Podcasts about cyber command

Unified combatant command of the United States Armed Forces responsible for cyber operations

  • 217PODCASTS
  • 411EPISODES
  • 40mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jul 11, 2025LATEST
cyber command

POPULARITY

20172018201920202021202220232024


Best podcasts about cyber command

Latest podcast episodes about cyber command

The CyberWire
Behind the firewall, trouble brews.

The CyberWire

Play Episode Listen Later Jul 11, 2025 31:49


Fortinet patches a critical flaw in its FortiWeb web application firewall.  Hackers are exploiting a critical vulnerability in Wing FTP Server. U.S. Cyber Command's fiscal 2026 budget includes a new AI project.  Czechia's cybersecurity agency has issued a formal warning about Chinese AI company DeepSeek. The DoNot APT group targets Italy's Ministry of Foreign Affairs. Mexico's former president is under investigation for alleged bribes to secure spyware contracts. The FBI seizes a major Nintendo Switch piracy site. CISA releases 13 ICS advisories.  A retired US Army lieutenant colonel pleads guilty to oversharing classified information on a dating app. Our guest is Catherine Woneis, VP of Product at Fingerprint, to discuss how bots are being used to facilitate music royalty fraud. A federal judge is not impressed with a crypto-thief's lack of restitution. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Catherine Woneis, VP of Product at Fingerprint, to discuss how bots are being used to facilitate music royalty fraud and how companies can protect themselves. Selected Reading Critical SQL injection vulnerability in Fortinet FortiWeb enables unauthenticated remote code execution (Beyond Machines) Critical Wing FTCritical Wing FTP Server Vulnerability Exploited - SecurityWeekP Server Vulnerability Exploited (SecurityWeek) Cyber Command creates new AI program in fiscal 2026 budget (DefenseScoop) DeepSeek a threat to national security, warns Czech cyber agency (The Record) Indian Cyber Espionage Group Targets Italian Government (Infosecurity Magazine) Former Mexican president investigated over allegedly taking bribes from spyware industry (The Record) Major Nintendo Switch Piracy Website Seized By FBI (Kotaku) CISA Releases Thirteen Industrial Control Systems Advisories (CISA) Lovestruck US Air Force worker admits leaking secrets on dating app (The Register) Crypto Scammer Truglia Gets 12 Years Prison, Up From 18 Months (Bloomberg) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

STEM Everyday
STEM Everyday #300 | STEM, Technology, & Privacy | feat. Dr Leslie Gruis

STEM Everyday

Play Episode Listen Later Jul 5, 2025 36:00


Born a patriot, Dr. Leslie Gruis spent 30 years as a mathematician and intelligence officer at the National Security Agency, where she helped develop technology solutions that balanced national security with civil rights. She later served at U.S. Cyber Command and the National Intelligence Council. Now retired, she writes and speaks on privacy, surveillance, and democracy—making complex topics accessible for everyday Americans. Dr. Gruis is the author of Privacy: Past, Present, and Future, The Privacy Pirates, and a forthcoming third book. She also mentors K–12 STEM students, with a special focus on middle school girls.Dr Gruis on math: "In my experience, students rarely struggle with content alone. What they often lack is confidence and context. Many bright students are afraid to try, afraid to fail, or unsure how what they're learning fits into the real world. The most impactful thing educators can do is show them that problem-solving isn't about perfection—it's about curiosity." Dr Gruis on privacy: "One crucial point is that privacy is not just a personal preference—it's a civic right. When we give up privacy, even in small ways, we weaken our ability to think, speak, and dissent freely. It's not just about protecting data; it's about protecting civil rights. Devices like Ring doorbells, fitness trackers, and smartphones collect massive amounts of data, often without people fully realizing the long-term social impacts. This normalization of surveillance makes it even more urgent that we think critically about the trade-offs."Connect with Dr Gruis:LinkedIn: linkedin.com/in/leslie-gruis-b8060b141/Get a copy of The Privacy PiratesLearn more about Cyber Corps sfs.opm.govChris Woods is the host of the STEM Everyday Podcast... Connect with him:Website: dailystem.comTwitter/X: @dailystemInstagram: @dailystemYouTube: @dailystemGet Chris's book Daily STEM on AmazonSupport the show

Ones Ready
Ops Brief 069: Daily Drop - 2 July 2025 (B-2 Upgrades & The Air Force Rage Quits)

Ones Ready

Play Episode Listen Later Jul 2, 2025 15:46


Send us a textThe Air Force is bleeding instructors, CENTCOM's next boss is a mystery wrapped in vagueness, and the B-2 is getting a glow-up because, well, the B-21 still isn't ready. In this Daily Drop, Jared dives into the military's latest budget frenzy, Iran's Cold War cosplay, and why creatine is now part of his mental warfare toolkit. From wildfires pulling Guard troops off security gigs to Cyber Command begging for updated dial-up, it's another day of chaos, caffeine, and congressional cash grabs. Oh—and Space Force is building GPS knockoffs just in case things get really spicy. Buckle up, nerds.

Federal Newscast
A top official at U.S. Cyber Command is moving on

Federal Newscast

Play Episode Listen Later Jul 1, 2025 5:43


The Senate is moving closer to finalizing the GOP's reconciliation bill. And a few provisions affecting federal employees remain on the table. One proposal that was partially struck down would have made new federal hires choose between at-will employment and a 10% increase in retirement contributions. But even after a decision from the Senate parliamentarian, the provision could still include a 5% across-the-board retirement contribution increase. The National Active and Retired Federal Employees Association is urging lawmakers to remove the remaining federal workforce proposals, which it says will negatively impact employees. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

moving senate official gop cyber command national active retired federal employees association
The CyberWire
Turbulence in the cloud.

The CyberWire

Play Episode Listen Later Jun 27, 2025 37:13


Hawaiian Airlines reports a cybersecurity incident. Microsoft updates its Windows Resiliency Initiative after the 2024 CrowdStrike crash. CitrixBleed 2 is under active exploitation in the wild. Researchers disclose a critical vulnerability in Open VSX. Malware uses prompt injection to evade AI analysis. A new report claims Cambodia turns a blind eye to scam compounds. Senators propose a ban on AI tools from foreign adversaries. An NSA veteran is named top civilian at U.S. Cyber Command. Maria Varmazis speaks with Ian Itz from Iridium Communications on allowing IoT devices to communicate directly with satellites. One Kansas City hacker's bold marketing campaign ends with a guilty plea. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is Ian Itz, Executive Director at the IoT Line of Business at Iridium Communications. Ian spoke with T-Minus Space Daily host Maria Varmazis on their Deep Space weekend show about how Iridium allows IoT devices, like sensors and trackers, to communicate directly with satellites, bypassing terrestrial infrastructure. We share an excerpt of their conversation on our show today. You can listen to the full conversation on Deep Space. And, be sure to check out T-Minus Space Daily brought to you by N2K CyberWire each weekday on your favorite podcast app. Selected Reading Hawaiian Airlines Hit by Cybersecurity Incident (Infosecurity Magazine) Microsoft to Preview New Windows Endpoint Security Platform After CrowdStrike Outage (SecurityWeek) CitrixBleed 2 Vulnerability Exploited (Infosecurity Magazine) Vulnerability Exposed All Open VSX Repositories to Takeover (SecurityWeek) Prompt injection in malware sample targets AI code analysis tools (SC Media) Scam compounds labeled a 'living nightmare' as Cambodian government accused of turning a blind eye (The Record) Bipartisan bill seeks to ban federal agencies from using DeepSeek, AI tools from ‘foreign adversaries' (The Record) NSA's Patrick Ware takes over as top civilian at U.S. Cyber Command (The Record) Man Who Hacked Organizations to Advertise Security Services Pleads Guilty (SecurityWeek) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

DrZeroTrust
The Dr Zero Trust Show

DrZeroTrust

Play Episode Listen Later Jun 27, 2025 35:32


In this conversation, Dr. Zero Trust discusses various cybersecurity incidents, including the Norwegian dam hack, retail data breaches, and the challenges posed by data brokers. He emphasizes the importance of proactive security measures and the need for better regulations in the digital age. The discussion also touches on leadership changes at Cyber Command, emerging cybersecurity startups, and ethical considerations in the industry.TakeawaysThe Norwegian dam hack highlights the risks of weak passwords.Proactive security measures are essential for critical infrastructure.Data breaches in retail can affect millions of individuals.Leadership changes at Cyber Command may impact cybersecurity strategy.Data brokers operate in a regulatory gray area across states.Privacy concerns are exacerbated by the lack of federal regulations.Cybersecurity incidents in airlines can have widespread implications.The VA data breach serves as a historical lesson for cybersecurity.Emerging startups are addressing various cybersecurity challenges.Ethical considerations in cybersecurity practices are crucial.

Risky Business News
Srsly Risky Biz: Comparing Chinese and American 0day pipelines

Risky Business News

Play Episode Listen Later Jun 26, 2025 16:46


Tom Uren and Patrick Gray talk about a new report that compares Chinese and American 0day pipelines. The US is narrowly focussed on acquiring exquisitely stealthy and reliable exploits, while China casts a far broader net. That was fine in the past, but as 0days get harder and harder to find, the report argues that the US needs to change the way it goes about getting them. The pair also talk about Cyber Command supporting the US bomb strikes against Iranian nuclear facilities. We like to believe in magic cyber capabilities, but we suspect the truth was far more mundane in this case. This episode is also available on Youtube. Show notes Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace

Ones Ready
Ops Brief 065: Daily Drop - 24 June 2025 (Fat Shaming & B-2s)

Ones Ready

Play Episode Listen Later Jun 24, 2025 18:04


Send us a textWelcome back to The Daily Drop—where Jared rants, roasts, and breaks down the news like only the Ones Ready crew can. Today's main event? Iran punches back with a missile strike on Al-Udeid, but 13 of 14 missiles get slapped out of the sky. Trump drops an F-bomb on the lawn. Space and Cyber Command flex behind the scenes. And everyone's favorite stealth bat—the B-2—continues to steal headlines.Meanwhile, the Air Force wants airmen to run two miles... twice a year. Cue the Facebook tears and diaper rash in the NCO groups. Jared lets the fatties have it with a no-holds-barred takedown that would make your Chief blush. Also: the F-15EX has supply chain issues (again), Tech Sergeant promotions spike, and drones in Ukraine are now hiding in IKEA houses.It's blunt. It's brutal. It's your morning slap of reality—Ones Ready style.

The Daily Scoop Podcast
How the CIA is using AI for its open source intelligence mission

The Daily Scoop Podcast

Play Episode Listen Later Jun 24, 2025 20:08


The CIA, like other agencines in the intelligence community, is exploring how AI can boost its mission on both the human and open-source intelligence domains. As head of the open source enterprise for the CIA's Directorate of Digital Innovation, Kevin Carlson is helping usher in AI for the OSINT mission set. During a recent interview on the sidelines of the Special Competitive Studies Project's AI+ Expo, Carlson shared the potential for AI in open-source intelligence, how the CIA is looking to operationalize AI, the impact of the technology on the CIA workforce, and much more. U.S. Cyber Command played a role in American military's operation against Iranian nuclear facilities over the weekend, according to top Pentagon officials. Gen. Dan Caine, chairman of the Joint Chiefs of Staff, told reporters in a briefing at the Pentagon Sunday morning that, “The strike package was supported by U.S. Strategic Command, U.S. Transportation Command, U.S. Cyber Command, U.S. Space Command, U.S. Space Force and U.S. European command,” later thanking the cyber operators, among others, who made the mission possible. However, no further details about Cybercom's efforts were disclosed. The command referred DefenseScoop to the Pentagon for comment, where a spokesperson said they had nothing further to provide at this time beyond the transcript from Sunday's press conference. Although details about Cybercom's assistance for Operation Midnight Hammer, the code name for the strikes, remain murky, experts — most of whom spoke to DefenseScoop on condition of anonymity — outlined a number of possibilities for how the organization may have contributed to the effort. As the Army seeks to continue its transformation effort to become more efficient, the department's chief information officer is looking to streamline systems and processes. And no longer will “that's the way it's always been done” be an acceptable justification for maintaining the status quo. There have been directives from top levels of Army leadership to cut down on business systems and automate capabilities where possible. CIO Leonel Garciga said last week at an industry event that there's a big push right now from the secretary and the chief of staff to question: “do we need all of these systems, why do we have them?” calling some of it really old. Unveiled at the end of April, the Army Transformation Initiative is a top-down effort to improve how the service operates by shrinking headquarters elements, becoming leaner, slashing programs that aren't efficient and changing how money is spent. The goal is to cut obsolete programs and systems that don't contribute to success on the modern battlefield. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast  on Apple Podcasts, Soundcloud, Spotify and YouTube.

CISO Tradecraft
#238 - The Impact of the Israel Iran Conflict (with Nathan Case)

CISO Tradecraft

Play Episode Listen Later Jun 23, 2025 45:23


In this episode of CISO Tradecraft, host G Mark Hardy discusses the ongoing Israel-Iran conflict and its potential cyber implications with cybersecurity expert Nathan Case. They delve into lessons learned from the Russia-Ukraine conflict, discuss the effectiveness of cyber warfare, and evaluate Iran's cyber capabilities. The conversation also covers the ethical implications of cyber attacks, dual-use targets, and the danger of supply chain vulnerabilities. Practical advice is provided on improving cybersecurity measures, including the importance of MFA, network segmentation, and evaluating internal threats. Join us for an in-depth look at how current geopolitical tensions can impact global cybersecurity. Nathan Case - https://www.linkedin.com/in/nathancase/   Chapters 00:00 Introduction to the Israel-Iran Conflict 00:52 Meet the Expert: Nate Case 01:51 Cyber Warfare Insights from Russia-Ukraine Conflict 03:36 The Impact of Cyber on Critical Infrastructure 08:00 Ethics and Rules of Cyber Warfare 15:01 Iran's Cyber Capabilities and Strategies 16:56 Historical Context and Modern Cyber Threats 23:28 Foreign Cyber Threats: The Iranian Example 24:06 Israel's Cyber Capabilities 25:39 The Role of Cyber Command 26:23 Challenges in Cyber Defense 27:11 The Complexity of Cyber Warfare 32:21 Ransomware and Attribution Issues 36:13 Defensive Cyber Operations 39:39 Final Thoughts and Recommendations

The Jason Cavness Experience
Cody Brown CEO Research Group

The Jason Cavness Experience

Play Episode Listen Later Jun 22, 2025 92:42


Cody Brown CEO Security Research Group Sponsors The Jason Cavness experience is brought to you by Breeze Docs. Request for Proposals AKA RFPs, can be very challenging for Small & Medium-sized Businesses. Breeze Docs, the RFP response platform of choice for SMBs across North America, uses AI to help companies quickly complete RFPs, security questionnaires, and other important business documents. If you'd like to start winning more RFPs and reduce completion times by up to 80 percent, visit breezedocs.ai to book a demo.  By mentioning the Jason Cavness Experience, you will qualify for a free upgrade from Breeze Solo to Breeze AI+ valued at $6,000.  Follow the Breeze at www.breezedocs.ai Sign up for free upgrade here https://www.breezedocs.ai/rfp-response-software-jason-caveness CavnessHR: Seattle's Got Tech Sign up to demo your tech and win prizes for being the best tech  https://docs.google.com/forms/d/e/1FAIpQLSdBV98Am90oAoP08vWaS870Uk7Zp7WVDCwF6PALwlJf5NgmWw/viewform?usp=header Go to www.thejasoncavnessexperience.com for the podcast on your favorite platforms  Cody's Bio Cody Brown is a cybersecurity leader with over a decade of experience delivering strategic solutions for enterprise security, offensive cyber operations, and compliance. A former Navy CTN and DoD security expert, he has led national-scale projects for agencies like U.S. Cyber Command and the Army Research Lab. Cody is the CEO of Security Research Group, specializing in military-grade cybersecurity solutions. He holds a Master of Information Technology from Virginia Tech and a B.S. in Cyber Operations from Dakota State.  We talk about the following and other items Cody's Hobbies and Interests Understanding Cybersecurity Individual and Business Cybersecurity Threats Detecting and Responding to Hacks Ransomware and Extortion Tactics Common Cybersecurity Misconceptions Hacking Methods and Social Engineering Dark Web and Internet Infrastructure VPNs and Internet Privacy Starting a Cybersecurity Company Military Grade Cybersecurity Government vs. Private Sector Cybersecurity US Cybersecurity Ranking AI in Cybersecurity: Hype or Reality? Explaining Cybersecurity to Non-Techies P roudest Achievements and Business Challenges Advice for Aspiring Cybersecurity Professionals Career Paths in Cybersecurity Hiring and Vetting Cybersecurity Talent Private Sector's Role in National Cybersecurity Trends and Threats in Cybersecurity Importance of Multi-Factor Authentication Password Managers: Are They Worth It? Cybersecurity Myths and Realities Ethics in Cybersecurity Starting and Running a Cybersecurity Business Networking and Business Growth Balancing Technical Skills and Customer Service Personal Hobbies and Background Founding and Naming the Company Customer Recommendations and Implementation When to Prioritize Cybersecurity Employee Recruitment and Retention Navy Experience and Education Daily Prioritization and Work-Life Balance Early Interest in Technology and Career Path Future of Cybersecurity AI Platforms and Data Security Government Contracts and Bidding Process Evolution of Cybersecurity Company Focus and Insider Threats Cody's Social Media https://securityresearch.us/ https://www.linkedin.com/company/srg-sec/  https://www.linkedin.com/in/cody-ross-brown/  Cody's Advice   I'll just emphasize it the last time, if you don't have multifactor authentication enabled on your accounts, definitely just go and do that right now.

Cyber Briefing
June 10, 2025 - Cyber Briefing

Cyber Briefing

Play Episode Listen Later Jun 10, 2025 13:43


If you like what you hear, please subscribe, leave us a review and tell a friend!

The Other Side Of The Firewall
Texas Launches Statewide Cyber Command

The Other Side Of The Firewall

Play Episode Listen Later Jun 9, 2025 13:40


In this episode of the Other Side of the Firewall podcast, the hosts discuss the recent establishment of the Texas Cyber Command, its implications for cybersecurity in the state, and the economic opportunities it may create. They also touch on the challenges veterans face when transitioning to civilian roles, particularly regarding the complexities of federal resumes. The conversation emphasizes the importance of cybersecurity as a valuable investment rather than just an expense and the potential for Texas to lead in this area. Article: Texas governor signs bill for statewide Cyber Command https://statescoop.com/texas-cyber-command-gov-abbott/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExZ1JWWDRQdzlxdFJBVzJQSgEeDIADrVun1Bx8sqK8RAjN-yGhNkPWhMt93klSoCtdzYBs9qF4VTLXT8qG2ik_aem_2kMmpdyuI_1kvtJG0JH0OQ Please LISTEN

The CyberWire
AVCheck goes dark in Operation Endgame.

The CyberWire

Play Episode Listen Later Jun 2, 2025 29:16


An international law enforcement operation dismantles AVCheck. Trump's 2026 budget looks to cut over one thousand positions from CISA. Cyber Command's defensive wing gains sub-unified command status. A critical vBulletin vulnerability is actively exploited. Acreed takes over Russian markets as credential theft kingpin. Qualcomm patches three actively exploited zero-days in its Adreno GPU drivers. Researchers unveil details of a Cisco IOS XE Zero-Day. Microsoft warns a memory corruption flaw in the legacy JScript engine is under active exploitation. A closer look at the stealthy Lactrodectus loader. On today's Afternoon Cyber Tea, Ann Johnson speaks with Hugh Thompson, RSAC program committee chair. Decoding AI hallucinations with physics. Complete our annual audience survey before August 31. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we have our Afternoon Cyber Tea segment with Ann Johnson. On today's episode, Ann speaks with Hugh Thompson, RSAC program committee chair, as they discuss what goes into building the RSA Conference. Selected Reading Police takes down AVCheck site used by cybercriminals to scan malware (Bleeping Computer) DHS budget request would cut CISA staff by 1,000 positions (Federal News Network) Cybercom's defensive arm elevated to sub-unified command (DefenseScoop) vBulletin Vulnerability Exploited in the Wild (SecurityWeek) Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown (Infosecurity Magazine) Qualcomm fixes three Adreno GPU zero-days exploited in attacks (Bleeping Computer) Exploit details for max severity Cisco IOS XE flaw now public (Bleeping Computer) Microsoft Scripting Engine flaw exploited in wild, Proof-of-Concept published (Beyond Machines) Latrodectus Malware Analysis: A Deep Dive into the Black Widow of Cyber Threats in 2025 (WardenShield) The Root of AI Hallucinations: Physics Theory Digs Into the 'Attention' Flaw  (SecurityWeek) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Cybercrime Magazine Podcast
Cybercrime News For May 30, 2025: Britain to Invest £1B in Cyber Command to Counter Threats.

Cybercrime Magazine Podcast

Play Episode Listen Later May 30, 2025 2:24


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

Ones Ready
Ops Brief 050: Daily Drop - 21 May 2025 (Golden Dome, Qatari Jets & CYBERCOM)

Ones Ready

Play Episode Listen Later May 21, 2025 18:42


Send us a textStrap in, kids—this episode is a buffet of DoD chaos, spicy geopolitical moves, and “WTF are we even doing?” headlines. Jared unleashes on everything from the sketchiest Air Force One replacement idea ever (thanks, Qatar) to Golden Dome missile pipe dreams and the absolute circus that is Cyber Command's latest identity crisis.We're also sending ICE to Marine bases, cutting 14% of Space Force civilians (brilliant), and relying on $26 million to keep Reserve pilots in the sky. Oh, and if you thought privatizing base lodging was gonna save anyone money—LOL, you're adorable.All this while the Air Force plays catch-up with drone integration, and Netflix somehow makes the Thunderbirds look cost-effective. Welcome to another day in the Pentagon's magical clown tent.

Ones Ready
Ops Brief 049: Daily Drop - 20 May 2025 (Bonus Cuts & PCS Chao)

Ones Ready

Play Episode Listen Later May 20, 2025 21:05


Send us a textIn this extended Daily Drop, Jared unleashes a tactical nuke of sarcasm on the Pentagon's parade of WTF decisions. From billion-dollar contracts imploding to Airmen stuck in retirement limbo, it's clear nobody's steering this defense dumpster fire. Cyber Command wants to be SOCOM now (because that worked so well before), troops can't move because the PCS fairy ran out of money, and SpaceX is somehow our last hope in space. Also: PFAS water, political drama, and Congress failing military families… again.If you like your military updates with a side of rage and real talk, you're in the right TOC.

The Privacy Advisor Podcast
New York State of Mind: A discussion with NYC Chief Privacy Officer Michael Fitzpatrick

The Privacy Advisor Podcast

Play Episode Listen Later May 9, 2025 36:04


As chief privacy officer of the biggest city in the United States, it's safe to say that Michael Fitzpatrick doesn't have your normal, run-of-the-mill job. As part of New York's Office of Technology and Innovation, the Office of Information Privacy provides guidance to more than 175 agency privacy officers across the city. It also works closely with the city's Cyber Command and has partnered with the Cities Coalition for Digital Rights and the Biometrics Institute. IAPP Editorial Director Jedidiah Bracy caught up with Fitzpatrick to learn more about his work as CPO of New York City, how his office works across government and what he sees as some of the biggest challenges in privacy and cybersecurity.

Federal Drive with Tom Temin
Cyber Command adapts to realities of constant digital conflict

Federal Drive with Tom Temin

Play Episode Listen Later May 1, 2025 7:32


US Cyber Command has come a long way in the past 15 years, and it's finally closing the gap between day to day operations and the strategic view of cyber. Federal News Network's Anastasia Obis reports.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Download On Tech
The Intersection of Tech and Policy: Leaders Weigh In at #TheIntersect2025

Download On Tech

Play Episode Listen Later Apr 29, 2025 216:39


In this special episode of The Download on Tech, ITI hosts a collection of exclusive conversations with leading policymakers and industry executives on the defining challenges and opportunities facing the global tech sector. Recorded live at The Intersect 2025—Washington, D.C.'s premier tech policy summit—this episode explores the intersection of AI, cybersecurity, and U.S. competitiveness, offering a front-row seat to the dialogue shaping tomorrow's innovation landscape. Featured voices include: U.S. Senator Dave McCormick, Congresswoman Suzan DelBene, Congressman Brett Guthrie, Chairman of the House Energy & Commerce Committee, Congressman Jay Obernolte, Morgan Adamski, Executive Director at U.S. Cyber Command, Nathan Simington, Commissioner of the FCC, and many more. Listen now for expert insights on building smart, secure, and forward-looking tech policy. Catch the full episode.

Ronin Leadership
Women In Leadership and Cyber Command With Gen. Zan Vautrinot

Ronin Leadership

Play Episode Listen Later Apr 22, 2025 73:53


Join us for an inspiring conversation with retired Air Force General Zan Vautrinot, a pioneer in both leadership and cyber command. She opens up about breaking barriers, leading with purpose, and what it means to forge a path where few have gone before. This episode is a powerful reminder of the impact of resilience, vision, and the courage to lead.#leadership #womeninleadership #cybersecurity #militaryleaders #inspiration #trailblazer #gendervanguard

The CyberWire
CVE program gets last-minute lifeline.

The CyberWire

Play Episode Listen Later Apr 16, 2025 33:39


The CVE program gets a last-minute reprieve. A federal whistleblower alleges a security breach at the NLRB. Texas votes to spin up their very own Cyber Command. BreachForums suffers another takedown. A watchdog group sues the federal government over SignalGate allegations. The SEC Chair reveals a 2016 hack. ResolverRAT targets the healthcare and pharmaceutical sectors worldwide. Microsoft warns of blue screen crashes following recent updates. On our CertByte segment, Chris Hare is joined by Troy McMillan to break down a question targeting the EC-Council® Certified Ethical Hacker (CEH) exam. 4chan gets Soyjacked.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CertByte Segment Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K. In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by Troy McMillan to break down a question targeting the EC-Council® Certified Ethical Hacker (CEH) exam. Today's question comes from N2K's EC-Council Certified Ethical Hacker CEH (312-50) Practice Test. Have a question that you'd like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K's full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify.To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro.  Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers. Selected Reading Funding Expires for Key Cyber Vulnerability Database (Krebs on Security) CISA extends funding to ensure 'no lapse in critical CVE services' (Bleeping Computer) CVE Foundation (CVE Foundation) NoVa govcon firm Mitre to lay off 442 employees after DOGE cuts contracts (Virginia Business) Federal employee alleges DOGE activity resulted in data breach at labor board (NBC News) Whistleblower claims DOGE took sensitive data - now he's being hounded by threatening notes (CNN via YouTube) New state agency to deal with cyber threats advances in Texas House (Texarkana Gazette) BreachForums taken down by the FBI? Dark Storm hackers say they did it “for fun” (Cybernews) Here's What Happened to Those SignalGate Messages (WIRED) After breach, SEC says hackers used stolen data to buy stocks (CNET) New ResolverRAT malware targets pharma and healthcare orgs worldwide (Bleeping Computer) Microsoft warns of blue screen crashes caused by April updates (Bleeping Computer) Infamous message board 4chan taken down following major hack (Bleeping Computer)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
Former cybersecurity officials lose clearances.

The CyberWire

Play Episode Listen Later Apr 10, 2025 32:31


Trump targets former cybersecurity officials. Senator blocks CISA nominee over telecom security concerns. The acting head of NSA and Cyber Command makes his public debut. Escalation of Cyber Tensions in U.S.-China Trade Relations. Researchers evaluate the effectiveness of Large Language Models (LLMs) in automating Cyber Threat Intelligence. Hackers at Black Hat Asia pown a Nissan Leaf. A smart hub vulnerability exposes WiFi credentials. A new report reveals routers' riskiness. Operation Endgames nabs SmokeLoader botnet users. Our guest is Anushika Babu, Chief Growth Officer at AppSecEngineer, joins us to discuss the creative ways people are using AI. The folks behind the Flipper Zero get busy. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest is Anushika Babu, Chief Growth Officer at AppSecEngineer, joins us to discuss the creative ways people are using AI. Selected Reading Trump Signs Memorandum Revoking Security Clearance of Former CISA Director Chris Krebs (Zero Day) Senator puts hold on Trump's nominee for CISA director, citing telco security 'cover up' (TechCrunch) Infosec experts fear China could retaliate against tariffs with a Typhoon attack (The Register) New US Cyber Command, NSA chief glides in first public appearance (The Record) LARGE LANGUAGE MODELS ARE UNRELIABLE FOR CYBER THREAT INTELLIGENCE (ARXIG) Nissan Leaf Hacked for Remote Spying, Physical Takeover (SecurityWeek) TP-Link IoT Smart Hub Vulnerability Exposes Wi-Fi Credentials (Cyber Security News) Study Identifies 20 Most Vulnerable Connected Devices of 2025 (SecurityWeek) Authorities Seized Smokeloader Malware Operators & Seized Servers (Cyber Security News) Flipper Zero maker unveils ‘Busy Bar,' a new ADHD productivity tool (Bleeping Computer) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Risky Business News
Srsly Risky Biz: MAGA's NSA purge will get messy

Risky Business News

Play Episode Listen Later Apr 10, 2025 21:05


Tom Uren and Patrick Gray discuss Trump's recent firing of General Timothy Haugh, the head of NSA and Cyber Command. Tom dives into the implications and thinks why this is not good news for the agencies. They also discuss Europe losing faith in the US intelligence commitments that underpin transatlantic data flows. That would be bad news for US tech companies. This episode is also available on Youtube. Show notes

Badlands Media
The Daily Herold: April 8, 2025 – CIA Cover Blown, Dire Wolves Revived & The Tariff War Deepens

Badlands Media

Play Episode Listen Later Apr 8, 2025 59:11 Transcription Available


Jon Herold returns with a loaded Tuesday edition of The Daily Herold, unpacking everything from tariff tremors to CIA blunders. Special guest Gabrielle Cucci joins early in the episode for an intel-packed conversation about Trump's $1 trillion Pentagon budget and what it might really be funding, including missile defense upgrades, Space Force expansions, and Lockheed's next-gen fighter jets. They dive into the recent shakeups in military leadership, the quiet chaos inside Cyber Command, and the potential split of the NSA and CyberCom. Gabrielle breaks major news on a forced CIA vaccine program that risked blowing agent cover abroad, leading to the quiet firing of a senior official. Jon follows with deep analysis on the state of global trade negotiations as 70 countries scramble to adjust to Trump's shockwave tariff policy, including South Korea's fast pivot and Israel's awkward Oval Office moment. Other key stories include the Supreme Court greenlighting Trump's wartime immigration authority under the Alien Enemies Act, Ripple's $1.25B acquisition and crypto ascension, and Trump's 104% tariff punch to China. The show wraps with a look at weaponized prosecutions, IRS layoffs, revived dire wolves (yes, really), and Jon's take on how all these stories signal the regime's unraveling. Buckle up. It's a wide-ranging episode that proves the Herold always delivers.

A Better Peace: The War Room Podcast
SIGNALS, CYBER AND STRATEGY: RETIRED GENERAL PAUL NAKASONE

A Better Peace: The War Room Podcast

Play Episode Listen Later Apr 8, 2025 32:48


Retired U.S. Army General Paul Nakasone recently addressed the resident class at the U.S. Army War College, and he also sat down for an episode of A Better Peace with host Tom Spahr. While reflecting on his time leading the National Security Agency (NSA) and U.S. Cyber Command, Nakasone provides a fascinating peek into the world of cyber intelligence. He emphasizes the critical importance of integrating signals intelligence with cyber operations to maintain speed, agility, and unity of action. The discussion also highlights the transformative power of AI in the intelligence community and the necessity of strong partnerships between the public and private sectors. Conflicts like those in Ukraine and Gaza underscore the strategic importance of adapting to modern warfare's complexities for today's leaders.

Morning Announcements
Monday, April 7th, 2025 - Markets still crashing; China hits back; Tax cuts for the rich; IRS hackathon; NSA firings; Courts fight back

Morning Announcements

Play Episode Listen Later Apr 7, 2025 6:44


Today's Headlines: The world is still reeling from Trump's sweeping new tariffs, with markets in free fall and no signs of a course correction. Commerce Secretary Howard Lutnick confirmed the White House is not backing down, and China quickly retaliated with steep tariffs of its own, sanctions on U.S. companies, and an investigation into DuPont. Dow futures were already down 1600 points before markets even opened, and JP Morgan now puts the risk of a global recession at 60%. Meanwhile, Treasury Secretary Scott Bessent brushed off fears, even as he spent the week on Capitol Hill negotiating more tax cuts for the wealthy. In the background, the IRS is quietly working on a project to centralize taxpayer data in a new “mega API” system—likely with Palantir, raising privacy concerns. Elsewhere in the administration, the heads of the NSA and Cyber Command were abruptly fired, reportedly under pressure from far-right activist Laura Loomer. But the courts are beginning to push back: a federal judge ruled the NIH must restore full research funding, another ordered the government to return a man it wrongfully deported to El Salvador, and 19 state attorneys general are suing to block Trump's executive order requiring proof of citizenship to vote and tossing out mail ballots received after Election Day. Resources/Articles mentioned in this episode: Axios: Trump administration to markets: Don't expect a rescue   CNBC: Stock market today: Live updates  AP News: China slaps a 34% tax on all US imports in retaliation for Trump's tariffs NBC News: TikTok deal scuttled because of Trump's tariffs on China WSJ: JPMorgan Raises Recession Risk to 60% Axios: Bessent: "No reason" for markets to price in recession Axios: Bessent seeks tax cut as big summer win  Wired: DOGE Is Planning a Hackathon at the IRS. It Wants Easier Access to Taxpayer Data  NBC News: National Security Agency chief and deputy director dismissed NY Times: Judge Permanently Bars N.I.H. From Limiting Medical Research Funding  Reuters: Judge orders return of wrongly deported Maryland man to US from El Salvador WA Post: Democratic attorneys general sue to block Trump's voting restrictions Morning Announcements is produced by Sami Sage alongside Bridget Schwartz and edited by Grace Hernandez-Johnson Learn more about your ad choices. Visit megaphone.fm/adchoices

Here & Now
Why one toy manufacturer says tariffs will be 'fatal blow' to small business

Here & Now

Play Episode Listen Later Apr 7, 2025 24:11


David Mauro, creator of the Talking Jesus Dolls, is an American who stands behind President Trump's 'America First' ideology. But he worries about the impacts Trump's tariffs will have on his business. And, President Trump last week removed the head of the National Security Agency and Cyber Command. Gen. Michael Hayden, former director of the NSA joins us to react to that decision. Then, a stage-four cancer diagnosis hasn't stopped singer Raul Malo from touring the country. The Mavericks frontman joins us to talk about what he learned on the road.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy

TechCrunch
Trump fires head of National Security Agency and Cyber Command

TechCrunch

Play Episode Listen Later Apr 5, 2025 6:09


Plus - Automakers jump on Tesla's brand woes with discount EV offers; OpenAI says it'll release o3 after all, delays GPT-5 Learn more about your ad choices. Visit podcastchoices.com/adchoices

The President's Daily Brief
PDB Afternoon Bulletin | April 4th, 2025: Trump Purges National Security Ranks & Russia Rebukes U.S. Threats

The President's Daily Brief

Play Episode Listen Later Apr 4, 2025 11:05


In this episode of The President's Daily Brief:   President Trump continues his shake-up of the national security establishment, removing the head of the National Security Agency and U.S. Cyber Command.   The Kremlin delivers a stark warning to President Trump: any U.S. strike on Iran's nuclear facilities will have “catastrophic consequences.”   To listen to the show ad-free, become a premium member of The President's Daily Brief by visiting PDBPremium.com. Please remember to subscribe if you enjoyed this episode of The President's Daily Brief. YouTube: youtube.com/@presidentsdailybrief Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
A leadership shift.

The CyberWire

Play Episode Listen Later Apr 4, 2025 36:03


President Trump fires the head of NSA and Cyber Command. The Health Sector Coordinating Council asks the White House to abandon Biden-era security updates. Senators introduce bipartisan legislation to help fight money laundering. A critical vulnerability has been discovered in the Apache Parquet Java library. The State Bar of Texas reports a ransomware-related data breach. New Android spyware uses a password-protected uninstallation method. A Chinese state-backed threat group exploits a critical Ivanti vulnerability for remote code execution. Today's guest is Dave Dewalt, Founder and CEO of NightDragon, with the latest trends and outlook from cyber leaders.  Malware masquerades as the tax man. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today's guest is Dave Dewalt, Founder and CEO of NightDragon, sharing 2024 trends and a 2025 outlook. Selected Reading Haugh fired from leadership of NSA, Cyber Command (The Record) Defense Sec Hegseth in Signalgate Pentagon watchdog probe (The Register) HSCC Urges White House to Shift Gears on Health Cyber Regs (BankInfo Security) Lawmakers seek to close loophole limiting Secret Service investigations into cyber laundering (The Record) Critical Apache Parquet RCE Vulnerability Lets Attackers Run Malicious Code (Cyber Security News) State Bar of Texas Says Personal Information Stolen in Ransomware Attack (SecurityWeek) New Android Spyware That Asks Password From Users to Uninstall (TechCrunch) Chinese State Hackers Exploiting Newly Disclosed Ivanti Flaw (Infosecurity Magazine) Hackers Leveraging URL Shorteners & QR Codes for Tax-Related Phishing Attacks (Microsoft) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Renegade Talk Radio
Episode 103: Alex Jones Trump Goes On Total Warpath! 47 Just Axed The NSA & Cyber Command Heads

Renegade Talk Radio

Play Episode Listen Later Apr 4, 2025 83:42


Trump Goes On Total Warpath! 47 Just Axed The NSA & Cyber Command Heads, Killed Funding For WEF Forcing Klaus Schwab To Resign, Publicly Declared EU To Be Unelected Dictatorship & Much MORE

Fault Lines
Episode 435: Chaos, Loyalty, and the NSC Shake Up

Fault Lines

Play Episode Listen Later Apr 4, 2025 18:51


Today, Morgan, Les, Amy, and Jess unpack the dramatic firings at the National Security Council, following far-right influencer Laura Loomer's unexpected meeting with President Trump. In just 24 hours, two rounds of senior NSC officials—including the Commander and Deputy of U.S. Cyber Command—were dismissed, with a third round reportedly imminent. What triggered the purge? A mix of internal power struggles, loyalty tests, and fallout from last week's Signal Gate scandal.Is the Trump administration sidelining expertise in favor of ideological alignment? With trust in National Security Advisor Mike Waltz shaken and figures like Pete Hegseth gaining influence, is a broader battle underway between traditional GOP Reaganites and those who are more skeptical of U.S. alliances. And who stands to benefit from this internal unraveling at the heart of U.S. foreign policy?Check out the answers to these questions and more in this episode of Fault Lines.Check out the sources that helped shape our Fellows' discussion: https://jinsa.org/jinsa_report/path-to-snapback-april-2025/ https://www.axios.com/2025/04/02/trump-iran-talks-bomb-threats https://www.fdd.org/analysis/2025/03/31/there-will-be-a-bombing-trump-threatens-to-attack-iran-if-no-nuclear-deal-reached/ Follow our experts on Twitter: @NotTVJessJones @morganlroach@amykmitchell@lestermunsonLike what we're doing here? Be sure to rate, review, and subscribe. And don't forget to follow @masonnatsec on Twitter!We are also on YouTube, and watch today's episode here: https://youtu.be/n8jDdjPvV64 Hosted on Acast. See acast.com/privacy for more information.

The Daily Scoop Podcast
Trump fires the head of NSA, Cyber Command; Pentagon's IG to investigate Hegseth's involvement in ‘SignalGate'

The Daily Scoop Podcast

Play Episode Listen Later Apr 4, 2025 3:58


Gen. Timothy Haugh, the commander of U.S. Cyber Command and the director of NSA, was fired Thursday, according to press reports and lawmakers. It was not immediately clear why Haugh was fired. However, his dismissal comes amid a purge of other national security officials at the National Security Council and NSA. It happened following a visit to the Oval Office of political activist Laura Loomer, who has urged President Donald Trump to fire certain officials due to their perceived disloyalty to him and his agenda. She posted a message last night on X saying Haugh and NSA Deputy Director Wendy Noble has been fired for being “disloyal” to Trump. Cybercom's deputy commander, Army Lt. Gen. William Hartman, is in line to lead the command on an acting basis. The Defense Department's top watchdog announced Thursday it will initiate a formal investigation into Secretary of Defense Pete Hegseth's participation in discussing impending military operations on unclassified networks. On March 24, Atlantic magazine's editor-in-chief Jeffrey Goldberg published a story revealing he was accidentally added to a group chat on Signal, an encrypted but unclassified commercial messaging app, where some of the Trump administration's top national security officials discussed upcoming strikes against Houthi militants in Yemen — including Hegseth. “The objective of this evaluation is to determine the extent to which the Secretary of Defense and other DoD personnel complied with DoD policies and procedures for the use of a commercial messaging application for official business,” Steve Stebbins, acting inspector general at the Pentagon, wrote in a memo published Thursday. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast  on Apple Podcasts, Soundcloud, Spotify and YouTube.

The Social-Engineer Podcast
Ep. 297 - Security Awareness Series - Quantifying and Owning Risk with Roy Luongo

The Social-Engineer Podcast

Play Episode Listen Later Mar 17, 2025 34:34


Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Roy Luongo. Roy is the Chief Information Security Officer for the United States Secret Service. He leads a team in the defense and information assurance of all USSS information systems and solutions. Prior to his current role he was the Director, Joint Mission Operations Center for Cyber Command, providing oversight of mission critical Cyber Operations infrastructures. He has also served as Chief, NSA Red Team and Technical Director for Interactive Operations for the NSA. Roy is a retired Army soldier with 20 years' service within the Intelligence and Cyber career fields. [March 17, 2025]   00:00 - Intro 00:17 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                01:55 - Roy Luongo Intro 02:44 - The Path to CISO of the Secret Service 04:58 - Cybersecurity in Early Education 07:50 - The Entry Level Catch-22 12:24 - Quantifying Risk 14:27 - The Best Way Forward 16:51 - The Effects and Future of AI 20:06 - Understanding Your Needs 22:11 - Advise to Young Roy 24:56 - The Cost of Training 29:01 - Mentors -          Ed Skoudis -          Brigadier General Brian D. Vile -          Shawn Turskey 29:55 - Lollipop Moments -          TEDxToronto - Drew Dudley "Leading with Lollipops" 31:33 - Book Recommendations -          Cybersecurity Canon - Rick Howard -          Kingpin - Kevin Poulsen -          Turn the Ship Around! - L. David Marquet 33:49 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

Storm⚡️Watch by GreyNoise Intelligence
Cybersecurity Chaos: CISA Controversy, Telecom Hacks, and Exploited Vulnerabilities

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Mar 11, 2025 62:30


Forecast: Cloudy with a chance of compromised credentials and scattered vulnerabilities—stay alert out there! ‍ In this episode of Storm⚡️Watch, we're unpacking some of the most pressing developments in cybersecurity and what they mean for the industry. First, we tackle the state of CISA and its mounting challenges. From allegations that the Trump administration ordered U.S. Cyber Command and CISA to stand down on addressing Russian cyber threats, to financial groups pushing back against CISA's proposed incident reporting rule, there's no shortage of turbulence. Adding fuel to the fire, Homeland Security Secretary Kristi Noem has disbanded eight federal advisory committees, including key cybersecurity groups, citing compliance with a Trump-era executive order. Critics argue these cuts could weaken public-private collaboration and hinder CISA's ability to protect critical infrastructure. We'll break down what all this means for the future of cybersecurity leadership in the U.S. Next, we revisit a shocking case involving a U.S. soldier who plans to plead guilty to hacking 15 telecom carriers. This story highlights the ongoing risks posed by insider threats and the vulnerabilities within telecom networks, which are often targeted for their treasure troves of sensitive data. We'll explore how this case unfolded, what it reveals about vetting processes for individuals with access to critical systems, and the broader implications for cybersecurity in government-affiliated organizations. We also spotlight some fascinating research from Censys on a phishing scam exploiting toll systems across multiple states. Attackers are leveraging cheap foreign SIM cards and Chinese-hosted infrastructure in a campaign that keeps evolving. Plus, RunZero sheds light on a critical vulnerability affecting Edimax IP cameras (CVE-2025-1316), while GreyNoise reports on mass exploitation of a PHP-CGI vulnerability (CVE-2024-4577) and active threats linked to Silk Typhoon-associated CVEs. Storm Watch Homepage >> Learn more about GreyNoise >>  

The Shared Security Show
Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes

The Shared Security Show

Play Episode Listen Later Mar 10, 2025 20:21


In this episode, we discuss whether the Trump administration ordered the U.S. Cyber Command and CISA to stand down on the Russian cyber threat. We also touch on the Canadian tariff situation with insights from Scott Wright. Additionally, we discuss the recent changes to Firefox's privacy policy and what it means for user data. ** […] The post Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes appeared first on Shared Security Podcast.

Security Conversations
Revisiting the Lamberts, i-Soon indictments, VMware zero-days

Security Conversations

Play Episode Listen Later Mar 8, 2025 99:32


Three Buddy Problem - Episode 37: This week, we revisit the public reporting on a US/Russia cyber stand down order, CISA declaring no change to its position on tracking Russian threats, and the high-level diplomatic optics at play. Plus, a dissection of ‘The Lamberts' APT and connections to US intelligence agencies, attribution around ‘Operation Triangulation' and the lack of recent visibility into these actors. We also discuss a fresh batch of VMware zero-days, China's i-Soon ‘hackers-for-hire' indictments, the Pangu/i-Soon connection, and a new wave of Apple threat-intel warnings about mercenary spyware infections. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).

Hacker And The Fed
Smart Bed Backdoor, Crypto Heists, Router Hacks, and U.S. Cyber Command's Stand Down

Hacker And The Fed

Play Episode Listen Later Mar 6, 2025 54:58


In this episode of Hacker in the Fed, former FBI special agent Chris Tarbell and ex-black hat hacker turned cybersecurity expert Hector Monsegur discuss GrayNoise's 2025 Mass Internet Exploitation Report, revealing how attackers are exploiting vulnerabilities faster than ever, particularly targeting home routers. The two also cover a shocking backdoor discovery in the Eight Sleep smart mattress, the rising trend of violent crypto-related attacks, and the recent Bybit hack. Hector wraps up with a deep dive into the U.S. Cyber Command's recent decision to halt cyber operations against Russia and what it means for national security. Send HATF your questions at questions@hackerandthefed.com.

Risky Business
Risky Business #782 -- Are the USA and Russia cyber friends now?

Risky Business

Play Episode Listen Later Mar 5, 2025 50:12


On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: Did the US decide to stop caring about Russian cyber, or not? Adam stans hard for North Korea's massive ByBit crypto-theft Cellebrite firing Serbia is an example of the system working Starlink keeps scam compounds in Myanmar running Biggest DDoS botnet yet pushes over 6Tbps This week's episode is sponsored by network visibility company Corelight. Vincent Stoffer, field CTO at Corelight joins to talk through where eyes on your network can spot attackers like Salt and Volt Typhoon. This episode is also available on Youtube. Show notes Sygnia Preliminary Bybit Investigation Report Verichains Bybit Incident Investigation Preliminary Report North Koreans finish initial laundering stage after more than $1 billion stolen from Bybit | The Record from Recorded Future News Risky Bulletin: Trump administration stops treating Russian hackers as a threat - Risky Business Did Trump Admin Order U.S. Cyber Command and CISA to Stand Down on Russia? (Story updated) Russia to redeploy resources freed up by end of war in Ukraine, warns Finnish intelligence | The Record from Recorded Future News FBI urges crypto community to avoid laundering funds from Bybit hack | The Record from Recorded Future News Risky Bulletin: Cellebrite bans bad boy Serbia - Risky Business Belgium probes suspected Chinese hack of state security service | The Record from Recorded Future News Gabbard: UK demand to Apple for backdoor access is 'grave concern' to US | The Record from Recorded Future News Elon Musk's Starlink Is Keeping Modern Slavery Compounds Online | WIRED U.S. Soldier Charged in AT&T Hack Searched “Can Hacking Be Treason” – Krebs on Security Google Password Manager finally syncs to iOS—here's how - Ars Technica Gmail Security Alert: Google To Ditch SMS Codes For Billions Of Users Massive Iran-linked botnet launches DDoS attacks against telecom, gaming platforms | Cybersecurity Dive Microsoft-signed driver used in ransomware attacks | Cybersecurity Dive London member of ‘Com' network convicted of making indecent images of children | The Record from Recorded Future News Volt Typhoon & Salt Typhoon Attackers Are Evading EDR: What Can You Do? | Corelight

The CyberWire
CISA keeps watch on Russia.

The CyberWire

Play Episode Listen Later Mar 4, 2025 35:36


CISA says it will continue monitoring Russian cyber threats. Broadcom patches zero-days that can lead to VM escape. Google patches 43 Bugs, including two sneaky zero-days. CISA flags vulnerabilities exploited in the wild. Palau's health ministry recovers from ransomware attack. Lost and found or lost and leaked? On this week's Threat Vector segment, David Moulton previews an episode with Hollie Hennessy on IoT cybersecurity risk mitigation and next week's special International Women's Day episode featuring trailblazing women from Palo Alto Networks sharing their cybersecurity journeys and leadership insights. And is that really you?  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment On our Threat Vector Segment, host David Moulton shares previews of two upcoming episodes. On this Thursday's episode, he speaks with Hollie Hennessy, Principal Analyst for IoT Cybersecurity at Omdia, to discuss how attackers exploit vulnerabilities in connected environments and the best approaches for risk mitigation. The next week On Thursday, March 13th, David shares four conversations with some of the trailblazing women at Palo Alto Networks in honor of International Women's Day and Women's History Month. They share their journeys into cybersecurity, discuss the challenges they faced and offer insights on leadership, innovation, and mentorship. Be sure to tune in for some inspiring stories. Don't miss the full episodes every Threat Vector Thursday, subscribe now to stay ahead. If you're in Austin, Texas for SXSW and want to meet up, email David at threatvector@Paloaltonetworks.com.  Selected Reading DHS says CISA won't stop looking at Russian cyber threats (CyberScoop) Did Trump Admin Order U.S. Cyber Command and CISA to Stand Down on Russia? (Zero Day) Broadcom Patches 3 VMware Zero-Days Exploited in the Wild (SecurityWeek) Google fixes Android zero-day exploited by Serbian authorities (Bleeping Computer)  Several flaws added to CISA known exploited vulnerabilities catalog (SC Media)  Palau health ministry on the mend after Qilin ransomware attack (The Record) Lost luggage data leak exposes nearly a million records (Cybernews) Lee Enterprises ransomware attack halts freelance and contractor payments (TechCrunch) TikTok Blasts Australia for YouTube Carveout in Social Media Ban (Bloomberg) Deepfake cyberattacks proliferated in 2024, iProov claims (The Register)   Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Business of Tech
U.S. Cyber Policy Shift: MSPs Face New Threats, Talent Retention Challenges, and IPO Market Decline

Business of Tech

Play Episode Listen Later Mar 4, 2025 13:42


U.S. Cyber Command has been ordered to halt all planning against Russia, marking a significant shift in the country's cyber policy. This decision, directed by Defense Secretary Pete Hedgeset, comes as the focus of U.S. cybersecurity efforts pivots away from Russia and towards threats from China and other adversaries. Reports indicate that this change has raised concerns about potential vulnerabilities, especially as Russian cybercriminal groups remain active. The Cybersecurity and Infrastructure Security Agency (CISA) has denied claims that it is reducing its focus on Russian threats, asserting its commitment to defending against all cyber threats to U.S. critical infrastructure.The podcast also discusses the challenges faced by IT service providers in retaining new talent. A recent report highlights that employees with one to three years of experience have a significantly higher churn rate compared to their more experienced counterparts. This situation underscores the need for managed service providers (MSPs) to enhance their onboarding processes, career progression paths, and workplace culture to improve employee retention. Additionally, the limited role of remote work in the industry suggests that MSPs must compete on factors beyond salary, such as workplace environment and benefits.Furthermore, the episode touches on the financial performance of Enable, a key player in the MSP software market. Despite reporting a year-over-year revenue growth of 7% and transitioning a significant portion of its revenue to annual contracts, Enable's stock price plummeted by over 25% following its earnings call. Analysts have adjusted their price targets downward, indicating a lack of confidence in the market for MSP-focused software companies. This trend suggests that the dream of an IPO resurgence for such companies may be fading, with a shift towards private equity consolidation becoming more prevalent.Finally, the podcast emphasizes the importance of resilience, vendor risk management, and strategic alignment for MSPs in light of these market dynamics. As the landscape evolves, providers are encouraged to focus on enhancing their cybersecurity offerings and adapting to regulatory changes. The episode concludes with a reminder for MSPs to be proactive in their approach to business, as the days of passive compliance are over, and security and regulation are becoming critical factors in the IT services industry. Three things to know today 00:00 U.S. Cyber Policy Shifts—Providers May Need to Step Up as Government Focus Changes05:27 IT Service Providers Are Hiring—But Can They Keep Their New Talent?08:25 MSP IPOs? The Market Says No—N-able's Stock Drop Tells the Story Supported by:  https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship https://getflexpoint.com/msp-radio/  Event: : https://www.nerdiocon.com/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

Así las cosas
"Estados Unidos ordena al U.S. Cyber Command pausar acciones digitales ofensivas contra Rusia"

Así las cosas

Play Episode Listen Later Mar 4, 2025 7:48


The CyberWire
Is it cyber peace or just a buffer?

The CyberWire

Play Episode Listen Later Mar 3, 2025 24:35


Cyber Command ordered to halt offensive operations against Russia during Ukraine negotiations. Ransomware actors exploit Paragon Partition Manager vulnerability. Amnesty International publishes analysis of Cellebrite exploit chain. California orders data broker to shut down for violating the Delete Act. On our Afternoon Cyber Tea segment with host Ann Johnson of Microsoft Security, Ann speaks with Igor Tsyganskiy, Microsoft's Global Chief Information Security Officer, about "The Power of Partnership in Cyber Defense." And it's the end of an era. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Afternoon Cyber Tea segment. On our monthly Afternoon Cyber Tea segment with host Ann Johnson of Microsoft Security, Ann speaks with Igor Tsyganskiy, Microsoft's Global Chief Information Security Officer, about "The Power of Partnership in Cyber Defense." Ann and Igor share an engaging conversation on the challenges and optimism driving the fight against cyber threats. To hear the full conversation on Ann's show, check out the episode here. You can catch new episodes of Afternoon Cyber Tea every other Tuesday on N2K CyberWire network and on your favorite podcast app.  Selected Reading Exclusive: Hegseth orders Cyber Command to stand down on Russia planning (The Record)  As Trump warms to Putin, U.S. halts offensive cyber operations against Moscow (The Washington Post)  Hegseth Orders Pentagon to Stop Offensive Cyberoperations Against Russia (The New York Times)  Ransomware gangs exploit Paragon Partition Manager bug in BYOVD attacks (Bleeping Computer) VU#726882 - Paragon Partition Manager contains five memory vulnerabilities within its BioNTdrv.sys driver that allow for privilege escalation and denial-of-service (DoS) attacks (Carnegie Mellon University Software Engineering Institute CERT Coordination Center) Cellebrite zero-day exploit used to target phone of Serbian student activist (Amnesty International Security Lab) California shuts down data broker for failing to register (The Record)   Research finds 12,000 ‘Live' API Keys and Passwords in DeepSeek's Training Data (Truffle Security)  Cyberattack detected at Polish space agency, minister says (Reuters) Polish space agency confirms cyberattack (The Register) As Skype shuts down, its legacy is end-to-end encryption for the masses (TechCrunch)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Cyber Security Headlines
Hegseth orders standdown, Microsoft terminates Skype, Cuban offers lifeline

Cyber Security Headlines

Play Episode Listen Later Mar 3, 2025 7:36


Hegseth orders Cyber Command to stand down on Russia planning Microsoft hangs up on Skype after 14 years Mark Cuban offers to fund government tech unit that was cut  Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com. Find the stories behind the headlines at CISOseries.com.

Far Out With Faust (FOWF)
Ex-Military Intel Analyst Exposes Israel War Lies & Political Blackmail | Josephine Guilbeau

Far Out With Faust (FOWF)

Play Episode Listen Later Mar 2, 2025 91:32


Send us a textEnjoy this episode? Please share it with at least ONE friend who you think needs to hear it!Former U.S. Army All-Source Intel Analyst Josephine Guilbeau exposes war deception, political blackmail, and the hidden forces controlling global conflicts in an eye-opening conversation about truth, power, and awakening on episode 192 of the Far Out with Faust podcast.A seasoned intelligence professional, Josephine served for 17 years, including mobilization in Operation Enduring Freedom, supporting cyberspace operations for U.S. Cyber Command and the Cyber National Mission Force. Her firsthand experience working within classified government sectors shaped her understanding of cybersecurity, psychological operations, surveillance, and strategic warfare. Since resigning in February 2023, she has become a powerful voice for Middle East activism, exposing government corruption, and advocating for whistleblowers.In this episode, Josephine and Faust take a deep dive into how war narratives are crafted, the role of foreign influence in American politics, and the evolving battle between control and consciousness. They explore the psychological toll of awakening, the suppression of whistleblowers, and the deeper spiritual implications of uncovering hidden truths. The conversation covers the Israel-Gaza conflict, media manipulation, and the realities of modern warfare. Plus, they dissect government narratives around UFO disclosure — is it all just another psyop?Topics include:• Government war narratives and deception• October 7th intelligence analysis vs. media narrative• The Israel-Gaza conflict and its global impact• Political blackmail and compromised leaders• Foreign influence in U.S. politics (AIPAC, Israel)• Mind control, mass manipulation & psychological operations• Whistleblower suppression & media censorship• Spiritual implications of awakening• The UFO narrative — is disclosure real, or another distraction?• How suffering leads to collective consciousness shifts… and much more! Challenge everything you thought you knew and take a deeper look at the world behind the headlines.

ITSPmagazine | Technology. Cybersecurity. Society
Transforming Healthcare: How Innovation is Driving Better Patient Outcomes | A HIMSS 2025 Conversation with Albe Zakes | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 26, 2025 20:36


In this episode of the On Location series recorded for HIMSS 2025 in Las Vegas, hosts Marco Ciappelli and Sean Martin sit down with Albe Zakes, Director of Strategic Communications at HIMSS, to discuss the transformative impact of technology on healthcare and the upcoming conference's role in driving innovation. HIMSS, a global society of health and technology professionals, brings together leaders, clinicians, practitioners, and innovators to harness the power of information and technology for improved patient outcomes and expanded access to healthcare.A Focus on Collaboration Over ExpertiseZakes emphasizes a significant shift in how the HIMSS conference operates. While traditional conferences often rely on a top-down approach with speakers sharing insights, HIMSS is increasingly prioritizing collaboration. The 2025 event will feature expanded networking opportunities and dedicated breaks to foster real-time partnerships and relationships that can extend beyond the conference. The approach underscores the organization's belief in the “symbiotic triangle” of people, technology, and process—highlighting that technology alone is not enough without empowering the people who use it.Exploring Key Topics: AI, Cybersecurity, and Health EquityArtificial intelligence (AI) is set to take center stage at HIMSS 2025, reflecting its transition from a speculative technology to a practical tool reshaping healthcare. With dozens of educational sessions dedicated to AI, the conference will explore how clean data and strong governance are critical to unlocking AI's potential in improving healthcare delivery.Cybersecurity is another major focus, with a dedicated Healthcare Cybersecurity Forum and a Cybersecurity Command Center on the exhibit floor. Notably, former U.S. Cyber Command and NSA Director General Paul Nakasone will deliver a keynote on maintaining security in an AI-driven world. The emphasis on cybersecurity aligns with the critical need to protect patient data and maintain trust within the healthcare ecosystem.Zakes also highlights the Health Equity Forum, which aligns with HIMSS's mission to ensure that technology advancements translate into equitable healthcare access. The forum will gather leaders from governments and nonprofits worldwide to discuss strategies to improve health equity globally.Innovation and Emerging TechnologiesThe conference aims to showcase not only established tech giants like Oracle and AWS but also emerging companies and startups. The “First-Time Exhibitors Pavilion” and the “Emerge Innovation Experience” will offer opportunities for attendees to engage with new technologies and ideas. The Emerge Innovation Experience will feature a pitch contest and networking events for entrepreneurs and investors, driving forward-thinking solutions in healthcare technology.The Power of People, Technology, and ProcessThis episode offers a glimpse into the critical themes that will dominate HIMSS 2025, providing valuable insights into how technology, collaboration, and innovation are reshaping healthcare. With thought-provoking discussions on AI, cybersecurity, and health equity, listeners are invited to explore how these advancements impact not only healthcare systems but also society at large. Tune in to hear more about the initiatives and opportunities at HIMSS 2025, and how you can be part of the conversation shaping the future of healthcare.Guest: Albe Zakes, Director of Strategic Communications at HIMSS | On LinkedIn: https://www.linkedin.com/in/albezakes/Hosts:Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine:  https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsTo learn about event coverage sponsorship options, please visit https://itspm.ag/event-coverage-package____________________________ResourcesLearn more and catch more stories from HIMSS 2025 coverage: https://www.itspmagazine.com/on-location____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More

The CyberWire
Can the U.S. keep up in cyberspace?

The CyberWire

Play Episode Listen Later Feb 24, 2025 35:34


Retired Gen. Paul Nakasone warns the U.S. is falling behind in cyberspace. Australia orders government entities to remove and ban Kaspersky products. FatalRAT targets industrial organizations in the APAC region. A major cryptocurrency exchange reports the theft of $1.5 billion in digital assets. Apple removes end-to-end encryption (E2EE) for iCloud in the UK. Researchers uncover a LockBit ransomware attack exploiting a Windows Confluence server. Researchers uncover zero-day vulnerabilities in a widely used cloud logging utility.A PayPal email scam is tricking users into calling scammers. Republican leaders in the House request public input on national data privacy standards. A Michigan man faces charges for his use of the Genesis cybercrime marketplace. Our guest is  Karl Sigler, Senior Security Research Manager from Trustwave SpiderLabs, explaining the domino effect of a cyberattack on the power grid. Meta sues an Insta Extortionist. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today, Dave speaks with Karl Sigler, Senior Security Research Manager from Trustwave SpiderLabs, about the domino effect of a cyberattack on the power grid. You can dig into the details in their report.  Selected Reading Former NSA, Cyber Command chief Paul Nakasone says U.S. falling behind its enemies in cyberspace (CyberScoop) Kaspersky Banned on Australian Government Systems (SecurityWeek) Chinese Hackers Attacking Industrial Organizations With Sophisticated FatalRAT (Cyber Security News) Bybit Hack Drains $1.5 Billion From Cryptocurrency Exchange (SecurityWeek) Experts Slam Government After “Disastrous” Apple Encryption Move (Infosecurity Magazine) Confluence Exploit Leads to LockBit Ransomware (The DFIR Report) Fluent Bit 0-day Vulnerabilities Exposes Billions of Production Environments to Cyber Attacks (Cyber Security News) Beware: PayPal "New Address" feature abused to send phishing emails (Bleeping Computer) Top House E&C Republicans query public for ideas on data privacy law (CyberScoop) US Charges Genesis Market User (SecurityWeek) Meta Sues Alleged Instagram Extortionist (404 Media)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Daily Scoop Podcast
The Pentagon is looking to cut about 5,400 probationary workers starting this week; Why the U.S. is falling behind its enemies in cyberspace

The Daily Scoop Podcast

Play Episode Listen Later Feb 24, 2025 4:11


The Pentagon is set to begin its termination of thousands of select probationary employees in the coming days as part of the Trump administration's unfolding campaign to “maximize efficiency” by rapidly reducing the size of the federal workforce. Darin Selnick, who is performing the duties of undersecretary of defense for personnel and readiness, announced the plans in an email to reporters on Friday afternoon. “We expect approximately 5,400 probationary workers will be released beginning next week as part of this initial effort, after which we will implement a hiring freeze while we conduct a further analysis of our personnel needs, complying as always with all applicable laws,” Selnick wrote. He confirmed that the DOD is anticipating at this time to shrink its civilian workforce by 5% to 8% in an effort to “produce efficiencies and refocus” the department's priorities to match those of President Donald Trump's new administration. The United States is falling “increasingly behind” its adversaries in cyberspace, the former head of the Cyber Command and National Security Agency said Saturday. Speaking at the DistrictCon cybersecurity conference in Washington, D.C., retired Gen. Paul Nakasone said that the nation's adversaries are continuing to be able to broaden the spectrum of what they're able to do to us. Nakasone said incidents like Chinese government-backed breaches of U.S. telecommunications companies and other critical infrastructure — as well as a steady drumbeat of ransomware attacks against U.S. targets — illustrate “the fact that we're unable to secure our networks, the fact that we're unable to leverage the software that's being provided today, the fact that we have adversaries that continue to maintain this capability.” The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast  on Apple Podcasts, Soundcloud, Spotify and YouTube.

The CyberWire
A wolf in DOGE's clothing?

The CyberWire

Play Episode Listen Later Feb 4, 2025 32:54


DOGE's unchecked access to federal networks sparks major cybersecurity fears. Senator Hawley's AI ban targets China and raises free speech concerns. Apple service ticket portal vulnerability exposed millions of users' data. North Korean ‘FlexibleFerret' malware targets macos via job scams and fake zoom apps. February 2025 android security update fixes 48 vulnerabilities, including exploited zero-day. Grubhub data breach exposes customer and driver information. Abandoned cloud infrastructure creates major security risks. Texas to launch its own Cyber Command amid rising cyber threats. Dell PowerProtect vulnerabilities pose critical security risks. On our Threat Vector segment, David Moulton and his guests look at the potential dangers of DeepSeek. U.S. Government is quietly altering the Head Start database. And a moment of inspiration from a spacefaring poet. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment Artificial intelligence is advancing fast, but with innovation comes risk. In this segment of Threat Vector, host David Moulton sits down with Sam Rubin, SVP of Consulting and Threat Intelligence at Unit 42, and Kyle Wilhoit, Director of Threat Research, to explore the vulnerabilities of DeepSeek, a new large language model. To listen to the full discussion, please check out the episode here or on your favorite podcast app, and tune in to new episodes of Threat Vector by Palo Alto Networks every Thursday.  Selected Reading Musk's DOGE effort could spread malware, expose US systems to threat actors (CSO Online) As DOGE teams plug into federal networks, cybersecurity risks could be huge, experts say (The Record) Senator Hawley Proposes Jail Time for People Who Download DeepSeek (404 Media) Apple Service Ticket portal Vulnerability Exposes Millions of Users Data (Cyber Security News)  N. Korean ‘FlexibleFerret' Malware Hits macOS with Fake Zoom, Job Scams (Hackread) Google fixes Android kernel zero-day exploited in attacks (Bleeping Computer) GrubHub Data Breach - Customers Phone Numbers Exposed (Cyber Security News)  Here's all the ways an abandoned cloud instance can cause security issues (CyberScoop) Texas to Establish Cyber Command Amid “Dramatic” Rise in Attacks (Infosecurity Magazine) Multiple Dell PowerProtect Vulnerabilities Let Attackers Compromise System (Cyber Security News)  ‘Forbidden Words': Github Reveals How Software Engineers Are Purging Federal Databases (404 Media)  T-Minus Deep Space: Inspiration4 with Dr. Sian “Leo” Proctor. (T-Minus Deep Space podcast) Dr. Sian Proctor got her ticket to space after being selected for her poetry (Instagram)  2025 SpaceCom: Interview with Dr. Sian Proctor (YouTube)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices