Podcasts about cyberattacks

Attack on a computer system

  • 2,743PODCASTS
  • 6,882EPISODES
  • 31mAVG DURATION
  • 2DAILY NEW EPISODES
  • Sep 2, 2025LATEST
cyberattacks

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about cyberattacks

Show all podcasts related to cyberattacks

Latest podcast episodes about cyberattacks

Silicon Curtain
802. Russia's New Total War - From Child Abduction to Cyber Attacks and Drones to Disinformation

Silicon Curtain

Play Episode Listen Later Sep 2, 2025 63:52


Dr Robert Seely MBE was a British Conservative Party politician who served as the Member of Parliament (MP) for the Isle of Wight from 2017 until the constituency was split in two in 2024. Seely is a former journalist and soldier. From 1990 to 1995, he worked as a foreign correspondent in the last year of the USSR and in post-Soviet states. From 2008 to 2017, he served in the British Armed Forces in the Iraq, Afghanistan, Libya and ISIS campaigns. Seely has been a research associate at the Changing Character of War Programme at the University of Oxford. Today we're going to be exploring his unique definition of Russian hybrid war, and highly impactful book: The New Total War: From Child Abduction to Cyber Attacks and Drones to Disinformation – Russia's Conflict with Ukraine and the West. ----------Partner on this video: KYIV OF MINE 'Kyiv of Mine' is a documentary series about Ukraine's beautiful capital, Kyiv. The film production began in 2018, and much has changed since then. It is now 2025, and this story is far from over.https://www.youtube.com/@UCz6UbVKfqutH-N7WXnC5Ykg https://www.kyivofmine.com/#theprojectKyiv of Mine is fast paced, beautifully filmed, humorous, fun, insightful, heartbreaking, moving, hopeful. The very antithesis in fact of a doom-laden and worthy wartime documentary. This is a work that is extraordinarily uplifting. My friend Operator Starsky says the film is “Made with so much love. The film series will make you laugh and cry.” ----------LINKS:https://www.amazon.co.uk/New-Total-War-Abduction-Disinformation/dp/1785909487https://x.com/IoWBobSeelyhttps://www.rusi.org/people/seelyhttps://en.wikipedia.org/wiki/Bob_Seelyhttps://www.linkedin.com/in/dr-robert-seely-mbe-10304468/?originalSubdomain=ukhttps://kclpure.kcl.ac.uk/portal/en/persons/bob-seely----------SILICON CURTAIN FILM FUNDRAISERA project to make a documentary film in Ukraine, to raise awareness of Ukraine's struggle and in supporting a team running aid convoys to Ukraine's front-line towns.https://buymeacoffee.com/siliconcurtain/extras----------SILICON CURTAIN LIVE EVENTS - FUNDRAISER CAMPAIGN Events in 2025 - Advocacy for a Ukrainian victory with Silicon Curtainhttps://buymeacoffee.com/siliconcurtain/extrasOur events of the first half of the year in Lviv, Kyiv and Odesa were a huge success. Now we need to maintain this momentum, and change the tide towards a Ukrainian victory. The Silicon Curtain Roadshow is an ambitious campaign to run a minimum of 12 events in 2025, and potentially many more. Any support you can provide for the fundraising campaign would be gratefully appreciated. https://buymeacoffee.com/siliconcurtain/extrasWe need to scale up our support for Ukraine, and these events are designed to have a major impact. Your support in making it happen is greatly appreciated. All events will be recorded professionally and published for free on the Silicon Curtain channel. Where possible, we will also live-stream events.https://buymeacoffee.com/siliconcurtain/extras----------SUPPORT THE CHANNEL:https://www.buymeacoffee.com/siliconcurtainhttps://www.patreon.com/siliconcurtain----------TRUSTED CHARITIES ON THE GROUND:Save Ukrainehttps://www.saveukraineua.org/Superhumans - Hospital for war traumashttps://superhumans.com/en/UNBROKEN - Treatment. Prosthesis. Rehabilitation for Ukrainians in Ukrainehttps://unbroken.org.ua/Come Back Alivehttps://savelife.in.ua/en/Chefs For Ukraine - World Central Kitchenhttps://wck.org/relief/activation-chefs-for-ukraineUNITED24 - An initiative of President Zelenskyyhttps://u24.gov.ua/Serhiy Prytula Charity Foundationhttps://prytulafoundation.orgNGO “Herojam Slava”https://heroiamslava.org/kharpp - Reconstruction project supporting communities in Kharkiv and Przemyślhttps://kharpp.com/NOR DOG Animal Rescuehttps://www.nor-dog.org/home/----------

City Cast Las Vegas
The Statewide Cyberattack, the Problem with a New Airport, and the A's Plan a Vegas Vacation

City Cast Las Vegas

Play Episode Listen Later Aug 29, 2025 36:30


As the week wraps up, the fallout from the cyberattack that downed state government systems from Medicaid to the DMV continues to impact Nevadans — so why didn't Governor Lombardo show up at the first press briefing about it, and did his appearance yesterday give us any more answers? Co-hosts Sarah Lohman and Dayvid Figler chat with Nevada Current editor April Corbin Girnus about the political implications of the attack, as well as why plans for the new airport by Jean are facing criticism from environmentalists, and whether the A's upcoming six-game stint at the Las Vegas Ballpark makes us feel more or less hopeful about their arrival. If you need an update on the restoration of government services call 2-1-1 or go to oem.nv.gov/recovery. Learn more about the sponsors of this August 29th episode: Woven Want to get in touch? Follow us @CityCastVegas on Instagram, or email us at lasvegas@citycast.fm. You can also call or text us at 702-514-0719. For more Las Vegas news, make sure to sign up for our morning newsletter, Hey Las Vegas. Learn more about becoming a City Cast Las Vegas Neighbor at membership.citycast.fm. Looking to advertise on City Cast Las Vegas? Check out our options for podcast and newsletter ads at citycast.fm/advertise.

HPE Tech Talk
Can we build technology today to defend against the threats of tomorrow?

HPE Tech Talk

Play Episode Listen Later Aug 28, 2025 22:44


Can we build technology today to defend against the threats of tomorrow? This week, Technology Now concludes a double episode on post quantum cryptography and explores the subject of firmware, why it's imperative that it be protected against quantum attacks and why a simple update can't solve every problem. Nigel Edwards, Director of the Security Lab at HPE Labs, tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations.About Nigel: https://www.linkedin.com/in/nigel-edwards-170591/?originalSubdomain=ukSources: https://www.theatlantic.com/technology/archive/2016/01/the-long-and-winding-history-of-encryption/423726/https://www.theqrl.org/blog/history-of-cryptography-behind-the-code-episode-1/https://www.theguardian.com/science/2025/may/07/todays-ai-can-crack-second-world-war-enigma-code-in-short-order-experts-say

Cybercrime Magazine Podcast
Cybercrime Wire For Aug. 28, 2025. Cyberattack Strikes Jamaican Gov't Agency. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 28, 2025 1:22


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

RNZ: Nine To Noon
Tech: Phishing, Operation Serengeti, Insider's kill switch

RNZ: Nine To Noon

Play Episode Listen Later Aug 27, 2025 19:19


Tech commentator Tony Grasso joins Kathryn to talk about the big news in the cyber-crime world.

TV4Nyheterna Radio
"Cyberattack mot kommunsystem – känslig info kan ha läckt"

TV4Nyheterna Radio

Play Episode Listen Later Aug 26, 2025 1:14


Nyheterna Radio 13.00

Cyber Security with Bob G
Cyberattack Time Bomb - Outdated Government Systems Put Us All at Risk

Cyber Security with Bob G

Play Episode Listen Later Aug 25, 2025 5:37


Video - https://youtu.be/ABS8GWiDmt4America's most critical systems are running on technology older than your first flip phone—and hackers know it. Ransomware is rising, courts have already been hit, and our national security is running on borrowed time. How did we get here, and why is it so dangerous?I used ChatGPT 5, ScreenPal, and Pictory.ai to put this information together.If you're interested in trying Pictory.ai please use the following link. https://pictory.ai?ref=t015o

HPE Tech Talk
How are governments reacting to the threat of quantum computers?

HPE Tech Talk

Play Episode Listen Later Aug 21, 2025 20:31


Why do quantum computers pose a threat to governments? This week Technology Now starts a two part dive into quantum computing. In this first episode, we ask: how are governments preparing to mitigate the threat posed by a hypothetical quantum computer which could be invented. Ken Rich, Federal CTO at HPE tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations.About Ken Rich:https://www.linkedin.com/in/kenrich111/Sources:https://www.ncsc.gov.uk/whitepaper/next-steps-preparing-for-post-quantum-cryptographyhttps://www.britannica.com/technology/quantum-computerhttps://www.livescience.com/technology/computing/history-of-quantum-computing-key-moments-that-shaped-the-future-of-computingShor, Peter W.. “Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer.” SIAM Rev. 41 (1995): 303-332.P. W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring," Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 1994, pp. 124-134, doi: 10.1109/SFCS.1994.365700.https://www.newscientist.com/article/2399246-record-breaking-quantum-computer-has-more-than-1000-qubits/

Unspoken Security
Communication Strategies for Data Driven Leaders

Unspoken Security

Play Episode Listen Later Aug 21, 2025 60:59


Data alone does not persuade. For data-driven leaders, learning totranslate numbers into a compelling narrative is a critical skill. In thisepisode of Unspoken Security, host AJ Nash speaks with Salvatore Manzi, aleadership communications coach, about the strategies technical leaderscan use to create influence. Salvatore explains why leaders must learn tomake meaning over metrics to connect with teams, stakeholders, andcustomers.Salvatore shares practical frameworks to improve communication. Heintroduces the "You then me" principle, which prioritizes acknowledging the other person's view to build rapport. He also shows how using simplemetaphors and a little appreciation can make complex dataunderstandable. These techniques disarm a room before you need tocorrect someone or present a counter-argument, ensuring your message lands effectively.The conversation also covers imposter syndrome and the uniquecommunication hurdles women face in the tech industry. AJ and Salvatorediscuss the power of authenticity and the need for allies who activelyamplify other voices. They explore how simple shifts in body language andmindset can build the confidence needed to overcome these challenges and ensure your voice is heard.Send us a textSupport the show

Cybercrime Magazine Podcast
Cybercrime Wire For Aug. 21, 2025. 850K Belgian Users Hit By Orange Cyberattack. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 21, 2025 1:13


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Black Hills Information Security
Cyberattack Bricks Speed Cameras – 2025-08-18

Black Hills Information Security

Play Episode Listen Later Aug 20, 2025 58:10


Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — The gif that keeps on giffing01:46 - Cyberattack Bricks Speed Cameras – BHIS - Talkin' Bout [infosec] News 2025-08-1802:39 - Story # 1: Perplexity made a sky-high $34.5 billion bid for Google Chrome — a bold and unusual move in the midst of antitrust scrutiny07:16 - Story # 2: Exclusive: US embeds trackers in AI chip shipments to catch diversions to China, sources say10:22 - Story # 3: How we found TeaOnHer spilling users' driver's licenses in less than 10 minutes12:17 - Story # 4: Cisco discloses maximum-severity defect in firewall software13:56 - Story # 5: Data Dump From APT Actor Yields Clues to Attacker Capabilities19:13 - Story # 6: Russian cyberattack in the Netherlands leaves speed cameras offline indefinitely23:30 - Story # 7: HTTP/2 MadeYouReset Vulnerability Enables Massive DDoS Attacks24:51 - Story # 8: LAPD Eyes ‘GeoSpy', an AI Tool That Can Geolocate Photos in Seconds29:05 - Story # 9: Manpower discloses data breach affecting nearly 145,000 people34:51 - Story # 10: Hacker Offers to Sell 15.8 Million Plain-Text PayPal Credentials On Dark Web Forum35:34 - Story # 11: The First Federal Cybersecurity Disaster of Trump 2.0 Has Arrived40:54 - Story # 12: New Clever Phishing Attack Uses Japanese Character “ん” to Mimic Forward Slash “/”46:28 - Story # 13: Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild48:13 - Story # 14: Plex warns users to patch security vulnerability immediately50:53 - ChickenSec: Noble Foods using soil mapping technology at organic egg farm

Thales Security Sessions
Behind the Shield - How AI Is Fighting Off Cyberattacks

Thales Security Sessions

Play Episode Listen Later Aug 19, 2025 19:54


The next wave of cyberattacks won't be launched by humans alone, and neither will the defense. As Distributed Denial-of-Service (DDoS) attacks grow in scale and frequency, machine learning and large language models (LLMs) are stepping into the front lines. But how effective are they? What trade-offs exist between accuracy, speed, and risk? And how close are we to autonomous defense systems? In this episode, Steve Prentice speaks with Johnathan Azaria, machine learning platform lead at Thales, who offers a rare behind-the-scenes look at how AI is being used today, and what's coming next.

Business Daily
Is cybercrime the biggest threat to business?

Business Daily

Play Episode Listen Later Aug 18, 2025 17:28


Cyberattacks are on the rise, with retail, banking, and airline industries all targeted in recent months. The cost to the economy is huge and thought to be worth billions of dollars. As businesses scramble to stay secure, we investigate the ransomware gangs behind the breaches and the experts working to stop them. If you'd like to get in touch with the programme, please email us at businessdaily@bbc.co.ukPresenter: Sam Gruet Producer: Megan Lawton(Picture: Back of hacker sitting in front of some computer screens. Credit: Getty Images)

Cyber Security Headlines
Cisco firewall warning, Colt Telecom cyberattack, CISA's OT request

Cyber Security Headlines

Play Episode Listen Later Aug 18, 2025 7:49


Cisco warns of maximum-severity defect in firewall software UK's Colt Telecom suffers cyberattack CISA implores OT environments to lock down critical infrastructure Huge thanks to our sponsor, Conveyor Have you been personally victimized by portal security questionnaires? Conveyor is here to help. Endless clicks, bad navigation, and expanding questions stacked like Russian nesting dolls, all add up to hours of your life you'll never get back. With Conveyor's AI-powered browser extension, you can open a portal questionnaire, scan for questions, and watch it auto-populate your answers back into the portal without the copy and paste. See how at www.conveyor.com Find the stories behind the headlines at CISOseries.com.

Cybercrime Magazine Podcast
Cybercrime Wire For Aug. 15, 2025. Cyberattack Strikes French FinTech Linedata. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 15, 2025 1:26


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

ITSPmagazine | Technology. Cybersecurity. Society
Data Kidnapping: Because File Encryption Is So 2020 | A Brand Story with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler | A Black Hat USA 2025 Conference On Location Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 14, 2025 21:11


At Black Hat USA 2025, Sean Martin, co-founder of ITSPmagazine, sat down with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, to discuss the findings from the company's latest ransomware report. Over the past five years, the research has tracked how attack patterns, targets, and business models have shifted—most notably from file encryption to data theft and extortion.Brett explains that many ransomware groups now find it more profitable—and less risky—to steal sensitive data and threaten to leak it unless paid, rather than encrypt files and disrupt operations. This change also allows attackers to stay out of the headlines and avoid immediate law enforcement pressure, while still extracting massive payouts. One case saw a Fortune 50 company pay $75 million to prevent the leak of 100 terabytes of sensitive medical data—without a single file being encrypted.The report highlights variation in attacker methods. Some groups focus on single large targets; others, like the group “LOP,” exploit vulnerabilities in widely used file transfer applications, making supply chain compromise a preferred tactic. Once inside, attackers validate their claims by providing file trees and sample data—proving the theft is real.Certain industries remain disproportionately affected. Healthcare, manufacturing, and technology are perennial top targets, with oil and gas seeing a sharp increase this year. Many victims operate with legacy systems, slow to adopt modern security measures, making them vulnerable. Geographically, the U.S. continues to be hit hardest, accounting for roughly half of all observed ransomware incidents.The conversation also addresses why organizations fail to detect such massive data theft—sometimes hundreds of gigabytes per day over weeks. Poor monitoring, limited security staffing, and alert fatigue all contribute. Brett emphasizes that reducing exposure starts with eliminating unnecessary internet-facing services and embracing zero trust architectures to prevent lateral movement.The ransomware report serves not just as a data source but as a practical guide. By mapping observed attacker behaviors to defensive strategies, organizations can better identify and close their most dangerous gaps—before becoming another statistic in next year's findings.Learn more about Zscaler: https://itspm.ag/zscaler-327152Note: This story contains promotional content. Learn more.Guest:Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, | On LinkedIn: https://www.linkedin.com/in/brett-stone-gross/ResourcesLearn more and catch more stories from Zscaler: https://www.itspmagazine.com/directory/zscalerLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-storyKeywords: sean martin, brett stone-gross, ransomware, data extortion, cyber attacks, zero trust security, threat intelligence, data breach, cyber defense, network security, file transfer vulnerability, data protection, black hat, black hat usa 2025, zscaler

Cybercrime Magazine Podcast
Cybercrime Wire For Aug. 14, 2025. Cyberattack Strikes Pennsylvania AG Systems. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 14, 2025 1:11


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cyber Security Headlines
Fortinet SSL VPNs getting hammered, The Netherlands critical infrastructure compromise, Africa the most targeted for cyber attacks

Cyber Security Headlines

Play Episode Listen Later Aug 13, 2025 7:26


The hits just keep on coming Where's the Little Dutch Boy when you need him? I felt the ransomware down in Africa Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines Find the stories behind the headlines at CISOseries.com

The Nonprofit Show
Is Your Nonprofit Already Hacked? The Truth About Pen Testing

The Nonprofit Show

Play Episode Listen Later Aug 13, 2025 29:32


Has your nonprofit ever had a simulated break-in to test your digital defenses? If not, you may already have an intruder inside!Cyberattacks aren't just happening to big corporations—they're happening to nonprofits every day. And far too many organizations have no idea they've been breached until months later. Cybersecurity expert Michael Nouguier, Partner of Cybersecurity Services at Richey May, pulls back the curtain on the urgent, often-overlooked practice of penetration testing—known as “pen testing.” His message is blunt: if your nonprofit hasn't done one, you may already be compromised.Michael explains that a pen test is essentially a real-world simulation of a cyberattack, conducted by ethical hackers to expose weaknesses before malicious actors exploit them. “It's like hiring a home inspector before you buy a house,” he says, “but instead of finding leaky pipes, we're finding the digital doors and windows you've accidentally left wide open.” These gaps can exist in email, donor databases, websites, payment systems—anywhere sensitive information lives.The process starts with scoping—identifying your organization's tech environment, third-party tools, and data flows. From there, ethical hackers gather open-source intelligence (OSINT) to see what information about your nonprofit is publicly available, then attempt to exploit any vulnerabilities found. This may involve phishing attempts, network access attempts, or probing for weaknesses in online applications. Post-exploitation, the team determines how far they can move within your systems—accessing donor records, financial data, or confidential client files.The findings are compiled into a detailed report, along with a letter of assessment that can be shared with insurers or contractual partners. In many industries, including healthcare, justice, and education, annual pen testing isn't optional—it's required by regulation or by contract. Yet, as Michael warns in this episode, many nonprofits sign agreements without realizing they're agreeing to perform such tests.Waiting too long is costly. IBM research shows that proactive security measures can save organizations over $200,000 per breach. On the flip side, skipping pen testing can raise your cyber insurance premiums—or get your coverage denied entirely. And because updates, new software, and staffing changes continually introduce new risks, pen testing isn't a one-and-done task—it's an annual checkup for your organization's digital health.Michael also touches on the human factor. When testing social engineering risks, you often don't alert staff in advance—because real attackers certainly won't. The goal is to create realistic conditions, not staged ones.This conversation should serve as a wake-up call: penetration testing is not an optional luxury—it's a frontline defense. Whether you hold donor payment information, confidential case files, or sensitive program data, you can't afford to leave your cybersecurity to chance.Find us Live daily on YouTube!Find us Live daily on LinkedIn!Find us Live daily on X: @Nonprofit_ShowOur national co-hosts and amazing guests discuss management, money and missions of nonprofits! 12:30pm ET 11:30am CT 10:30am MT 9:30am PTSend us your ideas for Show Guests or Topics: HelpDesk@AmericanNonprofitAcademy.comVisit us on the web:The Nonprofit Show

Tech Tent
Dealing with cyber attacks

Tech Tent

Play Episode Listen Later Aug 12, 2025 26:29


Singapore is experiencing an increase in cyber threats, and its critical infrastructure was targeted in a cyber attack. We speak to the country's Commissioner of Cybersecurity.Also in Tech Life this week: we hear the real voice of a fake spokesperson for a synthetic band. And presenter Zoe Kleinman has a mini tech adventure involving social media and a metal detectorist.You can contact us by emailing techlife@bbc.co.uk or send us a Whatsapp message or voice memo on +44 330 1230 320. Please include your name and where you live.Presenter: Zoe Kleinman Producer: Tom Quinn Editor: Monica SorianoImage: Hands are held over a computer keyboard as screens display computer data. Credit: Getty Images.

Cybercrime Magazine Podcast
Cybercrime Wire For Aug. 12, 2025. Cyberattack Hits Major Russian ISP Filanko. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 12, 2025 1:18


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Rental Property Owner & Real Estate Investor Podcast
He Hacks Before the Criminals Can—Cybersecurity Tips for Real Estate Investors with Jeremiah Baker

Rental Property Owner & Real Estate Investor Podcast

Play Episode Listen Later Aug 11, 2025 41:35


Cyberattacks are happening every 40 seconds in the U.S.—and real estate investors are becoming prime targets. From wire fraud to ransomware, these scams can drain six-figure sums without warning, often before victims even realize they've been hit. Jeremiah Baker is an ethical hacker with 17 years of experience breaking into systems before the bad guys do. He's been called in after major wire transfers vanish without a trace, sits on Stanford's cybersecurity advisory board, and has inspired TV shows like Homeland and Burn Notice with his work. In this episode, Jeremiah reveals how cybercriminals are targeting real estate investors today—and what you need to do right now to avoid becoming their next victim. Find out more: https://confessionsofahacker.com https://www.linkedin.com/in/jeremiahbaker ---------- Today's episode is brought to you by Green Property Management, managing everything from single family homes to apartment complexes in the West Michigan area. https://www.livegreenlocal.com And RCB & Associates, helping Michigan-based real estate investors and small business owners navigate the complex world of health insurance and Medicare benefits. https://www.rcbassociatesllc.com

MPR News Update
St. Paul to begin restoring online systems this week following cyberattack

MPR News Update

Play Episode Listen Later Aug 11, 2025 6:27


The city of St. Paul expects to begin putting its systems back online this week, after a cyberattack forced it to shut down its network for more than two weeks. St. Paul officials said Saturday night that the attack was a ransomware attack, adding that they've refused to pay the ransom and haven't found evidence of data theft. Minnesota state government took in less revenue than it was expecting in July — the first time that's happened since January.This is an MPR News Evening update, hosted by Elena See. Theme music is by Gary Meister.  Subscribe on Apple Podcasts, Spotify, YouTube or RSS. 

MPR News Update
Corrections officer attacked at Rush City state prison. St. Paul releases details about cyberattack

MPR News Update

Play Episode Listen Later Aug 11, 2025 5:37


A prisoner attacked a corrections officer at a state prison in Rush City over the weekend. Corrections officials say an inmate stabbed an officer with a homemade knife. The guard suffered a puncture wound and was taken to a hospital with non-life-threatening injuries and was treated and released. The inmate is serving a life sentence for murder and has been transferred to a maximum security prison.The City of St. Paul has released details about a cyberattack that began more than two weeks ago. The city shut down its computer network, which included internet access at libraries, as a preventative measure.Some state lawmakers are vowing to drop political dialogue that could incite violence. A committee updating statewide K-12 health education standards is moving forward with revisions. More than 3,000 people attended CannaCon over the weekend, a cannabis convention in St. Paul with vendors looking to enter Minnesota's new cannabis market. The Minnesota Department of Natural Resources' spring waterfowl population count is in. The count was mixed: some species increased in numbers, others fell. The state's population of blue-winged teal dropped 60 percent from a year ago, likely due to drought conditions in the southern part of the state.

Cyber Security Today
Cyber Attacks, Jailbreaking GPT-5, and Hacker Summer Camp 2025 Highlights

Cyber Security Today

Play Episode Listen Later Aug 11, 2025 14:34 Transcription Available


In today's episode of Cybersecurity Today, host David Shipley covers critical updates on recent cyber attacks and breaches impacting the US Federal judiciary's case management systems, and SonicWall firewall compromises. He also discusses researchers' new jailbreak method against GPT-5, which bypasses ethical guardrails to produce harmful instructions. Shipley shares insights and standout sessions from Hacker Summer Camp 2025, including BSides Las Vegas, the I Am the Cavalry track, and Defcon, highlighting ongoing efforts and challenges in the cybersecurity landscape. Stay informed, stay secure, and join the conversation in this detailed overview of current cybersecurity issues and innovations. 00:00 Introduction and Headlines 00:31 US Federal Judiciary Cyber Attack 02:29 SonicWall Ransomware Attacks 04:14 AI Jailbreak Techniques 07:44 Hacker Summer Camp 2025 Highlights 08:10 BSides Las Vegas and Community Insights 09:29 Healthcare Cybersecurity and Crash Cart Project 12:11 Defcon Reflections and Final Thoughts 13:45 Conclusion and Listener Engagement

KMOJCast
8-11-25 Andy Maus Cyber Recovery Services Leader joined Freddie Bell this morning on the KMOJ Morning Show with an eye-opening conversation about ransomware recovery and what St. Paul's recent cyberattack means for our cities.

KMOJCast

Play Episode Listen Later Aug 11, 2025 16:42


The Daily Scoop Podcast
Federal courts ramp up filing system security after ‘recent escalated cyberattacks'; Jamie Holcombe steps down as USPTO CIO

The Daily Scoop Podcast

Play Episode Listen Later Aug 8, 2025 4:07


The U.S. judiciary announced plans to increase security for sensitive information on its case management system following what it described as “recent escalated cyberattacks of a sophisticated and persistent nature.” In a Thursday statement, the federal judiciary said it's “taking additional steps to strengthen protections for” that information. It also said its “further enhancing security of the system and to block future attacks, and it is prioritizing working with courts to mitigate the impact on litigants.” The statement from the third branch comes one day after a Politico report revealed that its case filing system had recently been breached. That report cited unnamed sources who were concerned that the identities of confidential court informants may have been compromised. While the federal courts' statement acknowledged a recent escalation in cyberattacks on its case management system, it didn't confirm details of the reported breach. In response to a FedScoop request for additional information about the reported attack, a spokesman for the Administrative Office of the U.S. Courts declined to comment and pointed back to the statement. The reported hack and statement come after a cyberbreach of the same system in 2020. In early 2021, during a hack of SolarWinds' Orion products, the federal courts disclosed that it found “apparent compromise” of the Case Management/Electronic Case Files system (CM/ECF) and was investigating the matter. Its statement after that breach similarly indicated that “federal courts are immediately adding new security procedures to protect highly sensitive confidential documents filed with the courts.” Jamie Holcombe is joining Maryland-based technology company US AI after wrapping up roughly six-and-a-half years as the chief information officer of the U.S. Patent and Trademark Office. Holcombe, who served as both CIO and chief AI officer at USPTO, will be vice president of the AI firm, with a focus on scaling its technology throughout the federal government, according to a Thursday announcement from US AI shared with FedScoop. Holcombe's last day at the agency was Wednesday, according to a USPTO spokeswoman. Deborah Stephens, deputy CIO for the agency, will serve as acting CIO. At USPTO, Holcombe oversaw “one of the federal government's largest IT transformations,” per the announcement. That work included leading the agency's transition to a cloud-first environment and the launch of its AI Lab, where USPTO can test use cases. As part of his new role, Holcombe will work to expand US AI's Intelligent Computing Platform, which is aimed at accelerating the adoption of AI in sectors that are highly regulated, across government. He will also lead the company's strategy to align its technology with its use in public sector and regulated areas, scaling codeless and zero-trust tools, and build on the company's “values of clarity, security, and accessibility in AI deployment.” The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast  on Apple Podcasts, Soundcloud, Spotify and YouTube.

Cybercrime Magazine Podcast
Cybercrime Wire For Aug. 8, 2025. Cyberattack Strikes France's Bouygues Telecom. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 8, 2025 1:16


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Tank Talks
Blocking 190 Billion Cyberattacks Daily: Scaling Through Crises & Cold Winters with Michelle Zatlyn of Cloudflare

Tank Talks

Play Episode Listen Later Aug 7, 2025 59:59


In this episode of Tank Talks, we're joined by Michelle Zatlyn, Co-founder, Co-chair, and President of Cloudflare, a company protecting and powering a major part of global internet traffic. Cloudflare helps businesses stay online, load faster, and block threats before they reach the door.Michelle explains how growing up in Saskatchewan shaped her views on leadership and teamwork, and how that experience still guides her as Cloudflare scales. She shares how a hallway conversation at Harvard became the starting point for the business, how they raised their first round of funding without a product, and why they moved to Silicon Valley during a downturn with no connections.She talks through the pressure of going public, the spike in traffic when COVID hit, and how the team responded when customers suddenly needed help keeping their services running. She also walks through Cloudflare's new AI crawler model, how it gives content owners more control, and why a new business model for the web is overdue.From managing billions of attacks a day to helping publishers keep their content protected, Cloudflare shows what it means to stay reliable when the stakes are high, and Michelle makes it clear that good infrastructure only works if people trust it.We explore:* How do you raise money with no product, no revenue, and no connections?* What happens when a hallway idea becomes core infrastructure for the internet?* What changes when your company goes public six months before a global crisis?* Can creators control how AI models use their content?* What can founders do to make their teams more inclusive without making it performative?* Why $100M-to-$1B is more fun than $0-to-$100MThe Canadian Roots and Early Values of a Tech Founder (00:02:36)* Growing up in Prince Albert, Saskatchewan* How cold winters and community spirit shaped her leadership* From science nerd to Silicon Valley co-founderWhy She Left Medicine for Business (00:06:49)* How a summer research job made her rethink med school* Falling into tech through work in Toronto* Applying to Harvard without knowing how to pay for it* The support from Canadian alumni that made it possibleThe Hallway Conversation That Sparked Cloudflare (00:10:50)* A casual remark turns into a business idea* How she and Matthew Prince turned Project Honeypot into a startup* Using their .edu emails to get early help and access* Getting credit for the project instead of taking another classRaising Money With No Traction (00:20:34)* Moving to Silicon Valley in a U-Haul with no connections* Pitching investors with nothing built* Getting $2M on a $4M pre-money valuation* Why the Valley still bets on early-stage founders with clear ideasHiring, Scaling, and Keeping a Startup Culture (00:24:52)* Going from 20 people to over 4,500* Why they still focus on shipping and momentum* How ownership and trust make the difference* Running fast without losing focusGoing Public, Then COVID Hit (00:28:00)* Why they went public when they did* Customers who once said no came running back* What changed when traffic spiked overnight* How customer demand and product pressure collided* Working through the crisis while remote* What Cloudflare learned under fireCloudflare's AI Crawler Controls (00:40:04)* What's happening with AI scraping content* Why Cloudflare built a way to block or license crawlers* The impact on small content creators* How this fits into wider changes to how the web worksDDoS Attacks and Online Threats (00:48:06)* Stopping 190 billion attacks per day* The evolution of DDoS threats in 2025* Why using modern security tools is non-negotiableMichelle's Vision for the Next 15 Years (00:51:18)* Cloudflare as generational infrastructure* Building the most trusted connectivity cloud* Why Internet infrastructure is as vital as plumbingChampioning Women & Diversity in Tech (00:53:27)* Leading by example* Small asks, big impact: improving referral pipelines* Creating space for underrepresented founders and talentCloudflare has grown into critical internet infrastructure, but Michelle talks about it like a work in progress. The problems are large, but they stay focused on solving them one at a time. Her view is practical: strong teams, clear goals, and ongoing effort.About Michelle ZatlynCo-founder, Co-chair & President of CloudflareOne of the most influential leaders in Internet infrastructure, Michelle is a Canadian-born tech executive known for building and scaling Cloudflare into a global powerhouse. A champion for cybersecurity, innovation, and women in tech, she brings passion and grit to every conversation.Connect with Michelle Zatlyn on LinkedIn: https://www.linkedin.com/in/michellezatlyn/Visit Cloudflare Website: https://www.cloudflare.com/Connect with Matt Cohen on LinkedIn: https://ca.linkedin.com/in/matt-cohen1Visit the Ripple Ventures website: https://www.rippleventures.com/ This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit tanktalks.substack.com

Unspoken Security
Today's Geopolitical Threat Environment Requires a New Security Model

Unspoken Security

Play Episode Listen Later Aug 7, 2025 59:26


In this episode of Unspoken Security, host AJ Nash welcomes Mark Freedman, Principal and CEO of Rebel Global Security, to discuss a major shift in the global threat landscape. The primary national security concern has moved from counter-terrorism to interstate strategic competition. This change requires a new security model, especially for the private sector.Mark explains that companies are now players on a geopolitical battlefield, facing sophisticated threats from nation-states. Yet, many organizations operate in silos. Legal teams track sanctions while cybersecurity teams react to technical threats. They often miss the strategic connection between the two, which creates significant vulnerabilities.To close these gaps, AJ and Mark explore the need for an integrated intelligence function within businesses. They discuss how even a single empowered person, tasked with understanding the geopolitical environment, can connect various teams. This strategic view helps companies build a more resilient and proactive defense in a complex world.Send us a textSupport the show

Cyber Security Today
Cybersecurity Threats and Trends: From North Korean Spies to AI-Driven Attacks

Cyber Security Today

Play Episode Listen Later Aug 6, 2025 11:55 Transcription Available


In this episode, host Jim Love explores a variety of pressing cybersecurity threats and developments. The episode begins with an invitation for listeners to share their summer reading choices. The main content highlights include North Korean operatives infiltrating US companies through fake identities and AI-generated resumes, the ability of large language models to autonomously execute cyber attacks, a vulnerability in the AI-powered code editor Cursor allowing silent RCE attacks, and the rise of malicious Progressive Web Apps targeting mobile users. The show also discusses the risks associated with clicking unsubscribe links in spam emails. Listeners are encouraged to support the show and contribute through the website. 00:00 Introduction and Summer Reading Request 00:59 North Korean Spies in US Tech Firms 03:25 AI's Role in Cyber Attacks 05:18 Critical Vulnerability in AI Code Editor 07:36 Malicious Mobile Browser Hijacks 09:30 Unsubscribe Links as Phishing Traps 10:50 Conclusion and Listener Engagement

Cybercrime Magazine Podcast
Cybercrime Wire For Aug. 5, 2025. Cyberattack Hits In Dutch Caribbean Islands. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 5, 2025 1:14


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cybercrime Magazine Podcast
Cybercrime Wire For Aug. 4, 2025. Cyberattack Hits Georgia's SNAP Call Center. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 4, 2025 1:15


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

MPR News Update
St. Paul continues investigation into cyberattack

MPR News Update

Play Episode Listen Later Aug 1, 2025 5:07


The Checklist by SecureMac
Checklist 434 - OS Updates and City Under Cyberattack

The Checklist by SecureMac

Play Episode Listen Later Aug 1, 2025 20:19


Last week, we talked about moves Apple's making to fight smishing. Now some political types are fighting against that fight. We'll tell you more. Plus - Apple updated all of its current operating systems earlier this week. We'll fill you in. We start though in Saint Paul, Minnesota - a city under cyberattack. It's all ahead on this edition of The Checklist brought to you by SecureMac. Check out our show notes: SecureMac.com/Checklist And get in touch with us: Checklist@Securemac.com

Cybercrime Magazine Podcast
Cybercrime News For Aug. 1, 2025. Orange Confirms Cyberattack on Systems. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 1, 2025 2:40


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

Cyber Security Headlines
Week in Review: Surveillance camera vulnerabilities, data sovereignty conundrum, French submarine cyberattack

Cyber Security Headlines

Play Episode Listen Later Aug 1, 2025 30:47


Link to episode page This week's Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Derek Fisher, Director of the Cyber Defense and Information Assurance Program, Temple University – also check out Derek's substack. Thanks to our show sponsor, Dropzone AI Security teams everywhere are drowning in alerts. That's why companies like Zapier and CBTS turned to Dropzone AI—the leader in autonomous alert investigation. Their AI investigates everything, giving your analysts time back for real security work. No more 40-minute rabbit holes. If you're at BlackHat, find them in Startup City. Otherwise, check out their self-guided demo at dropzone.ai. This is how modern SOCs are scaling without burning out. All links and the video of this episode can be found on CISO Series.com    

Cybercrime Magazine Podcast
Cybercrime Wire For Jul. 31, 2025. Cyberattack Hits Orange, France's Big Telco. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 31, 2025 1:11


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cyber Security Headlines
Oh No! Lenovo, French submarine data breach, Russian pharmacy cyberattack

Cyber Security Headlines

Play Episode Listen Later Jul 31, 2025 7:51


Oh No! Lenovo You sunk my battleship! Or did you? Russians unable to get a taste of their own medicine Huge thanks to our sponsor, Dropzone AI Security teams everywhere are drowning in alerts. That's why companies like Zapier and CBTS turned to Dropzone AI—the leader in autonomous alert investigation. Their AI investigates everything, giving your analysts time back for real security work. No more 40-minute rabbit holes. If you're at BlackHat, find them in Startup City. Otherwise, check out their self-guided demo at dropzone.ai. This is how modern SOCs are scaling without burning out.   Find the stories behind the headlines at CISOseries.com.  

X22 Report
Cyber Attacks, Tsunami Of Information,Did Trump Just Trap Obama With Presidential Immunity? – Ep. 3698

X22 Report

Play Episode Listen Later Jul 30, 2025 92:56


Watch The X22 Report On Video No videos found (function(w,d,s,i){w.ldAdInit=w.ldAdInit||[];w.ldAdInit.push({slot:17532056201798502,size:[0, 0],id:"ld-9437-3289"});if(!d.getElementById(i)){var j=d.createElement(s),p=d.getElementsByTagName(s)[0];j.async=true;j.src="https://cdn2.decide.dev/_js/ajs.js";j.id=i;p.parentNode.insertBefore(j,p);}})(window,document,"script","ld-ajs");pt> Click On Picture To See Larger Picture Countries limited their CO2 production to save the planet, all they did was. shift everything to China, Trump is now shutting down Obama's climate programs. Trump's economy explodes and the D's/fake news/Fed don't know how to counter the narrative, they tried but it failing. Trump is dividing the Fed and setting everything up for the new economy. Hawaii was going to get hit with a Tsunami because of a major earthquake. Did Trump post Tsunami to let us know that a massive amount of info is going to be dropped? Different countries and the US have have been hit by a cyber attack. The fake news/D's are trying their best to spin the Russia evidence and they are losing to the facts. Did Trump trap Obama with Presidential immunity?   Economy https://twitter.com/Geiger_Capital/status/1950545248825798729 Trump Axes Obama's Endangerment Finding During his two terms, Obama enacted several policies that subsidized uncompetitive, unneeded, and unwanted green energy while placing onerous regulations on fossil fuels. During his first term, Trump tried to reverse much of the Obama administration's anti-fossil fuel actions. However, there was only so much that could be done given the constant distractions Trump faced throughout his first term. One of the most consequential environmental regulations that Trump was unable to eliminate was Obama's “Endangerment Finding.” Most Americans have probably never heard of the Endangerment Finding. But this obscure rule has effectively allowed the federal government to label carbon dioxide a harmful “pollutant” that can be regulated under the Clean Air Act. Unfortunately, a U.S. Supreme Court decision allowed the Obama administration to enact the rule in the first place. In 2007, the U.S. Supreme Court ruled in Massachusetts v. EPA that “greenhouse gases are air pollutants covered by the Clean Air Act and that EPA must determine whether or not emissions of greenhouse gases from new motor vehicles cause or contribute to air pollution which may reasonably be anticipated to endanger public health or welfare.” Although this is the standard reading of the ruling, it is not totally accurate. According to the majority opinion, written by former Justice John Paul Stevens, “We need not and do not reach the question whether on remand EPA must make an endangerment finding, or whether policy concerns can inform EPA's actions in the event that it makes such a finding. We hold only that EPA must ground its reasons for action or inaction in the statute.” So, the 2007 decision did not determine that carbon dioxide is a harmful air pollutant. Rather, it granted that the EPA has the authority to determine if carbon dioxide is a harmful greenhouse gas based solely upon unequivocal data. Trump's EPA Administrator, Lee Zeldin, has made rescinding the Endangerment Finding a priority. “A lot of people are out there listening, they might not know what the endangerment finding is. If you ask congressional Democrats to describe what it is, the left would say that it means that carbon dioxide is a pollutant, carbon dioxide is an endangerment to human health. They might say methane is a pollutant, methane is an endangerment to human health,” Zeldin said on the Ruthless podcast. “That's an oversimplified, I would say inaccurate way to describe it,” Zeldin added. “The Obama administration said that carbon dioxide, when mixed with a bunch of other well-mixed gases, greenhouse gases, that it contributes to climate change. How much?

Minnesota Now
'It's a big deal': Response to St. Paul cyberattack suggests large breach

Minnesota Now

Play Episode Listen Later Jul 30, 2025 9:41


St. Paul has declared a state of emergency over what appears to be a massive cyberattack. The city is working with the Minnesota National Guard, the FBI and two private cybersecurity firms to respond to the cyberattack, which is disrupting city services including payment systems, libraries, recreation centers and city hall. For more on how cyberattacks like this one occur and the issues they can cause, Minnesota Now guest host Chris Farrell talks with Faisel Kaleem, director of cybersecurity and cyber operations programs at Metro State University.

Justice & Drew
Hour 3: St. Paul Cyber Attacks with threat expert Jameson Ritter and Liz Collin from Alpha News

Justice & Drew

Play Episode Listen Later Jul 30, 2025 40:05


Threat analysis regarding St Pauls Cyber Attacks with expert Jameson Ritter and Liz Collin from Alphanews discussing ICE detainers, MPLS crime and more. 

Justice & Drew
Hour 1: Tsunami's, Cyberattacks and Alien Invasions

Justice & Drew

Play Episode Listen Later Jul 30, 2025 39:39


Jon kicks off the show with all the latest news from over night. Plus, Sen Cory Booker rants to congress and continued examples of why the Dem polling numbers are so bad. 

Adam and Jordana
A cyberattack is still impacting St Paul and how to use AI to study

Adam and Jordana

Play Episode Listen Later Jul 30, 2025 37:17


The Naked Scientists Podcast
The science of modern warfare

The Naked Scientists Podcast

Play Episode Listen Later Jul 29, 2025 30:08


In this edition of The Naked Scientists, how is science helping to shape the future of warfare? Like this podcast? Please help us by supporting the Naked Scientists

MPR News Update
St. Paul cyberattack; Western Minnesota flooding

MPR News Update

Play Episode Listen Later Jul 29, 2025 4:30


Gov. Tim Walz activated the National Guard today for cyber protection assistance in response to a cyberattack on the city of St. Paul. Parts of western Minnesota -- including Stevens County -- experienced flash flooding last night as another round of severe storms moved across the region. Those stories and more in today's evening update. Hosted by Jacob Aloi. Music by Gary Meister.

Drivetime with DeRusha
Decrypting the Cyberattack in Saint Paul

Drivetime with DeRusha

Play Episode Listen Later Jul 29, 2025 11:42


It is never a fun day when one of the busiest cities in Minnesota faces a cyberattack so we turned to probably the best expert to help ‘decrypt' and break it down for us - Kate Kuehn is Vice President of World Wide Technology, she is the leading expert in Information Security Risk and talks us through how this could happen and keeps happening on such a large scale!

Drivetime with DeRusha
St. Paul Cyberattack and Winging it with DeRusha!

Drivetime with DeRusha

Play Episode Listen Later Jul 29, 2025 32:35


We chat with an expert on the cyberattack in Saint Paul from today - Kate Keuhn joins Jason to explain how this happened! Then we chat with Matthew Kazama of TokiDoki Wings for DeRusha Eats!

The How of Business - How to start, run & grow a small business.
575 - Protect Your Business from Cyber Attacks with Nick Mullen

The How of Business - How to start, run & grow a small business.

Play Episode Listen Later Jul 28, 2025 43:36


Cybersecurity expert Nick Mullen shares how you can protect your business from cyber attacks. Small businesses are often the target for today's most dangerous cyber threats. Show Notes Page: https://www.thehowofbusiness.com/575-nick-mullen-cyber-security/ Cyberattacks are no longer just a threat to large corporations - small business owners are now the most frequent and most vulnerable targets. In this episode of The How of Business, Henry Lopez speaks with cybersecurity expert and Entoo Security founder Nick Mullen about how you can protect your business from cyber attacks using clear, practical, and affordable strategies. Nick breaks down the modern cyber threat landscape, including: Ransomware and extortion scams AI-powered phishing emails and voice impersonations The myth of "I'm too small to be a target" The importance of email access controls and proper backups They also explore the FTC Safeguards Rule, which now applies to many more small businesses, and what it means to be compliant. Nick emphasizes the importance of understanding where your data lives, limiting who can access it, and training your team to spot threats before they cause damage. “You might think you're too small to be a target, but $50,000 is a huge payday for a criminal overseas—and they can attack thousands of small businesses every day,” Nick warns. Whether you run a solo business or have a growing team, this episode will give you the clarity and steps you need to protect what you've worked so hard to build. Nick Mullen is the founder of N2 Security, a full-service cybersecurity firm helping small businesses including accountants, bookkeepers, and service providers meet compliance standards and avoid devastating cyberattacks. He has nearly two decades of experience in security, compliance, and governance. This episode is hosted by Henry Lopez. The How of Business podcast focuses on helping you start, run, grow and exit your small business. The How of Business is a top-rated podcast for small business owners and entrepreneurs. Find the best podcast, small business coaching, resources and trusted service partners for small business owners and entrepreneurs at our website https://TheHowOfBusiness.com

Ukraine: The Latest
Ukrainian hackers 'wipe databases' in major cyberattack & Russian strikes hit Kyiv metro where hundreds sheltering

Ukraine: The Latest

Play Episode Listen Later Jul 21, 2025 56:00


Day 1,244.Today, after another sleepless night for millions in Kyiv, we bring in experts to look at the shifting strategy of the Russian intelligence services, and hear a firsthand account of Putin's seizure of power and the complicity of Russia's elite. How did a fledgling democracy die?Contributors:Francis Dearnley (Executive Editor for Audio). @FrancisDearnley on X.Roland Oliphant (Senior Foreign Correspondant). @RolandOliphant on X.With thanks to Irina Borogan (investigative journalist) @irinaborogan on X and Andrei Soldatov (investigative journalist). @AndreiSoldatov on X.Content Referenced:‘Our Dear Friends in Moscow: The Inside Story of a Broken Generation' by Andrei Soldatov & Irina Borogan:https://www.amazon.co.uk/Our-Dear-Friends-Moscow-Generation/dp/1541704452 Russia strikes Kyiv metro entrance as civilians shelter inside (The Telegraph):https://www.telegraph.co.uk/world-news/2025/07/21/russia-strikes-kyiv-lukianivska-metro-bomb-shelters-ukraine/ Texas man joins Russian army to “earn respect,” gets lied to as he is sent to front line instead of welding job (Euromaidan Press):https://euromaidanpress.com/2025/07/16/texas-man-joins-russian-army-to-earn-respect-gets-lied-to-as-he-is-sent-to-front-line-instead-of-welding-job/ Ukrainian hackers wipe databases at Russia's Gazprom in major cyberattack, intelligence source says (Kyiv Independent):https://kyivindependent.com/ukrainian-intel-hackers-hit-gazproms-network-infrastructure-sources-say-07-2025/ SIGN UP TO THE NEW ‘UKRAINE: THE LATEST' WEEKLY NEWSLETTER:https://secure.telegraph.co.uk/customer/secure/newsletter/ukraine/ Each week, Dom Nicholls and Francis Dearnley answer your questions, provide recommended reading, and give exclusive analysis and behind-the-scenes insights – plus maps of the frontlines and diagrams of weapons to complement our daily reporting. It's free for everyone, including non-subscribers.NOW AVAILABLE IN NEW LANGUAGES:The Telegraph has launched translated versions of Ukraine: The Latest in Ukrainian and Russian, making its reporting accessible to audiences on both sides of the battle lines and across the wider region, including Central Asia and the Caucasus. Just search Україна: Останні Новини (Ukr) and Украина: Последние Новости (Ru) on your on your preferred podcast app to find them. Listen here: https://linktr.ee/ukrainethelatestSubscribe: telegraph.co.uk/ukrainethelatestEmail: ukrainepod@telegraph.co.uk Hosted on Acast. See acast.com/privacy for more information.