Attack on a computer system
POPULARITY
Categories
AP correspondent Charles de Ledesma reports a suspected cyberattack has had major impact on France's postal network just days before Christmas.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
In this episode of "The Free Lawyer" podcast, host Gary interviews Valentina Flores, CEO of Red Sentry. Valentina shares her journey from law enforcement to leading a proactive cybersecurity company, emphasizing the importance of ethical hacking and prevention for law firms. She offers practical tips—like enabling multi-factor authentication, limiting data access, and preparing response plans—to help lawyers protect sensitive information. Valentina also discusses the collaborative nature of cybersecurity, the human element in defense, and aligning security practices with core values, making cybersecurity accessible and actionable for legal professionals.Valentina Flores is the CEO and Co-Founder of Red Sentry, a proactive cybersecurity company that breaks into your network, so hackers never get the chance. Before protecting companies, she served as a detective on joint federal task forces, tracking cybercriminals through digital back-alleys. Now a public speaker on hacker psychology, a two-time award-winning cybersecurity leader, and a fierce advocate for women in tech, Valentina is redefining what leadership looks like in the industry, championing smarter and more accessible security for all.Transition from Detective to Cybersecurity (00:01:33) What is Penetration Testing? (00:02:56) Success Rate and Client Vulnerabilities (00:03:35)Understanding Hacker Psychology (00:05:30) Why Law Firms Are Targets (00:06:38) Triggers for Law Firms to Seek Help (00:07:46) Compliance vs. Proactive Security (00:09:09) Human Element in Cybersecurity (00:10:16) Making Clients Comfortable with Ethical Hacking (00:11:55) Emerging Threats and the Future of Cybersecurity (00:13:25) Cybersecurity for Small and Medium Businesses (00:14:43) Diversity in Tech and Cognitive Diversity (00:16:37) Awards and People-First Leadership (00:17:27) Leadership in Cybersecurity vs. Traditional Business (00:18:20) Role of Coaching and Mentorship (00:19:28) Annual Testing and Follow-Up (00:20:21) Prioritizing Cybersecurity in Law Firms (00:21:13) Collaboration vs. Competition in Cybersecurity (00:22:17) Top Three Cybersecurity Actions for Lawyers (00:23:29) First Steps for the Unprepared (00:25:39) What is Penetration Testing? (Clarification) (00:26:39) Freedom and Work-Life Balance (00:27:06) Aligning Practice with Values (00:27:51) You can find The Free Lawyer Assessment here- https://www.garymiles.net/the-free-lawyer-assessmentWould you like to learn what it looks like to become a truly Free Lawyer? You can schedule a complimentary call here: https://calendly.com/garymiles-successcoach/one-one-discovery-callWould you like to learn more about Breaking Free or order your copy? https://www.garymiles.net/break-free
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Japanese office supplies retailer Askul Corp. said that a ransomware cyberattack discovered in October led to the leakage of about 740,000 sets of data concerning its individual customers, corporate clients and employees.
Support a coffee company that supports America and American values! Go to www.blackoutcoffee.com/Graham Use Code Graham for 20% off your first order Text Graham to 989898 now to recieve a 25 page info kit from Birch Gold. Free silver with purchased till 22 Dec Protect your devices from Cyberattacks! Go to www.webroot.com/graham Get 60% off now! Socials: Twitter: www.twitter.com/grahamallen_1 FB: www.facebook.com/grahamallenofficial IG: www.instagram.com/grahamallen1 Tiktok: www.tiktok.com/@thegrahamallen Rumble: www.rumble.com/user/grahamallenofficial
In this episode of Unspoken Security, host AJ Nash sits down with Zoë Rose, SecOps Manager at Canon EMEA. They explore the real-world barriers to building effective incident response programs and discuss why so many organizations struggle to move beyond reactive firefighting.Zoë shares her perspective from both consulting and in-house roles, pointing out that most incident response teams are overwhelmed, under-resourced, and stuck dealing with basics that never get fixed. She explains why expensive tools and new technology often miss the mark when organizations skip foundational work—like asset inventories, clear policies, and tuned alerts. Zoë urges listeners to focus on practical steps, such as documenting processes, improving communication, and building trust between technical teams and business leaders.Throughout the conversation, Zoë breaks down how real change happens: by investing in people, closing skills gaps, and fostering a culture where mistakes drive learning instead of blame. The episode ends with a reminder that effective security is not about quick fixes or flashy tools, but about honest assessment, teamwork, and steady improvement.Send us a textSupport the show
How cyber criminals are weaponising AI to defeat your threat detection and responseBeyond encryption – how ransomware has evolved to include data exfiltration, publication threats and supply chain compromiseHow geopolitical tensions are increasing nation-sponsored cyber-campaigns - proxy attacks, IT worker scams and supply chain risksThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Ed Tucker, Director - Cyber Security Practice, Telefornica Techhttps://www.linkedin.com/in/tuckeredward/Neil King, IT Security Professional, Canonhttps://www.linkedin.com/in/neilking/Christine Bejerasco, CISO, WithSecure Intelligencehttps://www.linkedin.com/in/christinebejerasco/
This Day in Legal History: Gregory v. ChicagoOn this day in legal history, December 10, 1968, the U.S. Supreme Court heard oral arguments in Gregory v. City of Chicago, a case involving the arrest of civil rights demonstrators under a local disorderly conduct ordinance. The demonstrators, led by comedian and activist Dick Gregory, had peacefully marched from Chicago's City Hall to the home of Mayor Richard J. Daley to protest school segregation. Though the march itself remained nonviolent, an unruly crowd of onlookers gathered, prompting police to demand that the demonstrators disperse. When they refused, Gregory and others were arrested and later convicted of disorderly conduct.The key legal issue before the Court was whether the demonstrators' First Amendment rights had been violated when they were punished for the hostile reactions of bystanders. In a per curiam opinion issued the following year, the Court reversed the convictions, holding that the peaceful demonstrators could not be held criminally liable for the disruptive behavior of others. Justice Black, concurring, emphasized that the First Amendment protects peaceful expression even in the face of public opposition or discomfort.The case is a critical reaffirmation of the “heckler's veto” doctrine — the principle that the government cannot suppress speech simply because it provokes a hostile reaction. It underscored the constitutional duty to protect unpopular or provocative speech, especially in the context of civil rights protests. The Court's decision also reinforced the due process requirement that criminal statutes must be applied in a way that is not arbitrary or overbroad.Gregory v. City of Chicago remains a foundational case in First Amendment jurisprudence and protest law, balancing public order concerns against the fundamental rights of assembly and expression.The Trump administration's proposed repeal of the Endangered Species Act (ESA) definition of “harm” could significantly weaken protections for imperiled species in federally managed forests, particularly in the Pacific Northwest. The change would limit the ESA's scope to cover only direct physical injury to species, excluding habitat destruction from regulation. Environmental groups argue this could devastate species like the northern spotted owl and marbled murrelet, both of which depend on old-growth forests increasingly targeted for logging under recent federal mandates. Legal experts warn that without habitat protections, ESA enforcement becomes largely ineffective, as species cannot survive without suitable environments. The rollback is expected to reduce permitting requirements for developers and extractive industries, a move welcomed by business groups but opposed by conservationists.The U.S. Fish and Wildlife Service initially defined “harm” in 1981 to include habitat degradation, but now argues that interpretation overextends the ESA's intent. Logging has already surged in owl and murrelet habitats, especially in Oregon, with timber sales up 20% in 2025. Population declines among spotted owls—down 70% since 1990—are linked to habitat loss and competition from invasive barred owls. Critics of the repeal emphasize that previous conservation plans, like the 1994 Northwest Forest Plan, successfully slowed species decline by curbing old-growth logging. Industry groups argue the ESA has been “weaponized” to block necessary forest management and wildfire prevention. Meanwhile, lawsuits are brewing on both sides: environmentalists are expected to challenge the rollback, while timber interests seek to overturn broader habitat protections.Trump's Changes to What Harms Species Adds Risk in Logging AreasThe U.S. Supreme Court is preparing to hear a case involving Joseph Clifton Smith, an Alabama death row inmate whose death sentence was overturned after a federal court found him intellectually disabled. The dispute centers on how courts should interpret multiple IQ scores and other evidence when determining whether someone meets the legal criteria for intellectual disability. This analysis is critical because, in 2002's Atkins v. Virginia, the Supreme Court held that executing individuals with intellectual disabilities violates the Eighth Amendment's ban on cruel and unusual punishment.Smith, now 55, was sentenced to death for the 1997 killing of Durk Van Dam during a robbery. His IQ scores have ranged from 72 to 78, but the lower court applied the standard margin of error, concluding his true score could fall below 70. The court also found substantial, lifelong deficits in adaptive functioning, including challenges in social skills, independent living, and academics. These findings led the 11th U.S. Circuit Court of Appeals to uphold the decision to set aside his death sentence.Alabama officials argue the courts erred by evaluating Smith's IQ scores collectively rather than individually. The Supreme Court previously asked the 11th Circuit to clarify its reasoning, and the court responded that it used a holistic approach, incorporating expert testimony and broader evidence of disability. Now back before the Supreme Court, the case could refine or reshape how courts nationwide assess intellectual disability in capital cases. A ruling is expected by June.US Supreme Court to weigh death row inmate's intellectual disability ruling | ReutersJack Smith, the former special counsel who led federal prosecutions against Donald Trump, is launching a new law firm alongside three other high-profile former prosecutors: Tim Heaphy, David Harbach, and Thomas Windom. All four attorneys have extensive backgrounds in public service and were involved in major investigations into Trump's efforts to overturn the 2020 election and mishandling of classified documents. The new firm, expected to begin operations in January, will offer full-service legal work, including litigation and investigations, with a mission rooted in integrity and zealous advocacy.Heaphy, who previously served as the lead investigator for the House committee probing the January 6th Capitol attack, is leaving his position at Willkie Farr & Gallagher to help found the firm. That firm had drawn criticism for its dealings with Trump but has defended its actions. The Justice Department and members of the new firm declined to comment on the launch.Smith had dropped the Trump prosecutions following Trump's 2024 election win, citing the DOJ's policy against prosecuting sitting presidents. Trump's administration has since condemned those cases, firing multiple DOJ and FBI officials and claiming political bias. Smith maintains the investigations were legitimate and nonpartisan. He is expected to testify behind closed doors before the GOP-led House Judiciary Committee next week.Trump prosecutor Jack Smith to launch firm with ex-Justice Department lawyers | ReutersThe U.S. Justice Department has announced new federal charges against Victoria Eduardovna Dubranova, a Ukrainian national accused of aiding Russian-aligned cyberattack groups targeting critical infrastructure. The latest indictment, filed in Los Angeles, links Dubranova to the group NoName057(16), which prosecutors say has carried out hundreds of cyberattacks globally, many aimed at essential services like food and water systems. These alleged actions are said to pose serious national security risks.Dubranova had already been extradited to the U.S. earlier in 2025 to face charges related to another Russian-backed hacking group known as CyberArmyofRussia_Reborn (CARR). She now faces conspiracy charges in both cases and has pleaded not guilty. Trials are scheduled for February 2026 (NoName) and April 2026 (CARR). Prosecutors allege both groups receive financial backing from the Russian government, though the Russian embassy has not commented on the case.The Justice Department emphasized that it will continue to pursue cyber threats tied to state-sponsored or proxy actors. The U.S. State Department is offering up to $10 million for information on NoName operatives and up to $2 million for tips on CARR affiliates.Justice Department unveils new charges in alleged Russia-backed cyberattacks | Reuters This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.minimumcomp.com/subscribe
When was the last time you backed up your data?New research shows that the majority of small businesses in Ireland don't have any plan in place to avoid or deal with a cyberhack, and with all of us booking GP and hair appointments online, should we be worried? Dr Hazel Murray, Chair of Cybersecurity at Munster Technical University, joins Seán to discuss.
Behind the second strike, cyberattacks with artificial intelligence, and two recent Christmas albums. Plus, Seth Troutt on grateful feasting, the stinky smell of success, and the Tuesday morning newsSupport The World and Everything in It today at wng.org/donateAdditional support comes from I Witness: The Long Shore: A faith-based audio drama that brings history to life. iwitnesspod.comFrom Ridge Haven Camp in North Carolina and Iowa. Winter Camp starts December 29th. Registration open at ridgehaven.orgAnd from His Words Abiding in You, a Bible memorization podcast designed for truck drivers. His Words Abiding in You … on all podcast apps.
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Une cellule de crise interministérielle a annoncé avoir déjoué une cyberattaque sophistiquée visant des infrastructures nationales sensibles. Les experts attribuent l'opération à un État étranger hostile.Traduction:An interministerial crisis unit announced it thwarted a sophisticated cyberattack targeting sensitive national infrastructure. Experts are attributing the failed operation to a hostile foreign state actor. Hébergé par Acast. Visitez acast.com/privacy pour plus d'informations.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
A U.S. official just reminded Congress of the enormous threat we face from Communist China: “America's adversaries…are already embedded in our systems, mapping our infrastructure, and preparing to disrupt critical operations at a time of their choosing….Cyberattacks on energy infrastructure are a daily reality and a growing strategic weapon.” This report makes all the more astounding the fact that the Securities and Exchange Commission continues to enable Chinese Communist companies – even ones blacklisted for being tied directly to the CCP's military – to have privileged access to America's capital markets. While SEC Chairman Paul Atkins says he's going to “scrutinize” more carefully such companies and what they are doing, unless and until he terminates a 2013 Memorandum of Understanding engineered by then-Vice President Joe Biden, our investors will continue – mostly unwittingly – to prop up and otherwise underwrite the greatest threat this country has ever faced. This is Frank Gaffney.
In today's Tech and Science Daily from The Standard, we break down the cyber attacks hitting multiple London councils, warnings of a “historic winter crisis” in the capital's A&Es, and a major update to Ordnance Survey's underground mapping project as Openreach joins the National Underground Asset Register.We also take a look at a new UK cyber tool blocking nearly a billion malicious web attempts, hydrogen tech cutting rail maintenance emissions, and a UK-led breakthrough in quantum teleportation between linked networks. Plus, December's first PlayStation Plus game, and YouTube Recap 2025.For all the latest news, head to standard.co.uk. Hosted on Acast. See acast.com/privacy for more information.
Danny Jenkins — Founder of ThreatLocker and the Zero-Trust RevolutionDanny Jenkins is the CEO of ThreatLocker, the leading cybersecurity company that he built alongside his wife. Hosts Jack Clabby of Carlton Fields, P.A., and Kayley Melton of the Cognitive Security Institute follow Danny's journey from a scrappy IT consultant to leading one of the fastest-growing cybersecurity companies in the world.Danny shares the moment everything changed: watching a small business nearly collapse after a catastrophic ransomware attack. That experience reshaped his mission and ultimately sparked the creation of ThreatLocker. He also reflects on the gritty early days—cold-calling from his living room, coding through the night, and taking on debt before finally landing their first $5,000 customer.Danny explains the origins of Zero Trust World, his passion for educating IT teams, and why adopting a hacker mindset is essential for modern defenders.In the Lifestyle Polygraph, Danny relates his early “revenge tech” against school bullies, the place he escapes to when celebrating big wins, and the movie franchise he insists is absolutely a Christmas classic.Follow Danny on LinkedIn: https://www.linkedin.com/in/dannyjenkins/ 00:00 Introduction to Cybersecurity and ThreatLocker02:26 The Birth of ThreatLocker: A Personal Journey05:42 The Evolution of Zero Trust Security08:35 Real-World Impact of Cyber Attacks11:25 The Importance of a Hacker Mindset14:46 The Role of SOC Teams in Cybersecurity17:34 Building a Culture of Security20:23 Hiring for Passion and Skill in Cybersecurity23:44 Understanding Zero Trust: Trust No One26:32 Lifestyle Polygraph: Personal Insights and Fun29:41 Conclusion and Future of ThreatLocker
Report from Una Kelly
From early 2022 through late 2024, a group of threat actors publicly known as APT28 exploited known vulnerabilities, such as CVE-2022-38028, to remotely and wirelessly access sensitive information from a targeted company network. This attack did not require any hardware to be placed in the vicinity of the targeted company's network as the attackers were able to execute remotely from thousands of miles away. With the ubiquity of Wi-Fi, cellular networks, and Internet of Things (IoT) devices, the attack surface of communications-related vulnerabilities that can compromise data is extremely large and constantly expanding. In the latest podcast from the Carnegie Mellon University Software Engineering Institute (SEI) Joseph McIlvenny, a senior research scientist, and Michael Winter, vulnerability analysis technical manager, both with the SEI's CERT Division, discuss common radio frequency (RF) attacks and investigate how software and cybersecurity play key roles in preventing and mitigating these exploitations.
The Intersection of Espionage Techniques and Cybersecurity Threats This episode explores the parallels between espionage and cybersecurity, particularly focusing on social engineering tactics used in both domains. Hosted by Jim Love, the podcast features insights from Neil Bisson, a retired intelligence officer from CSIS, and David Shipley, CEO of Beauceron Security. They discuss the vulnerabilities in human behavior that can be exploited, the similarity between human intelligence operations and phishing attacks, and how AI is transforming the landscape of social engineering. Practical advice on recognizing and mitigating these threats is also provided. The episode underscores the importance of empathy, skepticism, and continuous education in defending against sophisticated cyber threats. 00:00 Introduction and Sponsor Message 00:25 Linking Espionage and Cybersecurity 01:06 The Role of Social Engineering in Cyber Attacks 02:25 Guest Introductions: Neil Bisson and David Shipley 03:24 Recruitment Tactics in Intelligence 05:56 Phishing vs. Intelligence Recruitment 07:48 AI's Role in Modern Social Engineering 10:45 Building Trust and Rapport in Intelligence 16:19 Ethical Considerations in Intelligence Work 20:01 Future of Cybersecurity and Social Engineering 24:31 The Art of Subtle Manipulation 26:01 Clandestine Tactics and Voluntary Information 26:24 Incremental Trust Building 26:46 Psychological Manipulation and Cult Recruitment 27:34 Human Connection and Vulnerability 28:53 AI and Social Engineering 30:25 The Threat of AI in Recruitment 33:20 Emotional Manipulation in Espionage 36:19 Defending Against Manipulation 38:12 Empathy and Information as Defense 45:49 Final Thoughts and Audience Engagement
Japanese brewing giant, Asahi, has delayed publishing its latest financial results because of the major cyberattack that began in September. Leanna Byrne hears from an expert in Japan. Also, why has Venezuela banned six international airlines, including Iberia, TAP and Turkish Airlines? And the Swiss tariff deal with the US that's facing a backlash. Presenter: Leanna Byrne Producer: Ahmed Adan Editor: Stephen Ryan
In this episode of Unspoken Security, host AJ Nash sits down with CharlotteGuiney, Cyber Threat Intelligence Manager at Toyota Financial Services. Theyexplore what it takes to build threat intelligence programs that work for bothsecurity teams and the wider business. Charlotte cuts through the noise,stressing that buy-in is step one—and that it's often the hardest step. Sheshares how understanding internal customers and their priorities leads toearly wins, which are key to building trust and showing the value ofintelligence.Charlotte explains that not every organization needs the same level ofmaturity. Small companies might only need basic monitoring, while largerenterprises face more complex challenges. She notes that successfulprograms link intelligence to business needs, not just security threats. Thisapproach helps teams prioritize what matters most and communicate risk inways business leaders understand.The conversation also dives into the future of threat intelligence. Charlottesees a growing role for automation and AI, especially for basic tasks, butbelieves people are still needed to bridge gaps and build relationships acrossthe business. She closes with a reminder to keep things in perspective,echoing a lesson from her childhood at clown camp: sometimes you need tostep back and find humor, even in serious work.Send us a textSupport the show
Stephen Grootes speaks to Tech Expert, Siphumelele Zondi, about London dealing with a sophisticated coordinated cyberattack that targeted a number of its councils. The Money Show is a podcast hosted by well-known journalist and radio presenter, Stephen Grootes. He explores the latest economic trends, business developments, investment opportunities, and personal finance strategies. Each episode features engaging conversations with top newsmakers, industry experts, financial advisors, entrepreneurs, and politicians, offering you thought-provoking insights to navigate the ever-changing financial landscape. Thank you for listening to a podcast from The Money Show Listen live Primedia+ weekdays from 18:00 and 20:00 (SA Time) to The Money Show with Stephen Grootes broadcast on 702 https://buff.ly/gk3y0Kj and CapeTalk https://buff.ly/NnFM3Nk For more from the show, go to https://buff.ly/7QpH0jY or find all the catch-up podcasts here https://buff.ly/PlhvUVe Subscribe to The Money Show Daily Newsletter and the Weekly Business Wrap here https://buff.ly/v5mfetc The Money Show is brought to you by Absa Follow us on social media 702 on Facebook: https://www.facebook.com/TalkRadio702 702 on TikTok: https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/CapeTalk 702 on YouTube: https://www.youtube.com/@radio702 CapeTalk on Facebook: https://www.facebook.com/CapeTalk CapeTalk on TikTok: https://www.tiktok.com/@capetalk CapeTalk on Instagram: https://www.instagram.com/ CapeTalk on X: https://x.com/Radio702 CapeTalk on YouTube: https://www.youtube.com/@See omnystudio.com/listener for privacy information.
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss how, according to DataBreachToday, a Chinese state-linked hacking group relied on the Claude Code model to automate most of a cyberespionage campaign against dozens of organizations. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss how, according to DataBreachToday, a Chinese state-linked hacking group relied on the Claude Code model to automate most of a cyberespionage campaign against dozens of organizations. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
In this episode of Cybersecurity Today, host Jim Love welcomes retired intelligence officer Neil Bisson and regular guest David Shipley for an in-depth discussion on current cybersecurity threats facing both Canada and the US. They explore the roles of major state actors like China, Russia, Iran, and North Korea in cyber espionage and sabotage, alongside the motivations driving such activities. The conversation delves into the challenges faced by corporations and critical infrastructure, the importance of understanding motivations behind cyber attacks, and the need for greater cooperation between the private sector and intelligence agencies. The episode also highlights the crucial steps individuals and organizations should take to protect themselves in this rapidly evolving cyber landscape. 00:00 Introduction and Sponsor Message 00:40 Meet Neil Bisson: A Retired Intelligence Officer 02:43 The Evolution of Intelligence Collection 04:29 The Role of Big Data in Modern Espionage 06:30 Corporate Espionage and Technological Advancements 11:45 National Security Threats and Private Sector Vulnerabilities 16:42 Global Players in Cybersecurity Threats 21:44 The Overlooked Cyber Capabilities of India 23:58 State-Sponsored Cybercrime: A Symbiotic Relationship 24:50 Critical Infrastructure Vulnerabilities 25:32 Cyber Attacks and International Relations 27:54 The Role of Intelligence Agencies 33:58 The Huawei Controversy 37:18 Balancing National Security and Economic Interests 41:55 The Future of Cybersecurity 45:39 Conclusion and Final Thoughts
Cyberattacks against U.S. government employees surged by 85% during the recent government shutdown, with projections estimating over 555 million attacks by the end of November 2025. These attacks, characterized as targeted digital assaults rather than generic phishing attempts, exploit vulnerabilities during periods of financial stress, particularly affecting essential employees in agencies like the Department of Veterans Affairs and the Department of Justice. Experts warn that the implications of these cyber threats extend beyond immediate breaches, potentially undermining recruitment and trust in government institutions.In a related development, the Federal Communications Commission (FCC) voted to remove several cybersecurity regulations established after breaches by Chinese hackers targeting major telecommunications companies. This decision, made along party lines, reverses requirements for telecoms to enhance cybersecurity measures and submit annual risk management certifications. FCC Chairman Brendan Carr argued that voluntary efforts from carriers would be more effective, despite concerns from Democratic lawmakers about increased public vulnerability. Additionally, the U.S. Securities and Exchange Commission dismissed its case against SolarWinds Corporation, which had been accused of failing to disclose vulnerabilities related to the 2020 Sunburst attack.The episode also highlights the growing complexity in the technology landscape, with vendors rolling out new identity tools and autonomous agents that increase operational challenges for Managed Service Providers (MSPs). OpenAI introduced group chats in ChatGPT, enhancing collaborative capabilities, while RSA launched RSA ID Plus for Microsoft, aimed at improving security in regulated sectors. TeamViewer unveiled TIA, an intelligent agent for autonomous IT support, and Sophos integrated its services with Microsoft Security Suite, further complicating the identity management landscape.For MSPs and IT service leaders, the key takeaway is the need to establish a clear identity baseline and governance model amidst a rapidly evolving threat landscape and regulatory environment. As cyber threats become more targeted and regulations loosen, MSPs must proactively define their security standards and operational strategies. The increasing fragmentation of identity solutions and the rise of autonomous agents necessitate a focus on risk management and operational clarity to maintain client trust and ensure effective service delivery. Three things to know today 00:00 Targeted Federal Cyberattacks Surge as FCC Rolls Back Telecom Rules and SEC Ends SolarWinds Case, Leaving MSPs to Fill the Governance Gap05:42 Identity Wars, Agent Sprawl, and Rising Collaboration Expectations Put New Pressure on MSP Governance10:42 AI Isn't Just a Tool Anymore — It's Reshaping MSPs, Risk Strategy, and the Future of Agent MarketplacesThis is the Business of Tech. Supported by: https://saasalerts.com/mspradio/
In this episode, we start by discussing Greg's trip to India and the upcoming India AI Impact Summit in February 2026 (00:29). We then unpack the Trump Administration's draft executive order to preempt state AI laws (07:46) and break down the European Commission's new “digital omnibus” package, including proposed adjustments to the AI Act and broader regulatory simplification efforts (17:51). Finally, we discuss Anthropic's report on a China-backed “highly sophisticated cyber espionage campaign" using Claude and the mixed reactions from cybersecurity and AI policy experts (37:37).
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
New data from Cytactic shows that 70% of security leaders say internal misalignment creates more disruption than the threat actor itself. From unrehearsed plans to unclear authority, organizations are struggling to respond effectively even with strong tech in place. Josh Ferenczi, Head of Strategy at Cytactic, explains what leaders should do now to close the readiness gap.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
SummaryIn this episode of the Blue Security Podcast, hosts Adam Brewer and Andy discuss critical issues surrounding satellite security, particularly the vulnerabilities of unencrypted communications. They explore a recent study revealing how researchers intercepted sensitive data from various satellite communications, highlighting the need for encryption. The conversation shifts to the implications of AI in cybersecurity, detailing a sophisticated cyber attack executed with minimal human intervention. The hosts emphasize the importance of adapting cybersecurity strategies to counteract evolving threats, particularly those leveraging AI technologies.----------------------------------------------------YouTube Video Link: https://youtu.be/URiBKZLlO2g----------------------------------------------------Documentation:https://www.wired.com/story/satellites-are-leaking-the-worlds-secrets-calls-texts-military-and-corporate-data/https://www.anthropic.com/news/disrupting-AI-espionage----------------------------------------------------Contact Us:Website: https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: https://www.linkedin.com/company/bluesecpodYouTube: https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: https://www.linkedin.com/in/andyjaw/Email: andy@bluesecuritypod.com----------------------------------------------------Adam BrewerTwitter: https://twitter.com/ajbrewerLinkedIn: https://www.linkedin.com/in/adamjbrewer/Email: adam@bluesecuritypod.com
Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Robb Dunewood, Host, Daily Tech News Show, and Howard Holton, CEO, GigaOm Thanks to our show sponsor, KnowBe4 Your email gateway isn't catching everything — and cybercriminals know it. That's why there's KnowBe4's Cloud Email Security platform. It's not just another filter—it's a dynamic, AI-powered layer of defense that detects and stops advanced threats before they reach your users' inbox. Request a demo of KnowBe4's Cloud Email Security at knowbe4.com or visit them this week at Microsoft Ignite booth #5523. All links and the video of this episode can be found on CISO Series.com
You use it to write emails, now it's orchestrating crimes. Anthropic says its AI targeted 30 global organizations (including banks) in a cyberattack campaign. Scary stuff! Plus, a Russian bot fail, Louvre password drama, and deals you don't want to miss. Learn more about your ad choices. Visit megaphone.fm/adchoices
What if the most important legacy you leave behind isn't money—but wisdom? Hour 1 opens with Al Smith of Golden Eagle Financial (https://goldeneaglefinancialltd.com), who joins John Rush to challenge listeners with a powerful question: Are you truly prepared for the future? This hour, with its urgent focus on generational wealth and financial planning, forces you to rethink retirement, self-sufficiency, and the responsibility we owe the next generation. But the conversation doesn't stay calm for long. As Colorado's roads crumble and the state faces a billion-dollar budget shortfall, John exposes a fiery online clash between Governor Polis and Governor Ron DeSantis. Did Colorado really collect billions in marijuana tax revenue for schools and roads—or is that claim collapsing under scrutiny? And why are residents suddenly reporting ICE sightings while extremist rhetoric spikes across social media? Just when the hour can't get any hotter, John tackles a new political battle: the future of SNAP benefits. With millions at risk of losing food assistance, is America facing a safety-net crisis… or finally confronting system abuse? Packed with financial insights, political fireworks, and complex questions, Hour 1 dares you to engage in a thought-provoking journey, rethinking what you believe—and why. HOUR 2 What happens when the American dream collides with a 50-year mortgage? Hour 2 launches with Eric Weir (https://erikweir.com), author of Who's Eating Your Pie? as he and John Rush pull back the curtain on the newest—and most controversial—tool in housing finance. Could a half-century mortgage help first-time buyers escape rising rents, or is it a financial trap doubling your lifetime interest? And is this just math… or a political maneuver aimed at the Federal Reserve? But the hour takes a sharp turn. As social media erupts with anti-Israel rhetoric and conspiracy-driven claims, John confronts the emotional chaos head-on. Why are so many Americans falling for manipulated narratives? And how is AI—now powerful enough to create chart-topping songs—reshaping what people believe? Just when the tension peaks, the conversation shifts again: back to financial stability with Al Smith of Golden Eagle Financial, and then into the world of sports, where the Denver Broncos deliver a jaw-dropping win that has fans buzzing. Plus, hear what John and Richard have to say about the 2025 Toyota Land Cruiser. Packed with financial strategy, cultural firestorms, and unexpected victories, Hour 2 dares listeners to question everything—from mortgages to media to the world we think we understand. HOUR 3 What if the next global war isn't fought with missiles—but with algorithms? Hour 3 opens with AI and national-security expert Chris Hoar of SAT123 (https://sat123.com), who joins John Rush to break down America's silent, escalating technology battle with China. From rare earth control to stolen nuclear innovations, Chris reveals how Beijing's 2030 plan to dominate AI hardware and software is closer to reality than most Americans realize. Could the U.S. lose the digital high ground simply because we're looking the other way? But the conversation goes deeper. John exposes chilling new reports of Chinese hackers using AI for autonomous cyberattacks, raising the stakes on tariffs, national defense, and America's technological vulnerability. Then he pushes further: what happens when AI becomes so advanced that people can hold full conversations with systems that think—and manipulate—like humans? The hour closes with political fire. John tackles the Epstein document battle, accusations aimed at Donald Trump, and the internal meltdown inside the GOP, from Marjorie Taylor Greene to Colorado's own party infighting. Packed with espionage, ethics, and AI-driven danger, Hour 3 asks the ultimate question: Are we prepared for a world where technology, politics, and power collide? Find out more at https://rushtoreason.com.
OpenAI has released GPT-5.1, a controversial new AI app is bringing people back from the dead, and there's a big debate in AI about very different belief systems. On this week's episode, Paul and Mike go deeper on those topics and other top news this week, including political backlash to AI, the first AI-orchestrated cyberattack, an AI-generated song topping the charts, and much more. Show Notes: Access the show notes and show links here Click here to take this week's AI Pulse. 00:00:00 — Intro 00:03:59 — AI Pulse 00:06:41 —GPT-5.1 00:14:51 —Controversial New AI Product Brings Back the Dead 00:22:09 — Beliefs vs. Fundamental Truths 00:39:39 — Increasingly Negative Public Moods Towards AI 00:46:36 — First Reported AI-Orchestrated Cyberattack 00:51:33 — AI-Generated Country Song Tops Billboard Charts 00:58:43 — Cursor Raises $2.3 Billion, Valued at $29.3 Billion 01:01:13 — Parallel Raises $100 Million to Build Web for Agents 01:03:34 — Yann LeCun Leaving Meta 01:07:47 — NotebookLM Adds Deep Research 01:10:24 — McKinsey State of AI Report This episode is brought to you by AI Academy by SmarterX. AI Academy is your gateway to personalized AI learning for professionals and teams. Discover our new on-demand courses, live classes, certifications, and a smarter way to master AI. You can get $100 off an individual purchase or a membership by using code POD100 at academy.smarterx.ai. Visit our website Receive our weekly newsletter Join our community: Slack LinkedIn Twitter Instagram Facebook Looking for content and resources? Register for a free webinar Come to our next Marketing AI Conference Enroll in our AI Academy
Buckle up AI world. OpenAI released a new model, and apparently they're not done. Google is reportedly dropping Gemini 3 in hours. Jeff Bezos is going back hands-on building a new AI company. And that's just the tip of the AI iceberg this week. Don't get drowned out in the noise. On Monday, we cut it straight with the AI news that matters. Gemini 3 close to release, OpenAI drops GPT-5.1, Bezos to lead new AI startup and more AI News That MattersNewsletter: Sign up for our free daily newsletterMore on this Episode: Episode PageJoin the discussion: Thoughts on this? Join the convo and connect with other AI leaders on LinkedIn.Upcoming Episodes: Check out the upcoming Everyday AI Livestream lineupWebsite: YourEverydayAI.comEmail The Show: info@youreverydayai.comConnect with Jordan on LinkedInTopics Covered in This Episode:OpenAI GPT-5.1 Release & FeaturesGPT-5.1 Personality Controls ExplainedGPT-5.1 Thinking vs. Instant ModelsGoogle NotebookLM Deep Research UpdateNotebookLM Image & File Type SupportAnthropic $50B AI Data Center ExpansionAnthropic Claude Cyberattack IncidentOpenAI ChatGPT Group Chat Pilot LaunchJeff Bezos Project Prometheus AI StartupMeta AI Chief Yann LeCun Exit RumorsMicrosoft Fairwater AI Data Center LaunchGoogle Gemini 3 Anticipated Release UpdateNano Banana Pro Image Generator LeaksMulti-Agent Systems in Gemini EnterpriseOpenAI GPT-5.1 Prompt Cookbook ReleaseTimestamps:00:00 OpenAI Launches GPT 5.107:06 "GPT 5.1: Better, Yet Wordy"09:08 "AI Updates and Insights"11:19 NotebookLM Updates with Spreadsheet Support16:38 "ChatGPT Group Chat Collaboration"21:00 Bezos Co-CEO of AI Startup25:29 Meta's AI Overhaul Sparks Chaos28:13 "AI Exploited for Cyberattacks"30:53 "Microsoft Expands AI Data Centers"35:37 "Nano Banana Pro & Gemini 3"40:12 AI Updates: GPT-5.1 Features40:58 "AI News & Insights Weekly"Keywords:Gemini 3, Google AI, AI model release, GPT 5.1, OpenAI, AI conversational model, reasoning behavior, personality controls, compliance improvements, auto routing feature, thinking vs instant models, data center investment, Anthropic,Send Everyday AI and Jordan a text message. (We can't reply back unless you leave contact info) Head to AI.studio/build to create your first app. Head to AI.studio/build to create your first app. Head to AI.studio/build to create your first app.
Microsoft warns of potential Windows 10 update failure China-backed hackers launch first large-scale autonomous AI cyberattack Feds fumbled Cisco patches requirements, says CISA Huge thanks to our episode sponsor, KnowBe4 Your email gateway isn't catching everything — and cybercriminals know it. That's why there's KnowBe4's Cloud Email Security platform. It's not just another filter—it's a dynamic, AI-powered layer of defense that detects and stops advanced threats before they reach your users' inbox. Request a demo of KnowBe4's Cloud Email Security at knowbe4.com or visit them this week at Microsoft Ignite booth #5523. Find the stories behind the headlines at CISOseries.com.
A deep dive into Trump's tariff tax on Americans, rising AI-powered cyberattacks, and a president acting like a wounded animal as his failures close in.Subscribe to our Newsletter:https://politicsdoneright.com/newsletterPurchase our Books: As I See It: https://amzn.to/3XpvW5o How To Make AmericaUtopia: https://amzn.to/3VKVFnG It's Worth It: https://amzn.to/3VFByXP Lose Weight And BeFit Now: https://amzn.to/3xiQK3K Tribulations of anAfro-Latino Caribbean man: https://amzn.to/4c09rbE
P.M. Edition for Nov. 13. AI startup Anthropic said China's state-sponsored hackers used its tools to automate cyberattacks against corporations and governments. WSJ's Sam Schechner reports on the inflection point for hackers' use of AI. Disney's shares fell after a quarterly earnings report that fell short of Wall Street's expectations. And California is eyeing a first-of-its-kind tax on billionaires. WSJ's Paul Kiernan unpacks the ballot initiative for a wealth tax that's already run into steep opposition. Sabrina Siddiqui hosts. Sign up for the WSJ's free What's News newsletter. Learn more about your ad choices. Visit megaphone.fm/adchoices
SHOW 11-12-25 CBS EYE ON THE WORLD WITH JOHN BATCHELOR 1930 THE SHOW BEGINS IN THE DOUBTS ABOUT CHINA'S LEADERSHIP. FIRST HOUR 9-915 Allied AI Competition and Submarine Requests. Scott Harold examines the crucial role of allies Japan and South Korea in the AI competition against China. Japan is developing locally tailored AI models built on US technology for use in Southeast Asia. South Korea aims to become the third-largest AI power, offering reliable models to counter China's untrustworthy technology. Harold also discusses South Korea's surprising request for nuclear-powered, conventionally armed submarines to track Chinese and North Korean vessels, signaling a greater public willingness to contribute to China deterrence. 915-930 Rare Earths Monopoly and US Strategy. General Blaine Holt discusses China's challenge to the US and its allies regarding rare earths, noting that China previously threatened to cut off supply. The US is securing deals with partners like Australia and is on track to replace China entirely, despite initial processing reliance on Chinese predatory practices. Holt suggests a two-year recovery is conservative, as technology for domestic processing exists. He also notes China's leadership is in turmoil, trying to buy time through trade deals. 930-945 Russian Economic Stagnation and War Finance. Michael Bernstam confirms that the Russian economy is stagnating, expecting no growth for years due to exhausted resources and reliance on military production. Oil and gas revenues are down significantly due to Western sanctions and high discounts, widening the budget deficit. Russia is increasing taxes, including the VAT, which drives inflation in staples. This economic pain damages the popularity of the war by hurting the low-income population—the primary source of military recruitment. 945-1000 Buckley, Fusionism, and Conservative Integrity. Peter Berkowitz explores William F. Buckley's consolidation of the conservative movement through "fusionism"—blending limited government and social conservatism. Buckley purged the movement of anti-Semites based on core principles. Berkowitz uses this historical context to analyze the controversy surrounding Tucker Carlson giving a platform to Nick Fuentes, who openly celebrates Stalin and Hitler. This incident caused division after the Heritage Foundation's president, Kevin Roberts, defended Carlson, prompting Roberts to issue an apology. SECOND HOUR 10-1015 Commodity Markets and UK Political Instability. Simon Constable analyzes rare earth markets, noting China's dominance is achieved through undercutting prices and buying out competitors. Prices for key industrial commodities like copper and aluminum are up, indicating high demand. Constable also discusses UK political instability, noting that Labour Prime Minister Keir Starmer lacks natural leadership and confidence. The major political driver for a potential leadership change is the party's broken promise regarding income taxes, which severely undermines public trust before the next election, 1015-1030 Commodity Markets and UK Political Instability. Simon Constable analyzes rare earth markets, noting China's dominance is achieved through undercutting prices and buying out competitors. Prices for key industrial commodities like copper and aluminum are up, indicating high demand. Constable also discusses UK political instability, noting that Labour Prime Minister Keir Starmer lacks natural leadership and confidence. The major political driver for a potential leadership change is the party's broken promise regarding income taxes, which severely undermines public trust before the next election 1030-1045 Austrian Economics, Von Mises, and the Fight Against Interventionism. Carola Binder discusses the Austrian School of Economics, highlighting its focus on free markets and Ludwig von Mises's opposition to government "interventionism," including rent and price controls. Mises argued these policies distort markets, leading to shortages and inefficiency. Binder emphasizes Mises's belief that economic literacy is a primary civic duty necessary for citizens to reject socialism and interventionist panaceas, especially as new generations are exposed to such ideas. 1045-1100 Austrian Economics, Von Mises, and the Fight Against Interventionism. Carola Binder discusses the Austrian School of Economics, highlighting its focus on free markets and Ludwig von Mises's opposition to government "interventionism," including rent and price controls. Mises argued these policies distort markets, leading to shortages and inefficiency. Binder emphasizes Mises's belief that economic literacy is a primary civic duty necessary for citizens to reject socialism and interventionist panaceas, especially as new generations are exposed to such ideas. THIRD HOUR 1100-1115 Philippine Missile Deployment to Deter China. Captain Jim Fanell reports that the Philippines unveiled its first operational BrahMos anti-ship cruise missile battery in western Luzon to deter Chinese aggression. This supersonic missile system, part of the $7.2 billion Reorizon 3 modernization program, gives the Philippines "skin in the game" near disputed waters like Scarborough Shoal. The deployment signifies a strategy to turn the Philippines into a "porcupine," focusing defense on the West Philippine Sea. The systems are road-mobile, making them difficult to target. 1115-1130 AI, Cyber Attacks, and Nuclear Deterrence. Peter Huessy discusses the challenges to nuclear deterrence posed by AI and cyber intrusions. General Flynn highlighted that attacks on satellites, the backbone of deterrence, could prevent the US from confirming where a launch originated. Huessy emphasizes the need to improve deterrence, noting that the US likely requires presidential authorization for retaliation, unlike potential Russian "dead hand" systems. The biggest risk is misinformation delivered by cyber attacks, although the US maintains stringent protocols and would never launch based solely on a computer warning. 1130-1145 Sudan Civil War, Global Proxies, and Nigerian Violence. Caleb Weiss and Bill Roggio analyze the civil war in Sudan between the SAF and the RSF, noting both factions commit atrocities, including massacres after the capture of El Fasher. The conflict is fueled by opposing global coalitions: the UAE and Russia support the RSF, while Iran, Egypt, and Turkey back the SAF. The Islamic State has called for foreign jihadis to mobilize. Weiss also addresses the complicated violence in Nigeria, differentiating jihadist attacks on Christians from communal farmer-herder conflict. 1145-1200 Sudan Civil War, Global Proxies, and Nigerian Violence. Caleb Weiss and Bill Roggio analyze the civil war in Sudan between the SAF and the RSF, noting both factions commit atrocities, including massacres after the capture of El Fasher. The conflict is fueled by opposing global coalitions: the UAE and Russia support the RSF, while Iran, Egypt, and Turkey back the SAF. The Islamic State has called for foreign jihadis to mobilize. Weiss also addresses the complicated violence in Nigeria, differentiating jihadist attacks on Christians from communal farmer-herder conflict. FOURTH HOUR 12-1215 Corruption, Chinese Influence, and Protests in Serbia. Ivana Stradner discusses protests in Serbia demanding accountability one year after a canopy collapse killed 16 people, with investigations linking the accident to high-level corruption involving a Chinese company. Leader Vučić suppresses discontent by alleging the West is plotting a "color revolution." Although Vučić aligns his heart with Russia and China, he needs EU money for political survival, prompting him to offer weapons to the West and claim Serbia is on the EU path. 1215-1230 The Muslim Brotherhood and Its Global Network. Cliff May discusses the Muslim Brotherhood (MB), the progenitor of Hamas, founded in 1928 after the Ottoman Caliphate's abolition. The MB's goal is to establish a new Islamic empire. Qatar is highly supportive, hosting Hamas leaders, while the UAE and Saudi Arabia have banned the MB. Turkish President Erdoğan is considered MB-adjacent and sympathetic, supporting Hamas and potentially viewing himself as a future Caliph, despite Turkey being a NATO member. 1230-1245 Commercial Space Records and Political Impacts on NASA. Bob Zimmerman covers new records in commercial space: SpaceX achieved 147 launches this year, and one booster tied the Space Shuttle Columbia for 28 reuses. China also set a record with 70 launches but had a failure. Commercial space faced temporary impacts, such as an FAA launch curfew due to a government shutdown and air traffic controller shortages. Zimmerman speculates that Jared Isaacman's conservative-leaning public appearance at Turning Point USA might have convinced Trump to renominate him for NASA Administrator. 1245-100 AM Commercial Space Records and Political Impacts on NASA. Bob Zimmerman covers new records in commercial space: SpaceX achieved 147 launches this year, and one booster tied the Space Shuttle Columbia for 28 reuses. China also set a record with 70 launches but had a failure. Commercial space faced temporary impacts, such as an FAA launch curfew due to a government shutdown and air traffic controller shortages. Zimmerman speculates that Jared Isaacman's conservative-leaning public appearance at Turning Point USA might have convinced Trump to renominate him for NASA Administrator.
AI, Cyber Attacks, and Nuclear Deterrence. Peter Huessy discusses the challenges to nuclear deterrence posed by AI and cyber intrusions. General Flynn highlighted that attacks on satellites, the backbone of deterrence, could prevent the US from confirming where a launch originated. Huessy emphasizes the need to improve deterrence, noting that the US likely requires presidential authorization for retaliation, unlike potential Russian "dead hand" systems. The biggest risk is misinformation delivered by cyber attacks, although the US maintains stringent protocols and would never launch based solely on a computer warning.
Plus: Baidu unveils new AI chips. Disney's streaming services see subscriber growth. And Verizon plans to cut about 15,000 jobs. Julie Chang hosts. Learn more about your ad choices. Visit megaphone.fm/adchoices
How Middletown is recovering from a crippling strike.
Eric O'Neill, former FBI ghost and author of “Spies, Lies & Cybercrime,” joins host David Puner to take a deep dive into the mindset and tactics needed to defend against today's sophisticated cyber threats. Drawing on O'Neill's experience catching spies and investigating cybercriminals, the conversation explains how thinking like an attacker can help organizations and individuals stay ahead. The episode covers actionable frameworks, real-world stories, and practical advice for building cyber resilience in an age of AI-driven scams and industrialized ransomware.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst In today's episode, we cover the breach at the US Congressional Budget Office and its implications on national security, Microsoft Teams' chat feature being exploited for phishing attacks, and the increasing use of AI in cyber attacks. We also highlight how Canadian veterans are being retrained for careers in cybersecurity through the Coding for Veterans program. Hosted by Jim Love, we thank Meter for supporting this podcast with their complete networking stack solutions. 00:00 Introduction and Sponsor Message 00:51 US Congressional Budget Office Breach 02:27 Microsoft Teams Phishing Exploit 03:42 AI in Cybersecurity Attacks 06:09 Veterans in Cybersecurity 07:44 Conclusion and Sponsor Message
For years, working on AI safety usually meant theorising about the ‘alignment problem' or trying to convince other people to give a damn. If you could find any way to help, the work was frustrating and low feedback.According to Anthropic's Holden Karnofsky, this situation has now reversed completely.There are now large amounts of useful, concrete, shovel-ready projects with clear goals and deliverables. Holden thinks people haven't appreciated the scale of the shift, and wants everyone to see the large range of ‘well-scoped object-level work' they could personally help with, in both technical and non-technical areas.Video, full transcript, and links to learn more: https://80k.info/hk25In today's interview, Holden — previously cofounder and CEO of Open Philanthropy — lists 39 projects he's excited to see happening, including:Training deceptive AI models to study deception and how to detect itDeveloping classifiers to block jailbreakingImplementing security measures to stop ‘backdoors' or ‘secret loyalties' from being added to models in trainingDeveloping policies on model welfare, AI-human relationships, and what instructions to give modelsTraining AIs to work as alignment researchersAnd that's all just stuff he's happened to observe directly, which is probably only a small fraction of the options available.Holden makes a case that, for many people, working at an AI company like Anthropic will be the best way to steer AGI in a positive direction. He notes there are “ways that you can reduce AI risk that you can only do if you're a competitive frontier AI company.” At the same time, he believes external groups have their own advantages and can be equally impactful.Critics worry that Anthropic's efforts to stay at that frontier encourage competitive racing towards AGI — significantly or entirely offsetting any useful research they do. Holden thinks this seriously misunderstands the strategic situation we're in — and explains his case in detail with host Rob Wiblin.Chapters:Cold open (00:00:00)Holden is back! (00:02:26)An AI Chernobyl we never notice (00:02:56)Is rogue AI takeover easy or hard? (00:07:32)The AGI race isn't a coordination failure (00:17:48)What Holden now does at Anthropic (00:28:04)The case for working at Anthropic (00:30:08)Is Anthropic doing enough? (00:40:45)Can we trust Anthropic, or any AI company? (00:43:40)How can Anthropic compete while paying the “safety tax”? (00:49:14)What, if anything, could prompt Anthropic to halt development of AGI? (00:56:11)Holden's retrospective on responsible scaling policies (00:59:01)Overrated work (01:14:27)Concrete shovel-ready projects Holden is excited about (01:16:37)Great things to do in technical AI safety (01:20:48)Great things to do on AI welfare and AI relationships (01:28:18)Great things to do in biosecurity and pandemic preparedness (01:35:11)How to choose where to work (01:35:57)Overrated AI risk: Cyberattacks (01:41:56)Overrated AI risk: Persuasion (01:51:37)Why AI R&D is the main thing to worry about (01:55:36)The case that AI-enabled R&D wouldn't speed things up much (02:07:15)AI-enabled human power grabs (02:11:10)Main benefits of getting AGI right (02:23:07)The world is handling AGI about as badly as possible (02:29:07)Learning from targeting companies for public criticism in farm animal welfare (02:31:39)Will Anthropic actually make any difference? (02:40:51)“Misaligned” vs “misaligned and power-seeking” (02:55:12)Success without dignity: how we could win despite being stupid (03:00:58)Holden sees less dignity but has more hope (03:08:30)Should we expect misaligned power-seeking by default? (03:15:58)Will reinforcement learning make everything worse? (03:23:45)Should we push for marginal improvements or big paradigm shifts? (03:28:58)Should safety-focused people cluster or spread out? (03:31:35)Is Anthropic vocal enough about strong regulation? (03:35:56)Is Holden biased because of his financial stake in Anthropic? (03:39:26)Have we learned clever governance structures don't work? (03:43:51)Is Holden scared of AI bioweapons? (03:46:12)Holden thinks AI companions are bad news (03:49:47)Are AI companies too hawkish on China? (03:56:39)The frontier of infosec: confidentiality vs integrity (04:00:51)How often does AI work backfire? (04:03:38)Is AI clearly more impactful to work in? (04:18:26)What's the role of earning to give? (04:24:54)This episode was recorded on July 25 and 28, 2025.Video editing: Simon Monsour, Luke Monsour, Dominic Armstrong, and Milo McGuireAudio engineering: Milo McGuire, Simon Monsour, and Dominic ArmstrongMusic: CORBITCoordination, transcriptions, and web: Katy Moore
From the BBC World Service: Experts have estimated that the cyberattack on Jaguar Land Rover — which halted car production there for multiple weeks — cost the carmaker roughly $2.55 billion, making the breach the most expensive in the country's history. We'll do the numbers. And later in the program, tourism has long played a central part in Cuba's economy. So what impact have the Trump administration's new sanctions had?