Attack on a computer system
POPULARITY
Categories
Send us a textWelcome to What's Up in Business Travel for Week 35 of 2025. This is a weekly podcast where we update you on what's up this week in the world of business travel. This podcast is great for those who need to know what's happening all in under 15 minutes.On this week's podcast, we covered the following stories -Airlines targeted in cyberattacksGoogle is required to share data with competitorsLabor Day 2025 passenger numbers sets recordPassenger compensation plan droppedSouthwest adopts secondary cockpit barrierSpirit Airlines axes flights in 12 citiesAmexGBT completes CWT acquisitionWestJet places record order with BoeingZipcar partners With UberAmerican takes delivery of 1,000th aircraftWheels Up launches membership programSouthwest to launch free Wi-FiJetBlue signs as Amazon's 1st airline customerConcur Travel integrates HotelHubAmerican Airlines introduces AI SystemYou can subscribe to this podcast by searching 'BusinessTravel360' on your favorite podcast player or visiting BusinessTravel360.comThis podcast was created, edited and distributed by BusinessTravel360. Be sure to sign up for regular updates at BusinessTravel360.com - Enjoy!Support the show
Thank you so much for listening to the Bob Harden Show, celebrating over 14 years broadcasting on the internet. On Tuesday's show, we visit with our Florida State Senator Kathleen Passidomo about recommendations to eliminate Florida property taxes, and we discuss policy changes about vaccines in Florida. We visit with Mantas Sabieckis from Cybernews.com about the consequences of China's Salt Typhoon cyberattack. Community Pregnancy Clinics Mission Advancement Director Shaun Guevarra and I discuss their great services as well as the lack of enforcement of Florida Six-Week Heartbeat Protection Act. We also visit Linda Harden about attacks on RFK, Jr.'s quest to “Make America Healthy Again,” and we discuss “lawfare” against Utah medical Dr. Kirk Moore. Please join us tomorrow when we visit with Cato Institute Chairman Emeritus Bob Levy and Professor Andrew Joppa. Access this or past shows at your convenience on my web site, social media platforms or podcast platforms.
Worried about the growing threat of cybercrime and fraud targeting your business? This episode of Everything Counts is your essential guide to understanding and combating modern business cybersecurity risks. Join host Motheo Khoaripe as he speaks with Professor Danny Myburgh, digital forensics expert, and Kevin Hogan, Head of Fraud Risk at Investec, to uncover the latest scams like business email compromise, ransomware, fake payment notifications and more. Learn how cybercriminals exploit trust, hijack email systems, use AI-driven tools to impersonate you and manipulate communication channels to steal from your business. Discover practical tips on securing your passwords, spotting fake payment instructions, protecting your email, adopting two-factor authentication and why independent verification is critical. Whether you're a small business owner or part of a larger organisation, this conversation will empower you to strengthen your ‘human firewall' and stay one step ahead of evolving fraud tactics. Tune in to make your business cybersecurity smarter, more resilient and ensure that when it comes to protecting your money and reputation, Everything Counts. 00:00 Introduction 01:25 Common cybersecurity threats businesses are facing 02:40 Increase in scams: Deposit scams, investment scams, crypto scams 03:10 Common types of banking fraud 04:00 How phishing works 05:00 The link between ChatGPT and fraud 05:50 What to look out for: Ransomware and data exfiltration 06:30 Cyberattack statistics in South Africa 07:50 What are fake payment notifications and instructions? 09:50 Social engineering: How fraud targets trust 10:30 Email hacking: Filters targeted by scamsters 15:00 What to do if your email has been hacked 16:20 What is email spoofing? 19:30 How often should you change your passwords? 21:20 Business banking tools to prevent hacks 23:00 Using a password manager 24:20 How cybersecurity training keeps your ‘human firewall' strong 24:57 What does banking security look like? 27:00 Investec Global Client Support Centre 27:15 Conclusion Investec Focus Radio SA
Thank you so much for listening to the Bob Harden Show, celebrating over 14 years broadcasting on the internet. On Tuesday's show, we visit with our Florida State Senator Kathleen Passidomo about recommendations to eliminate Florida property taxes, and we discuss policy changes about vaccines in Florida. We visit with Mantas Sabieckis from Cybernews.com about … The post Warning: China’s Salt Typhoon Cyberattack appeared first on Bob Harden Show.
When ransomware hits a hospital, it's not just data that's at stake—patients are dying. Ed Gaudet, CEO of Censinet, reveals the shocking research proving what healthcare security professionals feared: cyberattacks on hospitals directly increase mortality rates and disrupt life-saving care. But Ed's biggest concern? The eerie quiet before what he believes could be the next wave of coordinated attacks across multiple critical infrastructures. Plus, why Microsoft's approach to AI integration is making cybersecurity professionals lose sleep. Key Topics Covered: Why ransomware attacks on hospitals increase patient mortality rates The research behind healthcare cybersecurity's deadly consequences How the healthcare industry's digital transformation created new vulnerabilities Microsoft's problematic approach to forced AI integration The evolution from individual hackers to organized cybercrime syndicates Why Ed's "Spidey senses" are warning of coordinated infrastructure attacks Don't wait until your organization becomes the next healthcare headline. Subscribe for more critical cybersecurity insights that could save more than just your data. #healthcarecybersecurity #ransomware #patientsafety #cybersecurity #infosec #healthcare
From March 28, 2024: One of the gravest threats to U.S. national security today—and also one of the newest—is the risk of cyberattacks. They come in many forms, and they can incapacitate companies, institutions, and even the government. To better understand these threats—and how the government is responding to them—Lawfare Executive Editor Natalie Orpett and Lawfare Contributing Editor Brandon Van Grack sat down with Brett Leatherman, Deputy Assistant Director for Cyber Operations at the FBI. They discussed the FBI's recent operations, threats from both state actors and criminal gangs, and the role of the private sector in U.S. cybersecurity.This is the latest episode in our special series, “The Regulators,” co-sponsored with Morrison Foerster, in which we talk with senior government officials working at the front lines of U.S. national security policy.To receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also support Lawfare by making a one-time donation at https://givebutter.com/lawfare-institute.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.
Headlines: – Welcome to Mo News (02:00) – RFK Jr. Questioned Over CDC Turmoil, Vaccines in Senate Hearing (04:45) – Former CDC Director Susan Monarez Makes Allegations Against Kennedy OP ED (13:45) – Trump Wants To Rename Dept. Of Defense “Dept of War” (22:15)– Northwestern University President Steps Down (25:15) – Trump's Pick For Fed Governor Says He Does Not Plan to Resign From White House Role (27:15) – Justice Dept. Opens Criminal Inquiry Into Fed's Lisa Cook (30:10) – Chinese Cyberattackers May Have Stolen Data From Almost Every American (31:30) – U.S. States With The Earliest And Latest Bedtimes (34:00) – Giorgio Armani Dies Aged 91 (37:15) – What We're Watching, Reading, and Eating (41:00) Thanks To Our Sponsors: – LMNT - Free Sample Pack with any LMNT drink mix purchase – Industrious - Coworking office. 50% off day pass | Promo Code: MONEWS50 – Surfshark - 4 additional months of Surfshark VPN | Code: MONEWS – Leesa – 30% off mattress, plus extra $50 off | Promo Code: MONEWS – Factor Meals – 50% your first box plus free shipping | Promo Code: monews50off – Monarch Money - 50% off your first year | Promo Code: MONEWS
Meet a new species of human, hear about the latest threats to mail-in voting, and journey somewhere over the rainbow at Sphere. All that and more on the latest episode of KNPR's State of Nevada.
* The Orleans Parish Sheriff's Office was hit with a ransomware attack. How common are those? What can organizations and individuals do to avoid being hit with one? * Tommy's Weekend Winners: sports betting tips for this weekend
A cyberattack disrupts Bridgestone tyre factories in North America, a new infostealer takes your photo while you watch porn, bad certificates for Cloudflare infrastructure went undetected for more than a year, and Brazil deals with another payment system hack. Show notes Risky Bulletin: Chrome 140 comes with new hardened cookies
#SWAMPWATCH – Kennedy Rejects Criticism, Data and Decorum in Contentious Hearing. U.K. Should Clarify Free-Speech Laws After Comedian's Arrest, Police Chief Says TECH TALK with Mark Saltzman – iPhone 17 last-minute rumors / Remove Your Personal Info from This Invasive Website ASAP. Chinese Cyber Attack Hit EVERYONE!!!!
Cybersecurity has moved far beyond being just a technical issue — it is now a core business priority that directly impacts customer trust, operational resilience and the bottom line. We sit down with two industry leaders on the front lines of digital risk: Pam Lindemoen, chief security officer and vice president of strategy at the Retail & Hospitality Information Sharing and Analysis Center, and Christian Beckner, vice president of retail technology and cybersecurity at the National Retail Federation. Together, they unpack the fast-changing cybersecurity landscape facing retailers today, from fraud and social engineering to the new challenges posed by artificial intelligence.(00:00:00) Building a united front in retail cybersecurity(00:04:41) Strengthening trust and evolving partnerships(00:07:49) Rising threats in retail cybersecurity(00:12:43) Investing in resilience and readiness(00:16:51) Looking ahead: cooperation and global expansionThe National Retail Federation is the world's largest retail trade association.Every day, we passionately stand up for the people, policies and ideas that help retail succeed.Resources:• Get ready for Retail's Big Show in NYC• Become an NRF member and join the world's largest retail trade association• Learn about our retail education platform, NRF Foundation, at nrffoundation.org• Learn about retail advocacy at nrf.com/advocacy• Find more episodes at retailgetsreal.comRelated:• 366: How to fight back against organized retail crime• 353: How customer-facing AI will energize retail's future• 344: The future of AI in consumer experience
In this episode, Ryan Williams Sr. and Shannon Tynes discuss the latest cybersecurity news, including a ransomware attack in Nevada and the federal response to improve cybersecurity funding. They dive into the implications of AI in cybersecurity, the Salt Typhoon hack as a national defense crisis, and personal reflections on gaming, particularly the Madden franchise. The conversation highlights the challenges and opportunities in the cybersecurity landscape, emphasizing the need for international standards and proactive measures. Articles: Federal, state officials investigating ransomware attack targeting Nevada https://www.cybersecuritydive.com/news/federal-state-investigating-ransomware-nevada/758863/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExamluU2h2WDFUcjdHQTFjVgEeCjaDx2kSMvwp90SaocW9G3SYU7EpIc7x5oNQmq7O-L9XwgzHnSw9ipqPGXg_aem_x6hVfkHI7y2Vc01A3LCbMw Can Your Security Stack See ChatGPT? Why Network Visibility Matters https://thehackernews.com/2025/08/can-your-security-stack-see-chatgpt-why.html U.S. And Allies Declare Salt Typhoon Hack A National Defense Crisis https://www.forbes.com/sites/emilsayegh/2025/08/30/us-and-allies-declare-salt-typhoon-hack-a-national-defense-crisis/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExamluU2h2WDFUcjdHQTFjVgEeQ1F7W3L6A9XwbQBJ_7ynNSlrQAaUAwp5dgydOMHdSl0VTZOv9-jeenaWf80_aem_4j4G6wyTFBhZYVmquGcvUg Please LISTEN
Welcome to Top of the Morning by Mint.. I'm Nelson John and here are today's top stories. Rat Bite Horror in Indore Two newborns bitten by rats inside Indore's government-run MY Hospital died within 24 hours, sparking outrage. Hospital authorities insist the deaths were due to septicemia and congenital conditions, not the bites. But the Madhya Pradesh Human Rights Commission has demanded answers, opposition leaders call it systemic negligence, and the state government has suspended staff and fined the pest control agency. For grieving families, accountability comes too late. China's Power Parade Marking 80 years since WWII, Xi Jinping unveiled a stunning display of military might in Beijing. From hypersonic Yingji missiles and DF-series ICBMs to stealth fighters, drones, and truck-mounted lasers, the showcase highlighted China's growing edge in numbers and technology. Analysts, though, caution that parade power doesn't equal battlefield experience—yet Beijing's message to rivals is unmistakable: it's preparing to outproduce and outpace them. Jaguar Land Rover Cyber Hit Luxury automaker JLR confirmed a cyberattack that forced global system shutdowns, disrupting production and retail. While no customer data breach is evident, the disruption adds to its troubles—delayed EV launches and trade headwinds. The attack highlights how UK firms remain prime targets for sophisticated hackers, raising fresh alarms on corporate cyber readiness. Putin Opens Door to Zelensky Talks In Beijing, Vladimir Putin said he's ready to meet Ukraine's Volodymyr Zelensky in Moscow—if talks are well-prepared. But he also warned Russia would continue fighting if diplomacy fails. With Trump pushing for a trilateral summit, both sides trade blame for delays. For now, Putin's remarks offer only a slim glimmer of dialogue amid the grinding war. GST Rate Reset Before Diwali Finance Minister Nirmala Sitharaman's GST Council has slashed rates on essentials—footwear and clothes up to ₹2,500 now fall under the 5% slab, doubling the earlier limit. Bigger reforms are coming: most 12% goods will drop to 5%, and many 28% items to 18%. Sin goods stay at 40%. The move ties back to PM Modi's “Diwali gift” promise—lighter bills for households, heavier worries for states losing tax revenue. Learn more about your ad choices. Visit megaphone.fm/adchoices
From the BBC World Service: A cyberattack has caused major production problems at carmaker Jaguar Land Rover. Both of its main factories in the U.K. have been affected, and it comes at a peak sales period. Plus, long-term government borrowing costs continue to climb globally. Then, police in Singapore have ordered Facebook's parent company, Meta, to take measures to prevent scammers from impersonating government officials. And, a greenhouse gas emissions tax in Denmark will result in big changes to the Danish landscape.
From the BBC World Service: A cyberattack has caused major production problems at carmaker Jaguar Land Rover. Both of its main factories in the U.K. have been affected, and it comes at a peak sales period. Plus, long-term government borrowing costs continue to climb globally. Then, police in Singapore have ordered Facebook's parent company, Meta, to take measures to prevent scammers from impersonating government officials. And, a greenhouse gas emissions tax in Denmark will result in big changes to the Danish landscape.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Cyberattacks aren't just about hackers in hoodies anymore. Today, we're up against professionalized, well-funded organizations that run like businesses. They use AI to crack defenses, run labs that simulate the tools we rely on, and rake in trillions while defenders struggle to keep pace. The scary part? Even the strongest companies and governments can fall behind when the threat landscape moves this fast. My guest, Evan Powell, has spent nearly 30 years in the cybersecurity world. He's the founder and CEO of Deep Tempo, and a serial entrepreneur who's helped industries from cloud data to resilience engineering make big transitions. Evan knows what it looks like when attackers have the upper hand, and he's seen firsthand how enterprises try to shift the balance. In this conversation, Evan explains why compliance checkboxes aren't enough, why raising the cost of an attack is often more realistic than stopping one outright, and how AI is reshaping both sides of the fight. He also shares the creative ways defenders are adapting, from honeypots to sock puppets, and the simple steps every one of us can take to make life harder for attackers. Show Notes: [00:57] Evan Powell introduces himself as founder and CEO of Deep Tempo, with nearly 30 years in cybersecurity and tech innovation. [02:39] He recalls a high-profile spearphishing case where the CIA director's AOL email and home router were compromised. [03:51] Attackers are professionalizing, running AI-powered labs, and making trillions while defenders spend billions and still fall behind. [07:06] Evan contrasts compliance-driven “checkbox security” with threat-informed defense that anticipates attacker behavior. [09:40] Enterprises deploy creative tactics like honeypots and sock puppet employees to study attackers in action. [12:22] Raising the cost of attack through stronger habits, better routers, and multi-factor authentication can make attacks less profitable. [15:01] Attackers are using AI to morph and simulate defenses, while defenders experiment with anomaly detection and adaptive models. [20:56] Evan explains why security vendors themselves can become attack vectors and why data should sometimes stay inside customer environments. [24:50] He draws parallels between fraud rings and cybercrime, where different groups handle exploits, ransomware, and money laundering. [26:29] The debate over “hacking back” raises legal and policy questions about whether enterprises should strike attackers directly. [30:18] Network providers struggle with whether they should act as firewalls to protect compromised consumer devices. [34:59] Data silos across 50+ vendors per enterprise create “Franken-stacks,” slowing real-time defense and collaboration. [37:28] AI agents may help unify security systems by querying across silos and tightening the OODA loop for faster response. [39:10] MITRE's ATT&CK framework and open-source collaboration are pushing the industry toward more shared knowledge. [41:05] Evan acknowledges burnout in cybersecurity roles but sees automation and better tools improving day-to-day work. [42:59] Final advice: corporations should rethink from first principles with data-centric solutions, and consumers must build protective habits like MFA and secret family phrases. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Evan Powell - DeepTempo Evan Powell - LinkedIn
This episode explores evolving digital threats, including the vulnerability of individuals in digital environments and the impact of cyberattacks on critical infrastructure, citing examples like the attacks on Sweden's national systems and the Oxford City Council. The conversation also addresses the risks of online shopping and social media as platforms for fraud, emphasizing the importance of digital literacy and protective tools. Furthermore, the program highlights the recognition of cybersecurity experts, celebrating Pablo Sanmeterio's award for his work in the field. Twitter: @ciberafterwork Instagram: @ciberafterwork Panda Security: https://www.pandasecurity.com/es/ +info: https://psaneme.com/ https://bitlifemedia.com/ https://www.vapasec.com/ VAPASEC https://www.vapasec.com/ https://www.vapasec.com/webprotection/
Dr Robert Seely MBE was a British Conservative Party politician who served as the Member of Parliament (MP) for the Isle of Wight from 2017 until the constituency was split in two in 2024. Seely is a former journalist and soldier. From 1990 to 1995, he worked as a foreign correspondent in the last year of the USSR and in post-Soviet states. From 2008 to 2017, he served in the British Armed Forces in the Iraq, Afghanistan, Libya and ISIS campaigns. Seely has been a research associate at the Changing Character of War Programme at the University of Oxford. Today we're going to be exploring his unique definition of Russian hybrid war, and highly impactful book: The New Total War: From Child Abduction to Cyber Attacks and Drones to Disinformation – Russia's Conflict with Ukraine and the West. ----------Partner on this video: KYIV OF MINE 'Kyiv of Mine' is a documentary series about Ukraine's beautiful capital, Kyiv. The film production began in 2018, and much has changed since then. It is now 2025, and this story is far from over.https://www.youtube.com/@UCz6UbVKfqutH-N7WXnC5Ykg https://www.kyivofmine.com/#theprojectKyiv of Mine is fast paced, beautifully filmed, humorous, fun, insightful, heartbreaking, moving, hopeful. The very antithesis in fact of a doom-laden and worthy wartime documentary. This is a work that is extraordinarily uplifting. My friend Operator Starsky says the film is “Made with so much love. The film series will make you laugh and cry.” ----------LINKS:https://www.amazon.co.uk/New-Total-War-Abduction-Disinformation/dp/1785909487https://x.com/IoWBobSeelyhttps://www.rusi.org/people/seelyhttps://en.wikipedia.org/wiki/Bob_Seelyhttps://www.linkedin.com/in/dr-robert-seely-mbe-10304468/?originalSubdomain=ukhttps://kclpure.kcl.ac.uk/portal/en/persons/bob-seely----------SILICON CURTAIN FILM FUNDRAISERA project to make a documentary film in Ukraine, to raise awareness of Ukraine's struggle and in supporting a team running aid convoys to Ukraine's front-line towns.https://buymeacoffee.com/siliconcurtain/extras----------SILICON CURTAIN LIVE EVENTS - FUNDRAISER CAMPAIGN Events in 2025 - Advocacy for a Ukrainian victory with Silicon Curtainhttps://buymeacoffee.com/siliconcurtain/extrasOur events of the first half of the year in Lviv, Kyiv and Odesa were a huge success. Now we need to maintain this momentum, and change the tide towards a Ukrainian victory. The Silicon Curtain Roadshow is an ambitious campaign to run a minimum of 12 events in 2025, and potentially many more. Any support you can provide for the fundraising campaign would be gratefully appreciated. https://buymeacoffee.com/siliconcurtain/extrasWe need to scale up our support for Ukraine, and these events are designed to have a major impact. Your support in making it happen is greatly appreciated. All events will be recorded professionally and published for free on the Silicon Curtain channel. Where possible, we will also live-stream events.https://buymeacoffee.com/siliconcurtain/extras----------SUPPORT THE CHANNEL:https://www.buymeacoffee.com/siliconcurtainhttps://www.patreon.com/siliconcurtain----------TRUSTED CHARITIES ON THE GROUND:Save Ukrainehttps://www.saveukraineua.org/Superhumans - Hospital for war traumashttps://superhumans.com/en/UNBROKEN - Treatment. Prosthesis. Rehabilitation for Ukrainians in Ukrainehttps://unbroken.org.ua/Come Back Alivehttps://savelife.in.ua/en/Chefs For Ukraine - World Central Kitchenhttps://wck.org/relief/activation-chefs-for-ukraineUNITED24 - An initiative of President Zelenskyyhttps://u24.gov.ua/Serhiy Prytula Charity Foundationhttps://prytulafoundation.orgNGO “Herojam Slava”https://heroiamslava.org/kharpp - Reconstruction project supporting communities in Kharkiv and Przemyślhttps://kharpp.com/NOR DOG Animal Rescuehttps://www.nor-dog.org/home/----------
LegalPwn technique hides LLMs prompts inside contract legalese Maryland Transit investigating cyberattack Hacker attempts to forge his way into Spanish university Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO. Find the stories behind the headlines at CISOseries.com.
In this week's Talking Tech, Poppy explains how Jaguar Land Rover's cyberattack shows how even major firms are vulnerable, with SMEs at even greater risk due to weaker defences. Beyond disruption, attacks can trigger lost sales, reputational damage, and financial strain - making cybersecurity a board-level priority for resilience and growth.
As the week wraps up, the fallout from the cyberattack that downed state government systems from Medicaid to the DMV continues to impact Nevadans — so why didn't Governor Lombardo show up at the first press briefing about it, and did his appearance yesterday give us any more answers? Co-hosts Sarah Lohman and Dayvid Figler chat with Nevada Current editor April Corbin Girnus about the political implications of the attack, as well as why plans for the new airport by Jean are facing criticism from environmentalists, and whether the A's upcoming six-game stint at the Las Vegas Ballpark makes us feel more or less hopeful about their arrival. If you need an update on the restoration of government services call 2-1-1 or go to oem.nv.gov/recovery. Learn more about the sponsors of this August 29th episode: Woven Want to get in touch? Follow us @CityCastVegas on Instagram, or email us at lasvegas@citycast.fm. You can also call or text us at 702-514-0719. For more Las Vegas news, make sure to sign up for our morning newsletter, Hey Las Vegas. Learn more about becoming a City Cast Las Vegas Neighbor at membership.citycast.fm. Looking to advertise on City Cast Las Vegas? Check out our options for podcast and newsletter ads at citycast.fm/advertise.
Can we build technology today to defend against the threats of tomorrow? This week, Technology Now concludes a double episode on post quantum cryptography and explores the subject of firmware, why it's imperative that it be protected against quantum attacks and why a simple update can't solve every problem. Nigel Edwards, Director of the Security Lab at HPE Labs, tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations.About Nigel: https://www.linkedin.com/in/nigel-edwards-170591/?originalSubdomain=ukSources: https://www.theatlantic.com/technology/archive/2016/01/the-long-and-winding-history-of-encryption/423726/https://www.theqrl.org/blog/history-of-cryptography-behind-the-code-episode-1/https://www.theguardian.com/science/2025/may/07/todays-ai-can-crack-second-world-war-enigma-code-in-short-order-experts-say
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Tech commentator Tony Grasso joins Kathryn to talk about the big news in the cyber-crime world.
Why do quantum computers pose a threat to governments? This week Technology Now starts a two part dive into quantum computing. In this first episode, we ask: how are governments preparing to mitigate the threat posed by a hypothetical quantum computer which could be invented. Ken Rich, Federal CTO at HPE tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations.About Ken Rich:https://www.linkedin.com/in/kenrich111/Sources:https://www.ncsc.gov.uk/whitepaper/next-steps-preparing-for-post-quantum-cryptographyhttps://www.britannica.com/technology/quantum-computerhttps://www.livescience.com/technology/computing/history-of-quantum-computing-key-moments-that-shaped-the-future-of-computingShor, Peter W.. “Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer.” SIAM Rev. 41 (1995): 303-332.P. W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring," Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 1994, pp. 124-134, doi: 10.1109/SFCS.1994.365700.https://www.newscientist.com/article/2399246-record-breaking-quantum-computer-has-more-than-1000-qubits/
Data alone does not persuade. For data-driven leaders, learning totranslate numbers into a compelling narrative is a critical skill. In thisepisode of Unspoken Security, host AJ Nash speaks with Salvatore Manzi, aleadership communications coach, about the strategies technical leaderscan use to create influence. Salvatore explains why leaders must learn tomake meaning over metrics to connect with teams, stakeholders, andcustomers.Salvatore shares practical frameworks to improve communication. Heintroduces the "You then me" principle, which prioritizes acknowledging the other person's view to build rapport. He also shows how using simplemetaphors and a little appreciation can make complex dataunderstandable. These techniques disarm a room before you need tocorrect someone or present a counter-argument, ensuring your message lands effectively.The conversation also covers imposter syndrome and the uniquecommunication hurdles women face in the tech industry. AJ and Salvatorediscuss the power of authenticity and the need for allies who activelyamplify other voices. They explore how simple shifts in body language andmindset can build the confidence needed to overcome these challenges and ensure your voice is heard.Send us a textSupport the show
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — The gif that keeps on giffing01:46 - Cyberattack Bricks Speed Cameras – BHIS - Talkin' Bout [infosec] News 2025-08-1802:39 - Story # 1: Perplexity made a sky-high $34.5 billion bid for Google Chrome — a bold and unusual move in the midst of antitrust scrutiny07:16 - Story # 2: Exclusive: US embeds trackers in AI chip shipments to catch diversions to China, sources say10:22 - Story # 3: How we found TeaOnHer spilling users' driver's licenses in less than 10 minutes12:17 - Story # 4: Cisco discloses maximum-severity defect in firewall software13:56 - Story # 5: Data Dump From APT Actor Yields Clues to Attacker Capabilities19:13 - Story # 6: Russian cyberattack in the Netherlands leaves speed cameras offline indefinitely23:30 - Story # 7: HTTP/2 MadeYouReset Vulnerability Enables Massive DDoS Attacks24:51 - Story # 8: LAPD Eyes ‘GeoSpy', an AI Tool That Can Geolocate Photos in Seconds29:05 - Story # 9: Manpower discloses data breach affecting nearly 145,000 people34:51 - Story # 10: Hacker Offers to Sell 15.8 Million Plain-Text PayPal Credentials On Dark Web Forum35:34 - Story # 11: The First Federal Cybersecurity Disaster of Trump 2.0 Has Arrived40:54 - Story # 12: New Clever Phishing Attack Uses Japanese Character “ん” to Mimic Forward Slash “/”46:28 - Story # 13: Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild48:13 - Story # 14: Plex warns users to patch security vulnerability immediately50:53 - ChickenSec: Noble Foods using soil mapping technology at organic egg farm
The next wave of cyberattacks won't be launched by humans alone, and neither will the defense. As Distributed Denial-of-Service (DDoS) attacks grow in scale and frequency, machine learning and large language models (LLMs) are stepping into the front lines. But how effective are they? What trade-offs exist between accuracy, speed, and risk? And how close are we to autonomous defense systems? In this episode, Steve Prentice speaks with Johnathan Azaria, machine learning platform lead at Thales, who offers a rare behind-the-scenes look at how AI is being used today, and what's coming next.
Cyberattacks are on the rise, with retail, banking, and airline industries all targeted in recent months. The cost to the economy is huge and thought to be worth billions of dollars. As businesses scramble to stay secure, we investigate the ransomware gangs behind the breaches and the experts working to stop them. If you'd like to get in touch with the programme, please email us at businessdaily@bbc.co.ukPresenter: Sam Gruet Producer: Megan Lawton(Picture: Back of hacker sitting in front of some computer screens. Credit: Getty Images)
Cisco warns of maximum-severity defect in firewall software UK's Colt Telecom suffers cyberattack CISA implores OT environments to lock down critical infrastructure Huge thanks to our sponsor, Conveyor Have you been personally victimized by portal security questionnaires? Conveyor is here to help. Endless clicks, bad navigation, and expanding questions stacked like Russian nesting dolls, all add up to hours of your life you'll never get back. With Conveyor's AI-powered browser extension, you can open a portal questionnaire, scan for questions, and watch it auto-populate your answers back into the portal without the copy and paste. See how at www.conveyor.com Find the stories behind the headlines at CISOseries.com.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
At Black Hat USA 2025, Sean Martin, co-founder of ITSPmagazine, sat down with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, to discuss the findings from the company's latest ransomware report. Over the past five years, the research has tracked how attack patterns, targets, and business models have shifted—most notably from file encryption to data theft and extortion.Brett explains that many ransomware groups now find it more profitable—and less risky—to steal sensitive data and threaten to leak it unless paid, rather than encrypt files and disrupt operations. This change also allows attackers to stay out of the headlines and avoid immediate law enforcement pressure, while still extracting massive payouts. One case saw a Fortune 50 company pay $75 million to prevent the leak of 100 terabytes of sensitive medical data—without a single file being encrypted.The report highlights variation in attacker methods. Some groups focus on single large targets; others, like the group “LOP,” exploit vulnerabilities in widely used file transfer applications, making supply chain compromise a preferred tactic. Once inside, attackers validate their claims by providing file trees and sample data—proving the theft is real.Certain industries remain disproportionately affected. Healthcare, manufacturing, and technology are perennial top targets, with oil and gas seeing a sharp increase this year. Many victims operate with legacy systems, slow to adopt modern security measures, making them vulnerable. Geographically, the U.S. continues to be hit hardest, accounting for roughly half of all observed ransomware incidents.The conversation also addresses why organizations fail to detect such massive data theft—sometimes hundreds of gigabytes per day over weeks. Poor monitoring, limited security staffing, and alert fatigue all contribute. Brett emphasizes that reducing exposure starts with eliminating unnecessary internet-facing services and embracing zero trust architectures to prevent lateral movement.The ransomware report serves not just as a data source but as a practical guide. By mapping observed attacker behaviors to defensive strategies, organizations can better identify and close their most dangerous gaps—before becoming another statistic in next year's findings.Learn more about Zscaler: https://itspm.ag/zscaler-327152Note: This story contains promotional content. Learn more.Guest:Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, | On LinkedIn: https://www.linkedin.com/in/brett-stone-gross/ResourcesLearn more and catch more stories from Zscaler: https://www.itspmagazine.com/directory/zscalerLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-storyKeywords: sean martin, brett stone-gross, ransomware, data extortion, cyber attacks, zero trust security, threat intelligence, data breach, cyber defense, network security, file transfer vulnerability, data protection, black hat, black hat usa 2025, zscaler
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
The hits just keep on coming Where's the Little Dutch Boy when you need him? I felt the ransomware down in Africa Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines Find the stories behind the headlines at CISOseries.com
Singapore is experiencing an increase in cyber threats, and its critical infrastructure was targeted in a cyber attack. We speak to the country's Commissioner of Cybersecurity.Also in Tech Life this week: we hear the real voice of a fake spokesperson for a synthetic band. And presenter Zoe Kleinman has a mini tech adventure involving social media and a metal detectorist.You can contact us by emailing techlife@bbc.co.uk or send us a Whatsapp message or voice memo on +44 330 1230 320. Please include your name and where you live.Presenter: Zoe Kleinman Producer: Tom Quinn Editor: Monica SorianoImage: Hands are held over a computer keyboard as screens display computer data. Credit: Getty Images.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Cyberattacks are happening every 40 seconds in the U.S.—and real estate investors are becoming prime targets. From wire fraud to ransomware, these scams can drain six-figure sums without warning, often before victims even realize they've been hit. Jeremiah Baker is an ethical hacker with 17 years of experience breaking into systems before the bad guys do. He's been called in after major wire transfers vanish without a trace, sits on Stanford's cybersecurity advisory board, and has inspired TV shows like Homeland and Burn Notice with his work. In this episode, Jeremiah reveals how cybercriminals are targeting real estate investors today—and what you need to do right now to avoid becoming their next victim. Find out more: https://confessionsofahacker.com https://www.linkedin.com/in/jeremiahbaker ---------- Today's episode is brought to you by Green Property Management, managing everything from single family homes to apartment complexes in the West Michigan area. https://www.livegreenlocal.com And RCB & Associates, helping Michigan-based real estate investors and small business owners navigate the complex world of health insurance and Medicare benefits. https://www.rcbassociatesllc.com
The city of St. Paul expects to begin putting its systems back online this week, after a cyberattack forced it to shut down its network for more than two weeks. St. Paul officials said Saturday night that the attack was a ransomware attack, adding that they've refused to pay the ransom and haven't found evidence of data theft. Minnesota state government took in less revenue than it was expecting in July — the first time that's happened since January.This is an MPR News Evening update, hosted by Elena See. Theme music is by Gary Meister. Subscribe on Apple Podcasts, Spotify, YouTube or RSS.
A prisoner attacked a corrections officer at a state prison in Rush City over the weekend. Corrections officials say an inmate stabbed an officer with a homemade knife. The guard suffered a puncture wound and was taken to a hospital with non-life-threatening injuries and was treated and released. The inmate is serving a life sentence for murder and has been transferred to a maximum security prison.The City of St. Paul has released details about a cyberattack that began more than two weeks ago. The city shut down its computer network, which included internet access at libraries, as a preventative measure.Some state lawmakers are vowing to drop political dialogue that could incite violence. A committee updating statewide K-12 health education standards is moving forward with revisions. More than 3,000 people attended CannaCon over the weekend, a cannabis convention in St. Paul with vendors looking to enter Minnesota's new cannabis market. The Minnesota Department of Natural Resources' spring waterfowl population count is in. The count was mixed: some species increased in numbers, others fell. The state's population of blue-winged teal dropped 60 percent from a year ago, likely due to drought conditions in the southern part of the state.
In today's episode of Cybersecurity Today, host David Shipley covers critical updates on recent cyber attacks and breaches impacting the US Federal judiciary's case management systems, and SonicWall firewall compromises. He also discusses researchers' new jailbreak method against GPT-5, which bypasses ethical guardrails to produce harmful instructions. Shipley shares insights and standout sessions from Hacker Summer Camp 2025, including BSides Las Vegas, the I Am the Cavalry track, and Defcon, highlighting ongoing efforts and challenges in the cybersecurity landscape. Stay informed, stay secure, and join the conversation in this detailed overview of current cybersecurity issues and innovations. 00:00 Introduction and Headlines 00:31 US Federal Judiciary Cyber Attack 02:29 SonicWall Ransomware Attacks 04:14 AI Jailbreak Techniques 07:44 Hacker Summer Camp 2025 Highlights 08:10 BSides Las Vegas and Community Insights 09:29 Healthcare Cybersecurity and Crash Cart Project 12:11 Defcon Reflections and Final Thoughts 13:45 Conclusion and Listener Engagement
The U.S. judiciary announced plans to increase security for sensitive information on its case management system following what it described as “recent escalated cyberattacks of a sophisticated and persistent nature.” In a Thursday statement, the federal judiciary said it's “taking additional steps to strengthen protections for” that information. It also said its “further enhancing security of the system and to block future attacks, and it is prioritizing working with courts to mitigate the impact on litigants.” The statement from the third branch comes one day after a Politico report revealed that its case filing system had recently been breached. That report cited unnamed sources who were concerned that the identities of confidential court informants may have been compromised. While the federal courts' statement acknowledged a recent escalation in cyberattacks on its case management system, it didn't confirm details of the reported breach. In response to a FedScoop request for additional information about the reported attack, a spokesman for the Administrative Office of the U.S. Courts declined to comment and pointed back to the statement. The reported hack and statement come after a cyberbreach of the same system in 2020. In early 2021, during a hack of SolarWinds' Orion products, the federal courts disclosed that it found “apparent compromise” of the Case Management/Electronic Case Files system (CM/ECF) and was investigating the matter. Its statement after that breach similarly indicated that “federal courts are immediately adding new security procedures to protect highly sensitive confidential documents filed with the courts.” Jamie Holcombe is joining Maryland-based technology company US AI after wrapping up roughly six-and-a-half years as the chief information officer of the U.S. Patent and Trademark Office. Holcombe, who served as both CIO and chief AI officer at USPTO, will be vice president of the AI firm, with a focus on scaling its technology throughout the federal government, according to a Thursday announcement from US AI shared with FedScoop. Holcombe's last day at the agency was Wednesday, according to a USPTO spokeswoman. Deborah Stephens, deputy CIO for the agency, will serve as acting CIO. At USPTO, Holcombe oversaw “one of the federal government's largest IT transformations,” per the announcement. That work included leading the agency's transition to a cloud-first environment and the launch of its AI Lab, where USPTO can test use cases. As part of his new role, Holcombe will work to expand US AI's Intelligent Computing Platform, which is aimed at accelerating the adoption of AI in sectors that are highly regulated, across government. He will also lead the company's strategy to align its technology with its use in public sector and regulated areas, scaling codeless and zero-trust tools, and build on the company's “values of clarity, security, and accessibility in AI deployment.” The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on Apple Podcasts, Soundcloud, Spotify and YouTube.
In this episode of Tank Talks, we're joined by Michelle Zatlyn, Co-founder, Co-chair, and President of Cloudflare, a company protecting and powering a major part of global internet traffic. Cloudflare helps businesses stay online, load faster, and block threats before they reach the door.Michelle explains how growing up in Saskatchewan shaped her views on leadership and teamwork, and how that experience still guides her as Cloudflare scales. She shares how a hallway conversation at Harvard became the starting point for the business, how they raised their first round of funding without a product, and why they moved to Silicon Valley during a downturn with no connections.She talks through the pressure of going public, the spike in traffic when COVID hit, and how the team responded when customers suddenly needed help keeping their services running. She also walks through Cloudflare's new AI crawler model, how it gives content owners more control, and why a new business model for the web is overdue.From managing billions of attacks a day to helping publishers keep their content protected, Cloudflare shows what it means to stay reliable when the stakes are high, and Michelle makes it clear that good infrastructure only works if people trust it.We explore:* How do you raise money with no product, no revenue, and no connections?* What happens when a hallway idea becomes core infrastructure for the internet?* What changes when your company goes public six months before a global crisis?* Can creators control how AI models use their content?* What can founders do to make their teams more inclusive without making it performative?* Why $100M-to-$1B is more fun than $0-to-$100MThe Canadian Roots and Early Values of a Tech Founder (00:02:36)* Growing up in Prince Albert, Saskatchewan* How cold winters and community spirit shaped her leadership* From science nerd to Silicon Valley co-founderWhy She Left Medicine for Business (00:06:49)* How a summer research job made her rethink med school* Falling into tech through work in Toronto* Applying to Harvard without knowing how to pay for it* The support from Canadian alumni that made it possibleThe Hallway Conversation That Sparked Cloudflare (00:10:50)* A casual remark turns into a business idea* How she and Matthew Prince turned Project Honeypot into a startup* Using their .edu emails to get early help and access* Getting credit for the project instead of taking another classRaising Money With No Traction (00:20:34)* Moving to Silicon Valley in a U-Haul with no connections* Pitching investors with nothing built* Getting $2M on a $4M pre-money valuation* Why the Valley still bets on early-stage founders with clear ideasHiring, Scaling, and Keeping a Startup Culture (00:24:52)* Going from 20 people to over 4,500* Why they still focus on shipping and momentum* How ownership and trust make the difference* Running fast without losing focusGoing Public, Then COVID Hit (00:28:00)* Why they went public when they did* Customers who once said no came running back* What changed when traffic spiked overnight* How customer demand and product pressure collided* Working through the crisis while remote* What Cloudflare learned under fireCloudflare's AI Crawler Controls (00:40:04)* What's happening with AI scraping content* Why Cloudflare built a way to block or license crawlers* The impact on small content creators* How this fits into wider changes to how the web worksDDoS Attacks and Online Threats (00:48:06)* Stopping 190 billion attacks per day* The evolution of DDoS threats in 2025* Why using modern security tools is non-negotiableMichelle's Vision for the Next 15 Years (00:51:18)* Cloudflare as generational infrastructure* Building the most trusted connectivity cloud* Why Internet infrastructure is as vital as plumbingChampioning Women & Diversity in Tech (00:53:27)* Leading by example* Small asks, big impact: improving referral pipelines* Creating space for underrepresented founders and talentCloudflare has grown into critical internet infrastructure, but Michelle talks about it like a work in progress. The problems are large, but they stay focused on solving them one at a time. Her view is practical: strong teams, clear goals, and ongoing effort.About Michelle ZatlynCo-founder, Co-chair & President of CloudflareOne of the most influential leaders in Internet infrastructure, Michelle is a Canadian-born tech executive known for building and scaling Cloudflare into a global powerhouse. A champion for cybersecurity, innovation, and women in tech, she brings passion and grit to every conversation.Connect with Michelle Zatlyn on LinkedIn: https://www.linkedin.com/in/michellezatlyn/Visit Cloudflare Website: https://www.cloudflare.com/Connect with Matt Cohen on LinkedIn: https://ca.linkedin.com/in/matt-cohen1Visit the Ripple Ventures website: https://www.rippleventures.com/ This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit tanktalks.substack.com
In this episode, host Jim Love explores a variety of pressing cybersecurity threats and developments. The episode begins with an invitation for listeners to share their summer reading choices. The main content highlights include North Korean operatives infiltrating US companies through fake identities and AI-generated resumes, the ability of large language models to autonomously execute cyber attacks, a vulnerability in the AI-powered code editor Cursor allowing silent RCE attacks, and the rise of malicious Progressive Web Apps targeting mobile users. The show also discusses the risks associated with clicking unsubscribe links in spam emails. Listeners are encouraged to support the show and contribute through the website. 00:00 Introduction and Summer Reading Request 00:59 North Korean Spies in US Tech Firms 03:25 AI's Role in Cyber Attacks 05:18 Critical Vulnerability in AI Code Editor 07:36 Malicious Mobile Browser Hijacks 09:30 Unsubscribe Links as Phishing Traps 10:50 Conclusion and Listener Engagement
Watch The X22 Report On Video No videos found (function(w,d,s,i){w.ldAdInit=w.ldAdInit||[];w.ldAdInit.push({slot:17532056201798502,size:[0, 0],id:"ld-9437-3289"});if(!d.getElementById(i)){var j=d.createElement(s),p=d.getElementsByTagName(s)[0];j.async=true;j.src="https://cdn2.decide.dev/_js/ajs.js";j.id=i;p.parentNode.insertBefore(j,p);}})(window,document,"script","ld-ajs");pt> Click On Picture To See Larger Picture Countries limited their CO2 production to save the planet, all they did was. shift everything to China, Trump is now shutting down Obama's climate programs. Trump's economy explodes and the D's/fake news/Fed don't know how to counter the narrative, they tried but it failing. Trump is dividing the Fed and setting everything up for the new economy. Hawaii was going to get hit with a Tsunami because of a major earthquake. Did Trump post Tsunami to let us know that a massive amount of info is going to be dropped? Different countries and the US have have been hit by a cyber attack. The fake news/D's are trying their best to spin the Russia evidence and they are losing to the facts. Did Trump trap Obama with Presidential immunity? Economy https://twitter.com/Geiger_Capital/status/1950545248825798729 Trump Axes Obama's Endangerment Finding During his two terms, Obama enacted several policies that subsidized uncompetitive, unneeded, and unwanted green energy while placing onerous regulations on fossil fuels. During his first term, Trump tried to reverse much of the Obama administration's anti-fossil fuel actions. However, there was only so much that could be done given the constant distractions Trump faced throughout his first term. One of the most consequential environmental regulations that Trump was unable to eliminate was Obama's “Endangerment Finding.” Most Americans have probably never heard of the Endangerment Finding. But this obscure rule has effectively allowed the federal government to label carbon dioxide a harmful “pollutant” that can be regulated under the Clean Air Act. Unfortunately, a U.S. Supreme Court decision allowed the Obama administration to enact the rule in the first place. In 2007, the U.S. Supreme Court ruled in Massachusetts v. EPA that “greenhouse gases are air pollutants covered by the Clean Air Act and that EPA must determine whether or not emissions of greenhouse gases from new motor vehicles cause or contribute to air pollution which may reasonably be anticipated to endanger public health or welfare.” Although this is the standard reading of the ruling, it is not totally accurate. According to the majority opinion, written by former Justice John Paul Stevens, “We need not and do not reach the question whether on remand EPA must make an endangerment finding, or whether policy concerns can inform EPA's actions in the event that it makes such a finding. We hold only that EPA must ground its reasons for action or inaction in the statute.” So, the 2007 decision did not determine that carbon dioxide is a harmful air pollutant. Rather, it granted that the EPA has the authority to determine if carbon dioxide is a harmful greenhouse gas based solely upon unequivocal data. Trump's EPA Administrator, Lee Zeldin, has made rescinding the Endangerment Finding a priority. “A lot of people are out there listening, they might not know what the endangerment finding is. If you ask congressional Democrats to describe what it is, the left would say that it means that carbon dioxide is a pollutant, carbon dioxide is an endangerment to human health. They might say methane is a pollutant, methane is an endangerment to human health,” Zeldin said on the Ruthless podcast. “That's an oversimplified, I would say inaccurate way to describe it,” Zeldin added. “The Obama administration said that carbon dioxide, when mixed with a bunch of other well-mixed gases, greenhouse gases, that it contributes to climate change. How much?
In this edition of The Naked Scientists, how is science helping to shape the future of warfare? Like this podcast? Please help us by supporting the Naked Scientists
The How of Business - How to start, run & grow a small business.
Cybersecurity expert Nick Mullen shares how you can protect your business from cyber attacks. Small businesses are often the target for today's most dangerous cyber threats. Show Notes Page: https://www.thehowofbusiness.com/575-nick-mullen-cyber-security/ Cyberattacks are no longer just a threat to large corporations - small business owners are now the most frequent and most vulnerable targets. In this episode of The How of Business, Henry Lopez speaks with cybersecurity expert and Entoo Security founder Nick Mullen about how you can protect your business from cyber attacks using clear, practical, and affordable strategies. Nick breaks down the modern cyber threat landscape, including: Ransomware and extortion scams AI-powered phishing emails and voice impersonations The myth of "I'm too small to be a target" The importance of email access controls and proper backups They also explore the FTC Safeguards Rule, which now applies to many more small businesses, and what it means to be compliant. Nick emphasizes the importance of understanding where your data lives, limiting who can access it, and training your team to spot threats before they cause damage. “You might think you're too small to be a target, but $50,000 is a huge payday for a criminal overseas—and they can attack thousands of small businesses every day,” Nick warns. Whether you run a solo business or have a growing team, this episode will give you the clarity and steps you need to protect what you've worked so hard to build. Nick Mullen is the founder of N2 Security, a full-service cybersecurity firm helping small businesses including accountants, bookkeepers, and service providers meet compliance standards and avoid devastating cyberattacks. He has nearly two decades of experience in security, compliance, and governance. This episode is hosted by Henry Lopez. The How of Business podcast focuses on helping you start, run, grow and exit your small business. The How of Business is a top-rated podcast for small business owners and entrepreneurs. Find the best podcast, small business coaching, resources and trusted service partners for small business owners and entrepreneurs at our website https://TheHowOfBusiness.com