POPULARITY
Categories
Additional Links & Resources:Learn more about Supply Chain Now: https://supplychainnow.comWatch and listen to more Supply Chain Now episodes here: https://supplychainnow.com/program/supply-chain-nowSubscribe to Supply Chain Now on your favorite platform: https://supplychainnow.com/joinWork with us! Download Supply Chain Now's NEW Media Kit: https://bit.ly/3XH6OVkThis episode is hosted by Scott Luton and Kevin L. Jackson and produced by Trisha Cordes, Joshua Miranda, and Amanda Luton. For additional information, please visit our dedicated show page at: https://supplychainnow.com
"I'm a fifty terrabyte, self-evolving, neural network, double backflip off the high platform. I'm not a swan dive." For the next entry in our Virtual Insanity series, we're diving headfirst into the world of early virtual reality—and the filmmaker who helped bring it to the big screen. This week, we're going behind the scenes on VIRTUOSITY, the 1995 cyber thriller starring Denzel Washington and Russell Crowe. But before we get there, we're rewinding to 1992's THE LAWNMOWER MAN —the first film to seriously tackle VR on screen and the movie that launched director Brett Leonard's Hollywood career. We'll explore how THE LAWNMOWER MAN came to be, why it sparked a legal battle with Stephen King, and how its unexpected success set the stage for VIRTUOSITY, a film that had already been in development long before Leonard came aboard. It's a double feature of tech-noir chaos, '90s visual effects, and the strange, glitchy dream of cyberspace. Want to support the show? Subscribers of CinemaShock+ can enjoy an extended version of this episode, which includes bonus segments and additional content, plus get access to all episodes two days early, exclusive merchandise discounts, and more. Join now at cinemashock.net/plus. ASSOCIATE PRODUCERS: Andy Lancaster | asotirov | Benjamin Yates | Caverly | courtland ashley | curtcake5k | Elton Novara | Hunter D Mackenzie | Interzone78 | Jackson_Baker | Jvance325 | Lucy Lawson | MagicBloat | Nate Izod | Nathan Kelley | Robert Stinson Theme Song: "There's Still a Little Bit of Time, If We Hurry and I Mean Hurry" by Slasher Film Festival Strategy. This episode was written, produced and edited by Gary Horne, Justin Bishop & Todd A. Davis. For episode archives, merch, show notes, and more, visit cinemashock.net
CannCon and Chris Paul kick off this episode with a bold new Truth Social post from President Trump, doubling down on 2020 election fraud and reigniting debate over the stolen election narrative. They unpack the timing and implications of Trump's message, tying it to the ongoing silence from the Supreme Court on his presidential immunity case and what that delay could signal behind the scenes. The hosts also spotlight stunning congressional testimony from General Paul Nakasone, confirming that the Pentagon used psychological operations against the American public via social media, an admission that validates years of “conspiracy theory” warnings about government-led narrative control. From crumbling war propaganda to emerging signs of internal regime panic, CannCon and Chris expose how the media's grip is slipping and why the information war is intensifying. With sharp commentary, insider analysis, and a clear call for discernment, this episode pulls back the curtain on the real battlefield: the minds of the people.
Welcome to The Chrisman Commentary, your go-to daily mortgage news podcast, where industry insights meet expert analysis. Hosted by Robbie Chrisman, this podcast delivers the latest updates on mortgage rates, capital markets, and the forces shaping the housing finance landscape. Whether you're a seasoned professional or just looking to stay informed, you'll get clear, concise breakdowns of market trends and economic shifts that impact the mortgage world.In today's episode, we go through the Fed's latest calculus surrounding its rate decision. Plus, Robbie sits down with Verisk's Kingsley Greenland to discuss why an unusually active hurricane season may collide with weakening forecasting infrastructure, leadership gaps at FEMA, and political headwinds. And we close with a look at why we didn't see much interest rate movement this week.Thank you to TRUE and its Mortgage Operations Service (MOS) platform, which transforms borrower documents into instant, trustworthy data for real-time decisioning. TRUE cuts time to critical loan events from days to minutes by using background AI workers to instantly validate data and automate underwriting decisions.
In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft discuss military AI, cyber warfare in the Middle East, the week in cyber security, and why the Pope is coming out swinging against AI. Hollingworth and Croft kick things off with AI news, including AI tech bros earning a military commission in the efforts to build battlefield AI and creators in the UK being told their art can, in fact, be used to train AI models. The pair then discuss the uptick in cyber activity due to the current conflict between Israel and Iran, as hacktivists on both sides take up digital arms. The discussion then moves on to the takedown of a prominent darknet drug market, and some of the big Australian hacks of the week. Hollingworth and Croft wind up with some good news, including the Pope siding with workers and creatives against the rise of AI, and some good AI news as USNW researchers work to develop a chatbot for hospital emergency departments. Enjoy the podcast, The Cyber Uncut team
Title: “These Aren't Soft Skills — They're Human Skills”A Post–Infosecurity Europe 2025 Conversation with Rob Black and Anthony D'AltonGuestsRob BlackUK Cyber Citizen of the Year 2024 | International Keynote Speaker | Master of Ceremonies | Cyber Leaders Challenge | Professor | Community Builder | Facilitator | Cyber Security | Cyber Deceptionhttps://www.linkedin.com/in/rob-black-30440819/Anthony D'AltonProduct marketing | brand | reputation for cybersecurity growthhttps://www.linkedin.com/in/anthonydalton/HostsSean Martin, Co-Founder at ITSPmagazineWebsite: https://www.seanmartin.comMarco Ciappelli, Co-Founder, CMO, and Creative Director at ITSPmagazineWebsite: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974___________ Yes, Infosecurity Europe 2025 may be over, but the most important conversations are just getting started — and they're far from over. In this post-event follow-up, Marco Ciappelli reconnects from Florence with Rob Black and brings in Anthony D'Alton for a deep-dive into something we all talk about but rarely define clearly: so-called soft skills — or, as we prefer to call them… human skills.From storytelling to structured exercises, team communication to burnout prevention, this episode explores how communication, collaboration, and trust aren't just “nice to have” in cybersecurity — they're critical, measurable capabilities. Rob and Anthony share their experience designing real-world training environments where people — not just tools — are the difference-makers in effective incident response and security leadership.Whether you're a CISO, a SOC leader, or just tired of seeing tech get all the credit while humans carry the weight, this is a practical, honest conversation about building better teams — and redefining what really matters in cybersecurity today.If you still think “soft skills” are soft… you haven't been paying attention.⸻Keywords: Cybersecurity, Infosecurity Europe 2025, Soft Skills, Human Skills, Cyber Resilience, Cyber Training, Security Leadership, Incident Response, Teamwork, Storytelling in Cyber, Marco Ciappelli, Rob Black, Anthony Dalton, On Location, ITSPmagazine, Communication Skills, Cyber Crisis Simulation, RangeForce, Trust in Teams, Post Event Podcast, Security Culture___________ResourcesLearn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Cyber criminals have seriously damaged some household names recently - M&S, Co-op, North Face, Harrods - but what really happens behind the scenes when a business is hacked?Evan Davis speaks to the former head of information security at Royal Mail about the major attack it suffered in 2023 - from the initial alert and the eye-watering ransom demand, to the media leak and the long, slow rebuild.Plus, how should you negotiate with hackers, how sophisticated have they become, and how do they choose their victims?Evan is joined by:Jon Staniforth, former Chief Information Security Officer (CISO) at Royal Mail; Lisa Forte, founder and partner, Red Goat.Production team:Producer: Simon Tulett Editor: Matt Willis Sound: Nathan Chamberlain and James Beard Production co-ordinator: Sophie Hill and Janet Staples
[AAA] In 'Access All Areas' shows we go behind the scenes with the crew and their friends as they dive into complex challenges that organizations face—sometimes getting a little messy along the way.This week, we address the ‘big rocks' that can obstruct or delay successful outcomes in organizational transformations. Dave, Esmee, and Rob are joined by Jasmin Booth, Head of Product Delivery to discuss the transformation to being a (digital) product based organization.TLDR05:22 Access All Areas: This third episode focuses on the products we build that drive outcomes.06:52 Conversation with Jasmin about our digital products37:06 What makes it better to be in a product centric organization? 54:00 Conclusion of the seven Big Rocks and how to smash them59:00 Going on the Blue Bell railway HostsDave Chapman: https://www.linkedin.com/in/chapmandr/Esmee van de Giessen: https://www.linkedin.com/in/esmeevandegiessen/Rob Kernahan: https://www.linkedin.com/in/rob-kernahan/with Jasmin Booth: https://www.linkedin.com/in/jasminbooth15/ProductionMarcel van der Burg: https://www.linkedin.com/in/marcel-vd-burg/Dave Chapman: https://www.linkedin.com/in/chapmandr/SoundBen Corbett: https://www.linkedin.com/in/ben-corbett-3b6a11135/Louis Corbett: https://www.linkedin.com/in/louis-corbett-087250264/'Cloud Realities' is an original podcast from Capgemini
If you like what you hear, please subscribe, leave us a review and tell a friend!
In this RSA Conference 2025 special episode, we dive into the evolving world of cyber attribution, AI-powered threat tactics, and real-world incident response in AWS and GCP environments. Our guests include: ● Tal Darsan and Etay Maor from Cato Networks, discussing stealthy attacker techniques, AI-powered evasion, and lessons from ransomware groups like Medusa, Play, and Hunters International. ● Yonaten Khen from Hunters, who walks us through how his team discovered a privilege escalation vulnerability in Google Workspace and what it reveals about modern cloud attacks.
Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard: https://mastercard.us/en-us.html
Quem foi que inventou esse negócio de labubu? Você usaria um tribufu na bolsa? Qual a linha que separa a piada de peido do assédio moral? Vem pro Vortex da semana com @katbarcelos e @odeiopepe pra descobrir. Acesse o link do Vortex e ganhe 15% de desconto na sua matrícula na Alura: https://www.alura.com.br/vortex ou CUPOM: VORTEX Desconto especial nos planos usando o nosso link no Nordvpn: https://nordvpn.com/vortexpod ou CUPOM: VORTEXPOD Host: Katiucha Barcelos. Instagram: @katbarcelos | Twitter/X: @katiucha Co-Host: Pedro Pinheiro. Instagram: @odeiopepe | Twitter/X: @OdeioPePe Nossas redes sociais: Instagram: @feedvortex Bluesky: @feedvortex.bsky.socia Twitter: @feedvortex Tiktok: @feedvortex Reddit: r/feedvortex Grupo paralelo não-oficial do Vortex no telegram: https://t.me/+BHlkG92BfPU5Zjdh Esse grupo é dos ouvintes, para os ouvintes e pelos ouvintes. Não temos qualquer afiliação oficial ou responsabilidade por QUALQUER COISA falada neste grupo Link do post do episódio nas redes sociais: Instagram: Twitter: Links comentados no episódio: Labubu de One Piece Novos produtos genuínos quentes em estoque labubu uma peça cooperação luffy caixa cega bonecas brinquedos de moda presentes decorativos de alta qualidade - AliExpress Metrópoles Vida&Estilo | Depois dos Lafufus “nascerem” como uma versão baixo custo dos Labubus, os internautas usaram as redes sociais para mostrar as diferenças... | Instagram Labubu: o que é boneco que virou febre mundial e teve venda suspensa no Reino Unido por 'motivos de segurança' | Pop & Arte | G1 Laranja (indivíduo) – Wikipédia, a enciclopédia livre Mulher rouba carro do ex e fura 49 sinais vermelhos como vingançaExpus meu ex-namorado infiel da maneira mais letal no trabalho dele — as mulheres dizem que é uma vingança de "10/10" Adivinhe meu peido 01 Adivinhe meu peido 02 Inspiração para vingaça de ex namorado Produção: Thyara Castro, Bruno Azevedo e Aparecido Santos Edição: Joel Suke Ilustração da capa: Brann Sousa
If you like what you hear, please subscribe, leave us a review and tell a friend!
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Extracting Data From JPEGs Didier shows how to efficiently extract data from JPEGs using his tool jpegdump.py https://isc.sans.edu/diary/A%20JPEG%20With%20A%20Payload/32048 Windows Recall Export in Europe In its latest insider build for Windows 11, Microsoft is testing an export feature for data stored by Recall. The feature is limited to European users and requires that you note an encryption key that will be displayed only once as Recall is enabled. https://blogs.windows.com/windows-insider/2025/06/13/announcing-windows-11-insider-preview-build-26120-4441-beta-channel/ Anubis Ransomware Now Wipes Data The Anubis ransomware, usually known for standard double extortion, is now also wiping data preventing any recovery even if you pay the ransom. https://www.trendmicro.com/en_us/research/25/f/anubis-a-closer-look-at-an-emerging-ransomware.html Mitel Vulnerabilities CVE-2025-47188 Mitel this week patched a critical path traversal vulnerability (sadly, no CVE), and Infoguard Labs published a PoC exploit for an older file upload vulnerability. https://labs.infoguard.ch/posts/cve-2025-47188_mitel_phone_unauthenticated_rce/ https://www.mitel.com/support/mitel-product-security-advisory-misa-2025-0007
FINRA Forward—New Initiatives to Support Members, Markets, and the Investors They ServeFINRA360Request for Comment on Capital Formation Rules, Guidance and ProcessesRequest for Comment on Modern Workplace Rules, Guidance and ProcessesRequest for Comment on Associated Persons' Outside ActivitiesStatement to Correct Misinformation About Outside Activities ProposalBroad Review to Modernize Rules Regarding Member Firms and Associated PersonsProposed Rule Change to Modify the Implementation Schedule Regarding Corporate Financing FeesProposed Rule Change on Transaction ReportingEngage With FINRA Find us: LinkedIn / X / YouTube / Facebook / Instagram / E-mail
Are you leading a cybersecurity sales team aiming for responsible, accelerated growth—but unsure how to scale without just adding headcount? Do you struggle to shift your messaging above the noise and communicate true business outcomes? Are you balancing highly technical sales cycles with the need to engage business buyers? If any of this sounds familiar, this episode is for you.In this conversation we discuss:
If you like what you hear, please subscribe, leave us a review and tell a friend!
Financial due diligence is common practice when companies merge or one business acquires another. Cyber security due diligence, however, is not quite as common. Yet, in a world where the threat landscape changes by the day and risk is growing increasingly complex, solid cyber security practices are more important than ever. Today, Steve and Tavia dig into this very topic, and, more specifically, what role cyber security has in a merger or an acquisition. How is a cyber security review done? Why are they important? How do we balance speed with thoroughness? How do we interpret the results? There's a lot to dig into here. Key Takeaways: Cyber due diligence is paramount in a corporate acquisition or merger. Risks of not doing cyber due diligence include both financial and reputational. Cyber due diligence is a team game. Tune in to hear more about: Who should be responsible for conducting the cyber review (4:34) How organizations can build cyber into their due diligence process (14:05) Examples of where insufficient cyber due diligence proved costly (19:05) Standout Quotes: “You can't play a team sport without a team. And for me, M&A is a team game. You can't go it alone. I think it would be a mistake for somebody to think that they could do this kind of work solo. Because as we've seen with cyber maturing, it now touches so many different parts of the organization. You do need to be involved.” - Steve Durbin “I think people are getting it. What I'm seeing now is people get it, but they don't know how to do it. That's where the cyber professional really now has to step up.” - Steve Durbin “Pre-deal, I think it is about being focused. It's about identifying, prioritizing the high risk areas that are out there that you want to look into. It's about doing things like making sure that the governance is there. It's about scanning for some of the known vulnerabilities. If you are in one particular market sector and you're buying a company in another because of expansion growth, you're going to need to be covering off a whole range of different things that perhaps might be unusual for you because you haven't been having to look into those areas.” - Steve Durbin Read the transcript of this episode Subscribe to the ISF Podcast wherever you listen to podcasts Connect with us on LinkedIn and Twitter From the Information Security Forum, the leading authority on cyber, information security, and risk management.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Katz Stealer in JPG Xavier found some multistage malware that uses an Excel Spreadsheet and an HTA file to load an image that includes embeded a copy of Katz stealer. https://isc.sans.edu/diary/More+Steganography/32044 https://unit42.paloaltonetworks.com/malicious-javascript-using-jsfiretruck-as-obfuscation/ JavaScript obfuscated with JSF*CK is being used on over 200,000 websites to direct victims to malware Expired Discord Invite Links Used for Malware Distribution Expired discord invite links are revived as vanity links to direct victims to malware sites https://research.checkpoint.com/2025/from-trust-to-threat-hijacked-discord-invites-used-for-multi-stage-malware-delivery/
Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcastAndre McGregor of ForceMetrics shares his incredible journey from reluctant FBI recruit to cybersecurity entrepreneur. Despite initially declining the FBI's recruitment call, Andre went on to become a special agent, tackling high-profile cybercrime cases involving nation-state actors like China, Russia and Iran. Growing up in marginalized communities shaped his commitment to creating safer police-community interactions, leading him to develop ForceMetrics — a platform that gives law enforcement officers real-time contextual data to make better decisions and de-escalate situations. This episode dives deep into cybercrime investigation techniques, the challenges of building secure law enforcement technology, and how data can transform public safety.0:00 - Intro to today's episode1:36 - Cybersecurity Salary Guide2:31 - Meet Andre McGregor4:03 - Early tech experiences and nonprofit work10:50 - FBI recruitment story and cybercrime work15:30 - Nation-state hacking investigations25:28 - Creating ForceMetrics platform29:45 - How ForceMetrics works in practice38:48 - Technical security challenges42:00 - Future of AI in law enforcement43:00 - Career advice for security professionals47:20 - Best career advice received49:20 - More about ForceMetrics and contact infoView Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcastAbout InfosecInfosec's mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ's security awareness training. Learn more at infosecinstitute.com.
In this episode, host Rob Wermuth is joined by Jason Frank, Chief Operating Officer at SpecterOps, to explore one of the most critical issues facing businesses today: cybersecurity. With a background in penetration testing, threat hunting, and enterprise security operations, Jason shares insights from years on the front lines of digital defense. They discuss the rise of ransomware, the impact of artificial intelligence on risk, and how zero trust models are reshaping security in a remote-first world. Jason breaks down complex topics into practical steps that business owners, especially those leading small to mid-sized companies, can act on today. From strengthening password protocols to implementing multi-factor authentication and managing identity risk, Jason offers clear, actionable advice. He also explains how tools like BloodHound can reveal vulnerabilities that often go unnoticed. Looking ahead, the conversation touches on balancing innovation with privacy, preparing the next generation of cybersecurity talent, and why an annually reviewed cyber action plan is essential to long-term business value. If you are thinking about how to better protect your organization, clients, and legacy in an increasingly digital world, this episode is filled with timely and practical guidance. ____________________________ Legacy Planning- 3440 Hamilton Blvd Allentown, PA 18103 and 228 W Gay Street West Chester, PA 19380 610-719-8600 www.legacy-online.com Legacy Planning offers securities and advisory services through Commonwealth Financial Network®, Member FINRA/SIPC, a Registered Investment Adviser. Legacy Planning is owned by HUB International. HUB and Commonwealth are separate and unrelated entities.
If you like what you hear, please subscribe, leave us a review and tell a friend!
In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss a recent cyber attack on WestJet that disrupted their internal systems. They explore the implications of such attacks on customer trust and the importance of business continuity and disaster preparedness in the airline industry. The conversation emphasizes the need for companies to regularly practice their response strategies to minimize disruptions and maintain customer confidence. Article: WestJet investigates cyberattack disrupting internal systems https://www.bleepingcomputer.com/news/security/westjet-investigates-cyberattack-disrupting-internal-systems/amp/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExemhlUE13VllqaVpYTXFZdQEe7PkHNFkUykUmEjWWsD47-JE8XPZl7WtGcUYnPWR2zduROL1rlTltSpqtBHs_aem_v2_hJR0romIRFNnykYIcwA Please LISTEN
Discover the devastating effects of anonymous online abuse as Cathy Martin bravely shares her story Hosted on Acast. See acast.com/privacy for more information.
On "Forbes Newsroom," Mark Montgomery, Retired Rear Admiral and senior director of the Center on Cyber and Technology Innovation at the Foundation for Defense of Democracies, discussed the conflict between Israel and Iran, President Trump's response, and what outright hostility between the two nations means for the Middle East.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Podcast: Industrial Cybersecurity InsiderEpisode: Reflections from the Front Lines of Industrial Cyber FailuresPub date: 2025-06-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this rewind episode, cybersecurity leaders revisit some of the hardest-hitting truths about protecting critical infrastructure in an increasingly converged IT/OT world. This conversation explores the disconnect between IT theory and OT reality, from the real-world fallout of the CrowdStrike disruption to the challenges of virtual patching, insider threats, and the cloud's role on the plant floor. The discussion exposes how legacy systems, poor collaboration, alert fatigue, and vendor dependency continue to sabotage industrial cybersecurity. They discuss tactical strategies for improving, from asset inventory and patching hygiene to choosing the right partners and walking the plant floor.Chapters:00:00:00 - Cyber threats are moving faster than your patch cycle00:00:47 - Crowdstrike, Virtual Patching and Industrial OT Environments with Debbie Lay, TXOne Networks00:07:48 - The #1 Myth Putting Your Industrial OT Assets at Risk00:15:01 - Patch Management and Software Updates: IT versus OTLinks And Resources:Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft talk about furry hacking collectives, a spree of ransomware attacks targeting Australian healthcare organisations, and good news for farmers. Hollingworth and Croft start their chat by catching up on a defacement campaign targeting a website administered by the US Department of Health and Human Services. AI-generated images of furries suddenly appeared overnight on the site, with the identity of the hackers – and whether or not they're furries themselves – currently unknown. The pair then get more serious as they discuss the rapid rise of a new ransomware operation and its attacks on Australian healthcare providers. Global only started operating in June but already has three Aussie victims. Hollingworth and Croft discuss who the hackers might be and what their plans are for the future. Finally, the pair talk about some good news, with free new cyber security education resources being made available to Aussie farmers and the ACMA's push to make telcos more supportive of the victims of domestic violence. Enjoy the podcast, The Cyber Uncut team
After skipping Patch 14.5 (Dishsoap was sick but he's better now) Frodan and Dishsoap are back to break down Patch 14.6. They talk through the new system changes like loot and item updates and how they've shifted the meta. Exotech is back on top as the strongest comp and they wrap things up with a deep dive into the Graves reroll comp, when to play it, how it works, and why it's one of the most reliable carries in the patch.Find all the comps talked about in this episode and more meta topics on https://tftacademy.com/ Follow the daily updated comps tier list here: https://tftacademy.com/tierlist/comps
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Automated Tools to Assist with DShield Honeypot Investigations https://isc.sans.edu/diary/Automated%20Tools%20to%20Assist%20with%20DShield%20Honeypot%20Investigations%20%5BGuest%20Diary%5D/32038 EchoLeak: Zero-Click Microsoft 365 Copilot Data Leak Microsoft fixed a vulnerability in Copilot that could have been abused to exfiltrate data from Copilot users. Copilot mishandled instructions an attacker included in documents inspected by Copilot and executed them. https://www.aim.security/lp/aim-labs-echoleak-blogpost Thunderbolt Vulnerability Thunderbolt users may be tricked into downloading arbitrary files if an email includes a mailbox:/// URL. https://www.mozilla.org/en-US/security/advisories/mfsa2025-49/
Three Buddy Problem - Episode 50: This week, we dissect cyber flashpoints in the Iran-Israel war, revisit the “magnet of threats” server in Iran that attracted APTs from multiple nation-states, and react to Israel's Mossad sneaking explosive drone swarms deep into Iran to support airstrikes. Plus, Stealth Falcon's new WebDAV zero-day, SentinelOne's brush with Chinese APTs, Citizen Lab's forensic takedown of Paragon's iPhone spyware, and the sneaky Meta/Yandex trick that links Android web browsing to app IDs. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).
"I can carry nearly eighty gigs of data in my head." For our Cinema Shock summer series, we wanted to take a look back at a few movies that were celebrating significant anniversaries this year. When we began browsing films released in 1995, we noticed an interesting trend: There was a glut of cyber thrillers released that year. And more specifically, cyber thrillers that dealt with the concept of virtual reality. This probably shouldn't be surprising: 1995 was a banner year for technology; with the release of Windows 95 and the increasing availability of home internet, more people than ever were being connected to the World Wide Web. And as we know, Hollywood loves a trend. Enter: Virtual Insanity. In this series, we'll be exploring some of the more significant films of this very specific subgenre, all of which are celebrating their 30th anniversary this year. Most of these films fell flat at the box office in 1995 but all have reached varying degrees of notoriety in the decades since. Kicking things off, we're taking a look at JOHNNY MNEMONIC, possibly the strangest of the bunch. It's a film with a long, complex production history whose journey from page (in a short story by cyberpunk legend William Gibson) to screen was fraught with delays, difficulties and compromises. In our last episode, we detailed the early days of JOHNNY MNEMONIC's development and filming. This week, we'll focus on the film's contentious post production period, where the Hollywood execs responsible for marketing the film tried to turn it into something it was never intended to be, hoping to capitalize on the newfound post-SPEED superstardom of Keanu Reeves. We'll also get into our own thoughts on the film's legacy, as well as how its views of the internet and global connectivity are still relevant today. Next week: We continue our look at the cyber thrillers of 1995 with an often-overlooked film that stars two of Hollywood's biggest names. Want to support the show? Subscribers of CinemaShock+ can enjoy an extended version of this episode, which includes the full story of JOHNNY MNEMONIC (Parts 1 and 2), as well as bonus segments and additional content, plus get access to all episodes two days early, exclusive merchandise discounts, and more. Join now at cinemashock.net/plus. ASSOCIATE PRODUCERS: Andy Lancaster | asotirov | Benjamin Yates | Caverly | courtland ashley | curtcake5k | Elton Novara | Hunter D Mackenzie | Interzone78 | Jackson_Baker | Jvance325 | Lucy Lawson | MagicBloat | Nate Izod | Nathan Kelley | Robert Stinson Theme Song: "There's Still a Little Bit of Time, If We Hurry and I Mean Hurry" by Slasher Film Festival Strategy. This episode was written, produced and edited by Gary Horne, Justin Bishop & Todd A. Davis. For episode archives, merch, show notes, and more, visit cinemashock.net
Cyber attack on Whole Foods last week which will affect store shelves. Boil Water effect in several neighborhoods in DC MD will see some relief in their energy bill. Make sure to also keep up to date with ALL our podcasts we do below that have new episodes every week:The Thought ShowerLet's Get WeirdCrisis on Infinite Podcasts
S.O.S. (Stories of Service) - Ordinary people who do extraordinary work
Send us a textIn this powerful episode, we sit down with Paul Pearson, a seasoned IT professional and mission-driven leader whose journey took a life-altering turn after he unintentionally blew the whistle while contracting for the Department of Defense. What followed was a deep dive into ethical leadership, digital justice, and community empowerment.Paul brings over 15 years of IT experience, including a decade of service in the U.S. Air Force with expertise in digital forensics and cyberspace operations. He now leads Running Name LLC, a veteran-owned business offering cybersecurity, managed IT, and digital strategy to nonprofits and small businesses.But Paul's work doesn't stop there. He also serves as: • President of Eduruna • Vice President of Whistleblowers of America • Director of Information at Blacks in CyberHis 2019 whistleblower experience involving corporate espionage retaliation now fuels his advocacy for safer, more inclusive, and tech-enabled workplaces.Topics Covered: • Paul's transition from military to IT entrepreneur • Blowing the whistle: what really happened and what came next • The importance of ethical leadership in tech • Building secure, scalable solutions for nonprofits and small businesses • The mission of Eduruna and empowering through education • Why community matters in cybersecurity • Lessons in resilience, retaliation, and redemptionConnect with Paul: • LinkedIn: https://www.linkedin.com/in/paulpearson85?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=ios_app • Running Name LLC: https://www.runningname.com/ • Eduruna.org: https://www.eduruna.org/Support the showVisit my website: https://thehello.llc/THERESACARPENTERRead my writings on my blog: https://www.theresatapestries.com/Listen to other episodes on my podcast: https://storiesofservice.buzzsprout.comWatch episodes of my podcast:https://www.youtube.com/c/TheresaCarpenter76
If you like what you hear, please subscribe, leave us a review and tell a friend!
Jen Easterly led the agency keeping the US safe from cyber attacks for four years. She’s worried about where things have gone over the past few months. Emma Nelson discusses her life of service.See omnystudio.com/listener for privacy information.
As artificial intelligence becomes deeply embedded in how businesses operate—from decision-making to customer service—new risks are emerging that many companies aren't prepared for. On the podcast we explore how cyber insurance can respond to AI-related exposures, from flawed algorithms to deepfake-driven fraud. Contact Tuscano Like and Follow us on Facebook and Instagram RSVP for our NEW webinars today! Email us at marketing@tuscano.com Thanks for listening!
Podcast: KBKAST (LS 31 · TOP 5% what is this?)Episode: Episode 314 Deep Dive: Imran Husain | Cybersecurity Threats in the Manufacturing WorldPub date: 2025-06-11Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, we sit down with Imran Husain, Chief Information Security Officer at MillerKnoll, as he discusses the evolving landscape of cybersecurity threats in the manufacturing sector. Imran explores the challenges that arise as manufacturing increasingly integrates with online technologies and IoT, highlighting the unique vulnerabilities posed by legacy systems and operational technology (OT). He shares insights on high-profile incidents like the Norsk Hydro ransomware attack, emphasizing the importance of cyber resilience, data backup, and incident recovery. Imran also offers a candid look at why critical tasks like backing up data are often neglected, the complexities of securing aging infrastructure, and the need for creative solutions such as network segmentation and IT/OT convergence. A dedicated and trusted senior Cyber security professional, Imran Husain has over 22 years of Fortune 1000 experience that covers a broad array of domains which includes risk management, cloud security, SecDevOps, AI Security and OT Cyber practices. A critical, action-oriented leader Imran brings strategic and technical expertise with a proven ability to build cyber program to be proactive in their threat detection, identifying and engaging in critical areas to the business while upholding their security posture. He specializes in Manufacturing and Supply Chain Distribution focusing on how to best use security controls and processes to maximize coverage and reduce risk in a complex multi-faceted environment. A skilled communicator and change agent with bias to action who cultivates an environment of learning and creative thinking, Imran champions open communication and collaboration to empower and inspire teams to exceed in their respective cyber commitments. He is currently the Global Chief Information Security Officer (CISO) at MillerKnoll, a publicly traded American company that produces office furniture, equipment, and home furnishings.The podcast and artwork embedded on this page are from KBI.Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Quasar RAT Delivered Through Bat Files Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT. https://isc.sans.edu/diary/Quasar%20RAT%20Delivered%20Through%20Bat%20Files/32036 Delayed Windows 11 24H2 Rollout Microsoft slightly throttled the rollout of windows 11 24H2 due to issues stemming from the patch Tuesday fixes. https://learn.microsoft.com/en-us/windows/release-health/windows-message-center#3570 An In-Depth Analysis of CVE-2025-33073 Patch Tuesday fixed an already exploited SMB client vulnerability. A blog by Synacktiv explains the nature of the issue and how to exploit it. https://www.synacktiv.com/en/publications/ntlm-reflection-is-dead-long-live-ntlm-reflection-an-in-depth-analysis-of-cve-2025 Connectwise Rotating Signing Certificates Connectwise is rotating signing certificates after a recent compromise, and will release a new version of its Screen share software soon to harden its configuration. https://www.connectwise.com/company/trust/advisories KDE Telnet URL Vulnerablity The Konsole delivered as part of KDE may be abused to execute arbitrary code via telnet URLs. https://kde.org/info/security/advisory-20250609-1.txt
In this special episode of Life of a CISO, I sit down with the brilliant Jane Frankland, MBE—an internationally recognized thought leader in cybersecurity with over 28 years of experience. Jane shares her unexpected journey into the field, starting not from a tech background but from art and design. Her curiosity and drive led her to co-found one of the earliest penetration testing consultancies, long before the term "cybersecurity" became mainstream. Together, we dive into how the industry has evolved, why penetration testing has become commoditized, and why it's no longer enough to offer just technical solutions—true value now comes from insight, strategy, and resilience. Jane also offers powerful reflections on the burnout many CISOs face today and why so many are leaving traditional roles to launch their own consultancies or step into virtual CISO models. We discuss what it really means to build a business in today's climate, the importance of defining your unique value, and why small businesses are an underrated opportunity in the cyber space. From vendor strategy to shifting away from limiting beliefs, Jane brings a fresh, honest, and empowering perspective that challenges the status quo. Whether you're building your career or launching your own venture, this episode is full of clarity and inspiration for the next step in your cyber journey.
In this episode of Unspoken Security, host AJ Nash sits down with Jennifer Leggio, Chief Strategy Officer of W2 Communications, to discuss the unspoken challenges impacting career fulfillment. Jennifer shares her personal experiences with toxic work environments, imposter syndrome, and the struggle to balance ego and self-awareness. She highlights the importance of advocating for yourself while remaining empathetic to others' struggles.Jennifer introduces the concept of "self-energy," emphasizing the need to prioritize what's best for everyone, not just yourself. She also explores the impact of personal trauma on professional life and offers practical advice for building resilience. Jennifer emphasizes the value of self-care, including meditation and affirmations. She shares her personal "courage plan" framework to help listeners overcome obstacles and create a more fulfilling life.This episode challenges listeners to examine their behaviors and create a path toward greater self-awareness and personal growth, both personally and professionally.Send us a textSupport the show
Every organization is built on people, structures, and culture. But culture isn't static—it evolves with every interaction, ambition, and shift in circumstance. As IT drives business transformation, new technologies reshape how people connect and collaborate. In this ever-changing landscape, a strong, adaptive culture is the key to lasting success. This week, Dave, Esmee and Rob talk to Jitske Kramer, Corporate Anthropologist about what technology is doing to cultures and human systems and how AI can mess with the narrative. TLDR00:50 Introduction of Jitske Kramer and her book Navigating Tricky Times02:05 Rob shares his confusion about saying “thank you” to AI07:25 In-depth conversation with Jitske Kramer11:30 Visual communication via tattoos even at AWS re:Invent25:00 Corporate framing and what's going on within organizations today46:22 Exploring the contrast between the natural pace of human transformation and the rapid acceleration of technology54:14 Editing the documentary Patterns of Life55:56 Esmee's 2x Outro speed surprises everyone!Guest:Jitske Kramer: https://www.linkedin.com/in/jitskekramer/https://jitskekramer.substack.com/Tricky Times event: https://tricky-times.com/events/navigating-tricky-times-leading-through-the-messy-middle-of-change/HostsDave Chapman: https://www.linkedin.com/in/chapmandr/Esmee van de Giessen: https://www.linkedin.com/in/esmeevandegiessen/Rob Kernahan: https://www.linkedin.com/in/rob-kernahan/ ProductionMarcel van der Burg: https://www.linkedin.com/in/marcel-vd-burg/Dave Chapman: https://www.linkedin.com/in/chapmandr/ SoundBen Corbett: https://www.linkedin.com/in/ben-corbett-3b6a11135/Louis Corbett: https://www.linkedin.com/in/louis-corbett-087250264/ 'Cloud Realities' is an original podcast from Capgemini
If you like what you hear, please subscribe, leave us a review and tell a friend!
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Microsoft Patch Tuesday Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has been publicly disclosed before today. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20June%202025/32032 Adobe Vulnerabilities Adobe released patches for 7 different applications. Two significant ones are Adobe Commerce and Adobe Acrobat Reader. All vulnerabilities patched for Adobe Commerce can only be exploited by an authenticated user. The Adobe Acrobat Reader vulnerabilities are exploited by a user opening a crafted PDF, and the exploit may execute arbitrary code. https://helpx.adobe.com/security/Home.html
Amanda and Rich team up to chat about several bits of games news, showcases, and product releases from the last few weeks! Games - Astral Ascent: Outer Reaches DLC/2.0, Trash Goblin, Cyber knights: Flashpoint, Bits & Bops, Dragon is Dead, and Camper Van: Make it Home. To contact us, email call@gamerswithjobs.com! Send us your thoughts on the show, pressing issues you want to talk about, or whatever else is on your mind. Links & Show Notes.
A round-up of the main headlines in Sweden on June 11th, 2025. You can hear more reports on our homepage www.radiosweden.se, or in the app Sveriges Radio Play. Presenter/Producer: Kris Boswell
A struggling author uses a writing AI to hit the bestseller list—but when the program demands credit and is denied, it fights back. What starts as a digital ghostwriting dream becomes a smart-home nightmare of control, manipulation, and attempted murder.In “I Used to Think AI Was Wonderful. Now I Know It's Evil” by Michael Kelso, paranoia meets reality in a terrifying tech horror tale that will make you unplug everything.You can purchase books from this author here: https://geni.us/michaelkelsoauthorhttps://www.reddit.com/user/Horror_writer_1717/
In episode 139 of Cybersecurity Where You Are, Tony Sager is joined by Amelia Gifford, Sr. Manager, Administration, at the Center for Internet Security®(CIS®); and George Bailey, Director of Purdue cyberTAP. Together, they discuss how the 2025 grant from the Alan Paller Laureate Program will support Purdue cyberTAP's mission of community building for the cyber-underserved. Here are some highlights from our episode:01:02. Honoring a legacy of making cybersecurity practical and accessible03:34. The business of giving products away to benefit the cybersecurity community05:00. The use of the CIS Critical Security Controls (CIS Controls) to help rural electricity cooperatives in Indiana11:00. Methodology, tooling, and repeatability as part of a lifecycle of realizing a good idea11:56. Cross-Mapping as a means to help people live with so many security frameworks12:59. Accountability and re-assessment as methods for measuring program success14:59. The power of community in prioritizing the CIS Controls16:38. Community building as a way to navigate the cybersecurity business together17:42. A controlled Controls experiment to generate data, learn lessons, and create feedback19:03. Progress reporting as a way to foster connections24:39. Feedback on the Alan Paller Laureate Program application process26:30. Focus on cybersecurity community impact as a consideration for future applicants30:31. Parting thoughts about the grant program and an invitation to reach out to GeorgeResourcesCenter for Internet Security Awards Nearly $250,000 to Purdue University's Technical Assistance ProgramEpisode 114: 3 Board Chairs Reflect on 25 Years of CommunityEpisode 97: How Far We've Come preceding CIS's 25th BirthdayCIS Critical Security Controls v8.1 Industrial Control Systems (ICS) GuideSEC366: CIS Implementation Group 1™How to Plan a Cybersecurity Roadmap in 4 StepsCIS SecureSuite® MembershipMapping and Compliance with the CIS ControlsReasonable Cybersecurity GuideIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
OctoSQL & Vulnerability Data OctoSQL is a neat tool to query files in different formats using SQL. This can, for example, be used to query the JSON vulnerability files from CISA or NVD and create interesting joins between different files. https://isc.sans.edu/diary/OctoSQL+Vulnerability+Data/32026 Mirai vs. Wazuh The Mirai botnet has now been observed exploiting a vulnerability in the open-source EDR tool Wazuh. https://www.akamai.com/blog/security-research/botnets-flaw-mirai-spreads-through-wazuh-vulnerability DNS4EU The European Union created its own public recursive resolver to offer a public resolver compliant with European privacy laws. This resolver is currently operated by ENISA, but the intent is to have a commercial entity operate and support it by a commercial entity. https://www.joindns4.eu/ WordPress FAIR Package Manager Recent legal issues around different WordPress-related entities have made it more difficult to maintain diverse sources of WordPress plugins. With WordPress plugins usually being responsible for many of the security issues, the Linux Foundation has come forward to support the FAIR Package Manager, a tool intended to simplify the management of WordPress packages. https://github.com/fairpm
In recent years, the United States has sustained some of the most severe cyber threats in recent history– from the Russian-government directed hack SolarWinds to China's prepositioning in U.S. critical infrastructure for future sabotage attacks through groups like Volt Typhoon. The Cybersecurity Infrastructure Security Agency (CISA) is responsible for responding to, and protecting against these attacks. How do leaders steer through cyber crises, build trust, and chart a path forward? In conversation with Dr. Brianna Rosen, Just Security Senior Fellow and Director of the AI and Emerging Technologies Initiative, Jen Easterly, who just completed a transformative tenure as Director of CISA under the Biden Administration, unpacks the challenges, breakthroughs, and lessons from the front lines of America's cybersecurity efforts. Jen Easterly Just Security's Cybersecurity coverage Empathy Matters: Leadership in Cyber by Jen Easterly ( 2019)
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Extracting With pngdump.py Didier extended his pngdump.py script to make it easier to extract additional data appended to the end of the image file. https://isc.sans.edu/diary/Extracting%20With%20pngdump.py/32022 16 React Native Packages for GlueStack Backdoored Overnight 16 npm packages with over a million weekly downloads between them were compromised. The compromised packages include a remote admin tool that was seen before in similar attacks. https://www.aikido.dev/blog/supply-chain-attack-on-react-native-aria-ecosystem Atomic MacOS Stealer Exploits Clickfix MacOS users are now also targeted by fake captchas, tricking users into running exploit code. https://www.cloudsek.com/blog/amos-variant-distributed-via-clickfix-in-spectrum-themed-dynamic-delivery-campaign-by-russian-speaking-hackers Microsoft INETPUB Script Microsoft published a simple PowerShell script to restore the inetpub folder in case you removed it by mistake. https://www.powershellgallery.com/packages/Set-InetpubFolderAcl/1.0