Attack on a computer system
POPULARITY
Categories
A round-up of the main headlines in Sweden on June 11th, 2025. You can hear more reports on our homepage www.radiosweden.se, or in the app Sveriges Radio Play. Presenter/Producer: Kris Boswell
Cyberattacks on big companies get plenty of attention, but small businesses are hit about four times as often. A New Orleans restaurant owner lost thousands after her Facebook was hacked. The Gulf States Newsroom's Stephan Bisaha shares why hackers are targeting small businesses. There's been roughly $11 billion in cuts to university research funding since President Trump took office in January. Trump has cited widespread political bias, including antisemitism, as the reason for these cuts, saying universities have forfeited the right to taxpayer support. While institutions like Harvard and Johns Hopkins are temporarily self-funding their research, not every institution has the means to do this. Robert Twilley, a professor and vice president at the Office of Research & Economic Development at Louisiana State University joins us to discuss how research funding cuts could impact schools like LSU.Recent national analysis shows Louisiana is bucking a national trend related to state budgets. It's called revenue volatility, and the report from The Pew Charitable Trusts shows Louisiana's is actually lower than most of the nation.Justin Theal, senior officer with The Pew Charitable Trusts tells us how this rating relates to the state's budget.___Today's episode of Louisiana Considered was hosted by Adam Vos. Our managing producer is Alana Schreiber. We get production support from Garrett Pittman and our assistant producer Aubry Procell.You can listen to Louisiana Considered Monday through Friday at noon and 7 p.m. It's available on Spotify, the NPR App and wherever you get your podcasts. Louisiana Considered wants to hear from you!Please fill out our pitch line to let us know what kinds of story ideas you have for our show. And while you're at it, fill out our listener survey! We want to keep bringing you the kinds of conversations you'd like to listen to.Louisiana Considered is made possible with support from our listeners. Thank you!
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
On Episode 847 of WHAT THE TRUCK?!?, Dooner is talking about a cyberattack that currently has truckers stuck at United Natural Foods (UNFI), one of America's largest food distributors. How much will it hurt the food supply chain? Autonomous Waymos are being exploited in Los Angeles by protesters who summon them then set them on fire. We'll look at whether autonomous trucks will be exploitable in the future. According to CargoNet, freight thefts were up 27% from 2023 to 2024. Tive's Richie Daigle stops by the studio to talk about how the company's trackers are recovering stolen loads. Train travel has really fallen off this century, but a new company has eyes on making it great again. Dreamliner's Joshua Dominic tells us about a luxury overnight train from Los Angeles to San Francisco that the company plans to launch prior to the 2028 Olympics. Plus, FMCSA ends DEI rules for CDLs; project44's ambitious new plan; and more. Catch new shows live at noon EDT Mondays, Wednesdays and Fridays on FreightWaves LinkedIn, Facebook, X or YouTube, or on demand by looking up WHAT THE TRUCK?!? on your favorite podcast player and at 5 p.m. Eastern on SiriusXM's Road Dog Trucking Channel 146. Watch on YouTube Check out the WTT merch store Visit our sponsor Subscribe to the WTT newsletter Apple Podcasts Spotify More FreightWaves Podcasts Learn more about your ad choices. Visit megaphone.fm/adchoices
A round-up of the main headlines in Sweden on June 9th, 2025. You can hear more reports on our homepage www.radiosweden.se, or in the app Sveriges Radio Play. Presenter/Producer: Kris Boswell
On Episode 847 of WHAT THE TRUCK?!?, Dooner is talking about a cyberattack that currently has truckers stuck at United Natural Foods (UNFI), one of America's largest food distributors. How much will it hurt the food supply chain? Autonomous Waymos are being exploited in Los Angeles by protesters who summon them then set them on fire. We'll look at whether autonomous trucks will be exploitable in the future. According to CargoNet, freight thefts were up 27% from 2023 to 2024. Tive's Richie Daigle stops by the studio to talk about how the company's trackers are recovering stolen loads. Train travel has really fallen off this century, but a new company has eyes on making it great again. Dreamliner's Joshua Dominic tells us about a luxury overnight train from Los Angeles to San Francisco that the company plans to launch prior to the 2028 Olympics. Plus, FMCSA ends DEI rules for CDLs; project44's ambitious new plan; and more. Catch new shows live at noon EDT Mondays, Wednesdays and Fridays on FreightWaves LinkedIn, Facebook, X or YouTube, or on demand by looking up WHAT THE TRUCK?!? on your favorite podcast player and at 5 p.m. Eastern on SiriusXM's Road Dog Trucking Channel 146. Watch on YouTube Check out the WTT merch store Visit our sponsor Subscribe to the WTT newsletter Apple Podcasts Spotify More FreightWaves Podcasts Learn more about your ad choices. Visit megaphone.fm/adchoices
Welcome to Bainbridge, Georgia—where a cyber attack turned Memorial Hospital into a warzone of blinking screens and silent phones. This isn't sci-fi. It's the chilling truth of how ransomware can lead to real-world deaths. In this episode, we unpack the battle between Embargo and Memorial Health, and reveal the emotional and life-threatening toll of cybercrime.Send us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
How do we prepare our cybersecurity for a post quantum world? This week, Technology Now explores how security experts are looking to future-proofing their work. We will examine the hurdles to post-quantum security, the underlying ways in which our data is protected, and we will be delving into the underground world of “harvest now, decrypt later”. Dr Sarah McCarthy tells us more. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it. About Dr Sarah McCarthy: https://www.linkedin.com/in/sarahmccarthyphd/?originalSubdomain=ca SourcesQuantum computing chip: https://blog.google/technology/research/google-willow-quantum-chip/https://www.bbc.co.uk/news/articles/c791ng0zvl3oNIST Post Quantum Standards: https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standardsMartian aurora: https://science.nasa.gov/solar-system/planets/mars/nasa-observes-first-visible-light-auroras-at-mars/Rutherford's Lecture: https://web.lemoyne.edu/giunta/ruth1920.htmlJames Chadwick: https://www.nobelprize.org/prizes/physics/1935/chadwick/biographical/
Join Susannah and Sarah as they break down the growing threat of cyber attacks and online scams – what's happening now, who's being targeted, and what it all means for your money. Will Guyatt, technology correspondent, joins to explain how scams are evolving – from deepfakes and fake WhatsApp groups to social media investment traps – and what steps you can take to stay safe online. Helen Morrissey, head of retirement analysis at Hargreaves Lansdown, also joins to discuss how pension scammers are targeting retirees and what red flags to watch out for. This podcast isn't personal advice. If you're not sure what's right for you, seek advice. Investments rise and fall in value, so investors could make a loss. Hosted on Acast. See acast.com/privacy for more information.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
If you like what you hear, please subscribe, leave us a review and tell a friend!
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Windows 11 might fail to start after installing KB5058405, says Microsoft Victoria's Secret website goes offline following cyberattack Billions of stolen cookies available, worrying security experts Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO. Find the stories behind the headlines at CISOseries.com.
(REPLAY) This is a recording of a webinar aimed at IT professionals, system administrators, and cybersecurity professionals eager to bolster their defenses against cyber threats. In this session, "How to Harden Active Directory to Prevent Cyber Attacks," our expert speakers will discuss comprehensive strategies and best practices for securing your Active Directory environment. Download the slides here.Key Takeaways:- Understanding AD Vulnerabilities: Learn about the most common security weaknesses in Active Directory (AD) and how attackers exploit these gaps.- Best Practices in Configuration: Discover how to properly configure Active Directory settings for maximum security to deter potential breaches.- Advanced Security Measures: Explore advanced techniques and tools for monitoring, detecting, and responding to suspicious activities within your network.- Case Studies: Hear real-world examples of Active Directory attacks and what lessons can be learned from them.- Interactive Q&A: Have your specific questions answered during our live Q&A session with the experts.Whether you want to enhance your security posture or start from scratch, this webinar will provide you with the knowledge and tools necessary to protect your systems more effectively.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/mylinks Work with Us: https://securit360.com
DragonForce has emerged as a significant threat actor in the cybercrime landscape, targeting vulnerabilities in the SimpleHelp remote monitoring and management tool to execute sophisticated ransomware-as-a-service attacks against managed service providers (MSPs). Recent incidents have highlighted how attackers exploited known vulnerabilities, including path traversal and privilege escalation issues, to deploy DragonForce ransomware, which involved exfiltrating sensitive data and employing double extortion tactics. While some clients were protected by endpoint security measures, others suffered significant impacts, underscoring the importance of maintaining IT hygiene and patch management.The rise of DragonForce is indicative of a broader trend where low-key remote monitoring and management vendors become high-risk entry points for cybercriminals. The evolution of DragonForce from disruptive ransomware player to a full-blown ransomware-as-a-service operator executing targeted extortion campaigns raises alarms about the security of tools widely used by small and medium-sized businesses (SMBs). This situation serves as a reminder that disclosed vulnerabilities can become weaponized if organizations fail to prioritize patching and security measures.In another concerning development, ConnectWise's ScreenConnect has been identified as the most abused legitimate remote access tool in cyberattacks, accounting for a significant percentage of active threat reports. Cybercriminals are hijacking these tools, typically used by IT professionals, to infiltrate systems and deliver malicious software. The increasing popularity of ScreenConnect has raised vendor trust concerns among IT service providers, prompting discussions about the implications of using such tools in an environment where they can be misused, even without technical exploits.Microsoft is also making waves in the patch management landscape by introducing a Windows Update Orchestration platform that allows app developers to integrate their update processes into the Windows 11 framework. This initiative aims to create a unified system for managing updates across devices, addressing user concerns about fragmented experiences. The implications of this change are profound, as it positions Microsoft as a central authority in the software update lifecycle, potentially reshaping how managed service providers and security teams approach patching and update management in the future. Four things to know today00:00 DragonForce Targets SimpleHelp Vulnerabilities in MSP-Focused Ransomware Campaign03:30 ConnectWise ScreenConnect Now the Most Abused Remote Access Tool in 2025 Cyberattacks, Report Finds05:56 Unified Patch Control: Microsoft's Update Orchestration Platform Threatens RMM Value Propositions08:55 Actionable AI: Governance Framework and MCP Protocol Deliver Real-World Benefits Amid Hype This is the Business of Tech. Supported by: https://syncromsp.com/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
In this unfiltered episode of Unspoken Security, host A. J. Nash explores the looming threat quantum computing poses to our digital infrastructure with experts Robert Clyde, Managing Director of Clyde Consulting and Chair of crypto-security firm CryptoQuanti, and Jamie Norton, a Board Director at ISACA with extensive cybersecurity credentials. They cut through the technical jargon to explain how quantum computing fundamentally differs from classical computing and why its exponential processing power threatens to break current encryption standards."While current quantum computers operate at around 150 qubits, once they reach sufficient power, everything from banking transactions to secure communications could be compromised instantly," warns Robert during the discussion of "Q Day" — the moment when quantum computers become powerful enough to defeat public-key cryptography underpinning internet security.Despite the alarming scenario, the experts offer practical guidance on preparing for this threat. They outline how organizations should begin implementing post-quantum cryptography solutions developed by NIST, emphasizing that proactive preparation, not panic, is the critical response security professionals should adopt today. Listen to the full episode to understand the quantum threat and learn the concrete steps your organization should take now before Q Day arrives.Send us a textSupport the show
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Find us at www.crisisinvesting.com In this episode, we return from a week off to discuss the latest political and economic happenings. They delve into the One Big Beautiful Bill Act that has been passed by the House, although not yet by the Senate. Highlights of the bill include permanent tax cuts, adjustments in the child tax credit, and increased defense spending. The conversation also covers Elon Musk's struggles with government cuts, the convoluted student loan system, and the rise of AI regulations. With in-depth analysis, they discuss the geopolitical tensions involving Russia and Ukraine, and Israel and Iran. Additionally, they explore the intricacies of the Golden Dome defense project, rising cyber attacks, and the concerning state of mining companies in the market. The episode concludes with discussions on nonprofit oversight, the controversial portrait of Donald Trump on a government building, and notable figures like Rahm Emanuel considering a presidential run. 00:00 Introduction and Weekly Recap 00:05 Overview of the OBA Bill 00:20 Permanent Tax Cuts and Deficit Concerns 01:14 Doge Provisions and Musk's Resignation 03:55 Child Tax Credit and SALT Deduction Cap 05:11 Tax Exemptions and Trump's Savings Accounts 07:08 Debt Ceiling Increase and Financial Concerns 08:22 Healthcare and Social Services Reforms 12:16 Student Loan Policy and Education Costs 14:27 Defense Spending and Border Security 17:37 AI Regulation Moratorium and Green Energy Rollbacks 18:36 IRS Direct File Program Termination 20:28 University Endowment Tax and Nonprofit Oversight 24:28 National Debt Increase and Senate Opposition 25:59 Trump's Megalomania and Public Image 29:12 Rahm Emanuel's Presidential Ambitions 30:29 Kanye West's Cancellation and Comeback 31:26 Dual Citizenship in High Government Positions 32:19 Trump's Control and Indictments 33:35 Epstein's Death and FBI's Response 35:54 Washington Post's Book Recommendations 38:49 Golden Dome and Modern Warfare 41:12 Cyber Attacks and Global Tensions 49:03 Israel-Iran Conflict 56:04 Mining Stocks and Market Trends 01:00:26 Conclusion and Upcoming Topics
MathWorks, Creator of MATLAB, Confirms Ransomware Attack Adidas warns of data breach after customer service provider hack Dutch Intelligence Agencies Say Russian Hackers Stole Police Data in Cyberattack Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO.
In this special live episode from the 2025 Advisory Board Summit, Ardent Health Services President & CEO Marty Bonick and Chief Digital and Transformation Officer Anika Gardenhire recount the harrowing story of a ransomware attack that brought their 30-hospital system to a standstill on Thanksgiving Day 2023. Cyberattacks on healthcare systems are becoming more frequent, more sophisticated, and more devastating. Just 60 days into her role, Anika led the charge to contain the breach, extract the threat, and recover operations in a record-setting 12 days. From ransom messages appearing on medical devices to disconnecting their entire system from the internet, this episode explores what it takes to lead through crisis, act decisively, and build true cyber resilience. This candid conversation underscores why leaders must embrace transparency even when sharing worst-case scenarios. Because learning from difficult moments is how health leaders build stronger, more resilient systems. Links: Ardent Health Cybersecurity in healthcare Paint a picture of a cyber-resilient organization Cybersecurity in healthcare demands resiliency, not reactivity Advisory Board Summits Radio Advisory's Tech and AI playlist A transcript of this episode as well as more information and resources can be found on RadioAdvisory.advisory.com.
In this special live episode from the 2025 Advisory Board Summit, Ardent Health Services President & CEO Marty Bonick and Chief Digital and Transformation Officer Anika Gardenhire recount the harrowing story of a ransomware attack that brought their 30-hospital system to a standstill on Thanksgiving Day 2023. Cyberattacks on healthcare systems are becoming more frequent, more sophisticated, and more devastating. Just 60 days into her role, Anika led the charge to contain the breach, extract the threat, and recover operations in a record-setting 12 days. From ransom messages appearing on medical devices to disconnecting their entire system from the internet, this episode explores what it takes to lead through crisis, act decisively, and build true cyber resilience. This candid conversation underscores why leaders must embrace transparency even when sharing worst-case scenarios. Because learning from difficult moments is how health leaders build stronger, more resilient systems. Links: Ardent Health Cybersecurity in healthcare Paint a picture of a cyber-resilient organization Cybersecurity in healthcare demands resiliency, not reactivity Advisory Board Summits Radio Advisory's Tech and AI playlist A transcript of this episode as well as more information and resources can be found on RadioAdvisory.advisory.com.
Malicious npm and VS Code packages stealing data Nova Scotia Power confirms ransomware attack Researchers claim ChatGPT o3 bypassed shutdown in controlled test Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO. Find the stories behind the headlines at CISOseries.com.
World news in 7 minutes. Wednesday 28th May 2025.Today: Gaza failed distribution. Indonesia drugs. China explosion. Brazil BYD sued. Venezuela no democracy. US NPR sues. Nigeria violence. Malawi Mpox. Netherlands Russia cyberattack. Lagarde Euro moment. Spain ancient fingerprint. SEND7 is supported by our amazing listeners like you.Our supporters get access to the transcripts and vocabulary list written by us every day.Our supporters get access to an English worksheet made by us once per week.Our supporters get access to our weekly news quiz made by us once per week.We give 10% of our profit to Effective Altruism charities. You can become a supporter at send7.org/supportContact us at podcast@send7.org or send an audio message at speakpipe.com/send7Please leave a rating on Apple podcasts or Spotify.We don't use AI! Every word is written and recorded by us!Since 2020, SEND7 (Simple English News Daily in 7 minutes) has been telling the most important world news stories in intermediate English. Every day, listen to the most important stories from every part of the world in slow, clear English. Whether you are an intermediate learner trying to improve your advanced, technical and business English, or if you are a native speaker who just wants to hear a summary of world news as fast as possible, join Stephen Devincenzi and Juliet Martin every morning. Transcripts, vocabulary lists, worksheets and our weekly world news quiz are available for our amazing supporters at send7.org. Simple English News Daily is the perfect way to start your day, by practising your listening skills and understanding complicated daily news in a simple way. It is also highly valuable for IELTS and TOEFL students. Students, teachers, TEFL teachers, and people with English as a second language, tell us that they use SEND7 because they can learn English through hard topics, but simple grammar. We believe that the best way to improve your spoken English is to immerse yourself in real-life content, such as what our podcast provides. SEND7 covers all news including politics, business, natural events and human rights. Whether it is happening in Europe, Africa, Asia, the Americas or Oceania, you will hear it on SEND7, and you will understand it.Get your daily news and improve your English listening in the time it takes to make a coffee.For more information visit send7.org/contact or send an email to podcast@send7.org
URGENT: Cyber Criminals Target US Retailers After UK Rampage The cyber attack wave that devastated UK retail is crossing the Atlantic. Our panel, including a former retail CEO with firsthand cyber security experience, breaks down the alarming reality of retail vulnerability. Key Moments: 0:00-1:00 - Breaking news: UK retail hackers now targeting major US brands 1:01-1:15 - Marks & Spencer, Co-op, and Harrods attack details 1:16-3:00 - Michael's shocking revelation: Only 20% of US retailers truly prepared 3:01-4:15 - Real-world experience: What happened when Joann Fabrics got serious about security 4:16-5:35 - The customer loyalty catastrophe: Why cyber attacks destroy businesses permanently 5:36-6:25 - Target 2013 and Vegas casino breaches: Long-term customer relationship damage 6:26-7:25 - Michael's warning: "Not your parents' cyber attack anymore" - recovery takes weeks, costs multiply The sobering reality that could save your business - or destroy it. This week's episode was brought to you with the help and support of the A&M Consumer and Retail Group, Simbe, Mirakl, Ocampo Capital, Infios, and ClearDemand. #cybersecurity #retailsecurity #cyberattacks #databreach #businesssecurity #retailtech #cybercrime #retailnews #securitybreach #businessrisk #cyberthreats For the full episode head here: https://youtu.be/Qx2hUtMWmTY
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
A program in Wisconsin that trains physical education teachers to serve students with disabilities is losing its federal grant. A cyberattack on a Wisconsin-based cell phone company is affecting phone service for thousands of people. And, the percentage of students at grade level for math at a school in Grant County is double the state average. Corrinne Hess will tell us how they did it.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
As the global race in artificial intelligence gathers pace, American AI startup Anthropic has unveiled the latest, most powerful versions of its model Claude. The company says they can write computer code by themselves and play Pokémon for much longer than its predecessors. FRANCE 24's Yuka Royer speaks with the company's Chief Product Officer Mike Krieger about ensuring safety, fighting deepfakes and reducing AI's environmental footprint.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
What legal responsibilities does a company have to keep your data secure?M&S, and the Co-op are picking up the pieces after their systems were hacked. The cyber criminals claim to have the private information of 20 million people who signed up to Co-op's membership scheme, but the firm have not confirmed that number. The Co-op says the breach did not include members' passwords, bank or credit card details. However, experts say seemingly innocent information can be used to commit fraud or identity theft.Companies aren't the only target; on Monday this week, the Ministry of Justice revealed that the Legal Aid Agency was also hacked in April. So can you sue if your private data is stolen in this way? And if you're the employee who clicked on a hacker's dodgy link in an email, how liable are you for any losses that occur?Also on the programme: How survivors of domestic violence in Scotland want to be told if their attackers make plea deals. Presenter: Joelle Grogan Producers: Ravi Naik and Charlotte Rowles Editor: Tara McDermottContributors Joe Tidy, BBC Cyber Correspondent Tim Capel, Legal Counsel for the Information Commissioner's Office Ian Jeffrey, Chief Executive of the Law Society Brian McConnachie KC, a former crown prosecutor and now a senior advocate:
UK's Legal Aid Agency breached NHS patients put at risk from cyberattacks 23andMe has a buyer Huge thanks to our sponsor, Conveyor Ever spent an hour in a clunky portal questionnaire with UI from 1999 just to lose your work because it timed out? Conveyor's got you. Our browser extension completes questionnaires in the most tedious portals for you by auto-importing all the questions and generating AI answers. For popular portals, it can go full autopilot and fill in reviewed answers into the portal on one click. You shouldn't have to fight a portal just to prove your security posture. Learn more at www.conveyor.com.
In this episode of Don't Eat Poop!, our hosts Matt and Francine are talking about some growing threats to food safety: cyber attacks, food terrorism, and food fraud.For some time, these were associated with external threats, as was the case with JBS's Russian ransomware attack, which stopped 30% of the American meat supply back in 2021, and the lead-laced-cinnamon fraud that came from Ecuador and led to the Cinnamon Applesauce Pouches Lead and Chromium Poisoning Outbreak.But today, our hosts are bringing you a very serious case of a cyber attack by someone on the inside, with dangerous consequences for both consumers and workers at a poultry processing facility. So, stay tuned to know all about these growing threats and how to protect your facility from them.In this episode:
Isabel Cleary, Investigative reporter at NBC4 broke the story and has remained on it looking for more answers on how it happened.
Christian Espinosa, founder of Blue Goat Cyber and leading voice in medical device cybersecurity, joins Etienne Nichols to unpack the urgent and often misunderstood topic of cybersecurity in MedTech. From FDA's 2023 regulatory overhaul to real-world hacking scenarios that could harm patients, Christian provides practical advice for innovators, RA/QA professionals, and software teams. He also shares why waiting until the last minute on cybersecurity could cost startups millions—or even kill a project entirely.Whether you're a quality professional trying to build compliant systems or an innovator racing toward FDA submission, this episode lays out exactly what you need to know to stay ahead of cyber threats and within regulatory guardrails.Key Timestamps:00:01 – Intro to guest Christian Espinosa and Blue Goat Cyber06:28 – Why medical device cybersecurity is different from traditional IT security11:49 – Real-world hacking example: acne laser device turned skin-burner13:57 – FDA expectations post-September 2023: what changed17:12 – Secure boot: a microcontroller mistake that derailed a launch20:35 – Common cybersecurity vendor mistake MedTech companies make23:40 – SBOM: Software Bill of Materials and why it's legally critical27:58 – Cyberattacks in hospitals: assuming a hostile network35:44 – AI in medical devices: data bias and cybersecurity challenges41:10 – Developers ≠ cybersecurity experts: the training gap nobody talks about45:20 – What RA/QA professionals need to know now49:30 – Why cybersecurity must be iterative, not a final-phase add-on55:20 – Espinosa's final advice for MedTech professionals57:52 – The story behind “Blue Goat Cyber”Standout Quotes:“Cybersecurity for medical devices isn't about data breaches—it's about patient harm. You could paralyze someone or misdiagnose sepsis. This isn't theoretical.”— Christian Espinosa, on the real risks of insecure devices“Most developers don't understand cybersecurity. We assume they do—but that's like expecting an architect to be a locksmith.”— Christian Espinosa, on why so many devices fail security assessmentsTop Takeaways:Cybersecurity isn't just about data—it's about patient safety. From burning skin to missed sepsis diagnoses, vulnerabilities in devices have real-world harm potential.FDA now requires more than just a basic security plan. Post-September 2023 rules mandate testing (SAST, DAST, fuzzing), SBOMs, and risk assessments tied to patient harm.Start cybersecurity planning during the requirements phase. Hardware like microcontrollers must support secure boot and other protections—retrofits can cripple product plans.Iterate cybersecurity like any core development activity. One-time testing near submission is too late; build security into your pipeline just like QA or usability.Traditional cybersecurity vendors aren't enough. Many fail to meet FDA's nuanced expectations for medical devices, causing costly submission rejections.References & Resources:Christian Espinosa on LinkedInBlue Goat CyberEtienne Nichols on LinkedInMedTech 101 – Understanding SBOM (Software Bill of...
In this episode of the podcast, the hosts discuss the emergence of a new botnet that is launching targeted DDoS attacks on the gaming industry. They explore the implications of these attacks, particularly focusing on the financial impact on both large and small gaming companies. The conversation highlights the sophistication of the botnet and the challenges smaller companies face in maintaining security. The hosts also emphasize the importance of understanding the broader implications of cybersecurity threats in the gaming sector. Article: New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors https://thehackernews.com/2025/05/new-httpbot-botnet-launches-200.html?m=1&fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExd2s2TnlNUWRkR24yNWFjdwEeo0zY934IpcUzdKz3zxJeQKcubB42gZUNAyR75WHTYHPpR3T3ulCyZBo6cGw_aem_NZKTa-tbuk1AHhuSAo73jg Please LISTEN
This is the first real episode of the new call-in format. I go through all the emails sent to the show, where clearly my back catalogue is being fully explored! ITIL, Bees, AppSumo and the recent cyber attacks on Harrods, M&S, and the Co-op are explored. Remember, kids, use an authentication app like Authy or Google Authenticator wherever you can! Be on the next show, call in! https://richardsonsrubicon.com/be-on-the-show/#liveshow
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
In this eye-opening episode of Unspoken Security, host AJ Nash welcomes notorious hacker and security expert Jayson E. Street to discuss why traditional security awareness training falls short. Jayson explains that most corporate security training is merely policy-driven compliance, not actual security education.Instead of focusing on checkbox exercises once a year, Jayson advocates for building situational awareness—a security mindset that extends beyond the workplace into everyday life. He shares practical strategies for gamifying security training, fostering a culture where employees feel like participants rather than targets, and creating year-round engagement through creative competitions.Through entertaining stories and candid insights from his experience as a simulated adversary for hire, Jayson challenges the industry's approach to security training and offers a refreshing perspective on how to make organizations genuinely more secure.Send us a textSupport the show
Radware says recently WAF bypasses were patched in 2023 Marks & Spencer confirms data stolen in ransomware attack Alabama suffers cybersecurity event Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines. Find the stories behind the headlines at CISOseries.com
Nearly 200 million Americans' data were exposed by the UnitedHealth hack, and the event crippled some healthcare delivery systems across the country. In episode 2 of the UnitedHealth hack series, Duke's Navina Doss reveals the true depth of the cyberattack.
Ronan Murphy, Chief Strategy officer with Forcepoint and cyber security expert
Hackers hijack Japanese financial accounts to conduct billions in trades Education giant Pearson hit by cyberattack exposing customer data Microsoft Teams will soon block screen capture during meetings Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines. Find the stories behind the headlines at CISOseries.com.
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Many startups overlook hidden vulnerabilities in their pursuit of innovation. In this episode, George Pappas, SVP of Security at Health Catalyst, discusses how healthcare systems inherit security risks through mergers, poor integrations, and neglected IT. When cyberattacks lead to patient deaths, it's not just a technical issue—it's a leadership failure. This conversation challenges the idea that compliance is enough and offers actionable insights on building a culture of risk ownership from the top down.
Preview: Colleague Annie Fixler of FDD recommends resilience in the face of constant and penetrating PRC cyber attacks. More later.
Updates from RSAC 2025. Former NSA cyber chief Rob Joyce warns that AI is rapidly approaching the ability to develop high-level software exploits. An FBI official warns that China is the top threat to U.S. critical infrastructure. Mandiant and Google raise alarms over widespread infiltration of global companies by North Korean IT workers. France accuses Russia's Fancy Bear of targeting at least a dozen French government and institutional entities. SonicWall has issued an urgent alert about active exploitation of a high-severity vulnerability in its Secure Mobile Access appliances. A China-linked APT group known as “TheWizards” is abusing an IPv6 networking feature. Gremlin Stealer emerges as a serious threat. A 23-year-old Scottish man linked to the Scattered Spider hacking group has been extradited from Spain to the U.S. Senators urge FTC action on consumer neural data. New WordPress malware masquerades as an anti-malware plugin. Our guest is Andy Cao from ProjectDiscovery, the Winner of the 20th Annual RSAC™ Innovation Sandbox Contest. Our intern Kevin returns with some Kevin on the Street interviews from the RSAC floor. Research reveals the risk of juice jacking isn't entirely imaginary. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest is Andy Cao from ProjectDiscovery, who is the Winner of the 20th Annual RSAC™ Innovation Sandbox Contest 2025 event. Kevin on the Street Joining us this week from RSAC 2025, we have our partner Kevin Magee, Global Director of Cybersecurity Startups at Microsoft for Startups. Stay tuned to the CyberWire Daily podcast for “Kevin on the Street” updates on all things RSAC 2025 from Kevin all week. Today Kevin is joined by Shane Harding CEO of Devicie and Nathan Ostrowski Co-Founder Petrą Security. You can also catch Kevin on our Microsoft for Startups Spotlight, brought to you by N2K CyberWire and Microsoft, where we shine a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. Kevin and Dave talk with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur, then speak with three Microsoft for Startups members: Matthew Chiodi of Cerby, Travis Howerton of RegScale, and Karl Mattson of Endor Labs. Whether you are building your own startup or just love a good innovation story, listen and learn more here. Selected Reading Ex-NSA cyber boss: AI will soon be a great exploit dev (The Register) AI makes China leading threat to US critical infrastructure, says FBI official (SC World) North Korean operatives have infiltrated hundreds of Fortune 500 companies (CyberScoop) France Blames Russia for Cyberattacks on Dozen Entities (SecurityWeek) SonicWall OS Command Injection Vulnerability Exploited in the Wild (Cyber Security News) Hackers abuse IPv6 networking feature to hijack software updates (Bleeping Computer) New Gremlin Stealer Advertised on Hacker Forums Targets Credit Card Data and Login Credentials (GB Hackers) Alleged ‘Scattered Spider' Member Extradited to U.S. (Krebs on Security) Senators Urge FTC Action on Consumer Neural Data, Signaling Heightened Scrutiny (Cooley) New WordPress Malware as Anti-Malware Plugin Take Full Control of Website (Cyber Security News) iOS and Android juice jacking defenses have been trivial to bypass for years (Ars Technica)Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
The Green Room - https://rumble.com/playlists/aa56qw_g-j0 BUY CAST BREW COFFEE TO FIGHT BACK - https://castbrew.com/ Join The Discord Server - https://timcast.com/join-us/ Hang Out With Tim Pool & Crew LIVE At - http://Youtube.com/TimcastIRL Mass EU Power Outage Sparks Fear Of GLOBAL SOLAR DISASTER, Cyberattack RULED OUT Mass EU Power Outage Sparks Fear Of GLOBAL SOLAR DISASTER, Cyberattack RULED OUT