Attack on a computer system
POPULARITY
Categories
Chris Sullivan with a Chokepoint: the I-5 overpass in DuPont is going to finally get done // Luke Duecy with a Tech Talk: a deep look at the threat of cyberattacks from Iran // Todd Gershwin on the Peanuts 75th Anniversary: A Vince Guaraldi Symphonic Concert at Benaroya Hall // Charlie Commentary on the money poured into an odious road project in Seattle // Mike McClanahan with a wrap up of the 2026 legislative session // Gee Scott on early blooms from the state's cherry blossoms and tulips
4. Guest David Shed recommends that President Trump confront Xi Jinpingover economic espionage and cyberattacks during their summit. He emphasizes strengthening ties with India and the Quad to counter China's slowing global economic influence. (4)C1793
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
A cyberattack wake-up call: why inflation, digital risk, and financial system fragility are driving more Americans toward gold and silver.Questions on Protecting Your Wealth with Gold & Silver? Schedule a Strategy Call Here ➡️ https://calendly.com/itmtrading/podcastor Call 866-349-3310
Alleged Canadian 'The Comm' Hacker Arrested, Interpol's Operation Synergia Takedown, Stryker Cyberattack Update and more.. Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst Host David Shipley covers new details on the alleged takedown of "Waifu," a Canadian hacker tied to the cybercrime group The Com, after a harassment campaign against investigator Allison Nixon helped lead to his identification and arrest; he now faces U.S. charges including extortion and unauthorized computer access. The episode also highlights Interpol's six-month Operation Synergia, a major international crackdown that disabled 45,000 malicious IPs and led to 94 arrests across 72 countries, targeting ransomware, phishing, and malware infrastructure. An update on Stryker describes an attack on its Microsoft corporate systems allegedly involving Intune to wipe over 200,000 devices, with Stryker saying connected medical devices and services remain safe while ordering and operations are disrupted. Finally, Poland reports it stopped an attempted hack on its National Center for Nuclear Research that may have Iranian links, though officials caution indicators could be misdirection. 00:00 Sponsor Meter Intro 00:19 Headlines And Welcome 00:50 Calm Hacker Takedown 02:49 Threats Against Researcher 04:21 Unmasking And Arrest 05:46 Interpol Operation Synergy 08:10 Stryker Intune Attack Fallout 12:56 Iran Cyber War Updates 13:43 Poland Nuclear Hack Attempt 16:14 Wrap Up And Thanks 16:52 Sponsor Meter Outro
Timestamps: 0:00 little freeloaders 0:12 Firefox keeping Win7 alive, for a bit 1:31 FBI investigates Steam malware 3:31 Stryker Corporation cyberattack 6:38 QUICK BITS INTRO 6:56 Google Maps update 7:32 GFiber merges with Astound Broadband 8:20 Telus Digital data breach 9:19 Cybertruck FSD lawsuit 10:35 Alexa+ 'Sassy' mode NEWS SOURCES: https://lmg.gg/EURPm Learn more about your ad choices. Visit megaphone.fm/adchoices
Iran boosts cyberattacks VENON targets Brazilian banks England Hockey investigates breach Get links to all the stories in our show notes: https://cisoseries.com/cybersecurity-news-iran-boosts-cyberattacks-venon-targets-brazilian-banks-england-hockey-investigates-breach/ Huge thanks to our sponsor, Dropzone AI If you are heading to RSAC next week, here are three things worth seeing at the Dropzone AI Diner. Booth 455, South Expo Hall. One: watch their AI SOC agents investigate real alerts live, with every reasoning step exposed. Two: meet the AI Threat Hunter, the newest agent joining the team. Three: enter the investigation competition and go head to head against the AI. Schedule your stop at dropzone.ai/rsa-2026-ai-diner.
In this episode of The PDB Afternoon Bulletin: Iran's new supreme leader breaks his silence. Mojtaba Khamenei issues his first message since taking power after the death of his father, declaring the Strait of Hormuz will remain closed and warning that Iran will continue targeting U.S. military bases across the region. The war with Iran may be expanding beyond the battlefield. A major U.S. medical technology company is hit by a suspected Iranian cyberattack that disables thousands of employee phones and laptops, raising concerns that Tehran may be opening a new digital front in the conflict. To listen to the show ad-free, become a premium member of The President's Daily Brief by visiting https://PDBPremium.com. Please remember to subscribe if you enjoyed this episode of The President's Daily Brief. YouTube: youtube.com/@presidentsdailybrief Ridge Wallet: Upgrade your wallet today! Get 10% Off @Ridge with code PDB at https://www.Ridge.com/PDB#Ridgepod StopBox: Get firearm security redesigned and save 10% off @StopBoxUSA with code PDB10 at https://stopboxusa.com/PDB10 #stopboxpod BRUNT Workwear: Get $10 Off at BRUNT with code PDB at https://www.bruntworkwear.com/PDB #Bruntpod Learn more about your ad choices. Visit megaphone.fm/adchoices
The news to know for Thursday, March 12, 2026! We'll tell you about the cost of the war in the Middle East so far, and why law enforcement in California is tightening security. Also, which American company faced a major cyberattack linked to the war, and what Iran's soccer team has decided about the upcoming World Cup in the U.S. Plus, why so many lawmakers are quitting Congress, which popular platform is now the largest media company in the world, and what to expect at this year's South by Southwest, kicking off this week. Those stories and even more news to know in about 10 minutes! Join us every Mon-Fri for more daily news roundups! See sources: https://www.theNewsWorthy.com/shownotes Become an INSIDER to get AD-FREE episodes here: https://www.theNewsWorthy.com/insider Get The NewsWorthy MERCH here: https://thenewsworthy.dashery.com/ Sponsors: Wildgrain is offering our listeners $30 off your first box - PLUS free Croissants for life! - when you go to Wildgrain.com/NEWSWORTHY to start your subscription today. Ready to start learning a new language this spring? Visit https://www.rosettastone.com/newsworthy today to explore Rosetta Stone and choose the language that's right for you. To advertise on our podcast, please reach out to ad-sales@libsyn.com
Atlassian Slashes 1,600 Jobs to ‘Self-Fund’ AI and Enterprise Growth, Microsoft Launches Copilot Health, and Gemini LLM Powers AI System for Global Flash Flood Prediction. MP3 Please SUBSCRIBE HERE for free or get DTNS Live ad-free. A special thanks to all our supporters–without you, none of this would be possible. If you enjoy what youContinue reading "Iran-Linked Cyberattack Hits US Medical Tech Firm Stryker – DTH"
Hackers with ties to Iran have claimed responsibility for a cyberattack at Stryker, a medical device company based in the U.S. Stryker says the attack disrupted global Microsoft networks, but it believes the situation is "contained." CBS News contributor Chris Krebs explains what the attack could mean about escalation in the Iran war and how the partial government shutdown is making an impact. Today's teens and tweens are less independent and spend less time with friends away from their families compared to previous generations, research shows. Dr. Becky Kennedy and Dr. Sheryl Ziegler explain how parents can help their children build independence while also staying connected to them. The fourth contestant eliminated from "Survivor: In the Hands of the Fans" joins "CBS Mornings" to discuss being voted off and playing the game again. John Grisham, who has written 52 bestsellers, reveals the name of his new novel on "CBS Mornings" and talks about how writing about espionage compares to his legal thrillers. To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices
The Unsecurity Podcast is back for our annual discussion with Pinky, FRSecure's Incident Response Manager, to discuss the "Breachmas" season.Breachmas is a time of year or a phenomenon when attackers pull a few more levers available to them—more people on PTO, increased online spending, and general busyness contributing to less focus. The result is an uptick in cyber incidents nearing the end of each calendar year.As the team lead of FRSecure's blue team, Pinky lives and breathes incident handling. Each year, we like to get his perspective on how Breachmas has changed or evolved to stay better informed on how to protect our clients (and ourselves). This is a reflection of what we saw at year-end 2025, along with suggestions moving forward!In this episode, learn about:Resurgence of RansomwareImportance of Conditional AccessTaking a Layered Approach to Security ToolsLogs, Baselining, and Anomaly DetectionEvilGinx and Token Theft AttacksNew This Year: Extortion and AILike, subscribe, and share with your network to stay informed about the latest in cyber and information security!We want to hear from you! Reach out at unsecurity@frsecure.com and follow us for more:LinkedIn: https://www.linkedin.com/company/frsecure/Instagram: https://www.instagram.com/frsecureofficial/Facebook: https://www.facebook.com/frsecure/BlueSky: https://bsky.app/profile/frsecure.bsky.socialAbout FRSecure:https://frsecure.com/FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start or looking for a team of experts to collaborate with you, we are ready to serve.
On this episode, the CU Guys uncover the latest cyber threats, from AI-driven breaches to cloud misconfigurations, that put your data at risk. Learn about real-world examples of high-profile breaches and simple social engineering tricks that can compromise your security. Discover the role of AI and quantum computing in cyberattacks and get practical steps to enhance your defenses. Perfect for cybersecurity professionals and anyone serious about data protection, this episode offers essential insights to stay ahead of cybercriminals. Don't wait for a breach, arm yourself with knowledge and strategies today.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Link to episode page This week's Department of Know is hosted by Sarah Lane with guests John Barrow, CISO, JB Poindexter & Co., and Derek Fisher, Director of the Cyber Defense and Information Assurance Program, Temple University Thanks to our show sponsor, Dropzone AI Here is a number worth knowing before RSAC. The average enterprise SOC sees tens of thousands of alerts a day. Most get triaged. A fraction get thoroughly investigated. The rest sit in the queue or get auto-closed. Dropzone AI puts AI SOC agents on every one of those alerts. Every alert investigated, end to end, across your full tool stack, around the clock. Over 300 deployments in production today. They are at RSAC this year. Booth 455. dropzone.ai/rsa-2026-ai-diner All links and the video of this episode can be found on CISO Series.com
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
U.S. financial firms are on high alert for cyberattacks as the war with Iran escalates, with companies ramping up threat monitoring amid the heightened geopolitical tension. The killing of Iran’s Supreme Leader Ali Khamenei has fueled regional chaos, shaken global markets, and raised fears that Iran‑linked hackers could target America’s financial sector in retaliation. Iran’s spot in the 2026 World Cup is now uncertain, after U.S.–Israeli strikes and the killing of Iran’s supreme leader prompted the country’s soccer chief to say they may not be able to participate. FIFA says it’s too early to comment, while Iran’s games in Los Angeles and Seattle face added complications because Iranian fans are barred from entering the U.S. under a travel ban. Please Like, Comment and Follow 'Philip Teresi on KMJ' on all platforms: --- Philip Teresi on KMJ is available on the KMJNOW app, Apple Podcasts, Spotify, YouTube or wherever else you listen to podcasts. -- Philip Teresi on KMJ Weekdays 2-6 PM Pacific on News/Talk 580 AM & 105.9 FM KMJ | Website | Facebook | Instagram | X | Podcast | Amazon | - Everything KMJ KMJNOW App | Podcasts | Facebook | X | Instagram See omnystudio.com/listener for privacy information.
U.S. financial firms are on high alert for cyberattacks as the war with Iran escalates, with companies ramping up threat monitoring amid the heightened geopolitical tension. The killing of Iran’s Supreme Leader Ali Khamenei has fueled regional chaos, shaken global markets, and raised fears that Iran‑linked hackers could target America’s financial sector in retaliation. Iran’s spot in the 2026 World Cup is now uncertain, after U.S.–Israeli strikes and the killing of Iran’s supreme leader prompted the country’s soccer chief to say they may not be able to participate. FIFA says it’s too early to comment, while Iran’s games in Los Angeles and Seattle face added complications because Iranian fans are barred from entering the U.S. under a travel ban. Please Like, Comment and Follow 'Philip Teresi on KMJ' on all platforms: --- Philip Teresi on KMJ is available on the KMJNOW app, Apple Podcasts, Spotify, YouTube or wherever else you listen to podcasts. -- Philip Teresi on KMJ Weekdays 2-6 PM Pacific on News/Talk 580 AM & 105.9 FM KMJ | Website | Facebook | Instagram | X | Podcast | Amazon | - Everything KMJ KMJNOW App | Podcasts | Facebook | X | Instagram See omnystudio.com/listener for privacy information.
Send a textAlthough discussing the military activities currently taking place in Iran runs the risk or bringing up polarizing political views, the cybersecurity realities simply can't be ignored. And they absolutely have to be discussed. One of these realities is that Iran has a legacy of supporting organizations involved with cyberattacks on networks, infrastructure and companies in Israel and the United States. Companies that utilize industrial control systems. Companies like yours. In light of current events, there is absolutely no question that these groups will escalate their efforts. Although the bombs are falling thousands of miles beyond U.S. borders, know that U.S. manufacturing is a primary target. Historically, many of the groups carrying out these types of cyberattacks were hacktivists or outliers, operating independent of any government or country. They followed their own agenda in realizing personal or political goals. However, as highlighted by the war in Ukraine, these groups have begun to pick sides. They're embracing financial support from nation states and successfully executing attacks meant to shut down, steal data, extort money and/or disrupt critical production or infrastructure operations – regardless of size, sector or location. Thankfully, there are also guys like our guest for today's episode. JP Castellanos is the Director of Threat Intelligence at Binary Defense. Watch/listen as he discusses:The evolving hacktivist community and what recent events could mean for industrial cybersecurity.How manufacturers can prepare and respond to an inevitable uptick in attacks.How IT/OT silos perpetuate these attacks and make manufacturing a more lucrative and appealing target.The motives and operational strategies of state-sponsored Iranian hacker groups.The soft spots in your defenses that these groups take advantage of in targeting the industrial sector.The simple solutions that can have far-reaching and extremely positive impacts on your defenses.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.
NATO Forces Shoot Down Iranian Missile Heading For Turkey, Masked Man With Ammo Arrested Outside Tx AG Paxton's Election Party, Banks Warn Of Cyberattacks And Mucre!h Mo
Industrial operations have spent decades optimizing for safety, reliability, and uptime. Control systems, sensors, and field equipment were designed to be stable and predictable, often isolated from the outside world. Cybersecurity, by contrast, evolved largely in IT environments, on a separate track, with different tools, assumptions, and incentives. That separation is no longer holding. Operational technology is becoming more connected, more digital, and more automated. Sensors stream data to the cloud, vendors require remote access, and AI-driven tools increasingly influence operational decisions. At the same time, cyber threats are moving faster, targeting physical systems with the potential for real-world safety and production impacts. One response is data meshing: combining traditional cyber telemetry with operational data such as vibration, maintenance history, and asset performance to create a richer, more reliable picture of what is really happening inside industrial environments. When these signals are viewed together, anomalies surface faster, false positives drop, and attacks become harder to hide. In this episode, I'm speaking with Ian Bramson, VP of Global Industrial Cybersecurity at Black & Veatch, and Keon McEwen, Head of Solutions Development for Industrial Cybersecurity. We discuss why the old idea of the air gap is fading, how safety and cybersecurity are converging, what data meshing really means in practice, and why points of operational change are the right moment to rethink cyber risk.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Cyber Security Expert Theresa Payton joins Bo and Beth to discuss Anthropic's deal with the Pentagon that fell apart last week as well as the potential for cyber attacks amid rising tensions with Iran. See omnystudio.com/listener for privacy information.
Cyberattacks that used to take months now take minutes. And your defenders still can't keep up.Rob T. Lee, Chief AI Officer of the SANS Institute, and David A. Bray, Chair of the Accelerator at the Stimson Center, explain why AI gives attackers a structural advantage. Attackers don't care if their AI breaks something. Your security team can't take that risk. That asymmetry changes everything.✅ You'll discover:✅ Why attackers will always remove the human in the loop faster than defenders can, and the risk calculus that creates✅ How "death by 1,000 cuts" works: $300 per person times 10,000 targets via SIM farms equals a single ransomware payout✅ The federated learning approach that lets organizations share threat intelligence without exposing their own data or vulnerabilities✅ Why hackers are exploiting AI hallucinations by writing real code libraries for packages that models reliably hallucinate✅ How to identify the right cybersecurity talent: hire for learning velocity and the "fiddling mindset," not static AI credentials✅ Why boards must stop treating cybersecurity as prevention and start rewarding rapid detection and response✅ The pre-compute vs. post-compute distinction for AI agent safety that most executives are missing entirely✅ When autonomous cyber defense will actually be viable (hint: think pilotless planes and robotic surgeons)⏱️ TIMESTAMPS0:00 AI has made "death by 1,000 cuts" attacks scalable0:39 Why the AI security lifecycle matters now2:27 Military history lessons for cyber defense strategy5:00 Federated learning: sharing threat intelligence without exposing data6:48 How incident response must evolve for AI-speed attacks8:05 The human-in-the-loop dilemma: defenders vs. attackers11:37 Distraction attacks: coordinated multi-target campaigns15:37 Autonomous agents as a new attack surface19:44 Hackers weaponizing AI hallucinations against developers22:23 Development velocity as the real "swarm" capability24:20 Perverse incentives: why stopping an attack still counts as failure27:09 Your personal attack surface grew from 3 devices to 5031:22 Protecting AI tool chains from becoming prime targets34:25 Hackathons as the future of cybersecurity hiring36:53 Patterns of life: instrumenting your enterprise for anomaly detection38:18 When will we trust AI defenders without human oversight?41:09 Pre-compute vs. post-compute: where AI agent safety rules must live46:45 AI trust, hallucinations, and prompt injection as information warfare51:42 Building security culture: leadership, not blame
Chrome unveils quantum-safe certificates Vulnerability allowed hijacking Gemini Live UK warns of Iranian cyberattack risks Get the show notes here: https://cisoseries.com/cybersecurity-news-chrome-quantum-safe-certificates-gemini-live-vulnerability-uk-warns-of-iranian-cyberattacks/ Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first security awareness platform built to stop AI-powered social engineering. Today's phishing doesn't just hit inboxes — it can sound like your CFO or look like your CEO on Zoom. AI voices, video, and deepfakes are turning trust into the attack surface. Adaptive fights back with AI-driven risk scoring, deepfake simulations featuring your own executives, and interactive training your team will actually remember. Take a three-minute tour or request a CEO deepfake demo at adaptivesecurity.com.
The US conducted cyberattacks ahead of strikes on Iran, Russia aims for internet independence by 2028, Google finds a new iOS exploit kit in the wild, and Chrome moves to a two-week release cycle. Show notes Risky Bulletin: Cyber Command conducted cyberattacks ahead of Iran strikes
Almost one in five of Ireland's top companies have experienced significant cyber attacks in the last two years, new data shows today. The findings come as national domain registry .IE launches Ireland's first Digital Trust Mark. Described as an NCT for your online identity, websites and emails carrying the distinctive wolfhound symbol will give customers confidence that businesses of all sizes are operating to the highest digital standards. "If you have an online presence, you can now be assessed on DigitalTrust.ie in just a few clicks," said Louise McKeown Doogan, Chief Growth Officer at .IE. "Once an organisation applies, their website, email and domain setup is assessed using a proprietary scoring evaluation that checks against industry-defined best practice. "These checks confirm that digital fundamentals are correctly configured, responsibly managed and set up to support trust and reliability online. "Once you receive your Digital Trust Score, you will either be entitled to carry the mark or you will have clear next steps to reach the required standard. "We live in an age where some ransomware companies now have customer care departments, and the online health of the nation needs to improve as a consequence." The research found that 17pc of Ireland's key organisations have experienced a significant cyber attack since 2024. Conducted by Amárach on behalf of .IE, it surveyed 354 essential Irish firms in January. It follows last week's Garda data that fraud-related crimes more than doubled in the last 12 months, up 137pc – mainly due to bank scams, phishing and smishing. "Our findings are concerning, particularly when we know phishing scams (60pc) and the exploitation of system weaknesses (21.3pc) are the most common ways attackers gain access," said Ms McKeown Doogan. "An online presence that appears to function may not always demonstrate the authenticity and trustworthiness customers expect. "Until now there has been no visible way for consumers to know that a website meets a recognised standard – and no way for businesses or organisations to signal that they do. "The mark signals that they demonstrate authenticity, responsible digital practice and a trustworthy online experience. "We hope it will become a digital equivalent of the NCT and an essential part of interacting online in Ireland within the next year." The Digital Trust Mark is not just for .ie domains but is open to .com and other domains used by Irish organisations. Applicants will receive a grade by the next working day, and if an A-rating is achieved, businesses can display the mark on their website or in their email signature for the following 12 months. Domains that do not reach an A-rating will be given a detailed outline of what and how they can improve. See digitaltrust.ie for more information. More about Irish Tech News Irish Tech News are Ireland's No. 1 Online Tech Publication and often Ireland's No.1 Tech Podcast too. You can find hundreds of fantastic previous episodes and subscribe using whatever platform you like via our Anchor.fm page here: https://anchor.fm/irish-tech-news If you'd like to be featured in an upcoming Podcast email us at Simon@IrishTechNews.ie now to discuss. Irish Tech News have a range of services available to help promote your business. Why not drop us a line at Info@IrishTechNews.ie now to find out more about how we can help you reach our audience. You can also find and follow us on Twitter, LinkedIn, Facebook, Instagram, TikTok and Snapchat.
Podcast: Digitalization Tech TalksEpisode: Episode 62: The hidden phase of industrial cyberattacks and how to spot it earlyPub date: 2026-02-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn the 62nd episode of Digitalization Tech Talks, hosts Jonas Norinder and Don Mack kick off a two‑part series on the evolving state of industrial cybersecurity. They uncover what's really happening inside OT networks long before a cyber incident hits the plant floor including why over 80% of adversary behavior occurs months before impact, why air‑gaps no longer provide real protection, and how legacy vulnerabilities continue to be actively exploited. As guest Adam Robbie puts it “OT security is no longer a hidden problem — it's a visibility problem.” This episode is essential listening for anyone navigating IT/OT convergence, looking for ways to improve industrial defenses, or preparing for emerging cyber risks. The insights come directly from a new white paper supported by a commercial and research partnership between Palo Alto Networks and Siemens, together with Idaho National Labs as the third-party research partner. Show Notes:Research Paper (S4 Conference): Intelligence-Driven Active Defense Report 2026 (https://sie.ag/416Tgm)Website (Palo Alto): OT Security Insights 2025 (https://sie.ag/2ZcgDY)Website (US Department of Energy): Cybersecurity for the Operational Technology Environment (https://sie.ag/5p9z6a)Website (Siemens): Industrial cybersecurity solutions | Siemens (https://sie.ag/4HJ8L4) Contact us:Adam Robbie email (arobbie@paloaltonetworks.com), LinkedIn (https://www.linkedin.com/in/adamrobbie/)Tilo Pinkert email (tilo.pinkert@siemens.com), LinkedIn (https://www.linkedin.com/in/tilopinkert/)Priyanjan Sharma email (priyanjan.sharma@siemens.com), LinkedIn (https://www.linkedin.com/in/priyanjansharma/) Don Mack email (mack.donald@siemens.com)Jonas Norinder email (jonas.norinder@siemens.com)The podcast and artwork embedded on this page are from Siemens, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.
In the 62nd episode of Digitalization Tech Talks, hosts Jonas Norinder and Don Mack kick off a two‑part series on the evolving state of industrial cybersecurity. They uncover what's really happening inside OT networks long before a cyber incident hits the plant floor including why over 80% of adversary behavior occurs months before impact, why air‑gaps no longer provide real protection, and how legacy vulnerabilities continue to be actively exploited. As guest Adam Robbie puts it “OT security is no longer a hidden problem — it's a visibility problem.” This episode is essential listening for anyone navigating IT/OT convergence, looking for ways to improve industrial defenses, or preparing for emerging cyber risks. The insights come directly from a new white paper supported by a commercial and research partnership between Palo Alto Networks and Siemens, together with Idaho National Labs as the third-party research partner. Show Notes:Research Paper (S4 Conference): Intelligence-Driven Active Defense Report 2026 (https://sie.ag/416Tgm)Website (Palo Alto): OT Security Insights 2025 (https://sie.ag/2ZcgDY)Website (US Department of Energy): Cybersecurity for the Operational Technology Environment (https://sie.ag/5p9z6a)Website (Siemens): Industrial cybersecurity solutions | Siemens (https://sie.ag/4HJ8L4) Contact us:Adam Robbie email (arobbie@paloaltonetworks.com), LinkedIn (https://www.linkedin.com/in/adamrobbie/)Tilo Pinkert email (tilo.pinkert@siemens.com), LinkedIn (https://www.linkedin.com/in/tilopinkert/)Priyanjan Sharma email (priyanjan.sharma@siemens.com), LinkedIn (https://www.linkedin.com/in/priyanjansharma/) Don Mack email (mack.donald@siemens.com)Jonas Norinder email (jonas.norinder@siemens.com)
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Ransomware as a service has turned cybercrime into a franchise business — and in this episode, Dr. Mike Saylor and I break down exactly how it works, who's buying, and why the buyer might end up as the patsy.If you thought ransomware was just a lone hacker writing code in a basement, this episode is going to change how you think about it. Ransomware as a service means that today, literally anyone — no technical skills required — can pay someone to launch a ransomware attack on their behalf. You hand over the money, tell them what you want, and sit back and watch your crypto wallet. That's it. No portal. No dashboard. No login. Just a chat on the dark web through the TOR network and a prayer that they actually do what you paid for.Dr. Mike Saylor walks us through the full criminal ecosystem — from the initial access brokers who collect and sell validated email addresses, to the botnet operators who rent out millions of compromised computers by the hour, to the affiliate programs that tie it all together. We cover the franchise model, the "no honor among thieves" reality of these transactions, and why the person who buys into ransomware as a service might just end up as law enforcement's fall guy.This is one of those episodes where the more you learn, the more you realize how much the threat picture has changed — and why your backups are more important than ever.Chapters:00:00:00 - Episode Intro00:01:17 - Introductions & Welcome00:03:25 - Setting the Stage: CryptoLocker and the Birth of a Criminal Industry00:07:17 - Defining Ransomware as a Service: The Franchise Model00:10:36 - The Amazon/AWS Analogy and How Botnets Power the Attacks00:17:10 - No Portal, No Dashboard: How Dark Web Transactions Actually Work00:19:17 - Why Do RaaS Operators Offer the Service? The Lottery Ticket Theory00:21:59 - The Affiliate Model: How the Criminal Ecosystem Specializes00:26:33 - How Many RaaS Groups Exist — and Who's Buying?00:29:36 - RaaS as Subterfuge: The Conti Group and the Costa Rica Attack00:30:49 - Who Are These Criminals, Really?
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
In this episode of Unspoken Security, host AJ Nash sits down with Bob Fabien “BZ” Zinga, a cybersecurity executive and Naval Information Warfare Commander in the U.S. Navy Reserve. They explore how performative leadership shows up in security teams, and why values on a wall fail when pressure hits.BZ argues that optics without accountability kills trust. When leaders bend with politics or budgets, engaged employees go quiet. That silence hides risk. He shares how breaches often trace back to human choices, including a W-2 phishing scam that exposed employees' data and changed his own life. He also pushes blameless postmortems and clear escalation paths.From there, the conversation moves to AI. BZ warns that teams can automate bias and outsource judgment. He calls for guardrails, regulation, and human oversight, especially in high-stakes decisions. He closes with a simple standard: speak up for fairness, even when silence would feel safer.Send a textSupport the show
Rusland hackt het Poolse stroomnetwerk maar Polen houdt de lichten aan en China infiltreert jarenlang telecom providers wereldwijd met 8 jaar oude vulnerabilities. The Telegraph schreeuwt dat Boris Johnson's telefoon gehackt is, maar het verhaal is interessanter én enger - het gaat niet om telefoons maar om de providers zelf. Marco legt uit waarom ISPs de "holy grail" zijn voor spionage (metadata kills people), Jelle neemt het Telegraph-artikel vakkundig uit elkaar en Ronald vertelt waarom één gecompromitteerde provider toegang geeft tot miljoenen klanten. Van TACACS+ traffic capture tot GRE tunnels, van Cisco Guest Shell containers tot BGP routing manipulatie - dit is "one of the more successful campaigns in the history of espionage" en het had voorkomen kunnen worden door gewoon te patchen. AIVD en MIVD tekenden mee op de advisory, dus ja, dit raakt ook Nederland. Bronnen Sandworm Poland Power Grid - SecurityWeek: "Russian Sandworm Hackers Blamed for Cyberattack on Polish Power Grid" (23 jan 2026): https://www.securityweek.com/russian-sandworm-hackers-blamed-for-cyberattack-on-polish-power-grid/ Salt Typhoon - Telecom Espionage - The Telegraph: "China hacked Downing Street phones for years" (27 jan 2026): https://www.telegraph.co.uk/news/2026/01/26/china-hacked-downing-street-phones-for-years/ - AIVD/MIVD: "Nederlandse providers doelwit van Salt Typhoon": https://www.aivd.nl/actueel/nieuws/2025/08/28/nederlandse-providers-doelwit-van-salt-typhoon - Joint Cybersecurity Advisory: CISA/NSA/FBI/NCSC-UK/AIVD/MIVD + 15 landen - "Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide" - CVE-2024-21887: Ivanti Connect Secure command injection - CVE-2024-3400: Palo Alto Networks GlobalProtect RCE - CVE-2023-20198 & CVE-2023-20273: Cisco IOS XE authentication bypass + privilege escalation - CVE-2018-0171: Cisco IOS Smart Install RCE (8 jaar oud!)
Bill Thompson is a retired Chief Warrant Officer 4. He is also a former Cyber Network Operations advisor and program evaluator at DARPA with experience in the fields of AI, Signals, and Human Intelligence. He is also the founder of the Spartan Forge hunting app: https://spartanforge.ai/ Change Agents is an IRONCLAD Original Chapters: (01:03) What Is DARPA? (05:58) Drone Warfare Ukraine (13:20) The Dangers of Terrorists Using Drones (16:50) Smartphone Surveillance in the Maduro Raid (26:00) Using the Internet in Authoritarian Countries (31:50) Spying on Cell Phones and Stealing Data (36:50) Choosing Targeted People to Spy On (39:35) The Vulnerability of Infrastructure to Cyberattacks (46:35) How Can You Protect Your Data? Subscribe: Subscribe on Apple Podcasts: https://podcasts.apple.com/us/podcast/change-agents-with-andy-stumpf/id1677415740 Subscribe on Spotify: https://open.spotify.com/show/3SKmtN55V2AGbzHDo34DHI?si=5aefbba9abc844ed Sponsors: Firecracker Farm Use code IRONCLAD to get 15% off your first order at https://firecracker.farm/ GHOSTBED: Go to https://www.GhostBed.com/CHANGEAGENTS and use code CHANGEAGENTS for an extra 15% off sitewide. Norwood Sawmills: Learn more about Norwood Sawmills and how you can start milling your own lumber at https://norwoodsawmills.com/ Learn more about your ad choices. Visit megaphone.fm/adchoices
For more on this Technology Correspondent Brian O'Donovan.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
In this episode of Unspoken Security, host AJ Nash sits down with Galya Westler, Co-Founder and CEO at HumanBeam. They explore how advances in AI, digital identity, and holographic technology are reshaping the way organizations interact with people—while raising tough questions about privacy, ownership, and trust.Galya shares how her work began in health technology, connecting patients to care during pandemics, and evolved into building secure, lifelike AI avatars for real-world use. She explains why protecting personal likeness and voice matters more than ever, especially as AI tools become more convincing and accessible. Galya stresses the need for consent, encryption, and clear boundaries to keep digital identities safe and organizations accountable.Together, AJ and Galya dig into the risks and rewards of merging human presence with AI. They discuss how thoughtful design and strong security practices can support experts instead of replacing them, and why education and authenticity are key as we build a future where technology and humanity work side by side.Send us a textSupport the show
Coupang CEO questioned by police regarding data breach probe Cyberattack on large Russian bread factory disrupts deliveries Real estate agents in Australia use apps that leave lease documents at risk Get the show notes here: https://cisoseries.com/cybersecurity-news-police-question-coupang-ceo-russia-bakery-cyberattack-australian-real-estate-scandal/ Huge thanks to our sponsor, Strike48 Strike48 is the Agentic Log Intelligence Platform that actually puts AI agents to work, maximizing log visibility without blowing your budget. Find threats your siloed tools miss. Get started today with pre-built AI agents and workflows that investigate, detect, and respond 24/7 or build your own at strike48.com/security.
As food retailers work to digitize and enhance their logistics and supply networks, they're becoming more exposed to cybersecurity risks. In this episode, we discuss how a wave of recent cyberattacks has exposed vulnerabilities across the sector — how prepared companies really are, and why investors may want to sit up and take notice.Host: Gabriela de la Serna, MSCI Research & DevelopmentGuest: Cole Martin, MSCI Research & Development
(Presented by Material Security: We protect your company's most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.) Three Buddy Problem - Episode 83: Poland's CERT documents a rare, explicit wiper attack on civilians in a NATO country, including detailed attribution of a Russian government op targeting the electric grid in the heart of winter. We examine why this crosses a long-avoided threshold, why attribution suddenly matters again, and what it says about pre-positioned access, vendor insecurity, and the shrinking gap between cyber operations and acts of war. Plus, another Fortinet fiasco, a new batch of Ivanti zero-days under attack, an emergency patch from Microsoft and the return of the mysterious KasperSekrets account. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
In this week's show, Patrick Gray and Adam Boileau discuss the week's cybersecurity news, joined by a special guest. BBC World Cyber Correspondent Joe Tidy is a long time listener and he pops in for a ride-along in the news segment plus a chat about his new book. This week news includes: Did the US cyber Venezuela's power grid, or do they just want us to think they coulda? US govt might boycott the RSAC Conference ‘cause Jen Easterly being CEO makes them mad MS Patch Tuesday fixes CVSS5.5 bug and … stops you shutting down Wiz pulls off cloud stunt hack that ends with control of everyone's AWS console Millions of Bluetooth devices that use Google's Fast Pairing will pair with anyone, any time GNU inet-tools' telnetd parties like it's 2007, and brings -f root unauthed remote login back Thinkst is this week's sponsor, and long time friend of the show Haroon Meer joins. As always they're polishing their Canary tokens - adding breadcrumbs to lead you to them - but they're also a bunch of giant nerds who now run South Africa's Computer Olympiad. This episode is also available on Youtube. Show notes Cyberattack in Venezuela Demonstrated Precision of U.S. Capabilities - The New York Times Why I'm withholding certainty that “precise” US cyber-op disrupted Venezuelan electricity - Ars Technica Layered Ambiguity: US Cyber Capabilities in the Raid to Extract Maduro from Venezuela | Royal United Services Institute Former CISA Director Jen Easterly Will Lead RSAC Conference | WIRED Trump officials consider skipping premier cyber conference after Biden-era cyber leader named CEO - Nextgov/FCW Federal agencies ordered to patch Microsoft Desktop Windows Manager bug | The Record from Recorded Future News Windows 11 shutdown bug forces Microsoft into damage control • The Register CodeBreach: Supply Chain Vuln & AWS CodeBuild Misconfig | Wiz Blog Critical flaw in AWS Console risked compromise of build environment | Cybersecurity Dive Never-before-seen Linux malware is “far more advanced than typical” - Ars Technica VoidLink: Evidence That the Era of Advanced AI-Generated Malware Has Begun - Check Point Research Hundreds of Millions of Audio Devices Need a Patch to Prevent Wireless Hacking and Tracking | WIRED Critical flaw in Fortinet FortiSIEM targeted in exploitation threat | Cybersecurity Dive CVE-2025-64155: 3 Years of Remotely Rooting the FortiSIEM A single click mounted a covert, multistage attack against Copilot - Ars Technica Police raid homes of alleged Black Basta hackers, hunt suspected Russian ringleader | The Record from Recorded Future News Jordanian initial access broker pleads guilty to helping target 50 companies | The Record from Recorded Future News Supreme Court hacker posted stolen government data on Instagram | TechCrunch oss-sec: GNU InetUtils Security Advisory: remote authentication by-pass in telnetd How crypto criminals stole $700 million from people - often using age-old tricks Ctrl + Alt + Chaos: How Teenage Hackers Hijack the Internet
Tim, Phil, Ian & Tate are joined by Arynne Wexler to discuss a potentially developing war with Iran, people betting on the chances of the Islamic Republic collapsing, silver prices skyrocketing and fluctuating and nationwide Verizon outages plunging the country into disarray. Hosts: Tim @Timcast (everywhere) Phil @PhilThatRemains (X) Ian @IanCrossland (X) Tate @realTateBrown (everywhere) Producer: Serge @SearchDupre (X) Guest: Arynne Wexler @ArynneWexler (X)
In this episode, Chris and Hector dig into how cyber operations are no longer a background activity but a core part of modern conflict. They break down reported US cyber actions tied to operations in Venezuela, Chinese state sponsored email intrusions targeting congressional staff, and the global scam economy built on human trafficking and crypto fraud. Join our new Patreon! https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com
Jaguar Land Rover reveals the fiscal results of last year's cyberattack. A Texas gas station chain suffers a data spill. Taiwan tracks China's energy-sector attacks. Google and Veeam push patches. Threat actors target obsolete D-Link routers. Sedgwick Government Solutions confirms a data breach. The U.S. Cyber Trust Mark faces an uncertain future. Google looks to hire humans to improve AI search responses. Our guest is Deepen Desai, Chief Security Officer of Zscaler, discussing what's powering enterprise AI in 2026. AI brings creative cartography to the weather forecast. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On today's Industry Voices, we are joined by Deepen Desai, Chief Security Officer of Zscaler, discussing what's powering enterprise AI in 2026. To learn more on this topic, be sure to check out Zscaler's report here. Listen to the full conversation here. Selected Reading Jaguar Land Rover wholesale volumes plummet 43% in cyberattack aftermath (The Register) Major Data Breach Hits Company Operating 150 Gas Stations in the US (Hackread) Taiwan says China's attacks on its energy sector increased tenfold (Bleeping Computer) Google Patches High-Severity Chrome WebView Flaw CVE-2026-0628 in the Tag Component (Tech Nadu) Several Code Execution Flaws Patched in Veeam Backup & Replication (SecurityWeek) New D-Link flaw in legacy DSL routers actively exploited in attacks (Bleeping Computer) Sedgwick confirms breach at government contractor subsidiary (Bleeping Computer) FCC Loses Lead Support for Biden-Era IoT Security Labeling (GovInfoSecurity) Google Search AI hallucinations push Google to hire "AI Answers Quality" engineers (Bleeping Computer) ‘Whata Bod': An AI-generated NWS map invented fake towns in Idaho (The Washington Post) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices