The protection of computer systems from theft or damage
POPULARITY
Categories
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Broken Phishing URLs https://isc.sans.edu/diary/Broken+Phishing+URLs/32686/ n8n command injection vulnerability https://github.com/n8n-io/n8n/security/advisories/GHSA-6cqr-8cfr-67f8 Android February Update https://source.android.com/docs/security/bulletin/pixel/2026/2026-02-01?hl=en Watchguard Firebox LDAP Injection https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2026-00001
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Malicious Script Delivering More Maliciousness https://isc.sans.edu/diary/Malicious+Script+Delivering+More+Maliciousness/32682 Synectix LAN 232 TRIO Unauthenticated Web Admin CVE-2026-1633 https://www.cisa.gov/news-events/ics-advisories/icsa-26-034-04 Google Chrome Patches https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop.html LookOut: Discovering RCE and Internal Access on Looker (Google Cloud & On-Prem) https://www.tenable.com/blog/google-looker-vulnerabilities-rce-internal-access-lookout
Check out host Bidemi Ologunde's new show: The Work Ethic Podcast, available on Spotify and Apple Podcasts.In this episode, host Bidemi Ologunde sits down with Sara Dorris, a data & cybersecurity professional about the moments and mindsets that shaped her path into data analytics and cybersecurity. What was she like before the job titles: a builder, an organizer, a detective, or a storyteller? Who first sparked her curiosity about technology, business, and security? Sara reflects on the hard and soft skills she carried from the University of South Florida (Go Bulls!), the advice she'd give her college self, what Big Data taught her about risk, decision-making, and AI's evolving role in data science. They also zoom out to the human side of tech: how do you stay security-aware without living in paranoia, what personal tech boundaries actually help, and what's her take on social media in today's attention economy? Plus, Sara shares three essential skills for breaking into analytics/cyber, one trap to avoid, and practical guidance for career switchers coming from fields like healthcare or the social sciences.Email: bidemiologunde@gmail.comSupport the show
Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis
Jim McDonald is joined by Jeff Margolies, Chief Product and Strategy Officer at Saviynt, to discuss the intersection of artificial intelligence and identity security. Jeff shares his decades of experience in the industry, from building the IAM practice at Accenture to his current leadership role at Saviynt. The conversation covers how AI is making manually intensive identity tasks more efficient, the emergence of Identity Security Posture Management (ISPM), and the critical need to govern identities for AI agents. Jeff also provides his perspective on the future of the identity practitioner and why he remains an optimist in a rapidly changing technological landscape.Connect with Jeff Margolies on LinkedIn: https://www.linkedin.com/in/jmargolies/Connect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at http://idacpodcast.comTimestamps:00:00:00 - Introduction and Gartner Identity Conference Recap00:02:11 - Jeff Margolies' Career Journey in Identity and Security00:04:36 - Returning to Identity and Joining Saviynt00:06:13 - How AI is Impacting Identity Security and Governance00:09:56 - The Future of Identity Services in an AI World00:13:58 - Will AI Disrupt the SaaS Model for Identity?00:19:50 - The Impact of AI on the Identity Practitioner Job Market00:26:16 - Identity for AI: Governing Agents and Delegated Authority00:32:00 - Combating Deepfakes and Proving What is Real00:34:40 - The Rise of Identity Security Posture Management (ISPM)00:41:46 - Comparing Posture Management and ITDR00:44:17 - Advice for CISOs: Why Posture Should Come First00:49:35 - The Secret to Saviynt's Success and Future Outlook00:52:19 - Lighter Note: Why Jeff Chose a Tesla for His DaughterKeywords:IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Jeff Margolies, Saviynt, IAM, Identity and Access Management, AI, Artificial Intelligence, ISPM, ITDR, Cybersecurity, Identity Governance, SaaS, IGA
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Detecting and Monitoring OpenClaw (clawdbot, moltbot) https://isc.sans.edu/diary.html/Detecting+and+Monitoring+OpenClaw+%28clawdbot%2C+moltbot%29/32678/#comment Synology telnetd Patch https://www.synology.com/en-us/releaseNote/DSM GlassWorm Loader Hits Open VSX via Developer Account Compromise https://socket.dev/blog/glassworm-loader-hits-open-vsx-via-suspected-developer-account-compromise
Is cybersecurity in your budget—or in your blind spot? Do you know how vulnerable your business really is?In this episode of The Business Ownership Podcast I interviewed Greg Tomchick. Greg is a former professional baseball player turned award-winning cybersecurity coach. He has worked with more than 250 world-renowned companies including American Airlines, Caterpillar, and Trinity Rail. He is regularly featured live on ABC, Fox News, and is an expert contributor to Inc. Magazine. After building multiple seven-figure companies for America's most prestigious families, he is now the CEO of Valor Cybersecurity and host of The Connected Mindset Live Show. Greg helps industry leading executives and brands connect to the mindsets that enable them to protect what they value most, in life and in business.Overview-In an era defined by rapid technological advancement, connectivity is more than a buzzword; it's a business imperative. “The Connected Mindset: Protecting What You Value Most” is a talk designed to revolutionize how you perceive and utilize connectivity, focusing on mindset, business, and people. With a perfect blend of strategic insight, actionable solutions, and human-centric values, this presentation promises to equip your organization with the tools needed to navigate the complex landscape of today's digital world, safeguarding what matters most.Don't wait for a breach to take cybersecurity seriously. Check this out!Show Links:Valor Cybersecurity Website: https://valor-cybersecurity.com/Greg on Instagram: https://www.instagram.com/greg_tomchick/Greg on LinkedIn: https://www.linkedin.com/in/greg-tomchickBook a call with Michelle: https://go.appointmentcore.com/book/IcFD4cGJoin our Facebook group for business owners to get help or help other business owners!The Business Ownership Group - Secrets to Scaling: https://www.facebook.com/groups/businessownershipsecretstoscalingLooking to scale your business? Get free gifts here to help you on your way: https://www.awarenessstrategies.com/
For decades, leadership was judged by outputs such as profit, speed, and results. But the real competitive advantage now lies beneath the surface of your P&L: Your culture, trust, and psychology driving every decision, including cybersecurity. Hacia Atherton, the author of The Billion Dollar Blind$pot, joins Business Security Weekly to discuss the invisible human costs — fear, burnout, disengagement — quietly draining performance. She will discuss the silent costs of outdated leadership and gives you a playbook to fix them for good, including: Self Leadership Psychological Success with Emotional Mastery Co-designing a Culture to Thrive Leaders need to turn emotional intelligence into a measurable business strategy. Because emotional intelligence isn't optional anymore, it's operational. Segment Resources: https://www.haciaatherton.com/ https://www.haciaatherton.com/billion-dollar-blindspot https://www.instagram.com/hacia.atherton/ In the leadership and communications segment, CEOs and CISOs differ on AI's security value and risks, How to strategically balance cybersecurity investments, Succeeding as an Outsider in a Legacy Culture, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-433
Cyber risk stops being abstract the moment a control panel becomes a bridge between the plant floor and the outside world. We pull back the door on modern industrial control panels and show how they've evolved into the central hub for switches, firewalls, remote access, and data pathways that keep production moving—or bring it to a halt. Using a smart home as a simple frame, we unpack why a physical lock isn't enough and how layered defenses protect uptime, quality, and safety.We walk through the real risks leaders face: unauthorized access by outsiders or insiders operating beyond their role, subtle shifts to setpoints and logic that quietly degrade OEE, and incidents where cyber failures trigger physical consequences. Then we get practical. Secure design starts inside the panel with segmentation between control networks and enterprise IT, industrial firewalls, managed switches, and well-defined remote access. Governance matters as much as gear, so we outline clear authority boundaries, human override rules, and audit trails that build trust and accountability on the floor.Security doesn't end at commissioning. We emphasize lifecycle patching, documentation, and future-proofing so updates aren't scary and “temporary” workarounds don't become permanent backdoors. Because people make or break any control, we share tactics to reduce friction: role-based access that's fast, labeled interfaces, simple credentials, and training that explains the why behind every safeguard. Finally, we invite you to pressure-test these ideas in our hands-on labs, where you can validate architectures with real PLCs and HMIs before deploying to live lines.Keep Asking Why...Read our latest article on Industrial Manufacturing herehttps://eecoonline.com/inspire/panels_202Online Account Registration:Video Explanation of Registering for an AccountRegister for an AccountOther Resources to help with your journey:Installed Asset Analysis SupportSystem Planning SupportSchedule your Visit to a Lab in North or South CarolinaSchedule your Visit to a Lab in VirginiaSubmit your questions and feedback to: podcast@eecoaskwhy.comFollow EECO on LinkedInHost: Chris Grainger
What happens when artificial intelligence enters the arena of ethical hacking? Laurie Mercer, Senior Director of Solutions Engineering at HackerOne, joins Sean Martin for a look inside the ninth annual Hacker-Powered Security Report, where the headline is clear: the bionic hacker has arrived. HackerOne connects the global security research community with enterprises, open source projects, and major organizations, all working toward a shared mission of building a safer internet by finding, fixing, and rewarding the discovery of vulnerabilities.How is AI reshaping the bug bounty landscape? Mercer describes a dramatic shift unfolding on the HackerOne platform. For the first time, autonomous AI agents are operating alongside human researchers, growing from a single agent to more than ten competing on the leaderboard. At the same time, customers are driving change from the other side, with a 270% increase in organizations placing AI models within the scope of their bug bounty programs. The platform has paid out a record $81 million in bounty rewards over the past 12 months, with an average payout of roughly $1,000 per vulnerability, underscoring the sheer volume of valid findings flowing through the system.What makes these findings so significant? Of the reports submitted, 23,700 are rated critical or high severity, representing vulnerabilities capable of causing serious data breaches. HackerOne estimates these remediations have helped organizations avoid up to $3 billion in potential breach costs. The collectives participating on the platform range from venture-capital-backed startups building AI-powered offensive tools to informal groups of researchers pooling resources for greater efficiency. Mercer highlights three vulnerability categories that have surged over the past year: prompt injection, sensitive information exposure through large language models, and insecure plugin design. For any organization deploying AI-powered tools, these represent the most urgent areas to assess and secure.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTLaurie Mercer, Senior Director of Solutions Engineering at HackerOneOn LinkedIn: https://www.linkedin.com/in/lauriemercer/RESOURCESLearn more about HackerOne: https://www.hackerone.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSLaurie Mercer, HackerOne, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, bug bounty, ethical hacking, bionic hacker, AI agents, autonomous hacking, vulnerability discovery, hacker-powered security, offensive security, prompt injection, insecure plugin design, LLM security, AI vulnerability, cybersecurity, breach avoidance, bug bounty platform, responsible disclosure Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
What's a VPN? What does it do? Cybersmart Parenting Protecting Your Child in the Digital Age is a digital safety handbook designed to help parents figure out questions like thes. It's written specifically for busy parents. (Parents like us!) In this episode I talk about online security and safety with the authors of this handbook Chad Rychlewski and Kae David. It's packed with information on how to get your family devices safe - today! Listen now!
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Scanning for exposed Anthropic Models https://isc.sans.edu/diary/Scanning%20for%20exposed%20Anthropic%20Models/32674 Notepad++ Hijacked by State-Sponsored Hackers https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/ https://notepad-plus-plus.org/news/hijacked-incident-info-update/ Insecure Websockets in OpenClaw https://zeropath.com/blog/openclaw-clawdbot-credential-theft-vulnerability Malicious OpenClaw Skills https://www.koi.ai/blog/clawhavoc-341-malicious-clawedbot-skills-found-by-the-bot-they-were-targeting Exposed OpenClaw Instances https://censys.com/blog/openclaw-in-the-wild-mapping-the-public-exposure-of-a-viral-ai-assistant
Show featured Sponsor: Werkz Holsters, the company that cracked the code on light bearing holsters! In this episode of the American Warrior Show, Rich Brown is joined by cybersecurity expert Andrew Frisbie for a timely and eye-opening conversation on modern cyber threats, digital preparedness, and the role of artificial intelligence in today's threat landscape. As recent cyber incidents continue to impact infrastructure, financial systems, personal data, and national security, Rich and Andrew break down what's actually happening—and what most people are completely unprepared for. This episode covers: Real-world cyber threats affecting everyday Americans right now How cyber attacks target individuals, businesses, and critical systems Where AI is helping defenders—and where it's empowering attackers Why cybersecurity is no longer a "tech problem," but a personal security issue Practical steps armed citizens, families, and leaders can take to reduce risk The battlefield has expanded. Threats no longer require physical proximity—and attackers don't need guns. This conversation reframes cybersecurity as part of modern personal defense, challenging warriors and protectors to think beyond traditional threats and recognize that preparedness now includes digital awareness, resilience, and adaptability. If you believe in protecting yourself, your family, and your community, this episode will change how you view security in an AI-driven world.
Operation Technology (OT) and Industrial Control Systems (ICS) are where the digital world meets the physical world. These systems, which are critical to the operation of nuclear power plants, manufacturing sites, municipal power and water plants, and more, are under increasing attack. On today’s Packet Protector we return to the OT/ICS realm to talk about... Read more »
Operation Technology (OT) and Industrial Control Systems (ICS) are where the digital world meets the physical world. These systems, which are critical to the operation of nuclear power plants, manufacturing sites, municipal power and water plants, and more, are under increasing attack. On today’s Packet Protector we return to the OT/ICS realm to talk about... Read more »
It's a brand new season of Random but Memorable — and we're kicking things off with practical security for the people you care about most.
Rob Suárez, Vice President and Chief Information Security Officer at CareFirst BlueCross BlueShield joins Ann on this week's episode of Afternoon Cyber Tea. In the conversation, Rob shares how his career path and personal philosophy have shaped a mission-driven approach to cybersecurity that places patient trust, safety, and privacy at the center of every decision. He discusses the unique challenges of securing a deeply interconnected healthcare ecosystem, the critical role of culture and cyber literacy across organizations, and why transparency and resilience are essential during incidents. The episode also explores secure-by-design principles, the ethical use of AI in healthcare, and how the CISO role is evolving toward a broader focus on trust, collaboration, and human impact. Resources: View Rob Suárez on LinkedIn View Ann Johnson on LinkedIn Related Microsoft Podcasts: Microsoft Threat Intelligence Podcast The BlueHat Podcast Uncovering Hidden Risks Discover and follow other Microsoft podcasts at microsoft.com/podcasts Afternoon Cyber Tea with Ann Johnson is produced by Microsoft, Hangar Studios and distributed as part of N2K media network.
Financial security is about more than just building wealth: it's about resilience, preparation, and having the tools to weather whatever comes your way. And right now, with rising costs, market volatility, and evolving fraud risks, investors need that security more than ever.On this episode, FINRA Investor Education Foundation and Senior Vice President of Investor Education Gerri Walsh discusses what financial security really means in 2026, and how firms can help protect and empower their customers. This conversation that sits right at the heart of FINRA Forward, our commitment to evolving alongside the rapidly changing securities industry in support of our mission of protecting investors and market integrity.Resources mentioned in this episode:BrokerCheckMarket Data CenterFund AnalyzerFixed Income DataFINRA Investor Education FoundationProtecting Consumers from FraudFINRA ForwardBlog Post: FINRA Forward's Rule Modernization—An UpdateBlog Post: Vendors, Intelligence Sharing and FINRA's MissionBlog Post: FINRA Forward Initiatives to Support Members, Markets and the Investors They ServeEp. 168: Investing Wisely in 2025: Avoiding Scams and Achieving Your Financial GoalsEp. 183: Investors in the United States: Key Trends and Insights from the National Financial Capability Study Find us: LinkedIn / X / YouTube / Facebook / Instagram / E-mailSubscribe to our show on Apple Podcasts, Google Play and by RSS.
What happens when AI bots get their own social network, Silicon Valley execs cozy up to power, and Apple takes a cut from creators? This week's panel calls out the bold, bizarre, and often problematic ways tech's biggest players are reshaping everything from AI assistants to your everyday privacy. There's a social network for AI agents, and it's getting weird Moltbook is the most interesting place on the internet right now Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Site Pentagon clashes with Anthropic over military AI use, sources say Salesforce signs $5.6B deal to inject agentic AI into the US Army Angry Norfolk residents lose lawsuit to stop Flock license plate scanners SpaceX wants to put 1 million solar-powered data centers into orbit Elon Musk reportedly wants a June SpaceX IPO to align with his birthday, the planets Tesla hits a grim milestone: its second straight year of decline Tesla says production-ready Optimus robot is coming soon Microsoft reports strong cloud earnings in Q2 as gaming declines What We Learned From Meta, Microsoft and Tesla Apple tells Patreon to move creators to in-app purchase for subscriptions by November Apple CEO Tim Cook 'heartbroken' after repeated ICE killings in Minneapolis A rival smart glasses company is suing Meta over its Ray-Ban products TikTok, YouTube, and Meta are headed to court for a landmark trial over social media addiction The 'Social Media Addiction' Narrative May Be More Harmful Than Social Media Itself TikTok users freak out over app's 'immigration status' collection — here's what it means A Waymo hit a child near an elementary school in Santa Monica Autonomous cars, drones cheerfully obey prompt injection by road sign Samsung's TriFold phone will cost $2,899 in the US Groundhogs are bad at predicting weather, but they're valuable animal engineers Satellites encased in wood are in the works Belkin reminds users that its Wemo smart home products are shutting down this week Host: Leo Laporte Guests: Gary Rivlin, Devindra Hardawar, and Victoria Song Download or subscribe to This Week in Tech at https://twit.tv/shows/this-week-in-tech Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: monarch.com with code TWIT Melissa.com/twit helixsleep.com/twit canary.tools/twit - use code: TWIT expressvpn.com/twit
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Google Presentation Abuse https://isc.sans.edu/diary/Google+Presentations+Abused+for+Phishing/32668/ Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 & CVE-2026-1340) https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US Microsoft NTLM Strategy https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-windows-security-disabling-ntlm-by-default/4489526
What happens when AI bots get their own social network, Silicon Valley execs cozy up to power, and Apple takes a cut from creators? This week's panel calls out the bold, bizarre, and often problematic ways tech's biggest players are reshaping everything from AI assistants to your everyday privacy. There's a social network for AI agents, and it's getting weird Moltbook is the most interesting place on the internet right now Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Site Pentagon clashes with Anthropic over military AI use, sources say Salesforce signs $5.6B deal to inject agentic AI into the US Army Angry Norfolk residents lose lawsuit to stop Flock license plate scanners SpaceX wants to put 1 million solar-powered data centers into orbit Elon Musk reportedly wants a June SpaceX IPO to align with his birthday, the planets Tesla hits a grim milestone: its second straight year of decline Tesla says production-ready Optimus robot is coming soon Microsoft reports strong cloud earnings in Q2 as gaming declines What We Learned From Meta, Microsoft and Tesla Apple tells Patreon to move creators to in-app purchase for subscriptions by November Apple CEO Tim Cook 'heartbroken' after repeated ICE killings in Minneapolis A rival smart glasses company is suing Meta over its Ray-Ban products TikTok, YouTube, and Meta are headed to court for a landmark trial over social media addiction The 'Social Media Addiction' Narrative May Be More Harmful Than Social Media Itself TikTok users freak out over app's 'immigration status' collection — here's what it means A Waymo hit a child near an elementary school in Santa Monica Autonomous cars, drones cheerfully obey prompt injection by road sign Samsung's TriFold phone will cost $2,899 in the US Groundhogs are bad at predicting weather, but they're valuable animal engineers Satellites encased in wood are in the works Belkin reminds users that its Wemo smart home products are shutting down this week Host: Leo Laporte Guests: Gary Rivlin, Devindra Hardawar, and Victoria Song Download or subscribe to This Week in Tech at https://twit.tv/shows/this-week-in-tech Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: monarch.com with code TWIT Melissa.com/twit helixsleep.com/twit canary.tools/twit - use code: TWIT expressvpn.com/twit
What happens when AI bots get their own social network, Silicon Valley execs cozy up to power, and Apple takes a cut from creators? This week's panel calls out the bold, bizarre, and often problematic ways tech's biggest players are reshaping everything from AI assistants to your everyday privacy. There's a social network for AI agents, and it's getting weird Moltbook is the most interesting place on the internet right now Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Site Pentagon clashes with Anthropic over military AI use, sources say Salesforce signs $5.6B deal to inject agentic AI into the US Army Angry Norfolk residents lose lawsuit to stop Flock license plate scanners SpaceX wants to put 1 million solar-powered data centers into orbit Elon Musk reportedly wants a June SpaceX IPO to align with his birthday, the planets Tesla hits a grim milestone: its second straight year of decline Tesla says production-ready Optimus robot is coming soon Microsoft reports strong cloud earnings in Q2 as gaming declines What We Learned From Meta, Microsoft and Tesla Apple tells Patreon to move creators to in-app purchase for subscriptions by November Apple CEO Tim Cook 'heartbroken' after repeated ICE killings in Minneapolis A rival smart glasses company is suing Meta over its Ray-Ban products TikTok, YouTube, and Meta are headed to court for a landmark trial over social media addiction The 'Social Media Addiction' Narrative May Be More Harmful Than Social Media Itself TikTok users freak out over app's 'immigration status' collection — here's what it means A Waymo hit a child near an elementary school in Santa Monica Autonomous cars, drones cheerfully obey prompt injection by road sign Samsung's TriFold phone will cost $2,899 in the US Groundhogs are bad at predicting weather, but they're valuable animal engineers Satellites encased in wood are in the works Belkin reminds users that its Wemo smart home products are shutting down this week Host: Leo Laporte Guests: Gary Rivlin, Devindra Hardawar, and Victoria Song Download or subscribe to This Week in Tech at https://twit.tv/shows/this-week-in-tech Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: monarch.com with code TWIT Melissa.com/twit helixsleep.com/twit canary.tools/twit - use code: TWIT expressvpn.com/twit
What happens when AI bots get their own social network, Silicon Valley execs cozy up to power, and Apple takes a cut from creators? This week's panel calls out the bold, bizarre, and often problematic ways tech's biggest players are reshaping everything from AI assistants to your everyday privacy. There's a social network for AI agents, and it's getting weird Moltbook is the most interesting place on the internet right now Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Site Pentagon clashes with Anthropic over military AI use, sources say Salesforce signs $5.6B deal to inject agentic AI into the US Army Angry Norfolk residents lose lawsuit to stop Flock license plate scanners SpaceX wants to put 1 million solar-powered data centers into orbit Elon Musk reportedly wants a June SpaceX IPO to align with his birthday, the planets Tesla hits a grim milestone: its second straight year of decline Tesla says production-ready Optimus robot is coming soon Microsoft reports strong cloud earnings in Q2 as gaming declines What We Learned From Meta, Microsoft and Tesla Apple tells Patreon to move creators to in-app purchase for subscriptions by November Apple CEO Tim Cook 'heartbroken' after repeated ICE killings in Minneapolis A rival smart glasses company is suing Meta over its Ray-Ban products TikTok, YouTube, and Meta are headed to court for a landmark trial over social media addiction The 'Social Media Addiction' Narrative May Be More Harmful Than Social Media Itself TikTok users freak out over app's 'immigration status' collection — here's what it means A Waymo hit a child near an elementary school in Santa Monica Autonomous cars, drones cheerfully obey prompt injection by road sign Samsung's TriFold phone will cost $2,899 in the US Groundhogs are bad at predicting weather, but they're valuable animal engineers Satellites encased in wood are in the works Belkin reminds users that its Wemo smart home products are shutting down this week Host: Leo Laporte Guests: Gary Rivlin, Devindra Hardawar, and Victoria Song Download or subscribe to This Week in Tech at https://twit.tv/shows/this-week-in-tech Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: monarch.com with code TWIT Melissa.com/twit helixsleep.com/twit canary.tools/twit - use code: TWIT expressvpn.com/twit
The renewable energy sector faces a fundamental disconnect. Cybersecurity teams generate endless alerts and vulnerability reports, while operational managers focus on asset performance and site availability. Neither group speaks the other's language, leaving executives struggling to make informed decisions about where to invest limited resources. Rafael Narezzi, Co-Founder and CEO of Centrii, has built his company specifically to bridge this gap, translating technical cyber risks into the financial business outcomes that drive executive decision-making.Centrii, emerging from its predecessor Cyber Energia, represents a new approach to OT security in the energy sector. The name itself carries meaning: the sentinel of industrial intelligence, signified by the double I at the end. Rather than simply identifying vulnerabilities and presenting red alerts, the platform contextualizes risks in terms that matter to the business. How does a potential compromise affect your power purchase agreements? What happens to your revenue when energy prices fluctuate and your site goes offline? These are the questions that Centrii answers.The company prices its services per megawatt hour, demonstrating its commitment to speaking the language of energy rather than traditional IT security. This approach reflects a deeper understanding that renewable energy assets present vastly different risk profiles. A biomass facility with 24/7 personnel on site faces different challenges than an unmanned offshore wind installation. Solar farms, hydrogen facilities, and battery storage systems each require tailored risk assessments that account for their unique operational characteristics and regulatory requirements.Recent attacks on distributed energy resources, including the compromise of Poland's renewable grid, underscore the urgency of this work. With regulations like NERC CIP 15 in the United States, NIS 2.0 in Europe, and the UK Cyber Security Bill now holding asset owners personally accountable for cybersecurity failures, organizations can no longer afford to treat OT security as an afterthought. Narezzi observes that compliance has become the driving force pushing companies to take responsibility for their critical infrastructure assets.What sets Centrii apart is its ability to help executives identify which risks actually matter. When every cybersecurity tool reports critical alerts, organizations face paralysis. Which red is the red that demands immediate attention? Centrii provides clarity by mapping technical findings to financial impact, reputational damage, and operational consequences specific to each asset type and technology.The company's presentation at DistribuTECH 2026 focuses on battery energy storage systems, an area of explosive growth driven by data center demand and the expanding role of AI. Narezzi draws a parallel to Ocean's 11, where coordinated manipulation of power systems creates cascading failures. As batteries become essential for grid balancing, the risks of compromised dispatch commands affecting multiple installations simultaneously represent a scenario that demands serious attention from asset owners and regulators alike.Operating across 16 countries with diverse energy technologies, Centrii provides a unified platform for organizations managing hundreds of sites across different regions and regulatory environments. The goal is straightforward: give every stakeholder, from technical teams to the C-suite, a common language for understanding and acting on cyber risk in the energy sector.This is a Brand Story. A Brand Story is a ~35-40 minute in-depth conversation designed to tell the complete story of the guest, their company, and their vision. Learn more: https://www.studioc60.com/creation#fullGUESTRafael Narezzi, Co-Founder and CEO, Centriihttps://www.linkedin.com/in/narezzi/RESOURCESCentriihttps://centrii.comCyber Energiahttps://cyberenergia.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSRafael Narezzi, Centrii, Sean Martin, brand story, brand marketing, marketing podcast, brand story, OT security, renewable energy cybersecurity, battery energy storage systems, BESS, critical infrastructure protection, energy sector cybersecurity, NERC CIP, NIS 2.0, power purchase agreements, distributed energy resources, industrial intelligence, cyber risk quantification Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
In this episode of Resilience Unraveled, Dr Russell Thackeray welcomes Kate Macafoose from Chang Robotics. Kate shares her journey from civil engineering in upstate New York to her current role at Chang Robotics in Jacksonville Beach, Florida. She delves into her early career in project management and her transition into the field of automation and robotics. The discussion highlights the challenges and resilience needed in male-dominated sectors, as well as the importance of mentorship for women in STEM. Kate elaborates on how Chang Robotics is revolutionising healthcare with autonomous robots designed to assist nurses by performing nonclinical tasks, ultimately reducing their workload and improving efficiency. The conversation also touches on the development, cybersecurity, implementation, and industry-wide potential of robotic systems.00:00 Introduction and Guest Welcome00:38 Kate's Background and Career Journey02:16 Challenges in Male-Dominated Fields03:23 Women in STEM and Mentorship05:34 Introduction to Robotics06:39 Robotic Applications in Healthcare10:09 Development and Implementation of Robotics12:30 Cybersecurity in Robotics14:11 Leadership and Robotics17:18 Future of Robotics and ConclusionYou can contact us at info@qedod.comResources can be found online or link to our website https://resilienceunravelled.com#resilience, #burnout, #intuition
In this episode, Jim McDonald welcomes back Martin Kuppinger, Principal Analyst at KuppingerCole, to discuss the rapidly evolving landscape of identity in 2026. With Jeff Steadman away, Jim and Martin dive deep into the intellectual challenges posed by AI agents and the limitations of traditional non-human identity frameworks. Martin explains why organizations are feeling a sense of disillusionment with AI and how a capability-based identity fabric approach can help manage the complexity. They also explore the balance between security and business enablement, the rise of workload identities, and what to expect at the upcoming European Identity and Cloud Conference (EIC) in Berlin.Connect with Martin: https://www.linkedin.com/in/martinkuppinger/KuppingerCole: https://www.kuppingercole.comEuropean Identity and Cloud Conference (EIC) (don't forget to use our discount code idac25mko): https://www.kuppingercole.com/events/eic2026Connect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at http://idacpodcast.comTimestamps00:00 - Welcome back to 2026 and EIC preparations02:48 - The shift from future potential to current AI agent challenges03:12 - Understanding AI disillusionment and the lack of control in regulated industries05:19 - Security as a business enabler vs progress prevention09:55 - Why AI agents should not be classified simply as non-human identities11:43 - Complex relationships between humans, agents, and delegated tasks15:17 - Self-service identity for knowledge workers and AI productivity18:40 - The risks of decentralized agent creation and "shadow" AI21:58 - How AI is being baked into identity products beyond role mining26:55 - Using usage data to reduce over-entitlements34:10 - The Identity Fabric: A capability-based approach to IAM40:33 - Vendor rationalization and the flexibility of the fabric47:19 - Previewing EIC 2026 topics: Wallet initiatives and consent52:44 - Final advice: Curing symptoms vs addressing causesKeywords:IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Martin Kuppinger, KuppingerCole, IAM, AI Agents, Identity Fabric, EIC 2026, Non-Human Identity, Workload Identity, ITDR, IGA, Cybersecurity
Fastest 5 Minutes, The Podcast Government Contractors Can't Do Without
This week's episode covers developments regarding the Secure Software Development Attestation, GSA's newly release CUI guidance, GSA's RFI regarding resellers, and the Pentagon's “patent holiday” pilot, and is hosted by Peter Eyre and Yuan Zhou. Crowell & Moring's "Fastest 5 Minutes" is a biweekly podcast that provides a brief summary of significant government contracts legal and regulatory developments that no government contracts lawyer or executive should be without.
Megi Benia is a Georgian diplomat and security and foreign policy professional specialising in Russia's influence operations, NATO's collective defence posture, international cybersecurity, resilience, and transatlantic affairs. She currently serves as a Contributing Editor of New Eastern Europe. At the same time, she is an Associate Fellow at the University of Georgia's Security, Policy and Nationalism Research Center (UGSPN) and a Researcher of South-East Europe and Black Sea Region Programme for the Platform for Peace and Humanity. She is also a member of the EU CyberNet Expert Pool and a PhD candidate at Tbilisi State University, where her doctoral research examines Cybersecurity in NATO's Strategic Doctrine: Applicability of Collective Defense to Cyberspace. As a researcher and public commentator, Ms. Benia analyses Russia's evolving hybrid toolkit, U.S.-Russia strategic competition, and Black Sea regional security. She contributes to international policy discussions through op-eds, research papers, expert commentary, conference moderation, and media engagement. She is also active in academia and professional education, currently lecturing at Caucasus University, and previously teaching at the University of Georgia. She has authored multiple publications on Euro-Atlantic security, cyber diplomacy, resilience, disinformation, NATO's strategic adaptation, and arms control.----------LINKS:https://www.linkedin.com/in/megibenia/https://x.com/megibeniahttps://independent.academia.edu/MegiBeniahttps://neweasterneurope.eu/2025/08/25/as-georgia-dismantles-its-civil-service-the-kremlin-watches-and-wins/ https://gssr.georgetown.edu/the-forum/topics/technology/the-digital-shield-using-cyber-diplomacy-to-strengthen-national-cyber-resilience/ ----------SILICON CURTAIN LIVE EVENTS - FUNDRAISER CAMPAIGN Events in 2026 - Advocacy for a Ukrainian victory with Silicon Curtainhttps://buymeacoffee.com/siliconcurtain/extrasOur first live events this year in Lviv and Kyiv were a huge success. Now we need to maintain this momentum, and change the tide towards a Ukrainian victory. The Silicon Curtain Roadshow is an ambitious campaign to run a minimum of 12 events in 2025, and potentially many more. We may add more venues to the program, depending on the success of the fundraising campaign. https://buymeacoffee.com/siliconcurtain/extrasWe need to scale up our support for Ukraine, and these events are designed to have a major impact. Your support in making it happen is greatly appreciated. All events will be recorded professionally and published for free on the Silicon Curtain channel. Where possible, we will also live-stream events.https://buymeacoffee.com/siliconcurtain/extras----------SUPPORT THE CHANNEL:https://www.buymeacoffee.com/siliconcurtainhttps://www.patreon.com/siliconcurtain----------TRUSTED CHARITIES ON THE GROUND:Save Ukrainehttps://www.saveukraineua.org/Superhumans - Hospital for war traumashttps://superhumans.com/en/UNBROKEN - Treatment. Prosthesis. Rehabilitation for Ukrainians in Ukrainehttps://unbroken.org.ua/Come Back Alivehttps://savelife.in.ua/en/Chefs For Ukraine - World Central Kitchenhttps://wck.org/relief/activation-chefs-for-ukraineUNITED24 - An initiative of President Zelenskyyhttps://u24.gov.ua/Serhiy Prytula Charity Foundationhttps://prytulafoundation.org----------
In this episode, we explore a problem that refuses to go away: the near-impossible task many immigrants in Spain face when trying to secure appointments for their NIE (foreign identity number) or TIE (foreign identity card). Cybersecurity expert René Serral from UPC breaks down what is happening behind the scenes of the 'cita previa' appointment system – and what could be done to fix it. Law professor Natalia Caicedo examines whether the Spanish government is meeting its legal obligations toward newcomers. Honduran-born activist Carmen Juares describes how migrants are "treated as second-class citizens," calling the process of regularising legal status "a continuous obstacle course." We also hear directly from Catalan News readers, many of whom got in touch to share their own experiences navigating the system. With Lorcan Doherty and Oriol Escudé.
Nashville woke up to the strangest Christmas soundtrack imaginable in 2020: an RV parked on 2nd Avenue, a calm recorded warning to evacuate… and “Downtown” playing like a twisted holiday playlist no one asked for. We are going to walk through the accepted timeline of the Christmas Day bombing, what investigators say happened, and what the FBI concluded about the man behind it.Then we follow the story into the weird side streets, where reality starts to bend. Reincarnation loops. “High energy events.” Alleged reptilian watchers in the woods. A camping trip that turned into a front-row seat to paranoia, strange gear, and a belief that something evil was hiding in plain sight.We'll separate confirmed facts from internet fog, explore what fringe and UFO circles claim it all really meant, and bring it home with the uncomfortable truth: sometimes the most unsettling part isn't the conspiracy… it's how fast a mind can build one when everything else is falling apart. All that and more this week on Hysteria 51!Special thanks to this week's research sources:PRIMARY / OFFICIAL1) FBI Nashville Field Office. “FBI Releases Report on Nashville Bombing.” March 15, 2021.https://www.fbi.gov/contact-us/field-offices/nashville/news/fbi-releases-report-on-nashville-bombing2) FBI Nashville Field Office. “Seeking Information Concerning Operator or Owner of RV Linked to Explosion.” December 25, 2020.https://www.fbi.gov/contact-us/field-offices/nashville/news/seeking-information-concerning-operator-or-owner-of-rv-linked-to-explosion3) FBI Nashville Field Office. “FBI Memphis Special Agent in Charge Announces Identity of Remains Discovered in Nashville Explosion Site; Multi-Agency Investigation Continues.” December 27, 2020.https://www.fbi.gov/contact-us/field-offices/nashville/news/fbi-memphis-special-agent-in-charge-announces-identity-of-remains-discovered-in-nashville-explosion-site-multi-agency-investigation-continues4) Cybersecurity and Infrastructure Security Agency (CISA). “SAFE-COM and NCSWIC Release Communications Dependencies Case Study: Nashville.” June 13, 2022.https://www.cisa.gov/news-events/news/safecom-and-ncswic-release-communications-dependencies-case-study-nashville LOCAL / INVESTIGATIVE REPORTING5) Finley, Jeremy (WSMV4 Investigates). “FBI: Nashville Christmas Day bomber wanted explosion to break ‘reincarnation loop' (New photos show Anthony Warner's device…).” December 22, 2025.https://www.wsmv.com/2025/12/22/fbi-nashville-christmas-day-bomber-wanted-explosion-break-reincarnation-loop/6) Hall, Ben & Wisniewski, Kevin (NewsChannel 5 Investigates / WTVF). “Nashville bomber's bizarre writings reveal belief in aliens and lizard people.” January 4, 2021.https://www.newschannel5.com/news/newschannel-5-investigates/nashville-bombers-bizarre-writings-reveal-belief-in-aliens-and-lizard-people NATIONAL / WIRE REPORTING7) ABC News. “FBI report finds Nashville bomber wanted to kill himself, not motivated by terrorism.” March 15, 2021.https://abcnews.go.com/Politics/fbi-report-finds-nashville-bomber-wanted-kill-motivated/story?id=764710788) PBS NewsHour. “FBI says Nashville bomber driven by conspiracies, paranoia.” March 15, 2021.https://www.pbs.org/newshour/nation/fbi-says-nashville-bomber-driven-by-conspiracies-paranoia9) Associated Press. “FBI: Nashville bomber sent material to ‘acquaintances'.” (Published January 2, 2021.)https://apnews.com/article/us-news-bombings-8d59b300ed4b41d050a8cc86f500351a10) CBS News. “Nashville bomber sent writings espousing conspiracy theories to multiple people before explosion.” January 3, 2021.https://www.cbsnews.com/news/nashville-bomber-anthony-quinn-sent-conspiracy-theories-to-people-before-explosion/11) Reuters. “Nashville bombing suspect may have believed in lizard people, aliens — source.” January 3, 2021.https://www.reuters.com/world/us/nashville-bombing-suspect-may-have-believed-lizard-people-aliens-source-2021-01-03/12) Reuters. “‘He was not on our radar': authorities search for motive in Nashville blast.” December 29, 2020.https://www.reuters.com/world/us/he-was-not-our-radar-authorities-search-motive-nashville-blast-2020-12-28/13) Reuters. “Motor home explodes in Nashville, possible human remains found near site.” December 26, 2020.https://www.reuters.com/world/us/motor-home-explodes-nashville-possible-human-remains-found-near-site-2020-12-26/14) NBC (via NBC San Diego). “Feds probing if Nashville bomber believed in lizard people conspiracy.” December 30, 2020.https://www.nbcsandiego.com/news/national-international/feds-probing-if-nashville-bomber-believed-in-lizard-people-conspiracy/2483371/ FACT CHECKS15) Reuters Fact Check. “Debunking conspiracy links between Nashville explosion and Dominion.” December 29, 2020.https://www.reuters.com/article/world/fact-check-debunking-conspiracy-links-between-nashville-explosion-dominion-and-idUSKBN2931AJ/16) PolitiFact. “No, AT&T was not conducting an audit of Dominion Voting Systems machines in Nashville.” December 29, 2020.https://www.politifact.com/factchecks/2020/dec/29/facebook-posts/no-t-was-not-conducting-audit-dominion-voting-syst/17) Associated Press Fact Check. “AT&T not conducting voting machine audit near Nashville after explosion.” December 28, 2020.https://apnews.com/article/fact-checking-989820964118) WRAL. “Fact check: 3 conspiracy theories about the Nashville bombing.” December 30, 2020.https://www.wral.com/story/fact-check-3-conspiracy-theories-about-the-nashville-bombing/19450775/ CONTEXT / BACKGROUND19) Business Insider. “Lizard-people conspiracy theory origins (and why it resurfaced after the Nashville bombing).” January 7, 2021.https://www.businessinsider.com/lizard-people-conspiracy-theory-origin-nashville-bomber-qanon-2021-120) War on the Rocks. “The Nashville Bombing and Threats to Critical Infrastructure: We Saw This Coming.” December 31, 2020.https://warontherocks.com/2020/12/the-nashville-bombing-and-threats-to-critical-infrastructure-we-saw-this-coming/21) Domestic Preparedness (Kelly, Robert F. & Alexander, Dean C.). “Four Takeaways From the Nashville Christmas Bombing.” July 20, 2022.https://domesticpreparedness.com/cbrne/four-takeaways-from-the-nashville-christmas-bombing/22) DataCenterDynamics (Moss, Sebastian). “FBI does not believe Nashville bomber was targeting AT&T.” August 13, 2021.https://www.datacenterdynamics.com/en/news/fbi-does-not-believe-nashville-bomber-was-targeting-att/23) Axios. “Girlfriend told police Nashville man was building bombs year before explosion.” December 30, 2020.https://www.axios.com/2020/12/30/nashville-anthony-warner-bombsEmail us your favorite WEIRD news stories:weird@hysteria51.comSupport the Show:Get exclusive content & perks as well as an ad and sponsor free experience at https://www.patreon.com/Hysteria51 from just $1Shop:Be the Best Dressed at your Cult Meeting!https://www.teepublic.com/stores/hysteria51?ref_id=9022See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network Google dismantled the IPIDEA network that used residential proxies to route malicious traffic. https://cloud.google.com/blog/topics/threat-intelligence/disrupting-largest-residential-proxy-network Fake Clawdbot VS Code Extension Installs ScreenConnect RAT The news about Clawdbot (now Moltbot) is used to distribute malware, in particular malicious VS Code extensions. https://www.aikido.dev/blog/fake-clawdbot-vscode-extension-malware Threat Bulletin: Critical eScan Supply Chain Compromise Anti-virus vendor eScan was compromised, and its update servers were used to install malware on some customer systems. https://www.morphisec.com/blog/critical-escan-threat-bulletin/
This Follower Friday on The Green Insider spotlights the powerhouse UTSI podcast series and the cutting‑edge conversations shaping the future of OT. Mike Nemer and Shaun Six break down the latest in OT innovation, AI, security, and energy efficiency, while showcasing standout partners like Sequre Quantum, Siemens, BlastWave, and EdgeRealm. It's a dynamic deep dive into why OT cybersecurity is becoming mission‑critical for today's infrastructure leaders — and how collaboration, education, and next‑gen technology are driving the industry forward. UTSI Podcast Series Conclusion Final episode of a six‑part podcast series sponsored by UTSI International. Features reflections from Mike Nemer and Shaun Six (CEO, UTSI International) on relationships built during the series. Emphasis on OT cybersecurity as a core theme. Emergent insight: AI's environmental impact surfaced as an unintended but compelling storyline. Episode structure includes a brief series recap, a short CEO segment (8–10 minutes), and post‑production editing support. Critical Infrastructure Security Challenges UTSI's 40‑year history supporting critical infrastructure is underscored. Industry challenges highlighted: Talent shortage (≈5 engineers leaving for every 1 entering). Rapid increase in connectivity of critical infrastructure devices. AI positioned as a force multiplier for operators—but also a potential attack vector if data is exposed. Partnerships discussed: Sequre Quantum – quantum random number generators. BlastWave – insights into AI's dual role as defender and risk. Focus on showcasing technologies that secure operations and protect infrastructure from emerging threats. AI Data Center Energy Solutions Collaboration with Siemens (via Alyssa) on AI's impact on data centers. Key concerns: rising energy and water consumption driven by AI workloads. Edge Realm highlighted for improving energy density at the edge to reduce strain. Introduction of LeakGeek, a rapid leak detection and response tool. Work with EdgeRealm also addresses illegal hot tapping and oil theft, noted as more common than publicly acknowledged. OT Cybersecurity: Collaboration and Education Strong focus on securing operational technology (OT) and industrial control systems. Call for improved private–public collaboration and information sharing. Many cyberattacks go unreported to avoid reputational damage. Attack vectors increasingly include everyday devices (e.g., printers, fax machines). Ransomware incidents can cost organizations millions of dollars per day. Emphasis on educating boards and investors about OT cybersecurity risks and value. UTSI OT Cybersecurity Partnership UTSI's approach includes: Cloaking OT systems. Securing remote access. Improving visibility and auditability of networks. Recognition of sponsorship and education value of a six‑part cybersecurity series. Closing remarks focused on partnership, knowledge sharing, and raising cybersecurity awareness. A special shout out the guest in this UTSI podcast series, Paulina Assmann, Alissa Nixon, Tom Sego, Frank Stepic, and Robert Hilliker. To be an Insider Please subscribe to The Green Insider powered by ERENEWABLE wherever you get your podcast from and remember to leave us a five-star rating. This podcast is sponsored by UTSI International. To learn more about our sponsor or ask about being a sponsor, contact ERENEWABLE and the Green Insider Podcast. The post Breaking Down OT Cybersecurity: Highlights from UTSI's Six‑Part Series appeared first on eRENEWABLE.
Through The Pines Ep. 93 - 2026 Financial Landscape & How to Navigate On this episode of Through The Pines we'll cover the 2026 Financial Landscape when I comes to… Investing AI Interest Rates & Monetary Policy Inflation & Tariff Impacts Geopolitical & Policy Shifts Global Diversification & Emerging Markets Cryptocurrency & Digital Assets Private Markets & Alternatives Labor Market & Consumer Resilience Cybersecurity, Fraud, and Regulatory Evolution Welcome to a Financial Planning Podcast with a down to earth vibe Sasquatch listens while combing out his glorious lochs of fur, this is Through the Pines. Our Advisors for this episode, we welcome back Rex Baxter and Brandyn Smith from planwithbaxter.com 2023, 2024 & 2025 Forbes Best in State Wealth Management Teams For Utah - Advisor Hub Fastest Growing Advisors to Watch under 1 Billion - Receivers of the Ameriprise Client Experience Award - Financial Advisors: Baxter, Smith & Associates Contact: rex.m.baxter@ampf.com Website: planwithbaxter.com ____________________________________ This podcast was produced by The Banyan Collective and recorded in our camp trailer studio located inside the Monarch Building inside the 9 Rails Arts District on Historic 25th Street in Ogden, Utah. ***Find value in this podcast, consider supporting us here: https://www.buymeacoffee.com/banyanmedia WATCH & SUBSCRIBE to us on YouTube @throughthepines LIKE our Facebook Page: https://www.facebook.com/pinespodcast Follow our Instagram: https://www.instagram.com/pines_podcast/ Through the Pines - Reminding you to use Yesterday's Dollars to Finance Tomorrow's Dreams. **** This episode includes financial advice from professionals. Visit the financial planners in this podcast at www.planwithbaxter.com The Banyan Collective & Host, R. Brandon Long are not the financial professionals - podcast pro's, maybe - money men, not so much. Through the Pines Podcast Copyright, The Banyan Collective - 2025 #podcast #money #wealth #retirement #financialplanning #finances #networth
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Odd WebLogic Request. Possible CVE-2026-21962 Exploit Attempt or AI Slop? We are seeing attempts to attack CVE-2026-21962, a recent weblog vulnerability, using a non-working AI slop exploit https://isc.sans.edu/diary/Odd%20WebLogic%20Request.%20Possible%20CVE-2026-21962%20Exploit%20Attempt%20or%20AI%20Slop%3F/32662 Fortinet Patches are Rolling Out Fortinet is starting to roll out patches for the recent SSO vulnerability https://fortiguard.fortinet.com/psirt/FG-IR-26-060 SolarWinds Web Helpdesk Vulnerability Another set of vulnerabilities in SolarWinds Web Helpdesk may result in unauthenticated system access https://horizon3.ai/attack-research/cve-2025-40551-another-solarwinds-web-help-desk-deserialization-issue/
All links and images can be found on CISO Series. Check out this post by Patrick Garrity of VulnCheck for the discussion that is the basis of our conversation on this week's episode, co-hosted by David Spark, the producer of CISO Series, and Steve Zalewski. Joining them is Tom Doughty, CISO, Generate:Biomedicines. In this episode: The 3Ms of product clarity Buzzwords work because buyers aren't experts Investor pressures distort messaging Threading the needle Huge thanks to our sponsor, Alteryx Alteryx is a leading AI and data analytics company that powers actionable insights that help organizations drive smarter, faster decisions. Alteryx One helps security, risk, and operations leaders cut hours of manual work to minutes, generate trusted insights at scale, and turn raw data into action faster than ever. Learn more at www.alteryx.com.
This episode is a part of a special series of interviews conducted at the INCH360 Cybersecurity Conference in Spokane, Washington. Visit their website to learn more about INCH360 and their mission. Host Jethro D. Jones interviews Ryan Nelson from IBM's X-Force about the realities of incident response in cybersecurity. Ryan shares insights into handling cyberattacks, the importance of adaptability, and the role of communication and teamwork during high-stress investigations. The conversation also covers working with law enforcement, threat intelligence, and lessons learned from real-world breaches.
Most startup pain doesn't come from product; it comes from people. In this episode, Lisa Novak, Founder of LMNHR, pulls back the curtain on the most common HR and culture mistakes she's seen across high-growth tech companies, and how to fix them before they derail momentum.Lisa explains how fractional HR leadership gives startups access to senior-level expertise without the full-time overhead, and why getting people strategy right early can fuel growth, strengthen culture, and protect revenue. Whether you're hiring your first employee or scaling past 100, this episode offers practical insights you can apply immediately.
With the advent of the digital age, individuals rely on countless personal devices, each one expanding their exposure to cybercrime. Missing one or two software updates may seem harmless, but this common negligence leaves us vulnerable to cyberattacks. With the number of individuals falling prey to cybercrime increasing on a yearly basis, we must ask: Why have established cybersecurity measures failed to halt or slow down the activity of cybercriminals? And what can we do to better protect ourselves and others?In this episode, Shane interviews Greg Oslan, chairman and CEO of the National Cybersecurity Center, on how we can do just that. Oslan has previously served as a managing partner at One Strategy Group consulting, CEO of Arturo, and a strategic adviser for the US Department of Homeland Security. His wide-ranging experience with this matter helps us make sense of how we can become safer online.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.
In this episode of Manufacturing Hub, Vlad Romanov and Dave Griffith sit down with Benson Hougland from Opto 22 to get brutally practical about what is actually running on shop floors today, and what it takes to move from legacy automation to modern, data ready operations without breaking what already works. If you have ever walked into a plant and seen a mix of decades old controllers, manual processes, islands of automation, and a few shiny modern pockets of connectivity, this conversation will feel very familiar. Benson has spent roughly three decades at Opto 22 and he has seen the full spectrum, from brownfield realities where nothing can go down, to greenfield expansions where teams can finally design with data, security, and integration in mind.A major thread in this discussion is the gap between “the machine runs” and “the business can learn from the machine.” Benson lays out why so many facilities still operate in a world of siloed equipment with minimal visibility, and why digital transformation stalls when the goal is vague or driven by trend chasing. The most actionable insight is simple: start with a real problem, win small, build trust in the data, and only then scale. That approach is how you avoid proof of concept purgatory, and it is also how you get leadership buy in without overpromising. If you are looking at industrial AI, it becomes even more critical, because manufacturing cannot tolerate hallucinated answers. Benson explains why industrial AI starts with sanctity of data, meaning clean, contextualized, trustworthy signals that an organization can actually act on.You will also hear a grounded take on why hardware still matters in 2026. Not because everyone wants to rip and replace working PLCs, but because modern plants need layered edge strategies that can extract the right data, protect legacy assets, and integrate upward using open methods.About the guestBenson Hougland is a long time leader at Opto 22, a US based manufacturer of industrial controllers, edge devices, and IO. He focuses on customer and integrator feedback, product strategy, and the practical challenges teams face when modernizing systems while keeping operations running. Opto 22 is known for building and manufacturing in the United States and for leaning into open connectivity approaches that help reduce lock in and simplify integration.About the hostsVlad Romanov is an electrical engineer with an MBA from McGill University and over a decade of experience delivering automation and modernization work across high performing manufacturing environments. Through Joltek, Vlad supports manufacturers with plant floor assessments, controls and OT architecture, system modernization planning, integration execution, and technical upskilling so teams can own their systems long term. Vlad's work consistently sits at the intersection of reliability, operational execution, and the realities of IT and OT convergence, with a focus on what is feasible in real facilities, not just what looks good in a slide deck.Dave Griffith is a long time manufacturing and automation practitioner focused on bridging the gap between modern technology conversations and what is practical on the plant floor. Dave brings a systems mindset to modernization, with a strong emphasis on outcomes, maintainability, and the human factors that decide whether projects scale or stall.If this episode resonates and you are navigating modernization decisions, especially around OT networking, data infrastructure, platform selection, or plant floor security, Joltek can help you evaluate your current state, define a realistic target architecture, and build a roadmap that your team can execute.Joltek linkshttps://www.joltek.com/serviceshttps://www.joltek.com/education/ot-networking-fundamentalsTimestamps00:00:00 Welcome back and the hardware focused modernization theme00:01:40 Benson Hougland background, entrepreneur to controls to Opto 2200:04:10 A garage manufacturing story and the lessons of building real product00:09:00 The gap between cutting edge plants and manual, siloed operations00:11:10 What actually blocks modernization, capital, planning, and alignment00:13:10 Start small, solve a real problem, and build trust in outcomes00:14:40 Proof of concept purgatory and why leadership buy in changes everything00:17:50 Industrial AI needs data, and data integrity becomes the non negotiable00:22:30 Obsolescence, cybersecurity, and simplifying the industrial tech stack00:28:20 Cybersecurity is a process, not a product, and why defaults are deadly00:37:10 Linux at the edge, containers, and why modern controllers are like smartphones00:53:10 ProveIt and the virtual factories approach, real data, real integration paths
Independent medical practice is under siege, according to Rep. Greg Murphy (R-NC). Murphy, a practicing physician for over 30 years, joins the Rundown to discuss the "explosion" of insurance claim denials and the "destruction of medicine" caused by what he calls vertical integration and the corporate takeover of healthcare. He breaks down the GOP's plan to restore marketplace competition, the debate over Affordable Care Act (ACA) subsidies, and why he believes the current system prioritizes corporate profit over medical necessity. TikTok is set to remain in the U.S. following a deal granting American entities majority ownership, ending the immediate threat of a nationwide ban. But does this restructuring resolve concerns over data privacy and the safety of young users? Cybersecurity expert John Cofrancesco joins to discuss whether the deal addresses the national security risks that sparked the ban, the legal battles over social media addiction, and the race to outpace China in artificial intelligence. Plus, commentary by FOX News contributor Tom Shillue. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Design for Security from the Start: Making Medical Device Cybersecurity More ResilientMedTech innovation is revolutionizing healthcare but is also introducing new cyberattack vectors that can put manufacturers, hospitals, and patients at risk.In Episode 44 of the MedTech Speed to Data Podcast, Key Tech VP of Business Development Andy Rogers and Senior Computer Engineer Jamie Kendall discuss the FDA's latest cybersecurity guidance.Need to knowSmart, connected devices have greater risks — Medical devices are emerging vectors for bad actors targeting the healthcare industry.FDA's 2025 cybersecurity guidance update — The agency recommends risk-based development frameworks to make device cybersecurity more resilient.Clarifying “cyber devices” — The FDA's guidance applies to any medical device that runs software and could connect to the Internet.The nitty-gritty“Cybersecurity was always baked into our process,” Jaime explains. More specifically, Key Tech has adapted the TIR57 risk-based standard for managing medical device security to the new rules. “[The FDA's] 2023 guidance really laid the groundwork for our latest process. We've tweaked it slightly with the [latest update]. There are more explicit documentation requirements around vulnerability monitoring and more details on the software bill of materials (SBOMs).”Jamie goes on to describe how Key Tech's cybersecurity risk management plan informs product development. The security team starts by developing a threat model based on evaluations of data flows, data storage, and the cybersecurity activities protecting that data. “One of the first things that we always do is a threat model. This is a visual model of the system to show the elements of the device, where data is flowing, and where your trust boundaries are. This is a one-page, digestible visual that everyone can look at, assess, and go ‘yep, that makes sense' and then build your initial architecture and risk assessment based on that.”The security team documents the resulting security architectures using the FDA's recommended views:Global System View: Describes how software integrates with hardware and networks and the associated cybersecurity mitigations.Multi-Patient Harm View: Identifies mitigations for vulnerabilities or failures that could compromise multiple devices and harm multiple patients.Updateability/Patchability View: Summarizes the end-to-end process for distributing software updates and patches, especially if manufacturers do not control the entire path.Security Use Case View: Documents scenarios in which vulnerabilities can compromise the device's safety or effectiveness.“To give a sense of scale,” Jamie says, “this isn't one or two documents. It's a pretty large effort, and it's one of those things that you want to start early in your development process.”Data that made the difference:Throughout his conversation with Andy, Jamie shares some of the lessons Key Tech has learned about designing secure medical devices, including:Design for security from the beginning. Late changes are expensive, especially once in pre-production or after your FDA submission.Avoid cyber rabbit holes. Rather than addressing every possible threat, use data and risk to prioritize the real threats.Don't roll your own cybersecurity. Stick to standard practices, or you risk introducing unknown, novel vulnerabilities.Fully document your SBOMs. Standard libraries introduce layers of dependencies that you must understand. That's the only way to control your exposure to new vulnerabilities.Design devices that are truly safe. Cybersecurity risks are real. Don't treat compliance as a check box.Watch the whole conversation in the video below to learn more about designing for cybersecurity, the importance of third-party penetration testing, and more.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Initial Stages of Romance Scams [Guest Diary] Romance scams often start with random text messages that appear to be misrouted . This guest diary by Faris Azhari is following some of the initial stages of such a scam. https://isc.sans.edu/diary/Initial%20Stages%20of%20Romance%20Scams%20%5BGuest%20Diary%5D/32650 Denial of Service Vulnerabilities in React Server Components Another folowup fix for the severe React vulnerability from last year, but now only fixing a DoS condition. https://github.com/facebook/react/security/advisories/GHSA-83fc-fqcc-2hmg OpenSSL Updates OpenSSL released its monthly updates, fixing a potential RCE. https://openssl-library.org/news/vulnerabilities/ Kubernetes Remote Code Execution Via Nodes/Proxy GET Permission Many Kubernetes Helm Charts are vulnerable to possible remote code executions due to unclear defined access controls. https://grahamhelton.com/blog/nodes-proxy-rce
Send us a textIn this powerhouse episode, Joey Pinz sits down with one of cybersecurity's most influential builders—a serial market maker who has helped shape some of the industry's most iconic companies. From Sourcefire and Fortinet to Cylance, Javelin, and now Sevco Security, Fitz brings unmatched perspective on what separates successful cyber companies from the rest—and what MSPs must do now to stay relevant.Fitz breaks down why visibility is the core of modern security, why most organizations still don't actually know what assets they have, and how exposure management has become the foundation of cyber resilience. He also explains where the real money is flowing in the MSP/MSSP space, the biggest mistakes founders still make, and what MSPs must do to move confidently into security services.On the personal side, Fitz shares insights from a life built around curiosity, communication, and impact—shaped by early roles at Coca-Cola during the Olympics, BMC, Compaq, and decades of startup leadership. His mission today? Protect the planet through better security, better intelligence, and smarter business decisions.
Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Scanning Webserver with pwd as a Starting Path Attackers are adding the output of the pwd command to their web scans. https://isc.sans.edu/diary/x/32654 Microsoft Office Security Feature Bypass Vulnerability CVE-2026-21509 Microsoft released an out-of-band patch for Office fixing a currently exploited vulnerability. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509 Exposed Clawdbot Instances Many users of the AI tool clawdbot expose instances without access control. https://x.com/theonejvo/status/2015485025266098536
OAuth is a widely used authorization (not authentication) protocol that lets a resource owner grant access to a resource using access tokens. These tokens define access attributes, including scope and length of time. OAuth can be used to grant access to human and non-human entities (for example, AI agents). OAuth is increasingly being abused by... Read more »
In this episode of The Jason Cavness Experience, Jason sits down with Akalpit Gadre, a technologist and founder with deep experience in technical leadership, cloud computing, cybersecurity, and emerging technologies. Akalpit shares his journey as a foundry entrepreneur, how he approaches building technology-driven companies, and what strong technical leadership looks like in practice. He talks about navigating complexity in cloud systems, the importance of security-first thinking, and how founders and technical leaders should evaluate new technologies without getting distracted by hype. The conversation also explores problem-solving at scale, decision-making under uncertainty, and what it takes to build resilient systems and teams in fast-moving technical environments. This episode is especially valuable for founders, engineers, and operators building products in AI, cloud, and security-focused spaces. Topics Discussed • Akalpit's background and path into technical leadership • What it means to be a foundry entrepreneur • Building and scaling cloud-based systems • Cybersecurity as a foundational design principle • Evaluating new technologies without chasing hype • Leadership lessons from technical teams • Problem-solving in complex systems • Balancing innovation with reliability • How founders should think about technical tradeoffs • Long-term thinking in engineering and architecture Connect with Akalpit Gadre LinkedIn: https://www.linkedin.com/in/akalpit-gadre/ Website: https://www.othentk.com/ Connect with Jason Cavness LinkedIn: https://www.linkedin.com/in/jasoncavness Instagram: https://www.instagram.com/thejasoncavnessexperience/ TikTok: https://www.tiktok.com/@jasoncavness Podcast: https://www.thejasoncavnessexperience.com
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Analysis of Single Sign-On Abuse on FortiOS Fortinet released an advisory. FortiOS devices are vulnerable if configured with any SAML integration, not just FortiCloud https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios Outlook OOB Update Microsoft released a non-security OOB Update for Outlook, fixing an issue introduced with this months security patches. https://support.microsoft.com/en-us/topic/january-24-2026-kb5078127-os-builds-26200-7628-and-26100-7628-out-of-band-cf5777f6-bb4e-4adb-b9cd-2b64df577491 VMware vCenter Server Vulnerabilities Exploited (CVE-2024-37079, CVE-2024-37080, CVE-2024-37081) A VMWare vCenter vulnerability patched last June is now actively exploited. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453