Podcasts about cyber threats

Attack on a computer system

  • 763PODCASTS
  • 1,611EPISODES
  • 29mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jul 17, 2025LATEST
cyber threats

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about cyber threats

Show all podcasts related to cyber threats

Latest podcast episodes about cyber threats

Voces de Ferrol - RadioVoz
Ferrol acoge el XXIX Congreso Internacional de Dirección e Ingeniería de Proyectos con más de 200 expertos de 15 países

Voces de Ferrol - RadioVoz

Play Episode Listen Later Jul 17, 2025 17:30


Ferrol se convierte estos días en epicentro internacional de la ingeniería y la gestión de proyectos con la celebración del XXIX Congreso Internacional de Dirección e Ingeniería de Proyectos (CIDIP/ICPME). El evento fue inaugurado este miércoles en el Salón de Actos Concepción Arenal del Campus Industrial de Ferrol por una mesa compuesta íntegramente por mujeres referentes en sus ámbitos: Socorro García Cascales, presidenta de AEIPRO; Carmen Cotelo Queijo, directora de la Axencia Galega de Innovación (GAIN); Ana Ares Pernas, vicerrectora del Campus de Ferrol y Responsabilidad Social; Patricia Cons Formoso, concejala de Educación y Universidad; y Pilar de la Cruz López, profesora de la UDC y presidenta del comité organizador. Más de 200 personas expertas de 15 países participan en este congreso que reunirá a profesionales de España, México, Ecuador, Chile, Irán, Turquía o Estados Unidos. En total, se presentarán 205 comunicaciones científicas, con una programación orientada a la innovación, la sostenibilidad, el liderazgo y el futuro de la ingeniería. Liderazgo femenino e internacionalización Durante la apertura, Ana Ares celebró la elección de Ferrol como sede del evento y destacó el carácter excepcional de una mesa inaugural compuesta únicamente por mujeres, algo “poco habitual en este ámbito”, tal y como también subrayó Pilar de la Cruz. Por su parte, Carmen Cotelo (GAIN) reivindicó el compromiso de la Xunta de Galicia con la I+D+i, apelando a la necesidad de seguir formando perfiles profesionales “multidisciplinares y con visión global”. Conferencias magistrales, seminarios y talleres El programa incluye cuatro conferencias magistrales de primer nivel. El coach internacional Peter Pürckhauer (TIME4PM) abrió el congreso con la ponencia “Sustainability in Project Management: More success for all parties at stake!”. Mañana, jueves 17, Enrique Cubeiro, responsable de defensa de S2Grupo, clausurará el encuentro con “Ships and Cyberthreats”. También intervendrán David Rodríguez Cabaleiro (Molins), con una charla sobre innovación en materiales de construcción, y Francisco Calduch Cervera (Talgo), que hablará sobre el Programa Intercity y el Proyecto DBS. A estas ponencias se suma el International Seminar on Project Management (ISoPM), íntegramente en inglés, que refuerza el carácter global del evento bajo la dirección de Jesús Martínez-Almela, vicepresidente de AEIPRO-IPMA Spain y presidente del Spanish Certification Body (OCDP). Jóvenes embajadores y nuevos liderazgos En paralelo, se celebró el taller “Escuela de Embajadores y Embajadoras”, organizado por AEIPRO Joven y dirigido por Tom Taylor, fundador de Dashdot Publications. Esta actividad busca fortalecer competencias clave entre los profesionales emergentes, como el liderazgo, la colaboración o la resiliencia. Además, se desarrollan tres Panel Sessions que abordan temas como la inteligencia artificial aplicada a la dirección de proyectos, innovación en sistemas fotovoltaicos y BIM avanzado para la gestión sostenible del entorno construido. Visitas técnicas y entrega de premios El congreso también incluye visitas técnicas a Navantia y Exponav, y culminará con una cena de gala en el Parador de Ferrol, donde se entregarán premios como los galardones a los mejores Trabajos Fin de Máster, el Premio Jaume Blasco a la Innovación, el Premio Joven Investigador, así como los reconocimientos del Consejo General de Colegios Oficiales de Ingenieros Industriales (CGCOII). El CIDIP/ICPME 2025 está organizado por la Universidad de A Coruña (UDC), a través de la Escuela Politécnica de Ingeniería de Ferrol (EPEF), junto a la Fundación de Ingeniería Civil de Galicia (FICG) y AEIPRO-IPMA Spain.

AM Best Radio Podcast
Coalition's Simonsen: Insurers Look to Nordics as Cyberthreats, Digital Reliance Surge

AM Best Radio Podcast

Play Episode Listen Later Jul 16, 2025 17:00 Transcription Available


Tine Simonsen, head of insurance for Continental Europe at Coalition, discusses how rising cyberthreats and digital growth in the Nordics are driving demand for active cyber protection and shaping the future of insurance in Europe.

MONEY FM 89.3 - The Breakfast Huddle with Elliott Danker, Manisha Tank and Finance Presenter Ryan Huang
Mind Your Business: Here's how you should be defending your business against AI-powered cyber threats

MONEY FM 89.3 - The Breakfast Huddle with Elliott Danker, Manisha Tank and Finance Presenter Ryan Huang

Play Episode Listen Later Jul 16, 2025 13:59


Breaches aren’t just hitting companies — they’re hitting everyone connected to them. We’re seeing more attacks come through third parties, vendors, and service providers. So what now? Kavitha Mariappan, Chief Transformation Officer, Rubrik joins the Breakfast Show to discuss how AI is changing the cyber game, why supply chains are under siege, and how businesses can stay resilient and one step ahead.See omnystudio.com/listener for privacy information.

Order of Man
DR. ERIC COLE | How Cyberthreats Endanger Men and Their Families

Order of Man

Play Episode Listen Later Jul 15, 2025 61:34


Considering how often we utilize technology, we don't spend as nearly as much time as we should protecting ourselves against the inherent vulnerabilities and bad actors who would exploit the very tools designed to improve our lives. The fact of the matter is, cybersecurity has become a huge issue (only to become more relevant as technology advances). My guest today, Dr. Eric Cole, has spent decades learning, understanding, and teaching people how to protect themselves and their loved ones from cyber-threats. Today, we talk about the apps that are more dangerous than others, how best to keep your children safe from online predators, what he calls, cyber-hygiene, why passwords are dead and what to do about it, and why social media will never fully protect children. SHOW HIGHLIGHTS 00:00 - Introduction   00:21 - Welcoming Dr. Eric Cole   00:26 - Importance of Cybersecurity for Families   01:24 - Dangers of Sharing Personal Information Online   02:47 - Targeting Vulnerable Individuals   04:26 - Impact of Technology on Parenting   05:45 - Prevalence of Child Exploitation   08:12 - Monitoring Kids' Online Interactions   10:00 - Social Media Security Measures   12:16 - Identifying Suspicious Accounts   15:00 - Limiting Kids' Access to Smartphones   19:09 - Balancing Technology Use   22:32 - Monitoring Social Media Comments   26:00 - Risks of Location Tracking in Photos   30:06 - Moving Beyond Passwords   32:31 - Avoiding Malicious Links   35:13 - Value of Online Protection Services   37:51 - Cell Phones and Privacy Concerns   43:03 - Importance of Software Updates   45:20 - Benefits of Using VPNs   46:43 - Upgrading Technology Safely   49:20 - AI as a Tool, Not a Replacement   52:43 - Practical Cybersecurity Tips   54:24 - Closing Remarks   Battle Planners: Pick yours up today! Order Ryan's new book, The Masculinity Manifesto. For more information on the Iron Council brotherhood. Want maximum health, wealth, relationships, and abundance in your life? Sign up for our free course, 30 Days to Battle Ready

Cyber Security Today
Urgent Cyber Threats: Citrix Exploit, Fortinet RCE, and AI Vulnerabilities

Cyber Security Today

Play Episode Listen Later Jul 14, 2025 17:48 Transcription Available


In this episode of 'Cybersecurity Today,' hosted by David Shipley from the Exchange Security 2025 conference, urgent updates are provided on critical cybersecurity vulnerabilities and threats. CISA mandates a 24-hour patch for Citrix NetScaler due to a severe vulnerability actively being exploited, dubbed 'Citrix Bleed.' Fortinet's FortiWeb also faces a critical pre-auth remote code execution flaw that demands immediate patching. Additionally, significant vulnerabilities in AI-driven developments are highlighted, including shortcomings in Jack Dorsey's BitChat app and a method to extract Windows keys from ChatGPT-4. The episode emphasizes the importance of timely updates, robust security measures, and the potential risks involved with AI-generated code. 00:00 Introduction and Overview 00:35 Urgent Citrix Vulnerability Alert 03:26 Fortinet FortiWeb Exploit Details 06:23 Ingram Micro Ransomware Recovery 09:26 AI Coding and Security Risks 14:03 ChatGPT Security Flaw Exposed 17:20 Conclusion and Contact Information

DailyCyber The Truth About Cyber Security with Brandon Krieger
Inside IR and AI with Paul Caron | DailyCyber 267

DailyCyber The Truth About Cyber Security with Brandon Krieger

Play Episode Listen Later Jul 12, 2025 61:04


Inside IR and AI with Paul Caron | DailyCyber 267 ~ Watch Now ~In today's DailyCyber Podcast, I'm joined by Paul Caron, Head of Cyber Security, Americas at S-RM.Paul brings over 20 years of experience across military intelligence, counterterrorism, and cybersecurity leadership—including senior roles at PwC and as Managing Director of Incident Response at a global consulting firm. We dive deep into Incident Response realities and how AI is reshaping the security landscape.

Ray and Joe D.
Cyber Threats and AI

Ray and Joe D.

Play Episode Listen Later Jul 10, 2025 9:44


There have been recent AI fakes including fake calls using Marco Rubio's voice. There have been cyber attacks as well. So what is happening and how can we be safe against these attacks? Matt Shoemaker is a former Military Intelligence Officer. He calls to discuss the latest threats.

Joey Pinz Discipline Conversations
#677 Pax8 Beyond-Christopher Marquez:

Joey Pinz Discipline Conversations

Play Episode Listen Later Jul 9, 2025 27:52


Send us a textIn this heartfelt and high-impact episode recorded at Pax8 Beyond 2025, Joey Pinz sits down with Christopher Marquez of IronScales for a powerful conversation that blends vendor strategy, personal resilience, and community leadership.Christopher kicks off by sharing his goals for the week: learning from partners, improving services, and helping MSPs strengthen their security posture. He breaks down how IronScales uses adaptive AI to protect against phishing and email attacks, offering efficient deployment, automation, and education as part of their channel-first approach. MSPs benefit from tools like free email health checks, coaching support, and NFR licenses for internal use.But this episode goes beyond tech. Christopher opens up about his past struggle with alcohol abuse, the wake-up call from his doctor, and his journey to recovery and lasting wellness. He and Joey reflect on the power of discipline, coaching, and community in transforming both business and life.From pork green chili to partner enablement to self-awareness, this conversation is a rich mix of grit, gratitude, and growth — for anyone navigating the MSP space or a personal reset. 

Federal Newscast
FBI urged to step up protection of government officials from mobile cyber threats

Federal Newscast

Play Episode Listen Later Jul 7, 2025 6:13


The FBI is being urged to step up its efforts to protect government officials from mobile cyber threats. In a new letter to the bureau, Senator Ron Wyden says its current spyware guidance isn't enough to protect against advanced cyber tools. He pointed to how spyware has been found on the phones of dozens of government employees.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

North Fulton Business Radio
AI, Cyber Threats, and Your Business with Chris Noles, Beyond Computer Solutions

North Fulton Business Radio

Play Episode Listen Later Jul 2, 2025


AI, Cyber Threats, and Your Business with Chris Noles, Beyond Computer Solutions (North Fulton Business Radio, Episode 880) In this episode of North Fulton Business Radio, host John Ray welcomes back Chris Noles, owner and president of Beyond Computer Solutions, to discuss what every business, large or small, needs to know about modern cybersecurity threats. Chris […] The post AI, Cyber Threats, and Your Business with Chris Noles, Beyond Computer Solutions appeared first on Business RadioX ®.

The Thoughtful Entrepreneur
2225 - The Multi-Factor Authentication is Your First Line of Defense Against Cyber Threats with ReachOut's Rick Jordan

The Thoughtful Entrepreneur

Play Episode Listen Later Jul 1, 2025 20:01


Navigating the Evolving Landscape of Cybersecurity and AI: In-Depth Insights from Rick JordanIn this episode of The Thoughtful Entrepreneur, host Josh Elledge talks with Rick Jordan, speaker, coach, and Founder & CEO of ReachOut Technology. Rick unpacks the rapidly changing worlds of cybersecurity and artificial intelligence, and how business leaders can stay proactive in protecting their organizations. With practical advice, personal stories, and big-picture strategy, Rick shares what it really takes to succeed—and stay secure—in a digital-first world.Exploring the Human and Technical Sides of CybersecurityThe conversation begins on a personal note as Rick shares how technology, particularly gaming, creates meaningful connections with his daughter. Josh adds how gaming fosters deeper bonds in his own family, highlighting the positive impact of shared digital experiences. This sets the stage for the bigger conversation—how the human element influences technology, cybersecurity, and communication.Rick explains how ReachOut Technology addresses cybersecurity for small and mid-sized businesses by offering enterprise-level solutions through a clear and trusted brand. He shares his unique growth-by-acquisition strategy, integrating smaller IT service providers to create a unified, scalable, and culturally aligned company. He also outlines how his team helps SMBs implement practical steps like MFA, employee security training, and credit freezes to reduce risks from modern cyber threats.A consistent theme throughout the episode is the power of communication—whether between parents and kids or tech leaders and their teams. Rick emphasizes that cybersecurity is as much about people as it is about technology. His mission is to equip leaders with both the technical knowledge and communication skills needed to safeguard their organizations in an AI-driven world.About Rick Jordan:Rick Jordan is a nationally recognized speaker, coach, and cybersecurity expert. As the CEO of ReachOut Technology, Rick is committed to simplifying cybersecurity for SMBs and helping leaders take practical steps to protect their teams. He's also a media personality and author, using his platform to educate and inspire through books, interviews, and keynotes.About ReachOut Technology:ReachOut Technology is a managed IT and cybersecurity company that provides enterprise-level protection and support to small and mid-sized businesses. Through a unique acquisition strategy and customer-focused approach, ReachOut is creating a household name in the fragmented IT space.Links Mentioned in this Episode:Rick Jordan's WebsiteRick Jordan on LinkedInReachOut Technology WebsiteEpisode Highlights:The personal and professional ways technology fosters connectionHow ReachOut Technology is scaling through strategic acquisitionsThe biggest cybersecurity threats and why phishing remains a top concernWhy MFA and security awareness training are no longer optionalThe importance of communication in driving cultural change around cybersecurityConclusionJosh and Rick's conversation bridges the gap between technology and human behavior. From protecting digital assets to creating stronger family connections, Rick emphasizes the need for both technical tools and empathetic...

Afternoons with Deborah Knight
‘Evolving cyber threats' - Why Australia must pay closer attention to research security

Afternoons with Deborah Knight

Play Episode Listen Later Jun 30, 2025 9:30


A new report highlights the urgent need for smarter safeguards in our national research security, as malicious cyber threats grow more sophisticated compared to previous years.See omnystudio.com/listener for privacy information.

Today in Health IT
2 Minute Drill: Scattered Spider Targets Insurance and Iran Cyber Threats Escalate With Drex DeFord

Today in Health IT

Play Episode Listen Later Jun 26, 2025 4:22 Transcription Available


Drex covers three critical cybersecurity developments: Scattered Spider's shift to targeting insurance companies including Erie Insurance, Philadelphia Insurance, and Aflac using advanced social engineering tactics; escalating Iran-related cyber threats to US critical infrastructure amid Middle East tensions; and a massive dark web leak exposing 1.6 billion login credentials. Don't miss these actionable security recommendations including reviewing password reset processes, implementing strong authentication measures, and preparing for potential nation-state attacks on healthcare infrastructure.Remember, Stay a Little Paranoid X: This Week Health LinkedIn: This Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer

Ones Ready
Ops Brief 065: Daily Drop - 24 June 2025 (Fat Shaming & B-2s)

Ones Ready

Play Episode Listen Later Jun 24, 2025 18:04


Send us a textWelcome back to The Daily Drop—where Jared rants, roasts, and breaks down the news like only the Ones Ready crew can. Today's main event? Iran punches back with a missile strike on Al-Udeid, but 13 of 14 missiles get slapped out of the sky. Trump drops an F-bomb on the lawn. Space and Cyber Command flex behind the scenes. And everyone's favorite stealth bat—the B-2—continues to steal headlines.Meanwhile, the Air Force wants airmen to run two miles... twice a year. Cue the Facebook tears and diaper rash in the NCO groups. Jared lets the fatties have it with a no-holds-barred takedown that would make your Chief blush. Also: the F-15EX has supply chain issues (again), Tech Sergeant promotions spike, and drones in Ukraine are now hiding in IKEA houses.It's blunt. It's brutal. It's your morning slap of reality—Ones Ready style.

Afternoon Drive with John Maytham
Trump, Tehran, and the ticking clock

Afternoon Drive with John Maytham

Play Episode Listen Later Jun 23, 2025 9:17


John Maytham is joined by James Ker-Lindsay, Senior Research Fellow at Kingston University and a leading expert on conflict, security, and statehood, to unpack the dangerous spiral unfolding between Israel, Iran, and the United States Presenter John Maytham is an actor and author-turned-talk radio veteran and seasoned journalist. His show serves a round-up of local and international news coupled with the latest in business, sport, traffic and weather. The host’s eclectic interests mean the program often surprises the audience with intriguing book reviews and inspiring interviews profiling artists. A daily highlight is Rapid Fire, just after 5:30pm. CapeTalk fans call in, to stump the presenter with their general knowledge questions. Another firm favourite is the humorous Thursday crossing with award-winning journalist Rebecca Davis, called “Plan B”. Thank you for listening to a podcast from Afternoon Drive with John Maytham Listen live on Primedia+ weekdays from 15:00 and 18:00 (SA Time) to Afternoon Drive with John Maytham broadcast on CapeTalk https://buff.ly/NnFM3Nk For more from the show go to https://buff.ly/BSFy4Cn or find all the catch-up podcasts here https://buff.ly/n8nWt4x Subscribe to the CapeTalk Daily and Weekly Newsletters https://buff.ly/sbvVZD5 Follow us on social media: CapeTalk on Facebook: https://www.facebook.com/CapeTalk CapeTalk on TikTok: https://www.tiktok.com/@capetalk CapeTalk on Instagram: https://www.instagram.com/ CapeTalk on X: https://x.com/CapeTalk CapeTalk on YouTube: https://www.youtube.com/@CapeTalk567 See omnystudio.com/listener for privacy information.

Today in Health IT
2 Minute Drill: Iran Cyber Threats, Microsoft Scams, and the 1300% Deepfake Surge with Drex DeFord

Today in Health IT

Play Episode Listen Later Jun 19, 2025 3:14 Transcription Available


Drex breaks down three critical cybersecurity developments healthcare organizations need to monitor. First, escalating geopolitical tensions suggest increased cyber attacks from Iran and allied nations targeting U.S. critical infrastructure, including healthcare systems. Second, Vanderbilt University Medical Center reports sophisticated Microsoft Teams impersonation attacks where scammers pose as supervisors to request urgent actions like software installation or payments. Finally, deepfake fraud attempts skyrocketed 1300% in 2024, with new "spoofing as a service" platforms making AI-powered voice and video scams more accessible to cybercriminals. Healthcare IT leaders should prepare defenses against these evolving threats and educate staff on verification protocols for suspicious requests.Remember, Stay a Little Paranoid X: This Week Health LinkedIn: This Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer

Microsoft Threat Intelligence Podcast
A Peek Inside Microsoft's Global Fight Against Cyber Threats

Microsoft Threat Intelligence Podcast

Play Episode Listen Later Jun 11, 2025 46:21


Recorded live at RSAC 2025, this special episode of the Microsoft Threat Intelligence Podcast, hosted by Sherrod DeGrippo, brings together Jeremy Dallman from the Microsoft Threat Intelligence and Steven Masada from Microsoft's Digital Crimes Unit.   The panel explores the psychology and techniques behind nation-state and criminal cyber actors, how Microsoft innovatively uses legal and technical disruption to dismantle threats like Cobalt Strike and Storm-2139, and the growing trend of adversaries leveraging AI. From North Korean fake job interviews to China's critical infrastructure infiltration, this episode highlights how Microsoft is staying ahead of the curve—and sometimes even rewriting the playbook.  In this episode you'll learn:       How targeting attacker techniques is more effective than chasing specific actors  The surprising ways threat actors use AI—for productivity, not just deepfakes  Why North Korean threat actors are building full-blown video games to drop malware  Some questions we ask:      What's the role of Microsoft's Digital Crimes Unit and how is it unique in the industry?  Why should cybersecurity professionals read legal indictments?  What impact did Microsoft's legal actions have on tools like Cobalt Strike and Quakbot?  Resources:   View Jeremy Dallman on LinkedIn   View Steven Masada on LinkedIn   View Sherrod DeGrippo on LinkedIn   Bold action against fraud: Disrupting Storm-1152    Related Microsoft Podcasts:                    Afternoon Cyber Tea with Ann Johnson  The BlueHat Podcast  Uncovering Hidden Risks      Discover and follow other Microsoft podcasts at microsoft.com/podcasts   Get the latest threat intelligence insights and guidance at Microsoft Security Insider    The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.  

Connected FM
Cyber Threats Aren't Just IT's Problem Anymore

Connected FM

Play Episode Listen Later Jun 10, 2025 13:22


In today's episode Lucian Niemeyer, CEO of Building Cybersecurity, joins Stacey Shepard, the President of Shepard Global Strategies to explore how IFMA's new partnership with BCS is helping facility managers better understand and manage cyber risks. Together they discuss Lcuian's background at the United States Department of Defense to developing a 16-step cybersecurity framework that is available for free for facility managers. They highlight how training, collaboration, and proactive strategies are reshaping cyber safety in the built environment to drive safer, smarter facility management practices.This episode is sponsored by ABM! Learn more about ABM here.  Connect with Us:LinkedIn: https://www.linkedin.com/company/ifmaFacebook: https://www.facebook.com/InternationalFacilityManagementAssociation/Twitter: https://twitter.com/IFMAInstagram: https://www.instagram.com/ifma_hq/YouTube: https://youtube.com/ifmaglobalVisit us at https://ifma.org

Cyber Security Today
Cybersecurity Month in Review: Uncovering Digital and Physical Threats

Cyber Security Today

Play Episode Listen Later Jun 7, 2025 48:37 Transcription Available


  In this episode of the 'Cybersecurity Today: The Month in Review' show, host Jim welcomes regular guests Laura Payne and David Shipley, along with newcomer Anton Levaja. The trio dives deep into various cybersecurity stories, analyzing trends, threats, and recent incidents. Topics include the intriguing Mystery Leaker exposing cyber criminals, the rise and sophistication of LockBit ransomware, the devastating ransomware attack on Coinbase and their bold counter-response, and the physical dangers faced by cryptocurrency entrepreneurs. The episode also highlights the innovation in law enforcement tactics and the pressing need for better cybersecurity awareness and education. They wrap up on a hopeful note, showcasing a young scout's inspiring project on cyber fraud prevention that gained support from the local police. 00:00 Introduction and Panelist Welcome 00:38 Show Format and Story Introduction 01:28 The Mystery Leaker Story 03:35 Law Enforcement and Cyber Crime 10:51 Coinbase Ransomware Incident 18:04 Physical Threats in the Crypto World 24:56 Operation Shamrock and Organized Crime 25:19 Breaking News: Kidnapping Mastermind Arrested 26:18 Quishing: The Clever Side of Cybercrime 27:11 QR Code Scams and Consumer Protection 31:08 Generational Differences in Cyber Threats 32:05 The Evolution of Cyber Attacks 38:40 Physical Crime in the Digital Age 41:10 Law Enforcement and Cybersecurity 43:55 Government Surveillance and Privacy Concerns 46:08 Feel-Good Story: Young Cybersecurity Advocate

The CyberWire
AVCheck goes dark in Operation Endgame.

The CyberWire

Play Episode Listen Later Jun 2, 2025 29:16


An international law enforcement operation dismantles AVCheck. Trump's 2026 budget looks to cut over one thousand positions from CISA. Cyber Command's defensive wing gains sub-unified command status. A critical vBulletin vulnerability is actively exploited. Acreed takes over Russian markets as credential theft kingpin. Qualcomm patches three actively exploited zero-days in its Adreno GPU drivers. Researchers unveil details of a Cisco IOS XE Zero-Day. Microsoft warns a memory corruption flaw in the legacy JScript engine is under active exploitation. A closer look at the stealthy Lactrodectus loader. On today's Afternoon Cyber Tea, Ann Johnson speaks with Hugh Thompson, RSAC program committee chair. Decoding AI hallucinations with physics. Complete our annual audience survey before August 31. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we have our Afternoon Cyber Tea segment with Ann Johnson. On today's episode, Ann speaks with Hugh Thompson, RSAC program committee chair, as they discuss what goes into building the RSA Conference. Selected Reading Police takes down AVCheck site used by cybercriminals to scan malware (Bleeping Computer) DHS budget request would cut CISA staff by 1,000 positions (Federal News Network) Cybercom's defensive arm elevated to sub-unified command (DefenseScoop) vBulletin Vulnerability Exploited in the Wild (SecurityWeek) Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown (Infosecurity Magazine) Qualcomm fixes three Adreno GPU zero-days exploited in attacks (Bleeping Computer) Exploit details for max severity Cisco IOS XE flaw now public (Bleeping Computer) Microsoft Scripting Engine flaw exploited in wild, Proof-of-Concept published (Beyond Machines) Latrodectus Malware Analysis: A Deep Dive into the Black Widow of Cyber Threats in 2025 (WardenShield) The Root of AI Hallucinations: Physics Theory Digs Into the 'Attention' Flaw  (SecurityWeek) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Data Breach Today Podcast
Genetic Data: Emerging Cyberthreats and Privacy Concerns

Data Breach Today Podcast

Play Episode Listen Later May 30, 2025


Info Risk Today Podcast
Genetic Data: Emerging Cyberthreats and Privacy Concerns

Info Risk Today Podcast

Play Episode Listen Later May 30, 2025


Trust Issues
EP 8 - Zero Trust, Zero Chill: Securing Machine Identity

Trust Issues

Play Episode Listen Later May 28, 2025 45:08


In this episode of Security Matters, host David Puner welcomes Kevin Bocek, CyberArk SVP of Innovation, for an insightful discussion on the critical role of machine identity in modern cybersecurity. As digital environments become increasingly complex, securing machine identities has never been more crucial.According to the CyberArk 2025 Identity Security Landscape, machine identities now outnumber human identities by more than 80 to 1. As organizations scale cloud workloads and automation, these identities are becoming a critical part of the cybersecurity frontline. From TLS certificate outages to API key exposures, failures in machine identity management can lead to outages, breaches, and cascading system failures. In this episode of Security Matters, Kevin Bocek explains why this moment is pivotal for getting machine identity right—and how Zero Trust principles, automation, and visibility are essential to building cyber resilience.We also explore the future of identity security—from AI kill switches and agentic AI to quantum threats—and how identity can serve as both a safeguard and a kill switch in the age of autonomous systems.Whether you're a cybersecurity professional or simply interested in the latest security trends, this episode offers valuable insights into the importance of machine identity in safeguarding our digital world. Don't forget to subscribe, leave a review, and follow Security Matters for more expert discussions on the latest in cybersecurity.

@BEERISAC: CPS/ICS Security Podcast Playlist
Real-World Cyber Threats in Healthcare: Balancing Tech, Training, and Human Safety

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later May 28, 2025 29:59


Podcast: IoT Security Podcast (LS 24 · TOP 10% what is this?)Episode: Real-World Cyber Threats in Healthcare: Balancing Tech, Training, and Human SafetyPub date: 2025-05-27Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationCybersecurity in healthcare is facing heightened challenges as regulations shift, IoT devices proliferate, and ransomware attacks become increasingly devastating. Josh Spencer, Founder, and CIO at FortaTech Security and with over fifteen years in the field including time as CISO/CTO at UT Southwestern, explores why HIPAA changes are necessary, the high stakes of securing medical devices, and how both technology and culture play roles in protecting patient data and safety. The conversation breaks down risks, practical mitigation strategies, and the ongoing evolution of both threats and defensive tools -- including AI --  and covers the evolving HIPAA landscape and the move from “addressable” to required controls, ransomware's impact on hospitals and patient safety, challenges and best practices in securing connected medical (IoT/OT) devices, the importance of real-world risk assessment and penetration testing in healthcare, and human factors, including security awareness training and leveraging AI both for defense and as a threat. Let's connect about IoT Security!Follow John Vecchi at https://www.linkedin.com/in/johnvecchiThe IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcastThe podcast and artwork embedded on this page are from Phosphorus Cybersecurity, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

IoT Security Podcast
Real-World Cyber Threats in Healthcare: Balancing Tech, Training, and Human Safety

IoT Security Podcast

Play Episode Listen Later May 27, 2025 29:59


Cybersecurity in healthcare is facing heightened challenges as regulations shift, IoT devices proliferate, and ransomware attacks become increasingly devastating. Josh Spencer, Founder, and CIO at FortaTech Security and with over fifteen years in the field including time as CISO/CTO at UT Southwestern, explores why HIPAA changes are necessary, the high stakes of securing medical devices, and how both technology and culture play roles in protecting patient data and safety. The conversation breaks down risks, practical mitigation strategies, and the ongoing evolution of both threats and defensive tools -- including AI --  and covers the evolving HIPAA landscape and the move from “addressable” to required controls, ransomware's impact on hospitals and patient safety, challenges and best practices in securing connected medical (IoT/OT) devices, the importance of real-world risk assessment and penetration testing in healthcare, and human factors, including security awareness training and leveraging AI both for defense and as a threat. Let's connect about IoT Security!Follow Phillip Wylie at https://www.linkedin.com/in/phillipwyliehttps://youtube.com/@phillipwylieThe IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast

Storm⚡️Watch by GreyNoise Intelligence
ASUS Router Botnet Attack: AI Uncovers Hidden Backdoor

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later May 27, 2025 64:03


Forecast = Mostly cloudy with a chance of rogue SSH access—keep your patches up to avoid a phishy forecast! Welcome to Storm⚡️Watch, where we unpack the latest in cybersecurity threats, research, and the tools that keep the digital world safe. In this episode, we invite GreyNoise Security Architect and researcher Matthew Remacle (a.k.a., Remy) to kick things off with a deep dive into a fascinating and highly sophisticated botnet campaign targeting ASUS routers—a story that starts with a little help from machine learning and ends with some hard lessons for defenders everywhere. GreyNoise researchers spotted this campaign using SIFT, their AI-powered network traffic analyzer, which sifted through more than 23 billion network entries and managed to flag just 30 suspicious payloads targeting ASUS routers. What made this botnet stand out was its surgical precision and stealth—far from the usual noisy, attention-grabbing attacks. The attackers knew exactly what they were doing, focusing on disabling TrendMicro security features embedded in the routers, essentially breaking in by first turning off the alarm. The attack chain reads like a masterclass in persistence: brute force and clever authentication bypasses got them in the door, a null byte injection tricked the router's authentication system, and a command injection vulnerability allowed them to manipulate logging features in a way that opened up even more attack paths. The real kicker? The final backdoor was installed using legitimate ASUS features, meaning it could survive firmware updates and stay hidden from traditional detection methods. This campaign affected thousands of routers globally, with over 4,800 compromised devices detected and counting. Even after ASUS released a patch—adding character validation rather than fixing the underlying flaw—researchers found that the fundamental vulnerability remained, and attackers could potentially work around the patch. This story highlights the ongoing challenges in IoT security: complexity breeds vulnerability, persistence is a nightmare to detect and remove when attackers use legitimate features, and patches often address symptoms rather than root causes. It's a reminder that traditional signature-based detection is no longer enough—behavioral analysis and AI-driven anomaly detection are now essential for spotting these advanced threats. We also touch on the bigger picture: the evolving cat-and-mouse game between attackers and defenders, the importance of defense in depth, and why understanding normal network behavior is more critical than ever. Plus, we look at the human element—attackers who are patient, technically sophisticated, and deeply aware of how to evade detection. For organizations, the takeaways are clear: defense in depth, behavioral monitoring, asset management, and patch management are all non-negotiable. And for everyone else, it's a reminder that the devices we trust to protect us are themselves complex and potentially vulnerable computers. Later in the episode, we take a closer look at vulnerability scoring systems—CVSS, EPSS, and SSVC—and why reading between the scores is so important for risk management. We also highlight the value of fresh, actionable data from sources like Censys and VulnCheck, and round things out with a nod to the ongoing conversation happening on the GreyNoise blog. Thanks for tuning in to Storm⚡️Watch. Stay vigilant, keep learning, and remember: in cybersecurity, the difference between safe and compromised can be as subtle as a single null byte. Storm Watch Homepage >> Learn more about GreyNoise >>  

Cyber Security Today
Unraveling Cyber Threats: Ransomware, Kidnapping, and Record-Breaking DDoS Attacks

Cyber Security Today

Play Episode Listen Later May 26, 2025 9:47


In this episode of Cybersecurity Today, host David Shipley dives into several alarming cyber incidents. The show starts with Nova Scotia Power's confirmation of a ransomware attack that forced the shutdown of customer-facing systems and led to data being published on the dark web. The company decided not to pay the ransom, adhering to law enforcement guidance and sanctions laws. A shocking case in New York follows, involving a crypto investor charged with kidnapping and torturing a man to obtain his Bitcoin wallet password. The next segment highlights a record-setting DDoS botnet, Aisuru, which performed a test attack that peaked at 6.3 terabits per second, posing a disproportionate threat to online retailers. The final story covers Microsoft's controversial AI feature, Recall, which takes screenshots every three seconds and raises significant privacy concerns. The episode underscores the growing need for robust cybersecurity measures and effective legislation. 00:00 Introduction and Headlines 00:30 Nova Scotia Power Ransomware Attack 02:57 Ransomware Trends and Statistics 03:51 Operation End Game: A Global Win Against Ransomware 04:25 Crypto Investor's Shocking Crime 05:57 Record-Breaking DDoS Botnet 07:36 Microsoft's Controversial AI Feature Recall 09:10 Conclusion and Sign-Off

NucleCast
General (Ret) Glen VanHerck: Cyber Threats and Homeland Defense Strategies

NucleCast

Play Episode Listen Later May 20, 2025 34:26


General VanHerck, former commander of U.S. Northern Command, shares his insights on deterrence, homeland defense, and the evolving threats facing the United States. He emphasizes the importance of cyber awareness, missile defense, and the need for a layered approach to national security. He also stresses the significance of relationships with allies and partners, the future of space defense, and the necessity for long-range strike capabilities and his wishes for a more agile defense acquisition process and the importance of investing in foundational infrastructure. Glen VanHerck is a visionary senior leader leveraging more than 36 years of service culminating as commander of both the North American Aerospace Defense Command and United States Northern Command. He brings a wealth of experience in strategy and policy development, and joint planning and operations. Glen is the Principal at Glen VanHerck Advisors, LLC. He is a Senior Fellow at the National Defense University and Johns Hopkins University Applied Physics Lab. He serves as an advisor to multiple companies spanning various industry sectors and is a board member of First State Community Bank in his hometown.Glen served for nearly 37 years on active duty in the United States Air Force, in multiple assignments spanning fighter, bomber, and training operations including serving as a United States Air Force Weapons School Instructor in the F-15C and the B-2A. He commanded two squadrons, an operations group, and two operational wings. He also commanded the United States Air Force Warfare Center at Nellis AFB, Nevada.Socials:Follow on Twitter at @NucleCastFollow on LinkedIn: https://linkedin.com/company/nuclecastpodcastSubscribe RSS Feed: https://rss.com/podcasts/nuclecast-podcast/Rate: https://podcasts.apple.com/us/podcast/nuclecast/id1644921278Email comments and topic/guest suggestions to NucleCast@anwadeter.org

The Jerich Show Podcast
From Rogue Radios to Hijacked Chips: Cyber Threats Go Global!

The Jerich Show Podcast

Play Episode Listen Later May 16, 2025 25:34


In this episode of The Jerich Show, join your favorite cybersecurity duo, Erich Kron and Javvad Malik, as they dive into some truly wild cybercrime stories making headlines around the globe. Hackers who've been terrorizing UK retailers have hopped the pond to target US companies, while Japan's bold plan to double its cybersecurity workforce might mean saying sayonara to tough certifications. Meanwhile, the EU arms defenders with a shiny new vulnerability database, and the discovery of rogue communication devices lurking in Chinese-made solar inverters sparks fresh paranoia. Plus, could your CPU itself soon be held hostage by ransomware? Tune in for laughs, insights, and a healthy dose of cyber skepticism! Stories from the show: Hackers behind UK retail attacks now targeting US companies https://www.bleepingcomputer.com/news/security/google-scattered-spider-switches-targets-to-us-retail-chains/ Japan aims to double cybersecurity specialists by 2030, relax certification requirements https://asianews.network/japan-aims-to-double-cybersecurity-specialists-by-2030-relax-certification-requirements/ EU launches vulnerability database to tackle cybersecurity threats https://therecord.media/eu-launches-vulnerability-database CPU microcode hack could infect processors with ransomware directly https://www.techradar.com/pro/security/cpu-microcode-hack-could-infect-processors-with-ransomware-directly ‘Rogue' communication devices found on Chinese-made solar power inverters https://www.utilitydive.com/news/rogue-communication-devices-found-on-chinese-made-solar-power-inverters/748242/

The Tara Show
Cyber Threats, Power Grid Vulnerability, and Child Trafficking A Nation in Crisis

The Tara Show

Play Episode Listen Later May 15, 2025 17:10


This explosive segment uncovers the mounting national security risks posed by Chinese cyber intrusions into America's critical infrastructure—including water treatment plants, nuclear facilities, and the power grid—allegedly as retaliation for U.S. support of Taiwan. It also delves into the Biden administration's response, or lack thereof, and the disturbing discovery of rogue communication devices embedded in Chinese-manufactured power inverters. The second half shifts focus to allegations of systemic child trafficking under the Biden administration, spotlighting whistleblower accounts and accusations that deliberate policy rollbacks have enabled traffickers to exploit migrant children. Featuring commentary from Laura Ingraham, Sen. Josh Hawley, Brianna Morello, and RFK Jr., this is a sobering look at issues too critical to ignore.

Security Squawk
Only 4% Are Ready for AI Cyber Threats—Are You One of Them?

Security Squawk

Play Episode Listen Later May 13, 2025 46:15


Cyber threats are evolving—and fast. In this episode of Security Squawk, we investigate Alabama's mysterious “cybersecurity event,” expose the growing threat of callback phishing from the Silent Ransom Group, and reveal why Lee Enterprises had to spend $2 million to recover from a ransomware attack. Plus, we dive into a Cisco study showing that just 4% of companies are prepared to face AI-powered cyber threats. Tune in as Bryan, Randy, and Andre break down what this means for your business and how to stay ahead of the game. Topics Discussed: Alabama's state-level cyber “event” SilentRansomGroup & Luna Moth callback phishing BEC remains strong despite drop in cyber claims Lee Enterprises' $2M ransomware recovery Cisco's shocking AI-era threat readiness stat Future of AI-powered ransomware M&S and Co-op attack updates

Cyber Security Today
Cyber Threats Target HR, AI Tools, and Critical Infrastructure: A Comprehensive Update

Cyber Security Today

Play Episode Listen Later May 12, 2025 8:07 Transcription Available


In this episode of Cybersecurity Today, host David Shipley covers a range of cyber threats including the Venom Spider malware targeting HR professionals, the emergence of the Noodlofile info stealer disguised as an AI video generator, and misinformation campaigns amid the India-Pakistan conflict. Additionally, the episode discusses warnings from U.S. agencies about cyberattacks on the oil and gas sector, and highlights a recent interview with whistleblower Daniel Brules about security lapses at the National Labor Relations Board. 00:00 Introduction and Overview 00:33 Venom Spider Targets HR Professionals 02:12 Fake AI Video Generators and Noodlofile Malware 03:41 Misinformation Amid India-Pakistan Conflict 05:40 US Oil and Gas Infrastructure Under Threat 07:22 Conclusion and Final Thoughts

CanCon Podcast
Half of the internet is bots and they're feeding you lies

CanCon Podcast

Play Episode Listen Later May 12, 2025 44:47


“Bad actors are weaponizing AI faster than governments and enterprises are using AI to combat it.” New data shows that more than half of all internet traffic comes from bots, and a third of those bots have malicious intent. Koat.ai co-founder Connor Ross joins to discuss the impact of the disinformation and defamation campaigns these bots run, how governments and enterprises are unprepared for this AI-driven explosion, and why the social networks are doing nothing to stop it. The BetaKit Podcast is presented by OVHcloud, the global cloud provider trusted by innovators worldwide. OVHcloud offers transparent, sovereign cloud solutions designed to help you build on your own terms—without vendor lock-in or hidden fees. With over 80 services available, you can build and scale your infrastructure confidently, knowing your data is hosted in Canada and supported by 44 data centres globally. Visit ovhcloud.com to get started with trusted cloud built for scale. Related links: 2025 bad bot report Cyber Threats to Canada's Democratic Process: 2025 Update

Communism Exposed:East and West
CISA Director Highlights US Efforts to Protect Against Chinese Cyber Threats

Communism Exposed:East and West

Play Episode Listen Later May 9, 2025 2:47


GovCast
TechNet 2025: CMMC Needs to Adapt to Evolving Cyber Threats

GovCast

Play Episode Listen Later May 8, 2025 13:29


According to officials, the Defense Department's Cybersecurity Maturity Model Certification (CMMC) program is a national secutity imperative to protect intellectual property and maintain an American competitive advantage in defense technology. At AFCEA TechNet 2025 in Baltimore, Katie Arrington, performing the duties of the DOD CIO, says CMMC needs to adapt dynamically to evolving cyber threats. With evolving tech like AI and quantum, acquisition rules need to adjust to evolving technologies while maintaining security standards. Arrington says that the Defense Department needs to continue to streamline cyber requirements through required standards, guidance and executive orders. She also discusses the need for a cultural shift towards continuous cybersecurity, the new Software Fast Track Initiative and baking cybersecurity into all DOD functions.

TechSurge: The Deep Tech Podcast
Leading Through Chaos: John Chambers on Tariffs, Cyber Threats, & the AI Supercycle

TechSurge: The Deep Tech Podcast

Play Episode Listen Later May 8, 2025 39:37


Competition, growth, tariffs, hacks, AI – what does it take to be an effective leader today? John Chambers, former CEO and Executive Chairman of Cisco and founder of JC2 Ventures, joins TechSurge host Sriram Viswanathan to share valuable wisdom on leading and growing businesses through times of significant change. As a leader who has transitioned from the c-suite to venture capital and now mentoring founders in emerging technology sectors, John has seen it all. He shares lessons from his time leading one of the world's most influential networking companies at Cisco (the most valuable company in the world at the time), revealing what he learned while growing it from a challenger networking company into a $50 billion tech powerhouse, sharing how Cisco achieved and maintained its market leadership, particularly his bold M&A strategies. John offers hard‑won insights on navigating major technology shifts in AI, cloud, security, and more. Today's founders and executives will find practical frameworks, real‑world war stories, and counterintuitive advice to help survive and thrive in an era of continual disruption. If you enjoy this episode, please subscribe and leave us a review on your favorite podcast platform. Sign up for our newsletter at techsurgepodcast.com for exclusive insights and updates on upcoming TechSurge Live Summits.Links:Explore John Chambers' family office and venture firm at JC2 VenturesRead John Chambers' book “Connecting the Dots” on AmazonDiscover the organization John chaired for eight years US-India Strategic Partnership ForumLearn about the company John and Sriram have invested in together at ParkourSCFind out about the deep fake detection company Pin DropLearn about the cybersecurity company Rubrik

ICT Pulse Podcast
ICTP 350: 2025 Expert Insight update on cyber threats and security in the Caribbean, with Obika Gellineau of Fujitsu Caribbean

ICT Pulse Podcast

Play Episode Listen Later May 7, 2025 66:50


In the second instalment in our Expert Insights series on cyber threats and security for 2025, we are joined once again by Obika Gellineau, of Fujitsu Caribbean. During this conversation, Obika shares his thoughts on, among other things:   *  the changes in the threat landscape that have occurred since our last conversation in 2024;   *   the cybersecurity job market and the expertise that is being demanded;   *   the link between digital sovereignty and cybersecurity; and   *   three things organisations should be doing in 2025 to improve their network/IT security.   The episode, show notes and links to some of the things mentioned during the episode can be found on the ICT Pulse Podcast Page (www.ict-pulse.com/category/podcast/)       Enjoyed the episode?  Do rate the show and leave us a review!       Also, connect with us on: Facebook – https://www.facebook.com/ICTPulse/   Instagram –  https://www.instagram.com/ictpulse/   Twitter –  https://twitter.com/ICTPulse   LinkedIn –  https://www.linkedin.com/company/3745954/admin/   Join our mailing list: http://eepurl.com/qnUtj    Music credit: The Last Word (Oui Ma Chérie), by Andy Narrell Podcast editing support:  Mayra Bonilla Lopez ----------------

Storm⚡️Watch by GreyNoise Intelligence
Biggest Cybersecurity Threats EXPOSED: Zero-Day Attacks, Chinese Hackers & Enterprise Breaches

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later May 6, 2025 52:42


Forecast = Cloudy with a chance of zero-days-watch for Spellbinder storms and scattered Git leaks! ‍ On this episode of Storm⚡️Watch, the crew dives into the fast-moving world of vulnerability tracking and threat intelligence, spotlighting how defenders are moving beyond the traditional CVE system to keep pace with real-world attacks. The show kicks off with a look at the latest listener poll, always a source of lively debate, before jumping into some of the most pressing cybersecurity stories of the week. A major focus of this episode is the recent revelation that a China-aligned APT group, dubbed TheWizards, is using a tool called Spellbinder to abuse IPv6 SLAAC for adversary-in-the-middle attacks. This technique lets attackers move laterally through networks by hijacking software update mechanisms-specifically targeting popular Chinese applications like Sogou Pinyin and Tencent QQ-to deliver malicious payloads such as the modular WizardNet backdoor. The crew unpacks how this approach leverages IPv6's stateless address autoconfiguration to intercept and redirect legitimate traffic, underscoring the evolving sophistication of lateral movement techniques in targeted campaigns. The episode then turns to Google's 2024 zero-day exploitation analysis, which reports a drop in the total number of zero-days exploited compared to last year but highlights a worrying shift: attackers are increasingly targeting enterprise products and infrastructure. Microsoft, Ivanti, Palo Alto Networks, and Cisco are among the most targeted vendors, with nearly half of all zero-day exploits now aimed at enterprise systems and network appliances. The discussion covers how attackers are chaining vulnerabilities for more impactful breaches and why defenders need to be vigilant as threat actors pivot to harder-to-monitor enterprise environments. Censys is in the spotlight for its recent research and tooling, including a new Ports & Protocols Dashboard that gives organizations granular visibility into their attack surface across all ports and protocols. This helps teams quickly spot risky exposures and misconfigurations, making it easier to prioritize remediation efforts and automate alerting for high-risk assets. The crew also highlights Censys's collaborative work on botnet hunting and their ongoing push to retire stale threat indicators, all of which are reshaping proactive defense strategies. runZero's latest insights emphasize the importance of prioritizing risks at the asset stack level, not just by CVE. The crew explains how misconfigurations, outdated software, and weak network segmentation can create stacked risks that traditional scanners might miss, urging listeners to adopt a more holistic approach to asset management and vulnerability prioritization. Rounding out the episode, GreyNoise shares new research on a dramatic spike in scanning for Ivanti Connect Secure VPNs and a surge in crawling activity targeting Git configuration files. These trends highlight the persistent risk of codebase exposure and the critical need to secure developer infrastructure, as exposed Git configs can lead to the leak of sensitive credentials and even entire codebases. As always, the show wraps up with some final thoughts and goodbyes, leaving listeners with actionable insights and a reminder to stay vigilant in the face of rapidly evolving cyber threats. If you have questions or want to hear more about any of these topics, let us know-what's on your mind this week? Storm Watch Homepage >> Learn more about GreyNoise >>  

Trust Issues
EP 6 - Incident Response POV: 2025 Emerging Threats

Trust Issues

Play Episode Listen Later Apr 30, 2025 36:41


In this episode of Security Matters, host David Puner, dives into the world of evolving cyberthreats with Bryan Murphy, Senior Director of CyberArk's Incident Response Team. Imagine a scenario where an attacker uses AI-generated deepfakes to impersonate your company's VP of finance, gaining unauthorized access to your environment. Bryan Murphy shares insights on how these sophisticated attacks are turning identity into the attack surface and why your first line of defense might be as simple as a video call. Learn about the latest trends in social engineering, credential tiering and the importance of visual verification in incident response. Don't miss this eye-opening discussion on how to protect your organization from the ever-evolving threat landscape.

Daily Signal News
Quantum Warfare: How Titanium Secure Protects You From Chinese Cyber Threats

Daily Signal News

Play Episode Listen Later Apr 27, 2025 32:37


Dive deep into the world of cybersecurity with Dr. John Reese, founder and CEO, and Michael Avari, CIO of Titanium Secure. Learn why quantum-resistant encryption has become crucial in an era of Chinese cyber threats and big tech data harvesting. Key Topics: 1) The birth of Titanium Secure: Discover how Reese's unique path from dentistry to cybersecurity led to his founding a secure communications platform 2) Why Parler's deplatforming in 2020 signaled a need for independent secure communications 3) The Chinese threat: Recent telecom infiltrations and infrastructure targeting 4) Quantum computing explained: Why current encryption is vulnerable and how Titanium Secure is resistant 5) Beyond Big Tech: Why free services like WhatsApp and Telegram come with hidden costs 6) Real-world uses: From real estate transactions to sensitive government communications Titanium Secure is available across all major platforms including Windows, Mac, Android, iOS, and Linux, and can be accessed through its website or downloaded from Apple and Google Play app stores. Pricing starts at $6/month for individuals, with enterprise and temporary subscription options. Guest Bios: Dr. John Reese: Former dentist turned tech entrepreneur who founded Titanium Secure after identifying critical gaps in conservative communication security Michael Avari: Former CISO with deep tech background, now CIO of Titanium Secure, bringing expertise in quantum-resistant encryption Resources: Visit https://www.TitaniumSecure.io for more information Download from the Apple or Google Play app stores The Daily Signal cannot continue to tell stories, like this one, without the support of our viewers: https://secured.dailysignal.com/ Learn more about your ad choices. Visit megaphone.fm/adchoices

Jamf After Dark
Jamf After Dark - Current Landscape of Security and Privacy for K-12

Jamf After Dark

Play Episode Listen Later Apr 25, 2025 56:51


Co-hosts Kat Garbis and Sean Rabbitt are joined by Suraj Mohandas (Vice President of Product Strategy), Emily McRoberts-Froese (Sr. Education Leadership Executive), and John Wetter (Director of Technology & Information Services Hopkins Public Schools) to discuss the current landscape for admins supporting K-12 .    Meet John Wetter, an IT Professional, Jamf customer, and public speaker out of Minneapolis, joins the Jamf team to discuss the current changes and evolution of supporting K-12, including security, privacy, budget, AI initiatives and more.    The team leans on Wetter's experience to understand how they are navigating cyber and physical threats in K-12 schools, best practices in identity, if AI has a place in education, and advice to other IT professionals in the K-12 space. 

Business of Tech
Zendesk Shifts to Outcome-Based Pricing; CISA Faces Resignations Amid Budget Cuts and Cyber Threats

Business of Tech

Play Episode Listen Later Apr 23, 2025 15:31


Zendesk has made a significant shift in its pricing model by moving away from traditional seat licenses to an outcome-based pricing structure. This change, articulated by CEO Tom Eggemeier, means that customers will only pay when an AI agent successfully resolves a business problem. This approach aligns with a broader industry trend towards consumption-based pricing, where costs are directly linked to the value delivered rather than the number of licenses or usage. As organizations increasingly adopt AI technologies, this model could reshape the software landscape, pushing providers to rethink their value propositions and focus on delivering tangible business outcomes.The Cybersecurity and Infrastructure Security Agency (CISA) is facing challenges as two high-ranking officials resign amid budget cuts that threaten to reduce its workforce by nearly 40%. The agency's Secure by Design initiative, aimed at enhancing software security, may be impacted by these changes, raising concerns about the future of national cybersecurity efforts. Additionally, CISA has halted the use of certain threat-hunting tools, which could further hinder its ability to address cyber threats effectively. The situation highlights the critical need for managed service providers (MSPs) to adapt their business models to incorporate security measures that align with evolving regulatory and customer demands.Kaseya and other companies are introducing AI-driven tools designed to enhance IT management and cybersecurity for managed service providers. Kaseya's Spring 2025 release includes features that automate workflows and improve user experience, while Cork Protection has launched a tool to help MSPs quickly assess cyber insurance policies. These innovations reflect a growing trend in the industry to leverage AI for operational efficiency and improved service delivery. As MSPs adopt these technologies, they can better position themselves to meet client needs and navigate the complexities of cybersecurity.OpenAI has partnered with The Washington Post to enable ChatGPT to summarize and link to the newspaper's reporting, marking a significant development in the relationship between AI and journalism. This collaboration aims to enhance the quality of information provided to users while raising questions about copyright and the reliability of AI-generated content. Despite OpenAI's advancements in research capabilities, concerns remain about the accuracy of AI in complex tasks. The partnership underscores the ongoing tension between the demand for high-quality information and the challenges of integrating AI into content creation and dissemination. Four things to know today 00:00 Zendesk Drops Per-User Pricing—Now It's Pay When AI Gets the Job Done03:56 Cyber Shakeup: CISA Faces Staff Exodus and Tool Loss While Pentagon Tightens Software Security Standards06:52 From Cyber Orchestration to Frontline AI: New Releases Highlight MSP-Centric Innovation Across the Ecosystem10:35 As OpenAI Partners with Major Newsrooms, Benchmark Reveals Deep Research Still Struggles with Accuracy  Supported by: https://timezest.com/mspradio/ https://www.huntress.com/mspradio/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

Kate Dalley Radio
042225 2nd HR Key Addition To 1st HR and Cyber Threats Who Is Really Behind Them WOW

Kate Dalley Radio

Play Episode Listen Later Apr 22, 2025 37:40


042225 2nd HR Key Addition To 1st HR and Cyber Threats Who Is Really Behind Them WOW by Kate Dalley

ITSPmagazine | Technology. Cybersecurity. Society
From Phishing to Full Compromise in Under an Hour: Automation Is Fueling the Next Wave of Cyber Threats | A LevelBlue Brand Story with Kenneth Ng

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 18, 2025 36:02


LevelBlue's latest Threat Trends Report pulls no punches: phishing, malware, and ransomware attacks are not just continuing—they're accelerating. In this episode of ITSPmagazine's Brand Story podcast, hosts Sean Martin and Marco Ciappelli are joined by Kenneth Ng, a threat hunter and lead incident responder on LevelBlue's Managed Detection and Response (MDR) team, to unpack the findings and recommendations from the report.Phishing as a Service and the Surge in Email CompromisesOne of the most alarming trends highlighted by Kenneth is the widespread availability of Phishing-as-a-Service (PhaaS) kits, including names like RaccoonO365, Mamba 2FA, and Greatness. These kits allow attackers with little to no technical skill to launch sophisticated campaigns that bypass multi-factor authentication (MFA) by hijacking session tokens. With phishing attacks now leading to full enterprise compromises, often through seemingly innocuous Microsoft 365 access, the threat is more serious than ever.Malware Is Smarter, Simpler—and It's Spreading FastMalware, particularly fake browser updates and credential stealers like Lumma Stealer, is also seeing a rise in usage. Kenneth points out the troubling trend of malware campaigns that rely on basic user interactions—like copying and pasting text—leading to full compromise through PowerShell or command prompt access. Basic group policy configurations (like blocking script execution for non-admin users) are still underutilized defenses.Ransomware: Faster and More Automated Than EverThe speed of ransomware attacks has increased dramatically. Kenneth shares real-world examples where attackers go from initial access to full domain control in under an hour—sometimes in as little as ten minutes—thanks to automation, remote access tools, and credential harvesting. This rapid escalation leaves defenders with very little room to respond unless robust detection and prevention measures are in place ahead of time.Why This Report MattersRather than presenting raw data, LevelBlue focuses on actionable insights. Each major finding comes with recommendations that can be implemented regardless of company size or maturity level. The report is a resource not just for LevelBlue customers, but for any organization looking to strengthen its defenses.Be sure to check out the full conversation and grab the first edition of the Threat Trends Report ahead of LevelBlue's next release this August—and stay tuned for their updated Futures Report launching at RSA Conference on April 28.Learn more about LevelBlue: https://itspm.ag/levelblue266f6cNote: This story contains promotional content. Learn more.Guest: Kenneth Ng, threat hunter and lead incident responder on LevelBlue's Managed Detection and Response (MDR) team | On LinkedIn: https://www.linkedin.com/in/ngkencyber/ResourcesDownload the LevelBlue Threat Trends Report | Edition One: https://itspm.ag/levelbyqdpLearn more and catch more stories from LevelBlue: https://www.itspmagazine.com/directory/levelblueLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

The Tara Show
"Cyber Threats and Silent Deals: The Shocking Truth Behind China's Grip on U.S. Infrastructure"

The Tara Show

Play Episode Listen Later Apr 11, 2025 6:34


In a stunning revelation reported by The Wall Street Journal, Chinese officials allegedly admitted in a secret meeting to years of cyberattacks on critical U.S. infrastructure — from ports and airports to nuclear facilities. Tied to tensions over Taiwan, the confession paints a chilling picture of strategic digital warfare. As Trump ramps up tariffs and boots out compromised officials, new questions emerge: Is the Biden administration turning a blind eye? And just how deep does China's influence in Washington really go?

Sales vs. Marketing
Lessons - Fixing Human Error in Cybersecurity | Theresa Payton - Former White House CIO

Sales vs. Marketing

Play Episode Listen Later Mar 30, 2025 11:29


➡️ Like The Podcast? Leave A Rating: https://ratethispodcast.com/successstory  In this "Lessons" episode, Theresa Payton, former White House CIO, shares how predictable human behavior creates vulnerabilities in cybersecurity and why conventional defenses often fall short. Learn why routine security measures are exploited by sophisticated social engineering and how designing innovative, personalized protocols can disrupt attackers and strengthen digital defenses. ➡️ Show Linkshttps://successstorypodcast.com  YouTube: https://youtu.be/bH8DwhGUg0cApple: https://podcasts.apple.com/us/podcast/theresa-payton-cybersecurity-expert-author-former-white/id1484783544Spotify: https://open.spotify.com/episode/5DLZKqN89CTRVXW2Hi3Pq5➡️ Watch the Podcast on YouTubehttps://www.youtube.com/c/scottdclary