POPULARITY
Categories
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary] Windows, with PowerShell, has a great scripting platform to match common Linux/Unix command line utilities. https://isc.sans.edu/diary/Binary%20Breadcrumbs%3A%20Correlating%20Malware%20Samples%20with%20Honeypot%20Logs%20Using%20PowerShell%20%5BGuest%20Diary%5D/32454 RondoDox v2 Increases Exploits The RondoDox (or RondoWorm) added a substantial amount of new exploits to its repertoire. https://beelzebub.ai/blog/rondo-dox-v2/ Google Chrome Updates Google released an update for Google Chrome addressing five vulnerabilities. https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop.html Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities Cisco patched two critical vulnerabilities in its Contact Center Express software. These vulnerabilities may lead to a full system compromise. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-unauth-rce-QeN8h7mQ
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing Vulnerabilities Checkpoint released details about recently patched spoofing and impersonation vulnerabilities in Microsoft Teams https://research.checkpoint.com/2025/microsoft-teams-impersonation-and-spoofing-vulnerabilities-exposed/ NViso Report: VSHELL NViso published an amazingly detailed report describing the remote control implant VSHELL. The report includes details about the inner workings of the tool as well as detection ideas. https://www.nviso.eu/blog/nviso-analyzes-vshell-post-exploitation-tool
durée : 00:03:35 - Un monde connecté - par : François Saltiel - Le 6 novembre, c'est la Journée nationale de lutte contre le (cyber) harcèlement scolaire, l'occasion de revenir sur ce fléau autour de différentes études.
A majority of Irish organisations have enhanced cybersecurity measures in recent months yet under-investment in key areas of training and compliance, ongoing talent shortages and AI-powered cyber threats continue to be areas of concern for Irish cyber leaders. That's according to EY Ireland's inaugural Cyber Leaders Index, which surveyed 165 of Ireland's senior cyber leaders with a particular focus on the corporate, health and life sciences and government sectors. 83% of Irish cyber leaders report enhancing cybersecurity measures over the past six months, with nearly a third (32%) noting an increase in budgets, while two thirds (67%) report investment holding steady. However, more than 70% of cyber leaders report difficulties securing budget for staff cyber awareness training. 43% cited challenges in securing budget for hiring and retaining skilled personnel, which remains a key challenge for cyber leaders. Nearly half (48%) of cyber leaders identified AI and data security as a top priority for the year ahead, and many organisations are adapting their practices in response to the EU AI Act. Yet 44% say they face challenges securing budget for AI-related security initiatives, suggesting that investment is not keeping pace with strategic intent. This may reflect internal competition for AI budgets, rather than reluctance to invest in cybersecurity, and embedding cybersecurity into AI efforts positions the function as a driver of growth and advantage. Almost seven in ten (68%) of respondents said that protecting against supply chain and vendor-related threats is a top priority within their cybersecurity programmes, however only 4% identify third-party vendor risk as one of their main concerns. Compliance with relevant regulations and data privacy laws such as NIS2 was cited as a priority by 39% of respondents, while the EU AI Act is also having an impact with nearly half (47%) of the leaders surveyed stating they have updated their data handling and monitoring practices and four in ten (39%) having updated their data protection impact assessment systems. Puneet Kukreja, Technology Consulting Partner and Head of Cyber at EY Ireland said: "In an AI-driven world where algorithms and code are reshaping both attacks and defences, cyber risk is no longer something to eliminate, it must be managed with precision. This shift demands that cyber leaders evolve from engineers and managers to architects of trust, with a seat and a voice at the top table where strategic decisions are made and budgets are shaped. Cyber threats are escalating, with major breaches reported almost every week, and it's clear that defences are only as strong as their weakest point. Yet investment is not always going where it matters most, with gaps in staff training and talent retention remaining areas of concern." Carol Murphy, Consulting Partner and Head of Markets at EY Ireland said: "Irish organisations are strengthening their cyber resilience, with most reporting enhanced defences and stable or increased budgets. The challenge now is to direct that investment towards people and partnerships, ensuring teams are trained, supported and equipped to manage the growing demands of compliance and third-party risk. Organisations must prioritise the continuous training and wellbeing of their cyber teams, recognising that resilience depends as much on people as it does on technology." Burnout Risk As Cyber Threats Remain A Top Concern Burnout and fatigue amongst cyber leaders have been identified as growing resilience risks for Irish organisations, with 37% of those surveyed reporting concern about the gaps in their organisation's cyber risk coverage. More than one in four (26%) of respondents reported negative impacts on their mental health. Puneet Kukreja said: "Our research shows that stress is fast becoming a hidden cyber risk for organisations. Cyber risk is constant, and that unrelenting pressure is taking a toll on the people who defend against it. Burnout does...
From ransomware to technical breakdowns, Allianz identifies supply chain disruptions as a major factor behind losses across manufacturing, retail, and professional services sectors. To watch the full interview … Read More » The post Inside Allianz's Cyber Report – Supply Chain Risks on the Rise appeared first on Insurance Journal TV.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Apple Patches Everything, Again Apple released a minor OS upgrade across its lineup, fixing a number of security vulnerabilities. https://isc.sans.edu/diary/Apple%20Patches%20Everything%2C%20Again/32448 Remote Access Tools Used to Compromise Trucking and Logistics Attackers infect trucking and logistics companies with regular remote management tools to inject malware into other companies or learn about high-value loads in order to steal them. https://www.proofpoint.com/us/blog/threat-insight/remote-access-real-cargo-cybercriminals-targeting-trucking-and-logistics Google Android Patch Day Google released its usual monthly Android updates this week https://source.android.com/docs/security/bulletin/2025-11-01
On this episode of Bounced From The Roadhouse:Special Guests in 4B:truckVegas new Cyber forcecoffee drivingStupid CriminalWeird TextE-Shoes Stupid CriminalWYR - Would you rather give up caffeine or give up… adult activities for a month?Spotify StreamsDrake Fake StreamersThat's a Great QuestionWorker Refuses to return coworker salariesTik Tok PurchaseRice HondaQuestions? Comments? Leave us a message! 605-343-6161Don't forget to subscribe, leave us a review and some stars Hosted on Acast. See acast.com/privacy for more information.
In this week's episode of the Security Squawk Podcast, Bryan Hornung, Randy Bryan, and Reginald Andre break down three major cybersecurity incidents that show how no industry is immune — from universities and government contractors to the British Library itself. We dig into a 1.2 million-record donor data breach, a ransomware-driven shutdown, and the growing supply-chain risk for MSPs and IT providers. Tune in for sharp analysis, real-world lessons, and actionable advice to protect your business from being the next victim. Cybersecurity podcast, data breach, ransomware, MSP, vendor risk, university breach, British Library, Conduent, IT security trends ️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! https://streamyard.com/pal/d/65161790...
For musician Rosie Delmah, fame has been a double-edged sword. Rosie has been experiencing cyber bullying and sexual harassment for several years. In 2025, explicit deep fake images of her were created and spread across the internet, causing her to bravely speak out. And Rosie is not alone. Cyber abuse, particularly against women is rife and many countries, including Rosie's home Solomon Islands, lack the cyber-crime laws to stamp out activities like online bullying, sexploitation, and harassment. Sistas Let's Talk speaks to Rosie about her experience as well as Morina Rapasia, the Solomon Islands Country Coordinator with Childfund Australia, who has been rolling out Swipe Safe, an education program designed to keep the next generation of online users safe.
Supply chain cyber breaches are on the rise, with attackers increasingly targeting suppliers as a route into larger organisations. In this podcast episode, Richard Jeens, Laura Houston and Alex Buchanan discuss the growing threat of supply chain attacks, why they're so challenging to manage, and what organisations can do to protect themselves.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
XWiki SolrSearch Exploit Attempts CVE-2025-24893 We have detected a number of exploit attempts against XWiki taking advantage of a vulnerability that was added to the KEV list on Friday. https://isc.sans.edu/diary/XWiki%20SolrSearch%20Exploit%20Attempts%20%28CVE-2025-24893%29%20with%20link%20to%20Chicago%20Gangs%20Rappers/32444 AMD Zen 5 Random Number Generator Bug The RDSEED function for AMD s Zen 5 processors does return 0 more often than it should. https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7055.html SleepyDuck malware invades Cursor through Open VSX Yet another Open VSX extension stealing crypto credentials https://secureannex.com/blog/sleepyduck-malware/
In Episode 49, of Season 5 of Driven by Data: The Podcast, Kyle Winterbottom was joined by Adrian Estala, Field Chief Data & AI Officer at Starburst, where they discuss how to deliver successful AI innovation and transformation by letting 'the business' lead, which includes;Why we need to let business teams to lead AI innovation for meaningful transformation.How business-led approaches to AI translate into practical, real-world examples.The major differences that set AI apart from previous waves of technological business transformation like ERP, Cyber and Cloud.Why AI demands a fundamentally different approach compared to traditional IT-led transformations.How organisations are adapting to the rapid pace of change driven by AI advancements.Balancing the need for AI experimentation with the discipline of effective governance and control.Identifying high-impact AI use cases that deliver competitive advantage through targeted experimentation.Adapting delivery models and governance structures to meet accelerated AI project timelines.Why organisations need a (business) semantic layer in enabling faster and more responsible AI innovation.Why the era of migration is over and what that shift means for digital strategy.Rethinking data foundations to support AI-driven decision-making across the business.The concept of “big data, small agents” and its implications for the future of work.What will distinguish successful AI adopters from those who remain stuck in experimentation over the next 12...
In this episode, we sit down with Farlina Said, Fellow and Team Lead in the Cyber and Technology Policy programme at Institute of Strategic and International Studies (Malaysia) to explore all things cyber security, including how we should distinguish between cyber security and cyber stability. Ms. Said discusses the cyber security landscape in 2025, including the challenges that countries face when looking to defend themselves against cyberattacks, as well as the international communities' difficulty in regulating the international rules of the cyber domain. She also touches on what gives her hope for the future when looking at these issues. Finally, we discuss ASEAN and whether Canada is in a place to partner with ASEAN countries on this issue, and within the Indo-Pacific region more broadly.
Well, if there are themes in procurement at the moment then they are AI, cyber and something else - possibly monkeys. Rich and Ed discuss two of these in depth - including whether we'll ever have an AI procurement companion-bot.We have news on what CAPS data is telling us now about how procurement people spend their time (same old); how Peter Smith is finding sex-bots; less chocolate on your Club (and Penguin); and THREE insightful surveys brought to you courtesy of 100 CIPS procurement people in a room in Birmingham.We also find out that we reached "peak procurement" in 1985. Apparently.We have more questions from listeners - this time on cyber insurance, outsourcing cyber defence and what exactly is a SOW? (Spoiler - not a pig).Plus some incredible thought leadership to help you create a procurement vision and develop your organisation using the "Procurement Sophistication Nexus".Plus double plus Diella, the AI procurement bot from Albania, makes an appearance (sort of). All this plus plus plus more crap procurement jokes.Become a supporter of this podcast: https://www.spreaker.com/podcast/procurement-says-no--5886102/support.
The FCC plans to roll back cybersecurity mandates that followed Salt Typhoon. The alleged cybercriminal MrICQ has been extradited to the U.S. Ransomware negotiators are accused of conducting ransomware attacks. Ernst & Young accidentally exposed a 4-terabyte SQL Server backup. A hacker claims responsibility for last week's University of Pennsylvania breach. The UK chronicles cyberattacks on Britain's drinking water suppliers. Monday business brief. Our guest is Caleb Tolin, host of Rubrik's Data Security Decoded podcast. Hackers massage the truth. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Caleb Tolin, host of Rubrik's Data Security Decoded podcast, as he is introducing himself and his show joining the N2K CyberWire network. You can catch new episodes of Data Security Decoded the first and third Tuesdays of each month on your favorite podcast app. Selected Reading FCC plans vote to remove cyber regulations installed after theft of Trump info from telecoms (The Record) Alleged Jabber Zeus Coder ‘MrICQ' in U.S. Custody (Krebs on Security) Chicago firm that resolves ransomware attacks had rogue workers carrying out their own hacks, FBI says (Chicago Sun Times) Ernst & Young cloud misconfiguration leaks 4TB SQL Server backup on Microsoft Azure (Beyond Machines) Penn hacker claims to have stolen 1.2 million donor records in data breach (Bleeping Computer) Hackers are attacking Britain's drinking water suppliers (The Record) JumpCloud acquires Breez. Chainguard secures $280 million in growth financing. Sublime Security closes $150 million Series C round. (N2K Pro) Hackers steal data, extort $350,000 from massage parlor clients (Korea JoongAng Daily) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Scans for WSUS: Port 8530/8531 TCP, CVE-2025-59287 We did observe an increase in scans for TCP ports 8530 and 8531. These ports are associated with WSUS and the scans are likely looking for servers vulnerable to CVE-2025-59287 https://isc.sans.edu/diary/Scans%20for%20Port%208530%208531%20%28TCP%29.%20Likely%20related%20to%20WSUS%20Vulnerability%20CVE-2025-59287/32440 BADCANDY Webshell Implant Deployed via The Australian Signals Directorate warns that they still see Cisco IOS XE devices not patches for CVE-2023-20198. A threat actor is now using this vulnerability to deploy the BADCANDY implant for persistent access https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/badcandy Improvements to Open VSX Security In reference to the Glassworm incident, OpenVSX published a blog post outlining some of the security improvements they will make to prevent a repeat of this incident. https://blogs.eclipse.org/post/mika l-barbero/open-vsx-security-update-october-2025
Problemi di Cyber security, come proteggersi al meglio. Travisate senza Previ, le segnalazioni censurate trovano finalmente spazio.
There are a lot of reasons why government shutdowns are harmful. The impact on the nation's cyber defenses is certainly one of those reasons, but it's also difficult to measure. We do know that significant percentages of cyber personnel are furloughed, including more than half the staff at the Cybersecurity and Infrastructure Security Agency. But for a deeper look at some of the less tangible impacts, we're joined now by Justin Miller. He's a former Secret Service special agent who specialized in cyber investigations – now an associate professor of cyber studies at the University of Tulsa.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
“Cyber resilience isn't just about protection, it's about preparation.”Every business in this day and age lives in the cloud. Our operations, data, and collaboration tools are powered by servers located invisibly around the world. But here's the question we often overlook: what happens when the cloud falters?In this episode of Tech Transformed, Trisha Pillay sits down with Jan Ursi, Vice President of Global Channels at Keepit, to uncover the real meaning of cyber resilience in a cloud-first world. Are you putting all your trust in hyperscale cloud providers? Think again. Trisha and Jan explore why relying solely on giants like Microsoft or Amazon can put your data at risk and how independent infrastructure gives organisations control, faster recovery, and true digital sovereignty.Takeaways:The importance of cyber resilience in a cloud-first worldHow independent cloud infrastructure protects your SaaS applicationsCommon shared responsibility misconceptions that can cost organisations dataStrategies for quick recovery from ransomware and cyberattacksWhy digital sovereignty ensures control and complianceChapters:00:00 – Introduction to Cyber Resilience and Cloud Strategy05:00 – The Importance of Independent Infrastructure10:00 – Shared Responsibility and Misconceptions15:00 – Digital Sovereignty and Compliance20:00 – Practical Tips for CISOs and CIOs22:00 – ConclusionAbout Jan Ursi:Jan Ursi leads Keepit's global partnerships, helping organisations embrace the AI-powered cyber resilience era. Keepit is the world's only independent cloud dedicated to SaaS data protection, security, and recovery. Jan has previously built and scaled businesses at Rubrik, UiPath, Nutanix, Infoblox, and Juniper, shaping the future of enterprise cloud, hyper-automation, and data protection.Follow EM360Tech for more insights:Website: www.em360tech.comX: @EM360TechLinkedIn: EM360TechYouTube: EM360Tech
In this episode of the Cyber Uncut podcast, Daniel Croft and David Hollingworth talk about the latest AI news, the week in cyber crime, Tasmanian government breach woes, and Australia signing an important UN cyber crime treaty. The pair kick things off with some AI news, including OpenAI opening up about how many of its users talk about their mental health challenges with the bot, and the company's latest move to create AI music. Hollingworth and Croft then move on to cyber crime in Australia. A breach linked to vocational student management platform VETtrak has gotten several Tasmanian government agencies caught out, Anubis ransomware continues to be a horrible group of people, and the AFP stands up two new cyber crime taskforces. Finally, some good news: the Australian government has said it will carve out protections for Australian artists wanting to protect their work from ravenous AI companies, and the UN has established a new cyber crime treaty.
What does cybersecurity look like beyond Earth's atmosphere? That's the question at the heart of this conversation with Kristiina Omri, Vice President of Special Programs at CybExer Technologies, and Aare Reintam, the company's COO. We met in Tallinn on the eve of the Software Defined Space Conference to explore how Estonia, in collaboration with the European Space Agency, is helping define the future of space cybersecurity through the world's first Space Cyber Range. The story begins unexpectedly—with a childhood memory of marmalade in a tube, the same kind sent to Soviet astronauts in orbit. For Aare Reintam, that small detail became the first spark of fascination with space, one that decades later evolved into CybExer's partnership with ESA. Together they've created a digital testing environment where satellites, ground stations, and communication protocols can be stress-tested for cyber resilience long before launch. It's a bold move in an era when satellites underpin everything from GPS and precision farming to air travel and climate observation, yet often rely on decades-old technology vulnerable to attack. Kristiina Omri explains how the Space Cyber Range replicates real-world missions, allowing engineers and analysts to train under simulated attack conditions that feel indistinguishable from their actual control systems. The range combines the precision of digital twins with the competitive intensity of cyber exercises, preparing teams for threats that can ripple from orbit to everyday life on Earth. The conversation covers everything from the growing space-debris crisis to the global shortage of cybersecurity professionals, and the urgent need to blend space engineering with cyber education. We also discuss the deeper strategic implications. What happens when quantum computing enters the battlefield? How should Europe prepare for the convergence of cyber and kinetic threats in orbit? And what lessons can be learned from Estonia's leadership in NATO cyber defense as it extends that expertise to the stars? By the end of the discussion, one theme stands out clearly: the future of cybersecurity is no longer confined to our planet. From digital twins to orbital trust networks, CybExer Technologies and the European Space Agency are proving that the next frontier for cyber readiness lies in space itself.
Computer und Kommunikation (komplette Sendung) - Deutschlandfunk
Kloiber, Manfred www.deutschlandfunk.de, Computer und Kommunikation
Podcast: ICS Cyber Talks PodcastEpisode: Mark Korman Chief Legal & Strategy Officer @Critical-Impact about cyber crises aspects to considerPub date: 2025-10-30Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationPrevention tools are essential, but have their limits; no one can prevent every breach. Readiness determines how quickly and effectively you regain control once it happens. Tabletop exercises, crisis playbooks, and decision-making drills are the true differentiators. Nachshon Pincu hosts Mark Korman, Chief Legal and Strategy Officer at Critical-Impact, an incident response company, in a conversation about cyber crisis Investing in Readiness, Not Just Prevention The Paradox: Tech Is Better, Attacks Are Worse, and the AI game changer for good and for bad Data Leaks and Privacy with the 13th Amendment and moreThe podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
This week's episode started with the usual existential sigh before tumbling straight into the corporate bloodbath. Amazon chopped 14,000 jobs under the noble banner of “embracing AI,” which CEO Andy Jassy insists isn't about money—despite swimming Scrooge McDuck–style in profit. GM's cutting 1,700 workers, YouTube's dangling “voluntary” buyouts, and economists can't decide if AI is killing jobs or if the economy's just trash. Microsoft's winning either way, sitting pretty on OpenAI's planned $1 trillion IPO, while Meta stock cratered because Zuckerberg's still shoveling billions into the AI bonfire instead of quietly burying the metaverse. Meanwhile, Elon managed to cram a week's worth of disasters into a single news cycle: Tesla's being probed for its idiotic “Mad Max” mode, recalling thousands more Cybertrucks because they can't figure out glue, launching Grokipedia (Wikipedia's evil twin), and turning Truth Social into a crypto casino. Somewhere between the chaos, more people tuned into a fake NVIDIA livestream than the real one, and the only vaguely uplifting story was a grieving family using an AI chatbot to hack a $195K hospital bill down to $33K.In media misery, we soothed our nuclear anxiety with A House of Dynamite, tolerated Welcome to Derry, rolled our eyes at Stranger Things 5, and confirmed Slow Horses still rules. Music listeners, please stop streaming fascism—cancel Spotify. On the tech toy front, Grammarly's having an identity crisis as “Superhuman,” Affinity caved to the subscription gods, and Apple's prepping to inject ads into Maps because the world wasn't already annoying enough. The chaos didn't stop there: a rogue Goodreads librarian rewrote Trump's book listings to protest censorship, Cursor 2.0 actually impressed us with a working currency converter, and Enshittification: Why Everything Suddenly Got Worse and What to Do About It turned out to be the perfect title for the entire digital era.Sponsors:Private Internet Access - Go to GOG.Show/vpn and sign up today. For a limited time only, you can get OUR favorite VPN for as little as $2.03 a month.SetApp - With a single monthly subscription you get 240+ apps for your Mac. Go to SetApp and get started today!!!1Password - Get a great deal on the only password manager recommended by Grumpy Old Geeks! gog.show/1passwordMasterClass - Get an additional 15% off any annual membership at MASTERCLASS.com/GRUMPYOLDGEEKSCleanMyMac - clnmy.com/GrumpyOldGeeks - Use code OLDGEEKS for 20% off.Show notes at https://gog.show/720FOLLOW UPWhat both sides of America's polarized divide share: Deep anxieties about the meaning of life and existence itself720° © 1986 Atari Games.IN THE NEWSAmazon cuts its workforce by 14,000 in further embrace of AIIs AI Leading to Layoffs or Does the Economy Just Suck?Amazon CEO Now Says AI Is Not Responsible for Recent LayoffsAmazon Accused of Trapping Drivers in AI PanopticonGM lays off 1,700 workers making EVs and batteries in Michigan, TennesseeTesla Recalls Thousands More Cybertrucks, Is Bad at Gluing ThingsYouTube is offering employees buyouts as part of an AI-focused reorganizationEveryone Is Laying People Off This Week. Researchers Say They're Going to Regret ItOpenAI completes restructure, solidifying Microsoft as a major shareholderOpenAI lays groundwork for juggernaut IPO at up to $1 trillion valuationMeta Stock Plummets as Investors Horrified at How Much Zuckerberg Is Spending on Misfired AIFederal investigators are looking into Tesla's Mad Max mode, which reportedly defies speed limitsGrokipedia Is the Antithesis of Everything That Makes Wikipedia Good, Useful, and HumanMore people watched a fake NVIDIA livestream than the real thingTrump's Media Company Set To Roll Out Polymarket-Like Prediction Market on Truth SocialSurprising no one, researchers confirm that AI chatbots are incredibly sycophanticGrieving family uses AI chatbot to cut hospital bill from $195,000 to $33,000 — family says Claude highlighted duplicative charges, improper coding, and other violationsMEDIA CANDYA House of DynamiteWelcome to DerryStranger Things 5 | Official Trailer | NetflixSlow HorsesDon't Stream Fascism: Cancel SpotifyAPPS & DOODADSGrammarly has rebranded to SuperhumanAffinity's image-editing apps go “freemium” in first major post-Canva updateApple is reportedly getting ready to introduce ads to its Maps appRogue Goodreads Librarian Edits Site to Expose 'Censorship in Favor of Trump Fascism'Introducing Cursor 2.0 and ComposerEnshittification: Why Everything Suddenly Got Worse and What to Do About It by Cory DoctorowThe Disenshittify ProjectCurrency ConverterSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are supposed to identify the researcher conducting the scans https://isc.sans.edu/diary/X-Request-Purpose%3A%20Identifying%20%22research%22%20and%20bug%20bounty%20related%20scans%3F/32436 Proton Breach Observatory Proton opened up its breach observatory. This website will collect information about breaches affecting companies that have not yet made the breach public. https://proton.me/blog/introducing-breach-observatory Microsoft Exchange Server Security Best Practices A new document published by a collaboration of national cyber security agencies summarizes steps that should be taken to harden Exchange Server. https://www.nsa.gov/Portals/75/documents/resources/cybersecurity-professionals/CSI_Microsoft_Exchange_Server_Security_Best_Practices.pdf?ver=9mpKKyUrwfpb9b9r4drVMg%3d%3d MOVEit Vulnerability Progress published an advisory for its file transfer program MOVEIt . This software has had heavily exploited vulnerabilities in the past. https://community.progress.com/s/article/MOVEit-Transfer-Vulnerability-CVE-2025-10932-October-29-2025
If you like what you hear, please subscribe, leave us a review and tell a friend!
Send us a textA mysterious witch arrives at a suburban Halloween party with cupcakes and a purpose: collecting human fears. As guests fall under her spell, two friends must uncover her secret and stop her.Bernadette Armstrong directs a cast that includes Camille Ameen as Cyber Witch, Jon Paul Burkhart as Jax, and Goreti da Silva as Lana.Jessica Gale is the playwright.Jessica Gale (pen name) is a web content creator and writer based in Las Vegas, Nevada. She graduated from Fordham University in New York City.Jessica has written over a dozen ten-minute plays, several of which have been produced at festivals across the country, as well as a screenplay. Her work blends humor, suspense, and sharp insights into how people adapt to emerging technologies.Support the showFounded by playwright and filmmaker Bernadette Armstrong, Open-Door Playhouse is a Theater Podcast- like the radio dramas of the 1940s and 1950s. The Playhouse launched on September 15, 2020. At the time, Open-Door Playhouse provided Playwrights, Actors and Directors a creative outlet during the shutdown. Since its inception. Open-Door Playhouse has presented Short and One-Act plays from Playwrights across the country and internationally. In 2021 Open-Door Playhouse received a Communicator Award for Content for the Play Custody and in 2023 the play What's Prison Like was nominated for a Webby Award in the Crime & Justice Category.Plays are produced by Bernadette Armstrong, Sound Engineer is David Peters, sound effects are provided by Audio Jungle, and music from Karaoke Version. All plays are recorded at The Oak House Studio in Altadena, CA. There's no paywall at the Open-Door Playhouse site, so you could listen to everything for free. Open-Door Playhouse is a 501c3 non-profit organization, and if you would like to support performances of works by new and emerging playwrights, your donation will be gratefully accepted. Your tax-deductible donations help keep our plays on the Podcast Stage. We strive to bring our listeners thoughtful and surprising one-act plays and ten-minute shorts that showcase insightful and new perspectives of the world we share with others. To listen or to donate (or both), go to https://opend...
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like dd do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems/32432 Microsoft Azure Front Door Outage Today, Microsoft s Azure Front Door service failed, leading to users not being able to authenticate to various Azure-related services. https://azure.status.microsoft/en-us/status Docker-Compose Vulnerability A vulnerability in docker-compose may be used to trick users into creating files outside the docker-compose directory https://github.com/docker/compose/security/advisories/GHSA-gv8h-7v7w-r22q
Power is the new bottleneck, reasoning got real, and the business finally caught up. In this wide-ranging conversation, I sit down with Nathan Benaich, Founder and General Partner at Air Street Capital, to discuss the newly published 2025 State of AI report—what's actually working, what's hype, and where the next edge will come from. We start at the physical layer: energy procurement, PPAs, off-grid builds, and why water and grid constraints are turning power—not GPUs—into the decisive moat.From there, we move into capability: reasoning models acting as AI co-scientists in verifiable domains, and the “chain-of-action” shift in robotics that's taking us from polished demos to dependable deployments. Along the way, we examine the market reality—who's making real revenue, how margins actually behave once tokens and inference meet pricing, and what all of this means for builders and investors.We also zoom out to the ecosystem: NVIDIA's position vs. custom silicon, China's split stack, and the rise of sovereign AI (and the “sovereignty washing” that comes with it). The policy and security picture gets a hard look too—regulation's vibe shift, data-rights realpolitik, and what agents and MCP mean for cyber risk and adoption.Nathan closes with where he's placing bets (bio, defense, robotics, voice) and three predictions for the next 12 months. Nathan BenaichBlog - https://www.nathanbenaich.comX/Twitter - https://x.com/nathanbenaichSource: State of AI Report 2025 (9/10/2025)Air Street CapitalWebsite - https://www.airstreet.comX/Twitter - https://x.com/airstreetMatt Turck (Managing Director)Blog - https://www.mattturck.comLinkedIn - https://www.linkedin.com/in/turck/X/Twitter - https://twitter.com/mattturckFIRSTMARKWebsite - https://firstmark.comX/Twitter - https://twitter.com/FirstMarkCap(0:00) – Cold Open: “Gargantuan money, real reasoning”(0:40) – Intro: State of AI 2025 with Nathan Benaich(02:06) – Reasoning got real: from chain-of-thought to verified math wins(04:11) – AI co-scientist: hypotheses, wet-lab validation, fewer “dumb stochastic parrots” (04:44) – Chain-of-action robotics: plan → act you can audit(05:13) – Humanoids vs. warehouse reality: where robots actually stick first(06:32) – The business caught up: who's making real revenue now(08:26) – Adoption & spend: Ramp stats, retention, and the shadow-AI gap(11:00) – Margins debate: tokens, pricing, and the thin-wrapper trap(14:02) – Bubble or boom? Wall Street vs. SF vibes (and circular deals)(19:54) – Power is the bottleneck: $50B/GW capex and the new moat(21:02) – PPAs, gas turbines, and off-grid builds: the procurement game(23:54) – Water, grids, and NIMBY: sustainability gets political(25:08) – NVIDIA's moat: 90% of papers, Broadcom/AMD, and custom silicon(28:47) – China split-stack: Huawei, Cambricon, and export zigzags(30:30) – Sovereign AI or “sovereignty washing”? Open source as leverage(40:40) – Regulation & safety: from Bletchley to “AI Action”—the vibe shift(44:06) – Safety budgets vs. lab spend; models that game evals(44:46) – Data rights realpolitik: $1.5B signals the new training cost(47:04) – Cyber risk in the agent era: MCP, malware LMs, state actors(50:19) – Agents that convert: search → commerce and the demo flywheel(54:18) – VC lens: where Nathan is investing (bio, defense, robotics, voice)(68:29) – Predictions: power politics, AI neutrality, end-to-end discoveries(1:02:13) – Wrap: what to watch next & where to find the report (stateof.ai)
In this episode of Unspoken Security, host A.J. Nash sits down with Dominic Vogel, founder of Vogel Leadership & Coaching, to discuss the importance of bringing humanity back into the cybersecurity field. Dominic shares his journey from corporate burnout to becoming an advocate for kindness and authenticity in an industry often focused on metrics and technology.Dominic explains how leading with empathy and building real, human connections can transform the workplace. He emphasizes that in a high-stress field like cybersecurity, creating positive environments is crucial for maintaining mental well-being and productivity. The conversation also touches on Dominic's leadership approach, where he prioritizes relationships and kindness over traditional, rigid business strategies. Tune in to learn how Dominic is reshaping cybersecurity leadership by focusing on people first, showing that a human-centered approach can lead to long-term success in both business and personal life.Send us a textSupport the show
Technology can scale almost everything—except human experience. In a world driven by efficiency, what does it mean to design for how people truly feel? It's about transforming user interactions into ongoing insight and innovation, rooted in empathy and understanding. This week, Dave, Esmee and Rob talk to Kevin Magee, Chief Technology Officer at All human about helping organizations transform customer experiences with a focus on design, engineering, and what is called "digital performance." TLDR:00:41 Introduction of Kevin Magee with Guinness or sparkling water?03:23 Rob wonders, is Apple really opening up its ecosystem?11:40 Deep dive with Kevin into design, engineering, and digital performance36:30 How tools built for one purpose can transform entire systems48:35 Weekend city breaks and pursuing a master's in psychology GuestKevin Magee: https://www.linkedin.com/in/kevinmagee/ HostsDave Chapman: https://www.linkedin.com/in/chapmandr/Rob Kernahan: https://www.linkedin.com/in/rob-kernahan/Esmee van de Giessen: https://www.linkedin.com/in/esmeevandegiessen/ ProductionMarcel van der Burg: https://www.linkedin.com/in/marcel-vd-burg/Dave Chapman: https://www.linkedin.com/in/chapmandr/ SoundBen Corbett: https://www.linkedin.com/in/ben-corbett-3b6a11135/Louis Corbett: https://www.linkedin.com/in/louis-corbett-087250264/ 'Cloud Realities' is an original podcast from Capgemini
If you like what you hear, please subscribe, leave us a review and tell a friend!
The Environmental Protection Agency is deepening its work with water utilities on cyber security issues. The EPA has recently launched a program to scan for Internet exposed devices at water and wastewater facilities. That work comes amid rising concerns about nation state hackers targeting water systems and other critical infrastructure for more Federal News Network's Justin Doubleday is here. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
As cyber threats and geopolitical risks intensify, how can organizations be nimble and outsmart the next cyber attack? In this episode, seasoned data protection and cyber law expert Vinod Bange breaks down the threats that are still overlooked – including a new understanding of influence in social engineering – and the questions that leaders should ask themselves to ensure their teams are truly nimble and cyber ready. This Baker McKenzie partner also shares the unique methods that business and government are employing to work together to share best practices and strategies, all while breaking down why this sort of collaboration has traditionally been slow to happen. About this episode: Baker McKenzie: https://www.bakermckenzie.com/en/ Global Disputes Forecast: https://www.bakermckenzie.com/en/insight/publications/2025/01/global-disputes-forecast-2025 Related report: Cybercrime Atlas: Impact Report 2025: https://initiatives.weforum.org/cybercrime-atlas/home Related podcasts: Radio Davos: New era, new mood, new challenges Read: https://www.weforum.org/podcasts/radio-davos/episodes/adam-tooze-cnbc-china-us-history/ Listen: https://open.spotify.com/episode/4byCozwrPwSDRGexzSpOIv?go=1&sp_cid=01e8f5e22b1a6834bc34234353341751&utm_source=embed_player_p&utm_medium=desktop&nd=1&dlsi=21eda2cf5c3c4932 Watch: https://www.youtube.com/watch?v=vOlOPL3woKA Meet the Leader: AI will reshape knowledge work. What leaders should ask, do and learn now: Read: https://tinyurl.com/ydfed937 Listen: https://tinyurl.com/ycxh9zer Watch: https://youtu.be/GCo7czq2yXI
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line/32428 Apache Tomcat PUT Directory Traversal Apache released an update to Tomcat fixing a directory traversal vulnerability in how the PUT method is used. Exploits could upload arbitrary files, leading to remote code execution. https://lists.apache.org/thread/n05kjcwyj1s45ovs8ll1qrrojhfb1tog BIND9 DNS Spoofing Vulnerability A PoC exploit is now available for the recently patched BIND9 spoofing vulnerability https://gist.github.com/N3mes1s/f76b4a606308937b0806a5256bc1f918
Send us a textJoin us on this episode of Serious Privacy, as Paul Breitbarth and Ralph O'Brien present the breaking news and hot events in data protection and privacy while Dr. K Royal was out this week. Tune in for a great discussion and catch up! If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard: https://mastercard.us/en-us.html
New Android malware types like a human Sanctions weaken nation-state cyber ecosystems Side-channel attack extracts Intel, AMD secrets Huge thanks to our sponsor, Conveyor Have you been personally victimized by a questionnaire this week? The queue never ends. But Conveyor can change that story. With AI that answers questionnaires of any format, and a trust center that handles document sharing, security reviews get done without the stress. Feel calm in the chaos with Conveyor. Learn more at www.conveyor.com.
If you like what you hear, please subscribe, leave us a review and tell a friend!
On the latest episode of Nerd Out, Dave and Alec welcome back Hunter Headapohl to deep dive into Cybersecurity Awareness Month and cyber threats.CSAM Key points and why this is important for organizations as well as tips to follow.Cyber threats they are keeping an eye out for.Top of mind concerns and tips.References from the discussion include:After the security nerd discussions, the trio turned to other nerd news with a little Halloween theme.Favorite candiesFavorite Halloween-themed movies or showsThe 3rd season of Star Wars VisionsNew movies they would recommend
Sarah Powazek, Director of the Public Interest Cybersecurity Program at UC Berkeley's Center for Long-Term Cybersecurity, and Michael Razeeq, Nonresident Fellow at the Public Interest Cybersecurity Program, join Lawfare's Justin Sherman to discuss the cyber threats facing states, what options and resources states currently have to address cybersecurity problems, and how the concept of state cyber corps and volunteer programs fits into the picture. They also discuss how states can stand up a cyber corp or volunteer program, including recruiting and retaining talent; the impact of federal workforce and spending cuts on states' cybersecurity capacities; and what future state and federal action on cybersecurity could do to improve states' cyber postures.For more on this topic, see:Sarah Powazek and Grace Menna, “The Roadmap to Community Cyber Defense,” June 2025, UC Berkeley Center for Long-Term CybersecurityCyber Resilience Corps websiteTo receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also support Lawfare by making a one-time donation at https://givebutter.com/lawfare-institute.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
They steal billions: Cyber Hack investigates the alleged cyber gangs and the heists and hacks they're accused of carrying out. No one is said to be safe. From Hollywood studios, to international banks, from crypto exchanges to small businesses and health care companies, law enforcement agencies say they cause chaos around the globe. Who will be next? And where is the money going? This series looks at The Russian Evil Corp accused of being a family crime gang, responsible for stealing hundreds of millions of dollars. Law enforcement agencies say they are “the most pervasive cybercrime group to ever have operated”. No one is off limits – not even a group of nuns in Chicago. This is episode 1 of the series. For more episodes, just search 'Cyber Hack' wherever you got this podcast.
Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. In this episode of CISO Perspectives, host Kim Jones sits down with Kristy Westphal, the Global Security Director of Spirent Communications, to explore data privacy's impacts on cybersecurity efforts. Together, Kristy and Kim discuss why privacy cannot be an afterthought but rather must be something actively addressed through proactive security efforts, shifting security culture mindsets, and staying ahead of rapidly changing technologies. This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about Meter. Want more CISO Perspectives? Check out a companion blog post by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. Learn more about your ad choices. Visit megaphone.fm/adchoices
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vulnerability Unifi fixed a critical vulnerability in it s Access product https://community.ui.com/releases/Security-Advisory-Bulletin-056-056/ce97352d-91cd-40a7-a2f4-2c73b3b30191 OpenAI Atlas Omnibox Prompt Injection OpenAI s latest browser can be jailbroken by inserting prompts in URLs https://neuraltrust.ai/blog/openai-atlas-omnibox-prompt-injection
Our show today is being sponsored by Free Float Analytics, the only platform measuring board power, connections, and performance for FREE.DAMIONAmazon to announce largest layoffs in company history, in AI push. WHO DO YOU BLAME?Former CEO Jeff BezosAICovid (This wave of layoffs results from overhiring during the pandemic)Executive Chair and largest shareholder Jeff BezosF5 Expects Revenue Hit From Cyber Attack. F5, a $20B billion technology company with impressive gross profit margins of 81%, experienced a cybersecurity incident involving unauthorized access to certain company systems by a sophisticated nation-state threat actor. WHO DO YOU BLAME?The Risk committee: Dreyer, Klein, Montoya, Budnik*Chair Marianne Budnik is deemed to have Cybersecurity experience because she serves as a Chief Marketing Officer in the cybersecurity industryPeter Klein was the CFO at Microsoft for less than 4 years, then was the CFO for WME for 6 months and then has only been a director since 2014.Risk committee member Michael Montoya specifically. F5 revealed that the director mysteriously resigned in the same filing it disclosed the cyberattack, despite having served for only 4 years. According to the proxy, had “extensive experience as an information security executive.” Following his resignation from the Board, Mr. Montoya continued his service with the Company and has been appointed as F5's Chief Technology Operations Officer.The entire board, for doing dumb modern day board things: announced that CEO François Locoh-Donou, would assume the additional role of Chair of the Board following the Company's next Annual Meeting of Shareholders 12 days after they announced the cyberattack.Investors. 98% YES average this year: 7 over 99.2%, including Risk Committee Chair Marriane Budnik with 99.6%. Nobody feels like they have to work hard to impress anyoneF5! It's a god damn cybersecurity company!How climate change is fueling Hurricane Melissa's ferocity. WHO DO YOU BLAME?Exxon CEO Darren Woods because he sued his own shareholders last year: Arjuna Capital, LLC and Follow ThisExxon CEO Darren Woods because just yesterday: Exxon sues California over new laws requiring corporate climate disclosuresExxon CEO Darren Woods because gas and oilClimate ChangeOpenAI says U.S. needs more power to stay ahead of China in AI: ‘Electrons are the new oil' WHO DO YOU BLAME?The fear-and-spending geniuses behind the original Cold War: Truman, Stalin, ChurchillPeople who historically ignored Eisenhower and his statements on the U.S. military-industrial complex when he explicitly warned that defense contractors and the military could exert undue influence on government policy. Sound familiar?Anyone who empowered the board to not be empowered when they tried to fire Sam Altman for such reasons as:Conflicts over OpenAI's rapid growth and direction, especially the tension between aggressive AI deployment vs. safety oversight.Power dynamics between Altman, key researchers, and board members — some may have felt he had too much unilateral control.The college that let Sam Altman drop outSammy Altman Citi's Jane Fraser consolidates power with board chair vote — and a $25 million-plus bonus to boot. WHO DO YOU BLAME?The entire Compensation, Performance Management and Culture CommitteeThese two long-tenured Compensation, Performance Management and Culture Committee membersDiana L. Taylor* 10 other directorships: Brookfield Corporation, Accion (Chair), Columbia Business School (Board of Overseers),Friends of Hudson River Park (Chair), Mailman School of Public Health (Board of Overseers), The Economic Club of New York (Member), Council on Foreign Relations (Member), Hot Bread Kitchen (Board Chair), Cold Spring Harbor Lab (Member), and New York City Ballet (Board Chair)Peter B. Henry*8 other directorships: Nike, Inc., Analog Devices, Inc., National Bureau of Economic Research (Board), The Economic Club of New York (Board), Protiviti (Advisory Board), Biospring Partners (Advisory Board), Makena Capital (Advisory Board), and Two Bridges Football Club (Board)The lowest common denominator effect of bank compensation committees:Wells Fargo CEO Charlie Scharf: ~$30M special equity grant tied to becoming Chair as well as CEO (3 months after meeting)Goldman Sachs: CEO David Solomon & COO John Waldron ~$80M each (retention RSUs vesting in ~5 yrs)KeyCorp: CEO Chris Gorman & four other senior execs: ~$8M for Gorman; ~$17M combined for the five NEOsThe passive ownership (re: management-friendly) of BlackRock, State Street, and Vanguard (combined 22%): without their votes at Goldman then Say on Pay was nearly tied, which might have dissuaded the year of one-off bonuses for banking CEOs??The world is about $4.5 trillion short of securing a sustainable food supply for the future, global food and ag business CEO [Sunny Verghese, CEO of food and ag company Olam Group] says. WHO DO YOU BLAME?The world's top 28 richest people (those worth ~$160 B each) together would equal $4.5 trillionThe world's greatest sycophant Tesla chair RobynDenholm: “On the pay package specifically: “It's not about the money for him. If there had been a way of delivering voting rights that didn't necessarily deliver dollars, that would have been an interesting proposition.”Any two of these basically redundant techbro companies' market caps would sufficeNvidia ~$4.2 trillion Microsoft ~$3.8 trillion Apple ~$3.1 trillion Amazon ~$2.4 trillion Alphabet ~$2.2 trillion Meta Platforms ~$1.8 trillion Broadcom ~$1.3 trillion Taiwan Semiconductor Manufacturing Company ~$1.2 trillionBill Ackman. Because he's a douche.MATTTarget is eliminating 1,800 roles as new CEO Michael Fiddelke gets set to take over the struggling retailer - WHO DO YOU BLAME?Current CEO Brian Cornell, who's “stepping down” to the role of Executive Chair - which is basically still CEO, just on the board and doesn't have to talk to employees anymore, so he can eliminate 1800 jobs and then fade away into a multimillion dollar unaccountable board roleFuture CEO Michael Fiddelke, who starts February 1, 2026, but is current COO and was forced to send the memo to employees telling them 8% of the workforce will be cutMonica Lozano, chair of the compensation and human capital management committee of the board, who's also on the BofA and Apple boards and is the most connected board member at a highly connected board - does the chair of the human capital committee have to weigh in on firing?OpenAI - the memo makes zero mention of the fact that part of Target's problem is that it shit on gays and blacks because of a feckless internet toad named Robby Starbuck, but feels very written by AI which would account for phrases like:“Adjusting our structure is one part of the work ahead of us. It will also require new behaviors and sharper priorities that strengthen our retail leadership in style and design and enable faster execution so we can: Lead with merchandising authority; Elevate the guest experience with every interaction; and Accelerate technology to enable our team and delight our guests.”Does anyone know what that word salad actually means? Doesn't it just mean “you're fired because we basically sucked at our jobs”?Hormel recalls 4.9M pounds of chicken possibly 'contaminated with pieces of metal' - WHO DO YOU BLAME?The audit committee, the closest committee responsible for enterprise risk (ie, metal in chicken) - Stephen M. Lacy, William A. Newlands (also lead director), Debbra L. Schoneman, Sally J. Smith (chair), Steven A. White, Michael P. ZechmeisterThe governance committee - James Snee, the now retired CEO who retired somehow in January but the company still hasn't found a permanent replacement 9 months later - so they're being run by Jeff Ettinger, interim CEO? Chair Gary C. Bhojwani, Elsa A. Murano, Ph.D., William A. Newlands (also lead director), Debbra L. Schoneman, Steven A. WhiteThe one black guy on the board - Steve White - who works at Comcast, is somehow qualified to be on Hormel board, and is on BOTH the audit committee AND governance committeeThe conveyor belt that spit pieces of metal as large as 17mm long into “fire braised chicken” sent to hotels and restaurantsCervoMed appoints McKinsey veteran David Quigley to board of directors - WHO DO YOU BLAME? Board is 2 VCs, a longtime biotech CFO, and five MD/PhDs. And among those 8, there are just two woman - the co-founder/wife of the CEO and a VC. And when they did their search, they could only find a longtime professional opinion haver - a consultant from the big three?Nominating committee for lack of imaginationEx or current McKinsey, Bain, and BCG employed directors - the opinion industrial complex - make up a whopping 4% of ALL US DIRECTORSAmong boards with MULTIPLE ex opinion directors: Kohl's is 25% consultantStarbucks is 27% consultantDisney is 30% consultantsWilliams-Sonoma is 38% consultantCBRE is 40% consultant!Nominating committee chair Jane Hollingsworth, for not looking around the room and saying, “hey dudes, can we add, like, maybe, ONE other lady?”Co founders Sylvie Gregoire and John Alam (also CEO) who own 17.3% of voting power - add in Josh Boger, board chair and 12.3% voter, and you basically have the CEO daddy and his buddy Josh with 29.6% of voting controlSylvie and John's bios, which neglect to mention they're married to one anotherWe are all terrified of the future - which headline is worse for your terror? WHO DO YOU BLAME?The world is about $4.5 trillion short of securing a sustainable food supply for the future, global food and ag business CEO saysBill Gates Says Climate Change ‘Will Not Lead to Humanity's Demise' - ostensibly because billionaires in bunkers will, in fact, survive on cans of metal-filled Hormel chili.Sorry, Yoda. Mentors are going out of styleMan Alarmed to Discover His Smart Vacuum Was Broadcasting a Secret Map of His HouseJennifer Garner's baby food company is going public on the NYSE — should investors be putting their eggs in this basket?Woman Repeatedly Warned by Canadian Exchange Not to Transfer Crypto, Gets Scammed AnywayOpenAI completes restructure, solidifying Microsoft as a major shareholder - MSFT owns 27%, the non profit which controlled the company “for the benefit of humanity” now will only control it for 26% of humanity?Tesla risks losing CEO Musk if $1 trillion pay package isn't approved, board chair says - IF MUSK LEAVES, WHO DO YOU BLAME?Robyn Denholm, board chair, whose job it is to manage Musk, but does it like an overwhelmed permissive mother who parents with chocolate and Teletubbies when the kid has a tantrumKimbal Musk - I was told by a bunch of directors and institutional investors at a conference, no joke, that Kimbal was still on the board (ie, not voted out) to control his brother's ketamine intake and crazy episodes. So if he throws a tantrum and leaves, isn't it bro's fault? This is a binary trade - Musk gets extra pay/control, stock goes up and isn't de-meme'd. Musk doesn't, he leaves and the stock is de-meme'd and drops arguably by 66% or more to be more like a car company with some tech. So do we blame investors, no matter what they do? They meme'd the stock in the first place, he couldn't get a trillion extra dollars if they hadn't pumped up the stock - and now they could vote with humanity (no pay) or meme capitalism (pay)!Techbro middle school conservatism - is this Ben Shapiro and Joe Rogan's fault? A Yale economist paper suggests that Musk's politics cost between 1 and 1.26 million Tesla car sales… Would we even be worried if Musk stayed out of politics? Wouldn't the market have just paid him whatever?Pop quiz: which directors stay on the board if Musk leaves in a tantrum?Jeffrey StraubelKimbal MuskRobyn DenholmJames MurdochKathleen Wilson-ThompsonIra EhrenpreisJack HartungJoe Gebbia
In this episode of the Tyler Tech Podcast, Tim Walsh, general manager of cybersecurity at Tyler Technologies, joins the show to discuss the human side of cybersecurity and the importance of building a strong organizational culture to support it.Tim explains why technology alone isn't enough to defend against evolving threats — emphasizing the critical role of people, processes, and leadership. He shares how public sector organizations can strengthen cyber resilience by investing in their teams, encouraging continuous training, and fostering a culture where every employee understands their part in protecting systems and data.The conversation also explores strategies for addressing workforce shortages, partnering effectively to maintain 24/7 coverage, and recruiting and retaining cybersecurity talent in a competitive market. By empowering employees and creating a culture of shared responsibility, public sector leaders can build teams that are ready to adapt, respond, and thrive in an ever-changing cybersecurity landscape.This episode also highlights the advantages of cloud infrastructure and how it is transforming the public sector. From reducing technical debt and streamlining operations to creating the flexibility to adopt AI and other emerging tools, the cloud provides a smarter, more resilient foundation for modernization, security, and innovation. Explore our resources in the show notes to learn how governments can maximize long-term value and take the next step toward a future built to adapt.Explore More: Cloud Infrastructure for GovernmentAnd learn more about the topics discussed in this episode with these resources:Download: Digital Access and Accessibility in the Resident ExperienceDownload: How To Identify Cyberthreats Before They Become a BreachTyler in the News: South Carolina AI, Cyber Initiatives Reshape ServicesBlog: The Power of Data: Building Resilient and Responsive SystemsBlog: Preparing for the Future of AI in GovernmentBlog: Boosting Resilience: Cloud Solutions for Modern GovernmentBlog: Cyber Defense: Local Governments Weigh InBlog: Partnering With Communities to Build ResilienceBlog: K-12 Cybersecurity Funding: What Districts Need to KnowBlog: Resilient Communities Rely on Modern Public Safety SolutionsBlog: Increase Community Resilience With Modern Payment SystemsBlog: How Cloud-Based Solutions Expand Access to State ServicesBlog: Resilience at Scale: Technology for an Unpredictable FutureListen to other episodes of the podcast.Let us know what you think about the Tyler Tech Podcast in this survey!
A rookie FBI agent is swept up in a case that goes from Main St, USA, to the UK, Ukraine and Russia. Cyber-crime victims are everywhere. This is way bigger than Jim Craig thought. He travels to Ukraine to meet his counterparts. Over vodka and fine food in a dacha in the Ukrainian forest, they make a plan to go after the suspected cyber hackers.Hosted by Joe Tidy, the BBC's cyber correspondent – one of the few Western journalists to have met an alleged member of Evil Corp – and the BBC's Sarah Rainsford, who spent more than two decades reporting from Moscow.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysis tool Kaitai Struct is now available in a web only version https://isc.sans.edu/diary/Kaitai%20Struct%20WebIDE/32422 WSUS Emergency Update Microsoft released an emergency patch for WSUS to fix a currently exploited critical vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287 Network Security Devices Endanger Orgs with 90s-era Flaws Attackers increasingly use simple-to-exploit network security device vulnerabilities to compromise organizations. https://www.csoonline.com/article/4074945/network-security-devices-endanger-orgs-with-90s-era-flaws.html
We open with a sobering follow-up: the future is less about AI toast (though Red Dwarf predicted it) and more about a soul-stripping "infrastructure of meaningless" after an AWS outage proved how fragile the internet is. Corporate overlords, like Elon Musk, are taking note: he finally addressed Starlink's use by Asian scam syndicates, but his attention is mostly on superintelligence, which Wozniak, Prince Harry, and 800 others want banned. Meanwhile, Meta, despite pouring $27 billion into data centers, suddenly cut 600 AI jobs, and Amazon is preparing to automate a half-million warehouse positions, offering drivers AR spy glasses and suggesting a new "Help Me Decide" AI tool to automate the exhausting micro-decision of which air fryer to buy. This dystopian fever dream peaked when Suzanne Somers' widower revealed he built a full-on robotic AI twin of the late actress. Predictably, Tesla stock tumbled, and the crypto grift continued with the pardoning of Binance founder Zhao, leaving SBF to ponder his failed check-bounce in jail.Speaking of soul-crushing, Disney's latest nostalgia raid, Tron: Ares, tanked harder than anticipated, proving not every Gen-X intellectual property is a worthy cash cow. But fear not, there's still great TV to be had: we recommend the clever dramas Slow Horses and The Diplomat Season 3, the high-stakes culinary nightmare Knives Edge: Chasing Michelin Stars, and the surprisingly excellent Gen V (which you must watch before the next season of The Boys). We also got our fix with the Pluribus trailer, Bullet Train, Dr. Horrible's Sing-Along Blog, and the deliciously low-stakes reality shows Come Dine With Me, Hotel Costiera, and The Celebrity Traitors UK/Canada. Sadly, we must mourn the end of Food Network's The Kitchen. Yet, no matter how good the show, you still have to deal with Ticketmaster, which is still lying about "fighting bots" while cornering the secondary market.In the world of Apps & Doodads, OpenAI dropped its "Anti-Web" browser, ChatGPT Atlas (a data mule in disguise), and a new app now fakes your vacation photos (perfect for burned-out users). X is poised to sell "rare" usernames for millions (with a terrible subscription catch), while some clever hacker figured out a $60 mod to disable the privacy light on Meta's Ray-Ban spy glasses. Fellow podcast host Dave Bittner joined us to agree that the new Hall of Presidents format is better without the political posturing and confirmed the joy of old-school, purple-ink-smelling Spirit Duplicators (and we checked out a Star Wars fan film trailer for the AT THE LIBRARY section). Don't forget your Tilly Hat! Finally, R.I.P. Soft Cell's musical force Dave Ball, aged 66; the hits still hit.Sponsors:Private Internet Access - Go to GOG.Show/vpn and sign up today. For a limited time only, you can get OUR favorite VPN for as little as $2.03 a month.SetApp - With a single monthly subscription you get 240+ apps for your Mac. Go to SetApp and get started today!!!1Password - Get a great deal on the only password manager recommended by Grumpy Old Geeks! gog.show/1passwordMasterClass - Get an additional 15% off any annual membership at MASTERCLASS.com/GRUMPYOLDGEEKSCleanMyMac - clnmy.com/GrumpyOldGeeks - Use code OLDGEEKS for 20% off.Show notes at https://gog.show/719FOLLOW UPDoes Anyone Want Any Toast? | Red Dwarf | BBCA Tool That Crushes CreativityIN THE NEWSAmazon's AWS outage knocked services like Alexa, Snapchat, Fortnite, Venmo and more offlineSpaceX disables 2,500 Starlink terminals allegedly used by Asian scam centersYelp is getting more AI, including an upgraded chatbotSteve Wozniak, Prince Harry and 800 others want a ban on AI ‘superintelligence'Suzanne Somers' Widower Built “AI Twin” of Late ActressMeta Cuts 600 AI Roles From Its Superintelligence Labs After $27 Billion Data Center DealNew report leaks Amazon's proposed mass-automation plansAmazon Rolls Out New AI Tool to Help You Decide What to Buy: The Great Mental Outsourcing continues.Amazon unveils AI-powered augmented reality glasses for delivery driversTesla reports revenue growth after two down quarters. Why the stock is fallingTrump pardons convicted Binance founder Zhao, White House saysCrypto billionaire pardon is insane by CoffeezillaMEDIA CANDY‘Tron: Ares' Is an Even Bigger Bomb Than We ThoughtTron: LegacyHuman: Into the AmericasHuman: Building EmpiresCome Dine With MeFood Network's The Kitchen to End After 40 SeasonsKnifes Edge: Chasing Michelin StarsPluribus — Official Trailer | Apple TVBullet TrainDr. Horrible's Sing-Along BlogHotel CostieraSlow HorsesThe Diplomat Season 3The Celebrity Traitors UKTraitors Canada Season 3Ticketmaster Is Going to Have to Do Better Than ThatAPPS & DOODADSOpenAI's AI-powered browser, ChatGPT Atlas, launches on macOS todayChatGPT's Atlas: The Browser That's Anti-Web By Anil DashToo burned out to travel? This new app fakes your summer vacation photos for youX's handle marketplace will sell some 'rare' usernames for millions of dollarsA $60 Mod to Meta's Ray-Bans Disables Its Privacy-Protecting Recording LightTHE DARK SIDE WITH DAVEDave BittnerThe CyberWireHacking HumansCaveatControl LoopOnly Malware in the BuildingGen VTilly HatsFirefly | The World's Smallest Pro-Audio MicrophoneSpirit Duplicators: Copies Never Smelled So GoodSTAR WARS ENTRENCHED: Fan Film TEASER 2CLOSING SHOUT-OUTSSoft Cell's musical force Dave Ball dies, aged 66See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.