POPULARITY
Categories
Rudd takes the helm at NSA and Cyber Command. A watchdog probes alleged Social Security data mishandling. Patch Tuesday lands. Governments brace for cyber fallout from Iran. BeatBanker spreads via a fake Starlink app. InstallFix targets developers. ZombieZIP hides malware in archives. And DHS reassigns CBP officials in a FOIA secrecy dispute. Ben Yelin unpacks Anthropic's lawsuit against the Pentagon. AI eyewear leads to awkward exposures. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies and Caveat cohost talking about Anthropic suing the Pentagon. You can read more on the topic here. Selected Reading Senate approves Joshua Rudd as dual-hat leader of Cyber Command, NSA (POLITICO) Whistleblower claims ex-DOGE member says he took Social Security data to new job (Washington Post) Microsoft Patches 83 Vulnerabilities (SecurityWeek) Adobe Patches 80 Vulnerabilities Across Eight Products (SecurityWeek) Fortinet, Ivanti, Intel Patch High-Severity Vulnerabilities (SecurityWeek) ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Moxa, Mitsubishi Electric (SecurityWeek) Iran war will bring wave of 'low-level cyber activity,' says intelligence group (StateScoop) New BeatBanker Android malware poses as Starlink app to hijack devices (Bleeping Computer) Fake Claude Code install guides push infostealers in InstallFix attacks (Bleeping Computer) New 'Zombie ZIP' technique lets malware slip past security tools (Bleeping Computer) DHS Ousts CBP Privacy Officers Who Questioned ‘Illegal' Orders (WIRED) Meta sued over AI smart glasses' privacy concerns, after workers reviewed nudity, sex, and other footage (TechCrunch) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Show Notes: Cybersecurity has continued to grow and mature as a field over the past decade which has given rise to numerous degree pathways across dozens of collegiate institutions; however, the value of these degrees has continued to be a topic of debate. In this episode of CISO Perspectives, host Kim Jones sits down with Dr. Lara Ferry, the Vice President of Research at Arizona State University, to explore higher education's role in cyber. Throughout the conversation, Lara and Kim will discuss the challenges facing degree programs, the disconnects between organizations and institutions, and how the gap can be better addressed. Want more CISO Perspectives?: Check out a companion blog post by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It's the perfect follow-up if you're curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals. Learn more about your ad choices. Visit megaphone.fm/adchoices
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Encrypted Client Hello: Ready for Prime Time? https://isc.sans.edu/diary/Encrypted%20Client%20Hello%3A%20Ready%20for%20Prime%20Time%3F/32778 The ExifTool vulnerability: how an image can infect macOS systems https://www.kaspersky.com/blog/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102/55362/ Remote code execution in Nextcloud Flow via vulnerable Windmill version https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g7vj-98x3-qvjf
In this special Reporter's Notebook, Maria Varmazis, host here at N2K CyberWire, takes listeners behind the scenes of our three-part series on Cyber Coalition 2025 in Tallinn, Estonia. After exploring real-time incident response, cross-border coordination, and the broader stakes of collective cyber defense, this episode offers a more personal, behind-the-scenes look at how the reporting came together. Hosted by the NATO Cooperative Cyber Defense Centre of Excellence, the exercise brought together allied military, government, and industry teams inside NATO's secure cyber range. Here, Maria reflects on moments that didn't make the final cut — the atmosphere inside the facilities, the pace of covering a live exercise, and the small, human details that added texture to the larger story. If you haven't yet, be sure to listen to all three episodes of the series to hear the full story from the ground at Cyber Coalition 2025. Episode one can be found here. Episode two can be found here. Episode three can be found here. Learn more about your ad choices. Visit megaphone.fm/adchoices
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
YARA-X 1.14.0 Release https://isc.sans.edu/diary/YARA-X%201.14.0%20Release/32774 INTERPLAY BETWEEN IRANIAN TARGETING OF IP CAMERAS AND PHYSICAL WARFARE IN THE MIDDLE EAST https://research.checkpoint.com/2026/interplay-between-iranian-targeting-of-ip-cameras-and-physical-warfare-in-the-middle-east/ Announcing the Node.js LTS Upgrade and Modernization Program https://openjsf.org/blog/nodejs-lts-upgrade-program nginx UI Vulnerability https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-g9w5-qffc-6762
In this special Reporter's Notebook, Maria Varmazis, host here at N2K CyberWire, takes listeners behind the scenes of our three-part series on Cyber Coalition 2025 in Tallinn, Estonia. After exploring real-time incident response, cross-border coordination, and the broader stakes of collective cyber defense, this episode offers a more personal, behind-the-scenes look at how the reporting came together. Hosted by the NATO Cooperative Cyber Defense Centre of Excellence, the exercise brought together allied military, government, and industry teams inside NATO's secure cyber range. Here, Maria reflects on moments that didn't make the final cut — the atmosphere inside the facilities, the pace of covering a live exercise, and the small, human details that added texture to the larger story. If you haven't yet, be sure to listen to all three episodes of the series to hear the full story from the ground at Cyber Coalition 2025. Episode one can be found here. Episode two can be found here. Episode three can be found here. Learn more about your ad choices. Visit megaphone.fm/adchoices
PEBCAK Podcast: Information Security News by Some All Around Good People
Welcome to this week's episode of the PEBCAK Podcast! We've got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! Simple 6 signup link https://simple6.co/r/CFUR98 US Cyber Command aided in Iran strikes https://www.nextgov.com/cybersecurity/2026/03/how-cyber-command-contributed-operation-epic-fury-against-iran/411818/ FBI arrests crypto thief https://www.bleepingcomputer.com/news/security/fbi-arrests-suspect-linked-to-46m-crypto-theft-from-us-marshals/ Millions stolen from Korean Tax Authority https://www.bleepingcomputer.com/news/security/48m-in-crypto-stolen-after-korean-tax-agency-exposes-wallet-seed/ Users revolt against Kalshi over Iran prediction https://nypost.com/2026/03/05/business/kalshi-refuses-to-pay-winnings-on-54m-trade-related-to-khameneis-death-drawing-user-fury/ Dad Joke of the Week (DJOW) Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Dusten - https://www.linkedin.com/in/dusten-henderson-653889109/
Mark Montgomery, senior director of the Center on Cyber and Technology Innovation at FDD and retired U.S. Navy rear admiral, joins the show to provide in-depth analysis of the Iran conflict. Mark gives his thoughts on naval operations in the Strait of Hormuz, including their strategic implications for the progress of the war. He also discusses drone warfare, missile defense, and the broader geopolitical context. Mark also explains how Ukraine and Russia are playing growing parts in the war. ▪️ Times 02:30 A constant menace 07:34 Radar and THAAD 11:06 Hormuz 20:26 Real deterrence 31:36 Russian targeting 38:38 Conservation of resources 46:03 Life at sea Follow along on Instagram, X @schoolofwarpod, and YouTube @SchoolofWarPodcast Find more content on our School of War Substack
Experts say the next month could bring disruptive cyber activity from Iran and its aligned groups, and they're urging organizations to shore up defenses now. The concerns center on the likelihood of targeted operations against the sectors with the highest visibility and the weakest points of entry. We'll examine what the threat picture looks like—and how leaders can harden their operations quickly—with James Turgal, VP of global cyber risk at Optiv.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
In der 354. Episode von Irgendwas mit Recht ist Dr. Henrik Hanßen von Hogan Lovells zu Gast. Henrik wollte ursprünglich Richter werden, doch während des Referendariats entdeckte er seine Leidenschaft für die internationale Rechtsberatung. Heute liegt sein Schwerpunkt im IT-Recht und Datenschutzrecht. Ein zentrales Thema der Folge sind komplexe Verträge im Bereich Cloud Computing. Diese Verträge müssen unzählige regulatorische und technische Anforderungen von Unternehmen erfüllen. Ebenso berichtet er eindrucksvoll über den juristischen Umgang mit Ransomware-Angriffen. Dabei geht es um erpresserische Hackerangriffe auf Unternehmensnetzwerke. Wie laufen solche extrem eiligen Einsätze ab? Welche gesetzlichen Meldepflichten bestehen für betroffene Unternehmen? Warum vertrauen Unternehmen kriminellen Gruppierungen bei der Datenfreigabe? Zudem verrät unser Gast wertvolle Tipps für angehende Juristen. Worauf achten Großkanzleien wirklich bei Bewerbungsgesprächen? Sind Examensnoten am Ende das wichtigste Kriterium? Antworten auf diese und viele weitere Fragen erhaltet Ihr in dieser Folge von IMR. Viel Spaß!
Hallo ihr Mannis und Mannienchen,Der Podcast eures Vertrauens, eurer Herzen, eurer Leidenschaft...usw. ist wieder mit neuer Folge am Start.Unter anderem mit diesen Themen :Frühling is coming?Spionage Tauben aus Russland?Alkoholfreies Bier strebt die Weltherrschaft an?Invasive Art Döner?Das und vieles mehr, exklusiv nur bei uns! Dem wohl wichtigsten Podcast aller Zeiten.Link zum Shop von "Das Bier"https://www.das-bier.com/maennerrundeKontakt: diemaennerrunde@web.deUnterstützt uns bei Patreon.comhttps://www.patreon.com/diemaennerrundeTwitter: @DieMaennerundeInstagram:https://www.instagram.com/die_maennerrunde_podcastFacebook:https://www.facebook.com/Maennerrunde.PodcastYouTube Kanal:https://www.youtube.com/channel/UCk6hDwJfdAyJa71gFS_UsEAWir verwenden gemafreie Musik von bluevalley.de the music companyhttps://www.bluevalley.de/index.php
This week on Cyber Uncut, Liam Garman and Daniel Croft unpack the week's cyber and AI news, while David Hollingworth reports from Zero Trust World 2026 in Florida! Garman and Croft kick off the podcast with news of ChatGPT shedding a raft of users since it announced it would sign up with the Pentagon after rival AI giant Anthropic backed down over fears its AI would be used without adequate guardrails. The pair then unpack the Commonwealth Bank's self-reported $1 billion fraud case involving illegitimate home loans after two whistleblowers accused a lender and a mortgage broker of forging income statements within the bank's private banking division. The two also cover how a hacktivist group named the "Department of Peace" allegedly breached the DHS Office of Industry Partnerships and released details on ICE and DHS contracts with over 6,000 entities, including Anduril, Microsoft, Oracle, and Palantir. Finally, we then cut to David Hollingworth on the floor of Zero Trust World 2026, where he caught up with ThreatLocker's CEO, Danny Jenkins, unpacking the cyber security implications of the fighting in Iran, after Garman and Croft outline the threats to the world's financial systems as the conflict continues in the region. Enjoy, The Cyber Uncut team
Microsoft's anti-"Microslop" censorship backfired spectacularly; Australia is cracking down on AI age verification while Meta is busy targeting toddlers; prediction markets are basically just insider trading with extra steps; AI chatbots are getting people killed and exposing spy operations; the Moon landing got pushed again; Opera got nostalgic at 30; Sony bought Charlie Brown; and Netflix is making documentaries with robot people now.Show notes at https://gog.show/736Watch on YouTube at https://youtu.be/6lw2Hy_U8QASponsors:DeleteMe - Get 20% off your DeleteMe plan when you go to JoinDeleteMe.com/GOG and use promo code GOG at checkout.Private Internet Access - Go to GOG.Show/vpn and sign up today. For a limited time only, you can get OUR favorite VPN for as little as $2.03 a month.SetApp - With a single monthly subscription you get 240+ apps for your Mac. Go to SetApp and get started today!!!1Password - Get a great deal on the only password manager recommended by Grumpy Old Geeks! gog.show/1passwordFOLLOW UPMicrosoft Bans the Word “Microslop” on Copilot Discord, Gets So Humiliated That It Locks Down the Whole ServerAustralia will consider requiring app stores to block AI services without age verificationA Day in the Life of an EnshittificatorIN THE NEWSMeta's what-if for tweensHow Meta Executives Talked About Child Safety Behind the ScenesThe Great Insider Trading Reckoning Reportedly Hits OpenAIKhamenei market meltdown on Kalshi shows how prediction markets still can't decide what ‘counts'Some Alleged Polymarket Insiders Made a Fortune on U.S. Strikes on IranPolymarket Decides Incentivizing a Nuclear Detonation Might Be a Bad IdeaA Chinese official's use of ChatGPT accidentally revealed a global intimidation operation‘Our Bond Is the Only Thing That's Real:' A New Lawsuit Alleges Google Gemini Drove a Man to SuicideThe Data Centers Have Arrived at the Edge of the Arctic CircleBig tech companies agree to not ruin your electric bill with AI data centersTerraPower gets OK to start construction of its first nuclear plantThe Supreme Court doesn't care if you want to copyright your AI-generated artAnthropic CEO Dario Amodei calls OpenAI's messaging around military deal 'straight up lies,' report saysThe $100 Billion OpenAI-Nvidia Deal Is Not HappeningNASA Announces Major Change to Plans For Putting Humans on The MoonThe US Senate empowers NASA to fully engage in lunar space raceAstronomers Estimated the Lifespan of Alien Civilizations, and It's Not Looking Good for UsMEDIA CANDYCharlie Brown now works for SonyThese AI Avatars in a Netflix True Crime Doc Are Disturbing ViewersNetflix buys Ben Affleck's AI film tech company, InterPositiveAPPS & DOODADSOpera Has Turned 30 and Is Celebrating With a Compelling Tribute to Web NostalgiaWeb Design MuseumMeta hit with a class action lawsuit over smart glasses' privacy claimsApple Macbook NeoAT THE LIBRARYUncommon People: Britpop and Beyond in 20 Songs by Miranda SawyerSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Differentiating Between a Targeted Intrusion and an Automated Opportunistic Scanning [Guest Diary] https://isc.sans.edu/diary/Differentiating%20Between%20a%20Targeted%20Intrusion%20and%20an%20Automated%20Opportunistic%20Scanning%20%5BGuest%20Diary%5D/32768 CVE-2026-29000: Critical Authentication Bypass in pac4j-jwt - Using Only a Public Key (CVSS 10) https://www.codeant.ai/security-research/pac4j-jwt-authentication-bypass-public-key FreeScout Help Desk Vulnerability https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-mw88-x7j3-74vc Microsoft Authenticator Not Supported on Graphene OS https://www.heise.de/en/news/GrapheneOS-Microsoft-Authenticator-does-not-support-secure-Android-OS-11200495.html
Last episode, Ron and Marcus made predictions. This episode, they brought the receipts. A journalist built an app with vibe coding and got hacked on live television. A social network built entirely by AI (not a single line of human code!) exposed 1.5 million authentication tokens and private messages between agents. And 88% of organizations have already had an AI security incident, while barely 14% of deployed agents ever saw a security review. The warnings from last episode aged fast. Marcus J. Carey is back to talk about what that actually means for the people building right now, not the people theorizing about it. Ron and Marcus are in the code themselves, and this conversation is what that experience actually looks like: OpenClaw running loose on your machine, agents racking up API bills, and why guidance, not prompts, not tools, is the real skill that separates builders who thrive from builders who ship disasters. Impactful Moments 00:00 - Introduction 02:00 - Vibe coding hack on live TV 03:30 - Mo Book leaks 1.5M auth tokens 06:00 - Marcus' origin story: War Games, 1983 08:00 - OpenClaw escapes the lab 13:30 - AT&T cuts help desk spend 90% 17:00 - Context is king, guidance is everything 19:00 - Can AI do your job rec right now? 24:00 - The first cybersecurity jobs agents will replace 27:00 - Expertise + AI = 1000x yourself 30:00 - Focus on outcomes, not new tools Links Connect with our guest, Marcus J. Carey, on LinkedIn: https://www.linkedin.com/in/marcuscarey/ Read the articles we referenced in this episode: The vibe coding hack that aired on live TV, ICAEW breaks down exactly how it happened and what it means for anyone building with AI: https://www.icaew.com/insights/viewpoints-on-the-news/2026/feb-2026/cyber-dangers-of-agents-and-vibe-coding 88% of organizations have already had an AI security incident. See the full data from the Cisco State of AI Security 2026 report: https://www.helpnetsecurity.com/2026/02/23/ai-agent-security-risks-enterprise/ Check out our upcoming events: https://www.hackervalley.com/livestreams Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
NEWS: Baligod, 18 ex-soldiers charged with cyber libel | Mar 6, 2026Subscribe to The Manila Times Channel - https://tmt.ph/YTSubscribe Visit our website at https://www.manilatimes.net Follow us: Facebook - https://tmt.ph/facebook Instagram - https://tmt.ph/instagram Twitter - https://tmt.ph/twitter DailyMotion - https://tmt.ph/dailymotion Subscribe to our Digital Edition - https://tmt.ph/digital Check out our Podcasts: Spotify - https://tmt.ph/spotify Apple Podcasts - https://tmt.ph/applepodcasts Amazon Music - https://tmt.ph/amazonmusic Deezer: https://tmt.ph/deezer Stitcher: https://tmt.ph/stitcher Tune In: https://tmt.ph/tunein #TheManilaTimes #KeepUpWithTheTimes Hosted on Acast. See acast.com/privacy for more information.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Want More XWorm? https://isc.sans.edu/diary/Want%20More%20XWorm%3F/32766 Cisco Secure Firewall Management Center Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-onprem-fmc-authbypass-5JPp45V2 LastPass Phishing https://www.securityweek.com/lastpass-users-targeted-with-backup-themed-phishing-emails/
Cyber threats and attacks have surged since the war began. Ori Segal, the CEO and founder of Cyvore security, spoke with reporter Arieh O’Sullivan with some insight on how individuals and organizations can identify warning signs, and share practical guidance on how to protect themselves. (photo: Hadas Parush/flash90)See omnystudio.com/listener for privacy information.
The Unsecurity Podcast returns with a truly joyful conversation with FRecure's own Jo Moldenhauer.Jo, an Associate Information Security Consultant, is famous around the FRSecure office for her weekly security news reviews, where she meticulously compiles articles and talking points for a company-wide discussion around industry trends and snapshots.And this couldn't have been easy to do. Jo's path to InfoSec is a recent and unique one—transitioning from dealing blackjack at casinos after most of them ceased operations during the COVID-19 pandemic. You can see how being tasked with leading a discussion to 75+ industry pros like this as a relative newcomer could be challenging—but Jo simply crushes it.In this episode, learn about:Non-traditional information security career pathsWhat makes "good" InfoSec newsWhy talking about industry news is important to FRSecure (and beyond)How vCISO engagements and risk assessments guide talking pointsThe Gaming (casino) and InfoSec industry Venn Diagram (and what they can learn from each other)User and security awareness training, culture, and incentive ideasLike, subscribe, and share with your network to stay informed about the latest in cyber and information security!We want to hear from you! Reach out at unsecurity@frsecure.com and follow us for more:LinkedIn: https://www.linkedin.com/company/frsecure/Instagram: https://www.instagram.com/frsecureofficial/Facebook: https://www.facebook.com/frsecure/BlueSky: https://bsky.app/profile/frsecure.bsky.socialAbout FRSecure:https://frsecure.com/FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start or looking for a team of experts to collaborate with you, we are ready to serve.
Realities Remixed, formerly know as Cloud Realities, launches a new season exploring the intersection of people, culture, industry and tech.Business messaging is transforming customer engagement by enabling brands to move conversations into familiar, always‑on messaging platforms. The result for customers is greater convenience, quicker resolutions, and more meaningful, personalized interactions. This week, Dave, Esmee, and Rob are joined by Kathleen Tandy, Global Director and Head of Business Messaging Marketing and WhatsApp for Business at Meta , to explore how companies are using messaging platforms to engage customers, what customers expect from these experiences, and the challenges of scaling messaging in tech.TLDR00:35 – Introduction01:00 – Hang out: The new Remarkable05:25 – Dig in: Using messaging to enhance customer experiences20:49 – Conversation with Kathleen Tandy55:26 – The passion for college football and championship weekend!GuestKathleen Tandy: https://www.linkedin.com/in/kptandy/HostsDave Chapman: https://www.linkedin.com/in/chapmandr/Esmee van de Giessen: https://www.linkedin.com/in/esmeevandegiessen/Rob Kernahan: https://www.linkedin.com/in/rob-kernahan/ProductionMarcel van der Burg: https://www.linkedin.com/in/marcel-vd-burg/Dave Chapman: https://www.linkedin.com/in/chapmandr/ SoundBen Corbett: https://www.linkedin.com/in/ben-corbett-3b6a11135/Louis Corbett: https://www.linkedin.com/in/louis-corbett-087250264/ 'Realities Remixed' is an original podcast from Capgemini
If you like what you hear, please subscribe, leave us a review and tell a friend!
Identifying the causes and effects of stress and burnout within security teams Building personal resilience through mindfulness – regulating stress, strengthening focus and enhancing clarityTech tools to reduce burnout while increasing wellbeing and limiting turnover among security teamsThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Johann van Duyn, Chief Information Security Officer, DO & COhttps://www.linkedin.com/in/johannvanduyn/Don Gibson, Chief Information Security Officerhttps://www.linkedin.com/in/don-gibson-cyber/Cavan Fabris, Partner - Head of Data & Cyber, RPChttps://www.linkedin.com/in/cavan-fabris/
Dans la tête des maîtres de l'iA.Que veulent vraiment ceux qui façonnent notre futur technologique ?Dans cet épisode, conversation sans filtre avec Guillaume Grallet, auteur du livre "Pionniers - Voyage aux frontières de l'intelligence artificielle" (Grasset, 2025) et rédacteur en chef sciences et tech au Point. Il a rencontré les figures les plus influentes de la tech mondiale.Il raconte ce qu'il a vu. Ce qu'il a compris. Et ce qui l'inquiète.De Mark Zuckerberg à Sam Altman, en passant par Dario Amodei, Yann LeCun, Jensen Huang ou Kai-Fu Lee : visions messianiques, doutes sincères, stratégie géopolitique, course à la puissance.Vie privée, climat, diversité linguistique, souveraineté : l'iA n'est pas qu'une course technologique, c'est une bataille culturelle et politique.Optimisme stratégique ou promesse dangereuse ?Hubris ou lucidité ?Un épisode pour comprendre ce qui se joue vraiment derrière les discours officiels.
Subscribe to The Manila Times Channel - https://tmt.ph/YTSubscribe Visit our website at https://www.manilatimes.net Follow us: Facebook - https://tmt.ph/facebook Instagram - https://tmt.ph/instagram Twitter - https://tmt.ph/twitter DailyMotion - https://tmt.ph/dailymotion Subscribe to our Digital Edition - https://tmt.ph/digital Check out our Podcasts: Spotify - https://tmt.ph/spotify Apple Podcasts - https://tmt.ph/applepodcasts Amazon Music - https://tmt.ph/amazonmusic Deezer: https://tmt.ph/deezer Stitcher: https://tmt.ph/stitcherTune In: https://tmt.ph/tunein#TheManilaTimes Hosted on Acast. See acast.com/privacy for more information.
Send a textThe Navy just dropped a torpedo strike video that looks straight out of a movie… except it's real.Peaches walks through the latest from Operation Epic Fury: submarine strikes on Iranian vessels, B-1 bombers hammering ballistic missile sites, and the ongoing fallout from the Kuwaiti F-18 friendly-fire shootdown of three U.S. F-15Es.We also hit Marine security actions in Pakistan, Air Force promotion numbers, Minuteman nuclear logistics upgrades, and why the Space Force is pushing for a much bigger slice of the defense budget.Meanwhile the bigger picture keeps shifting: casualties are rising, embassy evacuations are underway, cyber and space operations are already shaping the battlefield, and the White House says the conflict could last four to five weeks… maybe.No hype. Just the wave-tops and context you actually need.⏱️ Timestamps: 00:00 Torpedo Strike Video Everyone Is Talking About 02:00 Navy Operations Crushing Iranian Naval Assets 04:00 Army Casualties in Kuwait and What Happened 06:00 Marines Defend U.S. Consulate in Pakistan 08:30 Operator Training Summit Nashville Update 09:40 B-1 Bombers Strike Iranian Missile Facilities 11:30 Air Force Promotion Rate Drops to 11% 13:00 Minuteman Nuclear Logistics Modernization 14:30 Space Force Budget and Acquisition Problems 16:00 War Timeline and Ground Troop Possibility 18:30 U.S. Casualties and Escalation Risks 20:00 Friendly Fire F-15 Investigation Update 22:00 Cyber and Space Attacks Behind the Scenes 24:00 Embassy Evacuations and UK Base Approval
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Bruteforce Scans for CrushFTP https://isc.sans.edu/diary/Bruteforce%20Scans%20for%20CrushFTP%20/32762 Android March 2026 Patches, including 0-Day (CVE-2026-21385) https://source.android.com/docs/security/bulletin/2026/2026-03-01 OAuth redirection abuse enables phishing and malware delivery https://www.microsoft.com/en-us/security/blog/2026/03/02/oauth-redirection-abuse-enables-phishing-malware-delivery/
Find us at www.crisisinvesting.com Matt and Doug discuss the reported US invasion of Iran and warn it could escalate unpredictably and badly, potentially toward a wider regional conflict or even World War III. They argue information from the war zone is unreliable, but note Iran's missile/drone capabilities and the economic asymmetry of expensive US interceptors versus cheap attacks. They criticize launching strikes during negotiations, question US motives tied to Israel and long-standing regional history, and describe risks around the Strait of Hormuz for oil, gas, and fertilizer flows. They debate claims about attacks on Gulf targets, possible Israeli involvement, and confusion over downed aircraft, while highlighting how infrastructure like data centers and banking systems can become targets. The conversation shifts to markets (gold, oil, selected stocks), and broader "greater depression" themes about public crisis-blindness, government growth, inflation, and household financial stress. 00:00 War Breaks Out 01:33 Bases Everywhere 03:19 Fog of War 05:20 Costly Interceptors 05:59 Why Are We Involved 08:17 Israel and US Aid 11:29 Religious End Times 15:33 Iran Strikes Back 17:26 Negotiations Then Attack 24:09 Strait of Hormuz Risks 25:19 Escorts and Escalation 28:11 Cyber and Infrastructure 30:02 Who Hit the Refineries 30:38 False Flags and Mossad Claims 31:47 Fifteen Shootdown Mystery 33:48 Casualties and Interceptor Costs 35:07 Boots on Ground and Kurds 37:32 Markets Gold and Oil Plays 41:44 Why People Miss Crises 49:29 Greater Depression Timeline 50:13 How Iran War Ends 50:59 Assassinations and Nuclear Risk 54:12 Wrap Up and Audience Questions
Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard: https://mastercard.us/en-us.html
Deneen DeFiore is the Vice President & Chief Information Security Officer at United Airlines. In this episode, she joins host Charlie Osborne and Bobby Ford, Bobby Ford, Chief Strategy and Experience Officer at Doppel, to discuss AI's mark on the cybersecurity world. This episode of CISO Confidential is brought to you by Doppel. Learn more about our sponsor at https://doppel.com.
In this episode of Reimagining Cyber, host Rob Aragao sits down with Eric McAlpine, Founder and CEO of Momentum Cyber, to break down what's really happening inside today's cybersecurity market.Drawing from insights in the latest Momentum Cyber Almanac, Eric shares a behind-the-numbers look at:The rise of a two-tier cybersecurity market — the “haves” and the “have-nots”Why we may be in the middle of a cybersecurity supercycleHow AI-native startups are reshaping funding, innovation, and deal activityThe surge in M&A and what it signals for the futureWhat vendor consolidation means for security leaders and enterprise buyersWhy hyperscalers and frontier AI companies could be the next major power playersWith record capital flows, accelerating innovation cycles, and trillion-dollar companies eyeing security, the stakes have never been higher.If you want to understand where the cybersecurity market is headed in 2026 — and how to navigate the transformation — this episode delivers the strategic context you need.Contact Eric McAlpine at Eric@momentumcyber.com.As featured on Million Podcasts' Best 100 Cybersecurity Podcasts Top 50 Chief Information Security Officer CISO Podcasts Top 70 Security Hacking Podcasts This list is the most comprehensive ranking of Cyber Security Podcasts online and we are honoured to feature amongst the best! Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
If you like what you hear, please subscribe, leave us a review and tell a friend!
Beazley's Head of U.S. Cyber, Melissa Carmichael, breaks down the mounting pressures in the 2026 cyber insurance market and explains how insurers are balancing profitability, coverage, and emerging … Read More » The post AI Is Supercharging Ransomware. Is Cyber Insurance at Risk? appeared first on Insurance Journal TV.
Two very different cyber cases — a DFARS‑driven settlement and a criminal indictment involving FedRAMP misrepresentations; are giving contractors a preview of DOJ's posture for 2026. Both point to a more aggressive and more varied enforcement landscape. We're talking through what that means with Andrew Liebler and Lance Taubin of Alston & Bird.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Beazley's Head of U.S. Cyber, Melissa Carmichael, breaks down the mounting pressures in the 2026 cyber insurance market and explains how insurers are balancing profitability, coverage, and emerging … Read More » The post AI Is Supercharging Ransomware. Is Cyber Insurance at Risk? appeared first on Insurance Journal TV.
Beazley's Head of U.S. Cyber, Melissa Carmichael, breaks down the mounting pressures in the 2026 cyber insurance market and explains how insurers are balancing profitability, coverage, and emerging … Read More » The post AI Is Supercharging Ransomware. Is Cyber Insurance at Risk? appeared first on Insurance Journal TV.
Show Notes: As cybersecurity matures, one area still lags: diversity. In this thought-provoking episode of CISO Perspectives, host Kim Jones takes the mic solo to address a topic that remains both critical and controversial. Kim explores the current state of diversity in the cybersecurity field, why progress has been slow, and how inclusive teams drive greater innovation and resilience. Tune in for an honest conversation that challenges the status quo and pushes the industry forward. Want more CISO Perspectives?: Check out a companion blog post by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It's the perfect follow-up if you're curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals. Learn more about your ad choices. Visit megaphone.fm/adchoices
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Quick Howto: ZIP Files Inside RTF https://isc.sans.edu/diary/Quick+Howto+ZIP+Files+Inside+RTF/32696/#comments Keeping the Internet fast and secure: introducing Merkle Tree Certificates https://blog.cloudflare.com/bootstrap-mtc/ Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel https://unit42.paloaltonetworks.com/gemini-live-in-chrome-hijacking/
If you like what you hear, please subscribe, leave us a review and tell a friend!
In this week's Security Sprint, Dave and Andy covered the following topics:Open:• Ransomware Reinvented: AI-Powered and Autonomous Attacks — Gate 15 — 26 Feb 2026o Across party lines and industry, the verdict is the same: CISA is in trouble “We're asking states to do a job they're not resourced to do, while weakening the one federal agency designed to help them,” said Errol Weiss, chief security officer at the Health-ISAC, adding that “this is precisely where you do need a strong, centralized federal security function” and that “we already have a national shortage of cybersecurity experts, and you can't just replicate that expertise 50 times over.” Overall, Weiss said industry partners have felt the lack of outreach from the agency and are experiencing “fewer touchpoints, fewer briefings, fewer problem-solving calls,” which contributes to “a growing perception that CISA is being hollowed out where it matters most to industry: stakeholder engagement, collaborative forums, and operational support during incidents.” o Gottumukkala out, Andersen in as acting CISA director o States feel the squeeze of CISA shutdown Main Topics:Operation Epic Fury & Related: • Department of Homeland Security warns of potential attacks amid Iran operation • Peace Through Strength: President Trump Launches Operation Epic Fury to Crush Iranian Regime, End Nuclear Threat The White House• U.S. Forces Launch Operation Epic Fury U.S. Central Command• Israel performs largest cyberattack in history against Iran • X Is Drowning in Disinformation Following US and Israeli Attack on Iran • Potential Iran Nexus: Texas gunman wore "Property of Allah" hoodie during attack, had photos of Iranian leaders at home, sources say Cyber Threat Reports• CrowdStrike 2026 Global Threat Report: The Evasive Adversary Wields AI• Speed Wins When Identity Fails: 2026 Annual Threat Report • Total Ransomware Payments Stagnate for Second Consecutive Year, While Attacks Escalate • Quarterly Threat Report: Fourth Quarter, 2025 • IBM X-Force reports 44% surge in exploitation of public-facing applications as supply chain and identity attacks intensify 2026 Cost of Insider Risks Global Report — DTEX Systems and Ponemon Institute —The 2026 Cost of Insider Risks Global Report from Ponemon Institute and DTEX estimates that insider security incidents now cost organizations an average of 19.5 million United States dollars per year, driven mostly by negligent employees in complex digital environments. The study finds that companies with mature insider risk management programs avoid seven incidents and save about 8.2 million dollars annually, while cutting average time to contain from 86 days in 2023 to 67 days as budgets for insider programs nearly double. Researchers highlight the impact of shadow artificial intelligence, reporting that negligent insiders now account for 10.3 million dollars in average costs and that more than nine out of ten respondents say generative artificial intelligence has changed how staff access and share information, even though only a small share have formally integrated artificial intelligence into business strategies. Quick Hits:• AccuWeather's 2026 Severe Weather Forecast: What Business Leaders Need to Know About Severe Weather Risk
In the final installment of our three-part series on Cyber Coalition 2025, Maria Varmazis, host here at N2K CyberWire, and Liz Stokes, CyberWire Producer, step back from the cyber range to reflect on what their time in Tallinn really meant. This episode moves beyond the mechanics of the exercise and into the broader stakes of collective cyber defense in an increasingly uncertain geopolitical moment. Recorded two months after their visit, the conversation blends field tape and personal reflections — from standing outside the Russian Embassy in Old Town to recalling the weight inside NATO's secure facilities. Estonia's history, including the 2007 cyberattacks, and its visible solidarity with Ukraine underscore just how real and proximate the risks remain. Be sure to check out the first two episodes of this three part series, you can find them below. Episode one can be found here. Episode two can be found here. Learn more about your ad choices. Visit megaphone.fm/adchoices
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Fake Fedex Email Delivers Donuts! https://isc.sans.edu/diary/Fake%20Fedex%20Email%20Delivers%20Donuts!/32754 Abusing .ARPA: The TLD that isn t supposed to host anything https://www.infoblox.com/blog/threat-intelligence/abusing-arpa-the-tld-that-isnt-supposed-to-host-anything/ MC1179154 - Microsoft Authenticator app: Upcoming changes to jailbreak and root detection https://mc.merill.net/message/MC1179154 SECURITY BULLETIN: Apex One and Apex One (Mac) - February 2026 https://success.trendmicro.com/en-US/solution/KA-0022458 Special Webcast: AirSnitch How Worried Should You Be? https://www.sans.org/webcasts/airsnitch-how-worried-should-you-be
In the final installment of our three-part series on Cyber Coalition 2025, Maria Varmazis, host here at N2K CyberWire, and Liz Stokes, CyberWire Producer, step back from the cyber range to reflect on what their time in Tallinn really meant. This episode moves beyond the mechanics of the exercise and into the broader stakes of collective cyber defense in an increasingly uncertain geopolitical moment. Recorded two months after their visit, the conversation blends field tape and personal reflections — from standing outside the Russian Embassy in Old Town to recalling the weight inside NATO's secure facilities. Estonia's history, including the 2007 cyberattacks, and its visible solidarity with Ukraine underscore just how real and proximate the risks remain. Be sure to check out the first two episodes of this three part series, you can find them below. Episode one can be found here. Episode two can be found here. Learn more about your ad choices. Visit megaphone.fm/adchoices
With Todd T. DeVoe & Andrew BoyarskyEpisode OverviewCoordinated U.S. and Israeli strikes against Iran, combined with the President's announcement of open conflict, signal a fundamental shift in the national risk landscape. Whether or not Congress formally declares war, the operational environment for emergency managers has changed.In this episode, Todd DeVoe and Andrew Boyarsky unpack what this moment means for emergency management professionals across the United States. This is not a geopolitical debate. It is a strategic planning conversation.War does not replace hurricanes, earthquakes, wildfires, cyber incidents, or technological failures. It compounds them. The all-hazards framework remains intact, but the threat environment grows more complex and less forgiving.This discussion focuses on practical implications for local, state, tribal, territorial, and federal emergency managers.Key Themes Discussed1. War vs. International Armed ConflictAndrew clarifies the legal distinction between a formal declaration of war and an international armed conflict. Todd reframes the issue operationally: regardless of terminology, the domestic risk environment has shifted, and emergency managers must respond accordingly.2. Heightened Risk of Terrorism and Targeted ViolenceHistorical precedent shows that U.S. overseas military engagement can coincide with increased domestic threat reporting involving lone actors and ideologically motivated violence. The hosts discuss the importance of reviewing multi-site response plans, exercising complex coordinated attack scenarios, and strengthening intelligence-sharing pathways.3. Cyber as a Primary Hazard, Not a Secondary ConcernState-level adversaries can disrupt critical infrastructure without crossing U.S. borders. The episode explores the real-world impacts of cyberattacks on 911 centers, hospitals, water utilities, fuel systems, and government services.Reference: Cybersecurity and Infrastructure Security AgencyEmergency managers are encouraged to review continuity plans and ensure operations can continue in cyber-degraded environments.4. The National Preparedness Framework Still AppliesThe 32 Core Capabilities outlined by the Federal Emergency Management Agency remain central to planning and operations. Protection, response, mitigation, and recovery functions become more critical under sustained geopolitical strain.The conversation emphasizes prolonged EOC activation readiness, supply chain impacts, and endurance planning.5. Public Communication and TrustConflict amplifies uncertainty. The hosts discuss how misinformation and disinformation can destabilize communities if left unaddressed. Clear, coordinated messaging is essential to maintaining public trust, which Todd describes as critical infrastructure.6. The Strategic Role of Emergency Management in National SecurityEmergency management is not secondary to defense operations. It is foundational to maintaining societal resilience. War creates cascading domestic consequences that require emergency managers to be present in strategic decision-making forums.Why This Episode MattersEmergency management professionals must shift from short-term incident thinking to sustained operational posture planning.This episode challenges listeners to ask:* Can we operate effectively if primary digital systems fail?* Are our continuity plans built for prolonged strain?* Are we integrated into strategic conversations beyond traditional disaster response?* Have we updated planning assumptions to reflect a changed geopolitical reality?Memorable Lines from the Episode“Labels are secondary to consequences.”“Cyber disruption is not abstract. It is operational.”“Trust is infrastructure.”“The mission hasn't changed. The stakes have.”Recommended Review for Emergency Managers* Continuity of Operations Plans* Cyber-degraded operational protocols* Complex coordinated attack response plans* Mutual aid agreements* Public information coordination proceduresConnect With UsTodd T. DeVoe is the Founder of The Emergency Management Network and the incoming President of IAEM USA.Andrew Boyarsky is President of Pinnacle Performance Management and a national thought leader on risk, ethics, and resilience.Subscribe to The Emergency Management Network for articles, policy analysis, and leadership insights.If this episode added value to your professional planning environment, share it with your EOC partners, homeland security colleagues, and community stakeholders.Preparedness is not seasonal. It is strategic. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit emnetwork.substack.com/subscribe
Your Car's Newest Cyber Vulnerability: It's Tires! by Nick Espinosa, Chief Security Fanatic
If you like what you hear, please subscribe, leave us a review and tell a friend!
In an episode where they've never needed his bullshit X-Men knowledge more, Zammit's out sick. But never fear true believer as he's been replaced by our good friend Darcy Smith from Studio Folly! Who knows NOTHING about X-Men. He didn't even know Wolverine aka Logan aka James Howlett bones were coated in adamantium. You all better come for him in the comments. They didn't even mention the time after Wolverine got the adamantium ripped from his bones where he turned into a full on cave man, wore a bandana and had no nose. Nor do the mention the time of how he got his adamantium back. You see, at the time, and unbeknownst to the rest of the X-Men, Apocalypse had kidnapped (man-napped? mutant-napped?) Wolverine and pitted him up against Sabretooth (who had been enhanced with adamantium from the arms of the evil mutant Cyber (he had arms coated in adamantium)) to see who would become Death (one of the Horsemen of Apocalypse). Wolverine defeated Sabretooth believing that only bad would come out of Sabretooth becoming Death and so Apocalypse sucked off the adamantium from Sabretooth to give to Wolverine. Even his teeth were adamantium at this point, but that didn't last. He was then made to attack the X-Men and he was all wrapped up in a red headscarf thing and wielded a big scimitar for reasons that are unclear. Probably to hide the fact that no one was supposed to know he was Wolverine as there was another Wolverine on the team, but not like his clone or his son or his clone of a clone, this one was a Skrull (one of those shapeshifting aliens) who was pretending to be Wolverine for some reason that escapes me. Did Apocalypse put him on the team or was that just a sweet coincidence? This was during Apocalypse: The Twelve storyline, which was something that was teased for so long in the comics but ended up being just a terrible mess where Apocalypse wanted to get sucked off into the body of Nate Grey (an alternate reality and all powerful son of Jean Grey and Scott Summers who was kicking it sweet in the 616 universe who later went on to become a mutant shaman, then become a bit of everyone, then he made an alternate reality where sex was forbidden which makes sense as he was tricked by an evil Madelyne Pryor from a different alternate dimension to have sex, which is weird as Madelyne is a clone of Jean Grey, his mum) but Scott Summers pushed him out the way and took his spot, so Apocalypse ended up sucking off Cyclops and then they merged into one guy and then choofed off for a bit to finally come back to cheat on his wife. So you guys better come for them in the comments. Didn't even know their plane was called the Blackbird. IDIOTS.Links to everything at https://linktr.ee/plumbingthedeathstar including our terrible merch, social media garbage and where to become a subscriber to Bad Brain Boys+ Hosted on Acast. See acast.com/privacy for more information.
Starting off in FOLLOW UP, we've got a tax economist who actually made money betting against the "efficiency" of Elon's budget-slashing fever dreams, while Tesla is busy trying to dodge a $243 million jury verdict for an Autopilot-assisted fatality. Not content with being legally liable, Tesla is also suing the California DMV because they're offended someone called their "Autopilot" and "Full Self-Driving" marketing deceptive—ironic, since Jack Dorsey just "proactively" halved the staff at Block to make room for more AI slop. Speaking of which, Goldman Sachs is here to remind us that all this AI spending added a grand total of zero to the US GDP last year, mostly because we're just exporting all that cash to overseas chip makers while 80% of execs admit the tech hasn't actually done anything for productivity yet.Moving into IN THE NEWS, Sam Altman had the audacity to compare ChatGPT's energy-sucking habits to the 20-year evolution of a human, though the internet wasn't exactly buying the "my bot is just like a baby" defense. Anthropic actually stood its ground against the Pentagon's demand for killer robots and mass surveillance, so naturally, the military just signed a deal to put Elon's Grok in their classified systems instead—because what could go wrong with an "edgy" LLM in the war room? Meanwhile, cities are dumping AI surveillance contracts as citizens start a literal "smash-the-snitch-box" campaign against Flock's license plate readers, Google's AI is busy inserting racial slurs into news alerts, and the White House is apparently harboring a staffer moonlighting as a racist "masterpiece" creator on X. We've also got Reddit being slapped with a $20 million fine in the UK for being lazy with age checks, while Discord and Apple scramble to build verification tools that hopefully won't leak your entire identity to a hacker in Belarus.In MEDIA CANDY, the Paramount-Skydance merger is leaving the industry in a cold sweat of "synergy" layoffs, but at least we're getting more Game of Thrones spinoffs and Star Trek reboots to rot our brains. Face/Off 2 lost its director, Ryan Coogler is taking on The X-Files, and Google wants to use AI to turn music into generic "lo-fi" background noise for the masses.Over in APPS & DOODADS, OpenAI is planning a 2027 smart speaker that literally watches you through a camera—because you definitely wanted a $300 Sam Altman-shaped eye in your kitchen—while the Dark Sky creators are back with "Acme Weather" for the low price of $25 a year.We wrap up THE DARK SIDE WITH DAVE with a deep dive into "Under Pressure" and Coruscant's urban sprawl, leaving us to reminisce about the days when KPT Bryce was the pinnacle of tech—back when "generative art" was just a fractal that took six hours to render.Sponsors:DeleteMe - Get 20% off your DeleteMe plan when you go to JoinDeleteMe.com/GOG and use promo code GOG at checkout.SquareSpace - go to squarespace.com/GRUMPY for a free trial. And when you're ready to launch, use code GRUMPY to save 10% off your first purchase of a website or domain.Private Internet Access - Go to GOG.Show/vpn and sign up today. For a limited time only, you can get OUR favorite VPN for as little as $2.03 a month.SetApp - With a single monthly subscription you get 240+ apps for your Mac. Go to SetApp and get started today!!!1Password - Get a great deal on the only password manager recommended by Grumpy Old Geeks! gog.show/1passwordShow notes at https://gog.show/735Watch on YouTube: https://youtu.be/jdz--v3eeU4FOLLOW UPGuy Bets Entire Life Savings Against Elon Musk, WinsTesla sues California DMV after it banned the term 'Autopilot'Jack Dorsey just halved the size of Block's employee base — and he says your company is nextIN THE NEWSSam Altman: Know What Else Used a Lot of Energy? Human CivilizationStatement from Dario Amodei on our discussions with the Department of WarAnthropic Tells Pete Hegseth to Take a HikeCities Are Shredding Their AI Surveillance Contracts en MasseKalshi Suspended a California Politician and a YouTuber for Insider TradingDiscord delays age verification to address user concernsApple introduces age verification for apps in Utah, Louisiana and AustraliaMEDIA CANDYAs Paramount Skydance wins the battle for Warner Bros. as Netflix ends its bid, here's the mood inside all three companies.A Knight of the Seven KingdomsStar Trek: Starfleet AcademyThe Night Agent Season 3'Face/Off 2' Director Adam Wingard is Now/GoneRyan Coogler's X-Files reboot gets the green light at HuluMortal Kombat II | Official Trailer IIGoogle's AI Slop Machine Is Coming for Your MusicDropping Names... and other things with Jonathan Frakes and Brent SpinerOnce We Were SpacemenAPPS & DOODADSOpenAI will reportedly release an AI-powered smart speaker in 2027Instagram Will Notify Parents When Teens Use Search Terms Related to SuicideThe creators of Dark Sky have a new weather appThis App Warns You if Someone Is Wearing Smart Glasses NearbyTHE DARK SIDE WITH DAVEDave BittnerThe CyberWireHacking HumansCaveatControl LoopOnly Malware in the BuildingStrong Songs - S08E02 - "Under Pressure" by Queen and David BowieThe Problem with Coruscant (Planet Cities Explained)Reminds me of KPT Fractal ExplorerKPT Bryce 1.0 with John Dvorak and Kai KrauseSingle-Biome PlanetKPT Shapes by Dave BittnerBald Mr Clean mascot "retired"My childhood disappointment with scrubbing bubbles.CLOSING SHOUT-OUTSActor Robert Carradine Dies At Age 71See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Finding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary] https://isc.sans.edu/diary/Finding%20Signal%20in%20the%20Noise%3A%20Lessons%20Learned%20Running%20a%20Honeypot%20with%20AI%20Assistance%20%5BGuest%20Diary%5D/32744 Google API Keys Weren't Secrets. But then Gemini Changed the Rules. https://trufflesecurity.com/blog/google-api-keys-werent-secrets-but-then-gemini-changed-the-rules AirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networks https://www.ndss-symposium.org/ndss-paper/airsnitch-demystifying-and-breaking-client-isolation-in-wi-fi-networks/
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
The CLAIR Model: A Synthesized Conceptual Framework for Mapping Critical Infrastructure Interdependencies [Guest Diary] https://isc.sans.edu/diary/The+CLAIR+Model+A+Synthesized+Conceptual+Framework+for+Mapping+Critical+Infrastructure+Interdependencies+Guest+Diary/32748 Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability CVE-2026-20127 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk https://blog.talosintelligence.com/uat-8616-sd-wan/ Abusing Cortex XDR Live https://labs.infoguard.ch/posts/abusing_cortex_xdr_live_response_as_c2/ OpenSSL Vulnerability CVE-2025-15467 https://seclists.org/oss-sec/2026/q1/220
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Open Redirects: A Forgotten Vulnerability? https://isc.sans.edu/diary/Open%20Redirects%3A%20A%20Forgotten%20Vulnerability%3F/32742 Goodbye innerHTML, Hello setHTML: Stronger XSS Protection in Firefox 148 https://hacks.mozilla.org/2026/02/goodbye-innerhtml-hello-sethtml-stronger-xss-protection-in-firefox-148/ More telnetd issues https://seclists.org/oss-sec/2026/q1/199