Attack on a computer system
POPULARITY
Categories
Episode 677: Toby and Kyle recap the shaking situation over in Argentina as President Javier Milei's free-market revolution is starting to teeter. Then, a string of cyberattacks rips through European airports and Jaguar Land Over, Britain's largest carmaker. And, the OECD raises its outlook on the global economy stating its more resilient to Trump's tariffs than initially estimated…but not immune. Meanwhile, there's a new top-spot for beer in the US: Michelob Ultra. 00:00 - Send us your group chats! 3:00 - Jimmy Kimmel is back 7:10 - Argentina's Milei is having a rough go 11:45 - Cyberattacks tear through Europe 18:20 - OECD updates its outlook 22:00 - Michelob cracks the top spot 25:20 - Sprint Finish! You can try reMarkable Paper Pro Move for 100 days for free. If it's not what you're looking for, get your money back. Get your paper tablet at https://www.remarkable.com today Get your MBD live show tickets here! https://www.tinyurl.com/MBD-HOLIDAY Presale code LETSRIDE Subscribe to Morning Brew Daily for more of the news you need to start your day. Share the show with a friend, and leave us a review on your favorite podcast app. Listen to Morning Brew Daily Here: https://www.swap.fm/l/mbd-note Watch Morning Brew Daily Here: https://www.youtube.com/@MorningBrewDailyShow Learn more about your ad choices. Visit megaphone.fm/adchoices
Tony Pietrocola, president of the cybersecurity company AgileBlue, says cybercriminals are using artifical intelligence to generate deepfake video and audio calls, making the cyber threats more sophisticated and harder to catch.
Tony Pietrocola, president of the cybersecurity company AgileBlue, says cybercriminals are using artifical intelligence to generate deepfake video and audio calls, making the cyber threats more sophisticated and harder to catch.
The news to know for Monday, September 22, 2025! We'll tell you about the memorial service for Charlie Kirk, from an especially emotional moment from Kirk's wife to when President Trump said there is one thing that set him and Kirk apart. Also, what to expect from what's called the World Cup of diplomacy, starting today. Plus: the new dollar amount on the American dream, an issue that delayed flights all around Europe, and hello to a new season—it's officially fall. Those stories and even more news to know in about 10 minutes! Join us every Mon-Fri for more daily news roundups! See sources: https://www.theNewsWorthy.com/shownotes Become an INSIDER to get AD-FREE episodes here: https://www.theNewsWorthy.com/insider Get The NewsWorthy MERCH here: https://thenewsworthy.dashery.com/ Sponsors: This episode is sponsored by BetterHelp. Give online therapy a try at betterhelp.com/NEWSWORTHY and get on your way to being your best self. Get 15% off OneSkin with the code NEWSWORTHY at https://www.oneskin.co/ #oneskinpod To advertise on our podcast, please reach out to ad-sales@libsyn.com
(Sept 22,2025)Amy King joins Neil Saavedra, who will be filling in for Bill all week, for Handel on the News. Takeaways from Charlie Kirk's memorial service. Super Typhoon Ragasa hits the Philippines, headed to Hong Kong. Trump heads to UN General Assembly as future of Palestinian state and Gaza likely to dominate. ‘Sophisticated' $100MIL cyberattack on Vegas strip involved teenage hacker.
Verkehrsminister stellt Plaan för Dütsche Bahn vör +++ Cyberattack sorgt wieter för Problems bi'n BER +++ Rheinmetall plaant ahn Afboo vun Arbeitssteden +++ Tall vun de Kita Kinner kladdert in't Land Bremen +++ IG-Metall roopt to Streiks to'n Wahrschaun op +++ Dat Weer
Disruption continues at airports around the world as a result of a cyber attack. So what's behind the cyberattacks disrupting flights around the world? All to discuss with Newstalk's Technology Correspondent Jess Kelly.
Your daily news in under three minutes. At Al Jazeera Podcasts, we want to hear from you, our listeners. So, please head to https://www.aljazeera.com/survey and tell us your thoughts about this show and other Al Jazeera podcasts. It only takes a few minutes! Connect with us: @AJEPodcasts on X, Instagram, Facebook, and YouTube
A cyberattack on a provider of check-in and boarding systems has disrupted operations at several major European airports. Estonia reports an unprecedented airspace violation by Russian jets in the latest test for NATO. The Trump administration says it'll ask companies to pay $100,000 per year for H-1B worker visas. The U.S. and China make progress on a TikTok deal. Plus, what to expect from a packed weekend in sports – including the World Athletics Championships. Listen to On Assignment here. Read today's recommended read here. Sign up for the Reuters Econ World newsletter here. Listen to the Reuters Econ World podcast here. Visit the Thomson Reuters Privacy Statement for information on our privacy and data protection practices. You may also visit megaphone.fm/adchoices to opt out of targeted advertising. Learn more about your ad choices. Visit megaphone.fm/adchoices
AP correspondent Julie Walker reports a cyberattack disrupts check-in systems at major European airports.
In this episode of Unspoken Security, host AJ Nash welcomes Ivan Novikov, CEO of Wallarm, to discuss the fundamental shifts in API security. They explore how APIs have evolved from internal tools to the public-facing backbone of mobile apps, IoT, and AI. This change has dramatically expanded the threat surface, making traditional security methods obsolete.Ivan explains why older approaches, like signature-based detection and RegEx, fail against modern attacks. He details Wallarm's unique solution: a real-time decompiler that analyzes the actual payload of API requests. This technique allows for deep inspection of complex and nested data formats, identifying malicious code that standard tools miss.The conversation also looks to the future, examining the security risks posed by the rapid adoption of AI agents. Ivan concludes with a stark comparison between physical and cyber threats. In the digital world, attacks are constant and aggressive. Success depends less on the tools you have and more on who you are and how you use them.Send us a textSupport the show
September 18, 2025 ~ Brent Yax, CEO of Awecomm, joins Kevin to discuss how earlier this week, South Lyon Community Schools were shut down due to a cybersecurity attack. Hosted by Simplecast, an AdsWizz company. See https://pcm.adswizz.com for information about our collection and use of personal data for advertising.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Welcome back to To the Point Cybersecurity Podcast! In this week's episode, hosts Rachael Lyon and Jonathan Knepher are joined by the brilliant Dr. Margaret Cunningham, Technical Director for Security and AI Strategy at Darktrace. With a PhD in Applied Experimental Psychology and multiple patents to her name, Dr. Cunningham is a leading voice in human-centered security, behavioral analytics, and the ever-evolving intersection of people and technology. Together, the trio dives into the fast-changing landscape of AI-driven threats—think voice cloning, deepfakes, and sophisticated social engineering attacks that challenge every notion of trust and identity. From the real-world dangers of phone scams using cloned voices, to high-profile incidents like the Coinbase insider threat and the rise of groups like Scattered Spider, you'll hear stories that illuminate both the risks and solutions shaping today's enterprise security. They explore the future (and limits) of authentication, the importance—and pitfalls—of data collection, and why behavioral analytics are more crucial than ever in spotting anomalies. Dr. Cunningham also shares insights on transparency, industry responses, and the human factors that make cybersecurity so complex and fascinating. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e350
Join hosts Ike Goss and Stephen Beres on this episode of The Underpowered Hour as they dive into a recent cyberattack on Jaguar Land Rover, explore news in the Land Rover community, and reminisce about memorable Land Rover sightings in movies like 'Congo' and 'Mighty Joe Young.' The duo also shares exciting details about their upcoming travel to the UK for Land Rover enthusiasts' events, including the Goodwood Revival and the Camel Trophy Owners Club meetup. Plus, enjoy lively banter and personal anecdotes from their adventures in the Land Rover world.
The threat landscape is moving faster than ever—and traditional response playbooks aren't keeping up. In this live Field Notes episode, Eric Brown and Nick Mellum dive into the surge of recent cyberattacks hitting state governments, transit systems, and critical infrastructure across the U.S.From Nevada's complete state office shutdown to Maryland's Metro Transit paralysis, the hosts explore why organizations still "clam up" during breaches instead of sharing crucial threat intelligence. Drawing from their firsthand experience with the St. Paul incident and military-grade preparedness principles, they reveal the uncomfortable truth: you're not building higher walls anymore—you're planning for someone who's already inside.Key Topics Covered:Recent state-level cyberattacks in Nevada and MarylandWhy threat intelligence sharing fails when we need it mostThe human cost of breach response chaos and endless meetingsHow AI is being weaponized in sophisticated supply chain attacksMilitary mindset for cybersecurity: "Semper Gumby, always flexible"Don't wait for the next headline. Subscribe for more unfiltered cybersecurity discussions that bridge the gap between technical reality and human preparation.#cybersecurity #infosec #breach #threatintelligence #fieldnotes #livecast #CISO #cybersecuritynews
Brian Singer, a PhD candidate at Carnegie Mellon University, joins Robby to talk about his research on creating autonomous attackers and defenders for networks. In their conversation, they discuss how Brian and his team made a system that uses LLMs to autonomously attack networks.Singer and his team recently got a lot of attention after using this system to successfully recreate the Equifax cyber-attack from 2017, one of the largest data breaches in U.S. history, in a virtualised cloud environment. In turn, showing how LLMs can be taught to plan and execute sophisticated cyberattacks without a human involved.They also talk about how LLMs are unlocking new capabilities for defenders, where he is seeing a lot of opportunity, and how he thinks security will be developing the next three to five years. Send us a text
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
This week on Security Squawk, Bryan Hornung and Randy Bryan break down two hard-hitting cybersecurity stories. Jaguar Land Rover's production lines grind to a halt after a massive cyberattack, showing how ransomware directly disrupts global manufacturing. Meanwhile, CISOs face mounting pressure to stay silent about breaches, raising serious questions about transparency, accountability, and corporate risk. Tune in for sharp insights, real-world lessons, and a dose of wit as we unpack what these stories mean for businesses, IT pros, and MSPs. ️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! https://streamyard.com/pal/d/65161790...
Send us a textWelcome to What's Up in Business Travel for Week 35 of 2025. This is a weekly podcast where we update you on what's up this week in the world of business travel. This podcast is great for those who need to know what's happening all in under 15 minutes.On this week's podcast, we covered the following stories -Airlines targeted in cyberattacksGoogle is required to share data with competitorsLabor Day 2025 passenger numbers sets recordPassenger compensation plan droppedSouthwest adopts secondary cockpit barrierSpirit Airlines axes flights in 12 citiesAmexGBT completes CWT acquisitionWestJet places record order with BoeingZipcar partners With UberAmerican takes delivery of 1,000th aircraftWheels Up launches membership programSouthwest to launch free Wi-FiJetBlue signs as Amazon's 1st airline customerConcur Travel integrates HotelHubAmerican Airlines introduces AI SystemYou can subscribe to this podcast by searching 'BusinessTravel360' on your favorite podcast player or visiting BusinessTravel360.comThis podcast was created, edited and distributed by BusinessTravel360. Be sure to sign up for regular updates at BusinessTravel360.com - Enjoy!Support the show
Thank you so much for listening to the Bob Harden Show, celebrating over 14 years broadcasting on the internet. On Tuesday's show, we visit with our Florida State Senator Kathleen Passidomo about recommendations to eliminate Florida property taxes, and we discuss policy changes about vaccines in Florida. We visit with Mantas Sabieckis from Cybernews.com about the consequences of China's Salt Typhoon cyberattack. Community Pregnancy Clinics Mission Advancement Director Shaun Guevarra and I discuss their great services as well as the lack of enforcement of Florida Six-Week Heartbeat Protection Act. We also visit Linda Harden about attacks on RFK, Jr.'s quest to “Make America Healthy Again,” and we discuss “lawfare” against Utah medical Dr. Kirk Moore. Please join us tomorrow when we visit with Cato Institute Chairman Emeritus Bob Levy and Professor Andrew Joppa. Access this or past shows at your convenience on my web site, social media platforms or podcast platforms.
Worried about the growing threat of cybercrime and fraud targeting your business? This episode of Everything Counts is your essential guide to understanding and combating modern business cybersecurity risks. Join host Motheo Khoaripe as he speaks with Professor Danny Myburgh, digital forensics expert, and Kevin Hogan, Head of Fraud Risk at Investec, to uncover the latest scams like business email compromise, ransomware, fake payment notifications and more. Learn how cybercriminals exploit trust, hijack email systems, use AI-driven tools to impersonate you and manipulate communication channels to steal from your business. Discover practical tips on securing your passwords, spotting fake payment instructions, protecting your email, adopting two-factor authentication and why independent verification is critical. Whether you're a small business owner or part of a larger organisation, this conversation will empower you to strengthen your ‘human firewall' and stay one step ahead of evolving fraud tactics. Tune in to make your business cybersecurity smarter, more resilient and ensure that when it comes to protecting your money and reputation, Everything Counts. 00:00 Introduction 01:25 Common cybersecurity threats businesses are facing 02:40 Increase in scams: Deposit scams, investment scams, crypto scams 03:10 Common types of banking fraud 04:00 How phishing works 05:00 The link between ChatGPT and fraud 05:50 What to look out for: Ransomware and data exfiltration 06:30 Cyberattack statistics in South Africa 07:50 What are fake payment notifications and instructions? 09:50 Social engineering: How fraud targets trust 10:30 Email hacking: Filters targeted by scamsters 15:00 What to do if your email has been hacked 16:20 What is email spoofing? 19:30 How often should you change your passwords? 21:20 Business banking tools to prevent hacks 23:00 Using a password manager 24:20 How cybersecurity training keeps your ‘human firewall' strong 24:57 What does banking security look like? 27:00 Investec Global Client Support Centre 27:15 Conclusion Investec Focus Radio SA
Thank you so much for listening to the Bob Harden Show, celebrating over 14 years broadcasting on the internet. On Tuesday's show, we visit with our Florida State Senator Kathleen Passidomo about recommendations to eliminate Florida property taxes, and we discuss policy changes about vaccines in Florida. We visit with Mantas Sabieckis from Cybernews.com about … The post Warning: China’s Salt Typhoon Cyberattack appeared first on Bob Harden Show.
When ransomware hits a hospital, it's not just data that's at stake—patients are dying. Ed Gaudet, CEO of Censinet, reveals the shocking research proving what healthcare security professionals feared: cyberattacks on hospitals directly increase mortality rates and disrupt life-saving care. But Ed's biggest concern? The eerie quiet before what he believes could be the next wave of coordinated attacks across multiple critical infrastructures. Plus, why Microsoft's approach to AI integration is making cybersecurity professionals lose sleep. Key Topics Covered: Why ransomware attacks on hospitals increase patient mortality rates The research behind healthcare cybersecurity's deadly consequences How the healthcare industry's digital transformation created new vulnerabilities Microsoft's problematic approach to forced AI integration The evolution from individual hackers to organized cybercrime syndicates Why Ed's "Spidey senses" are warning of coordinated infrastructure attacks Don't wait until your organization becomes the next healthcare headline. Subscribe for more critical cybersecurity insights that could save more than just your data. #healthcarecybersecurity #ransomware #patientsafety #cybersecurity #infosec #healthcare
From March 28, 2024: One of the gravest threats to U.S. national security today—and also one of the newest—is the risk of cyberattacks. They come in many forms, and they can incapacitate companies, institutions, and even the government. To better understand these threats—and how the government is responding to them—Lawfare Executive Editor Natalie Orpett and Lawfare Contributing Editor Brandon Van Grack sat down with Brett Leatherman, Deputy Assistant Director for Cyber Operations at the FBI. They discussed the FBI's recent operations, threats from both state actors and criminal gangs, and the role of the private sector in U.S. cybersecurity.This is the latest episode in our special series, “The Regulators,” co-sponsored with Morrison Foerster, in which we talk with senior government officials working at the front lines of U.S. national security policy.To receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also support Lawfare by making a one-time donation at https://givebutter.com/lawfare-institute.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.
Headlines: – Welcome to Mo News (02:00) – RFK Jr. Questioned Over CDC Turmoil, Vaccines in Senate Hearing (04:45) – Former CDC Director Susan Monarez Makes Allegations Against Kennedy OP ED (13:45) – Trump Wants To Rename Dept. Of Defense “Dept of War” (22:15)– Northwestern University President Steps Down (25:15) – Trump's Pick For Fed Governor Says He Does Not Plan to Resign From White House Role (27:15) – Justice Dept. Opens Criminal Inquiry Into Fed's Lisa Cook (30:10) – Chinese Cyberattackers May Have Stolen Data From Almost Every American (31:30) – U.S. States With The Earliest And Latest Bedtimes (34:00) – Giorgio Armani Dies Aged 91 (37:15) – What We're Watching, Reading, and Eating (41:00) Thanks To Our Sponsors: – LMNT - Free Sample Pack with any LMNT drink mix purchase – Industrious - Coworking office. 50% off day pass | Promo Code: MONEWS50 – Surfshark - 4 additional months of Surfshark VPN | Code: MONEWS – Leesa – 30% off mattress, plus extra $50 off | Promo Code: MONEWS – Factor Meals – 50% your first box plus free shipping | Promo Code: monews50off – Monarch Money - 50% off your first year | Promo Code: MONEWS
Meet a new species of human, hear about the latest threats to mail-in voting, and journey somewhere over the rainbow at Sphere. All that and more on the latest episode of KNPR's State of Nevada.
* The Orleans Parish Sheriff's Office was hit with a ransomware attack. How common are those? What can organizations and individuals do to avoid being hit with one? * Tommy's Weekend Winners: sports betting tips for this weekend
A cyberattack disrupts Bridgestone tyre factories in North America, a new infostealer takes your photo while you watch porn, bad certificates for Cloudflare infrastructure went undetected for more than a year, and Brazil deals with another payment system hack. Show notes Risky Bulletin: Chrome 140 comes with new hardened cookies
#SWAMPWATCH – Kennedy Rejects Criticism, Data and Decorum in Contentious Hearing. U.K. Should Clarify Free-Speech Laws After Comedian's Arrest, Police Chief Says TECH TALK with Mark Saltzman – iPhone 17 last-minute rumors / Remove Your Personal Info from This Invasive Website ASAP. Chinese Cyber Attack Hit EVERYONE!!!!
Cybersecurity has moved far beyond being just a technical issue — it is now a core business priority that directly impacts customer trust, operational resilience and the bottom line. We sit down with two industry leaders on the front lines of digital risk: Pam Lindemoen, chief security officer and vice president of strategy at the Retail & Hospitality Information Sharing and Analysis Center, and Christian Beckner, vice president of retail technology and cybersecurity at the National Retail Federation. Together, they unpack the fast-changing cybersecurity landscape facing retailers today, from fraud and social engineering to the new challenges posed by artificial intelligence.(00:00:00) Building a united front in retail cybersecurity(00:04:41) Strengthening trust and evolving partnerships(00:07:49) Rising threats in retail cybersecurity(00:12:43) Investing in resilience and readiness(00:16:51) Looking ahead: cooperation and global expansionThe National Retail Federation is the world's largest retail trade association.Every day, we passionately stand up for the people, policies and ideas that help retail succeed.Resources:• Get ready for Retail's Big Show in NYC• Become an NRF member and join the world's largest retail trade association• Learn about our retail education platform, NRF Foundation, at nrffoundation.org• Learn about retail advocacy at nrf.com/advocacy• Find more episodes at retailgetsreal.comRelated:• 366: How to fight back against organized retail crime• 353: How customer-facing AI will energize retail's future• 344: The future of AI in consumer experience
In this episode, Ryan Williams Sr. and Shannon Tynes discuss the latest cybersecurity news, including a ransomware attack in Nevada and the federal response to improve cybersecurity funding. They dive into the implications of AI in cybersecurity, the Salt Typhoon hack as a national defense crisis, and personal reflections on gaming, particularly the Madden franchise. The conversation highlights the challenges and opportunities in the cybersecurity landscape, emphasizing the need for international standards and proactive measures. Articles: Federal, state officials investigating ransomware attack targeting Nevada https://www.cybersecuritydive.com/news/federal-state-investigating-ransomware-nevada/758863/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExamluU2h2WDFUcjdHQTFjVgEeCjaDx2kSMvwp90SaocW9G3SYU7EpIc7x5oNQmq7O-L9XwgzHnSw9ipqPGXg_aem_x6hVfkHI7y2Vc01A3LCbMw Can Your Security Stack See ChatGPT? Why Network Visibility Matters https://thehackernews.com/2025/08/can-your-security-stack-see-chatgpt-why.html U.S. And Allies Declare Salt Typhoon Hack A National Defense Crisis https://www.forbes.com/sites/emilsayegh/2025/08/30/us-and-allies-declare-salt-typhoon-hack-a-national-defense-crisis/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExamluU2h2WDFUcjdHQTFjVgEeQ1F7W3L6A9XwbQBJ_7ynNSlrQAaUAwp5dgydOMHdSl0VTZOv9-jeenaWf80_aem_4j4G6wyTFBhZYVmquGcvUg Please LISTEN
From the BBC World Service: A cyberattack has caused major production problems at carmaker Jaguar Land Rover. Both of its main factories in the U.K. have been affected, and it comes at a peak sales period. Plus, long-term government borrowing costs continue to climb globally. Then, police in Singapore have ordered Facebook's parent company, Meta, to take measures to prevent scammers from impersonating government officials. And, a greenhouse gas emissions tax in Denmark will result in big changes to the Danish landscape.
From the BBC World Service: A cyberattack has caused major production problems at carmaker Jaguar Land Rover. Both of its main factories in the U.K. have been affected, and it comes at a peak sales period. Plus, long-term government borrowing costs continue to climb globally. Then, police in Singapore have ordered Facebook's parent company, Meta, to take measures to prevent scammers from impersonating government officials. And, a greenhouse gas emissions tax in Denmark will result in big changes to the Danish landscape.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Cyberattacks aren't just about hackers in hoodies anymore. Today, we're up against professionalized, well-funded organizations that run like businesses. They use AI to crack defenses, run labs that simulate the tools we rely on, and rake in trillions while defenders struggle to keep pace. The scary part? Even the strongest companies and governments can fall behind when the threat landscape moves this fast. My guest, Evan Powell, has spent nearly 30 years in the cybersecurity world. He's the founder and CEO of Deep Tempo, and a serial entrepreneur who's helped industries from cloud data to resilience engineering make big transitions. Evan knows what it looks like when attackers have the upper hand, and he's seen firsthand how enterprises try to shift the balance. In this conversation, Evan explains why compliance checkboxes aren't enough, why raising the cost of an attack is often more realistic than stopping one outright, and how AI is reshaping both sides of the fight. He also shares the creative ways defenders are adapting, from honeypots to sock puppets, and the simple steps every one of us can take to make life harder for attackers. Show Notes: [00:57] Evan Powell introduces himself as founder and CEO of Deep Tempo, with nearly 30 years in cybersecurity and tech innovation. [02:39] He recalls a high-profile spearphishing case where the CIA director's AOL email and home router were compromised. [03:51] Attackers are professionalizing, running AI-powered labs, and making trillions while defenders spend billions and still fall behind. [07:06] Evan contrasts compliance-driven “checkbox security” with threat-informed defense that anticipates attacker behavior. [09:40] Enterprises deploy creative tactics like honeypots and sock puppet employees to study attackers in action. [12:22] Raising the cost of attack through stronger habits, better routers, and multi-factor authentication can make attacks less profitable. [15:01] Attackers are using AI to morph and simulate defenses, while defenders experiment with anomaly detection and adaptive models. [20:56] Evan explains why security vendors themselves can become attack vectors and why data should sometimes stay inside customer environments. [24:50] He draws parallels between fraud rings and cybercrime, where different groups handle exploits, ransomware, and money laundering. [26:29] The debate over “hacking back” raises legal and policy questions about whether enterprises should strike attackers directly. [30:18] Network providers struggle with whether they should act as firewalls to protect compromised consumer devices. [34:59] Data silos across 50+ vendors per enterprise create “Franken-stacks,” slowing real-time defense and collaboration. [37:28] AI agents may help unify security systems by querying across silos and tightening the OODA loop for faster response. [39:10] MITRE's ATT&CK framework and open-source collaboration are pushing the industry toward more shared knowledge. [41:05] Evan acknowledges burnout in cybersecurity roles but sees automation and better tools improving day-to-day work. [42:59] Final advice: corporations should rethink from first principles with data-centric solutions, and consumers must build protective habits like MFA and secret family phrases. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Evan Powell - DeepTempo Evan Powell - LinkedIn
Dr Robert Seely MBE was a British Conservative Party politician who served as the Member of Parliament (MP) for the Isle of Wight from 2017 until the constituency was split in two in 2024. Seely is a former journalist and soldier. From 1990 to 1995, he worked as a foreign correspondent in the last year of the USSR and in post-Soviet states. From 2008 to 2017, he served in the British Armed Forces in the Iraq, Afghanistan, Libya and ISIS campaigns. Seely has been a research associate at the Changing Character of War Programme at the University of Oxford. Today we're going to be exploring his unique definition of Russian hybrid war, and highly impactful book: The New Total War: From Child Abduction to Cyber Attacks and Drones to Disinformation – Russia's Conflict with Ukraine and the West. ----------Partner on this video: KYIV OF MINE 'Kyiv of Mine' is a documentary series about Ukraine's beautiful capital, Kyiv. The film production began in 2018, and much has changed since then. It is now 2025, and this story is far from over.https://www.youtube.com/@UCz6UbVKfqutH-N7WXnC5Ykg https://www.kyivofmine.com/#theprojectKyiv of Mine is fast paced, beautifully filmed, humorous, fun, insightful, heartbreaking, moving, hopeful. The very antithesis in fact of a doom-laden and worthy wartime documentary. This is a work that is extraordinarily uplifting. My friend Operator Starsky says the film is “Made with so much love. The film series will make you laugh and cry.” ----------LINKS:https://www.amazon.co.uk/New-Total-War-Abduction-Disinformation/dp/1785909487https://x.com/IoWBobSeelyhttps://www.rusi.org/people/seelyhttps://en.wikipedia.org/wiki/Bob_Seelyhttps://www.linkedin.com/in/dr-robert-seely-mbe-10304468/?originalSubdomain=ukhttps://kclpure.kcl.ac.uk/portal/en/persons/bob-seely----------SILICON CURTAIN FILM FUNDRAISERA project to make a documentary film in Ukraine, to raise awareness of Ukraine's struggle and in supporting a team running aid convoys to Ukraine's front-line towns.https://buymeacoffee.com/siliconcurtain/extras----------SILICON CURTAIN LIVE EVENTS - FUNDRAISER CAMPAIGN Events in 2025 - Advocacy for a Ukrainian victory with Silicon Curtainhttps://buymeacoffee.com/siliconcurtain/extrasOur events of the first half of the year in Lviv, Kyiv and Odesa were a huge success. Now we need to maintain this momentum, and change the tide towards a Ukrainian victory. The Silicon Curtain Roadshow is an ambitious campaign to run a minimum of 12 events in 2025, and potentially many more. Any support you can provide for the fundraising campaign would be gratefully appreciated. https://buymeacoffee.com/siliconcurtain/extrasWe need to scale up our support for Ukraine, and these events are designed to have a major impact. Your support in making it happen is greatly appreciated. All events will be recorded professionally and published for free on the Silicon Curtain channel. Where possible, we will also live-stream events.https://buymeacoffee.com/siliconcurtain/extras----------SUPPORT THE CHANNEL:https://www.buymeacoffee.com/siliconcurtainhttps://www.patreon.com/siliconcurtain----------TRUSTED CHARITIES ON THE GROUND:Save Ukrainehttps://www.saveukraineua.org/Superhumans - Hospital for war traumashttps://superhumans.com/en/UNBROKEN - Treatment. Prosthesis. Rehabilitation for Ukrainians in Ukrainehttps://unbroken.org.ua/Come Back Alivehttps://savelife.in.ua/en/Chefs For Ukraine - World Central Kitchenhttps://wck.org/relief/activation-chefs-for-ukraineUNITED24 - An initiative of President Zelenskyyhttps://u24.gov.ua/Serhiy Prytula Charity Foundationhttps://prytulafoundation.orgNGO “Herojam Slava”https://heroiamslava.org/kharpp - Reconstruction project supporting communities in Kharkiv and Przemyślhttps://kharpp.com/NOR DOG Animal Rescuehttps://www.nor-dog.org/home/----------
LegalPwn technique hides LLMs prompts inside contract legalese Maryland Transit investigating cyberattack Hacker attempts to forge his way into Spanish university Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO. Find the stories behind the headlines at CISOseries.com.
As the week wraps up, the fallout from the cyberattack that downed state government systems from Medicaid to the DMV continues to impact Nevadans — so why didn't Governor Lombardo show up at the first press briefing about it, and did his appearance yesterday give us any more answers? Co-hosts Sarah Lohman and Dayvid Figler chat with Nevada Current editor April Corbin Girnus about the political implications of the attack, as well as why plans for the new airport by Jean are facing criticism from environmentalists, and whether the A's upcoming six-game stint at the Las Vegas Ballpark makes us feel more or less hopeful about their arrival. If you need an update on the restoration of government services call 2-1-1 or go to oem.nv.gov/recovery. Learn more about the sponsors of this August 29th episode: Woven Want to get in touch? Follow us @CityCastVegas on Instagram, or email us at lasvegas@citycast.fm. You can also call or text us at 702-514-0719. For more Las Vegas news, make sure to sign up for our morning newsletter, Hey Las Vegas. Learn more about becoming a City Cast Las Vegas Neighbor at membership.citycast.fm. Looking to advertise on City Cast Las Vegas? Check out our options for podcast and newsletter ads at citycast.fm/advertise.
Can we build technology today to defend against the threats of tomorrow? This week, Technology Now concludes a double episode on post quantum cryptography and explores the subject of firmware, why it's imperative that it be protected against quantum attacks and why a simple update can't solve every problem. Nigel Edwards, Director of the Security Lab at HPE Labs, tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations.About Nigel: https://www.linkedin.com/in/nigel-edwards-170591/?originalSubdomain=ukSources: https://www.theatlantic.com/technology/archive/2016/01/the-long-and-winding-history-of-encryption/423726/https://www.theqrl.org/blog/history-of-cryptography-behind-the-code-episode-1/https://www.theguardian.com/science/2025/may/07/todays-ai-can-crack-second-world-war-enigma-code-in-short-order-experts-say
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Tech commentator Tony Grasso joins Kathryn to talk about the big news in the cyber-crime world.
Why do quantum computers pose a threat to governments? This week Technology Now starts a two part dive into quantum computing. In this first episode, we ask: how are governments preparing to mitigate the threat posed by a hypothetical quantum computer which could be invented. Ken Rich, Federal CTO at HPE tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations.About Ken Rich:https://www.linkedin.com/in/kenrich111/Sources:https://www.ncsc.gov.uk/whitepaper/next-steps-preparing-for-post-quantum-cryptographyhttps://www.britannica.com/technology/quantum-computerhttps://www.livescience.com/technology/computing/history-of-quantum-computing-key-moments-that-shaped-the-future-of-computingShor, Peter W.. “Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer.” SIAM Rev. 41 (1995): 303-332.P. W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring," Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 1994, pp. 124-134, doi: 10.1109/SFCS.1994.365700.https://www.newscientist.com/article/2399246-record-breaking-quantum-computer-has-more-than-1000-qubits/
Data alone does not persuade. For data-driven leaders, learning totranslate numbers into a compelling narrative is a critical skill. In thisepisode of Unspoken Security, host AJ Nash speaks with Salvatore Manzi, aleadership communications coach, about the strategies technical leaderscan use to create influence. Salvatore explains why leaders must learn tomake meaning over metrics to connect with teams, stakeholders, andcustomers.Salvatore shares practical frameworks to improve communication. Heintroduces the "You then me" principle, which prioritizes acknowledging the other person's view to build rapport. He also shows how using simplemetaphors and a little appreciation can make complex dataunderstandable. These techniques disarm a room before you need tocorrect someone or present a counter-argument, ensuring your message lands effectively.The conversation also covers imposter syndrome and the uniquecommunication hurdles women face in the tech industry. AJ and Salvatorediscuss the power of authenticity and the need for allies who activelyamplify other voices. They explore how simple shifts in body language andmindset can build the confidence needed to overcome these challenges and ensure your voice is heard.Send us a textSupport the show
Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — The gif that keeps on giffing01:46 - Cyberattack Bricks Speed Cameras – BHIS - Talkin' Bout [infosec] News 2025-08-1802:39 - Story # 1: Perplexity made a sky-high $34.5 billion bid for Google Chrome — a bold and unusual move in the midst of antitrust scrutiny07:16 - Story # 2: Exclusive: US embeds trackers in AI chip shipments to catch diversions to China, sources say10:22 - Story # 3: How we found TeaOnHer spilling users' driver's licenses in less than 10 minutes12:17 - Story # 4: Cisco discloses maximum-severity defect in firewall software13:56 - Story # 5: Data Dump From APT Actor Yields Clues to Attacker Capabilities19:13 - Story # 6: Russian cyberattack in the Netherlands leaves speed cameras offline indefinitely23:30 - Story # 7: HTTP/2 MadeYouReset Vulnerability Enables Massive DDoS Attacks24:51 - Story # 8: LAPD Eyes ‘GeoSpy', an AI Tool That Can Geolocate Photos in Seconds29:05 - Story # 9: Manpower discloses data breach affecting nearly 145,000 people34:51 - Story # 10: Hacker Offers to Sell 15.8 Million Plain-Text PayPal Credentials On Dark Web Forum35:34 - Story # 11: The First Federal Cybersecurity Disaster of Trump 2.0 Has Arrived40:54 - Story # 12: New Clever Phishing Attack Uses Japanese Character “ん” to Mimic Forward Slash “/”46:28 - Story # 13: Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild48:13 - Story # 14: Plex warns users to patch security vulnerability immediately50:53 - ChickenSec: Noble Foods using soil mapping technology at organic egg farm
Cyberattacks are on the rise, with retail, banking, and airline industries all targeted in recent months. The cost to the economy is huge and thought to be worth billions of dollars. As businesses scramble to stay secure, we investigate the ransomware gangs behind the breaches and the experts working to stop them. If you'd like to get in touch with the programme, please email us at businessdaily@bbc.co.ukPresenter: Sam Gruet Producer: Megan Lawton(Picture: Back of hacker sitting in front of some computer screens. Credit: Getty Images)
Watch The X22 Report On Video No videos found (function(w,d,s,i){w.ldAdInit=w.ldAdInit||[];w.ldAdInit.push({slot:17532056201798502,size:[0, 0],id:"ld-9437-3289"});if(!d.getElementById(i)){var j=d.createElement(s),p=d.getElementsByTagName(s)[0];j.async=true;j.src="https://cdn2.decide.dev/_js/ajs.js";j.id=i;p.parentNode.insertBefore(j,p);}})(window,document,"script","ld-ajs");pt> Click On Picture To See Larger Picture Countries limited their CO2 production to save the planet, all they did was. shift everything to China, Trump is now shutting down Obama's climate programs. Trump's economy explodes and the D's/fake news/Fed don't know how to counter the narrative, they tried but it failing. Trump is dividing the Fed and setting everything up for the new economy. Hawaii was going to get hit with a Tsunami because of a major earthquake. Did Trump post Tsunami to let us know that a massive amount of info is going to be dropped? Different countries and the US have have been hit by a cyber attack. The fake news/D's are trying their best to spin the Russia evidence and they are losing to the facts. Did Trump trap Obama with Presidential immunity? Economy https://twitter.com/Geiger_Capital/status/1950545248825798729 Trump Axes Obama's Endangerment Finding During his two terms, Obama enacted several policies that subsidized uncompetitive, unneeded, and unwanted green energy while placing onerous regulations on fossil fuels. During his first term, Trump tried to reverse much of the Obama administration's anti-fossil fuel actions. However, there was only so much that could be done given the constant distractions Trump faced throughout his first term. One of the most consequential environmental regulations that Trump was unable to eliminate was Obama's “Endangerment Finding.” Most Americans have probably never heard of the Endangerment Finding. But this obscure rule has effectively allowed the federal government to label carbon dioxide a harmful “pollutant” that can be regulated under the Clean Air Act. Unfortunately, a U.S. Supreme Court decision allowed the Obama administration to enact the rule in the first place. In 2007, the U.S. Supreme Court ruled in Massachusetts v. EPA that “greenhouse gases are air pollutants covered by the Clean Air Act and that EPA must determine whether or not emissions of greenhouse gases from new motor vehicles cause or contribute to air pollution which may reasonably be anticipated to endanger public health or welfare.” Although this is the standard reading of the ruling, it is not totally accurate. According to the majority opinion, written by former Justice John Paul Stevens, “We need not and do not reach the question whether on remand EPA must make an endangerment finding, or whether policy concerns can inform EPA's actions in the event that it makes such a finding. We hold only that EPA must ground its reasons for action or inaction in the statute.” So, the 2007 decision did not determine that carbon dioxide is a harmful air pollutant. Rather, it granted that the EPA has the authority to determine if carbon dioxide is a harmful greenhouse gas based solely upon unequivocal data. Trump's EPA Administrator, Lee Zeldin, has made rescinding the Endangerment Finding a priority. “A lot of people are out there listening, they might not know what the endangerment finding is. If you ask congressional Democrats to describe what it is, the left would say that it means that carbon dioxide is a pollutant, carbon dioxide is an endangerment to human health. They might say methane is a pollutant, methane is an endangerment to human health,” Zeldin said on the Ruthless podcast. “That's an oversimplified, I would say inaccurate way to describe it,” Zeldin added. “The Obama administration said that carbon dioxide, when mixed with a bunch of other well-mixed gases, greenhouse gases, that it contributes to climate change. How much?