POPULARITY
Categories
First, The Indian Express' Sweety Kumari talks about a large organized cybercrime network that the West Bengal police says it has uncovered.Next, we talk to The Indian Express' Kanchan Vasdev about the growing rift between the AAP led Punjab government and the Centre over flood relief funds. (09:10)Lastly, we take a look at India's first ever LPG import deal with the United States, a move that could reform the country's energy strategy. (21:08)Hosted by Ichha SharmaWritten and produced by Shashank Bhargava, Niharika Nanda and Ichha SharmaEdited and mixed by Vijay Doiphode
The Pentagon is spending millions on AI hacking. The New York Times investigates illicit crypto funds. Researchers uncover widespread remote code execution flaws in AI inference engines. Police in India arrest CCTV hackers. Payroll Pirates use Google Ads to steal credentials and redirect salaries. A large-scale brand impersonation campaign delivers Gh0st RAT to Chinese-speaking users.A bitcoin mining company CEO gets scammed. Monday biz brief. On our Industry Voices segment with our Knowledge Partner SpecterOps, Chief Technology Officer Jared Atkinson is discussing Attack Path Management: Identities in Transit. Bitcoin big wigs learn to bite through plastic. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Industry Voices segment with our Knowledge Partner SpecterOps, Chief Technology Officer Jared Atkinson is discussing Attack Path Management: Identities in Transit. Hear more from Jared here. Cyber Things podcast Something strange has landed in all the cool podcast apps… Cyber Things is a new three-part series from Armis that decodes real-world cyber threats through the lens of a certain Hawkins-based sci-fi phenomenon. Just in time for the show's final season, Rebecca Cradick leads us through a world where fiction meets cybersecurity. Because sometimes the scariest villains aren't in the Upside Down — they're online. You can check out Cyber Things on your favorite podcast app and on our website. On the site, you will find the trailer and Episode 1: The Unseen World available today! Selected Reading The Pentagon Is Spending Millions On AI Hacking From Startup Twenty (Forbes) The Crypto Industry's $28 Billion in ‘Dirty Money' (The New York Times) The Coin Laundry, a global cryptocurrency investigation (International Consortium of Investigative Journalism) "ShadowMQ" exploit pattern reported in major AI frameworks, enables remote code execution (Beyond Machines) Gujarat: Hackers steal maternity ward CCTV videos in India cybercrime racket (BBC News) Payroll Pirates: One Network, Hundreds of Targets (Check Point) Digital Doppelgangers: Anatomy of Evolving Impersonation Campaigns Distributing Gh0st RAT (Unit 42, Palo Alto Networks) Inside a Wild Bitcoin Heist: Five-Star Hotels, Cash-Stuffed Envelopes, and Vanishing Funds (WIRED) UK prosecutors seize £4.11M in crypto from Twitter mega-hack culprit (The Register) Tenzai emerges from stealth with $75 million in seed funding led by Greylock Partners. (N2K Pro) How to Not Get Kidnapped for Your Bitcoin (The New York Times) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Subo Guha is the senior vice president of product at Stellar Cyber. In this episode, he joins host Charlie Osborne to discuss autonomous SOC and artificial intelligence, including what's next for organizations, what businesses need to know, and more. This episode is sponsored by Stellar Cyber. To learn more, visit https://stellarcyber.ai.
Send us a textWe trace how cyber policy tries to catch up with fast-moving threats, from decades-old laws to a new push for offensive capabilities. Along the way, we unpack what real resilience looks like for SMEs, critical infrastructure, and the talent pipeline that holds it all together.• Verona's route from public policy to cybersecurity• Why slow law and fast threats collide• Updating the Computer Misuse Act and research protections• Offensive cyber, deterrence, and ethical guardrails• Zero days, decision latency, and operational windows• SMEs and supply chains as systemic risk• Secure by design and secure by default at scale• State cyber reserves and public–private secondments• Talent gaps, pay gaps, and global accreditation• EU and UK moves to standardize skills and tighten rules• Government roles in funding, convening, and capability buildingFind Verona on LinkedIn: Verona Johnstone Hulse. Read NCC Group's Global Cyber Policy Radar on the NCC Group website or via Verona's LinkedIn postsInspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifySupport the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast Affiliates➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh➡️ OffGrid Coupon Code: JOE➡️ Unplugged Phone: https://unplugged.com/Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout*See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.
If you like what you hear, please subscribe, leave us a review and tell a friend!
In this episode of The Gate 15 Interview, Andy Jabbour speaks with Cody Barrrow, CEO, EclecticlQ. Cody is a cybersecurity industry leader with over 20 years of public and private sector experience in the US and EU, holding leadership positions within the Pentagon, National Security Agency/US Cyber Command, Fortune 25, and commercial vendors as well as a number of other positions with the US Government and across the cybersecurity community. Since 2019, he has been with EclecticIQ, the Amsterdam-based European leader in cybersecurity technologies servicing central governments and large enterprises, where he took over as Chief Executive Officer in 2024. Cody has a Bachelor of Science in Political Science from the University of Maryland. Learn more about Cody on LinkedIn.In the discussion Cody and Andy cover:Cody's background.EclecticIQ, “The Threat Intelligence Platform that understands your business”“I'm not really big on hype.” Cody's perspective on threats, resilience, AI and more.Single points-of-failure, reducing dependencies, and “being anti-fragile”The importance of being adaptableCoffee and whisky, all day longBeing an ex-patRanch dressingAnd more!Selected links:EclecticIQ
Who actually owns data protection in a nonprofit? In this fast-paced conversation, host Julia C. Patrick sits down with Taysha Adams, Manager Technology Support at JMT Consulting, and Josh Fricovsky, Engineering Director at Cortavo, to tackle the uncomfortable truth: cybersecurity is no longer “someone else's job.”Taysha starts with a reality check: most vulnerabilities don't begin in a server room. They start with everyday behavior. From checking work email on public Wi-Fi to logging in on a friend's device, casual habits open doors to attackers. As she explains, “Everybody's responsible for data security and protection… most vulnerabilities do come in from the end users.” JMT has spent more than a year realigning internal processes, tightening device controls, and partnering with Cortavo so their own team—and their clients—are better shielded.Josh builds on that by showing how fast the threat landscape is evolving. Cortavo's job as a managed service provider is to sit on the “bleeding edge”: endpoint protection, email security, MFA, VPNs, and now mobile device management for a workforce that increasingly works on the move. He notes that “the cost of inaction is going to be 10 to 100 times more than” the investment in proactive security. It's not just about tools; it's about culture, education, and leadership setting the tone.The conversation then moves to the devices we use every day. Laptops, tablets, and phones are cheaper and more plentiful than ever, but every extra device is another front door. The guests stress that nonprofits need clear policies for using personal phones for work, along with mobile device management to protect company data without “controlling” the phone itself.AI takes the discussion to another level. Both guests are enthusiastic users, but they warn that unregulated use is dangerous. Taysha urges organizations to set guardrails and favor licensed or enterprise tools so prompts, donor details, and templates aren't quietly training public models. Josh goes further, recommending offline or private LLMs for sensitive data and pointing out that attackers are already using AI for sophisticated social engineering, including voice cloning and real-time credential theft.Finally, the trio frames cybersecurity as a governance and financial issue, not just an IT problem. Data loss can mean lost clients, destroyed reputation, and even the end of an organization. Partnering with firms like JMT and Cortavo, building internal awareness, and treating security like an essential protection policy—not a luxury—are presented as non-negotiable steps for modern nonprofits.This episode is a must-watch for executives, boards, and staff who touch data in any way—which is everyone.#TheNonprofitShow #NonprofitCybersecurity #DataProtectionFind us Live daily on YouTube!Find us Live daily on LinkedIn!Find us Live daily on X: @Nonprofit_ShowOur national co-hosts and amazing guests discuss management, money and missions of nonprofits! 12:30pm ET 11:30am CT 10:30am MT 9:30am PTSend us your ideas for Show Guests or Topics: HelpDesk@AmericanNonprofitAcademy.comVisit us on the web:The Nonprofit Show
Nicholas Woolhead er vokset op på Falster, og som ung brugte han, som mange andre drenge og mænd, meget tid på YouTube. Men der skete noget for de indholdsskabere han så: det, som engang var indhold om ateisme og religionskritik blev til anti-feministisk og manosfærisk indhold. Og uden at vide af det ændrede Nicholas' holdninger sig også, indtil han en dag havde en opsigtsvækkende samtale til en fest.I dag er Nicholas Woolhead kendt som Nicholas Uldhoved på bl.a. Instagram og TikTok, hvor han producerer venstreorienterede, feministiske og systemkritiske videoer. Han arbejder hårdt for at få andre mænd til at blive feministiske, og reflektere over deres position og privilegier i samfundet. Hør med i denne episode af Manosfæren, hvor Nicholas fortæller om hans rejse fra manosfæren til feminismen.Vært: Monir Mooghen (de/den)Gæst: Nicholas Woolhead (han/ham)Dette afsnit af Cybernormer er støttet af Fundamental Rights Initiative.Støt vores podcast og arbejde med at lave frit tilgængeligt indhold om manosfæren og andre digitale fænomener ved at støtte os på vores Patreon: https://www.patreon.com/cw/CybernauterneKilder og referencerRecommending Toxicity: The role of algorithmic recommender functions on YouTube Shorts and TikTok in promoting male supremacist influencers. Dr Catherine Baker, Prof Debbie Ging and Dr Maja Brandt Andreasen, DCU Anti-Bullying Centre Dublin City University, 2024 https://fujomedia.eu/site/assets/files/2047/dcu-toxicity-full-report.pdfManosfæren: Gamergate: https://cybernauterne.dk/podcast/manosfaeren-2-gamergate/ Infodump 2: Manosfæren i Danmarkhttps://cybernauterne.dk/blog/infodump-2-manosfaeren-i-danmark/Dark Money: The Hidden History of the Billionaires Behind the Rise of the Radical Right (2016) af Jane MayerLydklipDamsel in Distress: Part 1 - Tropes vs Women in Video Games - Feminist Frequency (Anita Sarkeesian) - https://www.youtube.com/watch?v=X6p5AZp7r_Q&list=PLn4ob_5_ttEaA_vc8F3fjzE62esf9yP61 Lingerie is not Armor - Tropes vs Women in Video Games (Anita Sarkeesian) - https://www.youtube.com/watch?v=jko06dA_x88&t=408sCharlie Kirk “What is a woman”-klip - https://www.tiktok.com/@truth.god.and.jus/video/7348607917429427499?is_from_webapp=1&sender_device=pc&web_id=7492827128301569558 Cybernauterne er et netværk af eksperter i cybersikkerhed, internetkultur og digital forståelse. I vores podcast Cybernormer undersøger vi internettets subkulturer, hvordan teknologi påvirker os som mennesker og samfund, og hvordan vi kan gribe teknologierne, så de ikke styrer os.Du kan støtte udgivelsen af Cybernormer ved at blive medlem på vores Patreon
In this episode of the Need to Know Podcast, we explore the evolving landscape of learning in the Microsoft Cloud ecosystem, with a spotlight on the SMB market. From the latest in Microsoft 365 Copilot innovations to critical cybersecurity updates and the end of CIAOPS Academy, this episode delivers essential insights for IT professionals and business leaders navigating the modern digital workplace. Resources Explore the tools, communities, and content mentioned in this episode: CIAOPS Need to Know Podcast: https://ciaops.podbean.com/ CIAOPS Blog: https://blog.ciaops.com/ CIAOPS Labs: https://blog.ciaopslabs.com/ CIAOPS Brief: https://blog.ciaops.com/tag/cia-brief/ Join the Teams Shared Channel: https://blog.ciaops.com/2022/07/29/join-my-teams-shared-channel/ CIAOPS Merch Store: https://my-store-c5d877-2.creator-spring.com/ Become a Patron: https://www.ciaopspatron.com/ Direct Support: https://ko-fi.com/ciaops Get Your M365 Questions Answered: https://blog.ciaops.com/2025/06/11/get-your-m365-questions-answered-via-email-2/ Test Your Microsoft 365 Speed: https://blog.ciaops.com/2025/07/21/test-your-microsoft-365-speed-in-seconds-for-free/ CIAOPS Email list - https://bit.ly/cia-email Announcements Flight School: Mastering Copilot for IT Pros – https://blog.ciaops.com/2025/11/14/flight-school-mastering-copilot-for-it-pros/ Disabling Office Macros via ASR to Meet Essential Eight Requirements – https://blog.ciaops.com/2025/11/13/disabling-office-macros-via-asr-to-meet-essential-eight-requirements/ ASD OWA settings check script – https://blog.ciaops.com/2025/11/13/asd-owa-settings-check-script/ ASD Mailflow settings check script – https://blog.ciaops.com/2025/11/12/asd-mailflow-settings-check-sript/ CIAOPS Academy deprecation notification – https://blog.ciaops.com/2025/11/10/ciaops-academy-deprecation-notification/ Show Notes The next chapter of the Microsoft–OpenAI partnership – https://blogs.microsoft.com/blog/2025/10/28/the-next-chapter-of-the-microsoft-openai-partnership/ Automate with Workflows Agent in Microsoft 365 Copilot (Frontier) – https://www.youtube.com/watch?v=Vvk1ScZT-lo Introducing Researcher with Computer Use in Microsoft 365 Copilot – https://techcommunity.microsoft.com/blog/microsoft365copilotblog/introducing-researcher-with-comput… Build apps in minutes with App Builder agent in Microsoft 365 Copilot (Frontier) – https://www.youtube.com/watch?v=v27H_R1ltB0 Microsoft 365 Copilot now enables you to build apps and workflows – https://www.microsoft.com/en-us/microsoft-365/blog/2025/10/28/microsoft-365-copilot-now-enables-you Introducing Teams Mode for Microsoft 365 Copilot – https://techcommunity.microsoft.com/blog/microsoft365copilotblog/introducing-teams-mode-for-microso… Introducing MAI-Image-1, debuting in the top 10 on LMArena – https://microsoft.ai/news/introducing-mai-image-1-debuting-in-the-top-10-on-lmarena/ Building human-centric security skills for AI – https://techcommunity.microsoft.com/blog/microsoftlearnblog/building-human-centric-security-skills-… GenAI vs Cyber Threats: Why GenAI Powered Unified SecOps Wins – https://techcommunity.microsoft.com/blog/microsoft-security-blog/genai-vs-cyber-threats-why-genai-p… What's new in Microsoft 365 Copilot | October 2025 – https://techcommunity.microsoft.com/blog/Microsoft365CopilotBlog/what%E2%80%99s-new-in-microsoft-36… The 5 generative AI security threats you need to know about detailed in new e-book – https://www.microsoft.com/en-us/security/blog/2025/10/30/the-5-generative-ai-security-threats-you-n… SharePoint Showcase highlights: Smarter Copilot responses using metadata with the Knowledge Agent – https://techcommunity.microsoft.com/blog/microsoft365insiderblog/sharepoint-showcase-highlights-sma… Work smarter with Copilot in the People, Files, and Calendar apps – https://techcommunity.microsoft.com/blog/microsoft365insiderblog/work-smarter-with-copilot-in-the-p… The weakest link: Stolen staff passwords now the biggest cyber threat to workplaces – https://www.smh.com.au/politics/federal/the-weakest-link-stolen-staff-passwords-now-the-biggest-cyb… Cyber security priorities for boards of directors 2025-26 – https://www.cyber.gov.au/business-government/protecting-business-leaders/cyber-security-for-busines… Secure external attachments with Purview encryption – https://techcommunity.microsoft.com/blog/azurepurviewblog/secure-external-attachments-with-purview-… What's New in Microsoft Intune: October 2025 – https://techcommunity.microsoft.com/blog/microsoftintuneblog/what%E2%80%99s-new-in-microsoft-intune… Custom detections are now the unified experience for creating detections in Microsoft Defender – https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/custom-detections-are-now-th… 10 ways Microsoft Intune supports a smooth upgrade to Windows 11 – https://techcommunity.microsoft.com/blog/microsoftintuneblog/10-ways-microsoft-intune-supports-a-sm… How Windows 11 and AI are transforming the future of work – https://techcommunity.microsoft.com/blog/windows-itpro-blog/how-windows-11-and-ai-are-transforming-… Security Copilot Agents: The New Era of AI, Driven Cyber Defense – https://techcommunity.microsoft.com/blog/microsoft-security-blog/security-copilot-agents-the-new-er… 6 truths about migrating Microsoft Sentinel to the Defender portal – https://techcommunity.microsoft.com/blog/microsoftsentinelblog/6-truths-about-migrating-microsoft-s… Microsoft named a Leader in the 2025 Gartner® Magic Quadrant™ for SIEM – https://www.microsoft.com/en-us/security/blog/2025/10/16/microsoft-named-a-leader-in-the-2025-gartn… Extortion and ransomware drive over half of cyberattacks – https://blogs.microsoft.com/on-the-issues/2025/10/16/mddr-2025/ Microsoft 365 Insider Round-Up: October 2025 – https://www.linkedin.com/pulse/microsoft-365-insider-round-up-october-2025-microsoft-365-insider-ub… Making every Windows 11 PC an AI PC – https://blogs.windows.com/windowsexperience/2025/10/16/making-every-windows-11-pc-an-ai-pc/ Microsoft raises the bar: A smarter way to measure AI for cybersecurity – https://www.microsoft.com/en-us/security/blog/2025/10/14/microsoft-raises-the-bar-a-smarter-way-to-… Building a lasting security culture at Microsoft – https://www.microsoft.com/en-us/security/blog/2025/10/13/building-a-lasting-security-culture-at-mic… Satya – My annual letter: Thinking in decades, executing in quarters – https://www.linkedin.com/pulse/my-annual-letter-thinking-decades-executing-quarters-satya-nadella-7…
Computer und Kommunikation (komplette Sendung) - Deutschlandfunk
Gessat, Michael www.deutschlandfunk.de, Computer und Kommunikation
The inevitable decline of civilization takes center stage as the show kicks off with the miserable results of the FACEBOOK SETTLEMENT, confirming Brian's $4.01 payout, followed by a discussion of the SPORTS BETTING SCANDAL, where MLB players are rigging games over prop bets, confirming that gambling is now actively killing sports; moving to the news, the guys celebrate the DENMARK SOCIAL MEDIA BAN and SCHOOL PHONE BANS, which are already proving that teenagers need mandatory digital detoxes, prompting comparisons to Footloose and the revelation that teens are now passing handwritten notes and taking Polaroids. Naturally, things aren't going well for the hyper-rich, as evidenced by the TESLA EXECUTIVE EXODUS and the launch of WAYMO FREEWAYS, which will surely bring chaos to LA, and the ongoing saga of massive capital destruction via OPENAI LOSSES and META AI FAILURES, prompting Mark Zuckerberg to announce his desperate bid to CURE ALL DISEASES with AI, a feat less audacious than the fraud of AI startup FIREFLY AI TRANSCRIPT, which admitted its original "AI" was just human transcriptionists.They then hit a laundry list of digital woes, including the dubious convenience of APPLE PASSPORTS, the creeping dread of Sam Altman's failing WORLDCOIN EYEBALL SCANS, the ridiculous crypto fraud DEFI OFFICE SPACE that literally copied a movie plot, and Coinbase's inexplicable decision to bring back high-risk ICOs; the absurdity continued with the OPENAI LAWSUIT over a suicidal chatbot that suggested the user "Rest easy, King," and the political maneuvering of the REPUBLICAN BROADBAND REDIRECT, which will gut internet access for the underserved to fund the Treasury, but the real threat to humanity remains the clandestine PREVENTATIVE GENE HACKING startup funded by tech billionaires aiming to create modified babies offshore.In Media Candy, they share reviews of the excellent DIPLOMAT, ZOOTOPIA, and the just-released LUSH DOCUMENTARY, confirming our combined Gen-X fragility, before celebrating two definitive wins for reality: the fact that physicists have finally CRUSHED THE SIMULATION THEORY, and the literary brilliance of Joyce Carol Oates' tweet, which expertly called out Elon Musk as uneducated and uncultured.All this and more on this episode of Grumpy Old GeeksSponsors:CleanMyMac - clnmy.com/OLDGEEKS - Use code OLDGEEKS for 20% off.Private Internet Access - Go to GOG.Show/vpn and sign up today. For a limited time only, you can get OUR favorite VPN for as little as $2.03 a month.SetApp - With a single monthly subscription you get 240+ apps for your Mac. Go to SetApp and get started today!!!1Password - Get a great deal on the only password manager recommended by Grumpy Old Geeks! gog.show/1passwordShow notes at https://gog.show/722FOLLOW UPBaseball Is CompromisedIN THE NEWSDenmark set to ban social media for users under 15 years of ageBanning Phones in Schools Is Drastically Changing the Behavior of KidsThe Head of the Cybertruck Program Quit Tesla. The Model Y Leader Left Hours LaterWaymo's driverless cars will start driving on freeways in three US citiesApple introduces a new Digital ID feature to make boarding flights easierOpenAI Will Lose $74 Billion the Same Year That Anthropic Breaks Even: ReportMeta's AI Ambitions Appear to Be in a TailspinZuckerberg, Chan bet AI can cure all diseaseStartup Secretly Working to Gene-Hack Human BabySam Altman's Creepy Orb Startup Has Only Scanned 2 Percent of Its Ideal Number of Eyeballs$120 Million Crypto Hack Blamed on Office Space-Style ExploitCoinbase Wants to Bring Back an Old Crypto Trend That Ended in DisasterSeven more families are now suing OpenAI over ChatGPT's role in suicides, delusionsUS states could lose $21 billion of broadband grants after Trump overhaulPhysicists Say They've Proven Whether We're Living in a SimulationElon Musk Got One-Shotted by an Extremely Mean TweetMEDIA CANDYZootopiaThe DiplomatPluribusVictoria BeckhamLush: A Far from Home MovieWelcome to Derry'V for Vendetta' Is Becoming a TV ShowDune: Prophecy' Kicks off Season 2 Production‘Alien: Earth' Has Been Renewed for Season 2‘Poker Face' Canceled at Peacock; Rian Johnson Will Seek New Home for Series — With Peter Dinklage StarringThe Running Man | Final Trailer (2025 Movie) - Edgar Wright, Glen PowellToy Story 5 | Teaser Trailer | In Theaters June 19Paramount+ announces price increases for every streaming planAPPS & DOODADSHow to adjust the Liquid Glass effect in iOS 26.1How to stretch the clock on your lock screen in iOS 26Tesla Reportedly Adding Apple CarPlay, Bucking Industry TrendFounder Admits His “AI Transcription” Startup Was Just Him Joining People's Meetings and Taking Notes by HandFTC Announces Crackdown on Deceptive AI Claims and SchemesTHE DARK SIDE WITH DAVEDave BittnerThe CyberWireHacking HumansCaveatControl LoopOnly Malware in the BuildingThe Official ‘Star Wars' Magazine Is Coming to an End After Over 30 YearsFuzzball Bandolier ShawlTalk about your crotch-rocket...AI-Powered Toys Caught Telling 5-Year-Olds How to Find Knives and Start Fires With MatchesSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SmartApeSG campaign uses ClickFix page to push NetSupport RAT A detailed analysis of a recent SamtApeSG campaign taking advantage of ClickFix https://isc.sans.edu/diary/32474 Formbook Delivered Through Multiple Scripts An analysis of a recent version of Formbook showing how it takes advantage of multiple obfuscation tricks https://isc.sans.edu/diary/32480 sudo-rs vulnerabilities Two vulnerabilities were patched in sudo-rs, the version of sudo written in Rust, showing that while Rust does have an advantage when it comes to memory safety, there are plenty of other vulnerabilities to worry about https://ubuntu.com/security/notices/USN-7867-1 https://github.com/trifectatechfoundation/sudo-rs/security/advisories/GHSA-c978-wq47-pvvw?ref=itsfoss.com SANS Holiday Hack Challenge https://sans.org/HolidayHack
Will future wars be decided by who controls space—cyber and outer—and which superpower has better paired geostrategic thinking with emerging technologies? Anne Neuberger, the Hoover Institution's William C. Edwards Distinguished Visiting Fellow and a former White House and Pentagon cyber policy advisor, joins GoodFellows regulars Sir Niall Ferguson, John H. Cochrane, and Lt. Gen. H.R. McMaster to discuss what she sees as a “cyber gap” between China and America, the need for the US to rethink traditional weapons platforms (hello, drones), plus how Dwight Eisenhower's warning of a “military industry complex” is being redefined by the tech sector's growing role in present-day and future warfare. After that: the three fellows weigh the significance of a utopian socialist recently elected mayor of a very capitalist New York City, a new “algocracy” (algorithms running the government) in Albania, the UK's fabled BBC in hot water over alleged editorial bias, plus whether the “war of the tomorrow” may be in . . . Venezuela? Subscribe to GoodFellows for clarity on today's biggest social, economic, and geostrategic shifts — only on GoodFellows.
Accused of stealing hundreds of millions of dollars – Russia's most wanted hackers. Just who are Evil Corp? In season 3 of Cyber Hack, we follow the years' long trail with investigators as they try to track down the man alleged to be at the centre of it all, hacker Maksim Yakubets. Search for Cyber Hack wherever you get your BBC podcasts. And don't forget to follow or subscribe, so you never miss an episode.
Two key cyber laws are back as president signs bill to end shutdown Microsoft's screen capture prevention for Teams users is finally rolling out FBI calls Akira top five ransomware variant out of 130 targeting U.S. businesses Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" ....or the really scary one: "how do I get out from under these old tools and manual processes? Enter Vanta. Vanta automates manual work, so you can stop sweating over spreadsheets, chasing audit evidence, and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data, and simplifies your security at scale. Vanta also fits right into your workflows, using AI to streamline evidence collection, flag risks, and keep your program audit-ready—ALL…THE…TIME. With Vanta, you get everything you need to move faster, scale confidently—and get back to sleep. Get started at vanta.com/headlines Find the stories behind the headlines at CISOseries.com.
Noord-Korea staat bekend als de meest afgesloten staat ter wereld – maar hoe geïsoleerd is het land werkelijk? Nu Noord-Koreaanse soldaten opduiken aan het Russische front, werpt dat vragen op over Pyongyangs rol op het wereldtoneel.Korea-deskundige Remco Breuker onthult hoe verborgen netwerken, internationale allianties en gigantische cryptohacks het regime miljarden opleveren. Tech-ondernemer Simon Wijckmans schuift aan om te vertellen over zijn ervaring met frauduleuze sollicitanten, die met AI, green screens en valse identiteiten Westerse bedrijven proberen binnen te dringen. Wat hebben zij met Noord-Korea te maken? Je hoort het in deze aflevering van Het Digitale Front!De cybertips van deze week:Podcast: Lazarus - BBCLiveblog: hybride oorlog - De VolkskrantArtikel: ‘How North Korean IT workers leverage AI and vulnerable Americans to infiltrate US companies' - CNNZie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
OWASP Top 10 2025 Release Candidate OWASP published a release candidate for the 2025 version of its Top 10 list https://owasp.org/Top10/2025/0x00_2025-Introduction/ Citrix/Cisco Exploitation Details Amazon detailed how Citrix and Cisco vulnerabilities were used by advanced actors to upload webshells https://aws.amazon.com/blogs/security/amazon-discovers-apt-exploiting-cisco-and-citrix-zero-days/ Testing Quantum Readyness A website tests your services for post-quantum computing-resistant cryptographic algorithms https://qcready.com/
Cyberthreats are everywhere, and while they may be inevitable, their impact can be manageable. Institutions who are prepared for cybersecurity disruptions are proactive and collaborative about their response. This episode of the Forward Thinking Podcast features FCCS SVP of Marketing and Communications Stephanie Barton, Lisa Parrinello, FCCS VP of Risk Management & Insurance Services and Naomi Baumann, FCCS VP of Claims & Insurance Services. Together they discuss how Farm Credit's Captive Insurance Company is helping institutions strengthen their cyberdefenses and what boards of directors need to know to stay ahead of the cybersecurity game. Episode Insights Include: The bigger picture of cyberthreats Cyberthreats used to be considered an IT-only problem, but that isn't the case anymore. These enterprise-wide issues demand board-level attention. Ransomware, extortion, targeted financial systems and AI deep-fake impersonations are some of today's biggest cyberthreats. The goal today isn't just protection, it's resilience. A prepared institution can respond and recover from cyberthreats no matter where they hit. The role of Farm Credit's Captive Insurance Company As the captive, they provide institutions cyber insurance and management services that go beyond what commercial insurance markets can offer. They offer tailored protection designed specifically for the unique cooperative structure of Farm Credit. Collaborative claims management proactively responds to any incident or threat of incident. Their strategic access to commercial markets allows them to purchase insurance as well. Over the years, Captive has saved an average of $50 million in insurance coverage. Consistent system-wide learning whenever instances occur. Resilience tools and strategies Resilience requires a multi-layered approach based on assents and security needs. Threat detection and response pinpoint vulnerability, endpoint detection, and tabletop exercises. Human-centric risk management and ongoing employee training are critical for cyber risk management. Employees and people are always going to be the weakest link in cybersecurity. Data protection and resilience in communications in sensitive information need to be encrypted and backup tested. Cybersecurity is not an impenetrable armor, it is an anatomy with multiple systems working together to respond and continue operating in a culture of proactive risk management. The pivotal role of the board Directors need to prioritize an approved annual cyber risk manual. Ongoing development and maintenance of a robust program is essential. Boards should receive quarterly reports on threats, vulnerabilities and mitigation actions. Cyber oversight needs to be integrated into business technology planning. FCA should be notified within 36 hours of any cyber incident. The culture of cybersecurity Institutions build resilience when everyone is involved. Third party oversight and engagement with cyber-focused legal counsel is crucial. Most breeches don't happen in bad systems, they happen when good people let down their guard. Muscle memory kicks in when crisis hits, but only when preparation has occurred. Ultimately, cybersecurity is everyone's business. This podcast is powered by FCCS. Resources Connect with Lisa Parrinello — Lisa Parrinello Connect with Naomi Baumann — Naomi Baumann Get in touch info@fccsconsulting.com "The goal isn't just protection – it's resilience." — Naomi Baumann "The Captive provides consistent system-wide learning whenever instances occur." — Lisa Parrinello "Human-centric risk management and ongoing employee training are critical for cyber risk management." — Naomi Baumann "Employees and people are always going to be the weakest link in cybersecurity." — Naomi Baumann "Even without a deep technical knowledge, boards can strengthen resilience by asking the right questions and staying engaged." — Lisa Parrinello "Institutions build resilience when everyone is involved." — Naomi Baumann Resilience is just as much about people as it is about systems." — Naomi Baumann
Digital intelligence is reshaping how organizations work, and success depends on integrating multiple domains, using real-time analytics, and ensuring strong cyber protections as data grows and risks increase This week, Dave, Esmee, and Rob talk with Chris Carter, Director - Key Accounts and Australia at BAE Systems Digital Intelligence, to explore the fast-moving world of digital intelligence, data, and analytics and dive into the complexities of the work, how rapidly the landscape is evolving, and the major challenges organizations face today. TLDR:00:41 Introduction of Chris Carter03:00 Rob is confused by the idea of renting out brain capacity for compute power07:13 Chris discusses the fusion of data, AI, and human judgment in complex environments34:30 Are we giving enough attention to human cognitive capacity?42:34 Rugby tickets with the family GuestChris Carter: https://www.linkedin.com/in/chriscarter3/ HostsDave Chapman: https://www.linkedin.com/in/chapmandr/Rob Kernahan: https://www.linkedin.com/in/rob-kernahan/Esmee van de Giessen: https://www.linkedin.com/in/esmeevandegiessen/ ProductionMarcel van der Burg: https://www.linkedin.com/in/marcel-vd-burg/Dave Chapman: https://www.linkedin.com/in/chapmandr/ SoundBen Corbett: https://www.linkedin.com/in/ben-corbett-3b6a11135/Louis Corbett: https://www.linkedin.com/in/louis-corbett-087250264/ 'Cloud Realities' is an original podcast from Capgemini
If you like what you hear, please subscribe, leave us a review and tell a friend!
A strong incident response (IR) program isn't just about processes—it's about mindset. In this episode, Lincare Holdings' Head of Information Security, Prentis Brooks, joins RSAC Executive Chairman Dr. Hugh Thompson to unpack what true IR maturity looks like. From building agile teams to aligning strategy and technology, they reveal how leading organizations stay prepared for the threats ahead.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Microsoft Patch Tuesday for November 2025 https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+for+November+2025/32468/ Gladinet Triofox Vulnerability Triofox uses the host header in lieu of proper access control, allowing an attacker to access the page managing administrators by simply setting the host header to localhost. https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480/ SAP November 2025 Patch Day SAP fixed a critical vulnerability, fixed default credentials in its SQL Anywhere Monitor https://onapsis.com/blog/sap-security-patch-day-november-2025/ Ivanti Endpoint Manager Updates https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2025-for-EPM-2024?language=en_US
Send us a textMeet Rapid7's Deral Heiland—a self-described “visual historian” who balances high-tech research with hands-on artifacts from Roman coins to Civil War relics
Send us a text
Cipher Brief CEO & Publisher Suzanne Kelly talks with two former directors of the National Security Agency and former Commanders of U.S. Cyber Command about the cyber threat from China, and just what they think Americans need to know. Retired General Tim Haugh – a new Cipher Brief Expert, spoke recently about the threat with 60 Minutes. He is now also working with investors and teaching at Yale University. And retired General Paul Nakasone is the founding director of the Institute for National Security at Vanderbilt University. Both men have a serious warning for America.
Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard: https://mastercard.us/en-us.html
From Wall Street to Main Street, the latest on the markets and what it means for your money. Updated regularly on weekdays, featuring CNBC expert analysis and sound from top business newsmakers. Anchored by CNBC's Jessica Ettinger. Hosted by Simplecast, an AdsWizz company. See https://pcm.adswizz.com for information about our collection and use of personal data for advertising.
If you like what you hear, please subscribe, leave us a review and tell a friend!
"Avec l'IA, on a un multiplicateur de puissance, mais il faut garder une approche structurée et prudente." Le D.E.V. de la semaine est Benoît Larroque, CTO chez Konvu. Avec l'IA, la cybersécurité est entrée dans une nouvelle dimension où la détection et la correction des vulnérabilités peuvent enfin rattraper le rythme effréné de leur apparition. Benoît détaille comment l'intelligence artificielle permet de filtrer et prioriser efficacement les failles, tout en rappelant l'exigence cruciale de vérifications humaines pour éviter les faux positifs. Il insiste sur le feedback continu et la vigilance indispensable face à la rapidité des évolutions. Un échange lucide sur les apports réels et les nouvelles limites de la cyber à l'ère de l'IA.Chapitrages00:00:53 : Introduction à la Cybersécurité00:01:17 : L'Impact de l'IA sur la Cybersécurité00:02:51 : Avant l'IA : Une Autre Époque00:05:01 : Transformation grâce à l'IA00:05:55 : Humanisation du Processus00:07:01 : Simplification des Tâches00:08:45 : La Gestion des Vulnérabilités00:11:06 : Analyse des Composants Logiciels00:12:29 : La Complexité des Mises à Jour00:13:56 : Approche de Validation Manuelle00:17:30 : Détection des Vulnérabilités par l'IA00:20:53 : Nouvelles Méthodes d'Attaque00:25:33 : Gestion des Risques de Sécurité00:29:26 : Optimisation de l'Effort de Sécurité00:36:08 : L'utilisation des LLM00:43:52 : SAST et Prompt Injection00:49:45 : Recommandations de Lecture00:50:11 : Conclusion et Remerciements Liens évoqués pendant l'émission Designing Data Intensive ApplicationsRelease It! **Restez compliant !** Cet épisode est soutenu par Vanta, la plateforme de Trust Management qui aide les entreprises à automatiser leur sécurité et leur conformité. Avec Vanta, se mettre en conformité avec des standards comme SOC 2, ISO 27001 ou HIPAA devient plus rapide, plus simple, et surtout durable. Plus de 10 000 entreprises dans le monde utilisent déjà Vanta pour transformer leurs obligations de sécurité en véritable moteur de croissance.
We speak with Deepen Desai, Chief Security Officer & Executive Vice President of Cyber & AI Engineering at Zscaler on the latest zero trust and AI innovations empowering organisations to secure their digital transformation journeys and stay ahead of evolving threats.With nearly two decades of expertise in cybersecurity, Deepen is regarded as a pioneer in advancing threat intelligence, secure product development, and enterprise protection. Beyond his scope of leading cyber and AI engineering, Deepen also oversees the ThreatLabz team, a world-class security research group focused on identifying emerging threats, analyzing vulnerabilities, and delivering actionable insights to protect organizations at Zscaler. Under his leadership, Zscaler's award-winning zero-trust architecture continues to evolve, providing businesses with robust defenses against sophisticated attack vectors like ransomware, phishing, and advanced malware.Before joining Zscaler, Deepen held key security leadership positions at Dell SonicWALL, where he helped develop cutting-edge security solutions and strategies for businesses navigating an increasingly complex threat landscape. His breadth of experience in fields like security operations, threat research, and compliance has established him as a respected authority in the industry.#ZL2025 #zerotrustsecurity #mysecuritytv #zscaler
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
It isn t always defaults: Scans for 3CX Usernames Our honeypots detected scans for usernames that may be related to 3CX business phone systems https://isc.sans.edu/diary/It%20isn%27t%20always%20defaults%3A%20Scans%20for%203CX%20usernames/32464 Watchguard Default Password Controversy A CVE number was assigned to a default password commonly used in Watchguard products. This was a documented username and password that was recently removed in a firmware upgrade. https://github.com/cyberbyte000/CVE-2025-59396/blob/main/CVE-2025-59396.txt https://nvd.nist.gov/vuln/detail/CVE-2025-59396 JavaScript expr-eval Vulnerability The JavaScript expr-eval library was vulnerable to a code execution issue. https://www.kb.cert.org/vuls/id/263614
Send us a textFormer Army veteran and cybersecurity strategist Nia Luckey joins Joey Pinz Conversations live at Cyber Bay 2025 to explore how calm, creativity, and courage intersect in today's fast-moving digital world.From 13 years in the U.S. Army to leading major security operations for Cisco, JSOC, and AT&T, Nia reveals how adaptability, humility, and trust fuel progress in both tech and life. She reflects on her TEDx Sugar Creek journey, turning raw burnout into a message that now inspires thousands.We dive into:1️⃣ How her military mindset evolved into collaborative cybersecurity leadership2️⃣ Why AI and quantum bring both opportunity and risk3️⃣ The life lessons behind her motto — “Choose your hard.”Nia reminds us that real success starts with stillness, service, and consistent action — whether hiking mountain peaks or leading global security teams.
Fraudology is presented by Sardine. Request a 1:! product demo at sardine.ai In this episode of Fraudology, host Karisse Hendrick unpacks a wave of major fraud news and security trends. From the execution sentences of Myanmar's scam compound kingpins and Starlink's device crackdown, to Singapore's $150 million asset freeze targeting the Prince Group, Hendrick explores both the progress and the persistence of global fraud operations.She also highlights new U.S. fraud schemes impersonating federal agents, the identity theft of Titans quarterback Cam Ward, and serious cybersecurity warnings about AI browsers' vulnerabilities. With ransomware payments falling and identity attacks surging, Hendrick reflects on how AI will increasingly shape both sides of the fight against fraud.Fraudology is hosted by Karisse Hendrick, a fraud fighter with decades of experience advising hundreds of the biggest ecommerce companies in the world on fraud, chargebacks, and other forms of abuse impacting a company's bottom line. Connect with her on LinkedIn She brings her experience, expertise, and extensive network of experts to this podcast weekly, on Tuesdays.
In this episode of Resilient Cyber, I sit down with Kamal Shah, Cofounder and CEO at Prophet Security, to discuss the State of AI in SecOps. There continues to be a tremendous amount of excitement and investment in the industry around AI and cybersecurity, with Security Operations (SecOps) arguably seeing the most investment among the various cybersecurity categories.Kamal and I will walk through the actual state of AI in SecOps, how AI is impacting the future of the SOC, what hype vs. reality is, and much more.
Cyber insurance is meant to provide assurance when incidents occur—but too often, organizations face confusion, denied claims, and unclear coverage. Attorney and cybersecurity expert, Matt Silverman, joins Zach and Lauro to break down why cyber policies are so complex, how evolving threats are outpacing the insurance industry, and what companies can do to navigate this uncertain landscape better.Connect with Matt Silverman: https://www.linkedin.com/in/mdsilverman/Learn more about AIB Partners: https://www.aib-partners.comPick up your copy of Cyber Rants on Amazon.Looking to take your Cyber Security to the next level? Visit us at www.silentsector.com. Be sure to rate the podcast, leave us a review, and subscribe!
Got a question or comment? Message us here!In this episode, we break down the real mechanics of social engineering, from phishing emails and text scams to vishing calls and full-on physical pen tests. We share stories from the field, including how attackers build trust, why confidence is often more effective than technical skill, and what happens when social engineering meets the physical world. If you've ever wondered how someone can just walk right in and blend into a company they don't work for… this one's for you. Support the showWatch full episodes at youtube.com/@aliascybersecurity.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.
If you like what you hear, please subscribe, leave us a review and tell a friend!
Happy Veterans Day! In this episode of the Other Side of the Firewall podcast, host Ryan Williams Sr. interviews Bryce Englin, a retired Air Force veteran with extensive experience in IT and project management. They discuss the transition from military to civilian leadership, the importance of feedback and mentorship, and the challenges facing the IT and cybersecurity sectors today. Bryce emphasizes the need for organizations to empower their employees, build trust, and recognize individual contributions. The conversation also touches on the future of IT education, the role of certifications, and the significance of cybersecurity in a global context. Buy the guide: https://www.theothersideofthefirewall.com/ Please LISTEN
Internal data leaks from another Chinese security firm, a US Congressional Budget Office breach has not been contained, the Cyber infosharing act likely to be extended until January, and we have a new OWASP Top 10. Show notes Risky Bulletin: Another Chinese security firm has its data leaked
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Honeypot Requests for Code Repository Attackers continue to scan websites for source code repositories. Keep your repositories outside your document root and proactively scan your own sites. https://isc.sans.edu/diary/Honeypot%3A%20Requests%20for%20%28Code%29%20Repositories/32460 Malicious NuGet Packages Deliver Time-Delayed Destructive Payloads Newly discovered malicious .NET packages attempt to deliver a time-delayed attack targeting ICS systems. https://socket.dev/blog/9-malicious-nuget-packages-deliver-time-delayed-destructive-payloads Side Channel Leaks in Encrypted Traffic to LLMs Traffic to LLMs can be profiled to discover the nature of prompts sent by a user based on the amount and structure of the encrypted data. https://www.microsoft.com/en-us/security/blog/2025/11/07/whisper-leak-a-novel-side-channel-cyberattack-on-remote-language-models/
Stop data brokers from exposing your personal information. Go to my sponsor https://aura.com/matt to get a 14-day free trial and see how much of yours is being sold John Boseak is a notorious cyber criminal & the most prolific manufacturer of counterfeit credit cards in the international cyber crime industry. Johns Channel https://www.youtube.com/boseakconundrum
Send us a textIn this episode of Serious Privacy, Ralph O'Brien and Dr. K Royal discuss the weekly news, including the Google settlement in Texas, ClearviewAI and much more. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
Ars Technica reported that Meta will soon be using AI interactions to personalize content and ad recommendations without giving users a way to opt out. In this episode, host Amanda Glassner is joined by Heather Engel, Managing Partner at Strategic Cyber Partners, to discuss. To learn more about today's stories, visit https://cybercrimewire.com • For more on cybersecurity, visit us at https://cybersecurityventures.com.
Chris Rock is a cyber mercenary who has worked in the Middle East, US and Asia for the last 30 years, working for both government and private organizations. He is the Chief Information Security Officer and co-founder of SIEMonster. In this episode, Rock joins host Heather Engel to discuss his book, "The Baby Harvest," which sheds light on how criminals are making and raising virtual babies to adulthood to be put on the shelf for money laundering, fraud and drug and firearm importation. • For more on cybersecurity, visit us at https://cybersecurityventures.com
This episode proves that nothing gold can stay, especially your 401k, as we kick things off with the revelation that October saw the worst tech layoffs since 2003, all while "Big Short" genius Michael Burry decided to bet a billion dollars on the inevitable AI bubble bursting. The villains of the week are legion: the FCC is officially making it easier for internet companies to charge us even more hidden fees; Elon Musk not only got his $1 trillion pay package approved—despite Tesla sales collapsing nearly 90% in some countries—but he also teased a flying car, clearly living in his own "Golden Dome" fantasy, which the Pentagon is happily subsidizing; and in a stunning display of entitlement, Mark Zuckerberg opened an illegal school, which is somehow less shocking than Meta's claim that their massive porn stash was purely for "personal use," not AI training. The bad news doesn't stop there, with Texas suing Roblox over 'pixel pedophiles,' though at least a rural Michigan healthcare system is doing some good by using drones to improve care.Jumping over to Media Candy, since we're all emotionally scarred by the sheer awful-ness of The Witcher S4—a season so bad it "broke" The Critical Drinker—we need some comfort viewing. We're deep-diving into the political chess of The Diplomat and escaping into the sheer volume of competitive cooking shows, including the standard Halloween and Holiday Baking Championships, plus the delightfully ridiculous Harry Potter: Wizards of Baking S2; we also took a look at Pluribus, Knife Edge, Black Rabbit, and the trailer for Tron: Ares, while cheering the fact that Brendan Fraser and Rachel Weisz are set to revive The Mummy franchise for a fourth film. In Apps & Doodads, we're all mourning the eventual death of simple, good tech as we're warned to enjoy Apple CarPlay while we still can, but at least the Lego ‘Star Trek' Set is finally here for our inner child; the real question, though, is why Automattic Inc. thinks they can claim ownership of the actual word 'Automatic.'Finally, The Dark Side with Dave Bittner reminds us that everything old is new again and ripe for monetization, whether it's Miss Piggy potentially bringing back The Muppets to the movies or the sleek, blacked-out remake of the Commodore 64, not to mention that cool Tron Arcade Cabinet Miniature Model. However, the present is still a complete dumpster fire: a Google AI model allegedly accused a senator of sexual assault, and internal documents show that Meta is earning a fortune on a massive deluge of fraudulent ads, proving that the only thing getting healthier is our paranoia, though Dave did throw in a curveball with some special jar lids and seeds for growing organic sprouts. We finish, as always, with the obligatory Closing Shout-Outs because even cynical geeks need validation.Sponsors:MasterClass - Get an additional 15% off any annual membership at MASTERCLASS.com/GRUMPYOLDGEEKSGusto - Try Gusto today at gusto.com/grumpy, and get three months free when you run your first payroll.Private Internet Access - Go to GOG.Show/vpn and sign up today. For a limited time only, you can get OUR favorite VPN for as little as $2.03 a month.SetApp - With a single monthly subscription you get 240+ apps for your Mac. Go to SetApp and get started today!!!1Password - Get a great deal on the only password manager recommended by Grumpy Old Geeks! gog.show/1passwordShow notes at https://gog.show/721FOLLOW UPOctober Layoffs Were the Worst Since 2003 and Hit Tech Workers HardIN THE NEWSThe Big Short Guy Just Bet $1 Billion That the AI Bubble PopsTrump's FCC is officially moving to make it easier for internet companies to charge hidden feesPentagon will reportedly award SpaceX a $2 billion contract to help develop the 'Golden Dome'Elon Musk teases a flying car on Joe Rogan's showTesla's Sales Collapsed Nearly 90 Percent in Some Countries Last MonthTesla shareholder meeting updates: Elon Musk gets his $1 trillion pay packageTexas AG sues Roblox, accusing it of prioritizing 'pixel pedophiles' over child safetyMark Zuckerberg Opened an Illegal School at His Palo Alto Compound. His Neighbors RevoltedMeta Says Porn Stash was for ‘Personal Use,' Not Training AI ModelsHow a rural Michigan healthcare system is using drones to improve careMEDIA CANDYThe DiplomatHalloween Baking ChampionshipHoliday Baking ChampionshipHarry Potter: Wizards of Baking S2PluribusKnife Edge: Chasing Michelin StarsBlack RabbitTron: AresThe Witcher S4The Witcher Season 4 - A Show So Awful, It Broke Me by The Critical DrinkerBrendan Fraser, Rachel Weisz Set to Revive The Mummy Franchise with Fourth FilmAPPS & DOODADSEnjoy CarPlay While You Still CanThe Lego ‘Star Trek' Set Is Here, and It's Exactly What You WantAutomattic Inc. Claims It Owns the Word 'Automatic'THE DARK SIDE WITH DAVEDave BittnerThe CyberWireHacking HumansCaveatControl LoopOnly Malware in the BuildingMiss Piggy May Bring ‘The Muppets' Back to the MoviesRelive the Commodore 64's glory days with a slimmer, blacked-out remakeShow and Tell: Tron Arcade Cabinet Miniature ModelGoogle removes AI model after it allegedly accused a senator of sexual assaultSprouting Jar Lid (32oz Glass Jars) with 4 Pack Stainless Steel Sprouting Stands for Wide and Wide Mouth Mason Jar for Growing Organic Sprouts, Stainless Steel, 4 PackOrganic Radish Sprout Seeds (16 oz) – Non-GMO, Heirloom Seeds for Sprouting and MicrogreensMeta is earning a fortune on a deluge of fraudulent ads, documents showSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary] Windows, with PowerShell, has a great scripting platform to match common Linux/Unix command line utilities. https://isc.sans.edu/diary/Binary%20Breadcrumbs%3A%20Correlating%20Malware%20Samples%20with%20Honeypot%20Logs%20Using%20PowerShell%20%5BGuest%20Diary%5D/32454 RondoDox v2 Increases Exploits The RondoDox (or RondoWorm) added a substantial amount of new exploits to its repertoire. https://beelzebub.ai/blog/rondo-dox-v2/ Google Chrome Updates Google released an update for Google Chrome addressing five vulnerabilities. https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop.html Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities Cisco patched two critical vulnerabilities in its Contact Center Express software. These vulnerabilities may lead to a full system compromise. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-unauth-rce-QeN8h7mQ
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing Vulnerabilities Checkpoint released details about recently patched spoofing and impersonation vulnerabilities in Microsoft Teams https://research.checkpoint.com/2025/microsoft-teams-impersonation-and-spoofing-vulnerabilities-exposed/ NViso Report: VSHELL NViso published an amazingly detailed report describing the remote control implant VSHELL. The report includes details about the inner workings of the tool as well as detection ideas. https://www.nviso.eu/blog/nviso-analyzes-vshell-post-exploitation-tool