Attack on a computer system
POPULARITY
Categories
Rusland hackt het Poolse stroomnetwerk maar Polen houdt de lichten aan en China infiltreert jarenlang telecom providers wereldwijd met 8 jaar oude vulnerabilities. The Telegraph schreeuwt dat Boris Johnson's telefoon gehackt is, maar het verhaal is interessanter én enger - het gaat niet om telefoons maar om de providers zelf. Marco legt uit waarom ISPs de "holy grail" zijn voor spionage (metadata kills people), Jelle neemt het Telegraph-artikel vakkundig uit elkaar en Ronald vertelt waarom één gecompromitteerde provider toegang geeft tot miljoenen klanten. Van TACACS+ traffic capture tot GRE tunnels, van Cisco Guest Shell containers tot BGP routing manipulatie - dit is "one of the more successful campaigns in the history of espionage" en het had voorkomen kunnen worden door gewoon te patchen. AIVD en MIVD tekenden mee op de advisory, dus ja, dit raakt ook Nederland. Bronnen Sandworm Poland Power Grid - SecurityWeek: "Russian Sandworm Hackers Blamed for Cyberattack on Polish Power Grid" (23 jan 2026): https://www.securityweek.com/russian-sandworm-hackers-blamed-for-cyberattack-on-polish-power-grid/ Salt Typhoon - Telecom Espionage - The Telegraph: "China hacked Downing Street phones for years" (27 jan 2026): https://www.telegraph.co.uk/news/2026/01/26/china-hacked-downing-street-phones-for-years/ - AIVD/MIVD: "Nederlandse providers doelwit van Salt Typhoon": https://www.aivd.nl/actueel/nieuws/2025/08/28/nederlandse-providers-doelwit-van-salt-typhoon - Joint Cybersecurity Advisory: CISA/NSA/FBI/NCSC-UK/AIVD/MIVD + 15 landen - "Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide" - CVE-2024-21887: Ivanti Connect Secure command injection - CVE-2024-3400: Palo Alto Networks GlobalProtect RCE - CVE-2023-20198 & CVE-2023-20273: Cisco IOS XE authentication bypass + privilege escalation - CVE-2018-0171: Cisco IOS Smart Install RCE (8 jaar oud!)
Bill Thompson is a retired Chief Warrant Officer 4. He is also a former Cyber Network Operations advisor and program evaluator at DARPA with experience in the fields of AI, Signals, and Human Intelligence. He is also the founder of the Spartan Forge hunting app: https://spartanforge.ai/ Change Agents is an IRONCLAD Original Chapters: (01:03) What Is DARPA? (05:58) Drone Warfare Ukraine (13:20) The Dangers of Terrorists Using Drones (16:50) Smartphone Surveillance in the Maduro Raid (26:00) Using the Internet in Authoritarian Countries (31:50) Spying on Cell Phones and Stealing Data (36:50) Choosing Targeted People to Spy On (39:35) The Vulnerability of Infrastructure to Cyberattacks (46:35) How Can You Protect Your Data? Subscribe: Subscribe on Apple Podcasts: https://podcasts.apple.com/us/podcast/change-agents-with-andy-stumpf/id1677415740 Subscribe on Spotify: https://open.spotify.com/show/3SKmtN55V2AGbzHDo34DHI?si=5aefbba9abc844ed Sponsors: Firecracker Farm Use code IRONCLAD to get 15% off your first order at https://firecracker.farm/ GHOSTBED: Go to https://www.GhostBed.com/CHANGEAGENTS and use code CHANGEAGENTS for an extra 15% off sitewide. Norwood Sawmills: Learn more about Norwood Sawmills and how you can start milling your own lumber at https://norwoodsawmills.com/ Learn more about your ad choices. Visit megaphone.fm/adchoices
Cyber readiness is rocketing up the agenda for boards in 2026. We explore cyber readiness including new regulatory developments, trends in cyber threats, and practical defences against attacks. In this episode of our UK Governance & Compliance mini-series, we explore cyber readiness as one of the top risk-related priorities for boards in 2026. We look at the sobering costs of large disruptions —noting the cause is often small-scale security lapses. We explore the changing cyber landscape including the UK’s expanding Cyber Resilience Bill and the shift to operational disruption as the primary threat. Plus, we provide practical guidance for boards. Podcast host Will Chalk is joined by John Macpherson, an Ashurst risk advisory partner in Sydney. Also joining the conversation are London colleagues Rhiannon Webster, a partner in Ashurst’s digital economy transactions practice, who heads up the UK cyber response and data protection team, and Matt Worsfold, a partner in Ashurst’s risk advisory team. To listen to this and subscribe to future episodes in our governance mini-series, search for “Ashurst Legal Outlook” on Apple Podcasts, Spotify or your favourite podcast player. You can also find out more about the full range of Ashurst podcasts at ashurst.com/podcasts. To receive updates and alerts on the issues raised in this podcast mini-series, subscribe to Ashurst’s regular Governance and Compliance Updates. Read more about the recent AGC Conference here. And read our latest update here about Narrative and Financial Reporting, and Economic Crime and Corporate Transparency. The information provided is not intended to be a comprehensive review of all developments in the law and practice, or to cover all aspects of those referred to. Listeners should take legal advice before applying it to specific issues or transactions.See omnystudio.com/listener for privacy information.
For more on this Technology Correspondent Brian O'Donovan.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
In this episode of Unspoken Security, host AJ Nash sits down with Galya Westler, Co-Founder and CEO at HumanBeam. They explore how advances in AI, digital identity, and holographic technology are reshaping the way organizations interact with people—while raising tough questions about privacy, ownership, and trust.Galya shares how her work began in health technology, connecting patients to care during pandemics, and evolved into building secure, lifelike AI avatars for real-world use. She explains why protecting personal likeness and voice matters more than ever, especially as AI tools become more convincing and accessible. Galya stresses the need for consent, encryption, and clear boundaries to keep digital identities safe and organizations accountable.Together, AJ and Galya dig into the risks and rewards of merging human presence with AI. They discuss how thoughtful design and strong security practices can support experts instead of replacing them, and why education and authenticity are key as we build a future where technology and humanity work side by side.Send us a textSupport the show
Coupang CEO questioned by police regarding data breach probe Cyberattack on large Russian bread factory disrupts deliveries Real estate agents in Australia use apps that leave lease documents at risk Get the show notes here: https://cisoseries.com/cybersecurity-news-police-question-coupang-ceo-russia-bakery-cyberattack-australian-real-estate-scandal/ Huge thanks to our sponsor, Strike48 Strike48 is the Agentic Log Intelligence Platform that actually puts AI agents to work, maximizing log visibility without blowing your budget. Find threats your siloed tools miss. Get started today with pre-built AI agents and workflows that investigate, detect, and respond 24/7 or build your own at strike48.com/security.
As food retailers work to digitize and enhance their logistics and supply networks, they're becoming more exposed to cybersecurity risks. In this episode, we discuss how a wave of recent cyberattacks has exposed vulnerabilities across the sector — how prepared companies really are, and why investors may want to sit up and take notice.Host: Gabriela de la Serna, MSCI Research & DevelopmentGuest: Cole Martin, MSCI Research & Development
(Presented by Material Security: We protect your company's most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.) Three Buddy Problem - Episode 83: Poland's CERT documents a rare, explicit wiper attack on civilians in a NATO country, including detailed attribution of a Russian government op targeting the electric grid in the heart of winter. We examine why this crosses a long-avoided threshold, why attribution suddenly matters again, and what it says about pre-positioned access, vendor insecurity, and the shrinking gap between cyber operations and acts of war. Plus, another Fortinet fiasco, a new batch of Ivanti zero-days under attack, an emergency patch from Microsoft and the return of the mysterious KasperSekrets account. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
The following article of the Health industry is: “Healthcare Cyberattacks: Severe Breaches and Risks to Human Life” by Sneer Rozenfeld, CEO, Yahalomn Foundation.
Microsoft Outlook and boot problems Sandworm likely behind cyberattack on Poland's power grid Dresden museum network suffers cyberattack Huge thanks to our episode sponsor, Conveyor Ever wish your customers could magically get answers to their own security questionnaires before they ever hit your desk? We've heard this wish from hundreds of teams so Conveyor just launched a new Trust Center AI Agent. The Agent lives in your Conveyor hosted Trust Center and answers customer questions, surfaces documents and even completes full questionnaires instantly so customers can finish their review without your intervention. Join top tech companies using Conveyor today like Atlassian, Zapier and more. Check it out at Conveyor.com Find the stories behind the headlines at CISOseries.com.
(05:22) Brought to you by CyberhavenAI is exfiltrating your data in fragments. Not one big breach — a prompt here, a screenshot there, a quiet export into a shadow AI tool. Every week, AI makes your team faster and your data harder to see. Files are moved to new SaaS apps, models are trained on sensitive inputs, and legacy DLP is blind to the context that matters most.On February 3rd at 11 am Pacific, Cyberhaven is unveiling a unified DSPM and DLP platform, built on the original data lineage, so security teams get X-ray vision into how data actually moves — and can stop risky usage in real time.Watch the launch live at cyberhaven.com/techleadjournal.Did you know Singapore is one of the world's top countries launching cyberattacks? Not as a victim, but as the source. Your routers, smart TVs, robot vacuums, or network-attached storage could be part of a massive botnet right now.In this eye-opening episode, Joseph Yap, founder of Otonata and cybersecurity expert, reveals the hidden cyber threat lurking in our homes. He reveals how everyday devices from routers to smart TVs become attack weapons. He explains why Singapore's excellent infrastructure ironically makes it attractive for hackers and shares practical steps to protect your network. From residential proxies renting out your internet connection to teenagers running ransomware gangs, this conversation exposes the gap between our connected lives and our digital security practices.Key topics discussed:Why Singapore, Indonesia, and Vietnam are top cyberattack source countriesWhy Singapore's infrastructure makes it attractive for hackersHow 700,000+ compromised devices launch 30 terabits per second DDoS attacksThe rise of residential proxies and dark web rental of home networksHow hackers exploit publicly disclosed vulnerabilities in outdated firmwareWhy AI is lowering the barrier to entry for hackersWhat makes executives and high-net-worth individuals attractive targetsPractical steps to audit and protect your home networkTimestamps:(00:00:00) Trailer & Intro(00:02:40) How Can I Apply Journalism Skills to Tech(00:06:14) Why is Curiosity Essential for Tech Leaders?(00:08:48) Why is Singapore a Top Source for Cyber Attacks?(00:12:11) What Makes Singapore Attractive for Cyber Attacks?(00:16:39) How Many Devices in Singapore are Already Compromised?(00:20:40) How Can I Tell if My Home Network is Compromised?(00:30:13) Which Devices are Hackers' Favorite Entry Points?(00:33:18) What is a Residential Proxy and Why Should I Care?(00:36:27) How do Hackers Actually Break into My Network?(00:47:47) Why are Executives and High-Net-Worth Individuals Prime Target?(00:55:12) Why isn't Singapore's Cyber Attack Problem in the News?(00:59:26) Can Internet Providers Stop These Attacks?(01:02:16) What Can I Do to Protect My Home Network?(01:05:19) How Do I Protect My Network-Attached Storage (NAS)?(01:10:41) How is AI Changing the Cyber Attack Landscape?(01:17:35) How Can Otonata Help Protect My Home Network?(01:23:39) What are Real-World Examples of Home Network Compromises?(01:28:20) 3 Tech Lead Wisdom_____Joseph Yap's BioWith 20+ years in Operations and Supply Chain, Joseph Yap founded Otonata (https://otonata.com) after realizing how vulnerable home networks are to security breaches. Otonata brings corporate-grade cybersecurity to homes using digital hygiene and lean management principles, protecting dozens of households from growing threats posed by AI, smart devices, and expanding attack surfaces.Follow Joseph:LinkedIn – linkedin.com/in/-joseph-yapOtonata – https://otonata.com/Free Hack Check – https://otonata.com/hack-checkLike this episode?Show notes & transcript: techleadjournal.dev/episodes/245.Follow @techleadjournal on LinkedIn, Twitter, and Instagram.Buy me a coffee or become a patron.
In this episode of Unspoken Security, host AJ Nash sits down with Eric Yunag, EVP of Product and Services at Convergint. They explore how security integration is changing as organizations face a fast-moving threat landscape and rising expectations from leaders and regulators. Eric explains why today's environment demands a new approach—one that connects hardware, software, and services in a more dynamic, real-time ecosystem.Eric shares how integrators help companies navigate not just the technical, but also the legal and operational complexity of modern security. He describes how shifting to cloud platforms, unifying physical and digital identities, and balancing privacy with business outcomes all add new layers of challenge. The conversation highlights the growing use of AI and “visual intelligence”—using camera data for both security and business insight—as organizations look to do more with their investments.Throughout the discussion, Eric makes the case for trusted, neutral advisors who help organizations build smarter, more connected security systems. He shows how today's integrators are positioned to guide clients through tough choices, benchmark best practices, and unlock value that goes far beyond traditional security.Send us a textSupport the show
In this week's show, Patrick Gray and Adam Boileau discuss the week's cybersecurity news, joined by a special guest. BBC World Cyber Correspondent Joe Tidy is a long time listener and he pops in for a ride-along in the news segment plus a chat about his new book. This week news includes: Did the US cyber Venezuela's power grid, or do they just want us to think they coulda? US govt might boycott the RSAC Conference ‘cause Jen Easterly being CEO makes them mad MS Patch Tuesday fixes CVSS5.5 bug and … stops you shutting down Wiz pulls off cloud stunt hack that ends with control of everyone's AWS console Millions of Bluetooth devices that use Google's Fast Pairing will pair with anyone, any time GNU inet-tools' telnetd parties like it's 2007, and brings -f root unauthed remote login back Thinkst is this week's sponsor, and long time friend of the show Haroon Meer joins. As always they're polishing their Canary tokens - adding breadcrumbs to lead you to them - but they're also a bunch of giant nerds who now run South Africa's Computer Olympiad. This episode is also available on Youtube. Show notes Cyberattack in Venezuela Demonstrated Precision of U.S. Capabilities - The New York Times Why I'm withholding certainty that “precise” US cyber-op disrupted Venezuelan electricity - Ars Technica Layered Ambiguity: US Cyber Capabilities in the Raid to Extract Maduro from Venezuela | Royal United Services Institute Former CISA Director Jen Easterly Will Lead RSAC Conference | WIRED Trump officials consider skipping premier cyber conference after Biden-era cyber leader named CEO - Nextgov/FCW Federal agencies ordered to patch Microsoft Desktop Windows Manager bug | The Record from Recorded Future News Windows 11 shutdown bug forces Microsoft into damage control • The Register CodeBreach: Supply Chain Vuln & AWS CodeBuild Misconfig | Wiz Blog Critical flaw in AWS Console risked compromise of build environment | Cybersecurity Dive Never-before-seen Linux malware is “far more advanced than typical” - Ars Technica VoidLink: Evidence That the Era of Advanced AI-Generated Malware Has Begun - Check Point Research Hundreds of Millions of Audio Devices Need a Patch to Prevent Wireless Hacking and Tracking | WIRED Critical flaw in Fortinet FortiSIEM targeted in exploitation threat | Cybersecurity Dive CVE-2025-64155: 3 Years of Remotely Rooting the FortiSIEM A single click mounted a covert, multistage attack against Copilot - Ars Technica Police raid homes of alleged Black Basta hackers, hunt suspected Russian ringleader | The Record from Recorded Future News Jordanian initial access broker pleads guilty to helping target 50 companies | The Record from Recorded Future News Supreme Court hacker posted stolen government data on Instagram | TechCrunch oss-sec: GNU InetUtils Security Advisory: remote authentication by-pass in telnetd How crypto criminals stole $700 million from people - often using age-old tricks Ctrl + Alt + Chaos: How Teenage Hackers Hijack the Internet
In this episode, we explore how threat actors are using AI to launch smarter, more persistent cyberattacks. From automated reconnaissance to evasive malware, AI is giving attackers new ways to infiltrate systems and steal data. Join Larry Zorio and Jeramy Cooper-Leavitt from the IJIS Cybersecurity Working Group as they reveal the latest AI-driven tactics—and why training your team to spot and stop these threats is critical in today's digital age.
Cybersecurity failures are no longer just IT problems. They are legal, financial, and leadership failures. In this episode of Security Squawk, we break down how a ransomware attack on Ireland's Office of the Ombudsman delayed justice for citizens and what that incident reveals about preparedness, accountability, and real-world consequences of cyber risk. We start with the Ireland cyberattack that forced a key public watchdog agency to halt case processing for months. This was not a minor disruption. Systems were taken offline, legal action was required to prevent potential data leaks, and people relying on the system became collateral damage. The story highlights a hard truth. When cybersecurity fails, mission failure follows. Government or private sector, the outcome is the same. From there, we zoom out to the private sector where the warning signs are flashing red. New survey data shows cybersecurity litigation risk is rising faster than any other legal exposure for U.S. businesses. Corporate legal teams expect cyber and data privacy disputes to intensify, yet fewer of them feel prepared compared to last year. That gap tells us everything we need to know. Companies understand the risk is growing, but they are not investing or aligning fast enough to reduce it. We also examine the dangerous confidence gap in middle market firms. Nearly one in five experienced a cyber incident, yet almost all executives still believe their security posture is strong. Confidence without controls is not resilience. It is exposure. This disconnect raises serious questions about leadership accountability and how security decisions are being made at the executive level. The episode also dives into research showing that many top U.S. companies still fail basic cybersecurity hygiene. Reused passwords, outdated software, poor configuration, and unpatched systems remain common in 2025. These are not advanced threats. These are fundamentals. When organizations cannot execute the basics, the issue is not technical skill. It is culture, discipline, and leadership priority. We discuss the ongoing wave of data breaches affecting insurance, healthcare, and business services organizations, exposing millions of records. These incidents are proof that many companies remain reactive instead of proactive. Third-party risk, weak internal controls, and poor governance continue to amplify the damage. Finally, we tackle a growing blind spot. AI security governance. As businesses rapidly adopt AI tools, many still lack formal rules, oversight, or risk frameworks. Without governance, innovation turns into liability. Attackers move faster than policy, and organizations are left exposed. This episode is a wake-up call for business leaders, MSPs, IT professionals, and security decision-makers. Cybersecurity is no longer about compliance checklists or technology spend. It is about reducing real risk, protecting trust, and leading responsibly. If you want to understand why cyberattacks now lead to lawsuits, why confidence is not the same as security, and why leadership decisions matter more than ever, this episode delivers the insight you need. Subscribe, follow, and share Security Squawk. And if you want to support the show, you can always buy me a coffee at buymeacoffee.com/securitysquawk.
Tim, Phil, Ian & Tate are joined by Arynne Wexler to discuss a potentially developing war with Iran, people betting on the chances of the Islamic Republic collapsing, silver prices skyrocketing and fluctuating and nationwide Verizon outages plunging the country into disarray. Hosts: Tim @Timcast (everywhere) Phil @PhilThatRemains (X) Ian @IanCrossland (X) Tate @realTateBrown (everywhere) Producer: Serge @SearchDupre (X) Guest: Arynne Wexler @ArynneWexler (X)
In this episode, Chris and Hector dig into how cyber operations are no longer a background activity but a core part of modern conflict. They break down reported US cyber actions tied to operations in Venezuela, Chinese state sponsored email intrusions targeting congressional staff, and the global scam economy built on human trafficking and crypto fraud. Join our new Patreon! https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Cybercrime Magazine deep dives into cyber ranges with thought leaders Lauri Almann, co-founder and Chairman of the Board, and Daz Preuss, COO, at CybExer, providers of Immersive testing and training environments that improve your cybersecurity skills, build your cyber resilience, and reinforce your defences. This episode is brought to you by CybExer. Learn more about our sponsor at https://cybexer.com
Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis
And we're back! We discuss the New Year spike in cyber attacks on schools over the holiday break and practical strategies for vacation periods - automated alerting, third‑party monitoring, suspending or shutting down non‑critical services. Other topics include what to look for when hiring technician, the rise of remote psycho-educational testing, early findings from the E‑Rate cybersecurity pilot, vendor liability caps in data privacy agreements, and a listener email about student account compromises from downloaded apps and VPNs. ———— Sponsored by: Meter - meter.com/k12techtalk Visit meter.com/k12techtalk to book a demo! Rise Vision - Interactive Digital Signage Templates + Touchscreen Displays ClassLink Lightspeed Fortinet - fortinetpodcast@fortinet.com NTP - dwren@ntp-inc.com ———— Join the K12TechPro Community (exclusively for K12 Tech professionals) Buy some swag (tech dept gift boxes, shirts, hoodies...)!!! Email us at k12techtalk@gmail.com OR our "professional" email addy is info@k12techtalkpodcast.com X @k12techtalkpod Facebook Visit our LinkedIn Music by Colt Ball Disclaimer: The views and work done by Josh, Chris, and Mark are solely their own and do not reflect the opinions or positions of sponsors or any respective employers or organizations associated with the guys. K12 Tech Talk itself does not endorse or validate the ideas, views, or statements expressed by Josh, Chris, and Mark's individual views and opinions are not representative of K12 Tech Talk. Furthermore, any references or mention of products, services, organizations, or individuals on K12 Tech Talk should not be considered as endorsements related to any employer or organization associated with the guys.
In this episode of Unspoken Security, host AJ Nash sits down with Danielle Jablanski from STV to break down the hard truths of operational technology (OT) security. Danielle explains why critical infrastructure - from water and transportation to manufacturing - remains vulnerable, tracing the challenge back to legacy systems, vendor complexity, and the lack of clear, industry-wide standards. She argues that many organizations have poor visibility into their assets and often rely on outdated assumptions about risk and business impact.Danielle calls out the pitfalls of flashy security solutions and emphasizes the need for basic, proven practices like network segmentation and clear asset management. She highlights the disconnect between IT and OT, showing how real-world safety and business operations depend on bridging this gap with honest communication and practical controls. Rather than chasing after hype, Danielle urges leaders to focus on building resilience: knowing what matters, assessing real risks, and strengthening what you can control.Throughout the conversation, Danielle offers a grounded perspective on why OT security demands more than checklists and compliance. She points to the need for shared data, better early warning systems, and a broader base of professionals willing to dig into the complexities - before an incident forces everyone's hand.Send us a textSupport the show
Jaguar Land Rover reveals the fiscal results of last year's cyberattack. A Texas gas station chain suffers a data spill. Taiwan tracks China's energy-sector attacks. Google and Veeam push patches. Threat actors target obsolete D-Link routers. Sedgwick Government Solutions confirms a data breach. The U.S. Cyber Trust Mark faces an uncertain future. Google looks to hire humans to improve AI search responses. Our guest is Deepen Desai, Chief Security Officer of Zscaler, discussing what's powering enterprise AI in 2026. AI brings creative cartography to the weather forecast. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On today's Industry Voices, we are joined by Deepen Desai, Chief Security Officer of Zscaler, discussing what's powering enterprise AI in 2026. To learn more on this topic, be sure to check out Zscaler's report here. Listen to the full conversation here. Selected Reading Jaguar Land Rover wholesale volumes plummet 43% in cyberattack aftermath (The Register) Major Data Breach Hits Company Operating 150 Gas Stations in the US (Hackread) Taiwan says China's attacks on its energy sector increased tenfold (Bleeping Computer) Google Patches High-Severity Chrome WebView Flaw CVE-2026-0628 in the Tag Component (Tech Nadu) Several Code Execution Flaws Patched in Veeam Backup & Replication (SecurityWeek) New D-Link flaw in legacy DSL routers actively exploited in attacks (Bleeping Computer) Sedgwick confirms breach at government contractor subsidiary (Bleeping Computer) FCC Loses Lead Support for Biden-Era IoT Security Labeling (GovInfoSecurity) Google Search AI hallucinations push Google to hire "AI Answers Quality" engineers (Bleeping Computer) ‘Whata Bod': An AI-generated NWS map invented fake towns in Idaho (The Washington Post) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
The UK hits reset on cybersecurity No MFA, Know Problems US may have coordinated cyberattacks with Maduro's arrest Huge thanks to our sponsor, Hoxhunt A small tip for CISOs: if you're unsure whether your security training is actually reducing phishing risk, check out what Qualcomm achieved with Hoxhunt. They took their 1,000 highest-risk users from consistent under-performers to outperforming the rest of the company, driving measurable human risk reduction and earning a CSO50 Award. See the Qualcomm case at hoxhunt.com/qualcomm
Over a month after announcing a massive data breach affecting 34 million of its users, South Korean e-commerce company Coupang announced this Monday it would offer 1.69 trillion won in compensation (around €1 billion) to customers in the form of vouchers. Also in this edition, former EU digital chief Thierry Breton gives his first interview since being sanctioned by the US. Plus, Nokia's archived mobile design plans are now open to the public.
While our team is out on winter break, please enjoy this episode of Research Saturday. This week, we are joined by Tom Hegel, Principal Threat Researcher from SentinelLabs research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belarusian government espionage, is actively targeting Ukrainian military and government entities as well as Belarusian opposition activists using weaponized Excel documents. SentinelLabs identified new malware variants and tactics, including obfuscated VBA macros that deploy malware via DLL files, with payload delivery seemingly controlled based on a target's location and system profile. The campaign, which began preparation in mid-2024 and became active by late 2024, appears to be an evolution of previous Ghostwriter operations, combining disinformation with cyberattacks to further political and military objectives. The research can be found here: Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition Learn more about your ad choices. Visit megaphone.fm/adchoices
While our team is out on winter break, please enjoy this episode of Research Saturday. This week, we are joined by Tom Hegel, Principal Threat Researcher from SentinelLabs research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belarusian government espionage, is actively targeting Ukrainian military and government entities as well as Belarusian opposition activists using weaponized Excel documents. SentinelLabs identified new malware variants and tactics, including obfuscated VBA macros that deploy malware via DLL files, with payload delivery seemingly controlled based on a target's location and system profile. The campaign, which began preparation in mid-2024 and became active by late 2024, appears to be an evolution of previous Ghostwriter operations, combining disinformation with cyberattacks to further political and military objectives. The research can be found here: Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition Learn more about your ad choices. Visit megaphone.fm/adchoices
Lev Parnas, Ukrainian-American businessman turned political activist, and author joins Thom to expose the reality of Donald's duplicity with Ukraine. Is Russia already at war with us? Tanks aren't rolling through cities, but cyberattacks, proxy wars, sanctions, and covert operations are everywhere. Has the world already crossed the line into global war between the United States and Russia? — and why governments may be afraid to say it out loud.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
In this encore presentation of Unspoken Security Episode 32 (originally published on 3 April 2025), host AJ Nash sits down with Chris Birch, an intelligence practitioner with nearly 30 years of experience, to discuss the ever-evolving landscape of social engineering. Chris's unique perspective comes from leading teams that actively engage with threat actors, turning the tables on those who typically exploit vulnerabilities.Chris details how social engineering is simply human manipulation, a skill honed from birth. He explains how attackers leverage fear and greed, the fastest and cheapest ways to manipulate individuals. He also dives into how attacks have evolved, highlighting the dangers of increasingly sophisticated tactics like deepfakes and the blurring lines between legal and illegal applications of social engineering.The conversation also explores the crucial role of organizational culture in cybersecurity. Chris emphasizes that awareness, not just education, is key to defense. He advocates for sharing threat intelligence widely within organizations and across industries, empowering everyone to become a sensor against social engineering attempts. Chris also shares a surprising personal fear, offering a lighthearted end to a serious discussion.Send us a textSupport the show
AP correspondent Charles de Ledesma reports a suspected cyberattack has had major impact on France's postal network just days before Christmas.
In this annual Security Squawk tradition, we do two things most people avoid: accountability and predictions. First, we break down the top cyber-attacks of 2025 and translate them into what actually matters for business owners, IT pros, and MSPs. Then we grade our predictions from last year using real outcomes. No excuses. No hand waving. No “well technically.” Why does this episode matter? Because 2025 made one thing painfully clear. Most cyber damage does not come from genius hackers. It comes from predictable failures. Unpatched systems. Over-trusted third parties. Tokens and sessions that live too long. Help desks that can be socially engineered. And organizations that still treat cybersecurity like an IT issue instead of a business survival issue. We start with the Top 10 Cyber-Attacks of 2025 and pull out the patterns hiding behind the headlines. This year's list includes ransomware and extortion campaigns, software supply chain failures, identity and OAuth token abuse, and attacks that caused real operational disruption, not just data exposure. These stories show how attackers scale impact by targeting widely deployed platforms and trusted business tools, then turning that access into downtime, data theft, and brand damage. One of the biggest lessons of 2025 is simple: identity is the new perimeter. Many of the most important incidents were not break-in stories. They were log-in stories. Stolen sessions and OAuth tokens keep working because they let attackers bypass MFA, move quickly, and blend in as legitimate users. If your security strategy is focused only on blocking failed logins, you are watching the wrong signal. 2025 also reinforced how fragile third-party trust has become. Integrations are everywhere. They make businesses faster and more efficient, but they also expand the blast radius. When a third-party tool or service account is compromised, it can become a shortcut into systems that were never directly attacked. In this episode, we talk about practical steps like minimizing access scopes, eliminating unnecessary integrations, shortening token lifetimes, and having a real plan to revoke access when something looks off. We also dig into why on-prem enterprise tools continue to get hammered. Many organizations still run internet-facing platforms that are patched slowly and monitored poorly. Attackers love that combination. In 2025, we saw repeated exploitation of high-value enterprise software where a single weakness led to widespread compromise across industries. If your patching strategy is “we will get to it,” attackers already have. Another major theme this year was operational disruption. Some of the costliest incidents were not just about stolen data. They shut down production, halted sales, broke customer service systems, and created ripple effects across supply chains. That is where executives feel cyber risk the hardest. Data loss hurts. Downtime is a business emergency. Then we grade last year's predictions. Did AI take our jobs? Not even close. What it did do was raise the baseline for both attackers and defenders. AI improved phishing quality, accelerated scams, and forced organizations to confront the risks of adopting new tools without clear controls. We also review our call on token and session-based attacks. That prediction aged well. Identity-layer abuse dominated 2025. The issue was not a lack of MFA. The issue was that attackers did not need to defeat MFA if they could steal what comes after it. We also revisit regulation. It did not arrive all at once. It crept forward. Agencies and lawmakers continued tightening expectations, especially in sectors that keep getting hit. Businesses that wait for mandates before improving controls will pay more later, either through recovery costs, insurance pressure, or lost trust. Finally, we look ahead to 2026 with new predictions that are probable, not obvious. We discuss what is likely to change around identity, help desk security, SaaS governance, and how leaders measure cyber readiness. The short version is this: 2026 will reward companies that treat access as a living system and punish those that treat it like a one-time setup. If you like the show, help us grow it. Subscribe, leave a review, and share this episode with someone who still thinks cybersecurity is just antivirus and a firewall. And if you want to support the podcast directly, buy me a coffee at buymeacoffee.com/securitysquawk.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
In this episode of "The Free Lawyer" podcast, host Gary interviews Valentina Flores, CEO of Red Sentry. Valentina shares her journey from law enforcement to leading a proactive cybersecurity company, emphasizing the importance of ethical hacking and prevention for law firms. She offers practical tips—like enabling multi-factor authentication, limiting data access, and preparing response plans—to help lawyers protect sensitive information. Valentina also discusses the collaborative nature of cybersecurity, the human element in defense, and aligning security practices with core values, making cybersecurity accessible and actionable for legal professionals.Valentina Flores is the CEO and Co-Founder of Red Sentry, a proactive cybersecurity company that breaks into your network, so hackers never get the chance. Before protecting companies, she served as a detective on joint federal task forces, tracking cybercriminals through digital back-alleys. Now a public speaker on hacker psychology, a two-time award-winning cybersecurity leader, and a fierce advocate for women in tech, Valentina is redefining what leadership looks like in the industry, championing smarter and more accessible security for all.Transition from Detective to Cybersecurity (00:01:33) What is Penetration Testing? (00:02:56) Success Rate and Client Vulnerabilities (00:03:35)Understanding Hacker Psychology (00:05:30) Why Law Firms Are Targets (00:06:38) Triggers for Law Firms to Seek Help (00:07:46) Compliance vs. Proactive Security (00:09:09) Human Element in Cybersecurity (00:10:16) Making Clients Comfortable with Ethical Hacking (00:11:55) Emerging Threats and the Future of Cybersecurity (00:13:25) Cybersecurity for Small and Medium Businesses (00:14:43) Diversity in Tech and Cognitive Diversity (00:16:37) Awards and People-First Leadership (00:17:27) Leadership in Cybersecurity vs. Traditional Business (00:18:20) Role of Coaching and Mentorship (00:19:28) Annual Testing and Follow-Up (00:20:21) Prioritizing Cybersecurity in Law Firms (00:21:13) Collaboration vs. Competition in Cybersecurity (00:22:17) Top Three Cybersecurity Actions for Lawyers (00:23:29) First Steps for the Unprepared (00:25:39) What is Penetration Testing? (Clarification) (00:26:39) Freedom and Work-Life Balance (00:27:06) Aligning Practice with Values (00:27:51) You can find The Free Lawyer Assessment here- https://www.garymiles.net/the-free-lawyer-assessmentWould you like to learn what it looks like to become a truly Free Lawyer? You can schedule a complimentary call here: https://calendly.com/garymiles-successcoach/one-one-discovery-callWould you like to learn more about Breaking Free or order your copy? https://www.garymiles.net/break-free
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Support a coffee company that supports America and American values! Go to www.blackoutcoffee.com/Graham Use Code Graham for 20% off your first order Text Graham to 989898 now to recieve a 25 page info kit from Birch Gold. Free silver with purchased till 22 Dec Protect your devices from Cyberattacks! Go to www.webroot.com/graham Get 60% off now! Socials: Twitter: www.twitter.com/grahamallen_1 FB: www.facebook.com/grahamallenofficial IG: www.instagram.com/grahamallen1 Tiktok: www.tiktok.com/@thegrahamallen Rumble: www.rumble.com/user/grahamallenofficial
In this episode of Unspoken Security, host AJ Nash sits down with Zoë Rose, SecOps Manager at Canon EMEA. They explore the real-world barriers to building effective incident response programs and discuss why so many organizations struggle to move beyond reactive firefighting.Zoë shares her perspective from both consulting and in-house roles, pointing out that most incident response teams are overwhelmed, under-resourced, and stuck dealing with basics that never get fixed. She explains why expensive tools and new technology often miss the mark when organizations skip foundational work—like asset inventories, clear policies, and tuned alerts. Zoë urges listeners to focus on practical steps, such as documenting processes, improving communication, and building trust between technical teams and business leaders.Throughout the conversation, Zoë breaks down how real change happens: by investing in people, closing skills gaps, and fostering a culture where mistakes drive learning instead of blame. The episode ends with a reminder that effective security is not about quick fixes or flashy tools, but about honest assessment, teamwork, and steady improvement.Send us a textSupport the show
This Day in Legal History: Gregory v. ChicagoOn this day in legal history, December 10, 1968, the U.S. Supreme Court heard oral arguments in Gregory v. City of Chicago, a case involving the arrest of civil rights demonstrators under a local disorderly conduct ordinance. The demonstrators, led by comedian and activist Dick Gregory, had peacefully marched from Chicago's City Hall to the home of Mayor Richard J. Daley to protest school segregation. Though the march itself remained nonviolent, an unruly crowd of onlookers gathered, prompting police to demand that the demonstrators disperse. When they refused, Gregory and others were arrested and later convicted of disorderly conduct.The key legal issue before the Court was whether the demonstrators' First Amendment rights had been violated when they were punished for the hostile reactions of bystanders. In a per curiam opinion issued the following year, the Court reversed the convictions, holding that the peaceful demonstrators could not be held criminally liable for the disruptive behavior of others. Justice Black, concurring, emphasized that the First Amendment protects peaceful expression even in the face of public opposition or discomfort.The case is a critical reaffirmation of the “heckler's veto” doctrine — the principle that the government cannot suppress speech simply because it provokes a hostile reaction. It underscored the constitutional duty to protect unpopular or provocative speech, especially in the context of civil rights protests. The Court's decision also reinforced the due process requirement that criminal statutes must be applied in a way that is not arbitrary or overbroad.Gregory v. City of Chicago remains a foundational case in First Amendment jurisprudence and protest law, balancing public order concerns against the fundamental rights of assembly and expression.The Trump administration's proposed repeal of the Endangered Species Act (ESA) definition of “harm” could significantly weaken protections for imperiled species in federally managed forests, particularly in the Pacific Northwest. The change would limit the ESA's scope to cover only direct physical injury to species, excluding habitat destruction from regulation. Environmental groups argue this could devastate species like the northern spotted owl and marbled murrelet, both of which depend on old-growth forests increasingly targeted for logging under recent federal mandates. Legal experts warn that without habitat protections, ESA enforcement becomes largely ineffective, as species cannot survive without suitable environments. The rollback is expected to reduce permitting requirements for developers and extractive industries, a move welcomed by business groups but opposed by conservationists.The U.S. Fish and Wildlife Service initially defined “harm” in 1981 to include habitat degradation, but now argues that interpretation overextends the ESA's intent. Logging has already surged in owl and murrelet habitats, especially in Oregon, with timber sales up 20% in 2025. Population declines among spotted owls—down 70% since 1990—are linked to habitat loss and competition from invasive barred owls. Critics of the repeal emphasize that previous conservation plans, like the 1994 Northwest Forest Plan, successfully slowed species decline by curbing old-growth logging. Industry groups argue the ESA has been “weaponized” to block necessary forest management and wildfire prevention. Meanwhile, lawsuits are brewing on both sides: environmentalists are expected to challenge the rollback, while timber interests seek to overturn broader habitat protections.Trump's Changes to What Harms Species Adds Risk in Logging AreasThe U.S. Supreme Court is preparing to hear a case involving Joseph Clifton Smith, an Alabama death row inmate whose death sentence was overturned after a federal court found him intellectually disabled. The dispute centers on how courts should interpret multiple IQ scores and other evidence when determining whether someone meets the legal criteria for intellectual disability. This analysis is critical because, in 2002's Atkins v. Virginia, the Supreme Court held that executing individuals with intellectual disabilities violates the Eighth Amendment's ban on cruel and unusual punishment.Smith, now 55, was sentenced to death for the 1997 killing of Durk Van Dam during a robbery. His IQ scores have ranged from 72 to 78, but the lower court applied the standard margin of error, concluding his true score could fall below 70. The court also found substantial, lifelong deficits in adaptive functioning, including challenges in social skills, independent living, and academics. These findings led the 11th U.S. Circuit Court of Appeals to uphold the decision to set aside his death sentence.Alabama officials argue the courts erred by evaluating Smith's IQ scores collectively rather than individually. The Supreme Court previously asked the 11th Circuit to clarify its reasoning, and the court responded that it used a holistic approach, incorporating expert testimony and broader evidence of disability. Now back before the Supreme Court, the case could refine or reshape how courts nationwide assess intellectual disability in capital cases. A ruling is expected by June.US Supreme Court to weigh death row inmate's intellectual disability ruling | ReutersJack Smith, the former special counsel who led federal prosecutions against Donald Trump, is launching a new law firm alongside three other high-profile former prosecutors: Tim Heaphy, David Harbach, and Thomas Windom. All four attorneys have extensive backgrounds in public service and were involved in major investigations into Trump's efforts to overturn the 2020 election and mishandling of classified documents. The new firm, expected to begin operations in January, will offer full-service legal work, including litigation and investigations, with a mission rooted in integrity and zealous advocacy.Heaphy, who previously served as the lead investigator for the House committee probing the January 6th Capitol attack, is leaving his position at Willkie Farr & Gallagher to help found the firm. That firm had drawn criticism for its dealings with Trump but has defended its actions. The Justice Department and members of the new firm declined to comment on the launch.Smith had dropped the Trump prosecutions following Trump's 2024 election win, citing the DOJ's policy against prosecuting sitting presidents. Trump's administration has since condemned those cases, firing multiple DOJ and FBI officials and claiming political bias. Smith maintains the investigations were legitimate and nonpartisan. He is expected to testify behind closed doors before the GOP-led House Judiciary Committee next week.Trump prosecutor Jack Smith to launch firm with ex-Justice Department lawyers | ReutersThe U.S. Justice Department has announced new federal charges against Victoria Eduardovna Dubranova, a Ukrainian national accused of aiding Russian-aligned cyberattack groups targeting critical infrastructure. The latest indictment, filed in Los Angeles, links Dubranova to the group NoName057(16), which prosecutors say has carried out hundreds of cyberattacks globally, many aimed at essential services like food and water systems. These alleged actions are said to pose serious national security risks.Dubranova had already been extradited to the U.S. earlier in 2025 to face charges related to another Russian-backed hacking group known as CyberArmyofRussia_Reborn (CARR). She now faces conspiracy charges in both cases and has pleaded not guilty. Trials are scheduled for February 2026 (NoName) and April 2026 (CARR). Prosecutors allege both groups receive financial backing from the Russian government, though the Russian embassy has not commented on the case.The Justice Department emphasized that it will continue to pursue cyber threats tied to state-sponsored or proxy actors. The U.S. State Department is offering up to $10 million for information on NoName operatives and up to $2 million for tips on CARR affiliates.Justice Department unveils new charges in alleged Russia-backed cyberattacks | Reuters This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.minimumcomp.com/subscribe
Behind the second strike, cyberattacks with artificial intelligence, and two recent Christmas albums. Plus, Seth Troutt on grateful feasting, the stinky smell of success, and the Tuesday morning newsSupport The World and Everything in It today at wng.org/donateAdditional support comes from I Witness: The Long Shore: A faith-based audio drama that brings history to life. iwitnesspod.comFrom Ridge Haven Camp in North Carolina and Iowa. Winter Camp starts December 29th. Registration open at ridgehaven.orgAnd from His Words Abiding in You, a Bible memorization podcast designed for truck drivers. His Words Abiding in You … on all podcast apps.
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Une cellule de crise interministérielle a annoncé avoir déjoué une cyberattaque sophistiquée visant des infrastructures nationales sensibles. Les experts attribuent l'opération à un État étranger hostile.Traduction:An interministerial crisis unit announced it thwarted a sophisticated cyberattack targeting sensitive national infrastructure. Experts are attributing the failed operation to a hostile foreign state actor. Hébergé par Acast. Visitez acast.com/privacy pour plus d'informations.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
A U.S. official just reminded Congress of the enormous threat we face from Communist China: “America's adversaries…are already embedded in our systems, mapping our infrastructure, and preparing to disrupt critical operations at a time of their choosing….Cyberattacks on energy infrastructure are a daily reality and a growing strategic weapon.” This report makes all the more astounding the fact that the Securities and Exchange Commission continues to enable Chinese Communist companies – even ones blacklisted for being tied directly to the CCP's military – to have privileged access to America's capital markets. While SEC Chairman Paul Atkins says he's going to “scrutinize” more carefully such companies and what they are doing, unless and until he terminates a 2013 Memorandum of Understanding engineered by then-Vice President Joe Biden, our investors will continue – mostly unwittingly – to prop up and otherwise underwrite the greatest threat this country has ever faced. This is Frank Gaffney.
Japanese brewing giant, Asahi, has delayed publishing its latest financial results because of the major cyberattack that began in September. Leanna Byrne hears from an expert in Japan. Also, why has Venezuela banned six international airlines, including Iberia, TAP and Turkish Airlines? And the Swiss tariff deal with the US that's facing a backlash. Presenter: Leanna Byrne Producer: Ahmed Adan Editor: Stephen Ryan
Buckle up AI world. OpenAI released a new model, and apparently they're not done. Google is reportedly dropping Gemini 3 in hours. Jeff Bezos is going back hands-on building a new AI company. And that's just the tip of the AI iceberg this week. Don't get drowned out in the noise. On Monday, we cut it straight with the AI news that matters. Gemini 3 close to release, OpenAI drops GPT-5.1, Bezos to lead new AI startup and more AI News That MattersNewsletter: Sign up for our free daily newsletterMore on this Episode: Episode PageJoin the discussion: Thoughts on this? Join the convo and connect with other AI leaders on LinkedIn.Upcoming Episodes: Check out the upcoming Everyday AI Livestream lineupWebsite: YourEverydayAI.comEmail The Show: info@youreverydayai.comConnect with Jordan on LinkedInTopics Covered in This Episode:OpenAI GPT-5.1 Release & FeaturesGPT-5.1 Personality Controls ExplainedGPT-5.1 Thinking vs. Instant ModelsGoogle NotebookLM Deep Research UpdateNotebookLM Image & File Type SupportAnthropic $50B AI Data Center ExpansionAnthropic Claude Cyberattack IncidentOpenAI ChatGPT Group Chat Pilot LaunchJeff Bezos Project Prometheus AI StartupMeta AI Chief Yann LeCun Exit RumorsMicrosoft Fairwater AI Data Center LaunchGoogle Gemini 3 Anticipated Release UpdateNano Banana Pro Image Generator LeaksMulti-Agent Systems in Gemini EnterpriseOpenAI GPT-5.1 Prompt Cookbook ReleaseTimestamps:00:00 OpenAI Launches GPT 5.107:06 "GPT 5.1: Better, Yet Wordy"09:08 "AI Updates and Insights"11:19 NotebookLM Updates with Spreadsheet Support16:38 "ChatGPT Group Chat Collaboration"21:00 Bezos Co-CEO of AI Startup25:29 Meta's AI Overhaul Sparks Chaos28:13 "AI Exploited for Cyberattacks"30:53 "Microsoft Expands AI Data Centers"35:37 "Nano Banana Pro & Gemini 3"40:12 AI Updates: GPT-5.1 Features40:58 "AI News & Insights Weekly"Keywords:Gemini 3, Google AI, AI model release, GPT 5.1, OpenAI, AI conversational model, reasoning behavior, personality controls, compliance improvements, auto routing feature, thinking vs instant models, data center investment, Anthropic,Send Everyday AI and Jordan a text message. (We can't reply back unless you leave contact info) Head to AI.studio/build to create your first app. Head to AI.studio/build to create your first app. Head to AI.studio/build to create your first app.
P.M. Edition for Nov. 13. AI startup Anthropic said China's state-sponsored hackers used its tools to automate cyberattacks against corporations and governments. WSJ's Sam Schechner reports on the inflection point for hackers' use of AI. Disney's shares fell after a quarterly earnings report that fell short of Wall Street's expectations. And California is eyeing a first-of-its-kind tax on billionaires. WSJ's Paul Kiernan unpacks the ballot initiative for a wealth tax that's already run into steep opposition. Sabrina Siddiqui hosts. Sign up for the WSJ's free What's News newsletter. Learn more about your ad choices. Visit megaphone.fm/adchoices
SHOW 11-12-25 CBS EYE ON THE WORLD WITH JOHN BATCHELOR 1930 THE SHOW BEGINS IN THE DOUBTS ABOUT CHINA'S LEADERSHIP. FIRST HOUR 9-915 Allied AI Competition and Submarine Requests. Scott Harold examines the crucial role of allies Japan and South Korea in the AI competition against China. Japan is developing locally tailored AI models built on US technology for use in Southeast Asia. South Korea aims to become the third-largest AI power, offering reliable models to counter China's untrustworthy technology. Harold also discusses South Korea's surprising request for nuclear-powered, conventionally armed submarines to track Chinese and North Korean vessels, signaling a greater public willingness to contribute to China deterrence. 915-930 Rare Earths Monopoly and US Strategy. General Blaine Holt discusses China's challenge to the US and its allies regarding rare earths, noting that China previously threatened to cut off supply. The US is securing deals with partners like Australia and is on track to replace China entirely, despite initial processing reliance on Chinese predatory practices. Holt suggests a two-year recovery is conservative, as technology for domestic processing exists. He also notes China's leadership is in turmoil, trying to buy time through trade deals. 930-945 Russian Economic Stagnation and War Finance. Michael Bernstam confirms that the Russian economy is stagnating, expecting no growth for years due to exhausted resources and reliance on military production. Oil and gas revenues are down significantly due to Western sanctions and high discounts, widening the budget deficit. Russia is increasing taxes, including the VAT, which drives inflation in staples. This economic pain damages the popularity of the war by hurting the low-income population—the primary source of military recruitment. 945-1000 Buckley, Fusionism, and Conservative Integrity. Peter Berkowitz explores William F. Buckley's consolidation of the conservative movement through "fusionism"—blending limited government and social conservatism. Buckley purged the movement of anti-Semites based on core principles. Berkowitz uses this historical context to analyze the controversy surrounding Tucker Carlson giving a platform to Nick Fuentes, who openly celebrates Stalin and Hitler. This incident caused division after the Heritage Foundation's president, Kevin Roberts, defended Carlson, prompting Roberts to issue an apology. SECOND HOUR 10-1015 Commodity Markets and UK Political Instability. Simon Constable analyzes rare earth markets, noting China's dominance is achieved through undercutting prices and buying out competitors. Prices for key industrial commodities like copper and aluminum are up, indicating high demand. Constable also discusses UK political instability, noting that Labour Prime Minister Keir Starmer lacks natural leadership and confidence. The major political driver for a potential leadership change is the party's broken promise regarding income taxes, which severely undermines public trust before the next election, 1015-1030 Commodity Markets and UK Political Instability. Simon Constable analyzes rare earth markets, noting China's dominance is achieved through undercutting prices and buying out competitors. Prices for key industrial commodities like copper and aluminum are up, indicating high demand. Constable also discusses UK political instability, noting that Labour Prime Minister Keir Starmer lacks natural leadership and confidence. The major political driver for a potential leadership change is the party's broken promise regarding income taxes, which severely undermines public trust before the next election 1030-1045 Austrian Economics, Von Mises, and the Fight Against Interventionism. Carola Binder discusses the Austrian School of Economics, highlighting its focus on free markets and Ludwig von Mises's opposition to government "interventionism," including rent and price controls. Mises argued these policies distort markets, leading to shortages and inefficiency. Binder emphasizes Mises's belief that economic literacy is a primary civic duty necessary for citizens to reject socialism and interventionist panaceas, especially as new generations are exposed to such ideas. 1045-1100 Austrian Economics, Von Mises, and the Fight Against Interventionism. Carola Binder discusses the Austrian School of Economics, highlighting its focus on free markets and Ludwig von Mises's opposition to government "interventionism," including rent and price controls. Mises argued these policies distort markets, leading to shortages and inefficiency. Binder emphasizes Mises's belief that economic literacy is a primary civic duty necessary for citizens to reject socialism and interventionist panaceas, especially as new generations are exposed to such ideas. THIRD HOUR 1100-1115 Philippine Missile Deployment to Deter China. Captain Jim Fanell reports that the Philippines unveiled its first operational BrahMos anti-ship cruise missile battery in western Luzon to deter Chinese aggression. This supersonic missile system, part of the $7.2 billion Reorizon 3 modernization program, gives the Philippines "skin in the game" near disputed waters like Scarborough Shoal. The deployment signifies a strategy to turn the Philippines into a "porcupine," focusing defense on the West Philippine Sea. The systems are road-mobile, making them difficult to target. 1115-1130 AI, Cyber Attacks, and Nuclear Deterrence. Peter Huessy discusses the challenges to nuclear deterrence posed by AI and cyber intrusions. General Flynn highlighted that attacks on satellites, the backbone of deterrence, could prevent the US from confirming where a launch originated. Huessy emphasizes the need to improve deterrence, noting that the US likely requires presidential authorization for retaliation, unlike potential Russian "dead hand" systems. The biggest risk is misinformation delivered by cyber attacks, although the US maintains stringent protocols and would never launch based solely on a computer warning. 1130-1145 Sudan Civil War, Global Proxies, and Nigerian Violence. Caleb Weiss and Bill Roggio analyze the civil war in Sudan between the SAF and the RSF, noting both factions commit atrocities, including massacres after the capture of El Fasher. The conflict is fueled by opposing global coalitions: the UAE and Russia support the RSF, while Iran, Egypt, and Turkey back the SAF. The Islamic State has called for foreign jihadis to mobilize. Weiss also addresses the complicated violence in Nigeria, differentiating jihadist attacks on Christians from communal farmer-herder conflict. 1145-1200 Sudan Civil War, Global Proxies, and Nigerian Violence. Caleb Weiss and Bill Roggio analyze the civil war in Sudan between the SAF and the RSF, noting both factions commit atrocities, including massacres after the capture of El Fasher. The conflict is fueled by opposing global coalitions: the UAE and Russia support the RSF, while Iran, Egypt, and Turkey back the SAF. The Islamic State has called for foreign jihadis to mobilize. Weiss also addresses the complicated violence in Nigeria, differentiating jihadist attacks on Christians from communal farmer-herder conflict. FOURTH HOUR 12-1215 Corruption, Chinese Influence, and Protests in Serbia. Ivana Stradner discusses protests in Serbia demanding accountability one year after a canopy collapse killed 16 people, with investigations linking the accident to high-level corruption involving a Chinese company. Leader Vučić suppresses discontent by alleging the West is plotting a "color revolution." Although Vučić aligns his heart with Russia and China, he needs EU money for political survival, prompting him to offer weapons to the West and claim Serbia is on the EU path. 1215-1230 The Muslim Brotherhood and Its Global Network. Cliff May discusses the Muslim Brotherhood (MB), the progenitor of Hamas, founded in 1928 after the Ottoman Caliphate's abolition. The MB's goal is to establish a new Islamic empire. Qatar is highly supportive, hosting Hamas leaders, while the UAE and Saudi Arabia have banned the MB. Turkish President Erdoğan is considered MB-adjacent and sympathetic, supporting Hamas and potentially viewing himself as a future Caliph, despite Turkey being a NATO member. 1230-1245 Commercial Space Records and Political Impacts on NASA. Bob Zimmerman covers new records in commercial space: SpaceX achieved 147 launches this year, and one booster tied the Space Shuttle Columbia for 28 reuses. China also set a record with 70 launches but had a failure. Commercial space faced temporary impacts, such as an FAA launch curfew due to a government shutdown and air traffic controller shortages. Zimmerman speculates that Jared Isaacman's conservative-leaning public appearance at Turning Point USA might have convinced Trump to renominate him for NASA Administrator. 1245-100 AM Commercial Space Records and Political Impacts on NASA. Bob Zimmerman covers new records in commercial space: SpaceX achieved 147 launches this year, and one booster tied the Space Shuttle Columbia for 28 reuses. China also set a record with 70 launches but had a failure. Commercial space faced temporary impacts, such as an FAA launch curfew due to a government shutdown and air traffic controller shortages. Zimmerman speculates that Jared Isaacman's conservative-leaning public appearance at Turning Point USA might have convinced Trump to renominate him for NASA Administrator.
AI, Cyber Attacks, and Nuclear Deterrence. Peter Huessy discusses the challenges to nuclear deterrence posed by AI and cyber intrusions. General Flynn highlighted that attacks on satellites, the backbone of deterrence, could prevent the US from confirming where a launch originated. Huessy emphasizes the need to improve deterrence, noting that the US likely requires presidential authorization for retaliation, unlike potential Russian "dead hand" systems. The biggest risk is misinformation delivered by cyber attacks, although the US maintains stringent protocols and would never launch based solely on a computer warning.
Plus: Baidu unveils new AI chips. Disney's streaming services see subscriber growth. And Verizon plans to cut about 15,000 jobs. Julie Chang hosts. Learn more about your ad choices. Visit megaphone.fm/adchoices