POPULARITY
Categories
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
2026 64-Bits Malware Trend https://isc.sans.edu/diary/2026%2064-Bits%20Malware%20Trend/32718 A Comparative Security Analysis of Three Cloud-based Password Managers https://zkae.io Infostealer Infection Targeting OpenClaw Configurations https://www.infostealers.com/article/hudson-rock-identifies-real-world-infostealer-infection-targeting-openclaw-configurations/
Expertos de Deloitte, Zero Networks y Netskope analizan cómo adoptan Zero Trust, refuerzan su ciberresiliencia e incorporan IA con éxito.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
AI-Powered Knowledge Graph Generator & APTs https://isc.sans.edu/diary/AI-Powered%20Knowledge%20Graph%20Generator%20%26%20APTs/32712 nslookup and ClickFix https://x.com/MsftSecIntel/status/2022456612120629742 Google Chrome 0-Day Patch https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html TURN Security Threats https://www.enablesecurity.com/blog/turn-server-security-threats/
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.Russian cyber operations have maintained a consistent focus on exploiting both tactical and strategic targets within the defense industrial base, particularly in the context of the war in Ukraine.Sygnia has disclosed a large-scale, AI-driven scam operation involving over 150 cloned websites impersonating law firms.A joint investigation by SentinelLabs and Censys has revealed a growing ecosystem of publicly exposed AI compute infrastructure, driven largely by deployments of Ollama - an open-source framework for running large language models locally.Flare has identified a widespread, ongoing campaign attributed to a threat actor group known as TeamPCP -also operating under aliases such as PCPcat and ShellForce - which has compromised over 60,000 servers worldwide since late December.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform.This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.
If you like what you hear, please subscribe, leave us a review and tell a friend!
MONEY FM 89.3 - Prime Time with Howie Lim, Bernard Lim & Finance Presenter JP Ong
On What's Trending today, Hongbin Jeong and Nadiah Koh dive into how the Singaporean government is exploring regulating blind boxes to better manage gambling inducement risks, and how, over in China, a growing number of young people are celebrating what’s being called a “Cyber Lunar New Year.”See omnystudio.com/listener for privacy information.
Computer und Kommunikation (komplette Sendung) - Deutschlandfunk
Kloiber, Manfred www.deutschlandfunk.de, Computer und Kommunikation
How do you raise safe, confident kids in a world of gaming chats, AI tools, social media, and constant connectivity?In this episode of the Where Parents Talk podcast, host Lianne Castelino speaks to cybersecurity professionals Chad Rychlewski and Kae David, who share expert, practical advice from their book Cyber Smart Parenting. As both industry insiders, they translate enterprise-level cybersecurity strategies into realistic steps families can use at home.You'll hear:Why digital safety conversations should begin in kindergartenThe risks of oversharing photos in the age of AIHow gaming voice chats expose children to strangersWhy locking your child's credit protects against identity theftHow to talk to teens about their digital footprint without shameThe importance of family digital contractsWhy being present matters more than being technicalInstead of fear, this conversation focuses on empowerment. The safest kids aren't the most restricted — they're the ones who feel safe coming to their parents before a crisis happens.This podcast is for parents, guardians, teachers and caregivers to learn proven strategies and trusted tips on raising kids, teens and young adults based on science, evidenced and lived experience.You'll learn the latest on topics like managing bullying, consent, fostering healthy relationships, and the interconnectedness of mental, emotional and physical health.Links referenced in this episode:whereparentstalk.com
We kick things off in FOLLOW UP with the ongoing "nuclear war" between Automattic and WP Engine, where discovery has revealed Matt Mullenweg's alleged hit list of competitors and a desperate attempt to bully payment processors—because nothing says "open source" like an eight-percent royalty shakedown. Meanwhile, the Harvard Business Review confirmed what we already knew: AI isn't reducing our work; it's just compressing it until we're all working through lunch and burning out faster while Polymarket turns our collective brain rot into a literal "attention market" where you can bet on Elon's mindshare.Transitioning to IN THE NEWS, Elon has officially pivoted SpaceX from Mars to the Moon, presumably because building a "self-growing lunar city" is easier than admitting the Red Planet is hard, though his xAI all-hands rant about "ancient alien catapults" suggests he's been staring at the sun too long. Between X allegedly taking blue-check lunch money from sanctioned Iranian leaders, Meta facing trials for creating "predator-friendly hunting grounds," and Russia finally pulling the plug on WhatsApp, the internet is looking more like a digital dumpster fire than ever. Add in Discord leaking 70,000 government IDs, OpenAI shoving ads into ChatGPT while safety researchers flee the building like it's on fire, and a "cognitive debt" crisis eroding our ability to think, and you've got a recipe for a tech-induced psychosis that even crypto-funded human trafficking can't outpace.In MEDIA CANDY, we're wondering about the soft-core porn intro in the latest Star Trek: Starfleet Academy while Apple buys the total rights to Severance for seventy million dollars—because in-house production is the only way to keep those ballooning budgets under control. Super Bowl trailer season gave us a glimpse of The Mandalorian and Grogu and a Project Hail Mary teaser, while Babylon 5 has finally landed on YouTube for free, proving that even 90s serialized sci-fi eventually finds its way to the clearance bin.Over in APPS & DOODADS, Meta Quest is nagging us for our birthdays like a needy relative, while Roblox had to scrub a mass-shooting simulator—because "AI plus human safety teams" is apparently just code for "we missed it until it hit the forums." Ring's Super Bowl ad for "Search Party" accidentally terrified everyone by revealing a mass surveillance network for pets that's a slippery slope toward a police state, and Waymo is now paying DoorDashers ten bucks just to walk over and close the car doors that autonomous tech still can't figure out.Wrapping up with THE DARK SIDE WITH DAVE, we dive into the Mandalorian Hasbro reveal where Sigourney Weaver's action figure comes with no accessories because her existence is enough of a flex. We explore the grim reality of "RentAHuman," where humans are paid pittance to pretend AI agents are actually doing work, and look at "Trash Talk Audio," which sells a $125 microphone made out of a literal old telephone for that authentic Gen-X "get off the line, I'm expecting a call" aesthetic. From Marcia Lucas finally venting about the prequels and a rare book catalog specifically for our aging generation, we're reminded that while the future is a chaotic mess of "GeoSpy" AI and corporate reshuffling at Disney, at least we still have our cynical memories and some free versions of Roller Coaster Tycoon to keep us from losing it completely.Sponsors:CleanMyMac - Get Tidy Today! Try 7 days free and use code OLDGEEKS for 20% off at clnmy.com/OLDGEEKSDeleteMe - Get 20% off your DeleteMe plan when you go to JoinDeleteMe.com/GOG and use promo code GOG at checkout.Private Internet Access - Go to GOG.Show/vpn and sign up today. For a limited time only, you can get OUR favorite VPN for as little as $2.03 a month.SetApp - With a single monthly subscription you get 240+ apps for your Mac. Go to SetApp and get started today!!!1Password - Get a great deal on the only password manager recommended by Grumpy Old Geeks! gog.show/1passwordShow notes at https://gog.show/733FOLLOW UPAutomattic planned to target 10 competitors with royalty fees, WP Engine claims in new filingAI Doesn't Reduce Work—It Intensifies ItPolymarket To Offer Attention Markets In Partnership With Kaito AIIsrael Arrests Members of Military for Placing Polymarket Bets Using Inside Information on Upcoming StrikesIN THE NEWSUnable to Reach Mars, Musk Does the Most Musk Thing PossibleWe'll Find the Remnants of Ancient Alien Civilizations': Read Musk's Gibberish Rant from His xAI All-Hands MeetingElon Musk's X Appears to Be Violating US Sanctions by Selling Premium Accounts to Iranian LeadersMeta Faces Two Key Trials That Could Change Social Media ForeverWhatsApp is now fully blocked in RussiaRussia is restricting access to Telegram, one of its most popular social media apps. Here's what we knowDOJ may face investigation for pressuring Apple, Google to remove apps for tracking ICE agentsDiscord Launches Teen-by-Default Settings GloballyDiscord says hackers stole government IDs of 70,000 usersFree Tool Says it Can Bypass Discord's Age Verification Check With a 3D ModelTesting ads in ChatGPTOpenAI Researcher Quits, Warns Its Unprecedented ‘Archive of Human Candor' Is DangerousOpenAI Fires Top Safety Exec Who Opposed ChatGPT's “Adult Mode”Anthropic AI Safety Researcher Warns Of World ‘In Peril' In ResignationMusk's xAI loses second co-founder in two daysAmerica Isn't Ready for What AI Will Do to JobsMonologue: No, Something Big Isn't ComingThe Scientist Who Predicted AI Psychosis Has a Grim Forecast of What's Going to Happen NextCrypto-Funded Human Trafficking Is ExplodingMEDIA CANDYShrinkingStar Trek: Starfleet AcademyPoor ThingsProject Hail Mary | Final TrailerMinions & Monsters | Official TrailerDisclosure Day | Big Game SpotThe Mandalorian and Grogu | A New Journey Begins | In Theaters May 22Babylon 5 Is Now Free to Watch On YouTubeApple acquires all rights to ‘Severance,' will produce future seasons in-houseOptimizing your TVAPPS & DOODADSTumbler Ridge Shooter Created Mall Shooting Simulator in RobloxHere's how to disable Ring's creepy Search Party featureWaymo Is Getting DoorDashers to Close Doors on Self Driving CarsTikTok US launches a local feed that leverages a user's exact locationApple just released iOS 26.3 alongside updates for the Mac, iPad and Apple WatchTHE DARK SIDE WITH DAVEDave BittnerThe CyberWireHacking HumansCaveatControl LoopOnly Malware in the BuildingWe Call It ImagineeringYour First Look at Hasbro's 'Mandalorian and Grogu' Figures Is Here (Exclusive)I Tried RentAHuman, Where AI Agents Hired Me to Hype Their AI StartupsTrash Talk AudioRoger Reacts to Star Wars - A New HopeMarcia Lucas Finally Speaks Out | Icons Unearthed: Unplugged (FULL INTERVIEW)What's wrong with the prequels?Rare Books, Gen X editionGeoSpyCLOSING SHOUT-OUTSRobert Tinney, who painted iconic Byte magazine covers, RIPBud CortSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Four Seconds to Botnet - Analyzing a Self-Propagating SSH Worm with Cryptographically Signed C2 [Guest Diary] https://isc.sans.edu/diary/Four%20Seconds%20to%20Botnet%20-%20Analyzing%20a%20Self%20Propagating%20SSH%20Worm%20with%20Cryptographically%20Signed%20C2%20%5BGuest%20Diary%5D/32708 OpenSSH Update on MacOS https://www.openssh.org/releasenotes.html Employee Monitoring and SimpleHelp Software Abused in Ransomware Operations https://www.huntress.com/blog/employee-monitoring-simplehelp-abused-in-ransomware-operations
At ITEXPO / MSP EXPO, Zack Schwartz, Vice President of Strategic Partnerships at Trustifi, joined Doug Green to discuss a critical but often overlooked reality: while AI dominates headlines, email remains the primary attack vector for cybercrime. Trustifi delivers a full-suite email security platform purpose-built for MSPs, enabling easy deployment, centralized management, and advanced protection against next-generation AI-driven phishing attacks. Schwartz emphasized that over 91% of cyberattacks still originate from inbound email—and the sophistication of those attacks has grown dramatically with AI tools. “Cyber criminals are leveraging AI to create extremely nuanced attacks,” he explained. Trustifi addresses this by combining high-efficacy inbound phishing detection with innovative AI-driven training tools. One standout feature allows MSPs to convert a real phishing attack into customized security awareness training, generating targeted video content based on an incident that actually occurred within a customer's environment. A key differentiator is Trustifi's “journal-only mode,” which allows MSPs to deploy the platform without interrupting live email flow. The system produces a full report showing how Trustifi would have responded to threats, creating what Schwartz described as a powerful “aha moment” for customers. According to Trustifi, this approach converts over 80% of opportunities and requires only minutes to set up—at no cost to the partner or end client. Beyond inbound threats, Trustifi also addresses outbound risk and compliance requirements, including HIPAA, PCI, GDPR, and broader data loss prevention (DLP) concerns. Many organizations underestimate how much sensitive information leaves their network via email. “It's a big issue of not knowing what you don't know,” Schwartz said, highlighting how classification and encryption tools expose hidden vulnerabilities. With no minimum requirements, free NFR licenses for MSPs, and strong momentum away from legacy email gateways, Trustifi is positioning itself as a high-margin opportunity within the channel. The message to MSPs: start internally, see the exposure firsthand, and then extend protection across your customer base. Visit https://trustifi.com/
If you like what you hear, please subscribe, leave us a review and tell a friend!
The Naval Information Warfare Systems Command stood up a new cyber directorate last August to take a more comprehensive approach to cybersecurity across the enterprise. The office is zeroing in on three priorities: speeding up zero‑trust adoption, strengthening secure software practices and bringing cutting‑edge defensive technologies into the fight. For more on why Navwar created the directorate and where it's headed, Federal News Network's Jason Miller spoke with Rachel Bondi, the deputy director for the cyber innovation unit and CTO for mission systems afloat, at the West Conference in San Diego.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
This episode was first published on 18 July 2025.Cyber attacks can feel a layer detached from the real world. Yes, businesses frequently see IP stolen, get frozen out of systems, or have data wiped by malicious actors. But if you haven't got your finger on the pulse, cyber attacks can also fail to register in your day to day.But there are instances where cyber attacks come crashing into the lives of everyday people, and become impossible to ignore: when attackers go after critical infrastructure and operational technology. Breaches and malware attacks at power and water plants, against core supply chain organizations, or against transport networks can all cause catastrophic damage, enormous financial losses – and even lead to deaths.In this episode, Rory speaks with Magpie Graham, technical director of intel and services at Dragos, to discuss attacks on operational technology, critical infrastructure, and the future of large-scale cyber attacks.Read more:What is operational technology – and why is it at risk?Manufacturing firms are struggling to handle rising OT security threatsWhen everything connects, everything's at riskFormer NCSC head says the Jaguar Land Rover attack was the 'single most financially damaging cyber event ever to hit the UK' as impact laid bareCISA shares lessons learned from Polish power grid hack – and how to prevent disaster striking again
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
WSL in the Malware Ecosystem https://isc.sans.edu/diary/32704 Apple Patches Everything: February 2026 https://isc.sans.edu/diary/Apple%20Patches%20Everything%3A%20February%202026/32706 Adobe Updates https://helpx.adobe.com/security/security-bulletin.html
Tal Kollender is the co-founder and CEO of Remedio. In this episode, she joins host Paul John Spaulding to discuss her journey from hacking video games to a successful career in cybersecurity, alongside the decision to start Remedio, her role as a woman in cyber, and more. • For more on cybersecurity, visit us at https://cybersecurityventures.com.
On Cloud Realities, the real insight rarely came from technology alone, it emerged at the intersection of People, Culture, Industry, and Technology. In the remix we bring back familiar voices and topics while going deeper into the wider impacts, influence, and potential of today's tech across society. The 2026 season trailer, arriving a little later than planned, opens with this renewed focus and sets the stage for Episode 1, launching on February 19. Here's a quick trailer to get you ready!TLDR00:11 The emergence of insight from Cloud Realities01:00 Where the magic happens 01:42 The real impact on People, Culture, Industry and Tech HostsDave Chapman: https://www.linkedin.com/in/chapmandr/Esmee van de Giessen: https://www.linkedin.com/in/esmeevandegiessen/Rob Kernahan: https://www.linkedin.com/in/rob-kernahan/ProductionMarcel van der Burg: https://www.linkedin.com/in/marcel-vd-burg/Dave Chapman: https://www.linkedin.com/in/chapmandr/ SoundBen Corbett: https://www.linkedin.com/in/ben-corbett-3b6a11135/Louis Corbett: https://www.linkedin.com/in/louis-corbett-087250264/ 'Realities Remixed' is an original podcast from Capgemini
If you like what you hear, please subscribe, leave us a review and tell a friend!
Caitlin Sarian (aka "Cybersecurity Girl") is one of the most recognized cybersecurity educators online (1.2M+ followers). She previously led TikTok's Global Cybersecurity Advocacy & Culture work, and spent ~10 years in cybersecurity and privacy across consulting and leadership rolesWe talk about the simple security habits that actually matter (passwords, passkeys, and the right kind of 2FA), how people get tricked by phishing and “perfect copy” fake login pages, what data brokers are really doing with your information, how tracking and permissions quietly follow you around, and how AI is changing the game for both privacy and scams. The goal is simple: help you protect yourself, think clearer, and make smarter decisions online without needing to be “technical.”Chapters: 0:00 Intro3:30 Caitlin's story: from engineering to cybersecurity9:24 The interview that pulled her into cybersecurity11:12 Why she started teaching cyber online15:04 Password mistakes & common scam setups19:28 Cookies, tracking & “I accept” traps27:18 Voice scams & impersonation tricks37:57 The 3 things your apps are collecting39:03 Data brokers — how your info gets sold42:55 Protecting your identity 51:02 Cyber warfare between countiesLearn Unreal Engine in 14 Days - $300 OFF https://join.baddecisions.studio/c/podcast?discounts=PODCASTIf this podcast is helping you, please take 2 minutes to rate our podcast on Spotify or Apple Podcasts, It will help the Podcast reach and help more people!Spotify - https://open.spotify.com/show/12jUe4lIJgxE4yst7rrfmW?si=ab98994cf57541cfApple Podcasts (Scroll down to review)- https://podcasts.apple.com/us/podcast/bad-decisions-podcast/id1677462934Find out more about Cybersecurity girl:- Instagram: https://www.instagram.com/cybersecuritygirl/- LinkedIn: https://www.linkedin.com/in/caitlin-sarian- Youtube: youtube.com/cybersecuritygirlJoin our discord server where we connect and share assets: https://discord.gg/zwycgqezfDIf you wanna see us to do cool things follow us here too:Instagram:https://www.instagram.com/badxstudio/Twitter: https://twitter.com/badxstudioTikTok: https://www.tiktok.com/@badxstudioLinkedIn: https://www.linkedin.com/company/badxstudioOur personal handles: (if you wanna stalk us)https://www.instagram.com/farhad_baddecisions/https://www.instagram.com/faraz_baddecisions/https://www.linkedin.com/in/farhadshababi/https://www.linkedin.com/in/farazshababi/
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Microsoft Patch Tuesday - February 2026 https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20-%20February%202026/32700 Refreshing the root of trust https://blogs.windows.com/windowsexperience/2026/02/10/refreshing-the-root-of-trust-industry-collaboration-on-secure-boot-certificate-updates/ Fake 7-Zip downloads are turning home PCs into proxy nodes https://www.malwarebytes.com/blog/threat-intel/2026/02/fake-7-zip-downloads-are-turning-home-pcs-into-proxy-nodes FortiNet Vulnerabilities https://fortiguard.fortinet.com/psirt/FG-IR-25-093 https://fortiguard.fortinet.com/psirt/FG-IR-25-1052
In this episode of The Segment, Raghu sits down with Ross Haleliuk—Co-Founder & CEO of a stealth startup, author of Cyber for Builders, and host of Inside the Network and Venture in Security to unpack why most security failures aren't caused by a lack of tools, but by a failure to execute the fundamentals.Ross brings a pragmatic, business-first lens to cybersecurity, cutting through hype, buzzwords, and so-called “silver bullets” to focus on what actually works in the real world. Together, they explore why breaches still happen even in organizations that invest heavily in security and why that investment still matters.In this conversation, you'll learn:Why most cyber breaches still come down to security fundamentals, not next-gen toolsWhy cybersecurity has become a “market for silver bullets”—and what that means for buyers and vendorsHow misaligned incentives across engineering, IT, sales, and security undermine long-term securityWhy compliance should be treated as a baseline, not the finish lineHow to think about security ROI in a way executives actually understandHow to evaluate AI in cybersecurity without getting lost in the hypeWhy security leaders must learn to lead without authority, similar to product managersWhat gives Ross optimism about the future of cybersecurity heading into 2026
Guest Ty Hughes is a longtime cybersecurity and technology leader in the public sector that champions cyber wellness. He discussed the concept of "AI alchemy" and a "pause, breathe, summarize" framework to help leaders improving clarity under pressure. He framed cybersecurity not as a technical challenge, but rather as a human system under constant cognitive and emotional load. He discussed how burnout, decision fatigue and constant urgency can degrade security performance long before technical failures might appear.
Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard: https://mastercard.us/en-us.html
If you like what you hear, please subscribe, leave us a review and tell a friend!
China has breached all of Singapore's major telcos, Microsoft announces two new security features, a hacktivist leaks data from a stalkerware provider, and researchers map out “GRU information warfare units” based on their insignia. Show notes Risky Bulletin: Chinese cyber-spies breached all of Singapore's telcos
The rise of Industry 4.0 has transformed manufacturing through the integration of cyber-physical systems, connectivity, and real-time data exchange into increasingly automated and intelligent platforms. While these advances improve productivity and efficiency, they also introduce vulnerabilities to cyber-physical attacks that can degrade product quality, damage equipment, and pose safety risks. Effective detection depends on understanding which data sources and levels of granularity provide sufficient visibility for accurate anomaly detection and attack identification. Replicated environments, such as digital twins (DTs), help address the challenges of collecting high-fidelity data and executing complex attack scenarios in live production systems.This talk presents an AI-assisted framework for detecting cyber-physical attacks in smart manufacturing using real machine experimentation complemented by DT–based replication. The framework evaluates multiple data sources, ranging from high-level operational data to low-level control and side-channel signals, to understand how data fidelity and context influence detection performance. A hardware-in-the-loop (HIL) DT is used to replicate machine behavior, safely execute attacks, and enable controlled experimentation that would be impractical in live production environments.Through experiments on a real CNC machining system and its corresponding HIL-based DT, multiple cyber-physical attack scenarios are evaluated using statistical, machine learning, and deep learning-based detection methods. Results demonstrate that detection effectiveness is highly dependent on attack type and data granularity, highlighting the need for domain-aware, multi-source monitoring strategies. The framework is further extended to additive manufacturing, illustrating how insights derived from CNC systems can guide attack detection in related manufacturing domains.Overall, this work demonstrates how combining AI-based detection with real-world experimentation and DT technologies enables more robust and practical security analysis for cyber-physical manufacturing systems. About the speaker: Dr. Bethanie Williams is an R&D, S&E Cybersecurity Engineer at Sandia National Laboratories, where she specializes in applying artificial intelligence (AI) to enhance the security and resilience of cyber-physical systems in critical infrastructure, including power grid systems, healthcare facilities, and advanced manufacturing. She is also actively involved in the Cybersecurity Manufacturing Innovation Institute (CyManII) through her work at Sandia. Bethanie earned her Bachelor of Arts degree as a triple major in Mathematics, Spanish, and Computer Science from Berea College in 2020. During her time at Berea, she was a Bonner Scholar and a member of the women's basketball team, earning All-American honors for her athletic achievements. She completed her Master of Science in Computer Science with a concentration in Cybersecurity at Tennessee Technological University in 2022, under the supervision of Dr. Ambareen Siraj, and earned her Ph.D. in Engineering with a major in Computer Science in 2025 under the guidance of Dr. Muhammad Ismail. Her dissertation, titled "Multi-Source Data Analysis and an Effective AI-Assisted Detection Framework for Cyber-Physical Attacks in Smart Manufacturing," focused on leveraging AI-driven approaches and analyzing various data sources to detect and mitigate cyber-physical attacks in manufacturing systems. Throughout her graduate studies, Bethanie received the College of Engineering Distinguished Fellowship and the National Science Foundation (NSF) Scholarship for Service (SFS). She was a year-round intern at Sandia National Laboratories as part of the Center for Cyber Defenders (CCD) program, where she contributed to national research initiatives under CyManII. Bethanie held several executive leadership roles at Tennessee Tech, including Vice President of Cyber Eagles and Graduate Student Club. She also served as a Ph.D. advisor for Women in Cybersecurity (WiCyS). Through these roles, she actively mentored students, organized outreach events, and fostered a supportive community for women in cybersecurity. Bethanie's current research interests include cyber-physical security, modeling and simulation of industrial control systems, and leveraging AI for advanced manufacturing. As an Early Career R&D, S&E Cybersecurity Engineer at Sandia, she is committed to bridging academic innovation and national security applications to protect critical infrastructure and ensure its resilience.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Quick Howto: Extract URLs from RTF files https://isc.sans.edu/diary/Quick%20Howto%3A%20Extract%20URLs%20from%20RTF%20files/32692 German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists German: https://thehackernews.com/2026/02/german-agencies-warn-of-signal-phishing.html English: https://www.verfassungsschutz.de/SharedDocs/publikationen/DE/praevention_wirtschafts-und_wissenschaftsschutz/2026-02-06-gemeinsame-warnmitteilung-phishing.pdf?__blob=publicationFile&v=3 Someone Knows Bash Far Too Well, And We Love It - Pre-Auth RCEs https://labs.watchtowr.com/someone-knows-bash-far-too-well-and-we-love-it-ivanti-epmm-pre-auth-rces-cve-2026-1281-cve-2026-1340/ Pre-Auth RCE in BeyondTrust Remote Support & PRA CVE-2026-1731 https://www.hacktron.ai/blog/cve-2026-1731-beyondtrust-remote-support-rce https://www.beyondtrust.com/trust-center/security-advisories/bt26-02 Fortinet FortiClientEMS SQLi in the administrative interface https://fortiguard.fortinet.com/psirt/FG-IR-25-1142
It's the Pure Report annual predictions episode! We welcome Shawn Rosemarin to dive deep into the world of tech in 2026, including a look back at 2025 predictions on AI becoming a strategist, Multi-Cloud 2.0 requiring a unified data platform, and end-to-end security ramping up. Shawn holds himself accountable for last year's bets, particularly noting that the expected "operating model transformation" driven by AI has yet to fully materialize, arguing that many organizations are still grappling with the hard changes to people, process, and technology required for true transformation. Our conversation pivots to what's next, starting with the evolution of AI from simple co-pilots to autonomous agents that will soon become mature process owners capable of completing end-to-end workflows. This shift will require a greater emphasis on verification, changing the industry's focus from time to answer to time to trust (or time to truth) as enterprises build verification stacks to ensure AI accuracy, recognizing that every mistake costs money and customer satisfaction. Finally, Rosemarin forecasts that growing energy scarcity will drive new AI economics, forcing serious programs to run AI like a business system by routing queries to the most efficient models. Furthermore, he predicts that data stops being an asset and evolves to a supply chain, necessitating a manufacturing-like process to refine structured, semi-structured, and unstructured data for uniform consumption by training systems. This new landscape will ultimately punish infrastructure complexity and reward the platform mindset that simplifies operations and removes friction through automation and orchestration. To learn more, visit https://blog.purestorage.com/perspectives/2026-ai-predictions-data-storage/ Check out the new Pure Storage digital customer community to join the conversation with peers and Pure experts: https://purecommunity.purestorage.com/ 00:00 Intro and Welcome 09:30 Look back at 2025 Predictions 17:33 William Gibson Quote on the Future 22:20 2026 Predictions - Copilots Become Agents 26:48 Verification and Time to Trust 30:30 Energy Scarcity and AI Economics 34:13 Data as a Supply Chain 38:50 Relevance Engines 42:10 Platform Mindset 45:43 Content Authenticity 49:37 Cyber as an Executive Imperative 52:35 Workforce Productivity 55:21 Summary of 2026 Predictions
Send me a text (I will personally respond)Are you struggling to build a channel sales program that actually produces meaningful revenue? Wondering why bigger isn't always better when choosing channel partners? Frustrated by the constant pressure to sign as many partners as possible, only to see limited results? This episode dives deep into the strategic and tactical mistakes cybersecurity startups make with channel go-to-market, and reveals how to build a scalable, effective partner ecosystem.In this conversation we discuss:
The Medcurity Podcast: Security | Compliance | Technology | Healthcare
If you like what you hear, please subscribe, leave us a review and tell a friend!
In this segment, Mark is joined by George Rosenthal, a Co-Owner of Throttlenet. He joins for Tech Talk Tuesday and they discuss the photo's and video's coming from the doorbell camera footage of Nancy Guthrie's home as well as Bitcoin's cyber crash.
Joe Toomey, vice president, underwriting security, Coalition, discusses emerging cyber vulnerabilities such as React2Shell, and how insurers help clients strengthen resilience and manage evolving risk.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Microsoft Patches Four Azure Vulnerabilities (three critical) https://msrc.microsoft.com/update-guide/vulnerability Evaluating and mitigating the growing risk of LLM-discovered 0-days https://red.anthropic.com/2026/zero-days/ Gitlab AI Gateway Vulnerability CVE-2026-1868 https://about.gitlab.com/releases/2026/02/06/patch-release-gitlab-ai-gateway-18-8-1-released/
The former head of one of the government's most secret agencies, the National Security Agency, and the former Commander of U.S. Cyber Command, General Paul Nakasone (ret.) sits down with State Secrets to talk about the things he wishes every American knew when it comes to today's cyber threats.
Breaking into cybersecurity or AI can feel overwhelming—especially with so much conflicting advice online. In our latest podcast episode, we sat down with Dr. Gerald Auger, a cybersecurity leader, educator, and founder of the Simply Cyber community, to cut through the noise and focus on what actually works.With over 20 years of experience across cybersecurity operations, leadership, and higher education, Dr. Auger shared practical guidance for anyone looking to launch or level up a technical career. We talked about the foundational skills employers care about most, how AI is reshaping cybersecurity roles, and why hands-on experience and community involvement often matter more than chasing every new certification.Dr. Auger also offered honest insights into common mistakes job seekers make—from relying too heavily on job boards to underestimating the power of personal branding and networking. For veterans and career switchers, he emphasized translating experience into business value and treating the job search like a mission with clear objectives and accountability.Whether you're just starting out, transitioning from the military, or navigating the next step in your tech career, this episode delivers clear, actionable advice to help you move forward with confidence.
If you like what you hear, please subscribe, leave us a review and tell a friend!
Podcast: ICS Cyber Talks PodcastEpisode: Idan Flek CCO & IT @Orot Energy - Managing cyber risk on critical infrastructure from the CxO viewPub date: 2026-02-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationניהול סייבר הוא הרבה דברים שהם מעבר להגנה, היכולת לעבוד מול כלל הגורמים בחברה ממשתמשי הקצה בנושא מודעות סייבר, דרך יצירת מרחב עבודה ושיתוף פעולה של גורמי מקצוע האחרים כגון: ניהול סיכונים, המחלקה המשפטית, מערכות המידע והרשימה עוד ארוכה. כול זה עוד לפני הצורך לתת מענה להיבטים העסקיים ועבודה שוטפת מול הנהלה ודירקטוריון. הפעם בקשתי לפתוח את נושא ההנהלה בצורה רחבה יותר, מה קורה שאתה מקבל/לוקח עליך כסמנכ"ל את האחריות הניהולית למערכות המידע של החברה וכפל כפלים בחברה שהיא תשתיות קריטיות תחת רגולציות קשיחות. נחשון פינקו מארח את עידן פלק סמנכ"ל הסחר ומערכות המידע של קבוצת אורות אנרגיה בשיחה על ראיית המנהל לאחר שנתיים וחצי מאז שלקח על עצמו את האחריות למערכות המידע ללא שום ידע בתחום. ההתמודדות עם מלחמה שהאתרי הייצור של החברה הם מטרה ברורה לתקיפה פיזית וקיברנטית. ניהול סיכונים בנית צוות העבודה במסגרת ההנהלה הבכירה והדירקטוריון גיבוש תקציב תחת "שמיכה קצרה" וסדר עדיפויות ועוד Cyber management is about much more than just protection. It's the ability to work with every entity in the company, from end-users on cyber awareness to creating a collaborative workspace with other professionals, such as risk management, legal, IT, and more. All of this is even before addressing business aspects and ongoing work with senior management and the Board of Directors This time, I wanted to explore the management aspect more broadly: what happens when you, as a VP, take on the administrative responsibility for the company's information systems, especially in a critical infrastructure company under strict regulation Nachshon Pincu hosts Idan Flek, VP Chief Commercial Officer and Information Systems at the Orot Energy Group, for a conversation from a manager's perspective, two and a half years after taking on IT responsibilities with no prior knowledge of the field. Dealing with a war where the company's production sites are clear targets for physical and cyber attacks Risk management Building a team Prioritizing cyber within senior management and the Board formulating a budget under a 'short blanket' and shifting priorities and moreThe podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Cybersecurity isn't an IT problem—it's a leadership problem.In this episode, Sherry Winn talks with Dean Sapp, Chief Information Security Officer at Filevine, about how small leadership oversights can lead to massive financial losses.Here are some key takeaways from this episode:The simplest protection most leaders still don't useHow AI-powered scams are fooling even smart executivesWhy processes—not panic—are the best defense against fraudThis is a real-world conversation every leader needs to hear before something goes wrong.Don't miss this episode. Tune in nowGuest: Dean SappHost: Sherry WinnSound: Mahesh R.Producer: Archita Puranik
Send us a textWe trace Saint Josephine Bakhita's journey from slavery to sanctity and draw a clear map for modern “cyber apostles” who want to witness with courage online. Eucharistic devotion, Marian trust, forgiveness, and practical mission steps shape a path of hope.• Bakhita's early suffering and providence• Baptism and the Eucharist as true freedom• Forgiveness as a radical form of witness• Canossian service and daily holiness• Patroness of refugees and the homeless in spirit• Marian trust as shield and staff• Cyber apostleship and digital mission strategy• Mercy online to break hostility cycles• Urgent mission with one heart and one visionJoin us and dive deeper with exclusive saint stories, Eucharistic teachings, and Marian devotionsAccess powerful media produced by Bob and Penny Lord and their EWTN legacyIgnite your faith with resources, books, rosaries, sacramentals, pilgrimage guidesVisit journeysoffaith.com website todayBe sure to click the link in the description for special news itemJoin the movement, become a cyber apostle todaySaint Josephine Bakhita Media CollectionOpen by Steve Bailey Support the showDownload Journeys of Faith Free App link. https://apps.apple.com/us/app/journeys-of-faith/id6757635073 Journeys of Faith brings your Super Saints Podcasts ***Our Core Beliefs*** The Eucharist is the Source and Summit of our Faith." Catechism 132 Click Here “This is the will of God, your sanctification.” 1Thessalonians 4“ Click Here ... lay up for yourselves treasures in heaven...” Matthew 6:19-2 Click Here The Goal is Heaven Click Here Please consider subscribing to this podcast or making a donation to Journeys of Faith we are actively increasing our reach and we are seeing good results for visitors under 40! Help us Grow! Buy Me a cup of Coffee...
In this week's FOLLOW UP, Bitcoin is down 15%, miners are unplugging rigs because paying eighty-seven grand to mine a sixty-grand coin finally failed the vibes check, and Grok is still digitally undressing men—suggesting Musk's “safeguards” remain mostly theoretical, which didn't help when X offices got raided in France. Spain wants to ban social media for kids under 16, Egypt is blocking Roblox outright, and governments everywhere are flailing at the algorithmic abyss.IN THE NEWS, Elon Musk is rolling xAI into SpaceX to birth a $1.25 trillion megacorp that wants to power AI from orbit with a million satellites, because space junk apparently wasn't annoying enough. Amazon admits a “high volume” of CSAM showed up in its AI training data and blames third parties, Waymo bags a massive $16 billion to insist robotaxis are working, Pinterest reportedly fires staff who built a layoff-tracking tool, and Sam Altman gets extremely cranky about Claude's Super Bowl ads hitting a little too close to home.For MEDIA CANDY, we've got Shrinking, the Grammys, Star Trek: Starfleet Academy's questionable holographic future, Neil Young gifting his catalog to Greenland while snubbing Amazon, plus Is It Cake? Valentines and The Rip.In APPS & DOODADS, we test Sennheiser earbuds, mess with Topaz Video, skip a deeply cursed Python script that checks LinkedIn for Epstein connections, and note that autonomous cars and drones will happily obey prompt injection via road signs—defeated by a Sharpie.IN THE LIBRARY, there's The Regicide Report, a brutal study finding early dementia signals in Terry Pratchett's novels, Neil Gaiman denying allegations while announcing a new book, and THE DARK SIDE WITH DAVE, vibing with The Muppet Show as Disney names a new CEO. We round it out with RentAHuman.ai dread relief via paper airplane databases, free Roller Coaster Tycoon, and Sir Ian McKellen on Colbert—still classy in the digital wasteland.Sponsors:DeleteMe - Get 20% off your DeleteMe plan when you go to JoinDeleteMe.com/GOG and use promo code GOG at checkout.SquareSpace - go to squarespace.com/GRUMPY for a free trial. And when you're ready to launch, use code GRUMPY to save 10% off your first purchase of a website or domain.Private Internet Access - Go to GOG.Show/vpn and sign up today. For a limited time only, you can get OUR favorite VPN for as little as $2.03 a month.SetApp - With a single monthly subscription you get 240+ apps for your Mac. Go to SetApp and get started today!!!1Password - Get a great deal on the only password manager recommended by Grumpy Old Geeks! gog.show/1passwordShow notes at https://gog.show/732FOLLOW UPBitcoin drops 15%, briefly breaking below $61,000 as sell-off intensifies, doubts about crypto growBitcoin Is Crashing So Hard That Miners Are Unplugging Their EquipmentGrok, which maybe stopped undressing women without their consent, still undresses menX offices raided in France as UK opens fresh investigation into GrokSpain set to ban social media for children under 16Egypt to block Roblox for all usersIN THE NEWSElon Musk Is Rolling xAI Into SpaceX—Creating the World's Most Valuable Private CompanySpaceX wants to launch a constellation of a million satellites to power AI needsA potential Starlink competitor just got FCC clearance to launch 4,000 satellitesAmazon discovered a 'high volume' of CSAM in its AI training data but isn't saying where it came fromWaymo raises massive $16 billion round at $126 billion valuation, plans expansion to 20+ citiesPinterest Reportedly Fires Employees Who Built a Tool to Track LayoffsSam Altman got exceptionally testy over Claude Super Bowl adsMEDIA CANDYShrinkingStar Trek: Starfleet AcademyThe RipNeil Young gifts Greenland free access to his music and withdraws it from Amazon over TrumpIs it Cake? ValentinesAPPS & DOODADSSennheiser Consumer Audio IE 200 In-Ear Audiophile Headphones - TrueResponse Transducers for Neutral Sound, Impactful Bass, Detachable Braided Cable with Flexible Ear Hooks - BlackSennheiser Consumer Audio CX 80S In-ear Headphones with In-line One-Button Smart Remote – BlackTopaz VideoEpsteinAutonomous cars, drones cheerfully obey prompt injection by road signAT THE LIBRARYThe Regicide Report (Laundry Files Book 14) by Charles StrossScientists Found an Early Signal of Dementia Hidden in Terry Pratchett's NovelsNeil Gaiman Denies the Allegations Against Him (Again) While Announcing a New BookTHE DARK SIDE WITH DAVEDave BittnerThe CyberWireHacking HumansCaveatControl LoopOnly Malware in the BuildingThe Muppet ShowDisney announces Josh D'Amaro will be its new CEO after Iger departsA Database of Paper Airplane Designs: Hours of Fun for Kids & Adults AlikeOnline (free!) version of Roller Coaster tycoon.Speaking of coasters, here's the current world champion.I am hoping this is satire...Sir Ian McKellen on Colbert.CLOSING SHOUT-OUTSCatherine O'Hara: The Grande Dame of Off-Center ComedyStanding with Sam 'Balloon Man' MartinezSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Join Jim and Greg for the Friday 3 Martini Lunch as they react to Virginia Democrats' aggressive gerrymandering of congressional districts, Russia's escalating mischief online and in space, and New Jersey Democrats once again showing how far the party continues to lurch to the left.First, they unload on Virginia Democrats for transforming a fairly competitive state into a convoluted congressional map that could give Democrats control of ten of the state's eleven House seats. Jim and Greg walk through the most absurd district lines and skewer the flimsy explanations Democrats are offering for this blatant power grab.Next, they chronicle the many ways Russia is attempting to meddle with its adversaries through cyber warfare, satellite interference, and other destabilizing tactics. New reports suggest Moscow is targeting Italy during the Olympics and is even floating threats involving a nuclear attack in space aimed at disrupting Elon Musk's Starlink network.Finally, they dissect the surprising results in a New Jersey special congressional primary where a far-left candidate is now poised to defeat a heavily favored, more moderate Democrat. Jim and Greg explain why the upset is another sign that much of the Democratic Party's energy is increasingly aligned with a more radical vision for the country.Please visit our great sponsors:Skip the hassle and book a top-rated doctor in seconds with Zocdoc. Visit https://www.Zocdoc.com/3ML today!Visit https://CoastPay.com/3ML to get free gas for a whole day. Terms apply.Unlock your healthiest skin by targeting visible aging signs at https://Oneskin.co/3ML with code 3ML for 15% off.New episodes every weekday.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Broken Phishing URLs https://isc.sans.edu/diary/Broken+Phishing+URLs/32686/ n8n command injection vulnerability https://github.com/n8n-io/n8n/security/advisories/GHSA-6cqr-8cfr-67f8 Android February Update https://source.android.com/docs/security/bulletin/pixel/2026/2026-02-01?hl=en Watchguard Firebox LDAP Injection https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2026-00001
Cyber weapons knock out Iranian air defenses during strikes on nuclear sites. ShinyHunters dump more than a million stolen records from Harvard and Penn. Betterment confirms a breach exposing data from roughly 1.4 million accounts. Researchers uncover a sprawling scam network impersonating law firms. Italy blocks cyberattacks aimed at Olympics infrastructure. Critical bugs put n8n and Google Looker servers at risk of full takeover. A state-backed Shadow Campaign hits governments worldwide. OpenClaw shows how AI-powered attacks are becoming faster, cheaper, and harder to stop. Our guest is Tony Scott, CEO of Intrusion and former federal CIO, sharing his perspective on evolving regulation and the realities behind critical policy shifts. Your smartphone may testify against you. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today comes as a segment from our Caveat podcast. Tony Scott, CEO of Intrusion and former federal CIO, joins Dave Bittner to share his perspective on evolving regulation and the realities behind critical policy shifts. You can listen to Tony and Dave's full conversation on this week's episode of Caveat, and catch new episodes of Caveat every Thursday on your favorite podcast app. Selected Reading Exclusive: US used cyber weapons to disrupt Iranian air defenses during 2025 strikes (The Record) Personal data stolen during Harvard and UPenn data breaches leaked online - over a million details, including emails, home addresses and more, all published (TechRadar) Data breach at fintech firm Betterment exposes 1.4 million accounts (Bleeping Computer) Researchers Expose Network of 150 Cloned Law Firm Websites in AI-Powered Scam Campaign (SecurityWeek) Italy Averted Russian-Linked Cyberattacks Targeting Winter Olympics Websites, Foreign Minister Says (SecurityWeek) n8n security woes roll on as new critical flaws bypass December fix (The Register) LookOut: Discovering RCE and Internal Access on Looker (Google Cloud & On-Prem) (Tenable) Cyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries (SecurityWeek) The Rise of OpenClaw (SECURITY.COM) Smartphones Now Involved in Nearly Every Police Investigation (Infosecurity Magazine) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Malicious Script Delivering More Maliciousness https://isc.sans.edu/diary/Malicious+Script+Delivering+More+Maliciousness/32682 Synectix LAN 232 TRIO Unauthenticated Web Admin CVE-2026-1633 https://www.cisa.gov/news-events/ics-advisories/icsa-26-034-04 Google Chrome Patches https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop.html LookOut: Discovering RCE and Internal Access on Looker (Google Cloud & On-Prem) https://www.tenable.com/blog/google-looker-vulnerabilities-rce-internal-access-lookout
The White House preps a major overhaul of U.S. cybersecurity policy. A key Commerce security office loses staff as regulatory guardrails weaken. Lawmakers Press AT&T and Verizon after months of silence on Salt Typhoon. A vulnerability in the React Native Metro development server is under active exploitation. Amaranth Dragon leverages a WinRAR flaw. A coordinated reconnaissance campaign targets Citrix NetScaler infrastructure. CISA warns a SolarWinds Web Help Desk flaw is under active exploitation. Zach Edwards, Senior Threat Researcher at Silent Push, is discussing a hole in the kill chain leaving law enforcement empty-handed. Cops in Northern Ireland get an unwanted data breach encore. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Zach Edwards, Senior Threat Researcher at Silent Push, discussing a hole in the kill chain leaving law enforcement empty-handed. You can read more from Zach's team here. Selected Reading White House Cyber Director Charts New Course for Digital Defense Through Private Sector Partnership (Web Pro News) Another Misstep in U.S.-China Tech Security Policy (Lawfare) Cantwell claims telecoms blocked release of Salt Typhoon report (Cyberscoop) Hackers exploit critical React Native Metro bug to breach dev systems (Bleeping Computer) New Amaranth Dragon cyberespionage group exploits WinRAR flaw (Bleeping Computer) Wave of Citrix NetScaler scans use thousands of residential proxies (Bleeping Computer) Fresh SolarWinds Vulnerability Exploited in Attacks (SecurityWeek) ‘It defies belief': Names of PSNI officers published on court website in new breach (Belfast Telegraph) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Detecting and Monitoring OpenClaw (clawdbot, moltbot) https://isc.sans.edu/diary.html/Detecting+and+Monitoring+OpenClaw+%28clawdbot%2C+moltbot%29/32678/#comment Synology telnetd Patch https://www.synology.com/en-us/releaseNote/DSM GlassWorm Loader Hits Open VSX via Developer Account Compromise https://socket.dev/blog/glassworm-loader-hits-open-vsx-via-suspected-developer-account-compromise
PREVIEW FOR LATER TODAY Guest: David Shedd. Shedd criticizes allowing Nvidia chip sales to China, warning Beijing will reverse engineer this technology to enhance military and cyber capabilities against Western allies.FEBRUARY 1930
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Scanning for exposed Anthropic Models https://isc.sans.edu/diary/Scanning%20for%20exposed%20Anthropic%20Models/32674 Notepad++ Hijacked by State-Sponsored Hackers https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/ https://notepad-plus-plus.org/news/hijacked-incident-info-update/ Insecure Websockets in OpenClaw https://zeropath.com/blog/openclaw-clawdbot-credential-theft-vulnerability Malicious OpenClaw Skills https://www.koi.ai/blog/clawhavoc-341-malicious-clawedbot-skills-found-by-the-bot-they-were-targeting Exposed OpenClaw Instances https://censys.com/blog/openclaw-in-the-wild-mapping-the-public-exposure-of-a-viral-ai-assistant