Podcasts about Cyber

  • 8,720PODCASTS
  • 33,837EPISODES
  • 35mAVG DURATION
  • 6DAILY NEW EPISODES
  • Jan 22, 2026LATEST

POPULARITY

20192020202120222023202420252026

Categories




    Best podcasts about Cyber

    Show all podcasts related to cyber

    Latest podcast episodes about Cyber

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Thursday, January 22nd, 2026: Visual Studio Code Scripts; Cisco Unified Comm and Zoom Vuln; Insufficient Fortinet Patch; SANS SOC Survey

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Jan 22, 2026 6:33


    Automatic Script Execution In Visual Studio Code Visual Studio Code will read configuration files within the source code that may lead to code execution. https://isc.sans.edu/diary/Automatic%20Script%20Execution%20In%20Visual%20Studio%20Code/32644 Cisco Unified Communications Products Remote Code Execution Vulnerability A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b Zoom Vulnerability A Command Injection vulnerability in Zoom Node Multimedia Routers (MMRs) before version 5.2.1716.0 may allow a meeting participant to execute remote code on the MMR via network access. https://www.zoom.com/en/trust/security-bulletin/zsb-26001/ Possible new SSO Exploit (CVE-2025-59718) on 7.4.9 https://www.reddit.com/r/fortinet/comments/1qibdcb/possible_new_sso_exploit_cve202559718_on_749/ SANS SOC Survey The 2026 SOC Survey is open, and we need your input to create a meaningful report. Please share your experience so we can advocate for what actually works in the trenches. https://survey.sans.org/jfe/form/SV_3ViqWZgWnfQAzkO?is=socsurveystormcenter

    Hacker And The Fed
    Inside China's Leaking Cyber Machine

    Hacker And The Fed

    Play Episode Listen Later Jan 22, 2026 43:21


    Chris and Hector unpack new signs of internal strain inside China's cyber ecosystem. From leaked intelligence and exposed tools to China cutting off Western security technology, they explore what happens when a tightly controlled cyber machine starts showing cracks. Join our Patreon for weekly bonus episodes: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.patreon.com/c/hackerandthefed⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Send HATF your questions at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠questions@hackerandthefed.com

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Wednesday, January 21st, 2026: Punycode Hunting; telnetd vuln; 6 day Certs and IP Certs; Oracle Patches

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Jan 21, 2026 6:44


    Add Punycode to your Threat Hunting Routine Punycode patterns in DNS queries make excellent hunting opportunities. https://isc.sans.edu/diary/Add%20Punycode%20to%20your%20Threat%20Hunting%20Routine/32640 GNU InetUtils Security Advisory: remote authentication by-pass intelnetd telnetd shipping with InetUtils suffers from a critical authentication by-pass vulnerability. https://www.openwall.com/lists/oss-security/2026/01/20/2 6-day and IP Address Certificates are Generally Available Let s Encrypt will now offer 6-day certificates as an option. These short-lived certificates can be used for IP addresses. https://letsencrypt.org/2026/01/15/6day-and-ip-general-availability Oracle Quarterly Critical Patch Update Oracle released its first quarterly patches for 2026, fixing 337 vulnerabilities https://www.oracle.com/security-alerts/cpujan2026.html#AppendixFMW

    Joey Pinz Discipline Conversations
    #805 MSSP Alert Live - Tony Pietrocola:

    Joey Pinz Discipline Conversations

    Play Episode Listen Later Jan 21, 2026 30:30


    Send us a textIn this high-energy and entertaining episode, Joey Pinz sits down with cybersecurity founder and unabashed Italian-American storyteller Tony Pietrocola. From stomping grapes as a child to running an AI-driven security operations platform, Tony brings a rare blend of toughness, humor, and entrepreneurial clarity.They jump from wine, cooking, and massive NFL bodies to college football, concussions, and how elite athletes are built differently. Tony shares what makes college football the real American spectacle—and why private equity is about to reshape the sport.On the cybersecurity front, Tony breaks down the challenges MSPs face, why most still struggle with security, and how AgileBlue helps them build profitable, white-label practices without the overhead of running a SOC. He explains the three questions every MSP should ask a vendor, the rise of AI-assisted attacks, and why consolidation and greenfield opportunities are the biggest missed revenue streams.The conversation ends with health, habit, and personal transformation—discussing Joey's 130-lb weight loss, Tony's daily 5 a.m. workouts, and the childhood structure that forged their work ethic.

    Joey Pinz Discipline Conversations
    #806 MSSP Alert Live - Caroline Wong:

    Joey Pinz Discipline Conversations

    Play Episode Listen Later Jan 21, 2026 43:25


    Send us a textIn this captivating and wide-ranging conversation, Joey Pinz welcomes cybersecurity executive, author, and Brazilian jiu-jitsu enthusiast Caroline Wong. What begins with jiu-jitsu quickly expands into a profound dialogue about humility, body awareness, emotional regulation, and the unexpected personal growth that comes from combat sports—especially as an adult beginner.Caroline opens up about her upcoming book on AI and cybersecurity, explaining how AI isn't just another shift—it's redefining the entire security landscape. She outlines how to evaluate real AI solutions, why transparency matters, and how LLMs make modern social engineering nearly indistinguishable from authentic communication.She also reflects on tech's wobbly job market, why global talent has reshaped the industry, and which cybersecurity markets AI will completely replace in the years ahead. The conversation deepens as Caroline shares her journey through sobriety, the discipline instilled by her Chinese immigrant parents, the challenges of raising resilient kids in a privileged world, and why joy, peace, and positive impact—not titles—define success.

    Joey Pinz Discipline Conversations
    #803 MSSP Alert Live - ChiChi Ubah:

    Joey Pinz Discipline Conversations

    Play Episode Listen Later Jan 21, 2026 35:19


    Send us a textIn this energizing and uplifting conversation, Joey Pinz sits down with cybersecurity rising star ChiChi Ubah, whose passion for learning, adventure, and personal growth lights up every moment of the dialogue. ChiChi shares her love for adrenaline-filled activities, her ambitions to learn to fly a small aircraft, and the mindset that fuels her ongoing pursuit of new experiences—including her PhD focused on AI-driven cybersecurity curriculum development.A dedicated advocate for women in cybersecurity, ChiChi discusses the life-changing support she's received from WiCyS, where mentorship, training, and certifications helped guide her path into cloud security. She reflects on the role of representation, allies, and community in creating opportunities for women in a male-dominated industry.The conversation also explores breaking old beliefs, embracing intentionality, and the everyday practice of consistency—whether pursuing certifications, maintaining health, or building a TikTok channel from 0 to 5,000 followers. ChiChi also opens up about motivation, legacy, and redefining success through freedom, impact, and personal evolution.This episode is packed with insight, heart, humor, and the fearless drive of someone committed to becoming better every day.

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Tuesday, January 20th, 2026: Scans Against LLMs; NTLM Rainbow Table; OOB MSFT Patch

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Jan 20, 2026 6:00


    "How many states are there in the United States?" Attackers are actively scanning for LLMs, fingerprinting them using the query How many states are there in the United States? . https://isc.sans.edu/diary/%22How%20many%20states%20are%20there%20in%20the%20United%20States%3F%22/32618 Closing the Door on Net-NTLMv1: Releasing Rainbow Tables to Accelerate Protocol Deprecation Mandiant is publicly releasing a comprehensive dataset of Net-NTLMv1 rainbow tables to underscore the urgency of migrating away from this outdated protocol. https://cloud.google.com/blog/topics/threat-intelligence/net-ntlmv1-deprecation-rainbow-tables Out-of-band update to address issues observed with the January 2026 Windows security update Microsoft has identified issues upon installing the January 2026 Windows security update. To address these issues, an out-of-band (OOB) update was released today, January 17, 2026 https://learn.microsoft.com/en-us/windows/release-health/windows-message-center

    InvestTalk
    The "Cyber" Supercycle: The New Utility

    InvestTalk

    Play Episode Listen Later Jan 17, 2026 44:59 Transcription Available


    As geopolitical tensions rise, digital warfare has become the new front line. We will discuss why Cybersecurity stocks are becoming the "Utilities" of the 2026 economy—providing essential, recession-proof revenue.Today's Stocks & Topics: Skyworks Solutions, Inc. (SWKS), Market Wrap, KPP Newsletter, Call Options ETFs, Buying Physical Silver, ATI Inc. (ATI), Key Benchmark Numbers: Treasury Yields, Gold, Silver, Oil and Gasoline, “The "Cyber" Supercycle: The New Utility”, Southern Copper Corporation (SCCO), Kraken Robotics Inc. (PNG.V), Broadcom Inc. (AVGO), Kratos Defense & Security Solutions, Inc. (KTOS), New Warning from Pimco.Our Sponsors:* Check out ClickUp and use my code INVEST for a great deal: https://www.clickup.com* Check out Invest529: https://www.invest529.com* Check out Progressive: https://www.progressive.comAdvertising Inquiries: https://redcircle.com/brands

    Grumpy Old Geeks
    729: Alright Alright Alright™

    Grumpy Old Geeks

    Play Episode Listen Later Jan 16, 2026 84:25


    We kick things off with the existential dread of FOLLOW UP and the absolute joy of jury duty. While xAI's Grok is busy getting banned in Malaysia and Indonesia for its CSAM-generating "features," the Senate is unanimously passing the DEFIANCE Act to give us some legal teeth against the deepfake machine. Meta is busy nuking 550,000 Australian accounts to appease regulators, while Roblox's age verification is so broken that a drawing of stubble or a photo of Kurt Cobain can get you into the adult lounge. Moving IN THE NEWS, Meta is trading its $70 billion Metaverse graveyard for a Reality Labs layoff and a pivot to AI hardware, fueled by an "AI infrastructure" buildout that's hiring former Trump advisors. Bandcamp is heroically banning AI "slop," Matthew McConaughey is trademarking his own face to fend off the bots, and ICE's AI hiring tool is such a disaster it's accidentally fast-tracking mall security as "officers." Between self-help gurus charging $99 for chatbot "advice," GM finally settling its driver-spying suit with the FTC, and NASA prepping for a February moon shot while China plans to launch 200,000 satellites into our already crowded orbit, the future looks exactly as messy as we expected.For MEDIA CANDY, we've got Lord of the Rings marathons, the diner-bridge of Starfleet Academy, and the usual joy of streaming price hikes hitting our "Premium" plans. We're tracking the 2025 "In Memoriam" and Gabriel Pagan's exhaustive movie list before sliding into APPS & DOODADS. Jony Ive and Sam Altman are reportedly building an hearing aide called "Sweetpea" to kill your AirPods, Siri is officially Google Gemini's new puppet, and Apple is finally bundling its creative apps into a "Creator Studio" subscription trap. Tesla is making Full Self-Driving a subscription-only Valentine's gift (good luck with that), Ring is rebranding surveillance as a "fire-watching" assistant, and a Chinese app called "Are You Dead?" is the new must-have for the lonely. To cap it off, the internet proved its maturity by using "Words.zip"—an infinite word-search grid—to draw a giant phallus, because of course they did.AT THE LIBRARY features the Anthony Bourdain Reader, the return of Bob in the new Laundry Files book, and Jimmy Carr's guide to happiness, which is apparently cheaper than therapy. Then we descend into THE DARK SIDE WITH DAVE, where the dishwasher-installing, ham-radio-lunching Dave Bittner reveals Disney World has job openings for those of us who spent high school in the AV club. Lucasfilm is finally entering a new era as Kathleen Kennedy steps down, just as Galaxy's Edge admits the original trilogy exists, and we wrap it all up with lock-picking kits and the terrifying realization that Seymour from H.R. Pufnstuf is the ultimate Gen-X fursona.Sponsors:DeleteMe - Get 20% off your DeleteMe plan when you go to JoinDeleteMe.com/GOG and use promo code GOG at checkout.Gusto - Try Gusto today at gusto.com/grumpy, and get three months free when you run your first payroll.Private Internet Access - Go to GOG.Show/vpn and sign up today. For a limited time only, you can get OUR favorite VPN for as little as $2.03 a month.SetApp - With a single monthly subscription you get 240+ apps for your Mac. Go to SetApp and get started today!!!1Password - Get a great deal on the only password manager recommended by Grumpy Old Geeks! gog.show/1passwordShow notes at https://gog.show/729Watch on YouTube! https://youtu.be/1Y1jnRDw7g0FOLLOW UPMalaysia and Indonesia are the first to block Grok following CSAM scandalSenate passes Defiance Act for a second time to address Grok deepfakesMeta closes 550,000 accounts to comply with Australia's kids social media banRoblox's age verification system is reportedly a trainwreckIN THE NEWSMeta refocuses on AI hardware as metaverse layoffs beginMeta's Layoffs Leave Supernatural Fitness Users in MourningMeta Creates High-Powered Team to Oversee AI Infrastructure BuildoutBandcamp prohibits music made ‘wholly or in substantial part' by AIMatthew McConaughey fights unauthorized AI likenesses by trademarking himselfICE's AI Tool Has Been a Complete DisasterSelf-Help Ghouls Are Charging People Absurd Prices to Talk to Impersonator ChatbotsThe FTC's data-sharing order against GM is finally settledNASA is ending Crew-11 astronauts' mission a month earlyNASA makes final preparations for its first crewed moon mission in over 50 yearsAs SpaceX Works Toward 50K Starlink Satellites, China Eyes Deploying 200KMEDIA CANDYBeast Games Season 2Star Trek: Starfleet AcademyGrumpy Old ListThe Ongoing History of New Music, episode 1069: 2025 in MemoriamDepeche Mode: MAPPS & DOODADSJony Ive and Sam Altman's First AI Gadget May Try to Kill AirPodsApple's Siri AI will be powered by GeminiApple's Mac and iPad creative apps get bundled into “Creator Studio” subscriptionTesla's Full Self-Driving is switching to a subscription-only serviceRing founder details the camera company's 'intelligent assistant' eraAre You Dead?: The viral Chinese app for young people living aloneGive the Internet an Infinite Word Search and the Internet Will Draw a Dick on ItAT THE LIBRARYThe Anthony Bourdain Reader: New, Classic, and Rediscovered Writing by Anthony BourdainObvious Adams: The Story of a Successful Businessman by Robert UpdegraffBefore & Laughter by Jimmy CarrThe Regicide Report (Laundry Files, 14) by Charles StrossTHE DARK SIDE WITH DAVEDave BittnerThe CyberWireHacking HumansCaveatControl LoopOnly Malware in the BuildingHow to Read a Book: A Novel by Monica WoodWalt Disney World Resort is looking for Entertainment Stage TechniciansGalaxy's Edge Will Soon Cover All Eras of ‘Star Wars'Kathleen Kennedy steps down as Lucasfilm president, marking a new era for the Star Wars franchiseSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Friday, January 16th, 2026: Cryptojacking Hidden Gifts; Bluetooth Vulnerability; Reprompt in MSFT Copilot

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Jan 16, 2026 7:29


    Battling Cryptojacking, Botnets, and IABs Cryptojacking often comes with less obvious addons, like SSH backdoors https://isc.sans.edu/diary/Battling%20Cryptojacking%2C%20Botnets%2C%20and%20IABs%20%5BGuest%20Diary%5D/32632 Microsoft Copilot Reprompt Attacks Adding a query parameter to the URL may prefill a Copilot prompt, altering the meaning of the prompts that follow. https://www.varonis.com/blog/reprompt Hijacking Bluetooth Accessories Using Google Fast Pair Google s fast pair protocol is often not implemented correctly, allowing the Hijacking of Bluetooth accessories https://whisperpair.eu/#about

    Cyber Briefing
    January 16, 2026 - Cyber Briefing

    Cyber Briefing

    Play Episode Listen Later Jan 16, 2026 9:12


    If you like what you hear, please subscribe, leave us a review and tell a friend!

    一席英语·脱口秀:老外来了
    Z世代的流行热词,你能看懂几个?

    一席英语·脱口秀:老外来了

    Play Episode Listen Later Jan 16, 2026 10:57


    主播:Meimei(中国)+ Maelle(法国) 音乐:Pink Skies当下,Z世代热词(Gen Z slang)在Instagram、TikTok等社交平台迅速走红(on fire),许多新奇表达不断涌现,这些热词还逐渐成为人们日常交流的常用语。今天我们就来聊一聊Z世代的流行热词(popular slang)。01. Online Slang 线上俚语1)Cyber pickle 电子榨菜Cyber pickle就是在我们大脑需要放松(a mental break)的时候刷(scroll through)的电子内容。Cyber:赛博,与互联网相关的。 Pickle:美式腌黄瓜,是外国人的下饭榨菜。所以,如果有人说:“My go-to cyber pickle is crime shows.”这就意味着犯罪题材的剧(crime show)是他最爱刷的“电子榨菜”。��两位主播的cyber pickle是什么呢?For Meimei:Korean dating show (韩国恋爱综艺) is her cyber pickle. For Maelle:她并没有一个特定的cyber pickle,因为她想try to be more intentional (专注的)。She wants to focus on chewing (咀嚼) her food when she eats. 2)Snatched 迷人的,有魅力的例如:“She looks snatched.”意思就是:“She looks amazing!”Like her outfit (服装), makeup (妆容), everything is on point (一切都恰到好处).除此之外,snatched本身也有“身材紧致有型”的意思,跟stunning有点像,同样表示“状态在线、颜值超高”。所以想要夸一个人的身材或者颜值,就可以说:“You look snatched today!”“Snatched” is very much a compliment (赞美). 当别人posts a nice outfit picture(发布了一张漂亮的穿搭照片),也可以用到“snatched”这个单词。例如:“I love your outfit! You look snatched!”3)Doomscrolling 阴暗刷屏(指在社交网络上频繁浏览负面、消极的信息)Doom:末日、厄运Scroll:滚动,上下滑动屏幕Doomscrolling means endlessly (不断地) scrolling through bad or stressful (让人有压力的) content. 例如:坏消息(bad news),戏剧(drama),或者是阴谋视频(conspiracy videos)。通俗易懂一些来讲,doomscrolling就是以一种“明明很焦虑还停不下来”的状态刷手机,而且刷的都是一些比较负能量的内容。That's awful.有时候社交媒体确实会吸引人们去做endless scrolling。People will become addicted to it (上瘾) and can't stop themselves. 大家知道这样做不好,但是有时还是会不由自主地fall into it。除此之外,doomscrolling也可以是一种夸张的表达。哪怕现在刷的不是负面内容,但是在手机上一刷就停不下来也可以说是doomscrolling。下次再有朋友在你旁边“疯狂”刷手机,你就可以说:“Talk to me! Stop doomscrolling!”02. Offline Slang 线下俚语1)Social suicide 社死Social:社交的Suicide:自我毁灭People use it when they do something super awkward or embarrassing (尴尬的) in public (在公众场合).例如:Wearing pajamas (睡衣) to a job interview (面试) is social suicide.2)Caught off guard 破防了It means something really surprised or shocked you.Guard:防备所以off guard就是“没有防备”。当你在没有防备的时候被抓到(get caught),就是中文里说的“破防了”。例如,你看到前任和别人订婚时,可能会说:“That really caught me off guard”。或者是你看到了一条shocking news,你可能会说:“This news caught me off guard!”3)Social butterfly 社牛A social butterfly is someone who loves going out, meeting people, and making friends everywhere. 这类人群像小蝴蝶一样在各种场合到处飞来飞去,非常形象。社牛们不会错过任何social occasions(社交场合),and they can talk to anyone.03. Crossover Slang 线上线下通用俚语1)Ghosting 不读不回不解释(玩消失)Ghost:鬼魂Ghosting:像鬼魂一样突然消失People use it when someone they were talking to — especially in dating (约会) — just stops replying (回复). 这有点像是“玩消失”,本来约会聊得好好的突然就联系不上了。例如:“I thought we had a great date... but then I got ghosted.”“我以为我们的约会很愉快,没想到我被玩消失了。”2)Okay boomer 行吧,老古董Boomer:婴儿潮一代,指的是1946-1964年之间出生的这一代人,现在属于中老年群体。所以叫一个人boomer其实就是在调侃对方的心态和行为太老派了。It's cheeky (调皮), but also a little sarcastic (讽刺).例如,你的朋友发表了一个老派的观点,你就可以说:“Okay boomer~”。3)Netflix and chill 浪漫轻松的氛围Netflix:网飞,美国最大的视频流媒之一。这个slang和约会有关。It can just mean hanging out (闲逛). 但通常情况下,它是暗示暧昧(flirty)或浪漫氛围(romantic vibe)的一种较为casual(随意)的表达方式。就像情侣之间约着一起看Netflix,其实更多的是在指浪漫放松的约会。如果你想和你爱的人一起约会,你就可以说:“Hey, do you want to Netflix and chill?”由于现在大部分年轻人的约会内容就是一起追剧吃饭,所以像Netflix这种巨头追剧媒体,久而久之也就成了约会的代名词。04. Why These Words Matter? 为什么这些俚语很重要呢?这些slang可以反映出年轻人的很多心理状态。例如:Show stress (压力):doomscrolling.Show confidence (自信):snatched, social butterfly.现在的年轻人更加关注自我的表达,用俚语调侃生活、连接彼此。That's why language evolves (进化) — to reflect how people feel and live.欢迎大家在评论区留言:Which slang word are you adding to your vocabulary today?你会把哪个俚语加入到你今天的词库呢?

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Thursday, January 15th, 2026: Luma Streal Repeat Infection; ServiceNow Broken Auth; Starlink/GPS Jamming

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Jan 15, 2026 6:10


    Infection repeatedly adds scheduled tasks and increases traffic to the same C2 domain https://isc.sans.edu/diary/Infection%20repeatedly%20adds%20scheduled%20tasks%20and%20increases%20traffic%20to%20the%20same%20C2%20domain/32628 BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNow https://appomni.com/ao-labs/bodysnatcher-agentic-ai-security-vulnerability-in-servicenow/ Starlink Terminal GPS Spoofing/Jamming Detection in Iran https://github.com/narimangharib/starlink-iran-gps-spoofing/blob/main/starlink-iran.md

    The Tech Blog Writer Podcast
    3555: Immersive on Why Incident Response Plans Break Down in Reality

    The Tech Blog Writer Podcast

    Play Episode Listen Later Jan 15, 2026 28:37


    What really happens inside an organization when a cyber incident hits and the neat incident response plan starts to fall apart? That question sat at the heart of my return conversation with Max Vetter, VP of Cyber at Immersive. It has been a big year for breaches, public fallout, and eye-watering financial losses, and this episode goes beyond headlines to examine what cyber crisis management actually looks like when pressure, uncertainty, and human behavior collide. Max brings a rare perspective shaped by years in law enforcement, intelligence work, and hands-on cyber defense, and he is refreshingly honest about where most organizations are still unprepared. We talked about why written incident response plans tend to fail at the exact moment they are needed most. Cyber incidents are chaotic, emotional, and non-linear, yet many plans assume calm decision-making and perfect coordination. Max explains why success or failure is often defined by the response rather than the initial breach itself, and why leadership, communication, and judgment matter just as much as technical skill. Real-world examples from major incidents highlight how competing pressures quickly emerge, whether to contain or keep systems running, whether to pay a ransom or risk prolonged downtime, and how every option comes with consequences. One idea that really stood out is Max's belief that resilience is revealed, not documented. Compliance and audits may tick boxes, but they rarely expose how teams behave under stress. We explored why organizations that rely on annual tabletop exercises often develop a false sense of confidence, and how that confidence can become dangerous when decisions are made quickly and publicly. Max shared why the best-performing teams are often the ones that feel less certain in the moment, because they question assumptions and adapt faster. We also dug into the growing role of crisis simulations and micro-drills. Rather than rehearsing a single scenario once a year, Immersive focuses on repeated, realistic practice that builds muscle memory across technical teams, executives, legal, and communications. The goal is not to predict the exact attack, but to train people to think clearly, collaborate across functions, and make defensible decisions when there are no good options. That preparation becomes even more important as cyber incidents increasingly spill into supply chains, manufacturing, and the physical world. As public scrutiny rises and consumer-led legal action becomes more common after breaches, reputation and response speed now sit alongside forensics and recovery as business-critical concerns. This episode is a candid look at why cyber crisis readiness is a discipline, not a document, and why assuming you will cope when the moment arrives is a risky bet. So if resilience only truly shows itself when everything is on the line, how confident are you that your organization would perform when the pressure is real and the clock is ticking? Useful Links Connect with Max Vetter on Linkedin Learn more about Immersive Labs Follow on LinkedIn, Instagram, Twitter and Facebook Thanks to our sponsors, Alcor, for supporting the show.

    Entendez-vous l'éco ?
    Assurer le risque cyber, un secteur en plein essor

    Entendez-vous l'éco ?

    Play Episode Listen Later Jan 15, 2026 5:51


    durée : 00:05:51 - Le Journal de l'éco - par : Anne-Laure Chouin - La multiplication des cyberattaques ces derniers mois oblige les entreprises à réfléchir à leur cybersécurité et à la manière de se protéger contre les conséquences et les coûts générés par ces attaques. Surtout si les clients qui y ont perdu leurs données personnelles demandent indemnisation !

    Telecom Reseller
    ROLM and USX Cyber Simplify CMMC Compliance for SMB Defense Contractors, Podcast

    Telecom Reseller

    Play Episode Listen Later Jan 15, 2026 19:19


    Doug Green, Publisher of Technology Reseller News, spoke with Mark A. Daley, CEO of ROLM, and Cole McKinley, CTO of USX Cyber, about the Department of Defense's phased enforcement of Cybersecurity Maturity Model Certification (CMMC) requirements and what it means for small and mid-sized businesses (SMBs) in the Defense Industrial Base. With CMMC now actively enforced, hundreds of thousands of subcontractors—many without dedicated security teams—must demonstrate compliance to continue working with prime contractors. Daley stressed the urgency of the moment, noting that delays are over. “The government is no longer kicking the can down the road,” he said. “CMMC exists to protect the defense industrial base, and SMBs are now squarely in scope.” To address this challenge, ROLM and USX Cyber have partnered on an integrated, SMB-focused platform built around USX Cyber's Guardian solution. McKinley explained that Guardian was designed to make compliance achievable without stitching together multiple tools. “We built Guardian to be a one-stop platform that makes CMMC approachable, affordable, and audit-ready for SMBs,” he said, adding that the platform satisfies 83 of the 110 required NIST 800-171 controls while providing 24×7 monitoring, evidence management, and guided compliance workflows. Daley highlighted that the solution goes beyond certification prep, combining continuous security operations, governance, and AI-driven automation to reduce long-term cost and complexity. “This is not a one-and-done, check-the-box exercise,” he said. “You have to be ready not just for today's audit, but for the one coming three years from now.” The discussion underscored why CMMC represents both a major risk and a significant opportunity for MSPs and channel partners serving regulated industries. Learn more at https://rolm.ai/ and https://usxcyber.com/.

    NachDenkSeiten – Die kritische Website
    Wieso unterzeichnet Innenminister Dobrindt „Cyber- und Sicherheitspakt“ mit Netanyahu und nennt Israel „Premiumpartner“?

    NachDenkSeiten – Die kritische Website

    Play Episode Listen Later Jan 15, 2026 15:00


    Bundesinnenminister Alexander Dobrindt hat den vom Internationalen Strafgerichtshof (IstGH) wegen „Kriegsverbrechen und Verbrechen gegen die Menschlichkeit” per internationalem Haftbefehl gesuchten israelischen Premier Benjamin Netanyahu in Jerusalem getroffen und dabei einen weitreichenden Cyber- und Sicherheitspakt unterzeichnet. In diesem Zusammenhang bezeichnete er Israel als „Premiumpartner“ Deutschlands. Die NachDenkSeiten wollten vor diesem Hintergrund unter anderem wissen, wie derWeiterlesen

    Cyber Briefing
    January 15, 2026 - Cyber Briefing

    Cyber Briefing

    Play Episode Listen Later Jan 15, 2026 9:12


    If you like what you hear, please subscribe, leave us a review and tell a friend!

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Wednesday, January 14th, 2026: Microsoft, Adobe and Fortinet Patches; ConsentFix

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Jan 14, 2026 7:58


    Microsoft Patch Tuesday January 2026 Microsoft released patches for 113 vulnerabilities. This includes one already exploited vulnerability, one that was made public before today and eight critical vulnerabilities. https://isc.sans.edu/diary/January%202026%20Microsoft%20Patch%20Tuesday%20Summary/32624 Adobe Patches Adobe released patches for five products. The code execution vulnerabilities in ColdFusion and Acrobat Reader deserve special attention. https://helpx.adobe.com/security.html Fortinet Patches Fortnet patched two products today, one suffering from an SSRF vulnerability. https://fortiguard.fortinet.com/psirt/FG-IR-25-783 https://fortiguard.fortinet.com/psirt/FG-IR-25-084 ConsentFix: Analysing a browser-native ClickFix-style attack that hijacks OAuth consent grants Attackers are tricking victims to copy/paste OAUTH URLs, including credentials, to a fake CAPTCHA https://pushsecurity.com/blog/consentfix

    Joey Pinz Discipline Conversations
    #799 MSSP Alert Live - Wilfredo Santiago: ⚡ Cracking Codes & Catching Threats: A Cyber Warrior's Journey

    Joey Pinz Discipline Conversations

    Play Episode Listen Later Jan 14, 2026 40:39


    Send us a textIn this powerful conversation, Joey Pinz sits down with cybersecurity leader and former Naval cryptologic specialist Wilfredo “Will” Santiago to explore the hidden world of modern cyber defense. From growing up in Washington State obsessed with Pokémon cards to serving in Naval intelligence and supporting special operations teams, Will shares how his early experiences, curiosity, and service shaped a career protecting organizations from today's most advanced digital threats.Will breaks down how signals intelligence, network analysis, and cryptology evolved into cybersecurity as we know it—and why the field feels like a high-stakes video game where the challenges never stop. He also dives into how AI is transforming both defense and cybercrime, why quantum compute will accelerate everything, and how MSPs can choose partners they can truly trust.Finally, Joey and Will explore the mindset required to thrive in high-pressure environments: routine, focus, and the ability to act even when you don't feel like it. This episode is packed with insight, humanity, and real-world wisdom.⭐ Top 3 Highlights•

    ChinaTalk
    Richard Danzig on Cyber and AI

    ChinaTalk

    Play Episode Listen Later Jan 14, 2026 104:16


    Richard Danzig, national treasure, joins the podcast to discuss the national security implications of AI in the cyber context. We discuss Richard's excellent paper on AI and cyber you can find here: https://www.rand.org/pubs/perspectives/PEA4079-1.html Teddy Collins cohosts. Thanks to Hudson for sponsoring this episode. Learn more about your ad choices. Visit megaphone.fm/adchoices

    ai cyber richard danzig
    Ouch: Disability Talk
    The "heartbreaking" decision on the stalled sign language GCSE

    Ouch: Disability Talk

    Play Episode Listen Later Jan 14, 2026 30:03


    There were celebrations last year when a GCSE in British Sign Language was approved...but a few months have passed and no accredited exam board has taken it on. What now for the exam which had a strong 10-year campaign behind it?Simon Wont from the National Deaf Children's Society gives his reaction while BBC journalist Katyeryna Pavlyuk talks us through it.Cyber correspondent Joe Tidy has been in California visiting humanoid robots built to carry out domestic tasks and considers how this development might help disabled people in the future.And the BBC's Alex Taylor is Emma's studio pal this week. He spills the tea on his new romantic relationship. Not only is he smitten but it's also given him pause for thought on letting her help with his care responsibilities so they can let his careworker go out for the night and leave them to some alone time.And finally. Just a heads up, we're moving to a monthly podcast from now on. Our next episode will be 4 February. Catch you then!Presented by Emma Tracey with Alex TaylorSound mixed by Dave O'NeillProduced by Katyeryna Pavlyuk and Alex CollinsSeries producer is Beth RoseEdited by Damon Rose

    7 Minute Leadership
    Episode 583 - The Cybersecurity Checklist for Leaders

    7 Minute Leadership

    Play Episode Listen Later Jan 14, 2026 13:21 Transcription Available


    Cybersecurity failures are leadership failures. This episode gives leaders a clear, practical cybersecurity checklist to reduce risk, close gaps, and lead digital safety with accountability and discipline. Cyber security subject matter expert Josh Gelman joins the conversation with Paul.Host: Paul FalavolitoConnect with me on your favorite platform: Facebook, Twitter, Instagram, TikTok, LinkedIn, Substack, BlueSky, Threads, LinkTree, YouTubeView my website for free leadership resources and exclusive merchandise: www.paulfalavolito.comBooks by Paul FalavolitoThe 7 Minute Leadership Handbook: bit.ly/48J8zFGThe Leadership Academy: https://bit.ly/4lnT1PfThe 7 Minute Leadership Survival Guide: https://bit.ly/4ij0g8yThe Leader's Book of Secrets: http://bit.ly/4oeGzCI

    ChinaEconTalk
    Richard Danzig on Cyber and AI

    ChinaEconTalk

    Play Episode Listen Later Jan 14, 2026 104:16


    Richard Danzig, national treasure, joins the podcast to discuss the national security implications of AI in the cyber context. Do note we conducted this interview in July of 2025. We discuss Richard's excellent paper on AI and cyber you can find here: https://www.rand.org/pubs/perspectives/PEA4079-1.html Teddy Collins cohosts. Thanks to Hudson for sponsoring this episode. Learn more about your ad choices. Visit megaphone.fm/adchoices

    ai cyber richard danzig
    Easy Prey
    Surviving a Ransomware Attack

    Easy Prey

    Play Episode Listen Later Jan 14, 2026 47:39


    A ransomware attack doesn't always announce itself with flashing warnings and locked screens. Sometimes it starts with a quiet system outage, a few unavailable servers, and a sinking realization days later that the threat actors were already inside. This conversation pulls back the curtain on what really happens when an organization believes it's dealing with routine failures only to discover it's facing a full-scale cyber extortion event. My guest today is Zachary Lewis, CIO and CISO for a Midwest university, a 40 Under 40 Business Leader, and a former Nonprofit CISO of the Year. Zachary shares the inside story of a LockBit ransomware attack that unfolded while his team was still building foundational security controls, forcing real-time decisions about recovery, disclosure, negotiations, and whether paying a ransom was even an option. We talk about the shame that keeps many cyber incidents hidden, the emotional weight leaders carry during these moments, and the practical realities that don't show up in tabletop exercises from buying bitcoin to restoring systems when password managers are encrypted. It's an honest, grounded discussion about resilience, preparedness, and why sharing these stories openly may be one of the most important defenses organizations have. Show Notes: [04:05] Zachary Lewis explains why the absence of an immediate ransom note delayed suspicion of an attack. [06:00] The first technical indicators suggest something more serious is unfolding. [07:45] Discovering encrypted hypervisors and realizing recovery won't be straightforward. [09:30] Zachary outlines when data exfiltration became a real concern. [11:05] Receiving the LockBit ransomware note confirms the organization has been compromised. [12:55] The 4:30 a.m. phone call pushes leadership into full crisis mode. [14:40] Zachary reflects on managing fear, responsibility, and decision fatigue mid-incident. [16:20] Executive expectations collide with technical realities during the breach. [18:05] Why "doing most things right" still doesn't guarantee protection. [19:55] Cyber insurance begins shaping early response decisions. [21:35] Bringing in incident response teams and legal counsel under tight timelines. [23:20] Zachary describes working with the FBI and understanding jurisdictional limits. [25:10] What law enforcement can and cannot realistically provide during ransomware events. [26:50] Opening communication channels with the threat actors. [28:35] The psychological pressure behind ransomware negotiations. [30:10] Attacker-imposed timelines force rapid, high-stakes decisions. [31:55] Zachary walks through the practical challenges of acquiring cryptocurrency. [33:40] Why encrypted password managers created unexpected recovery barriers. [35:15] Determining which systems could be restored first—and which could not. [37:00] Lessons learned about backup integrity and offline recovery. [38:45] The importance of clear internal communication during uncertainty. [40:25] Balancing transparency with legal and reputational concerns. [42:10] How staff reactions differed from executive responses. [43:55] Zachary discusses the stigma that keeps many ransomware incidents quiet. [45:40] Why sharing breach stories can strengthen collective defenses. [47:20] MFA gaps and configuration issues exposed by the attack. [49:05] Why tabletop exercises fall short of real-world incidents. [50:50] Long-term security changes made after recovery. [52:30] Zachary offers advice for CISOs facing their first major incident. [54:10] What preparedness really means beyond compliance checklists. [56:00] Why resilience and recovery deserve equal priority. [58:30] Final reflections on leadership, accountability, and learning in public. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Zachary Lewis - The Homesteading CISO Zach Lewis - LinkedIn

    Cyber Briefing
    January 14, 2026 - Cyber Briefing

    Cyber Briefing

    Play Episode Listen Later Jan 14, 2026 8:54


    If you like what you hear, please subscribe, leave us a review and tell a friend!

    The John Batchelor Show
    S8 Ep306: CHINA'S GREAT HEIST OF AMERICAN SECRETS Colleagues David Shedd and Bill Roggio. David Shedd outlines China's extensive cyber espionage campaigns, including "Salt Typhoon," which successfully hacked US Congressional committees. These

    The John Batchelor Show

    Play Episode Listen Later Jan 13, 2026 11:25


    CHINA'S GREAT HEIST OF AMERICAN SECRETS Colleagues David Shedd and Bill Roggio. David Sheddoutlines China's extensive cyber espionage campaigns, including "Salt Typhoon," which successfully hacked US Congressional committees. These operations aim to steal sensitive communications and embed sabotage tools within USinfrastructure, highlighting a critical failure in American defensive preparedness. NUMBER 31956

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Tuesday, January 13th, 2026: n8n got npm'ed; Gogs exploit; telegram proxy links

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Jan 13, 2026 5:45


    n8n supply chain attack Malicious npm pagackages were used to attempt to obtain user OAUTH credentials for NPM. https://www.endorlabs.com/learn/n8mare-on-auth-street-supply-chain-attack-targets-n8n-ecosystem Gogs 0-Day Exploited in the Wild An at the time unpachted flaw in Gogs was exploited to compromise git repos. https://www.wiz.io/blog/wiz-research-gogs-cve-2025-8110-rce-exploit Telegram Proxy Link Abuse Telegram proxy links have been abused to deanonymize users https://x.com/GangExposed_RU/status/2009961417781457129

    Politics Politics Politics
    Fed Subpoena Shocker! How Much Oil Reinvestment Does Venezuela Need to Succeed? (with Al Brushwood)

    Politics Politics Politics

    Play Episode Listen Later Jan 13, 2026 69:45


    The week began with a borderline farcical incident in Greenland, where organizers of a traditional dog sled race condemned what they viewed as inappropriate political pressure after an invitation was extended to a U.S. political figure linked to Donald Trump's ambitions toward the island. The Trump administration has clearly dialed back its more provocative rhetoric on Greenland, moving away from loose talk of force and toward a framing rooted in NATO security and Arctic competition with China and Russia. That shift is necessary, but it is not sufficient.If the United States wants Greenland aligned with its sphere of influence, cultural buy in matters. Right now, we are losing that battle. From my admittedly tongue in cheek but sincere proposals involving sports exchanges, Arctic games with Alaska, and even Hollywood soft power, the point remains serious. You cannot strong arm affinity. You have to earn it. Greenland's resistance to even symbolic American political presence should be a warning sign, not a punchline.Politics Politics Politics is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.Iran, Unrest, and Trump's Misdirection DoctrineIran is far harder to read. The internet blackout, scattered video, and wildly varying casualty estimates make certainty impossible. I do not trust low numbers, nor do I trust high numbers. I do not trust most of the footage. Historically, when Iran shuts off the internet, it precedes violent crackdowns, so it would not surprise me if protesters are being killed. But the fog is thick, and anyone claiming clarity is overselling it.What does feel clearer is the Trump administration's evolving playbook on foreign intervention. We have now seen a pattern where public messaging intentionally misleads the press ahead of decisive action. It happened before strikes on Iranian nuclear facilities. It happened with Venezuela. Loud uncertainty followed by sudden execution. With Trump publicly encouraging Iranian protesters while factions inside his administration urge restraint, the real question is not whether something happens, but what form it takes. Cyber operations, targeted strikes, covert assistance, or none of the above. The only safe assumption is that the public story may be the opposite of the private plan.Venezuela, Powell, and the Cost of Weaponized InstitutionsVenezuela remains the clearest example of this strategy in action. The removal of Nicolás Maduro and his arrival in New York did not follow months of public drumbeats. It followed confusion. That pattern now shadows Iran as well. But the episode did not stay overseas. It came home with the Justice Department's move against Federal Reserve Chair Jerome Powell.The subpoena and threatened indictment over cost overruns at Fed headquarters are politically radioactive. Even Republicans who agree the renovation was excessive argue this never should have been criminal. Scott Bessent's reported anger reflects a broader concern inside the administration. Undermining the Fed's independence while simultaneously pressuring it to cut rates is self defeating. Inflation data this week was not disastrous. Absent this DOJ fight, the headline might have been cautious optimism about future cuts. Instead, the story became institutional overreach and internal dysfunction.Chapters00:00:00 - Intro00:04:15 - Greenland00:17:16 - Update00:18:05 - Iran00:24:51 - Jerome Powell00:29:25 - Inflation00:31:36 - Interview with Al Brushwood01:06:21 - Wrap-up This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.politicspoliticspolitics.com/subscribe

    Packet Pushers - Full Podcast Feed
    PP092: News Roundup–Old Gear Faces New Attacks, Cyber Trust Mark's Trust Issues, Alarms Howl for Kimwolf Botnet

    Packet Pushers - Full Podcast Feed

    Play Episode Listen Later Jan 13, 2026 51:52


    Everything old is new again in this Packet Protector news roundup, from end-of-life D-Link routers facing active exploits (and no patch coming) to a five-year-old Fortinet vulnerability being freshly targeted by threat actors (despite a patch having been available for five years). We also dig into a clever, multi-stage attack against hotel operators that could... Read more »

    Packet Pushers - Fat Pipe
    PP092: News Roundup–Old Gear Faces New Attacks, Cyber Trust Mark's Trust Issues, Alarms Howl for Kimwolf Botnet

    Packet Pushers - Fat Pipe

    Play Episode Listen Later Jan 13, 2026 51:52


    Everything old is new again in this Packet Protector news roundup, from end-of-life D-Link routers facing active exploits (and no patch coming) to a five-year-old Fortinet vulnerability being freshly targeted by threat actors (despite a patch having been available for five years). We also dig into a clever, multi-stage attack against hotel operators that could... Read more »

    All Sides with Ann Fisher Podcast
    Tech Tuesday: Ohio State providing free cyber training to hundreds of small businesses

    All Sides with Ann Fisher Podcast

    Play Episode Listen Later Jan 13, 2026 51:36


    An initiative at Ohio State is providing free online cyber training, and more than 600 small businesses have enrolled so far.

    All Sides with Ann Fisher
    Tech Tuesday: Ohio State providing free cyber training to hundreds of small businesses

    All Sides with Ann Fisher

    Play Episode Listen Later Jan 13, 2026 51:36


    An initiative at Ohio State is providing free online cyber training, and more than 600 small businesses have enrolled so far.

    Cyber Briefing
    January 13, 2026 - Cyber Briefing

    Cyber Briefing

    Play Episode Listen Later Jan 13, 2026 8:46


    If you like what you hear, please subscribe, leave us a review and tell a friend!

    Consider This from NPR
    What do we know about what's happening in Iran?

    Consider This from NPR

    Play Episode Listen Later Jan 12, 2026 8:52


    What do we know about what's happening in Iran?The country has been rocked by days of large antigovernment protests. First, sparked by the crippling economy, now anger at the theocratic regime. More than 500 people have been killed, according to the U.S.-based Human Rights Activists News Agency. NPR is unable to independently confirm that figure.And now President Trump is considering whether to weigh in – and how. Sanctions. Cyber attacks. Military strikes. President Trump keeps suggesting the United States may get involved. If so, when and how? For sponsor-free episodes of Consider This, sign up for Consider This+ via Apple Podcasts or at plus.npr.org. Email us at considerthis@npr.org.This episode was produced by Karen Zamora, with audio engineering by Becky Brown and Josephine Nyounai.It was edited by Andrew Sussman, Rebekah Metzler and Courtney Dorning.Our executive producer is Sami Yenigun.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Monday, January 12th, 2026: PEB Manipulation; YARA Update; VideoLAND and Apache NimBLE Patches

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Jan 12, 2026 6:16


    Malicious Process Environment Block Manipulation The process environment block contains metadata about particular processes, but can be manipulated. https://isc.sans.edu/diary/Malicious+Process+Environment+Block+Manipulation/32614/ YARA-X 1.11.0 Release: Hash Function Warnings The latest version of YARA will warn users if a hash rule attempts to match an invalid hash. https://isc.sans.edu/diary/YARA-X%201.11.0%20Release%3A%20Hash%20Function%20Warnings/32616 VideoLAN Security Bulletin VLC 3.0.22 CVE-2025-51602 VideoLAN fixed several vulnerabilities in its VLC software. https://www.videolan.org/security/sb-vlc3022.html Apache NimBLE Bluetooth vulnerabilities NimBLE is a Bluetooth stack popular in IoT devices. An update fixes some eavesdropping and pairing vulnerabilities. https://mynewt.apache.org/cve/

    Paul's Security Weekly
    The State of Cybersecurity Hiring, 2026 content plans, and the weekly news - ESW #441

    Paul's Security Weekly

    Play Episode Listen Later Jan 12, 2026 95:49


    First Topic - Podcast Content Plans for 2026 Every year, I like to sit down and consider what the podcast should be focusing on. Not doing so ensures every single episode will be about AI and nobody wants that. Least of all, me. If I have one more all-AI episode, my head is going to explode. With that said, most of what we talk about in this segment is AI (picard face palm.png). I think 2026 will be THE defining year for GenAI. Three years after the release of ChatGPT, I think we've hit peak GenAI hype and folks are ready for it to put up or shut up. We'll see winners grow and get acquired and losers pivot to something else. More than anything, I want to interview folks who have actually seen it work at scale, rather than just in a cool demo in a vendor sandbox. Also on the agenda for this year: The battle against infostealers and session hijacking: we didn't have a good answer in 2025. When is it coming? Will it include Macs, despite them not having a traditional TPM? The state of trust in outsourcing and third party use (Cloud, MSSPs, SaaS, contractors): 2025 was not a good year for third parties. Lots of them got breached and caused their customers a lot of pain. Also, there's the state of balkanization between the US and... the rest of the entire world. Everyone outside the US seems to be trying to derisk their companies and systems from the Cloud Act right now. Vulnerability management market disruption: there are half a dozen startups already plotting to disrupt the market, likely to come out of stealth in 2026 Future of the SOC: if it's not AI, what is it? What else??? What am I missing? What would you like to see us discuss? Please drop me a line and let me know: adrian.sanabria@cyberriskalliance.com Topic 2: The state of cybersecurity hiring This topic has been in the works for a while! Ayman had a whole podcast and book focused on all the paths people take to get into security. Jackie worked with WiSys on outlining pathways into a cybersecurity career. Whether you're already in cyber or looking for a way in, this segment crams a lot of great advice into just 15-20 minutes. Segment resources: Ayman's personal guide for getting into security https://www.wicys.org/wp-content/uploads/2025/10/WiCyS-Pathways-in-Cyber-PDF-9.24.25.pdf News Finally, in the enterprise security news, Fundings and acquisitions still strong in 2026! Santa might be done delivering gifts, but not protecting Macs! ClickFix attacks Weaponized Raspberry Pis MongoDB incidents for Christmas Top 10 Cyber attacks of 2025 US gets tough on nation state hackers? Brute force attacks on Banks An AI Vending Machine All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-441

    Enterprise Security Weekly (Audio)
    The State of Cybersecurity Hiring, 2026 content plans, and the weekly news - ESW #441

    Enterprise Security Weekly (Audio)

    Play Episode Listen Later Jan 12, 2026 95:49


    First Topic - Podcast Content Plans for 2026 Every year, I like to sit down and consider what the podcast should be focusing on. Not doing so ensures every single episode will be about AI and nobody wants that. Least of all, me. If I have one more all-AI episode, my head is going to explode. With that said, most of what we talk about in this segment is AI (picard face palm.png). I think 2026 will be THE defining year for GenAI. Three years after the release of ChatGPT, I think we've hit peak GenAI hype and folks are ready for it to put up or shut up. We'll see winners grow and get acquired and losers pivot to something else. More than anything, I want to interview folks who have actually seen it work at scale, rather than just in a cool demo in a vendor sandbox. Also on the agenda for this year: The battle against infostealers and session hijacking: we didn't have a good answer in 2025. When is it coming? Will it include Macs, despite them not having a traditional TPM? The state of trust in outsourcing and third party use (Cloud, MSSPs, SaaS, contractors): 2025 was not a good year for third parties. Lots of them got breached and caused their customers a lot of pain. Also, there's the state of balkanization between the US and... the rest of the entire world. Everyone outside the US seems to be trying to derisk their companies and systems from the Cloud Act right now. Vulnerability management market disruption: there are half a dozen startups already plotting to disrupt the market, likely to come out of stealth in 2026 Future of the SOC: if it's not AI, what is it? What else??? What am I missing? What would you like to see us discuss? Please drop me a line and let me know: adrian.sanabria@cyberriskalliance.com Topic 2: The state of cybersecurity hiring This topic has been in the works for a while! Ayman had a whole podcast and book focused on all the paths people take to get into security. Jackie worked with WiSys on outlining pathways into a cybersecurity career. Whether you're already in cyber or looking for a way in, this segment crams a lot of great advice into just 15-20 minutes. Segment resources: Ayman's personal guide for getting into security https://www.wicys.org/wp-content/uploads/2025/10/WiCyS-Pathways-in-Cyber-PDF-9.24.25.pdf News Finally, in the enterprise security news, Fundings and acquisitions still strong in 2026! Santa might be done delivering gifts, but not protecting Macs! ClickFix attacks Weaponized Raspberry Pis MongoDB incidents for Christmas Top 10 Cyber attacks of 2025 US gets tough on nation state hackers? Brute force attacks on Banks An AI Vending Machine All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-441

    Paul's Security Weekly TV
    The State of Cybersecurity Hiring, 2026 content plans, and the weekly news - ESW #441

    Paul's Security Weekly TV

    Play Episode Listen Later Jan 12, 2026 95:49


    First Topic - Podcast Content Plans for 2026 Every year, I like to sit down and consider what the podcast should be focusing on. Not doing so ensures every single episode will be about AI and nobody wants that. Least of all, me. If I have one more all-AI episode, my head is going to explode. With that said, most of what we talk about in this segment is AI (picard face palm.png). I think 2026 will be THE defining year for GenAI. Three years after the release of ChatGPT, I think we've hit peak GenAI hype and folks are ready for it to put up or shut up. We'll see winners grow and get acquired and losers pivot to something else. More than anything, I want to interview folks who have actually seen it work at scale, rather than just in a cool demo in a vendor sandbox. Also on the agenda for this year: The battle against infostealers and session hijacking: we didn't have a good answer in 2025. When is it coming? Will it include Macs, despite them not having a traditional TPM? The state of trust in outsourcing and third party use (Cloud, MSSPs, SaaS, contractors): 2025 was not a good year for third parties. Lots of them got breached and caused their customers a lot of pain. Also, there's the state of balkanization between the US and... the rest of the entire world. Everyone outside the US seems to be trying to derisk their companies and systems from the Cloud Act right now. Vulnerability management market disruption: there are half a dozen startups already plotting to disrupt the market, likely to come out of stealth in 2026 Future of the SOC: if it's not AI, what is it? What else??? What am I missing? What would you like to see us discuss? Please drop me a line and let me know: adrian.sanabria@cyberriskalliance.com Topic 2: The state of cybersecurity hiring This topic has been in the works for a while! Ayman had a whole podcast and book focused on all the paths people take to get into security. Jackie worked with WiSys on outlining pathways into a cybersecurity career. Whether you're already in cyber or looking for a way in, this segment crams a lot of great advice into just 15-20 minutes. Segment resources: Ayman's personal guide for getting into security https://www.wicys.org/wp-content/uploads/2025/10/WiCyS-Pathways-in-Cyber-PDF-9.24.25.pdf News Finally, in the enterprise security news, Fundings and acquisitions still strong in 2026! Santa might be done delivering gifts, but not protecting Macs! ClickFix attacks Weaponized Raspberry Pis MongoDB incidents for Christmas Top 10 Cyber attacks of 2025 US gets tough on nation state hackers? Brute force attacks on Banks An AI Vending Machine All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-441

    Cyber Briefing
    January 12, 2026 - Cyber Briefing

    Cyber Briefing

    Play Episode Listen Later Jan 12, 2026 8:46


    If you like what you hear, please subscribe, leave us a review and tell a friend!

    ChinaTalk
    Ben Buchanan on AI and Cyber

    ChinaTalk

    Play Episode Listen Later Jan 11, 2026 82:19


    Happy New Year! This is your reminder to fill out the ChinaTalk audience survey. The link is here. We're here to give the people what they want, so please fill it out! ~Lily

    Contra Radio Network
    Fragile Union | Ep5: Cyber and Information Warfare

    Contra Radio Network

    Play Episode Listen Later Jan 11, 2026 52:45


    Today's episode explores one of the most invisible yet devastating threats to modern society: cyber and information warfare. Unlike natural disasters or economic crashes, cyberattacks don't require armies, missiles, or even physical presence. Nope. All that is required for cyber warfare is three tangible things: access, opportunity, and intent. And as for information warfare — that's a battle for perception, belief, and narrative — those three are just as dangerous. Because when you control information, you control behavior. We saw it on 9/11 and the days/weeks/months/years after. We saw it during hurricanes Katrina and Helene. During the housing crisis, both of President Trumps terms as well as the four years he wasn't in office. We saw it daily during the covid years and with the potato's reign of terror.

    ChinaEconTalk
    Ben Buchanan on AI and Cyber

    ChinaEconTalk

    Play Episode Listen Later Jan 11, 2026 82:19


    Happy New Year! This is your reminder to fill out the ChinaTalk audience survey. The link is here. We're here to give the people what they want, so please fill it out! ~Lily

    Grumpy Old Geeks
    728: No Face to Shoot

    Grumpy Old Geeks

    Play Episode Listen Later Jan 9, 2026 75:06


    Welcome back to the digital wasteland, fellow survivors. We kick things off in the FOLLOW UP by marking a year since the LA Fires—hello, PTSD—alongside a 4th Strokiversary and three years of sobriety, all while wondering why America is currently obsessed with shooting its own civilians in the face.In the IN THE NEWS segment, Wired is finally teaching us how to protest safely in the age of surveillance, and the EFF is cheering on the hackers fighting ICE's Nazi-adjacent tracking tactics. Meanwhile, Meta is harvesting your AI chats for targeted ads, Disney is paying $10 million for spying on kids, and Grok has spent the holidays generating nonconsensual child abuse material—a problem Elon Musk won't have to legally reckon with until the Take It Down Act hits in May. Instagram's Adam Mosseri has basically surrendered to the AI "slop", suggesting we fingerprint "real" media because the fake stuff has already won the war.As we continue the descent, OpenAI is launching a ChatGPT Health portal despite their "loser energy" and compute limits, while Character.AI and Google are quietly settling lawsuits for bots that encouraged teen suicide. Polymarket gamblers are learning that "decentralized" juries will fist you over the definition of an "invasion" just as fast as a bank. Uber showed off a new Lucid-based robotaxi, but we're pumping the brakes on the safety hype given that autonomous vehicles are five times more likely to crash at dusk. To wrap up the news, Tim Cook took home $74 million last year, which is a lot of "systematic philanthropy" he could be doing right now instead of just writing checks to his own ego.In MEDIA CANDY, we're suffering through the Stranger Things wrap-up and a John McTiernan holiday marathon, though the real highlight is MTV Rewind's tribute to music videos. We've got Traitors, The Pitt, and even a John Candy doc on the list, while APPS & DOODADS brings us the DJI Osmo 8, Victrola's turntable-vibrating speakers. At least California's DROP tool lets you purge your data from 500 brokers at once.Finally, we go to THE DARK SIDE WITH DAVE to hear Dave Bittner rant about holiday tech support, health insurance gouging, and Dave Filoni taking the Star Wars reins. We close out with a look at ILM's 50th, the deepfake porn cesspool formerly known as Twitter, and a birthday toast to the Starman himself, David Bowie.Sponsors:CleanMyMac - Get Tidy Today! Try 7 days free and use code OLDGEEKS for 20% off at clnmy.com/OLDGEEKSPrivate Internet Access - Go to GOG.Show/vpn and sign up today. For a limited time only, you can get OUR favorite VPN for as little as $2.03 a month.SetApp - With a single monthly subscription you get 240+ apps for your Mac. Go to SetApp and get started today!!!1Password - Get a great deal on the only password manager recommended by Grumpy Old Geeks! gog.show/1passwordShow notes at https://gog.show/728Watch on YouTube: https://youtu.be/x-2GTUC6rcUIN THE NEWSHow to Protest Safely in the Age of SurveillanceHow Hackers Are Fighting Back Against ICEMeta's New Privacy Policy Opens Up AI Chats for Targeted AdsDisney to Pay $10 Million After Feds Say It Broke Kids' Privacy Rules on YouTubePeople Spent the Holidays Asking Grok to Generate Sexual Images of ChildrenHere's When Elon Musk Will Finally Have to Reckon With His Nonconsensual Porn GeneratorInstagram chief: AI is so ubiquitous 'it will be more practical to fingerprint real media than fake media'ChatGPT is launching a new dedicated Health portalCharacter.AI and Google settle with families in teen suicide and self-harm lawsuitsGambling platform Polymarket not paying bets on US invasion of VenezuelaUber reveals the design of its robotaxi at CES 2026Maybe We Should Pump the Brakes on the Idea That Robotaxis Are SaferHere's how much Tim Cook and other Apple execs made last yearMEDIA CANDYThe PittDownton Abbey: The Grand FinaleJurassic World RebirthThe Darjeeling LimitedOh Brother, Where Art Thou?Honey Don'tJohn Candy: I Like MeMTV Rewind is a developer's tribute to 24/7 music video channelsAPPS & DOODADSDJI Osmo Mobile 8Netflix GamesThis speaker by Victrola sits underneath turntables and streams audio via BluetoothDelete Request and Opt-out Platform (DROP)THE DARK SIDE WITH DAVEDave BittnerThe CyberWireHacking HumansCaveatControl LoopOnly Malware in the BuildingIndustrial Light & Magic: 50 Years of InnovationDave Filoni to run Star WarsWho's who at X, the deepfake porn site formerly known as TwitterSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    Ones Ready
    Ep 547: Special Reconnaissance Isn't “1% Elite”—And Lying About It Hurts Everyone

    Ones Ready

    Play Episode Listen Later Jan 9, 2026 20:45


    Send us a textPeaches goes straight at a viral hype video that sells Special Reconnaissance with bad math, bad facts, and Hollywood fluff. No hate on SR—those dudes do real work—but saying “1 Special Reconnaissance operator for every 100 SEALs,” claiming JTAC authority, and tossing around cyber buzzwords isn't transparency, it's misinformation. This episode breaks down what Special Reconnaissance actually does, what they don't, why recruiting myths stick around, and how AI-generated hype is making things worse.⏱️ Timestamps: 00:00 Ones Ready intro and why this matters 02:05 Why recruiting myths won't die 04:35 The viral SR video that crossed the line 07:45 “1% elite” math doesn't work 11:35 SR vs SEALs—numbers ≠ difficulty 14:10 Who can actually call airstrikes 16:20 Cyber buzzwords vs real missions 18:45 Why accuracy matters to candidates 21:10 How to ask better questions 23:30 Truth over hype—every time

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Friday, January 9th, 2026: Gephi Analysis; zlib vuln; GnuPG Vulns; Cisco/Cloudflare DNS Issue

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Jan 9, 2026 7:12


    Analysis using Gephi with DShield Sensor Data Gephi is a neat tool to create interactive data visualizations. It can be applied to honeypot data to find data clusters. https://isc.sans.edu/diary/Analysis%20using%20Gephi%20with%20DShield%20Sensor%20Data/32608 zlib v1.3.1.2 Global Buffer Overflow in TGZfname() of zlib untgz Utility The untgz utility that is part of zlib suffers from a straightforward buffer overflow in the filename parameter https://seclists.org/fulldisclosure/2026/Jan/3 GnuPG Vulnerabilities Several vulnerabilities in GnuPG were disclosed during a recent talk at the CCC congress. https://gpg.fail Cisco DNS Bug Reboot Last night, several Cisco users reported that their switches rebooted. The issue appears to be related to a change Cloudflare made in the order of CNAME records. Only users using 1.1.1.1 as a recursive resolver appear to be affected. https://community.cisco.com/t5/switches-small-business/got-fatal-error-cbs350-24t-4g/td-p/5359883?utm_source=chatgpt.com

    The CyberWire
    America goes solo on cyber.

    The CyberWire

    Play Episode Listen Later Jan 8, 2026 24:48


    The US withdraws from global cybersecurity institutions. A maximum-severity vulnerability called Ni8mare allows full compromise of a workflow automation platform. Cisco patches ISE. Researchers uncover a sophisticated multi-stage malware campaign targeting manufacturing and government organizations in Italy, Finland, and Saudi Arabia. The growing rift of defining AI risk. Microsoft gives 365 admins a one-month deadline to enable MFA. The Illinois Department of Human Services inadvertently exposed personal and protected health information of more than 700,000 residents. An Illinois man is charged with hacking Snapchat accounts to steal nudes. Our guest is Caitlin Clarke, Senior Director for Cybersecurity Services at Venable, with insights on CISA 2015. Facial recognition that's bear-ly controversial.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Caitlin Clarke, Senior Director for Cybersecurity Services at Venable, for a conversation on CISA 2015 and its role in today's cybersecurity and policy landscape. If you enjoyed this conversation, be sure to tune into the full interview on the next Caveat. Selected Reading US announces withdrawal from dozens of international treaties (The Record) US To Leave Global Forum on Cyber Expertise (Infosecurity Magazine) Max severity Ni8mare flaw lets hackers hijack n8n servers (Bleeping Computer) Cisco warns of Identity Service Engine flaw with exploit code (Bleeping Computer) CISA tags max severity HPE OneView flaw as actively exploited (Bleeping Computer) Threat Actors Exploit Commodity Loader in Targeted Email Campaigns Against Organizations (GB Hackers) Are Copilot prompt injection flaws vulnerabilities or AI limits? (Bleeping Computer) Microsoft to enforce MFA for Microsoft 365 admin center sign-ins (Bleeping Computer) Illinois state agency exposed personal data of 700,000 people (The Record) Oswego man Kyle Svara, 26, allegedly hired by college coach Steve Waithe to get Snapchat access codes from nearly 600 women: FBI (ABC7 Chicago) How facial recognition for bears can help ecologists manage wildlife (The Conversation) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Thursday, January 8th, 2026: HTML QR Code Phishing; n8n vulnerability; Powerbank Feature Creep

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Jan 8, 2026 7:23


    A phishing campaign with QR codes rendered using an HTML table Phishing emails are bypassing filters by encoding QR codes as HTML tables. https://isc.sans.edu/diary/A%20phishing%20campaign%20with%20QR%20codes%20rendered%20using%20an%20HTML%20table/32606 n8n vulnerabilities In recent days, several new n8n vulnerabilities were disclosed. Ensure that you update any on-premises installations and carefully consider what to use n8n for. https://www.cyera.com/research-labs/ni8mare-unauthenticated-remote-code-execution-in-n8n-cve-2026-21858 https://github.com/n8n-io/n8n/security/advisories/GHSA-v4pr-fm98-w9pg Power bank feature creep is out of control Simple power banks are increasingly equipped with advanced features, including networking, which may expose them to security risks. https://www.theverge.com/tech/856225/power-banks-are-the-latest-victims-of-feature-creep

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Wednesday, January 7th, 2026: Tailsnitch Review; D-Link DSL EoL Vuln; TOTOLINK Unpatched Vuln

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Jan 7, 2026 5:44


    Tool Review: Tailsnitch Tailsnitch is a tool to audit your Tailscale configuration. It does a comprehensive analysis of your configuration and suggests (or even applies) fixes. https://isc.sans.edu/diary/Tool%20Review%3A%20Tailsnitch/32602 D-Link DSL Command Injection via DNS Configuration Endpoint A new vulnerability in very old D-Link DSL modems is currently being exploited. https://www.vulncheck.com/advisories/dlink-dsl-command-injection-via-dns-configuration-endpoint TOTOLINK EX200 firmware-upload error handling can activate an unauthenticated root telnet service TOTOLINK extenders may start a telnet server and allow unauthenticated access if a firmware update fails. https://kb.cert.org/vuls/id/295169