Attack on a computer system
POPULARITY
Categories
U.S. financial firms are on high alert for cyberattacks as the war with Iran escalates, with companies ramping up threat monitoring amid the heightened geopolitical tension. The killing of Iran’s Supreme Leader Ali Khamenei has fueled regional chaos, shaken global markets, and raised fears that Iran‑linked hackers could target America’s financial sector in retaliation. Iran’s spot in the 2026 World Cup is now uncertain, after U.S.–Israeli strikes and the killing of Iran’s supreme leader prompted the country’s soccer chief to say they may not be able to participate. FIFA says it’s too early to comment, while Iran’s games in Los Angeles and Seattle face added complications because Iranian fans are barred from entering the U.S. under a travel ban. Please Like, Comment and Follow 'Philip Teresi on KMJ' on all platforms: --- Philip Teresi on KMJ is available on the KMJNOW app, Apple Podcasts, Spotify, YouTube or wherever else you listen to podcasts. -- Philip Teresi on KMJ Weekdays 2-6 PM Pacific on News/Talk 580 AM & 105.9 FM KMJ | Website | Facebook | Instagram | X | Podcast | Amazon | - Everything KMJ KMJNOW App | Podcasts | Facebook | X | Instagram See omnystudio.com/listener for privacy information.
U.S. financial firms are on high alert for cyberattacks as the war with Iran escalates, with companies ramping up threat monitoring amid the heightened geopolitical tension. The killing of Iran’s Supreme Leader Ali Khamenei has fueled regional chaos, shaken global markets, and raised fears that Iran‑linked hackers could target America’s financial sector in retaliation. Iran’s spot in the 2026 World Cup is now uncertain, after U.S.–Israeli strikes and the killing of Iran’s supreme leader prompted the country’s soccer chief to say they may not be able to participate. FIFA says it’s too early to comment, while Iran’s games in Los Angeles and Seattle face added complications because Iranian fans are barred from entering the U.S. under a travel ban. Please Like, Comment and Follow 'Philip Teresi on KMJ' on all platforms: --- Philip Teresi on KMJ is available on the KMJNOW app, Apple Podcasts, Spotify, YouTube or wherever else you listen to podcasts. -- Philip Teresi on KMJ Weekdays 2-6 PM Pacific on News/Talk 580 AM & 105.9 FM KMJ | Website | Facebook | Instagram | X | Podcast | Amazon | - Everything KMJ KMJNOW App | Podcasts | Facebook | X | Instagram See omnystudio.com/listener for privacy information.
Send a textAlthough discussing the military activities currently taking place in Iran runs the risk or bringing up polarizing political views, the cybersecurity realities simply can't be ignored. And they absolutely have to be discussed. One of these realities is that Iran has a legacy of supporting organizations involved with cyberattacks on networks, infrastructure and companies in Israel and the United States. Companies that utilize industrial control systems. Companies like yours. In light of current events, there is absolutely no question that these groups will escalate their efforts. Although the bombs are falling thousands of miles beyond U.S. borders, know that U.S. manufacturing is a primary target. Historically, many of the groups carrying out these types of cyberattacks were hacktivists or outliers, operating independent of any government or country. They followed their own agenda in realizing personal or political goals. However, as highlighted by the war in Ukraine, these groups have begun to pick sides. They're embracing financial support from nation states and successfully executing attacks meant to shut down, steal data, extort money and/or disrupt critical production or infrastructure operations – regardless of size, sector or location. Thankfully, there are also guys like our guest for today's episode. JP Castellanos is the Director of Threat Intelligence at Binary Defense. Watch/listen as he discusses:The evolving hacktivist community and what recent events could mean for industrial cybersecurity.How manufacturers can prepare and respond to an inevitable uptick in attacks.How IT/OT silos perpetuate these attacks and make manufacturing a more lucrative and appealing target.The motives and operational strategies of state-sponsored Iranian hacker groups.The soft spots in your defenses that these groups take advantage of in targeting the industrial sector.The simple solutions that can have far-reaching and extremely positive impacts on your defenses.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.
NATO Forces Shoot Down Iranian Missile Heading For Turkey, Masked Man With Ammo Arrested Outside Tx AG Paxton's Election Party, Banks Warn Of Cyberattacks And Mucre!h Mo
Learn more about your ad choices. Visit megaphone.fm/adchoices
Industrial operations have spent decades optimizing for safety, reliability, and uptime. Control systems, sensors, and field equipment were designed to be stable and predictable, often isolated from the outside world. Cybersecurity, by contrast, evolved largely in IT environments, on a separate track, with different tools, assumptions, and incentives. That separation is no longer holding. Operational technology is becoming more connected, more digital, and more automated. Sensors stream data to the cloud, vendors require remote access, and AI-driven tools increasingly influence operational decisions. At the same time, cyber threats are moving faster, targeting physical systems with the potential for real-world safety and production impacts. One response is data meshing: combining traditional cyber telemetry with operational data such as vibration, maintenance history, and asset performance to create a richer, more reliable picture of what is really happening inside industrial environments. When these signals are viewed together, anomalies surface faster, false positives drop, and attacks become harder to hide. In this episode, I'm speaking with Ian Bramson, VP of Global Industrial Cybersecurity at Black & Veatch, and Keon McEwen, Head of Solutions Development for Industrial Cybersecurity. We discuss why the old idea of the air gap is fading, how safety and cybersecurity are converging, what data meshing really means in practice, and why points of operational change are the right moment to rethink cyber risk.
Cyber Security Expert Theresa Payton joins Bo and Beth to discuss Anthropic's deal with the Pentagon that fell apart last week as well as the potential for cyber attacks amid rising tensions with Iran. See omnystudio.com/listener for privacy information.
Cyberattacks that used to take months now take minutes. And your defenders still can't keep up.Rob T. Lee, Chief AI Officer of the SANS Institute, and David A. Bray, Chair of the Accelerator at the Stimson Center, explain why AI gives attackers a structural advantage. Attackers don't care if their AI breaks something. Your security team can't take that risk. That asymmetry changes everything.✅ You'll discover:✅ Why attackers will always remove the human in the loop faster than defenders can, and the risk calculus that creates✅ How "death by 1,000 cuts" works: $300 per person times 10,000 targets via SIM farms equals a single ransomware payout✅ The federated learning approach that lets organizations share threat intelligence without exposing their own data or vulnerabilities✅ Why hackers are exploiting AI hallucinations by writing real code libraries for packages that models reliably hallucinate✅ How to identify the right cybersecurity talent: hire for learning velocity and the "fiddling mindset," not static AI credentials✅ Why boards must stop treating cybersecurity as prevention and start rewarding rapid detection and response✅ The pre-compute vs. post-compute distinction for AI agent safety that most executives are missing entirely✅ When autonomous cyber defense will actually be viable (hint: think pilotless planes and robotic surgeons)⏱️ TIMESTAMPS0:00 AI has made "death by 1,000 cuts" attacks scalable0:39 Why the AI security lifecycle matters now2:27 Military history lessons for cyber defense strategy5:00 Federated learning: sharing threat intelligence without exposing data6:48 How incident response must evolve for AI-speed attacks8:05 The human-in-the-loop dilemma: defenders vs. attackers11:37 Distraction attacks: coordinated multi-target campaigns15:37 Autonomous agents as a new attack surface19:44 Hackers weaponizing AI hallucinations against developers22:23 Development velocity as the real "swarm" capability24:20 Perverse incentives: why stopping an attack still counts as failure27:09 Your personal attack surface grew from 3 devices to 5031:22 Protecting AI tool chains from becoming prime targets34:25 Hackathons as the future of cybersecurity hiring36:53 Patterns of life: instrumenting your enterprise for anomaly detection38:18 When will we trust AI defenders without human oversight?41:09 Pre-compute vs. post-compute: where AI agent safety rules must live46:45 AI trust, hallucinations, and prompt injection as information warfare51:42 Building security culture: leadership, not blame
Chrome unveils quantum-safe certificates Vulnerability allowed hijacking Gemini Live UK warns of Iranian cyberattack risks Get the show notes here: https://cisoseries.com/cybersecurity-news-chrome-quantum-safe-certificates-gemini-live-vulnerability-uk-warns-of-iranian-cyberattacks/ Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first security awareness platform built to stop AI-powered social engineering. Today's phishing doesn't just hit inboxes — it can sound like your CFO or look like your CEO on Zoom. AI voices, video, and deepfakes are turning trust into the attack surface. Adaptive fights back with AI-driven risk scoring, deepfake simulations featuring your own executives, and interactive training your team will actually remember. Take a three-minute tour or request a CEO deepfake demo at adaptivesecurity.com.
The US conducted cyberattacks ahead of strikes on Iran, Russia aims for internet independence by 2028, Google finds a new iOS exploit kit in the wild, and Chrome moves to a two-week release cycle. Show notes Risky Bulletin: Cyber Command conducted cyberattacks ahead of Iran strikes
Almost one in five of Ireland's top companies have experienced significant cyber attacks in the last two years, new data shows today. The findings come as national domain registry .IE launches Ireland's first Digital Trust Mark. Described as an NCT for your online identity, websites and emails carrying the distinctive wolfhound symbol will give customers confidence that businesses of all sizes are operating to the highest digital standards. "If you have an online presence, you can now be assessed on DigitalTrust.ie in just a few clicks," said Louise McKeown Doogan, Chief Growth Officer at .IE. "Once an organisation applies, their website, email and domain setup is assessed using a proprietary scoring evaluation that checks against industry-defined best practice. "These checks confirm that digital fundamentals are correctly configured, responsibly managed and set up to support trust and reliability online. "Once you receive your Digital Trust Score, you will either be entitled to carry the mark or you will have clear next steps to reach the required standard. "We live in an age where some ransomware companies now have customer care departments, and the online health of the nation needs to improve as a consequence." The research found that 17pc of Ireland's key organisations have experienced a significant cyber attack since 2024. Conducted by Amárach on behalf of .IE, it surveyed 354 essential Irish firms in January. It follows last week's Garda data that fraud-related crimes more than doubled in the last 12 months, up 137pc – mainly due to bank scams, phishing and smishing. "Our findings are concerning, particularly when we know phishing scams (60pc) and the exploitation of system weaknesses (21.3pc) are the most common ways attackers gain access," said Ms McKeown Doogan. "An online presence that appears to function may not always demonstrate the authenticity and trustworthiness customers expect. "Until now there has been no visible way for consumers to know that a website meets a recognised standard – and no way for businesses or organisations to signal that they do. "The mark signals that they demonstrate authenticity, responsible digital practice and a trustworthy online experience. "We hope it will become a digital equivalent of the NCT and an essential part of interacting online in Ireland within the next year." The Digital Trust Mark is not just for .ie domains but is open to .com and other domains used by Irish organisations. Applicants will receive a grade by the next working day, and if an A-rating is achieved, businesses can display the mark on their website or in their email signature for the following 12 months. Domains that do not reach an A-rating will be given a detailed outline of what and how they can improve. See digitaltrust.ie for more information. More about Irish Tech News Irish Tech News are Ireland's No. 1 Online Tech Publication and often Ireland's No.1 Tech Podcast too. You can find hundreds of fantastic previous episodes and subscribe using whatever platform you like via our Anchor.fm page here: https://anchor.fm/irish-tech-news If you'd like to be featured in an upcoming Podcast email us at Simon@IrishTechNews.ie now to discuss. Irish Tech News have a range of services available to help promote your business. Why not drop us a line at Info@IrishTechNews.ie now to find out more about how we can help you reach our audience. You can also find and follow us on Twitter, LinkedIn, Facebook, Instagram, TikTok and Snapchat.
Podcast: Digitalization Tech TalksEpisode: Episode 62: The hidden phase of industrial cyberattacks and how to spot it earlyPub date: 2026-02-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn the 62nd episode of Digitalization Tech Talks, hosts Jonas Norinder and Don Mack kick off a two‑part series on the evolving state of industrial cybersecurity. They uncover what's really happening inside OT networks long before a cyber incident hits the plant floor including why over 80% of adversary behavior occurs months before impact, why air‑gaps no longer provide real protection, and how legacy vulnerabilities continue to be actively exploited. As guest Adam Robbie puts it “OT security is no longer a hidden problem — it's a visibility problem.” This episode is essential listening for anyone navigating IT/OT convergence, looking for ways to improve industrial defenses, or preparing for emerging cyber risks. The insights come directly from a new white paper supported by a commercial and research partnership between Palo Alto Networks and Siemens, together with Idaho National Labs as the third-party research partner. Show Notes:Research Paper (S4 Conference): Intelligence-Driven Active Defense Report 2026 (https://sie.ag/416Tgm)Website (Palo Alto): OT Security Insights 2025 (https://sie.ag/2ZcgDY)Website (US Department of Energy): Cybersecurity for the Operational Technology Environment (https://sie.ag/5p9z6a)Website (Siemens): Industrial cybersecurity solutions | Siemens (https://sie.ag/4HJ8L4) Contact us:Adam Robbie email (arobbie@paloaltonetworks.com), LinkedIn (https://www.linkedin.com/in/adamrobbie/)Tilo Pinkert email (tilo.pinkert@siemens.com), LinkedIn (https://www.linkedin.com/in/tilopinkert/)Priyanjan Sharma email (priyanjan.sharma@siemens.com), LinkedIn (https://www.linkedin.com/in/priyanjansharma/) Don Mack email (mack.donald@siemens.com)Jonas Norinder email (jonas.norinder@siemens.com)The podcast and artwork embedded on this page are from Siemens, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.
In the 62nd episode of Digitalization Tech Talks, hosts Jonas Norinder and Don Mack kick off a two‑part series on the evolving state of industrial cybersecurity. They uncover what's really happening inside OT networks long before a cyber incident hits the plant floor including why over 80% of adversary behavior occurs months before impact, why air‑gaps no longer provide real protection, and how legacy vulnerabilities continue to be actively exploited. As guest Adam Robbie puts it “OT security is no longer a hidden problem — it's a visibility problem.” This episode is essential listening for anyone navigating IT/OT convergence, looking for ways to improve industrial defenses, or preparing for emerging cyber risks. The insights come directly from a new white paper supported by a commercial and research partnership between Palo Alto Networks and Siemens, together with Idaho National Labs as the third-party research partner. Show Notes:Research Paper (S4 Conference): Intelligence-Driven Active Defense Report 2026 (https://sie.ag/416Tgm)Website (Palo Alto): OT Security Insights 2025 (https://sie.ag/2ZcgDY)Website (US Department of Energy): Cybersecurity for the Operational Technology Environment (https://sie.ag/5p9z6a)Website (Siemens): Industrial cybersecurity solutions | Siemens (https://sie.ag/4HJ8L4) Contact us:Adam Robbie email (arobbie@paloaltonetworks.com), LinkedIn (https://www.linkedin.com/in/adamrobbie/)Tilo Pinkert email (tilo.pinkert@siemens.com), LinkedIn (https://www.linkedin.com/in/tilopinkert/)Priyanjan Sharma email (priyanjan.sharma@siemens.com), LinkedIn (https://www.linkedin.com/in/priyanjansharma/) Don Mack email (mack.donald@siemens.com)Jonas Norinder email (jonas.norinder@siemens.com)
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Ransomware as a service has turned cybercrime into a franchise business — and in this episode, Dr. Mike Saylor and I break down exactly how it works, who's buying, and why the buyer might end up as the patsy.If you thought ransomware was just a lone hacker writing code in a basement, this episode is going to change how you think about it. Ransomware as a service means that today, literally anyone — no technical skills required — can pay someone to launch a ransomware attack on their behalf. You hand over the money, tell them what you want, and sit back and watch your crypto wallet. That's it. No portal. No dashboard. No login. Just a chat on the dark web through the TOR network and a prayer that they actually do what you paid for.Dr. Mike Saylor walks us through the full criminal ecosystem — from the initial access brokers who collect and sell validated email addresses, to the botnet operators who rent out millions of compromised computers by the hour, to the affiliate programs that tie it all together. We cover the franchise model, the "no honor among thieves" reality of these transactions, and why the person who buys into ransomware as a service might just end up as law enforcement's fall guy.This is one of those episodes where the more you learn, the more you realize how much the threat picture has changed — and why your backups are more important than ever.Chapters:00:00:00 - Episode Intro00:01:17 - Introductions & Welcome00:03:25 - Setting the Stage: CryptoLocker and the Birth of a Criminal Industry00:07:17 - Defining Ransomware as a Service: The Franchise Model00:10:36 - The Amazon/AWS Analogy and How Botnets Power the Attacks00:17:10 - No Portal, No Dashboard: How Dark Web Transactions Actually Work00:19:17 - Why Do RaaS Operators Offer the Service? The Lottery Ticket Theory00:21:59 - The Affiliate Model: How the Criminal Ecosystem Specializes00:26:33 - How Many RaaS Groups Exist — and Who's Buying?00:29:36 - RaaS as Subterfuge: The Conti Group and the Costa Rica Attack00:30:49 - Who Are These Criminals, Really?
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
In this episode of Unspoken Security, host AJ Nash sits down with Bob Fabien “BZ” Zinga, a cybersecurity executive and Naval Information Warfare Commander in the U.S. Navy Reserve. They explore how performative leadership shows up in security teams, and why values on a wall fail when pressure hits.BZ argues that optics without accountability kills trust. When leaders bend with politics or budgets, engaged employees go quiet. That silence hides risk. He shares how breaches often trace back to human choices, including a W-2 phishing scam that exposed employees' data and changed his own life. He also pushes blameless postmortems and clear escalation paths.From there, the conversation moves to AI. BZ warns that teams can automate bias and outsource judgment. He calls for guardrails, regulation, and human oversight, especially in high-stakes decisions. He closes with a simple standard: speak up for fairness, even when silence would feel safer.Send a textSupport the show
Rusland hackt het Poolse stroomnetwerk maar Polen houdt de lichten aan en China infiltreert jarenlang telecom providers wereldwijd met 8 jaar oude vulnerabilities. The Telegraph schreeuwt dat Boris Johnson's telefoon gehackt is, maar het verhaal is interessanter én enger - het gaat niet om telefoons maar om de providers zelf. Marco legt uit waarom ISPs de "holy grail" zijn voor spionage (metadata kills people), Jelle neemt het Telegraph-artikel vakkundig uit elkaar en Ronald vertelt waarom één gecompromitteerde provider toegang geeft tot miljoenen klanten. Van TACACS+ traffic capture tot GRE tunnels, van Cisco Guest Shell containers tot BGP routing manipulatie - dit is "one of the more successful campaigns in the history of espionage" en het had voorkomen kunnen worden door gewoon te patchen. AIVD en MIVD tekenden mee op de advisory, dus ja, dit raakt ook Nederland. Bronnen Sandworm Poland Power Grid - SecurityWeek: "Russian Sandworm Hackers Blamed for Cyberattack on Polish Power Grid" (23 jan 2026): https://www.securityweek.com/russian-sandworm-hackers-blamed-for-cyberattack-on-polish-power-grid/ Salt Typhoon - Telecom Espionage - The Telegraph: "China hacked Downing Street phones for years" (27 jan 2026): https://www.telegraph.co.uk/news/2026/01/26/china-hacked-downing-street-phones-for-years/ - AIVD/MIVD: "Nederlandse providers doelwit van Salt Typhoon": https://www.aivd.nl/actueel/nieuws/2025/08/28/nederlandse-providers-doelwit-van-salt-typhoon - Joint Cybersecurity Advisory: CISA/NSA/FBI/NCSC-UK/AIVD/MIVD + 15 landen - "Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide" - CVE-2024-21887: Ivanti Connect Secure command injection - CVE-2024-3400: Palo Alto Networks GlobalProtect RCE - CVE-2023-20198 & CVE-2023-20273: Cisco IOS XE authentication bypass + privilege escalation - CVE-2018-0171: Cisco IOS Smart Install RCE (8 jaar oud!)
Bill Thompson is a retired Chief Warrant Officer 4. He is also a former Cyber Network Operations advisor and program evaluator at DARPA with experience in the fields of AI, Signals, and Human Intelligence. He is also the founder of the Spartan Forge hunting app: https://spartanforge.ai/ Change Agents is an IRONCLAD Original Chapters: (01:03) What Is DARPA? (05:58) Drone Warfare Ukraine (13:20) The Dangers of Terrorists Using Drones (16:50) Smartphone Surveillance in the Maduro Raid (26:00) Using the Internet in Authoritarian Countries (31:50) Spying on Cell Phones and Stealing Data (36:50) Choosing Targeted People to Spy On (39:35) The Vulnerability of Infrastructure to Cyberattacks (46:35) How Can You Protect Your Data? Subscribe: Subscribe on Apple Podcasts: https://podcasts.apple.com/us/podcast/change-agents-with-andy-stumpf/id1677415740 Subscribe on Spotify: https://open.spotify.com/show/3SKmtN55V2AGbzHDo34DHI?si=5aefbba9abc844ed Sponsors: Firecracker Farm Use code IRONCLAD to get 15% off your first order at https://firecracker.farm/ GHOSTBED: Go to https://www.GhostBed.com/CHANGEAGENTS and use code CHANGEAGENTS for an extra 15% off sitewide. Norwood Sawmills: Learn more about Norwood Sawmills and how you can start milling your own lumber at https://norwoodsawmills.com/ Learn more about your ad choices. Visit megaphone.fm/adchoices
For more on this Technology Correspondent Brian O'Donovan.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
In this episode of Unspoken Security, host AJ Nash sits down with Galya Westler, Co-Founder and CEO at HumanBeam. They explore how advances in AI, digital identity, and holographic technology are reshaping the way organizations interact with people—while raising tough questions about privacy, ownership, and trust.Galya shares how her work began in health technology, connecting patients to care during pandemics, and evolved into building secure, lifelike AI avatars for real-world use. She explains why protecting personal likeness and voice matters more than ever, especially as AI tools become more convincing and accessible. Galya stresses the need for consent, encryption, and clear boundaries to keep digital identities safe and organizations accountable.Together, AJ and Galya dig into the risks and rewards of merging human presence with AI. They discuss how thoughtful design and strong security practices can support experts instead of replacing them, and why education and authenticity are key as we build a future where technology and humanity work side by side.Send us a textSupport the show
Coupang CEO questioned by police regarding data breach probe Cyberattack on large Russian bread factory disrupts deliveries Real estate agents in Australia use apps that leave lease documents at risk Get the show notes here: https://cisoseries.com/cybersecurity-news-police-question-coupang-ceo-russia-bakery-cyberattack-australian-real-estate-scandal/ Huge thanks to our sponsor, Strike48 Strike48 is the Agentic Log Intelligence Platform that actually puts AI agents to work, maximizing log visibility without blowing your budget. Find threats your siloed tools miss. Get started today with pre-built AI agents and workflows that investigate, detect, and respond 24/7 or build your own at strike48.com/security.
Podcast: Three Buddy Problem (LS 39 · TOP 2% what is this?)Episode: A destructive cyberattack in Poland raises NATO 'red-line' questionsPub date: 2026-01-30Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarization(Presented by Material Security: We protect your company's most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.) Three Buddy Problem - Episode 83: Poland's CERT documents a rare, explicit wiper attack on civilians in a NATO country, including detailed attribution of a Russian government op targeting the electric grid in the heart of winter. We examine why this crosses a long-avoided threshold, why attribution suddenly matters again, and what it says about pre-positioned access, vendor insecurity, and the shrinking gap between cyber operations and acts of war. Plus, another Fortinet fiasco, a new batch of Ivanti zero-days under attack, an emergency patch from Microsoft and the return of the mysterious KasperSekrets account. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.Links:Transcript (unedited, AI-generated)Material Security (Use Cases)ESET DynoWiper update: Technical analysis and attributionPoland CERT on Russian wiper attacksPoland blames two Ukrainians allegedly working for Russia for railway blastBritain's New Spy Chief Has a New MissionTwo New Ivanti 0days ExploitedMicrosoft ships emergency Office patch to thwart attacksAnalysis of Single Sign-On Abuse on FortiOSFortinet PSIRT: Administrative FortiCloud SSO authentication bypassDiverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088WhatsApp Strict Account SettingsChina Executes 11 People Linked to Cyberscam Centers in MyanmarSingapore to start caning for scammersGermany on hacking attacks: "We will strike back, including abroad"Acting CISA chief uploaded sensitive files into a public version of ChatGPTTLP BLACKLABScon 2026KasperSekretsThe podcast and artwork embedded on this page are from Security Conversations, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
As food retailers work to digitize and enhance their logistics and supply networks, they're becoming more exposed to cybersecurity risks. In this episode, we discuss how a wave of recent cyberattacks has exposed vulnerabilities across the sector — how prepared companies really are, and why investors may want to sit up and take notice.Host: Gabriela de la Serna, MSCI Research & DevelopmentGuest: Cole Martin, MSCI Research & Development
(Presented by Material Security: We protect your company's most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.) Three Buddy Problem - Episode 83: Poland's CERT documents a rare, explicit wiper attack on civilians in a NATO country, including detailed attribution of a Russian government op targeting the electric grid in the heart of winter. We examine why this crosses a long-avoided threshold, why attribution suddenly matters again, and what it says about pre-positioned access, vendor insecurity, and the shrinking gap between cyber operations and acts of war. Plus, another Fortinet fiasco, a new batch of Ivanti zero-days under attack, an emergency patch from Microsoft and the return of the mysterious KasperSekrets account. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
A cyberattack has crippled cars in Russia, Microsoft patches an Office zero-day, WhatsApp rolls out an account lockdown feature, and a handful of Chrome extensions steal ChatGPT auth tokens. Show notes Risky Bulletin: Cyberattack cripples cars across Russia
Microsoft Outlook and boot problems Sandworm likely behind cyberattack on Poland's power grid Dresden museum network suffers cyberattack Huge thanks to our episode sponsor, Conveyor Ever wish your customers could magically get answers to their own security questionnaires before they ever hit your desk? We've heard this wish from hundreds of teams so Conveyor just launched a new Trust Center AI Agent. The Agent lives in your Conveyor hosted Trust Center and answers customer questions, surfaces documents and even completes full questionnaires instantly so customers can finish their review without your intervention. Join top tech companies using Conveyor today like Atlassian, Zapier and more. Check it out at Conveyor.com Find the stories behind the headlines at CISOseries.com.
(05:22) Brought to you by CyberhavenAI is exfiltrating your data in fragments. Not one big breach — a prompt here, a screenshot there, a quiet export into a shadow AI tool. Every week, AI makes your team faster and your data harder to see. Files are moved to new SaaS apps, models are trained on sensitive inputs, and legacy DLP is blind to the context that matters most.On February 3rd at 11 am Pacific, Cyberhaven is unveiling a unified DSPM and DLP platform, built on the original data lineage, so security teams get X-ray vision into how data actually moves — and can stop risky usage in real time.Watch the launch live at cyberhaven.com/techleadjournal.Did you know Singapore is one of the world's top countries launching cyberattacks? Not as a victim, but as the source. Your routers, smart TVs, robot vacuums, or network-attached storage could be part of a massive botnet right now.In this eye-opening episode, Joseph Yap, founder of Otonata and cybersecurity expert, reveals the hidden cyber threat lurking in our homes. He reveals how everyday devices from routers to smart TVs become attack weapons. He explains why Singapore's excellent infrastructure ironically makes it attractive for hackers and shares practical steps to protect your network. From residential proxies renting out your internet connection to teenagers running ransomware gangs, this conversation exposes the gap between our connected lives and our digital security practices.Key topics discussed:Why Singapore, Indonesia, and Vietnam are top cyberattack source countriesWhy Singapore's infrastructure makes it attractive for hackersHow 700,000+ compromised devices launch 30 terabits per second DDoS attacksThe rise of residential proxies and dark web rental of home networksHow hackers exploit publicly disclosed vulnerabilities in outdated firmwareWhy AI is lowering the barrier to entry for hackersWhat makes executives and high-net-worth individuals attractive targetsPractical steps to audit and protect your home networkTimestamps:(00:00:00) Trailer & Intro(00:02:40) How Can I Apply Journalism Skills to Tech(00:06:14) Why is Curiosity Essential for Tech Leaders?(00:08:48) Why is Singapore a Top Source for Cyber Attacks?(00:12:11) What Makes Singapore Attractive for Cyber Attacks?(00:16:39) How Many Devices in Singapore are Already Compromised?(00:20:40) How Can I Tell if My Home Network is Compromised?(00:30:13) Which Devices are Hackers' Favorite Entry Points?(00:33:18) What is a Residential Proxy and Why Should I Care?(00:36:27) How do Hackers Actually Break into My Network?(00:47:47) Why are Executives and High-Net-Worth Individuals Prime Target?(00:55:12) Why isn't Singapore's Cyber Attack Problem in the News?(00:59:26) Can Internet Providers Stop These Attacks?(01:02:16) What Can I Do to Protect My Home Network?(01:05:19) How Do I Protect My Network-Attached Storage (NAS)?(01:10:41) How is AI Changing the Cyber Attack Landscape?(01:17:35) How Can Otonata Help Protect My Home Network?(01:23:39) What are Real-World Examples of Home Network Compromises?(01:28:20) 3 Tech Lead Wisdom_____Joseph Yap's BioWith 20+ years in Operations and Supply Chain, Joseph Yap founded Otonata (https://otonata.com) after realizing how vulnerable home networks are to security breaches. Otonata brings corporate-grade cybersecurity to homes using digital hygiene and lean management principles, protecting dozens of households from growing threats posed by AI, smart devices, and expanding attack surfaces.Follow Joseph:LinkedIn – linkedin.com/in/-joseph-yapOtonata – https://otonata.com/Free Hack Check – https://otonata.com/hack-checkLike this episode?Show notes & transcript: techleadjournal.dev/episodes/245.Follow @techleadjournal on LinkedIn, Twitter, and Instagram.Buy me a coffee or become a patron.
In this episode of Unspoken Security, host AJ Nash sits down with Eric Yunag, EVP of Product and Services at Convergint. They explore how security integration is changing as organizations face a fast-moving threat landscape and rising expectations from leaders and regulators. Eric explains why today's environment demands a new approach—one that connects hardware, software, and services in a more dynamic, real-time ecosystem.Eric shares how integrators help companies navigate not just the technical, but also the legal and operational complexity of modern security. He describes how shifting to cloud platforms, unifying physical and digital identities, and balancing privacy with business outcomes all add new layers of challenge. The conversation highlights the growing use of AI and “visual intelligence”—using camera data for both security and business insight—as organizations look to do more with their investments.Throughout the discussion, Eric makes the case for trusted, neutral advisors who help organizations build smarter, more connected security systems. He shows how today's integrators are positioned to guide clients through tough choices, benchmark best practices, and unlock value that goes far beyond traditional security.Send us a textSupport the show
In this week's show, Patrick Gray and Adam Boileau discuss the week's cybersecurity news, joined by a special guest. BBC World Cyber Correspondent Joe Tidy is a long time listener and he pops in for a ride-along in the news segment plus a chat about his new book. This week news includes: Did the US cyber Venezuela's power grid, or do they just want us to think they coulda? US govt might boycott the RSAC Conference ‘cause Jen Easterly being CEO makes them mad MS Patch Tuesday fixes CVSS5.5 bug and … stops you shutting down Wiz pulls off cloud stunt hack that ends with control of everyone's AWS console Millions of Bluetooth devices that use Google's Fast Pairing will pair with anyone, any time GNU inet-tools' telnetd parties like it's 2007, and brings -f root unauthed remote login back Thinkst is this week's sponsor, and long time friend of the show Haroon Meer joins. As always they're polishing their Canary tokens - adding breadcrumbs to lead you to them - but they're also a bunch of giant nerds who now run South Africa's Computer Olympiad. This episode is also available on Youtube. Show notes Cyberattack in Venezuela Demonstrated Precision of U.S. Capabilities - The New York Times Why I'm withholding certainty that “precise” US cyber-op disrupted Venezuelan electricity - Ars Technica Layered Ambiguity: US Cyber Capabilities in the Raid to Extract Maduro from Venezuela | Royal United Services Institute Former CISA Director Jen Easterly Will Lead RSAC Conference | WIRED Trump officials consider skipping premier cyber conference after Biden-era cyber leader named CEO - Nextgov/FCW Federal agencies ordered to patch Microsoft Desktop Windows Manager bug | The Record from Recorded Future News Windows 11 shutdown bug forces Microsoft into damage control • The Register CodeBreach: Supply Chain Vuln & AWS CodeBuild Misconfig | Wiz Blog Critical flaw in AWS Console risked compromise of build environment | Cybersecurity Dive Never-before-seen Linux malware is “far more advanced than typical” - Ars Technica VoidLink: Evidence That the Era of Advanced AI-Generated Malware Has Begun - Check Point Research Hundreds of Millions of Audio Devices Need a Patch to Prevent Wireless Hacking and Tracking | WIRED Critical flaw in Fortinet FortiSIEM targeted in exploitation threat | Cybersecurity Dive CVE-2025-64155: 3 Years of Remotely Rooting the FortiSIEM A single click mounted a covert, multistage attack against Copilot - Ars Technica Police raid homes of alleged Black Basta hackers, hunt suspected Russian ringleader | The Record from Recorded Future News Jordanian initial access broker pleads guilty to helping target 50 companies | The Record from Recorded Future News Supreme Court hacker posted stolen government data on Instagram | TechCrunch oss-sec: GNU InetUtils Security Advisory: remote authentication by-pass in telnetd How crypto criminals stole $700 million from people - often using age-old tricks Ctrl + Alt + Chaos: How Teenage Hackers Hijack the Internet
In this episode, we explore how threat actors are using AI to launch smarter, more persistent cyberattacks. From automated reconnaissance to evasive malware, AI is giving attackers new ways to infiltrate systems and steal data. Join Larry Zorio and Jeramy Cooper-Leavitt from the IJIS Cybersecurity Working Group as they reveal the latest AI-driven tactics—and why training your team to spot and stop these threats is critical in today's digital age.
Cybersecurity failures are no longer just IT problems. They are legal, financial, and leadership failures. In this episode of Security Squawk, we break down how a ransomware attack on Ireland's Office of the Ombudsman delayed justice for citizens and what that incident reveals about preparedness, accountability, and real-world consequences of cyber risk. We start with the Ireland cyberattack that forced a key public watchdog agency to halt case processing for months. This was not a minor disruption. Systems were taken offline, legal action was required to prevent potential data leaks, and people relying on the system became collateral damage. The story highlights a hard truth. When cybersecurity fails, mission failure follows. Government or private sector, the outcome is the same. From there, we zoom out to the private sector where the warning signs are flashing red. New survey data shows cybersecurity litigation risk is rising faster than any other legal exposure for U.S. businesses. Corporate legal teams expect cyber and data privacy disputes to intensify, yet fewer of them feel prepared compared to last year. That gap tells us everything we need to know. Companies understand the risk is growing, but they are not investing or aligning fast enough to reduce it. We also examine the dangerous confidence gap in middle market firms. Nearly one in five experienced a cyber incident, yet almost all executives still believe their security posture is strong. Confidence without controls is not resilience. It is exposure. This disconnect raises serious questions about leadership accountability and how security decisions are being made at the executive level. The episode also dives into research showing that many top U.S. companies still fail basic cybersecurity hygiene. Reused passwords, outdated software, poor configuration, and unpatched systems remain common in 2025. These are not advanced threats. These are fundamentals. When organizations cannot execute the basics, the issue is not technical skill. It is culture, discipline, and leadership priority. We discuss the ongoing wave of data breaches affecting insurance, healthcare, and business services organizations, exposing millions of records. These incidents are proof that many companies remain reactive instead of proactive. Third-party risk, weak internal controls, and poor governance continue to amplify the damage. Finally, we tackle a growing blind spot. AI security governance. As businesses rapidly adopt AI tools, many still lack formal rules, oversight, or risk frameworks. Without governance, innovation turns into liability. Attackers move faster than policy, and organizations are left exposed. This episode is a wake-up call for business leaders, MSPs, IT professionals, and security decision-makers. Cybersecurity is no longer about compliance checklists or technology spend. It is about reducing real risk, protecting trust, and leading responsibly. If you want to understand why cyberattacks now lead to lawsuits, why confidence is not the same as security, and why leadership decisions matter more than ever, this episode delivers the insight you need. Subscribe, follow, and share Security Squawk. And if you want to support the show, you can always buy me a coffee at buymeacoffee.com/securitysquawk.
Tim, Phil, Ian & Tate are joined by Arynne Wexler to discuss a potentially developing war with Iran, people betting on the chances of the Islamic Republic collapsing, silver prices skyrocketing and fluctuating and nationwide Verizon outages plunging the country into disarray. Hosts: Tim @Timcast (everywhere) Phil @PhilThatRemains (X) Ian @IanCrossland (X) Tate @realTateBrown (everywhere) Producer: Serge @SearchDupre (X) Guest: Arynne Wexler @ArynneWexler (X)
In this episode, Chris and Hector dig into how cyber operations are no longer a background activity but a core part of modern conflict. They break down reported US cyber actions tied to operations in Venezuela, Chinese state sponsored email intrusions targeting congressional staff, and the global scam economy built on human trafficking and crypto fraud. Join our new Patreon! https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Cybercrime Magazine deep dives into cyber ranges with thought leaders Lauri Almann, co-founder and Chairman of the Board, and Daz Preuss, COO, at CybExer, providers of Immersive testing and training environments that improve your cybersecurity skills, build your cyber resilience, and reinforce your defences. This episode is brought to you by CybExer. Learn more about our sponsor at https://cybexer.com
Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis
And we're back! We discuss the New Year spike in cyber attacks on schools over the holiday break and practical strategies for vacation periods - automated alerting, third‑party monitoring, suspending or shutting down non‑critical services. Other topics include what to look for when hiring technician, the rise of remote psycho-educational testing, early findings from the E‑Rate cybersecurity pilot, vendor liability caps in data privacy agreements, and a listener email about student account compromises from downloaded apps and VPNs. ———— Sponsored by: Meter - meter.com/k12techtalk Visit meter.com/k12techtalk to book a demo! Rise Vision - Interactive Digital Signage Templates + Touchscreen Displays ClassLink Lightspeed Fortinet - fortinetpodcast@fortinet.com NTP - dwren@ntp-inc.com ———— Join the K12TechPro Community (exclusively for K12 Tech professionals) Buy some swag (tech dept gift boxes, shirts, hoodies...)!!! Email us at k12techtalk@gmail.com OR our "professional" email addy is info@k12techtalkpodcast.com X @k12techtalkpod Facebook Visit our LinkedIn Music by Colt Ball Disclaimer: The views and work done by Josh, Chris, and Mark are solely their own and do not reflect the opinions or positions of sponsors or any respective employers or organizations associated with the guys. K12 Tech Talk itself does not endorse or validate the ideas, views, or statements expressed by Josh, Chris, and Mark's individual views and opinions are not representative of K12 Tech Talk. Furthermore, any references or mention of products, services, organizations, or individuals on K12 Tech Talk should not be considered as endorsements related to any employer or organization associated with the guys.
In this episode of Unspoken Security, host AJ Nash sits down with Danielle Jablanski from STV to break down the hard truths of operational technology (OT) security. Danielle explains why critical infrastructure - from water and transportation to manufacturing - remains vulnerable, tracing the challenge back to legacy systems, vendor complexity, and the lack of clear, industry-wide standards. She argues that many organizations have poor visibility into their assets and often rely on outdated assumptions about risk and business impact.Danielle calls out the pitfalls of flashy security solutions and emphasizes the need for basic, proven practices like network segmentation and clear asset management. She highlights the disconnect between IT and OT, showing how real-world safety and business operations depend on bridging this gap with honest communication and practical controls. Rather than chasing after hype, Danielle urges leaders to focus on building resilience: knowing what matters, assessing real risks, and strengthening what you can control.Throughout the conversation, Danielle offers a grounded perspective on why OT security demands more than checklists and compliance. She points to the need for shared data, better early warning systems, and a broader base of professionals willing to dig into the complexities - before an incident forces everyone's hand.Send us a textSupport the show
Jaguar Land Rover reveals the fiscal results of last year's cyberattack. A Texas gas station chain suffers a data spill. Taiwan tracks China's energy-sector attacks. Google and Veeam push patches. Threat actors target obsolete D-Link routers. Sedgwick Government Solutions confirms a data breach. The U.S. Cyber Trust Mark faces an uncertain future. Google looks to hire humans to improve AI search responses. Our guest is Deepen Desai, Chief Security Officer of Zscaler, discussing what's powering enterprise AI in 2026. AI brings creative cartography to the weather forecast. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On today's Industry Voices, we are joined by Deepen Desai, Chief Security Officer of Zscaler, discussing what's powering enterprise AI in 2026. To learn more on this topic, be sure to check out Zscaler's report here. Listen to the full conversation here. Selected Reading Jaguar Land Rover wholesale volumes plummet 43% in cyberattack aftermath (The Register) Major Data Breach Hits Company Operating 150 Gas Stations in the US (Hackread) Taiwan says China's attacks on its energy sector increased tenfold (Bleeping Computer) Google Patches High-Severity Chrome WebView Flaw CVE-2026-0628 in the Tag Component (Tech Nadu) Several Code Execution Flaws Patched in Veeam Backup & Replication (SecurityWeek) New D-Link flaw in legacy DSL routers actively exploited in attacks (Bleeping Computer) Sedgwick confirms breach at government contractor subsidiary (Bleeping Computer) FCC Loses Lead Support for Biden-Era IoT Security Labeling (GovInfoSecurity) Google Search AI hallucinations push Google to hire "AI Answers Quality" engineers (Bleeping Computer) ‘Whata Bod': An AI-generated NWS map invented fake towns in Idaho (The Washington Post) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
The UK hits reset on cybersecurity No MFA, Know Problems US may have coordinated cyberattacks with Maduro's arrest Huge thanks to our sponsor, Hoxhunt A small tip for CISOs: if you're unsure whether your security training is actually reducing phishing risk, check out what Qualcomm achieved with Hoxhunt. They took their 1,000 highest-risk users from consistent under-performers to outperforming the rest of the company, driving measurable human risk reduction and earning a CSO50 Award. See the Qualcomm case at hoxhunt.com/qualcomm
While our team is out on winter break, please enjoy this episode of Research Saturday. This week, we are joined by Tom Hegel, Principal Threat Researcher from SentinelLabs research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belarusian government espionage, is actively targeting Ukrainian military and government entities as well as Belarusian opposition activists using weaponized Excel documents. SentinelLabs identified new malware variants and tactics, including obfuscated VBA macros that deploy malware via DLL files, with payload delivery seemingly controlled based on a target's location and system profile. The campaign, which began preparation in mid-2024 and became active by late 2024, appears to be an evolution of previous Ghostwriter operations, combining disinformation with cyberattacks to further political and military objectives. The research can be found here: Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition Learn more about your ad choices. Visit megaphone.fm/adchoices
Lev Parnas, Ukrainian-American businessman turned political activist, and author joins Thom to expose the reality of Donald's duplicity with Ukraine. Is Russia already at war with us? Tanks aren't rolling through cities, but cyberattacks, proxy wars, sanctions, and covert operations are everywhere. Has the world already crossed the line into global war between the United States and Russia? — and why governments may be afraid to say it out loud.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Support a coffee company that supports America and American values! Go to www.blackoutcoffee.com/Graham Use Code Graham for 20% off your first order Text Graham to 989898 now to recieve a 25 page info kit from Birch Gold. Free silver with purchased till 22 Dec Protect your devices from Cyberattacks! Go to www.webroot.com/graham Get 60% off now! Socials: Twitter: www.twitter.com/grahamallen_1 FB: www.facebook.com/grahamallenofficial IG: www.instagram.com/grahamallen1 Tiktok: www.tiktok.com/@thegrahamallen Rumble: www.rumble.com/user/grahamallenofficial
Behind the second strike, cyberattacks with artificial intelligence, and two recent Christmas albums. Plus, Seth Troutt on grateful feasting, the stinky smell of success, and the Tuesday morning newsSupport The World and Everything in It today at wng.org/donateAdditional support comes from I Witness: The Long Shore: A faith-based audio drama that brings history to life. iwitnesspod.comFrom Ridge Haven Camp in North Carolina and Iowa. Winter Camp starts December 29th. Registration open at ridgehaven.orgAnd from His Words Abiding in You, a Bible memorization podcast designed for truck drivers. His Words Abiding in You … on all podcast apps.