Podcasts about cyberattacks

Attack on a computer system

  • 2,801PODCASTS
  • 7,352EPISODES
  • 31mAVG DURATION
  • 2DAILY NEW EPISODES
  • Feb 23, 2026LATEST
cyberattacks

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about cyberattacks

Show all podcasts related to cyberattacks

Latest podcast episodes about cyberattacks

Backup Central's Restore it All
Ransomware as a Service: How Anyone Can Buy a Cyberattack

Backup Central's Restore it All

Play Episode Listen Later Feb 23, 2026 35:02 Transcription Available


Ransomware as a service has turned cybercrime into a franchise business — and in this episode, Dr. Mike Saylor and I break down exactly how it works, who's buying, and why the buyer might end up as the patsy.If you thought ransomware was just a lone hacker writing code in a basement, this episode is going to change how you think about it. Ransomware as a service means that today, literally anyone — no technical skills required — can pay someone to launch a ransomware attack on their behalf. You hand over the money, tell them what you want, and sit back and watch your crypto wallet. That's it. No portal. No dashboard. No login. Just a chat on the dark web through the TOR network and a prayer that they actually do what you paid for.Dr. Mike Saylor walks us through the full criminal ecosystem — from the initial access brokers who collect and sell validated email addresses, to the botnet operators who rent out millions of compromised computers by the hour, to the affiliate programs that tie it all together. We cover the franchise model, the "no honor among thieves" reality of these transactions, and why the person who buys into ransomware as a service might just end up as law enforcement's fall guy.This is one of those episodes where the more you learn, the more you realize how much the threat picture has changed — and why your backups are more important than ever.Chapters:00:00:00 - Episode Intro00:01:17 - Introductions & Welcome00:03:25 - Setting the Stage: CryptoLocker and the Birth of a Criminal Industry00:07:17 - Defining Ransomware as a Service: The Franchise Model00:10:36 - The Amazon/AWS Analogy and How Botnets Power the Attacks00:17:10 - No Portal, No Dashboard: How Dark Web Transactions Actually Work00:19:17 - Why Do RaaS Operators Offer the Service? The Lottery Ticket Theory00:21:59 - The Affiliate Model: How the Criminal Ecosystem Specializes00:26:33 - How Many RaaS Groups Exist — and Who's Buying?00:29:36 - RaaS as Subterfuge: The Conti Group and the Costa Rica Attack00:30:49 - Who Are These Criminals, Really?

Cybercrime Magazine Podcast
Cybercrime Wire For Feb. 20, 2026. Cyberattack Strikes UMMC, IT Systems Down. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Feb 20, 2026 1:29


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Unspoken Security
The Dangers of Performative Leadership in Tech

Unspoken Security

Play Episode Listen Later Feb 19, 2026 66:11 Transcription Available


In this episode of Unspoken Security, host AJ Nash sits down with Bob Fabien “BZ” Zinga, a cybersecurity executive and Naval Information Warfare Commander in the U.S. Navy Reserve. They explore how performative leadership shows up in security teams, and why values on a wall fail when pressure hits.BZ argues that optics without accountability kills trust. When leaders bend with politics or budgets, engaged employees go quiet. That silence hides risk. He shares how breaches often trace back to human choices, including a W-2 phishing scam that exposed employees' data and changed his own life. He also pushes blameless postmortems and clear escalation paths.From there, the conversation moves to AI. BZ warns that teams can automate bias and outsource judgment. He calls for guardrails, regulation, and human oversight, especially in high-stakes decisions. He closes with a simple standard: speak up for fairness, even when silence would feel safer.Send a textSupport the show

Cyberhelden
Cyberhelden 61 - Hoe China jarenlang westerse telecombedrijven hackte

Cyberhelden

Play Episode Listen Later Feb 12, 2026 42:08


Rusland hackt het Poolse stroomnetwerk maar Polen houdt de lichten aan en China infiltreert jarenlang telecom providers wereldwijd met 8 jaar oude vulnerabilities. The Telegraph schreeuwt dat Boris Johnson's telefoon gehackt is, maar het verhaal is interessanter én enger - het gaat niet om telefoons maar om de providers zelf. Marco legt uit waarom ISPs de "holy grail" zijn voor spionage (metadata kills people), Jelle neemt het Telegraph-artikel vakkundig uit elkaar en Ronald vertelt waarom één gecompromitteerde provider toegang geeft tot miljoenen klanten. Van TACACS+ traffic capture tot GRE tunnels, van Cisco Guest Shell containers tot BGP routing manipulatie - dit is "one of the more successful campaigns in the history of espionage" en het had voorkomen kunnen worden door gewoon te patchen. AIVD en MIVD tekenden mee op de advisory, dus ja, dit raakt ook Nederland. Bronnen Sandworm Poland Power Grid - SecurityWeek: "Russian Sandworm Hackers Blamed for Cyberattack on Polish Power Grid" (23 jan 2026): https://www.securityweek.com/russian-sandworm-hackers-blamed-for-cyberattack-on-polish-power-grid/ Salt Typhoon - Telecom Espionage - The Telegraph: "China hacked Downing Street phones for years" (27 jan 2026): https://www.telegraph.co.uk/news/2026/01/26/china-hacked-downing-street-phones-for-years/ - AIVD/MIVD: "Nederlandse providers doelwit van Salt Typhoon": https://www.aivd.nl/actueel/nieuws/2025/08/28/nederlandse-providers-doelwit-van-salt-typhoon - Joint Cybersecurity Advisory: CISA/NSA/FBI/NCSC-UK/AIVD/MIVD + 15 landen - "Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide" - CVE-2024-21887: Ivanti Connect Secure command injection - CVE-2024-3400: Palo Alto Networks GlobalProtect RCE - CVE-2023-20198 & CVE-2023-20273: Cisco IOS XE authentication bypass + privilege escalation - CVE-2018-0171: Cisco IOS Smart Install RCE (8 jaar oud!)

Change Agents with Andy Stumpf
DARPA, Drone Warfare & AI: How the U.S. Military Is Preparing for the Next War

Change Agents with Andy Stumpf

Play Episode Listen Later Feb 11, 2026 53:05


Bill Thompson is a retired Chief Warrant Officer 4. He is also a former Cyber Network Operations advisor and program evaluator at DARPA with experience in the fields of AI, Signals, and Human Intelligence. He is also the founder of the Spartan Forge hunting app: https://spartanforge.ai/ Change Agents is an IRONCLAD Original Chapters: (01:03) What Is DARPA? (05:58) Drone Warfare Ukraine (13:20) The Dangers of Terrorists Using Drones (16:50) Smartphone Surveillance in the Maduro Raid (26:00) Using the Internet in Authoritarian Countries (31:50) Spying on Cell Phones and Stealing Data (36:50) Choosing Targeted People to Spy On (39:35) The Vulnerability of Infrastructure to Cyberattacks (46:35) How Can You Protect Your Data? Subscribe: Subscribe on Apple Podcasts: https://podcasts.apple.com/us/podcast/change-agents-with-andy-stumpf/id1677415740 Subscribe on Spotify: https://open.spotify.com/show/3SKmtN55V2AGbzHDo34DHI?si=5aefbba9abc844ed Sponsors: Firecracker Farm Use code IRONCLAD to get 15% off your first order at https://firecracker.farm/ GHOSTBED: Go to https://www.GhostBed.com/CHANGEAGENTS and use code CHANGEAGENTS for an extra 15% off sitewide. Norwood Sawmills: Learn more about Norwood Sawmills and how you can start milling your own lumber at https://norwoodsawmills.com/ Learn more about your ad choices. Visit megaphone.fm/adchoices

Ashurst Legal Outlook Podcast
Governance & Compliance: The changing nature of cyberattacks and cyber regulation

Ashurst Legal Outlook Podcast

Play Episode Listen Later Feb 10, 2026 20:18


Cyber readiness is rocketing up the agenda for boards in 2026. We explore cyber readiness including new regulatory developments, trends in cyber threats, and practical defences against attacks. In this episode of our UK Governance & Compliance mini-series, we explore cyber readiness as one of the top risk-related priorities for boards in 2026. We look at the sobering costs of large disruptions —noting the cause is often small-scale security lapses. We explore the changing cyber landscape including the UK’s expanding Cyber Resilience Bill and the shift to operational disruption as the primary threat. Plus, we provide practical guidance for boards. Podcast host Will Chalk is joined by John Macpherson, an Ashurst risk advisory partner in Sydney. Also joining the conversation are London colleagues Rhiannon Webster, a partner in Ashurst’s digital economy transactions practice, who heads up the UK cyber response and data protection team, and Matt Worsfold, a partner in Ashurst’s risk advisory team. To listen to this and subscribe to future episodes in our governance mini-series, search for “Ashurst Legal Outlook” on Apple Podcasts, Spotify or your favourite podcast player. You can also find out more about the full range of Ashurst podcasts at ashurst.com/podcasts. To receive updates and alerts on the issues raised in this podcast mini-series, subscribe to Ashurst’s regular Governance and Compliance Updates. Read more about the recent AGC Conference here. And read our latest update here about Narrative and Financial Reporting, and Economic Crime and Corporate Transparency. The information provided is not intended to be a comprehensive review of all developments in the law and practice, or to cover all aspects of those referred to. Listeners should take legal advice before applying it to specific issues or transactions.See omnystudio.com/listener for privacy information.

RTÉ - News at One Podcast
Warning that 'dodgy boxes' could have been compromised in a global cyberattack

RTÉ - News at One Podcast

Play Episode Listen Later Feb 9, 2026 2:47


For more on this Technology Correspondent Brian O'Donovan.

Cybercrime Magazine Podcast
Cybercrime Wire For Feb. 6, 2026. Cyberattack Strikes Large University In Europe. WCYB Digital Radio

Cybercrime Magazine Podcast

Play Episode Listen Later Feb 6, 2026 1:19


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Unspoken Security
The Future is Human

Unspoken Security

Play Episode Listen Later Feb 5, 2026 66:20 Transcription Available


In this episode of Unspoken Security, host AJ Nash sits down with Galya Westler, Co-Founder and CEO at HumanBeam. They explore how advances in AI, digital identity, and holographic technology are reshaping the way organizations interact with people—while raising tough questions about privacy, ownership, and trust.Galya shares how her work began in health technology, connecting patients to care during pandemics, and evolved into building secure, lifelike AI avatars for real-world use. She explains why protecting personal likeness and voice matters more than ever, especially as AI tools become more convincing and accessible. Galya stresses the need for consent, encryption, and clear boundaries to keep digital identities safe and organizations accountable.Together, AJ and Galya dig into the risks and rewards of merging human presence with AI. They discuss how thoughtful design and strong security practices can support experts instead of replacing them, and why education and authenticity are key as we build a future where technology and humanity work side by side.Send us a textSupport the show

Security Breach
Security Breach: Strengthening Your Weakest Links

Security Breach

Play Episode Listen Later Feb 5, 2026 32:58


Send us a textWhen we talk about the challenges presented to those trying to secure the operational landscape of manufacturing, it's tough to avoid what I'd call the usual suspects - endpoints, connection points, credentials, vulnerabilities, silos and, of course, the impact of artificial intelligence.And just as there are benefits to discussing these individual aspects, it's equally important to look at things from a bigger picture in tying them all together. This not only helps us strengthen the chain, but appreciate the significance of reinforcing each of those links.Perhaps no one has helped tie all of these different players together better than our guest for this episode. Vinod D'Souza leads the manufacturing and industry vertical for Google Cloud's Office of the CISO. Watch/listen as we discuss:Emerging vulnerabilities and response plans.Segmentation challenges in the era of constant technological expansion.New-age approaches to patching.The connected fibers of artificial intelligence and the human factors of cybersecurity.Addressing IT and OT silos.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.

Cyber Security Headlines
Police question Coupang CEO, Russia bakery cyberattack, Australian real estate scandal

Cyber Security Headlines

Play Episode Listen Later Feb 2, 2026 7:33


Coupang CEO questioned by police regarding data breach probe Cyberattack on large Russian bread factory disrupts deliveries Real estate agents in Australia use apps that leave lease documents at risk Get the show notes here: https://cisoseries.com/cybersecurity-news-police-question-coupang-ceo-russia-bakery-cyberattack-australian-real-estate-scandal/ Huge thanks to our sponsor, Strike48 Strike48 is the Agentic Log Intelligence Platform that actually puts AI agents to work, maximizing log visibility without blowing your budget. Find threats your siloed tools miss. Get started today with pre-built AI agents and workflows that investigate, detect, and respond 24/7 or build your own at strike48.com/security.   

@BEERISAC: CPS/ICS Security Podcast Playlist
A destructive cyberattack in Poland raises NATO 'red-line' questions

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Feb 1, 2026 173:22


Podcast: Three Buddy Problem (LS 39 · TOP 2% what is this?)Episode: A destructive cyberattack in Poland raises NATO 'red-line' questionsPub date: 2026-01-30Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarization(Presented by Material Security: We protect your company's most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.) Three Buddy Problem - Episode 83: Poland's CERT documents a rare, explicit wiper attack on civilians in a NATO country, including detailed attribution of a Russian government op targeting the electric grid in the heart of winter. We examine why this crosses a long-avoided threshold, why attribution suddenly matters again, and what it says about pre-positioned access, vendor insecurity, and the shrinking gap between cyber operations and acts of war. Plus, another Fortinet fiasco, a new batch of Ivanti zero-days under attack, an emergency patch from Microsoft and the return of the mysterious KasperSekrets account. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.Links:Transcript (unedited, AI-generated)Material Security (Use Cases)ESET DynoWiper update: Technical analysis and attributionPoland CERT on Russian wiper attacksPoland blames two Ukrainians allegedly working for Russia for railway blastBritain's New Spy Chief Has a New MissionTwo New Ivanti 0days ExploitedMicrosoft ships emergency Office patch to thwart attacksAnalysis of Single Sign-On Abuse on FortiOSFortinet PSIRT: Administrative FortiCloud SSO authentication bypassDiverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088WhatsApp Strict Account SettingsChina Executes 11 People Linked to Cyberscam Centers in MyanmarSingapore to start caning for scammersGermany on hacking attacks: "We will strike back, including abroad"Acting CISA chief uploaded sensitive files into a public version of ChatGPTTLP BLACKLABScon 2026KasperSekretsThe podcast and artwork embedded on this page are from Security Conversations, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

ESG Now
Cyberattack in Aisle Three

ESG Now

Play Episode Listen Later Jan 30, 2026 12:07


As food retailers work to digitize and enhance their logistics and supply networks, they're becoming more exposed to cybersecurity risks. In this episode, we discuss how a wave of recent cyberattacks has exposed vulnerabilities across the sector — how prepared companies really are, and why investors may want to sit up and take notice.Host: Gabriela de la Serna, MSCI Research & DevelopmentGuest: Cole Martin, MSCI Research & Development

Security Conversations
A destructive cyberattack in Poland raises NATO 'red-line' questions

Security Conversations

Play Episode Listen Later Jan 30, 2026 173:22


(Presented by Material Security: We protect your company's most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.) Three Buddy Problem - Episode 83: Poland's CERT documents a rare, explicit wiper attack on civilians in a NATO country, including detailed attribution of a Russian government op targeting the electric grid in the heart of winter. We examine why this crosses a long-avoided threshold, why attribution suddenly matters again, and what it says about pre-positioned access, vendor insecurity, and the shrinking gap between cyber operations and acts of war. Plus, another Fortinet fiasco, a new batch of Ivanti zero-days under attack, an emergency patch from Microsoft and the return of the mysterious KasperSekrets account. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Cybercrime Magazine Podcast
Cybercrime Wire For Jan. 30, 2026. Cyberattack Hits Large Russian Bread Factory. WCYB Digital Radio

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 30, 2026 1:19


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

The 'X' Zone Radio Show
Rob McConnell Interviews - JOSH BERNSTEIN - The Russian Cyber Attacks on the US

The 'X' Zone Radio Show

Play Episode Listen Later Jan 30, 2026 60:30 Transcription Available


Josh Bernstein is a political analyst and commentator who has examined claims surrounding Russian cyber attacks on the United States, focusing on election interference, information warfare, hacking operations, and digital influence campaigns. Bernstein explores how cyber tactics—ranging from data breaches and disinformation to social media manipulation—have been used as tools of modern geopolitical conflict. His work discusses the national security implications of cyber warfare, the vulnerabilities of democratic institutions, and the challenges governments face in responding to foreign digital threats in an increasingly connected world.Become a supporter of this podcast: https://www.spreaker.com/podcast/the-x-zone-radio-tv-show--1078348/support.Please note that all XZBN radio and/or television shows are Copyright © REL-MAR McConnell Meda Company, Niagara, Ontario, Canada – www.rel-mar.com. For more Episodes of this show and all shows produced, broadcasted and syndicated from REL-MAR McConell Media Company and The 'X' Zone Broadcast Network and the 'X' Zone TV Channell, visit www.xzbn.net. For programming, distribution, and syndication inquiries, email programming@xzbn.net.We are proud to announce the we have launched TWATNews.com, launched in August 2025.TWATNews.com is an independent online news platform dedicated to uncovering the truth about Donald Trump and his ongoing influence in politics, business, and society. Unlike mainstream outlets that often sanitize, soften, or ignore stories that challenge Trump and his allies, TWATNews digs deeper to deliver hard-hitting articles, investigative features, and sharp commentary that mainstream media won't touch.These are stories and articles that you will not read anywhere else.Our mission is simple: to expose corruption, lies, and authoritarian tendencies while giving voice to the perspectives and evidence that are often marginalized or buried by corporate-controlled media

Risky Business News
Risky Bulletin: Cyberattack cripples cars across Russia

Risky Business News

Play Episode Listen Later Jan 27, 2026 7:43


A cyberattack has crippled cars in Russia, Microsoft patches an Office zero-day, WhatsApp rolls out an account lockdown feature, and a handful of Chrome extensions steal ChatGPT auth tokens. Show notes Risky Bulletin: Cyberattack cripples cars across Russia

Cyber Security Headlines
Microsoft Patch problems, Sandworm hits Poland, Dresden Museum cyberattack

Cyber Security Headlines

Play Episode Listen Later Jan 26, 2026 7:58


Microsoft Outlook and boot problems Sandworm likely behind cyberattack on Poland's power grid Dresden museum network suffers cyberattack Huge thanks to our episode sponsor, Conveyor Ever wish your customers could magically get answers to their own security questionnaires before they ever hit your desk?   We've heard this wish from hundreds of teams so Conveyor just launched a new Trust Center AI Agent.    The Agent lives in your Conveyor hosted Trust Center and answers customer questions, surfaces documents and even completes full questionnaires instantly so customers can finish their review without your intervention.   Join top tech companies using Conveyor today like Atlassian, Zapier and more. Check it out at Conveyor.com   Find the stories behind the headlines at CISOseries.com.

Tech Lead Journal
Your Home Is Launching Cyber Attacks (And You Don't Know It)

Tech Lead Journal

Play Episode Listen Later Jan 26, 2026 93:18


(05:22) Brought to you by CyberhavenAI is exfiltrating your data in fragments. Not one big breach — a prompt here, a screenshot there, a quiet export into a shadow AI tool. Every week, AI makes your team faster and your data harder to see. Files are moved to new SaaS apps, models are trained on sensitive inputs, and legacy DLP is blind to the context that matters most.On February 3rd at 11 am Pacific, Cyberhaven is unveiling a unified DSPM and DLP platform, built on the original data lineage, so security teams get X-ray vision into how data actually moves — and can stop risky usage in real time.Watch the launch live at cyberhaven.com/techleadjournal.Did you know Singapore is one of the world's top countries launching cyberattacks? Not as a victim, but as the source. Your routers, smart TVs, robot vacuums, or network-attached storage could be part of a massive botnet right now.In this eye-opening episode, Joseph Yap, founder of Otonata and cybersecurity expert, reveals the hidden cyber threat lurking in our homes. He reveals how everyday devices from routers to smart TVs become attack weapons. He explains why Singapore's excellent infrastructure ironically makes it attractive for hackers and shares practical steps to protect your network. From residential proxies renting out your internet connection to teenagers running ransomware gangs, this conversation exposes the gap between our connected lives and our digital security practices.Key topics discussed:Why Singapore, Indonesia, and Vietnam are top cyberattack source countriesWhy Singapore's infrastructure makes it attractive for hackersHow 700,000+ compromised devices launch 30 terabits per second DDoS attacksThe rise of residential proxies and dark web rental of home networksHow hackers exploit publicly disclosed vulnerabilities in outdated firmwareWhy AI is lowering the barrier to entry for hackersWhat makes executives and high-net-worth individuals attractive targetsPractical steps to audit and protect your home networkTimestamps:(00:00:00) Trailer & Intro(00:02:40) How Can I Apply Journalism Skills to Tech(00:06:14) Why is Curiosity Essential for Tech Leaders?(00:08:48) Why is Singapore a Top Source for Cyber Attacks?(00:12:11) What Makes Singapore Attractive for Cyber Attacks?(00:16:39) How Many Devices in Singapore are Already Compromised?(00:20:40) How Can I Tell if My Home Network is Compromised?(00:30:13) Which Devices are Hackers' Favorite Entry Points?(00:33:18) What is a Residential Proxy and Why Should I Care?(00:36:27) How do Hackers Actually Break into My Network?(00:47:47) Why are Executives and High-Net-Worth Individuals Prime Target?(00:55:12) Why isn't Singapore's Cyber Attack Problem in the News?(00:59:26) Can Internet Providers Stop These Attacks?(01:02:16) What Can I Do to Protect My Home Network?(01:05:19) How Do I Protect My Network-Attached Storage (NAS)?(01:10:41) How is AI Changing the Cyber Attack Landscape?(01:17:35) How Can Otonata Help Protect My Home Network?(01:23:39) What are Real-World Examples of Home Network Compromises?(01:28:20) 3 Tech Lead Wisdom_____Joseph Yap's BioWith 20+ years in Operations and Supply Chain, Joseph Yap founded Otonata (https://otonata.com) after realizing how vulnerable home networks are to security breaches. Otonata brings corporate-grade cybersecurity to homes using digital hygiene and lean management principles, protecting dozens of households from growing threats posed by AI, smart devices, and expanding attack surfaces.Follow Joseph:LinkedIn – linkedin.com/in/-joseph-yapOtonata – https://otonata.com/Free Hack Check – https://otonata.com/hack-checkLike this episode?Show notes & transcript: techleadjournal.dev/episodes/245.Follow @techleadjournal on LinkedIn, Twitter, and Instagram.Buy me a coffee or become a patron.

Raj Shamani - Figuring Out
Modern Wars, Cyber Attacks, Semiconductors & India's Global Role | Kirttan Shah | FO462 Raj Shamani

Raj Shamani - Figuring Out

Play Episode Listen Later Jan 24, 2026 140:04


This episode is brought to you by Urban Platter, to know more checkout : https://bit.ly/urban-platter-figuring-outGuest Suggestion Form: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://forms.gle/bnaeY3FpoFU9ZjA47⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Trying to grow your Social Media? Talk to Us - https://forms.gle/sJfksjy4K3rpNnvF9Disclaimer: This video is intended solely for educational purposes and opinions shared by the guest are his personal views. We do not intent to defame or harm any person/ brand/ product/ country/ profession mentioned in the video. Our goal is to provide information to help audience make informed choices. The media used in this video are solely for informational purposes and belongs to their respective owners.Order 'Build, Don't Talk' (in English) here: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://amzn.eu/d/eCfijRu⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Order 'Build Don't Talk' (in Hindi) here: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://amzn.eu/d/4wZISO0⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Follow Our Whatsapp Channel: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.whatsapp.com/channel/0029VaokF5x0bIdi3Qn9ef2J⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Subscribe To Our Other YouTube Channels:-⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.youtube.com/@rajshamaniclips⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.youtube.com/@RajShamani.Shorts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠(00:00) - Intro(03:53) - Raj Shamani x Kirttan Shah Begins(05:15) - Problems in the US(12:18) - Why Is the US Behind Oil?(17:44) - Power of the Dollar(25:47) - The Reserve Currency Changes Every 100 Years(28:00) - The US as an Unstable Partner(33:51) - US-Led Economy vs China-Led Economy(40:30) - The Greenland Issue(47:32) - The Venezuela Issue(1:00:33) - Elon Musk and Donald Trump Relationship(1:04:30) - Semiconductors and Taiwan(1:13:20) - US, Technology Advantage, and Gold(1:17:21) - Silver Hype(1:24:30) - Economic Decoupling and a New Reserve Currency(1:36:35) - India's Population Problem and Strength(1:40:26) - Innovation in China and the US(1:42:14) - The Future of IT Companies and Their Problems(1:52:23) - How to Make Money and Invest in India(2:02:51) - Why All Markets Are Profitable and AI ROI(2:14:46) - Will the US Deliver Better Returns?(2:18:14) - Closing Thoughts(2:18:33) - BTS(2:19:44) - OutroIn today's episode, we have Kirttan Shah, Co-Founder of FPA Edutech and Founder of Truvanta Wealth, to break down global power, geopolitics, and money in a way that is simple, logical, and grounded in first principles.Subscribe for more such conversations.Follow Kirttan Shah Here:Instagram: https://www.instagram.com/kirtanshahcfp/LinkedIn: https://www.linkedin.com/in/kirtanshahcfp/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠About Raj ShamaniRaj Shamani is an Entrepreneur at heart that explains his expertise in Business Content Creation & Public Speaking. He has delivered 200+ speeches in 26+ countries. Besides that, Raj is also an Angel Investor interested in crazy minds who are creating a sensation in the Fintech, FMCG, & passion economy space.To Know More,Follow Raj Shamani On ⤵︎Instagram @RajShamani ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.instagram.com/rajshamani/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Twitter @RajShamani ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/rajshamani⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Facebook @ShamaniRaj ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.facebook.com/shamaniraj⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠LinkedIn - Raj Shamani ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/rajshamani/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠About Figuring OutFiguring Out Podcast is a Candid Conversations University where Raj Shamani brings raw conversations with the Top 1% in India.

Unspoken Security
Evolution of the Security Integration Landscape

Unspoken Security

Play Episode Listen Later Jan 22, 2026 55:02 Transcription Available


In this episode of Unspoken Security, host AJ Nash sits down with Eric Yunag, EVP of Product and Services at Convergint. They explore how security integration is changing as organizations face a fast-moving threat landscape and rising expectations from leaders and regulators. Eric explains why today's environment demands a new approach—one that connects hardware, software, and services in a more dynamic, real-time ecosystem.Eric shares how integrators help companies navigate not just the technical, but also the legal and operational complexity of modern security. He describes how shifting to cloud platforms, unifying physical and digital identities, and balancing privacy with business outcomes all add new layers of challenge. The conversation highlights the growing use of AI and “visual intelligence”—using camera data for both security and business insight—as organizations look to do more with their investments.Throughout the discussion, Eric makes the case for trusted, neutral advisors who help organizations build smarter, more connected security systems. He shows how today's integrators are positioned to guide clients through tough choices, benchmark best practices, and unlock value that goes far beyond traditional security.Send us a textSupport the show

Risky Business
Risky Business #821 -- Wiz researchers could have owned every AWS customer

Risky Business

Play Episode Listen Later Jan 21, 2026 64:46


In this week's show, Patrick Gray and Adam Boileau discuss the week's cybersecurity news, joined by a special guest. BBC World Cyber Correspondent Joe Tidy is a long time listener and he pops in for a ride-along in the news segment plus a chat about his new book. This week news includes: Did the US cyber Venezuela's power grid, or do they just want us to think they coulda? US govt might boycott the RSAC Conference ‘cause Jen Easterly being CEO makes them mad MS Patch Tuesday fixes CVSS5.5 bug and … stops you shutting down Wiz pulls off cloud stunt hack that ends with control of everyone's AWS console Millions of Bluetooth devices that use Google's Fast Pairing will pair with anyone, any time GNU inet-tools' telnetd parties like it's 2007, and brings -f root unauthed remote login back Thinkst is this week's sponsor, and long time friend of the show Haroon Meer joins. As always they're polishing their Canary tokens - adding breadcrumbs to lead you to them - but they're also a bunch of giant nerds who now run South Africa's Computer Olympiad. This episode is also available on Youtube. Show notes Cyberattack in Venezuela Demonstrated Precision of U.S. Capabilities - The New York Times Why I'm withholding certainty that “precise” US cyber-op disrupted Venezuelan electricity - Ars Technica Layered Ambiguity: US Cyber Capabilities in the Raid to Extract Maduro from Venezuela | Royal United Services Institute Former CISA Director Jen Easterly Will Lead RSAC Conference | WIRED Trump officials consider skipping premier cyber conference after Biden-era cyber leader named CEO - Nextgov/FCW Federal agencies ordered to patch Microsoft Desktop Windows Manager bug | The Record from Recorded Future News Windows 11 shutdown bug forces Microsoft into damage control • The Register CodeBreach: Supply Chain Vuln & AWS CodeBuild Misconfig | Wiz Blog Critical flaw in AWS Console risked compromise of build environment | Cybersecurity Dive Never-before-seen Linux malware is “far more advanced than typical” - Ars Technica VoidLink: Evidence That the Era of Advanced AI-Generated Malware Has Begun - Check Point Research Hundreds of Millions of Audio Devices Need a Patch to Prevent Wireless Hacking and Tracking | WIRED Critical flaw in Fortinet FortiSIEM targeted in exploitation threat | Cybersecurity Dive CVE-2025-64155: 3 Years of Remotely Rooting the FortiSIEM A single click mounted a covert, multistage attack against Copilot - Ars Technica Police raid homes of alleged Black Basta hackers, hunt suspected Russian ringleader | The Record from Recorded Future News Jordanian initial access broker pleads guilty to helping target 50 companies | The Record from Recorded Future News Supreme Court hacker posted stolen government data on Instagram | TechCrunch oss-sec: GNU InetUtils Security Advisory: remote authentication by-pass in telnetd How crypto criminals stole $700 million from people - often using age-old tricks Ctrl + Alt + Chaos: How Teenage Hackers Hijack the Internet

IJIS Sounds of Safety Podcast
Malware 101: How AI Is Reshaping Cyberattacks

IJIS Sounds of Safety Podcast

Play Episode Listen Later Jan 21, 2026 25:35


In this episode, we explore how threat actors are using AI to launch smarter, more persistent cyberattacks. From automated reconnaissance to evasive malware, AI is giving attackers new ways to infiltrate systems and steal data. Join Larry Zorio and Jeramy Cooper-Leavitt from the IJIS Cybersecurity Working Group as they reveal the latest AI-driven tactics—and why training your team to spot and stop these threats is critical in today's digital age.

Security Squawk
Ireland Cyberattack Exposes a Bigger Truth & Businesses Still Aren't Ready

Security Squawk

Play Episode Listen Later Jan 21, 2026 35:50


Cybersecurity failures are no longer just IT problems. They are legal, financial, and leadership failures. In this episode of Security Squawk, we break down how a ransomware attack on Ireland's Office of the Ombudsman delayed justice for citizens and what that incident reveals about preparedness, accountability, and real-world consequences of cyber risk. We start with the Ireland cyberattack that forced a key public watchdog agency to halt case processing for months. This was not a minor disruption. Systems were taken offline, legal action was required to prevent potential data leaks, and people relying on the system became collateral damage. The story highlights a hard truth. When cybersecurity fails, mission failure follows. Government or private sector, the outcome is the same. From there, we zoom out to the private sector where the warning signs are flashing red. New survey data shows cybersecurity litigation risk is rising faster than any other legal exposure for U.S. businesses. Corporate legal teams expect cyber and data privacy disputes to intensify, yet fewer of them feel prepared compared to last year. That gap tells us everything we need to know. Companies understand the risk is growing, but they are not investing or aligning fast enough to reduce it. We also examine the dangerous confidence gap in middle market firms. Nearly one in five experienced a cyber incident, yet almost all executives still believe their security posture is strong. Confidence without controls is not resilience. It is exposure. This disconnect raises serious questions about leadership accountability and how security decisions are being made at the executive level. The episode also dives into research showing that many top U.S. companies still fail basic cybersecurity hygiene. Reused passwords, outdated software, poor configuration, and unpatched systems remain common in 2025. These are not advanced threats. These are fundamentals. When organizations cannot execute the basics, the issue is not technical skill. It is culture, discipline, and leadership priority. We discuss the ongoing wave of data breaches affecting insurance, healthcare, and business services organizations, exposing millions of records. These incidents are proof that many companies remain reactive instead of proactive. Third-party risk, weak internal controls, and poor governance continue to amplify the damage. Finally, we tackle a growing blind spot. AI security governance. As businesses rapidly adopt AI tools, many still lack formal rules, oversight, or risk frameworks. Without governance, innovation turns into liability. Attackers move faster than policy, and organizations are left exposed. This episode is a wake-up call for business leaders, MSPs, IT professionals, and security decision-makers. Cybersecurity is no longer about compliance checklists or technology spend. It is about reducing real risk, protecting trust, and leading responsibly. If you want to understand why cyberattacks now lead to lawsuits, why confidence is not the same as security, and why leadership decisions matter more than ever, this episode delivers the insight you need. Subscribe, follow, and share Security Squawk. And if you want to support the show, you can always buy me a coffee at buymeacoffee.com/securitysquawk.

CERIAS Security Seminar Podcast
Vijayanth Tummala, Evaluating The Impact of Cyberattacks On AI-based Machine Vision Systems: A Case Study of Threaded Fasteners

CERIAS Security Seminar Podcast

Play Episode Listen Later Jan 21, 2026 32:33


AI-driven machine vision systems are becoming essential in mechanical engineering applications such as fastener classification, yet their increasing connectivity exposes them to adversarial cyberattacks. Model evasion attacks like FGSM can subtly alter input images and cause misclassification, raising concerns about reliability in automated manufacturing.This talk focuses on the role of Explainable AI and human-in-the-loop strategies in detecting and mitigating such attacks. In the presented case study, an EfficientNet-B0 fastener classification model is examined using Grad-CAM visualizations to determine whether shifts inactivation patterns can reveal adversarial manipulation. The study evaluates how FGSM-generated images affect model accuracy and confidence while assessing the XAI system's ability to highlight abnormal regions of attention and the potential for human-in-the-loop approaches to be utilized with XAI techniques as a practical path to strengthening the resilience of AI-based machine vision systems in manufacturing. About the speaker: Dr. Vijayanth Tummala is a Researcher in Cybersecurity and Human-AI Interaction. His research spans artificial intelligence and cybersecurity across interdisciplinary areas, including AI and Cybersecurity leadership, AI literacy, and computer vision applications. He was one of only seven recipients to receive the Best Paper Award in the AI track at ASME's IMECE conference held in November 2024, which features over 2,400 submissions annually. Previously, he held key leadership roles, including leading the NSA CAE-CD designation, launching graduate programs as part of a $1.5 million EDA grant received by his previous employer, and partnering with the Allen County High-Tech Crimes Unit.

Timcast IRL
WAR WITH IRAN May Have Begun, Cyberattack ON US?! Cell Networks CRASH w/ Arynne Wexler

Timcast IRL

Play Episode Listen Later Jan 15, 2026 121:20


Tim, Phil, Ian & Tate are joined by Arynne Wexler to discuss a potentially developing war with Iran, people betting on the chances of the Islamic Republic collapsing, silver prices skyrocketing and fluctuating and nationwide Verizon outages plunging the country into disarray.   Hosts:  Tim @Timcast (everywhere) Phil @PhilThatRemains (X) Ian @IanCrossland (X) Tate @realTateBrown (everywhere) Producer: Serge @SearchDupre (X) Guest: Arynne Wexler @ArynneWexler (X)

Hacker And The Fed
Cyber Attacks Without a Declaration of War

Hacker And The Fed

Play Episode Listen Later Jan 15, 2026 47:32


In this episode, Chris and Hector dig into how cyber operations are no longer a background activity but a core part of modern conflict. They break down reported US cyber actions tied to operations in Venezuela, Chinese state sponsored email intrusions targeting congressional staff, and the global scam economy built on human trafficking and crypto fraud. Join our new Patreon! ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.patreon.com/c/hackerandthefed⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Send HATF your questions at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠questions@hackerandthefed.com

Cybercrime Magazine Podcast
Cybercrime Wire For Jan. 15, 2026. Cyberattack Plunged Venezuela Into Darkness. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 15, 2026 1:11


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cybercrime Magazine Podcast
Cyber Ranges in 2026. Cyberattack Rehearsal. Lauri Almann & Daz Preuss, CybExer.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 12, 2026 20:25


Cybercrime Magazine deep dives into cyber ranges with thought leaders Lauri Almann, co-founder and Chairman of the Board, and Daz Preuss, COO, at CybExer, providers of Immersive testing and training environments that improve your cybersecurity skills, build your cyber resilience, and reinforce your defences. This episode is brought to you by CybExer. Learn more about our sponsor at https://cybexer.com

Black Hills Information Security
US Cyberattacks on Venezuela - 2026-01-05

Black Hills Information Security

Play Episode Listen Later Jan 9, 2026 69:23 Transcription Available


Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis

K12 Tech Talk
Episode 245 - New Year, New Cyber Attacks

K12 Tech Talk

Play Episode Listen Later Jan 9, 2026 55:23 Transcription Available


And we're back! We discuss the New Year spike in cyber attacks on schools over the holiday break and practical strategies for vacation periods - automated alerting, third‑party monitoring, suspending or shutting down non‑critical services. Other topics include what to look for when hiring technician, the rise of remote psycho-educational testing, early findings from the E‑Rate cybersecurity pilot, vendor liability caps in data privacy agreements, and a listener email about student account compromises from downloaded apps and VPNs. ———— Sponsored by: Meter - meter.com/k12techtalk Visit meter.com/k12techtalk to book a demo!   Rise Vision - Interactive Digital Signage Templates + Touchscreen Displays ClassLink Lightspeed Fortinet - fortinetpodcast@fortinet.com NTP - dwren@ntp-inc.com ———— Join the K12TechPro Community (exclusively for K12 Tech professionals) Buy some swag (tech dept gift boxes, shirts, hoodies...)!!! Email us at k12techtalk@gmail.com OR our "professional" email addy is info@k12techtalkpodcast.com X @k12techtalkpod Facebook Visit our LinkedIn Music by Colt Ball Disclaimer: The views and work done by Josh, Chris, and Mark are solely their own and do not reflect the opinions or positions of sponsors or any respective employers or organizations associated with the guys. K12 Tech Talk itself does not endorse or validate the ideas, views, or statements expressed by Josh, Chris, and Mark's individual views and opinions are not representative of K12 Tech Talk. Furthermore, any references or mention of products, services, organizations, or individuals on K12 Tech Talk should not be considered as endorsements related to any employer or organization associated with the guys.

Unspoken Security
Do We Even Need Operational Technology-Specific Threat Intelligence?

Unspoken Security

Play Episode Listen Later Jan 8, 2026 71:55


In this episode of Unspoken Security, host AJ Nash sits down with Danielle Jablanski from STV to break down the hard truths of operational technology (OT) security. Danielle explains why critical infrastructure - from water and transportation to manufacturing - remains vulnerable, tracing the challenge back to legacy systems, vendor complexity, and the lack of clear, industry-wide standards. She argues that many organizations have poor visibility into their assets and often rely on outdated assumptions about risk and business impact.Danielle calls out the pitfalls of flashy security solutions and emphasizes the need for basic, proven practices like network segmentation and clear asset management. She highlights the disconnect between IT and OT, showing how real-world safety and business operations depend on bridging this gap with honest communication and practical controls. Rather than chasing after hype, Danielle urges leaders to focus on building resilience: knowing what matters, assessing real risks, and strengthening what you can control.Throughout the conversation, Danielle offers a grounded perspective on why OT security demands more than checklists and compliance. She points to the need for shared data, better early warning systems, and a broader base of professionals willing to dig into the complexities - before an incident forces everyone's hand.Send us a textSupport the show

The CyberWire
Cyberattack in the fast lane.

The CyberWire

Play Episode Listen Later Jan 7, 2026 31:29


Jaguar Land Rover reveals the fiscal results of last year's cyberattack. A Texas gas station chain suffers a data spill. Taiwan tracks China's energy-sector attacks. Google and Veeam push patches. Threat actors target obsolete D-Link routers. Sedgwick Government Solutions confirms a data breach. The U.S. Cyber Trust Mark faces an uncertain future. Google looks to hire humans to improve AI search responses. Our guest is Deepen Desai, Chief Security Officer of Zscaler, discussing what's powering enterprise AI in 2026. AI brings creative cartography to the weather forecast. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On today's Industry Voices, we are joined by Deepen Desai, Chief Security Officer of Zscaler, discussing what's powering enterprise AI in 2026. To learn more on this topic, be sure to check out Zscaler's report here. Listen to the full conversation here. Selected Reading Jaguar Land Rover wholesale volumes plummet 43% in cyberattack aftermath (The Register) Major Data Breach Hits Company Operating 150 Gas Stations in the US (Hackread) Taiwan says China's attacks on its energy sector increased tenfold (Bleeping Computer) Google Patches High-Severity Chrome WebView Flaw CVE-2026-0628 in the Tag Component (Tech Nadu) Several Code Execution Flaws Patched in Veeam Backup & Replication (SecurityWeek) New D-Link flaw in legacy DSL routers actively exploited in attacks (Bleeping Computer) Sedgwick confirms breach at government contractor subsidiary (Bleeping Computer) FCC Loses Lead Support for Biden-Era IoT Security Labeling (GovInfoSecurity) Google Search AI hallucinations push Google to hire "AI Answers Quality" engineers (Bleeping Computer) ‘Whata Bod': An AI-generated NWS map invented fake towns in Idaho (The Washington Post) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Cyber Security Headlines
UK cyber reset, no MFA is a problem, US cyberattacks on display

Cyber Security Headlines

Play Episode Listen Later Jan 7, 2026 7:19


The UK hits reset on cybersecurity No MFA, Know Problems US may have coordinated cyberattacks with Maduro's arrest Huge thanks to our sponsor, Hoxhunt A small tip for CISOs: if you're unsure whether your security training is actually reducing phishing risk, check out what Qualcomm achieved with Hoxhunt. They took their 1,000 highest-risk users from consistent under-performers to outperforming the rest of the company, driving measurable human risk reduction and earning a CSO50 Award. See the Qualcomm case at hoxhunt.com/qualcomm

Business daily
E-commerce giant Coupang offers €1 billion compensation scheme after massive data breach

Business daily

Play Episode Listen Later Dec 29, 2025 5:33


Over a month after announcing a massive data breach affecting 34 million of its users, South Korean e-commerce company Coupang announced this Monday it would offer 1.69 trillion won in compensation (around €1 billion) to customers in the form of vouchers. Also in this edition, former EU digital chief Thierry Breton gives his first interview since being sanctioned by the US. Plus, Nokia's archived mobile design plans are now open to the public.

The CyberWire
Excel-lerating cyberattacks. [Research Saturday]

The CyberWire

Play Episode Listen Later Dec 27, 2025 23:43


While our team is out on winter break, please enjoy this episode of Research Saturday. This week, we are joined by ⁠Tom Hegel⁠, Principal Threat Researcher from ⁠SentinelLabs⁠ research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belarusian government espionage, is actively targeting Ukrainian military and government entities as well as Belarusian opposition activists using weaponized Excel documents. SentinelLabs identified new malware variants and tactics, including obfuscated VBA macros that deploy malware via DLL files, with payload delivery seemingly controlled based on a target's location and system profile. The campaign, which began preparation in mid-2024 and became active by late 2024, appears to be an evolution of previous Ghostwriter operations, combining disinformation with cyberattacks to further political and military objectives. The research can be found here: ⁠Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition Learn more about your ad choices. Visit megaphone.fm/adchoices

Research Saturday
Excel-lerating cyberattacks.

Research Saturday

Play Episode Listen Later Dec 27, 2025 23:43


While our team is out on winter break, please enjoy this episode of Research Saturday. This week, we are joined by ⁠Tom Hegel⁠, Principal Threat Researcher from ⁠SentinelLabs⁠ research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belarusian government espionage, is actively targeting Ukrainian military and government entities as well as Belarusian opposition activists using weaponized Excel documents. SentinelLabs identified new malware variants and tactics, including obfuscated VBA macros that deploy malware via DLL files, with payload delivery seemingly controlled based on a target's location and system profile. The campaign, which began preparation in mid-2024 and became active by late 2024, appears to be an evolution of previous Ghostwriter operations, combining disinformation with cyberattacks to further political and military objectives. The research can be found here: ⁠Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition Learn more about your ad choices. Visit megaphone.fm/adchoices

The Hartmann Report
Shadow Diplomacy and Betrayal of Allies

The Hartmann Report

Play Episode Listen Later Dec 26, 2025 58:10


Lev Parnas, Ukrainian-American businessman turned political activist, and author joins Thom to expose the reality of Donald's duplicity with Ukraine. Is Russia already at war with us? Tanks aren't rolling through cities, but cyberattacks, proxy wars, sanctions, and covert operations are everywhere. Has the world already crossed the line into global war between the United States and Russia? — and why governments may be afraid to say it out loud.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Unspoken Security
Can We Social Engineer the Bad Guys to Shut Them Down? (Encore of Ep 32)

Unspoken Security

Play Episode Listen Later Dec 25, 2025 66:54 Transcription Available


In this encore presentation of Unspoken Security Episode 32 (originally published on 3 April 2025), host AJ Nash sits down with Chris Birch, an intelligence practitioner with nearly 30 years of experience, to discuss the ever-evolving landscape of social engineering. Chris's unique perspective comes from leading teams that actively engage with threat actors, turning the tables on those who typically exploit vulnerabilities.Chris details how social engineering is simply human manipulation, a skill honed from birth. He explains how attackers leverage fear and greed, the fastest and cheapest ways to manipulate individuals. He also dives into how attacks have evolved, highlighting the dangers of increasingly sophisticated tactics like deepfakes and the blurring lines between legal and illegal applications of social engineering.The conversation also explores the crucial role of organizational culture in cybersecurity. Chris emphasizes that awareness, not just education, is key to defense. He advocates for sharing threat intelligence widely within organizations and across industries, empowering everyone to become a sensor against social engineering attempts. Chris also shares a surprising personal fear, offering a lighthearted end to a serious discussion.Send us a textSupport the show

AP Audio Stories
Cyberattack disrupts France's postal service and banking during Christmas rush

AP Audio Stories

Play Episode Listen Later Dec 22, 2025 0:41


AP correspondent Charles de Ledesma reports a suspected cyberattack has had major impact on France's postal network just days before Christmas.

Cybercrime Magazine Podcast
Cybercrime Wire For Dec. 19, 2025. Cyberattack Hits NHS England Tech Provider. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Dec 19, 2025 0:55


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

The Free Lawyer
How Can Lawyers Protect Themselves from Cyber Attacks? #378

The Free Lawyer

Play Episode Listen Later Dec 18, 2025 30:23


In this episode of "The Free Lawyer" podcast, host Gary interviews Valentina Flores, CEO of Red Sentry. Valentina shares her journey from law enforcement to leading a proactive cybersecurity company, emphasizing the importance of ethical hacking and prevention for law firms. She offers practical tips—like enabling multi-factor authentication, limiting data access, and preparing response plans—to help lawyers protect sensitive information. Valentina also discusses the collaborative nature of cybersecurity, the human element in defense, and aligning security practices with core values, making cybersecurity accessible and actionable for legal professionals.Valentina Flores is the CEO and Co-Founder of Red Sentry, a proactive cybersecurity company that breaks into your network, so hackers never get the chance. Before protecting companies, she served as a detective on joint federal task forces, tracking cybercriminals through digital back-alleys. Now a public speaker on hacker psychology, a two-time award-winning cybersecurity leader, and a fierce advocate for women in tech, Valentina is redefining what leadership looks like in the industry, championing smarter and more accessible security for all.Transition from Detective to Cybersecurity (00:01:33) What is Penetration Testing? (00:02:56) Success Rate and Client Vulnerabilities (00:03:35)Understanding Hacker Psychology (00:05:30) Why Law Firms Are Targets (00:06:38) Triggers for Law Firms to Seek Help (00:07:46) Compliance vs. Proactive Security (00:09:09) Human Element in Cybersecurity (00:10:16) Making Clients Comfortable with Ethical Hacking (00:11:55) Emerging Threats and the Future of Cybersecurity (00:13:25) Cybersecurity for Small and Medium Businesses (00:14:43) Diversity in Tech and Cognitive Diversity (00:16:37) Awards and People-First Leadership (00:17:27) Leadership in Cybersecurity vs. Traditional Business (00:18:20) Role of Coaching and Mentorship (00:19:28) Annual Testing and Follow-Up (00:20:21) Prioritizing Cybersecurity in Law Firms (00:21:13) Collaboration vs. Competition in Cybersecurity (00:22:17) Top Three Cybersecurity Actions for Lawyers (00:23:29) First Steps for the Unprepared (00:25:39) What is Penetration Testing? (Clarification) (00:26:39) Freedom and Work-Life Balance (00:27:06) Aligning Practice with Values (00:27:51) You can find The Free Lawyer Assessment here- https://www.garymiles.net/the-free-lawyer-assessmentWould you like to learn what it looks like to become a truly Free Lawyer? You can schedule a complimentary call here: https://calendly.com/garymiles-successcoach/one-one-discovery-callWould you like to learn more about Breaking Free or order your copy? https://www.garymiles.net/break-free

Cybercrime Magazine Podcast
Cybercrime Wire For Dec. 16, 2025. Cyberattack Hits Petróleos de Venezuela, S.A.. WCYB Digital Radio

Cybercrime Magazine Podcast

Play Episode Listen Later Dec 16, 2025 1:22


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Graham Allen’s Dear America Podcast
This GOP SUCKS!! Time For A Redo! + Now Candace Hates The Bible?!

Graham Allen’s Dear America Podcast

Play Episode Listen Later Dec 12, 2025 92:42


Support a coffee company that supports America and American values! Go to www.blackoutcoffee.com/Graham  Use Code Graham for 20% off your first order Text Graham to 989898 now to recieve a 25 page info kit from Birch Gold. Free silver with purchased till 22 Dec Protect your devices from Cyberattacks! Go to www.webroot.com/graham Get 60% off now!   Socials: Twitter: www.twitter.com/grahamallen_1 FB: www.facebook.com/grahamallenofficial IG: www.instagram.com/grahamallen1 Tiktok: www.tiktok.com/@thegrahamallen Rumble: www.rumble.com/user/grahamallenofficial    

The World and Everything In It
12.9.25 The complex framework behind military operations, AI in cyberattacks, and two unique Christmas albums

The World and Everything In It

Play Episode Listen Later Dec 9, 2025 36:13


Behind the second strike, cyberattacks with artificial intelligence, and two recent Christmas albums. Plus, Seth Troutt on grateful feasting, the stinky smell of success, and the Tuesday morning newsSupport The World and Everything in It today at wng.org/donateAdditional support comes from I Witness: The Long Shore: A faith-based audio drama that brings history to life. iwitnesspod.comFrom Ridge Haven Camp in North Carolina and Iowa. Winter Camp starts December 29th. Registration open at ridgehaven.orgAnd from His Words Abiding in You, a Bible memorization podcast designed for truck drivers. His Words Abiding in You … on all podcast apps.

Learn French with daily podcasts
Cyberattaque Majeure Déjouée (Major Cyberattack Thwarted)

Learn French with daily podcasts

Play Episode Listen Later Dec 8, 2025 3:53


Une cellule de crise interministérielle a annoncé avoir déjoué une cyberattaque sophistiquée visant des infrastructures nationales sensibles. Les experts attribuent l'opération à un État étranger hostile.Traduction:An interministerial crisis unit announced it thwarted a sophisticated cyberattack targeting sensitive national infrastructure. Experts are attributing the failed operation to a hostile foreign state actor. Hébergé par Acast. Visitez acast.com/privacy pour plus d'informations.

Everyday AI Podcast – An AI and ChatGPT Podcast
Gemini 3 close to release, OpenAI drops GPT-5.1, Bezos to lead AI startup & more AI News

Everyday AI Podcast – An AI and ChatGPT Podcast

Play Episode Listen Later Nov 17, 2025 43:28


Buckle up AI world. OpenAI released a new model, and apparently they're not done. Google is reportedly dropping Gemini 3 in hours. Jeff Bezos is going back hands-on building a new AI company. And that's just the tip of the AI iceberg this week. Don't get drowned out in the noise. On Monday, we cut it straight with the AI news that matters. Gemini 3 close to release, OpenAI drops GPT-5.1, Bezos to lead new AI startup and more AI News That MattersNewsletter: Sign up for our free daily newsletterMore on this Episode: Episode PageJoin the discussion: Thoughts on this? Join the convo and connect with other AI leaders on LinkedIn.Upcoming Episodes: Check out the upcoming Everyday AI Livestream lineupWebsite: YourEverydayAI.comEmail The Show: info@youreverydayai.comConnect with Jordan on LinkedInTopics Covered in This Episode:OpenAI GPT-5.1 Release & FeaturesGPT-5.1 Personality Controls ExplainedGPT-5.1 Thinking vs. Instant ModelsGoogle NotebookLM Deep Research UpdateNotebookLM Image & File Type SupportAnthropic $50B AI Data Center ExpansionAnthropic Claude Cyberattack IncidentOpenAI ChatGPT Group Chat Pilot LaunchJeff Bezos Project Prometheus AI StartupMeta AI Chief Yann LeCun Exit RumorsMicrosoft Fairwater AI Data Center LaunchGoogle Gemini 3 Anticipated Release UpdateNano Banana Pro Image Generator LeaksMulti-Agent Systems in Gemini EnterpriseOpenAI GPT-5.1 Prompt Cookbook ReleaseTimestamps:00:00 OpenAI Launches GPT 5.107:06 "GPT 5.1: Better, Yet Wordy"09:08 "AI Updates and Insights"11:19 NotebookLM Updates with Spreadsheet Support16:38 "ChatGPT Group Chat Collaboration"21:00 Bezos Co-CEO of AI Startup25:29 Meta's AI Overhaul Sparks Chaos28:13 "AI Exploited for Cyberattacks"30:53 "Microsoft Expands AI Data Centers"35:37 "Nano Banana Pro & Gemini 3"40:12 AI Updates: GPT-5.1 Features40:58 "AI News & Insights Weekly"Keywords:Gemini 3, Google AI, AI model release, GPT 5.1, OpenAI, AI conversational model, reasoning behavior, personality controls, compliance improvements, auto routing feature, thinking vs instant models, data center investment, Anthropic,Send Everyday AI and Jordan a text message. (We can't reply back unless you leave contact info) Head to AI.studio/build to create your first app.  Head to AI.studio/build to create your first app.  Head to AI.studio/build to create your first app. 

WSJ What’s News
China-Backed Hackers Use Anthropic AI to Automate Cyberattacks

WSJ What’s News

Play Episode Listen Later Nov 13, 2025 14:16


P.M. Edition for Nov. 13. AI startup Anthropic said China's state-sponsored hackers used its tools to automate cyberattacks against corporations and governments. WSJ's Sam Schechner reports on the inflection point for hackers' use of AI. Disney's shares fell after a quarterly earnings report that fell short of Wall Street's expectations. And California is eyeing a first-of-its-kind tax on billionaires. WSJ's Paul Kiernan unpacks the ballot initiative for a wealth tax that's already run into steep opposition. Sabrina Siddiqui hosts. Sign up for the WSJ's free What's News newsletter. Learn more about your ad choices. Visit megaphone.fm/adchoices

The John Batchelor Show
84: SHOW 11-12-25 CBS EYE ON THE WORLD WITH JOHN BATCHELOR THE SHOW BEGINS IN THE DOUBTS ABOUT CHINA'S LEADERSHIP. FIRST HOUR 9-915 Allied AI Competition and Submarine Requests. Scott Harold examines the crucial role of allies Japan and South Korea

The John Batchelor Show

Play Episode Listen Later Nov 13, 2025 8:38


SHOW 11-12-25 CBS EYE ON THE WORLD WITH JOHN BATCHELOR 1930 THE SHOW BEGINS IN THE DOUBTS ABOUT CHINA'S LEADERSHIP. FIRST HOUR 9-915 Allied AI Competition and Submarine Requests. Scott Harold examines the crucial role of allies Japan and South Korea in the AI competition against China. Japan is developing locally tailored AI models built on US technology for use in Southeast Asia. South Korea aims to become the third-largest AI power, offering reliable models to counter China's untrustworthy technology. Harold also discusses South Korea's surprising request for nuclear-powered, conventionally armed submarines to track Chinese and North Korean vessels, signaling a greater public willingness to contribute to China deterrence. 915-930 Rare Earths Monopoly and US Strategy. General Blaine Holt discusses China's challenge to the US and its allies regarding rare earths, noting that China previously threatened to cut off supply. The US is securing deals with partners like Australia and is on track to replace China entirely, despite initial processing reliance on Chinese predatory practices. Holt suggests a two-year recovery is conservative, as technology for domestic processing exists. He also notes China's leadership is in turmoil, trying to buy time through trade deals. 930-945 Russian Economic Stagnation and War Finance. Michael Bernstam confirms that the Russian economy is stagnating, expecting no growth for years due to exhausted resources and reliance on military production. Oil and gas revenues are down significantly due to Western sanctions and high discounts, widening the budget deficit. Russia is increasing taxes, including the VAT, which drives inflation in staples. This economic pain damages the popularity of the war by hurting the low-income population—the primary source of military recruitment. 945-1000 Buckley, Fusionism, and Conservative Integrity. Peter Berkowitz explores William F. Buckley's consolidation of the conservative movement through "fusionism"—blending limited government and social conservatism. Buckley purged the movement of anti-Semites based on core principles. Berkowitz uses this historical context to analyze the controversy surrounding Tucker Carlson giving a platform to Nick Fuentes, who openly celebrates Stalin and Hitler. This incident caused division after the Heritage Foundation's president, Kevin Roberts, defended Carlson, prompting Roberts to issue an apology. SECOND HOUR 10-1015 Commodity Markets and UK Political Instability. Simon Constable analyzes rare earth markets, noting China's dominance is achieved through undercutting prices and buying out competitors. Prices for key industrial commodities like copper and aluminum are up, indicating high demand. Constable also discusses UK political instability, noting that Labour Prime Minister Keir Starmer lacks natural leadership and confidence. The major political driver for a potential leadership change is the party's broken promise regarding income taxes, which severely undermines public trust before the next election, 1015-1030 Commodity Markets and UK Political Instability. Simon Constable analyzes rare earth markets, noting China's dominance is achieved through undercutting prices and buying out competitors. Prices for key industrial commodities like copper and aluminum are up, indicating high demand. Constable also discusses UK political instability, noting that Labour Prime Minister Keir Starmer lacks natural leadership and confidence. The major political driver for a potential leadership change is the party's broken promise regarding income taxes, which severely undermines public trust before the next election 1030-1045 Austrian Economics, Von Mises, and the Fight Against Interventionism. Carola Binder discusses the Austrian School of Economics, highlighting its focus on free markets and Ludwig von Mises's opposition to government "interventionism," including rent and price controls. Mises argued these policies distort markets, leading to shortages and inefficiency. Binder emphasizes Mises's belief that economic literacy is a primary civic duty necessary for citizens to reject socialism and interventionist panaceas, especially as new generations are exposed to such ideas. 1045-1100 Austrian Economics, Von Mises, and the Fight Against Interventionism. Carola Binder discusses the Austrian School of Economics, highlighting its focus on free markets and Ludwig von Mises's opposition to government "interventionism," including rent and price controls. Mises argued these policies distort markets, leading to shortages and inefficiency. Binder emphasizes Mises's belief that economic literacy is a primary civic duty necessary for citizens to reject socialism and interventionist panaceas, especially as new generations are exposed to such ideas. THIRD HOUR 1100-1115 Philippine Missile Deployment to Deter China. Captain Jim Fanell reports that the Philippines unveiled its first operational BrahMos anti-ship cruise missile battery in western Luzon to deter Chinese aggression. This supersonic missile system, part of the $7.2 billion Reorizon 3 modernization program, gives the Philippines "skin in the game" near disputed waters like Scarborough Shoal. The deployment signifies a strategy to turn the Philippines into a "porcupine," focusing defense on the West Philippine Sea. The systems are road-mobile, making them difficult to target. 1115-1130 AI, Cyber Attacks, and Nuclear Deterrence. Peter Huessy discusses the challenges to nuclear deterrence posed by AI and cyber intrusions. General Flynn highlighted that attacks on satellites, the backbone of deterrence, could prevent the US from confirming where a launch originated. Huessy emphasizes the need to improve deterrence, noting that the US likely requires presidential authorization for retaliation, unlike potential Russian "dead hand" systems. The biggest risk is misinformation delivered by cyber attacks, although the US maintains stringent protocols and would never launch based solely on a computer warning. 1130-1145 Sudan Civil War, Global Proxies, and Nigerian Violence. Caleb Weiss and Bill Roggio analyze the civil war in Sudan between the SAF and the RSF, noting both factions commit atrocities, including massacres after the capture of El Fasher. The conflict is fueled by opposing global coalitions: the UAE and Russia support the RSF, while Iran, Egypt, and Turkey back the SAF. The Islamic State has called for foreign jihadis to mobilize. Weiss also addresses the complicated violence in Nigeria, differentiating jihadist attacks on Christians from communal farmer-herder conflict. 1145-1200 Sudan Civil War, Global Proxies, and Nigerian Violence. Caleb Weiss and Bill Roggio analyze the civil war in Sudan between the SAF and the RSF, noting both factions commit atrocities, including massacres after the capture of El Fasher. The conflict is fueled by opposing global coalitions: the UAE and Russia support the RSF, while Iran, Egypt, and Turkey back the SAF. The Islamic State has called for foreign jihadis to mobilize. Weiss also addresses the complicated violence in Nigeria, differentiating jihadist attacks on Christians from communal farmer-herder conflict. FOURTH HOUR 12-1215 Corruption, Chinese Influence, and Protests in Serbia. Ivana Stradner discusses protests in Serbia demanding accountability one year after a canopy collapse killed 16 people, with investigations linking the accident to high-level corruption involving a Chinese company. Leader Vučić suppresses discontent by alleging the West is plotting a "color revolution." Although Vučić aligns his heart with Russia and China, he needs EU money for political survival, prompting him to offer weapons to the West and claim Serbia is on the EU path. 1215-1230 The Muslim Brotherhood and Its Global Network. Cliff May discusses the Muslim Brotherhood (MB), the progenitor of Hamas, founded in 1928 after the Ottoman Caliphate's abolition. The MB's goal is to establish a new Islamic empire. Qatar is highly supportive, hosting Hamas leaders, while the UAE and Saudi Arabia have banned the MB. Turkish President Erdoğan is considered MB-adjacent and sympathetic, supporting Hamas and potentially viewing himself as a future Caliph, despite Turkey being a NATO member. 1230-1245 Commercial Space Records and Political Impacts on NASA. Bob Zimmerman covers new records in commercial space: SpaceX achieved 147 launches this year, and one booster tied the Space Shuttle Columbia for 28 reuses. China also set a record with 70 launches but had a failure. Commercial space faced temporary impacts, such as an FAA launch curfew due to a government shutdown and air traffic controller shortages. Zimmerman speculates that Jared Isaacman's conservative-leaning public appearance at Turning Point USA might have convinced Trump to renominate him for NASA Administrator. 1245-100 AM Commercial Space Records and Political Impacts on NASA. Bob Zimmerman covers new records in commercial space: SpaceX achieved 147 launches this year, and one booster tied the Space Shuttle Columbia for 28 reuses. China also set a record with 70 launches but had a failure. Commercial space faced temporary impacts, such as an FAA launch curfew due to a government shutdown and air traffic controller shortages. Zimmerman speculates that Jared Isaacman's conservative-leaning public appearance at Turning Point USA might have convinced Trump to renominate him for NASA Administrator.

The John Batchelor Show
83: AI, Cyber Attacks, and Nuclear Deterrence. Peter Huessy discusses the challenges to nuclear deterrence posed by AI and cyber intrusions. General Flynn highlighted that attacks on satellites, the backbone of deterrence, could prevent the US from confir

The John Batchelor Show

Play Episode Listen Later Nov 13, 2025 9:04


AI, Cyber Attacks, and Nuclear Deterrence. Peter Huessy discusses the challenges to nuclear deterrence posed by AI and cyber intrusions. General Flynn highlighted that attacks on satellites, the backbone of deterrence, could prevent the US from confirming where a launch originated. Huessy emphasizes the need to improve deterrence, noting that the US likely requires presidential authorization for retaliation, unlike potential Russian "dead hand" systems. The biggest risk is misinformation delivered by cyber attacks, although the US maintains stringent protocols and would never launch based solely on a computer warning.