Attack on a computer system
POPULARITY
Categories
SHOW 11-12-25 CBS EYE ON THE WORLD WITH JOHN BATCHELOR 1930 THE SHOW BEGINS IN THE DOUBTS ABOUT CHINA'S LEADERSHIP. FIRST HOUR 9-915 Allied AI Competition and Submarine Requests. Scott Harold examines the crucial role of allies Japan and South Korea in the AI competition against China. Japan is developing locally tailored AI models built on US technology for use in Southeast Asia. South Korea aims to become the third-largest AI power, offering reliable models to counter China's untrustworthy technology. Harold also discusses South Korea's surprising request for nuclear-powered, conventionally armed submarines to track Chinese and North Korean vessels, signaling a greater public willingness to contribute to China deterrence. 915-930 Rare Earths Monopoly and US Strategy. General Blaine Holt discusses China's challenge to the US and its allies regarding rare earths, noting that China previously threatened to cut off supply. The US is securing deals with partners like Australia and is on track to replace China entirely, despite initial processing reliance on Chinese predatory practices. Holt suggests a two-year recovery is conservative, as technology for domestic processing exists. He also notes China's leadership is in turmoil, trying to buy time through trade deals. 930-945 Russian Economic Stagnation and War Finance. Michael Bernstam confirms that the Russian economy is stagnating, expecting no growth for years due to exhausted resources and reliance on military production. Oil and gas revenues are down significantly due to Western sanctions and high discounts, widening the budget deficit. Russia is increasing taxes, including the VAT, which drives inflation in staples. This economic pain damages the popularity of the war by hurting the low-income population—the primary source of military recruitment. 945-1000 Buckley, Fusionism, and Conservative Integrity. Peter Berkowitz explores William F. Buckley's consolidation of the conservative movement through "fusionism"—blending limited government and social conservatism. Buckley purged the movement of anti-Semites based on core principles. Berkowitz uses this historical context to analyze the controversy surrounding Tucker Carlson giving a platform to Nick Fuentes, who openly celebrates Stalin and Hitler. This incident caused division after the Heritage Foundation's president, Kevin Roberts, defended Carlson, prompting Roberts to issue an apology. SECOND HOUR 10-1015 Commodity Markets and UK Political Instability. Simon Constable analyzes rare earth markets, noting China's dominance is achieved through undercutting prices and buying out competitors. Prices for key industrial commodities like copper and aluminum are up, indicating high demand. Constable also discusses UK political instability, noting that Labour Prime Minister Keir Starmer lacks natural leadership and confidence. The major political driver for a potential leadership change is the party's broken promise regarding income taxes, which severely undermines public trust before the next election, 1015-1030 Commodity Markets and UK Political Instability. Simon Constable analyzes rare earth markets, noting China's dominance is achieved through undercutting prices and buying out competitors. Prices for key industrial commodities like copper and aluminum are up, indicating high demand. Constable also discusses UK political instability, noting that Labour Prime Minister Keir Starmer lacks natural leadership and confidence. The major political driver for a potential leadership change is the party's broken promise regarding income taxes, which severely undermines public trust before the next election 1030-1045 Austrian Economics, Von Mises, and the Fight Against Interventionism. Carola Binder discusses the Austrian School of Economics, highlighting its focus on free markets and Ludwig von Mises's opposition to government "interventionism," including rent and price controls. Mises argued these policies distort markets, leading to shortages and inefficiency. Binder emphasizes Mises's belief that economic literacy is a primary civic duty necessary for citizens to reject socialism and interventionist panaceas, especially as new generations are exposed to such ideas. 1045-1100 Austrian Economics, Von Mises, and the Fight Against Interventionism. Carola Binder discusses the Austrian School of Economics, highlighting its focus on free markets and Ludwig von Mises's opposition to government "interventionism," including rent and price controls. Mises argued these policies distort markets, leading to shortages and inefficiency. Binder emphasizes Mises's belief that economic literacy is a primary civic duty necessary for citizens to reject socialism and interventionist panaceas, especially as new generations are exposed to such ideas. THIRD HOUR 1100-1115 Philippine Missile Deployment to Deter China. Captain Jim Fanell reports that the Philippines unveiled its first operational BrahMos anti-ship cruise missile battery in western Luzon to deter Chinese aggression. This supersonic missile system, part of the $7.2 billion Reorizon 3 modernization program, gives the Philippines "skin in the game" near disputed waters like Scarborough Shoal. The deployment signifies a strategy to turn the Philippines into a "porcupine," focusing defense on the West Philippine Sea. The systems are road-mobile, making them difficult to target. 1115-1130 AI, Cyber Attacks, and Nuclear Deterrence. Peter Huessy discusses the challenges to nuclear deterrence posed by AI and cyber intrusions. General Flynn highlighted that attacks on satellites, the backbone of deterrence, could prevent the US from confirming where a launch originated. Huessy emphasizes the need to improve deterrence, noting that the US likely requires presidential authorization for retaliation, unlike potential Russian "dead hand" systems. The biggest risk is misinformation delivered by cyber attacks, although the US maintains stringent protocols and would never launch based solely on a computer warning. 1130-1145 Sudan Civil War, Global Proxies, and Nigerian Violence. Caleb Weiss and Bill Roggio analyze the civil war in Sudan between the SAF and the RSF, noting both factions commit atrocities, including massacres after the capture of El Fasher. The conflict is fueled by opposing global coalitions: the UAE and Russia support the RSF, while Iran, Egypt, and Turkey back the SAF. The Islamic State has called for foreign jihadis to mobilize. Weiss also addresses the complicated violence in Nigeria, differentiating jihadist attacks on Christians from communal farmer-herder conflict. 1145-1200 Sudan Civil War, Global Proxies, and Nigerian Violence. Caleb Weiss and Bill Roggio analyze the civil war in Sudan between the SAF and the RSF, noting both factions commit atrocities, including massacres after the capture of El Fasher. The conflict is fueled by opposing global coalitions: the UAE and Russia support the RSF, while Iran, Egypt, and Turkey back the SAF. The Islamic State has called for foreign jihadis to mobilize. Weiss also addresses the complicated violence in Nigeria, differentiating jihadist attacks on Christians from communal farmer-herder conflict. FOURTH HOUR 12-1215 Corruption, Chinese Influence, and Protests in Serbia. Ivana Stradner discusses protests in Serbia demanding accountability one year after a canopy collapse killed 16 people, with investigations linking the accident to high-level corruption involving a Chinese company. Leader Vučić suppresses discontent by alleging the West is plotting a "color revolution." Although Vučić aligns his heart with Russia and China, he needs EU money for political survival, prompting him to offer weapons to the West and claim Serbia is on the EU path. 1215-1230 The Muslim Brotherhood and Its Global Network. Cliff May discusses the Muslim Brotherhood (MB), the progenitor of Hamas, founded in 1928 after the Ottoman Caliphate's abolition. The MB's goal is to establish a new Islamic empire. Qatar is highly supportive, hosting Hamas leaders, while the UAE and Saudi Arabia have banned the MB. Turkish President Erdoğan is considered MB-adjacent and sympathetic, supporting Hamas and potentially viewing himself as a future Caliph, despite Turkey being a NATO member. 1230-1245 Commercial Space Records and Political Impacts on NASA. Bob Zimmerman covers new records in commercial space: SpaceX achieved 147 launches this year, and one booster tied the Space Shuttle Columbia for 28 reuses. China also set a record with 70 launches but had a failure. Commercial space faced temporary impacts, such as an FAA launch curfew due to a government shutdown and air traffic controller shortages. Zimmerman speculates that Jared Isaacman's conservative-leaning public appearance at Turning Point USA might have convinced Trump to renominate him for NASA Administrator. 1245-100 AM Commercial Space Records and Political Impacts on NASA. Bob Zimmerman covers new records in commercial space: SpaceX achieved 147 launches this year, and one booster tied the Space Shuttle Columbia for 28 reuses. China also set a record with 70 launches but had a failure. Commercial space faced temporary impacts, such as an FAA launch curfew due to a government shutdown and air traffic controller shortages. Zimmerman speculates that Jared Isaacman's conservative-leaning public appearance at Turning Point USA might have convinced Trump to renominate him for NASA Administrator.
AI, Cyber Attacks, and Nuclear Deterrence. Peter Huessy discusses the challenges to nuclear deterrence posed by AI and cyber intrusions. General Flynn highlighted that attacks on satellites, the backbone of deterrence, could prevent the US from confirming where a launch originated. Huessy emphasizes the need to improve deterrence, noting that the US likely requires presidential authorization for retaliation, unlike potential Russian "dead hand" systems. The biggest risk is misinformation delivered by cyber attacks, although the US maintains stringent protocols and would never launch based solely on a computer warning.
How Middletown is recovering from a crippling strike.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst In today's episode, we cover the breach at the US Congressional Budget Office and its implications on national security, Microsoft Teams' chat feature being exploited for phishing attacks, and the increasing use of AI in cyber attacks. We also highlight how Canadian veterans are being retrained for careers in cybersecurity through the Coding for Veterans program. Hosted by Jim Love, we thank Meter for supporting this podcast with their complete networking stack solutions. 00:00 Introduction and Sponsor Message 00:51 US Congressional Budget Office Breach 02:27 Microsoft Teams Phishing Exploit 03:42 AI in Cybersecurity Attacks 06:09 Veterans in Cybersecurity 07:44 Conclusion and Sponsor Message
Researchers at Microsoft have developed a new simulation environment for testing AI agents, revealing surprising weaknesses in the current state-of-the-art. Also, Penn experienced a data breach on Friday as hackers sent messages boasting of the hack to the university community. Learn more about your ad choices. Visit podcastchoices.com/adchoices
In today's episode of DMJXpat, we discuss the newest developments in the US, report on the aftermath of Hurricane Melissa, and reflect with our guest Ana about what we would do if a global crisis were to break out in Denmark.
Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Davi Ottenheimer, vp, digital trust and ethics, Inrupt, and Rob Teel, Field CTO, GigaOm Thanks to our show sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero-trust endpoint protection platform, ThreatLocker fills the gaps traditional solutions leave behind, giving your business stronger security and control. Don't just react to threats — stop them with ThreatLocker. All links and the video of this episode can be found on CISO Series.com
What's going on in Global Trade this Week? Today Pete Mento and Doug Draper cover: 3:22 -China Trade Updates: Reasons for Optimism & Risk 8:27 -Expansion in English Proficiency Enforcement 15:22 -Halftime 22:30 -Rise in Cyber Attacks 28:18 -USPS to do Final Mile for UPS https://www.capwwide.com/international-insights/11/3/25/gttw-podcast-episode-217
CyberIntel - Talking Cybersecurity and Compliance (Presented by VikingCloud)
In this episode of VikingCloud's CyberIntel, Brian Odian discusses how cyberattacks are used to show the attacker's capability and to sow doubt amongst the public.
In this episode of Cybersecurity Today, host Jim Love covers a series of alarming cybersecurity incidents. Key highlights include Ernst and Young exposing a massive 4TB database to the open internet, a former L3 Harris executive guilty of selling zero-day exploits to a Russian broker, a sophisticated zero-day spyware campaign hitting Chrome, and a nation-state cyberattack on US telecom provider Ribbon Communications. Tune in to understand the critical lessons from these breaches and the emerging risks in cybersecurity. 00:00 EY's Massive Data Exposure 02:05 US Defense Contractor's Insider Threat 03:33 Chrome's Zero Day Vulnerability 05:24 Nation-State Hackers Breach US Telecom 06:51 Conclusion and Contact Information
For years, working on AI safety usually meant theorising about the ‘alignment problem' or trying to convince other people to give a damn. If you could find any way to help, the work was frustrating and low feedback.According to Anthropic's Holden Karnofsky, this situation has now reversed completely.There are now large amounts of useful, concrete, shovel-ready projects with clear goals and deliverables. Holden thinks people haven't appreciated the scale of the shift, and wants everyone to see the large range of ‘well-scoped object-level work' they could personally help with, in both technical and non-technical areas.Video, full transcript, and links to learn more: https://80k.info/hk25In today's interview, Holden — previously cofounder and CEO of Open Philanthropy — lists 39 projects he's excited to see happening, including:Training deceptive AI models to study deception and how to detect itDeveloping classifiers to block jailbreakingImplementing security measures to stop ‘backdoors' or ‘secret loyalties' from being added to models in trainingDeveloping policies on model welfare, AI-human relationships, and what instructions to give modelsTraining AIs to work as alignment researchersAnd that's all just stuff he's happened to observe directly, which is probably only a small fraction of the options available.Holden makes a case that, for many people, working at an AI company like Anthropic will be the best way to steer AGI in a positive direction. He notes there are “ways that you can reduce AI risk that you can only do if you're a competitive frontier AI company.” At the same time, he believes external groups have their own advantages and can be equally impactful.Critics worry that Anthropic's efforts to stay at that frontier encourage competitive racing towards AGI — significantly or entirely offsetting any useful research they do. Holden thinks this seriously misunderstands the strategic situation we're in — and explains his case in detail with host Rob Wiblin.Chapters:Cold open (00:00:00)Holden is back! (00:02:26)An AI Chernobyl we never notice (00:02:56)Is rogue AI takeover easy or hard? (00:07:32)The AGI race isn't a coordination failure (00:17:48)What Holden now does at Anthropic (00:28:04)The case for working at Anthropic (00:30:08)Is Anthropic doing enough? (00:40:45)Can we trust Anthropic, or any AI company? (00:43:40)How can Anthropic compete while paying the “safety tax”? (00:49:14)What, if anything, could prompt Anthropic to halt development of AGI? (00:56:11)Holden's retrospective on responsible scaling policies (00:59:01)Overrated work (01:14:27)Concrete shovel-ready projects Holden is excited about (01:16:37)Great things to do in technical AI safety (01:20:48)Great things to do on AI welfare and AI relationships (01:28:18)Great things to do in biosecurity and pandemic preparedness (01:35:11)How to choose where to work (01:35:57)Overrated AI risk: Cyberattacks (01:41:56)Overrated AI risk: Persuasion (01:51:37)Why AI R&D is the main thing to worry about (01:55:36)The case that AI-enabled R&D wouldn't speed things up much (02:07:15)AI-enabled human power grabs (02:11:10)Main benefits of getting AGI right (02:23:07)The world is handling AGI about as badly as possible (02:29:07)Learning from targeting companies for public criticism in farm animal welfare (02:31:39)Will Anthropic actually make any difference? (02:40:51)“Misaligned” vs “misaligned and power-seeking” (02:55:12)Success without dignity: how we could win despite being stupid (03:00:58)Holden sees less dignity but has more hope (03:08:30)Should we expect misaligned power-seeking by default? (03:15:58)Will reinforcement learning make everything worse? (03:23:45)Should we push for marginal improvements or big paradigm shifts? (03:28:58)Should safety-focused people cluster or spread out? (03:31:35)Is Anthropic vocal enough about strong regulation? (03:35:56)Is Holden biased because of his financial stake in Anthropic? (03:39:26)Have we learned clever governance structures don't work? (03:43:51)Is Holden scared of AI bioweapons? (03:46:12)Holden thinks AI companions are bad news (03:49:47)Are AI companies too hawkish on China? (03:56:39)The frontier of infosec: confidentiality vs integrity (04:00:51)How often does AI work backfire? (04:03:38)Is AI clearly more impactful to work in? (04:18:26)What's the role of earning to give? (04:24:54)This episode was recorded on July 25 and 28, 2025.Video editing: Simon Monsour, Luke Monsour, Dominic Armstrong, and Milo McGuireAudio engineering: Milo McGuire, Simon Monsour, and Dominic ArmstrongMusic: CORBITCoordination, transcriptions, and web: Katy Moore
In this episode of Unspoken Security, host A.J. Nash sits down with Dominic Vogel, founder of Vogel Leadership & Coaching, to discuss the importance of bringing humanity back into the cybersecurity field. Dominic shares his journey from corporate burnout to becoming an advocate for kindness and authenticity in an industry often focused on metrics and technology.Dominic explains how leading with empathy and building real, human connections can transform the workplace. He emphasizes that in a high-stress field like cybersecurity, creating positive environments is crucial for maintaining mental well-being and productivity. The conversation also touches on Dominic's leadership approach, where he prioritizes relationships and kindness over traditional, rigid business strategies. Tune in to learn how Dominic is reshaping cybersecurity leadership by focusing on people first, showing that a human-centered approach can lead to long-term success in both business and personal life.Send us a textSupport the show
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Holy frijoles - mind the gap and pardon the delay. Too many doins are afoot and we owe you a few (episodes). Right here's another one from the pile, with a caffeine rodeo on the back of projects getting done. Point is, figure the next step and do it - dudes do, after all, and geeks get it done. There's tales of fine woodworking, failing lithium-ion deathpods, a decent beer 'n burn, and when it's all done, strategies for a righteous nap. Plus that up with a Garage Hour Reload that digs back into the disappearance of Amelia Earhart and Fred Noonan and why T.I.G.H.A.R. and Gardner Island probably still hold the key. But wait: Kipple's back, Mt. Dew and Hostess apple pies never left, someone's messing with beer, China's messing with Burma, real eatin' with some proper Dude Food, and real messaging for fake meat (and why a veggie burger ain't as bad as one of those new fake-meat cancer patties). Also, how about a classy sendoff for Dr. Demento?
Holy frijoles - mind the gap and pardon the delay. Too many doins are afoot and we owe you a few (episodes). Right here's another one from the pile, with a caffeine rodeo on the back of projects getting done. Point is, figure the next step and do it - dudes do, after all, and geeks get it done. There's tales of fine woodworking, failing lithium-ion deathpods, a decent beer 'n burn, and when it's all done, strategies for a righteous nap. Plus that up with a Garage Hour Reload that digs back into the disappearance of Amelia Earhart and Fred Noonan and why T.I.G.H.A.R. and Gardner Island probably still hold the key. But wait: Kipple's back, Mt. Dew and Hostess apple pies never left, someone's messing with beer, China's messing with Burma, real eatin' with some proper Dude Food, and real messaging for fake meat (and why a veggie burger ain't as bad as one of those new fake-meat cancer patties). Also, how about a classy sendoff for Dr. Demento?
In this episode of Cybersecurity Today, host David Shipley covers the latest updates from the Pwn2Own 2025 event in Ireland, where top hackers earned over $1 million for uncovering 73 zero-day vulnerabilities. Despite significant hype, AI's impact on cybersecurity remains limited. We also dive into a critical Microsoft WSUS flaw under active exploitation and its implications for U.S. government cyber defenses amid a federal shutdown. Lastly, ESET reports reveal North Korea's increased cyber espionage targeting European drone manufacturers. Stay informed on the ever-evolving landscape of cybersecurity threats and defenses. 00:00 Introduction and Headlines 00:29 Pwn to Own 2025 Highlights 02:35 AI's Role in Cybersecurity 03:43 Microsoft's Critical WSUS Vulnerability 07:24 US Government Shutdown and Cyber Attacks 10:04 North Korean Cyber Espionage 12:46 Conclusion and Call to Action
Link to episode page This week's Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guests David Cross, CISO, Atlassian, and davidcrosstravels.com, and Montez Fitzpatrick, CISO, Navvis Thanks to our show sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero-trust endpoint protection platform, ThreatLocker fills the gaps traditional solutions leave behind, giving your business stronger security and control. Don't just react to threats — stop them with ThreatLocker. All links and the video of this episode can be found on CISO Series.com
From the BBC World Service: Experts have estimated that the cyberattack on Jaguar Land Rover — which halted car production there for multiple weeks — cost the carmaker roughly $2.55 billion, making the breach the most expensive in the country's history. We'll do the numbers. And later in the program, tourism has long played a central part in Cuba's economy. So what impact have the Trump administration's new sanctions had?
From the BBC World Service: Experts have estimated that the cyberattack on Jaguar Land Rover — which halted car production there for multiple weeks — cost the carmaker roughly $2.55 billion, making the breach the most expensive in the country's history. We'll do the numbers. And later in the program, tourism has long played a central part in Cuba's economy. So what impact have the Trump administration's new sanctions had?
On this episode of Rich Valdés America at Night, Drew Horn, CEO of GreenMet and former energy and defense official under Vice President Pence, discusses the new U.S.–Australia rare earths partnership, how it strengthens America First policies, and what it means for countering China's dominance in critical minerals. Then, cybersecurity expert and former CIA operative Eric Cole, CEO of Secure Anchor, breaks down the massive Amazon internet outage and whether China's cyber influence could be involved. Finally, retired lawyer and former Margaret Thatcher speechwriter Geoffrey Gilson explores the stunning fall of Prince Andrew and how it reshaped the modern British monarchy. Plus, Rich takes your calls on global power, privacy, and politics. Learn more about your ad choices. Visit podcastchoices.com/adchoices
In this episode of Cybersecurity Today, your host Jim Love discusses Microsoft's latest findings on how ransomware and extortion account for over half of all cyber attacks globally, highlighting the shift toward financially driven crimes. Learn about the breach at the Kansas City National Security Campus due to a SharePoint vulnerability and how Anthropic's new open-source sandbox aims to make AI coding safer. Additionally, discover how AI tools can help spot scams as Jim shares his personal experience and practical tips. Stay informed on the latest cybersecurity trends and essential defense strategies. 00:00 Introduction and Headlines 00:26 Ransomware Dominates Cyber Attacks 02:12 Nuclear Facility Breach via SharePoint Flaw 04:27 Anthropic's AI Code Sandbox 06:01 Using AI to Spot Scams 07:27 Conclusion and Viewer Engagement
____________Podcast Redefining Society and Technology Podcast With Marco Ciappellihttps://redefiningsocietyandtechnologypodcast.com ____________Host Marco CiappelliCo-Founder & CMO @ITSPmagazine | Master Degree in Political Science - Sociology of Communication l Branding & Marketing Advisor | Journalist | Writer | Podcast Host | #Technology #Cybersecurity #Society
AWS outage breakdown with Rich DeMuro (nope, not a cyberattack), LA trigger words only locals will get, Dodgers 50/50 madness, the secret Chipotle celebrity card, and Andy asks: what spot deserves free food for life?
Peter Marks, mobile software developer and technology commentator from Access Informatics, joined Philip Clark and listeners to Nightlife with a comprehensive discussion.
From major global businesses to personal accounts, cyberattacks are no longer rare - they're a part of everyday life. On this week's episode of Somewhere on Earth, we explore how individuals and nations are fighting back. Learn practical tips for securing your passwords, discover what “digital housekeeping” really means, and get an inside look at how Ukraine is defending itself whilst training the next generation of cybersecurity experts. Tune in for expert insights that could save you from your next online threat. The programme is presented by Ania Lichtarowicz. More on this week's stories: Professor Oli Buckley Iryna Volnytska Production Manager: Liz Tuohy Editor: Ania Lichtarowicz For the PodExtra version of the show please subscribe via this link: https://somewhere-on-earth-the-global-tech-podcast-the-podextra-edition.pod.fan/ Follow us on the socials: Join our Facebook group Instagram BlueSky If you like Somewhere on Earth, please rate and review it on Apple Podcasts or Spotify Contact us by email: hello@somewhereonearth.co Send us a voice note: via WhatsApp: +44 7486 329 484 Find a Story + Make it News = Change the World Learn more about your ad choices. Visit megaphone.fm/adchoices
Link to episode page This week's Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guests Tom Hollingsworth, networking technology advisor, The Futurum Group, as well as on BlueSky, and Brett Conlon, CISO, American Century Investments Thanks to our show sponsor, Vanta What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" ….or the really scary one: "how do I get out from under these old tools and manual processes? Enter Vanta. Vanta automates manual work, so you can stop sweating over spreadsheets, chasing audit evidence, and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data, and simplifies your security at scale. Vanta also fits right into your workflows, using AI to streamline evidence collection, flag risks, and keep your program audit-ready—ALL…THE…TIME. With Vanta, you get everything you need to move faster, scale confidently—and get back to sleep. Get started at vanta.com/headlines All links and the video of this episode can be found on CISO Series.com
Sotheby's suffers cyberattack Hackers exploit Cisco SNMP flaw in "Zero Disco' attacks Microsoft revokes more than 200 certificates to disrupt ransomware campaign Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" ....or the really scary one: "how do I get out from under these old tools and manual processes? Enter Vanta. Vanta automates manual work, so you can stop sweating over spreadsheets, chasing audit evidence, and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data, and simplifies your security at scale. Vanta also fits right into your workflows, using AI to streamline evidence collection, flag risks, and keep your program audit-ready—ALL…THE…TIME. With Vanta, you get everything you need to move faster, scale confidently—and get back to sleep. Get started at vanta.com/headlines Find the stories behind the headlines at CISOseries.com.
October is National Cybersecurity Awareness Month, a time to reflect on the many things we do as a school District to keep student data safe and protect employees and families from falling victim to phishing and other scams. On this episode, find out how partnering with parents and the community can make a big difference ...continue reading "Episode 319: How We Protect Student Data and Defend the District Against Cyber Attacks"
In this episode of Unspoken Security, host A.J. Nash sits down with LaurenZabierek, Senior Vice President for the Future of Digital Security at theInstitute for Security and Technology. Together, they examine how thetraditional view of national security often overlooks the people it seeks toprotect. Lauren shares why national security must move beyond militaryand government, and instead focus on the everyday risks that affecteveryone—whether that's cybersecurity, healthcare, or even climate safety.Lauren makes a strong case for widening the lens on security. She explainswhy protecting people requires new thinking and fresh policies, not justmore funding for defense. She also describes the need for face-to-faceconnections and open dialogue to rebuild trust and unity in a fracturedworld.The conversation turns to software and the Secure by Design movement.Lauren outlines how changing incentives for software companies can leadto safer products. She draws on lessons from automotive and aviationsafety to show paths forward, and encourages listeners to help drivedemand for secure technology across all industries.Send us a textSupport the show
AP correspondent Ed Donahue reports on increasing threats from AI.
Efficiency works when everything goes to plan. But as disruptions grow more frequent and complex, resilience and preparation are what set strong supply chains apart. In this episode, logistics expert John Manners-Bell, founder and CEO of Transport Intelligence, joins hosts Reid Jackson and Liz Sertl to discuss what leaders need to know about supply chain risk, technology, and balance. With over 40 years in the industry advising organizations like the World Economic Forum, the UN, and the European Commission, John shares hard-earned lessons from real-world crises and why efficiency is not enough. Listeners will gain a sharper understanding of how to prepare for disruption, enhance visibility across their networks, and utilize AI and data to build more resilient operations. In this episode, you'll learn: How to measure the cost of supply chain risk Why you need to prioritize resilience in supply chain strategy How AI helps logistics leaders anticipate risks and plan accordingly Jump into the conversation: (00:00) Introducing Next Level Supply Chain (04:14) Why supply chain risk is everyone's problem (06:41) Balancing efficiency and resilience for long-term success (11:07) Why inventory alone won't save your business (12:51) How visibility and data transform modern supply chains (16:24) Cyberattacks, paper backups, and recovery stories (18:18) The rise of AI and automation in logistics (22:12) Lessons from companies that built resilience (25:57) The mindset every future-ready supply chain leader needs Connect with GS1 US: Our website - www.gs1us.orgGS1 US on LinkedIn Connect with the guests: John Manners-Bell on LinkedIn Check out Transport Intelligence
The Smart 7 is an award winning daily podcast, in association with METRO, that gives you everything you need to know in 7 minutes, at 7am, 7 days a week…With over 19 million downloads and consistently charting, including as No. 1 News Podcast on Spotify, we're a trusted source for people every day and we've won Gold at the Signal International Podcast awardsIf you're enjoying it, please follow, share, or even post a review, it all helps... Today's episode includes the following: https://x.com/i/status/1978080670292291941 https://x.com/i/status/1978076765877645676 https://x.com/i/status/1978071994202472879 https://x.com/i/status/1978043451439456469 https://x.com/i/status/1978050651021267315 https://x.com/i/status/1978118052840362177 https://x.com/i/status/1978208309652967788 https://youtu.be/Cxe_YMJ4nUs https://youtu.be/dqolYtJGuf4 Contact us over @TheSmart7pod or visit www.thesmart7.com or find out more at www.metro.co.uk Voiced by Jamie East, using AI, written by Liam Thompson, researched by Lucie Lewis and produced by Daft Doris. Hosted on Acast. See acast.com/privacy for more information.
Cyberattacks have brought firms like Jaguar Land Rover and Asahi to a standstill. Our correspondent asks what companies and governments should do about a rising problem. Why it is getting harder to count deaths in Africa. And is eating dark chocolate actually good for you? Listen to what matters most, from global politics and business to science and technology—Subscribe to Economist Podcasts+For more information about how to access Economist Podcasts+, please visit our FAQs page or watch our video explaining how to link your account. Hosted on Acast. See acast.com/privacy for more information.
Cyberattacks have brought firms like Jaguar Land Rover and Asahi to a standstill. Our correspondent asks what companies and governments should do about a rising problem. Why it is getting harder to count deaths in Africa. And is eating dark chocolate actually good for you? Listen to what matters most, from global politics and business to science and technology—Subscribe to Economist Podcasts+For more information about how to access Economist Podcasts+, please visit our FAQs page or watch our video explaining how to link your account. Hosted on Acast. See acast.com/privacy for more information.
From the BBC World Service: Chief executives have been urged to plan for computer security breaches by going back to pen and paper. The U.K. government told CEOs to plan offline contingencies after a number of high-profile attacks on companies — hacks that cost global brands millions of dollars. We'll learn more. Plus, delegates are in London for U.N. talks aimed at reducing the environmental impact of global shipping. And, we'll hear about the impact of tariffs on Swiss businesses.
Today, serious cyber attacks are on the rise and the government is telling businesses to make pen and paper plans to help them prepare. Adam is joined by BBC cyber correspondent Joe Tidy and Emily Taylor, CEO of Oxford Information Labs and co-founder of the Global Signal Exchange, to discuss why more serious attacks are on the rise and what else can be done.Plus, Chris and Adam are reunited to talk about the Prime Minister's statement to the House of Commons about the ceasefire between Israel and Hamas as well as the controversial collapse of the case against two men accused of spying for China.You can now listen to Newscast on a smart speaker. If you want to listen, just say "Ask BBC Sounds to play Newscast”. It works on most smart speakers. You can join our Newscast online community here: https://bbc.in/newscastdiscordGet in touch with Newscast by emailing newscast@bbc.co.uk or send us a WhatsApp on +44 0330 123 9480.New episodes released every day. If you're in the UK, for more News and Current Affairs podcasts from the BBC, listen on BBC Sounds: https://bbc.in/4guXgXd Newscast brings you daily analysis of the latest political news stories from the BBC. The presenter was Adam Fleming. It was made by Anna Harris with Shiler Mahmoudi and Adriana Urbano. The social producers were Sophie Millward and Grace Braddock. The technical producer was Mike Regaard. The assistant editor is Chris Gray. The senior news editor is Sam Bonham
From the BBC World Service: Chief executives have been urged to plan for computer security breaches by going back to pen and paper. The U.K. government told CEOs to plan offline contingencies after a number of high-profile attacks on companies — hacks that cost global brands millions of dollars. We'll learn more. Plus, delegates are in London for U.N. talks aimed at reducing the environmental impact of global shipping. And, we'll hear about the impact of tariffs on Swiss businesses.
How is the transition to passkeys going in 2025?
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
News and Updates: Asahi Beer Shortage Looms: A ransomware attack crippled Asahi's IT systems, halting operations at most of its 30 Japanese factories. The brewer warns of beer shortages with no recovery timeline. Instagram Chief Denies Eavesdropping: Adam Mosseri insists Instagram doesn't use your microphone for ads. He blames ad coincidences on algorithms, web tracking, and user interactions—though few users believe him. Bezos Predicts Space Data Centers: Jeff Bezos says gigawatt-scale orbital data centers could emerge within 20 years, harnessing constant solar power and outpacing Earth-based facilities in cost and efficiency. Gen Z Embraces Old Tech: Teens and young adults are ditching smartphones for CDs, flip phones, and digital cameras to regain control over tech use, fueling a nostalgic low-tech revival movement. Amazon Drone Crash in Arizona: Two Prime Air drones collided with a crane and caught fire in Tolleson. No injuries reported; FAA and NTSB investigating as Amazon resumes limited drone flights. California Drivers Win Union Rights: Gov. Newsom signed AB 1340 granting 800,000 Uber and Lyft drivers the right to unionize as contractors—a landmark gig economy law, though delivery drivers are excluded.
Azure outage blocks access to Microsoft 365 services and admin portals Major U.S. law firm suffers cyberattack Hacktivists aiming for critical infrastructure get pwned Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero-trust endpoint protection platform, ThreatLocker fills the gaps traditional solutions leave behind, giving your business stronger security and control. Don't just react to threats — stop them with ThreatLocker. Learn more at ThreatLocker.com. Find the stories behind the headlines at CISOseries.com.
AI-powered cyberattacks are rapidly evolving, prompting a significant shift in cybersecurity strategies. According to a recent Gartner report, IT leaders are expected to allocate over half of their cybersecurity budgets to preemptive defense measures by 2030. This change is driven by the inadequacy of traditional detection and response tools in the face of sophisticated cyber threats, particularly those enhanced by artificial intelligence. Experts warn that while preemptive measures can mitigate risks, organizations may encounter challenges in integrating these new systems and overcoming cultural inertia.Datadog's 2025 State of Cloud Security Report highlights a growing trend among organizations adopting data perimeters to combat credential theft, with 40% of organizations implementing this advanced security practice. Additionally, 86% of organizations are utilizing multi-account setups within AWS, which allows for better enforcement of security protocols. Meanwhile, OpenAI's report reveals that cybercriminals are increasingly leveraging AI for malicious activities, including phishing and surveillance, showcasing the urgent need for enhanced cybersecurity measures.In response to market pressures, Synology has reversed its policy on drive restrictions for its network-attached storage models, allowing the use of non-validated third-party drives. This decision comes after user feedback indicated dissatisfaction with the previous requirement for proprietary drives, which were often more expensive. For managed service providers (MSPs), this change offers greater flexibility and cost-effectiveness, making Synology's products more appealing once again.Pax8 has launched the Pax8 Agent Store, a platform designed to help MSPs adopt and offer AI-driven tools to small and medium-sized businesses. This marketplace aims to facilitate the integration and monetization of intelligent automation solutions, with early access set for December 2025. Additionally, SolarWinds has introduced an AI agent to enhance operational resilience for IT teams, while Barracuda Networks has launched Barracuda Research, a centralized resource for threat intelligence. Both initiatives aim to empower organizations in managing cybersecurity threats more effectively. Four things to know today00:00 Gartner, OpenAI, Datadog, and DHS Paint a Stark Cyber Future: AI Attacks Surge, Budgets Shift, and Defenses Fracture06:01 New Pax8 Platform Targets Repeatable AI Services, Sets Early Access for December08:03 Synology Reverses Course on Pricey Drives — Because You Stopped Buying09:53 SolarWinds and Barracuda Push AI to Ease IT Burdens—But Can They Deliver Real Value? This is the Business of Tech. Supported by: Comet, Scalepad Webinar: https://bit.ly/msprmail
Timestamps: 0:00 James' Anatomy 0:15 Sora No. 1 on App Store 1:33 Google addresses Android sideloading 2:31 Apple removes ICEblock app 3:27 Squarespace! 4:12 QUICK BITS INTRO 4:21 Tesla Cybertruck door lawsuit 5:12 Nvidia GPU overheating solution 5:55 Quantum computing 2-hour breakthrough 6:50 Cyberattack depletes Asahi beer in Japan 7:39 Computer mouse records audio NEWS SOURCES: https://lmg.gg/EnHYL Learn more about your ad choices. Visit megaphone.fm/adchoices
Small businesses have become the number one target for cyber attacks, yet most entrepreneurs don't realize how vulnerable they are until it's too late. One attack could wipe out years of growth and instantly damage customer trust. In this episode, presented by Bitdefender, Ramon explains why cybersecurity is essential for small business owners and how they can protect their business from today's digital threats without hiring an IT team or becoming a tech expert. In this episode, Hala and Ramon will discuss: (00:00) Introduction (03:03) Entrepreneurship Lessons and Personal Branding (06:09) Public Speaking Strategies to Build Influence (09:51) Why Small Businesses are at Risk of Cyber Threats (12:21) Common Cyber Attacks and How to Prevent Them (18:37) Cyber Attack Scenarios and What to Do (28:49) How Creator Entrepreneurs Build Audience Trust (33:15) How Entrepreneurs Profit by Embracing Failure Ramon Ray is a serial entrepreneur, bestselling author, keynote speaker, and small business expert. He is the publisher of ZoneofGenius.com and has spoken to global audiences on major stages, including SXSW, VeeCon, and the Aspire Tour. As Bitdefender's Small Business Ambassador, Ramon helps entrepreneurs protect their businesses against cybersecurity threats. Sponsored By: Bitdefender Ultimate Small Business Security: Save 30% when you go to bitdefender.com/profiting Resources Mentioned: Ramon's Book, The Celebrity CEO: bit.ly/CelebCEO Ramon's Website: zoneofgenius.com Active Deals - youngandprofiting.com/deals Key YAP Links Reviews - ratethispodcast.com/yap YouTube - youtube.com/c/YoungandProfiting LinkedIn - linkedin.com/in/htaha Instagram - instagram.com/yapwithhala Social + Podcast Services: yapmedia.com Transcripts - youngandprofiting.com/episodes-new Disclaimer: This episode is a paid partnership with Bitdefender. Sponsored content helps support our podcast and continue bringing valuable insights to our audience. Entrepreneurship, Entrepreneurship Podcast, Business, Business Podcast, Self Improvement, Self-Improvement, Personal Development, Starting a Business, Strategy, Investing, Sales, Selling, Psychology, Productivity, Entrepreneurs, AI, Artificial Intelligence, Technology, Marketing, Negotiation, Money, Finance, Side Hustle, Startup, Mental Health, Career, Leadership, Mindset, Health, Growth Mindset, Passive Income, Online Business, Solopreneur, Founder, Networking
On this week's show Patrick Gray is on holiday so Amberleigh Jack and Adam Boileau hijack the studio to discuss the week's cybersecurity news, including: Hackers learn that trying to coerce a journalist just makes for … a great story? A man in his 40s gets arrested over the European airport chaos. Yep, we're surprised, too. Adam fanboys over Watchtowr Labs while bemoaning Fortra. Academics pick apart Tile trackers and find them lacking CISA tells agencies to patch their damn Cisco gear This episode is also available on YouTube. Show notes 'You'll never need to work again': Criminals offer reporter money to hack BBC Government to guarantee £1.5bn Jaguar Land Rover loan after cyber shutdown Feds Tie ‘Scattered Spider' Duo to $115M in Ransoms – Krebs on Security UK authorities arrest man in connection with cyberattack against aviation vendor | Cybersecurity Dive Chinese scammer pleads guilty after UK seizes nearly $7 billion in bitcoin Cyberattack on Japanese beer giant Asahi limits shipping, call center operations | The Record from Recorded Future News Afghanistan plunged into nationwide internet blackout, disrupting air travel, medical care | The Record from Recorded Future News Tile trackers are a stalker's dream, say Georgia Tech researchers Intel and AMD trusted enclaves, the backbone of network security, fall to physical attacks - Ars Technica Supermicro server motherboards can be infected with unremovable malware - Ars Technica China-linked hackers use ‘BRICKSTORM' backdoor to steal IP | The Record from Recorded Future News Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors Federal agencies given one day to patch exploited Cisco firewall bugs | The Record from Recorded Future News Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability Is This Bad? This Feels Bad. (Fortra GoAnywhere CVE-2025-10035) It Is Bad (Exploitation of Fortra GoAnywhere MFT CVE-2025-10035) - Part 2
Episode 677: Toby and Kyle recap the shaking situation over in Argentina as President Javier Milei's free-market revolution is starting to teeter. Then, a string of cyberattacks rips through European airports and Jaguar Land Over, Britain's largest carmaker. And, the OECD raises its outlook on the global economy stating its more resilient to Trump's tariffs than initially estimated…but not immune. Meanwhile, there's a new top-spot for beer in the US: Michelob Ultra. 00:00 - Send us your group chats! 3:00 - Jimmy Kimmel is back 7:10 - Argentina's Milei is having a rough go 11:45 - Cyberattacks tear through Europe 18:20 - OECD updates its outlook 22:00 - Michelob cracks the top spot 25:20 - Sprint Finish! You can try reMarkable Paper Pro Move for 100 days for free. If it's not what you're looking for, get your money back. Get your paper tablet at https://www.remarkable.com today Get your MBD live show tickets here! https://www.tinyurl.com/MBD-HOLIDAY Presale code LETSRIDE Subscribe to Morning Brew Daily for more of the news you need to start your day. Share the show with a friend, and leave us a review on your favorite podcast app. Listen to Morning Brew Daily Here: https://www.swap.fm/l/mbd-note Watch Morning Brew Daily Here: https://www.youtube.com/@MorningBrewDailyShow Learn more about your ad choices. Visit megaphone.fm/adchoices