In Response to Unruly Spanish-Speaking Kid – DOJ to Launch Investigation (VIDEO) An elderly bus driver terminated earlier this year for posting a so-called ‘racially insensitive' sign toward a Spanish-speaking kid has broken her silence and the DOJ is launching an investigation. The note on the window read, “Out of respect to English-only students, there will be no speaking Spanish on this bus.” Crawford, who had served the school district as a bus driver for more than 30 years, was promptly suspended and later lost her job posting the note.  https://twitter.com/_johnnymaga/status/2002937980013650119?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E2002937980013650119%7Ctwgr%5E9387ff3c86f279c9837393510bf08034917fc6bd%7Ctwcon%5Es1_c10&ref_url=https%3A%2F%2Fwww.thegatewaypundit.com%2F2025%2F12%2Fteary-eyed-bus-driver-speaks-after-getting-fired%2F https://twitter.com/AAGDhillon/status/2002952621032677759?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E2002952621032677759%7Ctwgr%5E9387ff3c86f279c9837393510bf08034917fc6bd%7Ctwcon%5Es1_c10&ref_url=https%3A%2F%2Fwww.thegatewaypundit.com%2F2025%2F12%2Fteary-eyed-bus-driver-speaks-after-getting-fired%2F Source: thegatewaypundit.com https://twitter.com/EndWokeness/status/2002782448191693130?s=20 https://twitter.com/C_3C_3/status/2002906389560414648?s=20 SEATTLE https://twitter.com/KeenanPeachy/status/2002902633439445012?s=20 https://twitter.com/PressSec/status/2003099681778499980?s=20 https://twitter.com/FBIDirectorKash/status/2002822669507379549?s=20   This is part of a year long effort FBI has undertaken with state and local law enforcement all across the country to crack down on child abusers and take them off the street. That work has seen historic results. -6,000 children located or reduced – up 22% from 2024 -Nearly 2,000 child predators arrested – up 10% -300+ human traffickers arrested – up 15% Lives being saved. We're not letting up. DOGE Geopolitical https://twitter.com/elonmusk/status/2002602838149697684?s=20 https://twitter.com/AlboMP/status/2002974532475490578?s=20 https://twitter.com/visegrad24/status/2003101218076545039?s=20 Cyberattack disrupts France’s postal service, banking during Christmas rush A suspected cyberattack has knocked France's national postal service and its banking arm offline during the busy Christmas season The postal service, called La Poste, said in a statement that a distributed denial of service incident, or DDoS, “rendered its online services inaccessible.” It said the incident had no impact on customer data, but disrupted package and mail delivery. There was no immediate claim of responsibility.   France and other European allies of Ukraine allege that Russia is waging “hybrid warfare” against them, using sabotage, assassinations, cyberattacks, disinformation and other hostile acts that are often hard to quickly trace back to Moscow. Source:  tribdem.com  War/Peace Kushner and Witkoff Reportedly Draft $112B Plan to Turn Gaza Into ‘Smart City' With Beach Resorts, High-Speed Rail, and AI Grids — U.S. Pushes Back on Claims It Would Foot $60B    Project Sunrise,” envisions a decade-long, $112.1 billion redevelopment effort featuring beachside luxury resorts, high-speed rail, and AI-optimized infrastructure. The draft proposal was developed by a team led by Jared Kushner, President Trump's son-in-law, and U.S. special envoy Steve Witkoff, along with senior White House aide Josh Gruenbaum and other administration officials. The plan is being presented to prospective donor governments via a 32-slide PowerPoint labeled “sensitive but unclassified,” U.S. officials told the Journal. According to the presentation, Project Sunrise would convert Gaza's devastated landscape into a modern coastal metropolis. New Rafah (Credit: Wall Street Journal) Smart City (Credit: Wall Street Journal) However, the proposal does not specify which governments or private entities would ultimately finance the project, nor does it detail where Gaza's roughly two million displaced residents would live during reconstruction, according to WSJ. The draft estimates total costs at $112.1 billion over 10 years, including humanitarian relief, infrastructure rebuilding, and public-sector payrolls. https://twitter.com/StateDept_NEA/status/2002545412729942278?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E2002545412729942278%7Ctwgr%5Ef3310cb42b34b4ad502fd5957962a1d8fbe38397%7Ctwcon%5Es1_c10&ref_url=https%3A%2F%2Fwww.thegatewaypundit.com%2F2025%2F12%2Fkushner-witkoff-reportedly-draft-112b-plan-turn-gaza%2F The proposal also assumes that Gaza could begin to self-fund portions of the development in later years, eventually paying down debt as economic activity expands. Source: thegatewaypundit.com https://twitter.com/disclosetv/status/2003088356876677484?s=20 Macron Seeks New Talks With Putin, Forcing ‘Alternative’ Path To Stalled US Negotiations Suddenly French President Emmanuel Macron is deciding to revive his diplomacy with Moscow and is     Macron wants to step in to force France’s say in any future outcome or settlement, rather than wait on the diplomatic sidelines. Arming Kiev to the teeth has done nothing but prolong the needless killing, and perhaps at least some European capitals are beginning to realize this. Source: zerohedge.com https://twitter.com/BRICSinfo/status/2003114957060137421?s=20   to be killed in a bombing this year.” Russian General Killed By Car Bomb In Moscow, Marks 3rd Top Officer Assassinated In A Year This adds to a growing list of high profile assassinations related to the Ukraine war. To review: —Darya Dugina was killed in a car bombing in 2022 which was likely meant for her father, prominent political thinker and often dubbed “Putin ally” Aleksandr Dugin. —Gen Igor Kirillov died in December 2024 outside of his residence when a bomb planted in a nearby scooter detonated. —Gen Yaroslav Moskalik, who served as deputy head of the Main Operations Directorate of the General Staff of the Russian Armed Forces, was killed in a car bomb attack last April. A “homemade” explosive device detonated under his Volkswagen Golf in a residential neighborhood. Throughout the course of the war there’s been a string of these high profile assassinations on Russian soil involving car and even cafe bombs. America’s CIA or Britain’s MI6 has long been suspected of being involved in these targeted killings, or at least assisting in such brazen Ukrainian-linked operations, but ultimately little has been uncovered or proven in terms of a potential Western hidden hand in this ongoing ‘dirty war’. Source: zerohedge.com https://twitter.com/LeadingReport/status/2002809124674035943?s=20  Medical/False Flags [DS] Agenda DOJ Charges California Food Stamp Official for Sending Benefits to Dead People – Then Spending Them Federal prosecutors have charged a longtime California welfare worker with carrying out a multi-year fraud scheme involving food assistance benefits and dead people. The U.S. Department of Justice announced the arrest of former Madera County benefits eligibility worker Leticia Mariscal, 55, of Madera. Prosecutors alleged that Mariscal stole tens of thousands of dollars in CalFresh benefits by exploiting her access to county databases. CalFresh is California's version of the Supplemental Nutrition Assistance Program. According to the Justice Department, the alleged scheme took place between December 2020 and April 2025. https://twitter.com/FBISacramento/status/1999625371268886611?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1999625371268886611%7Ctwgr%5Ee26f93739a10984d47aeb35b0088270daeb01aef%7Ctwcon%5Es1_c10&ref_url=https%3A%2F%2Fwww.thegatewaypundit.com%2F2025%2F12%2Fdoj-charges-california-food-stamp-official-sending-benefits%2F Source: thegatewaypundit.com https://twitter.com/KevinKileyCA/status/2002791344566411594?s=20   “high-risk.” This means they exhibit serious “waste, fraud, abuse, or mismanagement,” costing taxpayers billions. The number has doubled during Newsom’s tenure. I bet you California fraud is 10 times worse than Minnesota. https://twitter.com/EricLDaugh/status/2002457150904238280?s=20   taxpayer dollars, per NYP. A HUD audit found that at least 221 deceased people received grants. MORE FRAUD! Expose it all! (VIDEO) Thomas Massie and Ro Khanna Announce Plans to Bring Inherent Contempt Charges Against Attorney General Pam Bondi Over Epstein Files – “We're Building a Bipartisan Coalition”  Reps. Thomas Massie (R-KY) and Ro Khanna (D-CA), the authors of the Epstein Files Transparency Act, signed into law by President Trump last month, announced their intention to bring charges for inherent contempt against Attorney General Pam Bondi.  Under the rarely used congressional power, “the House or Senate has its Sergeant-At-Arms, or deputy, take a person into custody for proceedings to be held in Congress,” according to the National Constitution Center. However, it is unclear how effective this would be in the face of legal challenges and the executive branch's power. This is the latest in an escalating saga of threats, with Massie and Khanna claiming the DOJ has not complied fully with the law due to redactions in the files and not releasing every document available. Deputy Attorney General Todd Blanche appeared on NBC's Meet the Press this morning, where he dared Massie and Khanna to “bring it on,” maintaining that the DOJ is simply following the law and taking the necessary time to make redactions before releasing all of the files. Blanche told NBC's Kristen Welker that ensuring victim information is redacted “very much Trumps some deadline in the statute,” and he dared Khanna and Massie to file Articles of Impeachment. “We are complying with the statute, we will continue to comply with the statute, and if by complying with the statute, we don't produce everything on Friday, we produce things next week, and the week after, that's still compliance with the statute,” Blanche added. Source: thegatewaypundit.com Trump is ‘bored, tired and running on fumes’ — and he’s given up the fight: analyst A year into his second term, Donald Trump has undergone a major change in “tactics” as he deflects questions about his policies — and it’s an indication that he is now “just running on fumes,” an analyst wrote Monday. Salon's Amanda Marcotte pointed out that the president has developed an over-reliance on deflecting questions while claiming he is not up to speed on the topic or person he is being asked about, and that often begins with, “I don't know…” That is a change from his previous deflections, where he promised everything would sort itself out in “two weeks.”  Source: rawstory.com President Trump's Plan https://twitter.com/amuse/status/2002836773236306381?s=20   polygraph which they claim he failed to justify keeping their activities secret from Trump’s team. Scott isn’t blocking Plankey because he’s unqualified, he’s blocking him until Trump restores a Coast Guard shipbuilding contract for one of his major political donors Brian D'Isernia – he’s the CEO of Eastern Shipbuilding Group. Scott's hold has blocked Plankey from being included in the bipartisan nominations package the Senate GOP leadership is advancing before year-end. Because the Senate is winding down for the session, that procedural blockage likely means Plankey's nomination will expire unless resubmitted in the next Congress. Career staff at CISA repeatedly denied Acting Director Madhu Gottumukkala access to intelligence programs and urged him not to ask questions. After arranging an illegal polygraph, they used a claimed failure to freeze him out and leak to reporters. DHS acting security chief Michael Boyajian suspended at least six officials for misleading leadership and blocking classified access needed to run the agency. Trump to replace nearly 30 career diplomats in ambassadorial positions with ‘America First' allies The U.S. chiefs of mission in at least 29 countries were informed last week that their tenures would end in January 2026; all of them had taken up their posts in the Biden administration The Trump administration is recalling nearly 30 career diplomats from ambassadorial and other senior embassy posts as it moves to reshape the U.S. diplomatic posture abroad with personnel deemed fully supportive of President Donald Trump's “America First” priorities. All of them had taken up their posts in the Joe Biden administration but had survived an initial purge in the early months of Mr. Trump's second term that targeted mainly political appointees. That changed on Wednesday (December 17, 2025) when they began to receive notices from officials in Washington about their imminent departures.  How Trump shifted America's policy in a week Ambassadors serve at the pleasure of the President, although they typically remain at their posts for three to four years. Those affected by the shake-up are not losing their foreign service jobs but will be returning to Washington for other assignments should they wish to take them, the officials said. Africa is the continent most affected by the removals, with ambassadors from 13 countries being removed: Burundi, Cameroon, Cape Verde, Gabon, Ivory Coast, Madagascar, Mauritius, Niger, Nigeria, Rwanda, Senegal, Somalia and Uganda. Second is Asia, with ambassadorial changes coming to six countries: Fiji, Laos, the Marshall Islands, Papua New Guinea, the Philippines and Vietnam affected. Four countries in Europe (Armenia, Macedonia, Montenegro and Slovakia) are affected; as are two each in the Middle East (Algeria and Egypt); South and Central Asia (Nepal and Sri Lanka); and the Western Hemisphere (Guatemala and Suriname). Source: thehindu.com  Denmark Furious After Trump Names Special Envoy To Greenland Following Landry’s appointment, Rasmussen told Reuters in an emailed statement, “The appointment confirms the continued American interest in Greenland. However, we insist that everyone—including the U.S.—must show respect for the territorial integrity of the Kingdom of Denmark.” This prompted Denmark to summon the U.S. ambassador. Danish officials also summoned the U.S. ambassador in August after a report that at least three people with connections to Trump carried out covert influence operations in Greenland. Source: zerohedge.com Deep State Apoplectic with Trump's Use of Emissaries to Deliver Results President Trump is ducking and weaving through some of the deepest Machiavellian constructs, while maintaining forward progress. To put context to it, these creeps have had four years to strategize how to control Trump and manipulate policy with their retention of all sorts of government agencies in alignment with the status quo.  Yet, remarkably President Trump is dancing through their deep state minefield while keeping dozens of plates spinning on sticks.  The use of non-traditional emissaries is really making them angry.  , the use of emissaries outside the govt framework of traditional policy was going to be a key facet in any America-First agenda. The Deep State does not like President Trump's use of emissaries to conduct foreign policy.  In fact, they oppose it strongly; they hate it. The “emissary” is the person who carries the word of President Trump to any person identified by President Trump.  The emissary is very much like a tape recording of President Trump in human form.  The emissary travels to a location, meets a particular person or group, and then recites the opinion of the President.  The words spoken by the emissary, are the words of President Trump. The IC cannot inject themselves into this dynamic; that is why it is so valuable. The emissary then hears the response from the intended person or group, repeats it back to them to ensure he/she will return with clarity of intent as expressed, and then returns to the office of the presidency and repeats the reply for the President.  The emissary recites back exactly what he was /is told. This process is critical when you understand how thoroughly compromised the full Executive Branch is.  More importantly, this process becomes even more critical when you accept the Intelligence Community will lie to the office of the President to retain their power and position. (read more) Source: theconservativetreehouse.com https://twitter.com/TheStormRedux/status/2002736237996646560?s=20   signature on the absentee ballot he didn't even ask for. It was clearly forged. @GaSecofState please explain how this is a “clerical error.” https://twitter.com/CynicalPublius/status/2002795573490143432?s=20   3. The Congress of the United States shall determine the type and nature of documents that qualify as valid proof of citizenship for purposes of voting in federal elections. 4. Any federal, state or local official who knowingly allows any person to vote in federal elections without such proof of citizenship being validly presented shall be subject to such criminal penalties as the Congress of the United States may prescribe. 5. In the event of any conflict between this Amendment and Article 1, Section 4, the terms of this Amendment shall control. (function(w,d,s,i){w.ldAdInit=w.ldAdInit||[];w.ldAdInit.push({slot:13499335648425062,size:[0, 0],id:"ld-7164-1323"});if(!d.getElementById(i)){var j=d.createElement(s),p=d.getElementsByTagName(s)[0];j.async=true;j.src="//cdn2.customads.co/_js/ajs.js";j.id=i;p.parentNode.insertBefore(j,p);}})(window,document,"script","ld-ajs");

The CyberWire
Everything old is new again.

The CyberWire

Play Episode Listen Later Dec 22, 2025 31:40


NATO suspects Russia is developing a new anti-satellite weapon to disrupt the Starlink network. A failed polygraph sparks a DHS probe and deepens turmoil at CISA. A look back at Trump's cyber policy shifts. MacSync Stealer adopts a stealthy new delivery method.  Researchers warn a popular open-source server monitoring tool is being abused. Cyber criminals are increasingly bypassing technical defenses by recruiting insiders. Scripted Sparrow sends millions of BEC emails each month. Federal prosecutors take down a global fake ID marketplace. Monday business brief. Our guest is Eric Woodruff, Chief Identity Architect at Semperis, discussing "NoAuth Abuse Alert: Full Account Takeover." Atomic precision meets Colorado weather. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today on our Industry Voices, we are joined by Eric Woodruff, Chief Identity Architect at Semperis, discussing "NoAuth Abuse Alert: Full Account Takeover." Tune into the full conversation here. Selected Reading Starlink in the crosshairs: How Russia could attack Elon Musk's conquering of space (AP News) Project West Ford (Wikipedia) Acting CISA director failed a polygraph. Career staff are now under investigation (POLITICO) Dismantling Defenses: Trump 2.0 Cyber Year in Review (Krebs on Security) MacSync macOS Malware Distributed via Signed Swift Application (SecurityWeek) From ClickFix to code signed: the quiet shift of MacSync Stealer malware (Jamf)  Hackers Abuse Popular Monitoring Tool Nezha as a Stealth Trojan (Hackread) Cyber Criminals Are Recruiting Insiders in Banks, Telecoms, and Tech (Check Point) Scripted Sparrow Sends Millions of BEC Emails Each Month (Infosecurity Magazine) FBI Seizes Fake ID Template Domains Operating from Bangladesh (Hackread) Adaptive Security raises $81 million in a Series B round led by Bain Capital Ventures. (N2K Pro) NIST tried to pull the pin on NTP servers after blackout caused atomic clock drift (The Register) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
Where encryption meets executive muscle.

The CyberWire

Play Episode Listen Later Dec 19, 2025 27:37


Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure.  LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Amazon blocks more than 1,800 North Korean operatives from joining its workforce. CISA releases nine new Industrial Control Systems advisories. The U.S. Sentencing Commission seeks public input on deepfakes. Prosecutors indict 54 in a large-scale ATM jackpotting conspiracy. Our guest is Nitay Milner, CEO of Orion Security, discussing the issue with data leaking into AI tools, and how CISOs must prioritize DLP. Riot Games finds cheaters hiding in the BIOS. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Nitay Milner, CEO of Orion Security, discusses the issue with data leaking into AI tools, and how CISOs must prioritize DLP. Selected Reading Trump signs defense bill allocating millions for Cyber Command, mandating Pentagon phone security (The Record) Denmark blames Russia for destructive cyberattack on water utility (Bleeping Computer) New China-linked hacker group spies on governments in Southeast Asia, Japan (The Record) 'Kimwolf' Android Botnet Ensnares 1.8 Million Devices (SecurityWeek) New critical WatchGuard Firebox firewall flaw exploited in attacks (Bleeping Computer) Amazon blocked 1,800 suspected DPRK job applicants (The Register) CISA Releases Nine Industrial Control Systems Advisories (CISA.gov) U.S. Sentencing Commission seeks input on criminal penalties for deepfakes (CyberScoop) US Charges 54 in Massive ATM Jackpotting Conspiracy (Infosecurity Magazine) Riot Games found a motherboard security flaw that helps PC cheaters (The Verge) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Risky Business
Risky Business #819 -- Venezuela (credibly?!) blames USA for wiper attack

Risky Business

Play Episode Listen Later Dec 17, 2025 54:05


In the final show of 2025, Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: React2Shell attacks continue, surprising no one The unholy combination of OAuth consent phishing, social engineering and Azure CLI Venezuela's state oil firm gets ransomware'd, blames US… but what if it really is a US cyber op?! Russian junk-hacktivist gets indicted for cybering critical… err… a car wash and a fountain Microsoft finally turns RC4 off by default in Active Directory Kerberos Traefik's TLS verify=on … turns it off, whoopsie

The CyberWire
One rule to rule them all.

The CyberWire

Play Episode Listen Later Dec 12, 2025 28:47


A new executive order targets states' AI regulations, while the White House shifts course on an NSA deputy director pick. The UK fines LastPass over inadequate security measures. Researchers warn of active attacks against Gladinet CentreStack instances. OpenAI outlines future cybersecurity plans. MITRE ranks the top 25 vulnerabilities of 2025. CISA orders U.S. federal agencies to urgently patch a critical GeoServer vulnerability. An anti-piracy coalition shuts down one of India's most popular illegal streaming services. Our guest Mark Lance, Vice President, DFIR & Threat Intelligence, GuidePoint Security, unpacks purple team table top exercises to prepare for AI-generated attacks. Hackers set their sights on DNA. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Mark Lance, Vice President, DFIR & Threat Intelligence, GuidePoint Security, is discussing purple team table top exercises to prepare for AI-generated attacks. Selected Reading Trump Signs Executive Order to Block State AI Regulations (SecurityWeek) Announced pick for No. 2 at NSA won't get the job as another candidate surfaces (The Record) LastPass Data Breach — Insufficient Security Exposed 1.6 Million Users (Forbes) Gladinet CentreStack Flaw Exploited to Hack Organizations (SecurityWeek) OpenAI lays out its plan for major advances in AI cybersecurity features (SC Media) MITRE Releases 2025 List of Top 25 Most Dangerous Software Vulnerabilities (SecurityWeek) CISA orders feds to patch actively exploited Geoserver flaw (Bleeping Computer) MKVCinemas streaming piracy service with 142M visits shuts down (Bleeping Computer) The Unseen Threat: DNA as Malware (BankInfoSecurity) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices