POPULARITY
Categories
If you like what you hear, please subscribe, leave us a review and tell a friend!
Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Jacob Coombs, CISO, Tandem Diabetes Care, and Ross Young, Co-host, CISO Tradecraft Thanks to our show sponsor, Vanta What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" ….or the really scary one: "how do I get out from under these old tools and manual processes? Enter Vanta. Vanta automates manual work, so you can stop sweating over spreadsheets, chasing audit evidence, and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data, and simplifies your security at scale. Vanta also fits right into your workflows, using AI to streamline evidence collection, flag risks, and keep your program audit-ready—ALL…THE…TIME. With Vanta, you get everything you need to move faster, scale confidently—and get back to sleep. Get started at vanta.com/headlines All links and the video of this episode can be found on CISO Series.com
Parce que… c'est l'épisode 0x659! Shameless plug 17 au 20 novembre 2025 - European Cyber Week 25 et 26 février 2026 - SéQCure 2026 14 au 17 avril 2026 - Botconf 2026 28 et 29 avril 2026 - Cybereco Cyberconférence 2026 9 au 17 mai 2026 - NorthSec 2026 3 au 5 juin 2025 - SSTIC 2026 Notes IA AI Agents Are Going Rogue: Here's How to Rein Them In AI Security Agents Get Persona Makeovers List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities Ransomware Attack on European Organizations Surge as Hackers Leveraging AI-Tools for Attacks UofT: Canada isn't doing its part to stop AI surveillance MIT Retracts Controversial AI Ransomware Study Amid Expert Scrutiny Kevin Beaumont: “The whole report is like that …” - Cyberplace Microsoft: SesameOp malware abuses OpenAI Assistants API in attacks Blue MITRE ATT&CKcon - ATT&CKcon 6.0 Chrome Emergency Update to Patch Multiple Vulnerabilities that Enable Remote Code Execution Apple addresses more than 100 vulnerabilities in security updates for iPhones, Macs and iPads Microsoft removing Defender Application Guard from Office Microsoft Entra Credentials in the Authenticator App on Jail-Broken Devices to be Wiped Out Red Teams New BOF Tool Exploits Microsoft Teams' Cookie Encryption allowing Attackers to Access User Chats Microsoft Teams' New “Chat with Anyone” Feature Exposes Users to Phishing and Malware Attacks Hackers Can Exploit Microsoft Teams Vulnerabilities to Manipulate Messages and Alter Notifications Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection Danish authorities in rush to close security loophole in Chinese electric buses 2025 Insider Risk Report Finds Most Organizations Struggle to Detect and Predict Insider Risks Violent cybercrime surges in Europe amid big payouts Cybercriminals, OCGs team up on lucrative cargo thefts DOJ accuses US ransomware negotiators of launching their own ransomware attacks Legalize Legal Corner - Apple's notarisation – blocking software freedom of developers and users Microsoft's data sovereignty: Now with extra sovereignty! DHS wants more biometric data - even from citizens Divers Microsoft's lack of quality control is out of control Cybersecurity Forecast 2026 - Google Warns Threat Actors Use AI to Enhance Speed and Effectiveness ISPs more likely to throttle CGNAT traffic: Cloudflare Collaborateurs Nicolas-Loïc Fortin Crédits Montage par Intrasecure inc Locaux réels par Intrasecure inc
If you like what you hear, please subscribe, leave us a review and tell a friend!
If you like what you hear, please subscribe, leave us a review and tell a friend!
China-Linked hackers target Cisco firewalls. MIT Sloan withdraws controversial “AI-Driven Ransomware” paper. A new study questions the value of cybersecurity training. Hackers exploit OpenAI's API as a malware command channel. Apple patches over 100 Security flaws across devices. A Florida-based operator of mental health and addiction treatment centers exposes sensitive patient information. OPM plans a “mass deferment” for Cybercorps scholars affected by the government shutdown. Lawmakers urge the FTC to investigate Flock Safety's cybersecurity gaps. Cybercriminals team with organized crime for high-tech cargo thefts. Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies discussing ICE's controversial facial scanning initiative. A priceless theft meets a worthless password. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest We are joined by Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies discussing ICE's controversial facial scanning initiative. You can read more about Ben's topic from 404 Media: You Can't Refuse To Be Scanned by ICE's Facial Recognition App, DHS Document Says. Selected Reading China-Linked Hackers Target Cisco Firewalls in Global Campaign (Hackread) MIT Sloan shelves paper about AI-driven ransomware (The Register) CyberSlop — meet the new threat actor, MIT and Safe Security (DoublePulsar) Study concludes cybersecurity training doesn't work (KPBS Public Media) Microsoft: OpenAI API moonlights as malware HQ (The Register) Apple Patches 19 WebKit Vulnerabilities (SecurityWeek) Data Theft Hits Behavioral Health Network in 3 States (Bank Infosecurity) OPM plans to give CyberCorps members more time to find jobs after shutdown ends (CyberScoop) Lawmakers ask FTC to probe Flock Safety's cybersecurity practices (The Record) Cybercriminals, OCGs team up on lucrative cargo thefts (The Register) Louvre Robbery: Security Flaws: The (Obviously) Password Was "Louvre" (L'Unione Sarda) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Amit Kumar is a constable of Haryana Police and chiefly deals with cyber crime.
In this episode of 'Cybersecurity Today,' the panel, including Laura Payne from White TOK and David Shipley from Boer on Securities, reviews the major cybersecurity events of October. Key topics include DNS failures at AWS and Microsoft, the rise of AI and its associated security concerns, and several severe cloud and on-premises vulnerabilities in platforms like SharePoint and WSUS. The discussion highlights a surge in sophisticated phishing threats, the integration of AI in cyber attacks, and the critical importance of multifactor authentication. The panel also examines the implications of recent security breaches affecting critical infrastructure and the broader impact of cybersecurity on financial sectors. Ethical concerns about AI's use in creating inappropriate content and the urgent need for better regulatory frameworks for tech and cloud providers are underscored. The episode concludes with a humorous moment as Jim dons a gifted white TOK, bringing a smile to the discussion. 00:00 Introduction and Sponsor Message 00:18 Panel Introduction and AI Discussion 01:02 Cloud Outages and Their Impact 02:52 DNS and Internet Fragility 07:07 Botnets and Cybersecurity Threats 14:09 Industrial Control Systems Vulnerabilities 26:29 AI in Cybersecurity 35:37 Voice Deepfakes and Authentication Risks 38:32 Creative Scams and Real-Time Voice Translators 39:22 The Importance of Safe Words and Persistent Surveillance Issues 40:17 Hybrid Scams and Financial Crimes in Canada 41:44 Corporate Reputation and Financial Crimes Agency 42:41 Challenges with Digital Banking and Security 44:49 The Role of AI and Security in Financial Transactions 45:55 The Impact of Open Banking and Real-Time Payments 50:57 Email Filters and Cybersecurity Awareness 58:03 Microsoft's Security Challenges and Vulnerabilities 01:03:39 Legal Consequences for Cybercriminals 01:12:17 Final Thoughts and Acknowledgements
In this episode of Cybersecurity Today, host Jim Love explores the potential shift in Russia's stance on cyber criminals, including arrests of major network operators. Discover the latest phishing scams where hackers fabricate death notices to steal passwords, a critical vulnerability exposing thousands of AI servers, and a massive malware campaign on YouTube. Plus, discuss the dual nature of AI in cybersecurity—both as a transformative technology and a new threat. Join the conversation on the future of cybersecurity! 00:00 Introduction: Cybersecurity Headlines 00:26 Russia's Crackdown on Cybercriminals 02:47 Phishing Scam Targets LastPass Users 04:59 AI Server Vulnerability Exposes API Keys 07:28 YouTube Ghost Network Spreads Malware 09:17 The Dual Role of AI in Cybersecurity 12:18 Conclusion and Future Plans
EP 264 In this week's update:Microsoft Teams will soon reveal employees' exact building location to managers the moment they join company Wi-Fi, blurring the lines of hybrid work privacy.Cybercriminals are exploiting Microsoft's own Copilot Studio platform to deploy convincing phishing agents that silently harvest full Office 365 access tokens.A sprawling malware network hid Lumma and Rhadamanthys stealers inside fake Adobe, FL Studio, and Roblox cheat downloads promoted across hijacked YouTube channels.Starting November 3, 2025, every Firefox add-on must explicitly declare in its code whether it collects user data-or confirm it gathers none.Non-citizens will soon face mandatory biometric capture at every U.S. departure point under a new rule targeting visa overstays and fraud.A proposed bill would compel researchers and firms to report every vulnerability to Russia's security service, mirroring China's state-controlled model.A new MaaS platform equips attackers with an all-in-one RAT that scans for unpatched software and escalates privileges before stealing credentials and crypto.An engineer's iLife robot was remotely disabled by the manufacturer when he firewalled its data uploads exposing hidden kill switches in everyday IoT devices.Let's go discover!Find the full transcript here.
People who live the longest aren't always the ones with the “perfect” body weight. In fact, research suggests that being slightly overweight can actually increase your life expectancy. It sounds counterintuitive, but the science may surprise you. Listen as I explain what's really going on. https://healthland.time.com/2013/01/02/being-overweight-is-linked-to-lower-risk-of-mortality/ Ever since the dawn of the Internet, we've been told to guard against hackers — but today's biggest threat isn't hacking, it's scamming. Cybercriminals are more cunning than ever, tricking millions into giving up money and information every day. If you think you are too clever to be taken by cyber-scammers, think again. Eric O'Neill — former FBI undercover operative, national security attorney, and cybersecurity strategist — reveals how modern scams work and how to stop them before they get to you. He's the author of Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers (https://amzn.to/4nRvvv1). Imagine medicine without X-rays, CT scans, or MRIs. It's impossible — these imaging breakthroughs revolutionized how doctors diagnose and treat disease. Yet not long ago, the idea of seeing inside the body without a single incision was pure fantasy. Dr. Daniel K. Sodickson, chief of innovation in radiology at NYU Grossman School of Medicine and author of The Future of Seeing: How Imaging Is Changing Our World (https://amzn.to/3KNz3zS), shares the fascinating story of how imaging transformed modern medicine — and what's coming next. Sarcasm might seem like just a clever way to joke around but it's actually good exercise for your brain. Using and understanding sarcasm requires multiple parts of your mind to work together. Listen as I explain why being sarcastic might make you sharper. https://www.hbs.edu/faculty/Pages/item.aspx?num=49283&utm Learn more about your ad choices. Visit megaphone.fm/adchoices
If you like what you hear, please subscribe, leave us a review and tell a friend!
We kicked off the program with four news stories and different guests on the stories we think you need to know about!Pawtriots Pet Adoption “TailGate” that was hosted last Sunday by the Krafts at Patriots Place. It was a success with 30 dogs finding forever homes! Guest: Dr. Dana Blumberg Kraft – Ophthalmologist and philanthropist Boston Arts Academy Foundation's 2025 Honors Celebrates Visionary Leaders in Visual Arts, Design, Film, Fashion, Music and Civic Responsibility. Guest: Denella Clark – Boston Arts Academy Foundation President & CEO Jack Thomas Book & Upcoming Luncheon on Friday the 24th.Guest: Geri Denterlein – wife of the late Jack Thomas On Monday, Amazon Web Services (AWS) went down in the US causing a ripple effect, from governments to small businesses. Cybercriminals & hackers can easily take advantage of outages to deploy array of social engineering attacks. We'll discuss “cyber-hygiene” & how to stay protected against cyber-attacks.Guest: Stefanie Schappert, MSCY, CC, Senior Journalist at Cybernews, is an accomplished writer with an M.S. in cybersecurity
____________Podcast Redefining Society and Technology Podcast With Marco Ciappellihttps://redefiningsocietyandtechnologypodcast.com ____________Host Marco CiappelliCo-Founder & CMO @ITSPmagazine | Master Degree in Political Science - Sociology of Communication l Branding & Marketing Advisor | Journalist | Writer | Podcast Host | #Technology #Cybersecurity #Society
If you like what you hear, please subscribe, leave us a review and tell a friend!Cybercriminals are exploiting popular platforms and software, from WordPress and Oracle-linked systems to Android apps, and even targeting law firms and Salesforce through phishing, zero-day, and extortion attacks. Meanwhile, security firms and tech companies including OpenAI and Microsoft are actively disrupting these operations, though missteps like false end-of-life flags in Defender highlight ongoing cybersecurity challenges.
In this episode, Mike Baker, Vice President and Global CISO at DXC Technology, says the cyber industry has been focusing on the wrong side of AI. He believes too many companies use it only to block threats instead of studying how criminals use it to scale phishing, bypass defenses, and deploy adaptive malware. Attackers are learning faster than ever, and security teams must catch up. Mike argues that defenders need to think differently and use AI as both protection and opportunity. He shares how DXC is already doing this. The company has brought autonomous AI agents into its security operations through a partnership with 7AI. These agents process alerts that used to require hours of human effort. The result is faster detection, less burnout, and more time for analysts to investigate real threats. By cutting manual work by more than eighty percent, DXC has shown how AI can make cybersecurity teams stronger, not smaller. Zero Trust remains a core part of DXC's strategy. Mike calls it a journey that never ends. It needs cultural change, constant learning, and leadership that keeps security invisible to end users. AI now plays a role here too, improving identity checks and spotting access issues in real time. Yet, he reminds us, AI still needs people in the loop for oversight and judgment. We also talk about supply chain risks. Too many companies still treat risk assessments as one-time tasks. Mike pushes for continuous monitoring and close collaboration with suppliers. He closes the conversation on a hopeful note. AI will not replace people in cybersecurity, he says. It will make their work more meaningful and more effective if used with care and common sense.
CISA issues an urgent warning about active exploitation of a critical vulnerability in the sudo utility. Broadcom patches two high-severity vulnerabilities in VMware NSX. South Korea raises its national cyber threat level after a datacenter fire. Formbricks patches a critical token validation flaw. Microsoft blocks a credential phishing campaign that made use of malicious SVG files. Landlords are accused of scraping sensitive payroll data. Cybercriminals lay the groundwork for large-scale FIFA fraud. Burnout takes a heavy toll on cybersecurity professionals. On our Threat Vector segment, host David Moulton is joined by Kyle Wilhoit talking about the evolution of hacker culture and cybersecurity. London police bag the biggest bitcoin bust. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On this Threat Vector segment, host David Moulton is joined by Kyle Wilhoit of Unit 42 talking about the evolution of hacker culture and cybersecurity. You can listen to the full conversation here, and catch new episodes of Threat Vector each Thursday in your podcast app of choice. Selected Reading CISA Issues Alert on Active Exploitation of Linux and Unix Sudo Flaw (GB Hackers) Broadcom fixes high-severity VMware NSX bugs reported by NSA (Bleeping Computer) South Korea raises cyber threat level after huge data centre fire sparks hacking fears (The Guardian) JWT signature verification bypass enables account takeover in Formbricks (Beyond Machines) Microsoft Flags AI Phishing Attack Hiding in SVG Files (Hackread) Landlords Demand Tenants' Workplace Logins to Scrape Their Paystubs (404 Media) Playing Offside: How Threat Actors Are Warming Up for FIFA 2026 (Check Point Blog) Why burnout is a growing problem in cybersecurity (BBC) Chinese woman convicted after 'world's biggest' bitcoin seizure (BBC) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
If you like what you hear, please subscribe, leave us a review and tell a friend!Cybercriminals and hackers are exploiting platforms like Facebook and Google Ads, targeting children, and taking down major companies such as Asahi, while governments and authorities respond with seizures, warnings, and new security guidance. Major incidents include the UK seizing £5.5 billion in Bitcoin, Japanese brewer Asahi hit by attacks, Harrods reporting a third-party breach, and global warnings on malware and vulnerabilities.
Cybercriminals are using sophisticated AI deepfakes and cloned websites to scam unsuspecting South Africans out of their savings. In this revealing interview, forensic investigator Paul O'Sullivan joins Alec Hogg to unpack a recent scam, explain how these syndicates operate, and share practical tips to protect yourself. If it sounds too good to be true - it probably is.
Cybersecurity Today: Major Vulnerabilities and Attacks Uncovered Join host David Shipley for today's cybersecurity updates on the last day of summer 2025. In this episode, we delve deep into Microsoft's critical Entra ID vulnerability, a cyber attack crippling major European airports, the rise of SpamGPT targeting phishing operations, and the alarming zero-click flaw in OpenAI's deep research agent. Hear about Canadian Police's big win against the shadowy Trade Ogre crypto platform and their $40 million asset seizure. Buckle up for a reality check on the evolving cyber threats and their impact on global security. 00:00 Introduction and Overview 00:55 Microsoft's Extinction Level Vulnerability 05:19 European Airports Cyber Attack 08:20 SpamGPT: AI for Cyber Criminals 09:53 Shadow Leak: Zero Click AI Vulnerability 12:09 Trade Ogre Takedown 14:50 Conclusion and Upcoming Events
Cybercriminals are exploiting X's Grok AI to bypass ad protections and spread malware to millions—while researchers discover your home Wi-Fi can now monitor your heart rate. This week's news breakdown covers the attack vectors you need to know about. Join co-hosts Joshua Schmidt, Eric Brown, and Nick Mellem as they dive into the latest cybersecurity developments that could impact your organization tomorrow. From social media malvertising to biometric data harvesting through everyday devices, these aren't distant threats—they're happening now. Key Topics Covered: How cybercriminals are weaponizing Grok AI for malvertising campaigns Why 10-15% of employees access risky content at work (and what to do about it) Wi-Fi devices that can detect heart rates from 10 feet away—privacy implications Amazon's Project Kuiper vs. Starlink: What 1GB satellite internet means for security Practical defenses: YubiKeys, browser isolation, and network redundancy strategies Don't wait until your organization is the next headline. IT leaders need to stay ahead of evolving threats, and this episode delivers critical insights to help protect your business. Like, share, and subscribe for more in-depth security discussions! #cybersecurity #infosec #grok #malware #starlink #wifi #privacy #ITsecurity
If you like what you hear, please subscribe, leave us a review and tell a friend!Cybercriminals are actively targeting multiple sectors, from cryptocurrency and healthcare to major corporations and public infrastructure. Attacks range from data breaches affecting hundreds of thousands of users to sophisticated malware campaigns, ransomware operations, and SEO poisoning campaigns exploiting software downloads. Law enforcement is responding with arrests, while companies raise significant capital amidst these cybersecurity challenges.
Cybercriminals are accelerating their attacks in ways that weren't possible a few years ago. Artificial intelligence is giving them the ability to spin up phishing campaigns, voice clones, and deepfakes in minutes instead of days. As a result, the gap between what's genuine and what's fake is closing fast, making it harder for both individuals and organizations to defend themselves. I'm thrilled to welcome Brett Winterford, Vice President of Okta Threat Intelligence. Brett has had a front row seat to these changes. His team analyzes identity-based attacks and delivers insights to help organizations adapt their defenses. Brett previously served as Okta's Regional CISO for Asia-Pacific and Japan and started his career as a journalist covering information security before moving into leadership roles in banking, government, and technology. In this episode, Brett explains how AI is reshaping the speed and scale of cybercrime, why trusted platforms like email, SMS, and collaboration tools are being targeted, and what practical steps can reduce risk. He highlights the growing importance of phishing-resistant authentication methods like passkeys, the need for clearer communication between service providers and users, and the role of collaboration across industries and law enforcement in pushing back against attackers. Show Notes: [00:00] Brett Winterford introduces himself as Vice President of Okta Threat Intelligence and explains how identity-based threats are monitored. [02:00] He shares his career path from cybersecurity journalist to CISO roles and now to leading threat intelligence. [05:48] Brett compares phishing campaigns of a decade ago with today's AI-driven ability to launch attacks in minutes. [08:00] He notes how reconnaissance and lure creation have become easier with artificial intelligence. [10:40] Brett describes the shift from banking malware to generic infostealers that sell stolen credentials. [12:30] He explains how cryptocurrency changed the targeting of attacks by offering higher payouts. [14:21] We learn about the Poison Seed campaign that used compromised bulk email accounts to spread phishing. [15:26] Brett highlights the rise of SMS and other trusted communication channels as phishing delivery methods. [16:04] He explains how attackers exploit platforms like Microsoft Teams and Slack to bypass traditional defenses. [18:30] Brett details a Slack-based campaign where attackers impersonated a CEO and smuggled phishing links. [22:41] He warns that generative AI has erased many of the old “red flags” that once signaled a scam. [23:01] Brett advises consumers to focus on top-level domains, official apps, and intent of requests to detect phishing. [26:06] He stresses why organizations should adopt passkeys, even though adoption can be challenging. [27:22] Brett points out that passkeys offer faster, more secure logins compared to traditional passwords. [28:31] He explains how attackers increasingly rely on SMS, WhatsApp, and social platforms instead of email. [31:00] Brett discusses voice cloning scams targeting both individuals and corporate staff. [32:30] He warns about deepfake video being used in fraud schemes, including North Korean IT worker scams. [34:59] Brett explains why traditional media-specific red flags are less useful and critical thinking is essential. [37:15] He emphasizes the need for service providers to create trusted communication channels for verification. [39:29] Brett talks about the difficulty of convincing users to reset credentials during real incidents. [41:00] He reflects on how attackers adapt quickly and why organizations must raise the cost of attacks. [44:18] Brett highlights the importance of cross-industry collaboration with groups like Interpol and Europol. [45:24] He directs listeners to Okta's newsroom for resources on threat intelligence and recent campaigns. [47:00] Brett advises consumers to experiment with passkeys and use official apps to reduce risk. [48:00] He closes by stressing the importance of having a trusted, in-app channel for security communications. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Brett Winterford - LinkedIn Brett Winterford - Okta
Jim LaRoe, CEO of Symphion, highlights an often overlooked cybersecurity threat posed by network-connected printers in a hospital setting. Modern printers are complex devices with numerous features that create vulnerabilities and potential access points to patient and hospital data for cybercriminals, yet they are generally managed outside of the IT security environment. The first step in ensuring printer security is to determine the number of printing devices on the network, their locations, and their configurations. Additionally, it is essential to ask the IT team to demonstrate security hygiene for the entire printer fleet. Jim explains, "We personally were exposed to the print industry in about 2015. And we noticed that the printers are really essential for patient care. They process, store, and transmit the most sensitive data, but they have grown up outside of the information security and supply chain. The security has been left vulnerable. In today's cybercrime growth industry climate, where opportunistic criminals are looking for opportunities to steal data, ransom, or attack patient care, you've got a real recipe for disaster. So really, we're facing a whole lot of issues that relate to the vulnerability of the printer." "They're absolutely very complex business machines, and the manufacturers for the last 40 years or so, from what you're talking about, the analog days, have really enriched them with incredible features beyond the camera, the document sorter, and things like that. They built in incredible web server features, email servers, fax servers, FTP servers, like a Dropbox that we all use for heavy payload communication protocols. They built all those features into the devices, and they built in ways to secure those features, but they haven't been used, and they're not being used on networks." #Symphion #Hospitals #PrinterSecurity #Cybercrimes #NetworkSecurity symphion.com Download the transcript here
Jim LaRoe, CEO of Symphion, highlights an often overlooked cybersecurity threat posed by network-connected printers in a hospital setting. Modern printers are complex devices with numerous features that create vulnerabilities and potential access points to patient and hospital data for cybercriminals, yet they are generally managed outside of the IT security environment. The first step in ensuring printer security is to determine the number of printing devices on the network, their locations, and their configurations. Additionally, it is essential to ask the IT team to demonstrate security hygiene for the entire printer fleet. Jim explains, "We personally were exposed to the print industry in about 2015. And we noticed that the printers are really essential for patient care. They process, store, and transmit the most sensitive data, but they have grown up outside of the information security and supply chain. The security has been left vulnerable. In today's cybercrime growth industry climate, where opportunistic criminals are looking for opportunities to steal data, ransom, or attack patient care, you've got a real recipe for disaster. So really, we're facing a whole lot of issues that relate to the vulnerability of the printer." "They're absolutely very complex business machines, and the manufacturers for the last 40 years or so, from what you're talking about, the analog days, have really enriched them with incredible features beyond the camera, the document sorter, and things like that. They built in incredible web server features, email servers, fax servers, FTP servers, like a Dropbox that we all use for heavy payload communication protocols. They built all those features into the devices, and they built in ways to secure those features, but they haven't been used, and they're not being used on networks." #Symphion #Hospitals #PrinterSecurity #Cybercrimes #NetworkSecurity symphion.com Listen to the podcast here
Send us a textTim and Chris dive into the month's most significant tech developments, exploring antitrust rulings, emerging AI security threats, and the financial sustainability of the AI industry.• Google avoids having to sell Chrome in federal antitrust ruling but is barred from exclusive distribution contracts• Cybercriminals deploy "S1ngularity Attack" using LLM prompts to steal credentials from 2,100 GitHub accounts• Cisco reintroduces dedicated wireless certification track with focus on Wi-Fi 6/7 and Meraki technologies• Google Cloud introduces "agentic IAM" services to manage AI agent identities and improve MCP security• Zscaler CEO creates controversy by suggesting customer logs are used for AI training before company clarification• Avaya offers voluntary exit packages to all employees, suggesting potential acquisition or restructuring• OpenAI increases projected spending through 2029 by $80 billion to $115 billion totalShare this episode on social media and tell a friend about the podcast if you enjoyed it. You can find us on all platforms @Cables2Clouds.Purchase Chris and Tim's new book on AWS Cloud Networking: https://www.amazon.com/Certified-Advanced-Networking-Certification-certification/dp/1835080839/ Check out the Fortnightly Cloud Networking Newshttps://docs.google.com/document/d/1fkBWCGwXDUX9OfZ9_MvSVup8tJJzJeqrauaE6VPT2b0/Visit our website and subscribe: https://www.cables2clouds.com/Follow us on BlueSky: https://bsky.app/profile/cables2clouds.comFollow us on YouTube: https://www.youtube.com/@cables2clouds/Follow us on TikTok: https://www.tiktok.com/@cables2cloudsMerch Store: https://store.cables2clouds.com/Join the Discord Study group: https://artofneteng.com/iaatj
Show Notes:Daniëlle began her academic path in psychology, later moving into criminology through her interest in decision making and online behaviour.Her PhD research at NSCR focuses on cybercriminal decision making, using honeypots and experiments in real online environments.Early experiments tested how different rewards affected access attempts on fake accounts.A major focus has been on the impact of Operation Cookie Monster (2023), which disrupted the Genesis Market. Danielle's work examined how this law enforcement operation influenced behaviour and moderation practices on hacker forums.She emphasizes the value of experiments in the field, which allow researchers to test criminological theories with live offender behaviour, while balancing strict ethical and legal safeguards.About our guest:Danielle StibbeNSCR Profile Page: https://nscr.nl/en/medewerker/danielle-stibbe-msc/Google Scholar: https://scholar.google.com/citations?user=1fsHJEgAAAAJ&hl=enLinkedIn: https://www.linkedin.com/in/danielle-stibbe/?originalSubdomain=nlPapers or resources mentioned in this episode:Onaolapo, J., Mariconti, E., & Stringhini, G. (2016). What happens after you are pwnd: Understanding the use of leaked webmail credentials in the wild. Proceedings of the 2016 Internet Measurement Conference. https://doi.org/10.1145/2987443.2987475Europol (2023). Operation Cookie Monster: Genesis Market taken down in coordinated international action.https://www.europol.europa.eu/media-press/newsroom/news/operation-cookie-monster-genesis-market-taken-down-in-coordinated-international-actionOxford Handbook of Criminal Decision Making (2016). Eds. Bruinsma & Weisburd. Oxford University Press.Other:The open science framework https://osf.io
Emily Forlini of PCMag joins Mikah Sargent on Tech News Weekly this week! OpenAI is being sued following a teen's suicide, which was blamed on ChatGPT. Detecting and countering the misuse of AI. A review of the Pixel 10 Pro. And Meta has poured $10 billion into rural Louisiana to build an ambitious data center. (Content Warning) Emily talks about a lawsuit that was brought to OpenAI following a teen's suicide after using ChatGPT. Mikah discusses Anthropic's recent threat intelligence report, which examines how bad actors are finding ways to misuse the company's AI models. Allison Johnson of The Verge chats with Mikah about her review of the Pixel 10 Pro phone and how the new feature, Magic Cue, impressed Allison at times. And finally, MIkah shares how Meta has invested $10 billion into a rural part of Louisiana to build a large data center to fuel the company's AI ambitions. (If you or someone you know is having thoughts of suicide or self-harm, please contact the 988 Suicide & Crisis Lifeline - call or text 988 or chat online at chat.988lifeline.org. If you are located outside the United States, please visit findahelpline.com to find a helpline in your country.) Hosts: Mikah Sargent and Emily Forlini Guest: Allison Johnson Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: pantheon.io smarty.com/twit threatlocker.com/twit
Emily Forlini of PCMag joins Mikah Sargent on Tech News Weekly this week! OpenAI is being sued following a teen's suicide, which was blamed on ChatGPT. Detecting and countering the misuse of AI. A review of the Pixel 10 Pro. And Meta has poured $10 billion into rural Louisiana to build an ambitious data center. (Content Warning) Emily talks about a lawsuit that was brought to OpenAI following a teen's suicide after using ChatGPT. Mikah discusses Anthropic's recent threat intelligence report, which examines how bad actors are finding ways to misuse the company's AI models. Allison Johnson of The Verge chats with Mikah about her review of the Pixel 10 Pro phone and how the new feature, Magic Cue, impressed Allison at times. And finally, MIkah shares how Meta has invested $10 billion into a rural part of Louisiana to build a large data center to fuel the company's AI ambitions. (If you or someone you know is having thoughts of suicide or self-harm, please contact the 988 Suicide & Crisis Lifeline - call or text 988 or chat online at chat.988lifeline.org. If you are located outside the United States, please visit findahelpline.com to find a helpline in your country.) Hosts: Mikah Sargent and Emily Forlini Guest: Allison Johnson Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: pantheon.io smarty.com/twit threatlocker.com/twit
Emily Forlini of PCMag joins Mikah Sargent on Tech News Weekly this week! OpenAI is being sued following a teen's suicide, which was blamed on ChatGPT. Detecting and countering the misuse of AI. A review of the Pixel 10 Pro. And Meta has poured $10 billion into rural Louisiana to build an ambitious data center. (Content Warning) Emily talks about a lawsuit that was brought to OpenAI following a teen's suicide after using ChatGPT. Mikah discusses Anthropic's recent threat intelligence report, which examines how bad actors are finding ways to misuse the company's AI models. Allison Johnson of The Verge chats with Mikah about her review of the Pixel 10 Pro phone and how the new feature, Magic Cue, impressed Allison at times. And finally, MIkah shares how Meta has invested $10 billion into a rural part of Louisiana to build a large data center to fuel the company's AI ambitions. (If you or someone you know is having thoughts of suicide or self-harm, please contact the 988 Suicide & Crisis Lifeline - call or text 988 or chat online at chat.988lifeline.org. If you are located outside the United States, please visit findahelpline.com to find a helpline in your country.) Hosts: Mikah Sargent and Emily Forlini Guest: Allison Johnson Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: pantheon.io smarty.com/twit threatlocker.com/twit
Emily Forlini of PCMag joins Mikah Sargent on Tech News Weekly this week! OpenAI is being sued following a teen's suicide, which was blamed on ChatGPT. Detecting and countering the misuse of AI. A review of the Pixel 10 Pro. And Meta has poured $10 billion into rural Louisiana to build an ambitious data center. (Content Warning) Emily talks about a lawsuit that was brought to OpenAI following a teen's suicide after using ChatGPT. Mikah discusses Anthropic's recent threat intelligence report, which examines how bad actors are finding ways to misuse the company's AI models. Allison Johnson of The Verge chats with Mikah about her review of the Pixel 10 Pro phone and how the new feature, Magic Cue, impressed Allison at times. And finally, MIkah shares how Meta has invested $10 billion into a rural part of Louisiana to build a large data center to fuel the company's AI ambitions. (If you or someone you know is having thoughts of suicide or self-harm, please contact the 988 Suicide & Crisis Lifeline - call or text 988 or chat online at chat.988lifeline.org. If you are located outside the United States, please visit findahelpline.com to find a helpline in your country.) Hosts: Mikah Sargent and Emily Forlini Guest: Allison Johnson Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: pantheon.io smarty.com/twit threatlocker.com/twit
Emily Forlini of PCMag joins Mikah Sargent on Tech News Weekly this week! OpenAI is being sued following a teen's suicide, which was blamed on ChatGPT. Detecting and countering the misuse of AI. A review of the Pixel 10 Pro. And Meta has poured $10 billion into rural Louisiana to build an ambitious data center. (Content Warning) Emily talks about a lawsuit that was brought to OpenAI following a teen's suicide after using ChatGPT. Mikah discusses Anthropic's recent threat intelligence report, which examines how bad actors are finding ways to misuse the company's AI models. Allison Johnson of The Verge chats with Mikah about her review of the Pixel 10 Pro phone and how the new feature, Magic Cue, impressed Allison at times. And finally, MIkah shares how Meta has invested $10 billion into a rural part of Louisiana to build a large data center to fuel the company's AI ambitions. (If you or someone you know is having thoughts of suicide or self-harm, please contact the 988 Suicide & Crisis Lifeline - call or text 988 or chat online at chat.988lifeline.org. If you are located outside the United States, please visit findahelpline.com to find a helpline in your country.) Hosts: Mikah Sargent and Emily Forlini Guest: Allison Johnson Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: pantheon.io smarty.com/twit threatlocker.com/twit
Emily Forlini of PCMag joins Mikah Sargent on Tech News Weekly this week! OpenAI is being sued following a teen's suicide, which was blamed on ChatGPT. Detecting and countering the misuse of AI. A review of the Pixel 10 Pro. And Meta has poured $10 billion into rural Louisiana to build an ambitious data center. (Content Warning) Emily talks about a lawsuit that was brought to OpenAI following a teen's suicide after using ChatGPT. Mikah discusses Anthropic's recent threat intelligence report, which examines how bad actors are finding ways to misuse the company's AI models. Allison Johnson of The Verge chats with Mikah about her review of the Pixel 10 Pro phone and how the new feature, Magic Cue, impressed Allison at times. And finally, MIkah shares how Meta has invested $10 billion into a rural part of Louisiana to build a large data center to fuel the company's AI ambitions. (If you or someone you know is having thoughts of suicide or self-harm, please contact the 988 Suicide & Crisis Lifeline - call or text 988 or chat online at chat.988lifeline.org. If you are located outside the United States, please visit findahelpline.com to find a helpline in your country.) Hosts: Mikah Sargent and Emily Forlini Guest: Allison Johnson Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: pantheon.io smarty.com/twit threatlocker.com/twit
Emily Forlini of PCMag joins Mikah Sargent on Tech News Weekly this week! OpenAI is being sued following a teen's suicide, which was blamed on ChatGPT. Detecting and countering the misuse of AI. A review of the Pixel 10 Pro. And Meta has poured $10 billion into rural Louisiana to build an ambitious data center. (Content Warning) Emily talks about a lawsuit that was brought to OpenAI following a teen's suicide after using ChatGPT. Mikah discusses Anthropic's recent threat intelligence report, which examines how bad actors are finding ways to misuse the company's AI models. Allison Johnson of The Verge chats with Mikah about her review of the Pixel 10 Pro phone and how the new feature, Magic Cue, impressed Allison at times. And finally, MIkah shares how Meta has invested $10 billion into a rural part of Louisiana to build a large data center to fuel the company's AI ambitions. (If you or someone you know is having thoughts of suicide or self-harm, please contact the 988 Suicide & Crisis Lifeline - call or text 988 or chat online at chat.988lifeline.org. If you are located outside the United States, please visit findahelpline.com to find a helpline in your country.) Hosts: Mikah Sargent and Emily Forlini Guest: Allison Johnson Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: pantheon.io smarty.com/twit threatlocker.com/twit
Emily Forlini of PCMag joins Mikah Sargent on Tech News Weekly this week! OpenAI is being sued following a teen's suicide, which was blamed on ChatGPT. Detecting and countering the misuse of AI. A review of the Pixel 10 Pro. And Meta has poured $10 billion into rural Louisiana to build an ambitious data center. (Content Warning) Emily talks about a lawsuit that was brought to OpenAI following a teen's suicide after using ChatGPT. Mikah discusses Anthropic's recent threat intelligence report, which examines how bad actors are finding ways to misuse the company's AI models. Allison Johnson of The Verge chats with Mikah about her review of the Pixel 10 Pro phone and how the new feature, Magic Cue, impressed Allison at times. And finally, MIkah shares how Meta has invested $10 billion into a rural part of Louisiana to build a large data center to fuel the company's AI ambitions. (If you or someone you know is having thoughts of suicide or self-harm, please contact the 988 Suicide & Crisis Lifeline - call or text 988 or chat online at chat.988lifeline.org. If you are located outside the United States, please visit findahelpline.com to find a helpline in your country.) Hosts: Mikah Sargent and Emily Forlini Guest: Allison Johnson Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: pantheon.io smarty.com/twit threatlocker.com/twit
Dozens of online influencers are using their platform to spread financial literacy, which continues to have a growing impact on younger generations looking to get into investing, saving and making more money.And although cybercriminals have been around for decades, they're capitalizing on social media users with the help of artificial intelligence in the form of deep fakes or fraudulent advertisements to get your money and information. Host Mike Eppel speaks to Tony Anscombe, chief security evangelist at ESET to discuss the signs to look out for, and how to protect yourself and your wallet from being one of the millions of cybercrime victims. We love feedback at The Big Story, as well as suggestions for future episodes. You can find us:Through email at hello@thebigstorypodcast.ca Or @thebigstoryfpn on Twitter
Farmers Insurance discloses a data breach affecting over a million people. Agentic AI tools fall for common scams. A new bill in Congress looks to revive letters of marque for the digital age. Cybercriminals target macOS users with the Shamos infostealer. New Android spyware masquerades as antivirus to target Russian business executives. CISA seeks public comments on SBOM updates. A major third party electronics manufacturer reports a ransomware attack. Salesforce patches multiple vulnerabilities in its Tableau products. Over 370,000 user Grok conversations were accidentally indexed by Google. Ben Yelin examines the UK's decision to drop digital backdoor requirements. WIRED gets duped by an AI author. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies joins to discuss the U.K. dropping ‘back door' demand for Apple user data. Read the article Ben discusses. If you enjoyed this conversation and want to hear more from Ben, check out our Caveat podcast here. Selected Reading Farmers Insurance Data Breach Impacts Over 1 Million People (SecurityWeek) "Scamlexity": When Agentic AI Browsers Get Scammed (Guardio) Bill would give hackers letters of marque against US enemies (The Register) Fake macOS help sites push Shamos infostealer via ClickFix technique (Help Net Security) New Android malware poses as antivirus from Russian intelligence agency (Bleeping Computer) CISA Requests Public Feedback on Updated SBOM Guidance (SecurityWeek) Electronics manufacturer Data I/O reports ransomware attack to SEC (The Record) Salesforce patches multiple flaws in Tableau Server, at least one critical (Beyond Machines) 370,000 Grok AI chats leaked after being indexed on Google (Cyber Daily) How WIRED Got Rolled by an AI Freelancer (WIRED) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Microsoft releases emergency out-of-band (OOB) Windows updates. Trump targets NSA's leading AI and cyber expert in clearance revocations. A breach may have compromised the privacy of Ohio medical marijuana patients. Cybercriminals exploit an AI website builder to rapidly create phishing sites. Warlock ransomware operators target Microsoft's SharePoint ToolShell vulnerability. Google and Mozilla patch Chrome and Firefox. European officials report two cyber incidents targeting water infrastructure. A federal appeals court has upheld fines against T-Mobile and Sprint for illegally selling customer location data. Authorities dismantle DDoS powerhouse Rapper Bot. On our Industry Voices segment, we are joined by Matt Radolec, VP - Incident Response, Cloud Operations, and Sales Engineering at Varonis, speaking about ShinyHunters and the problems with securing Salesforce. Microsoft Copilot gets creative with compliance. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Industry Voices segment, we are joined by Matt Radolec, VP - Incident Response, Cloud Operations, and Sales Engineering at Varonis, who is speaking about ShinyHunters and the problems with securing Salesforce. You can hear more from Matt here. Selected Reading Microsoft releases emergency updates to fix Windows recovery (Bleeping Computer) Trump Revokes Security Clearances of 37 Former and Current Officials (The New York Times) Highly Sensitive Medical Cannabis Patient Data Exposed by Unsecured Database (WIRED) AI Website Builder Lovable Abused for Phishing and Malware Scams (Hackread) Warlock Ransomware Hitting Victims Globally Through SharePoint ToolShell Exploit (InfoSecurity Magazine) High-Severity Vulnerabilities Patched in Chrome, Firefox (SecurityWeek) Russia-linked European attacks renew concerns over water cybersecurity (CSO Online) T-Mobile claimed selling location data without consent is legal, judges disagree (Ars Technica) Officials gain control of Rapper Bot DDoS botnet, charge lead developer and administrator (CyberScoop) Copilot Broke Your Audit Log, but Microsoft Won't Tell You (Pistachio Blog) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
If you like what you hear, please subscribe, leave us a review and tell a friend!
Kurtis Minder knows the dark web better than most—and he's not just watching from the sidelines. As a ransomware negotiator, he's helped victims talk their way out of seemingly impossible situations. This week, we explore how cybercriminals operate, what makes them tick, and what you need to know to avoid becoming their next target. Learn more about your ad choices. Visit megaphone.fm/adchoices
Cybercriminals today operate more like startups than stereotypes—complete with org charts, sprint cycles, and pizza parties to celebrate successful breaches. In this episode of Security Matters, host David Puner talks with former CISO and U.S. Air Force veteran Ian Schneller about the evolving sophistication of threat actors and what it takes to stay ahead.From zero-day vulnerabilities and machine identity risks to AI-powered attacks and insider threats, Ian shares practical strategies drawn from his experience in military intelligence, offensive cyber operations, and corporate security leadership. Learn how to build resilience, translate cyber risk into business outcomes, and lead with mission-driven clarity in a threat landscape that never slows down.
The Senate confirms a new national cyber director. A new commission explores the establishment of a separate Cyber Force. Cybercriminals exploit link wrapping to launch sophisticated phishing attacks. AI agents are hijacked, cameras cracked, and devs phished. Gene sequencers and period trackers settle allegations of oversharing personal data and inadequate security. Today we are joined by Tim Starks from CyberScoop discussing how China accuses the US of exploiting Microsoft zero-day in a cyberattack. OpenAI scrambles after a chat leak fiasco. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. You can read Tim's article on the topic here. CyberWire Guest Today we are joined by Tim Starks from CyberScoop discussing how China accuses the US of exploiting Microsoft zero-day in a cyberattack. Selected Reading Sean Cairncross confirmed as national cyber director (The Record) Panel to create roadmap for establishing US Cyber Force (The Record) Microsoft 365: Attackers Weaponize Proofpoint and Intermedia Link Wrapping to Steal Logins (WinBuzzer) When Public Prompts Turn Into Local Shells: ‘CurXecute' – RCE in Cursor via MCP Auto‑Start (Aim Security) LegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Code (Hackread) Bitdefender Warns Users to Update Dahua Cameras Over Critical Flaws (Hackread) Mozilla warns of phishing attacks targeting add-on developers (Bleeping Computer) Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities (SecurityWeek) Flo settles class action lawsuit alleging improper data sharing (The Record) ChatGPT users shocked to learn their chats were in Google search results (Ars Technica) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
A critical vulnerability in SUSE [SOO-suh] Manager allows attackers to run commands with root privilege. A joint CISA and U.S. Coast Guard threat hunt at a critical infrastructure site reveals serious cybersecurity issues. Healthcare providers across the U.S. report recent data breaches. Cybercriminals infiltrate a bank by physically planting a Raspberry Pi on a network switch. Russian state-backed hackers target Moscow diplomats to deploy ApolloShadow malware. Luxembourg investigates a major telecom outage tied to Huawei equipment. China's cyberspace regulator summons Nvidia over alleged security risks linked to its H20 AI chips. A new report examines early indicators of system compromise. Today we are joined by Ryan Whelan, Managing Director and Global Head of Accenture Cyber Intelligence, with their analysis of Scattered Spider. Pwn2Own puts a million dollar bounty on WhatsApp zero-clicks. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire GuestOur guest today is Ryan Whelan, Managing Director and Global Head of Accenture Cyber Intelligence, discussing the possibilities of Scattered Spider. Selected Reading Critical flaw in SUSE Manager exposes enterprise deployments to compromise (Beyond Machines) CISA identifies OT configuration flaws during cyber threat hunt at critical infrastructure organization, lists cyber hygiene (Industrial Cyber) CISA Issues ICS Advisories for Rockwell Automation Using VMware, and Güralp Seismic Monitoring Systems (Cyber Security News) Florida Internal Medicine Practices Discloses November 2024 Data Breach (HIPAA Journal) Cybercrooks use Raspberry Pi to steal ATM cash (The Register) Russian Cyberspies Target Foreign Embassies in Moscow via AitM Attacks: Microsoft (SecurityWeek) Luxembourg probes reported attack on Huawei tech that caused nationwide telecoms outage (The Record) Nvidia summoned by China's cyberspace watchdog over risks in H20 chips (CGTN) Hackers Regularly Exploit Vulnerabilities Before Public Disclosure (Infosecurity Magazine) Pwn2Own hacking contest pays $1 million for WhatsApp exploit (Bleeping Computer) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
In the latest Title Now webinar, Shannon Widman and Tom Cronkright discuss the rising threat of wire fraud in real estate, emphasizing the importance of verifying identities and implementing robust cybersecurity measures. They highlight the dangers of seller impersonation fraud and the need for multi-factor authentication to protect against scams. The conversation also touches on the challenges faced by title agents and law firms, particularly those with multiple offices, in managing unsolicited title order requests. Additionally, they address the limitations of E&O insurance in covering cyber breaches and the need for new pricing models for smaller businesses. The session concludes with a call for increased awareness and proactive measures to combat fraud in the industry.
Clinicians often do not pay attention to cyber security... thats for the owners and managers, right? Wrong! Cyber criminals have become so sophisticated, they can target anyone in the team and not in the way you think they might. Give this episode a listen with Paul Murphy to find out your role in keeping your patients safe and secure in their dental visits! Resources: Blacktalonsecurity.com
Welcome back to Re-Imagining Cyber! In this episode, Tyler Moffitt, (Senior Security Analyst at OpenText) explores the emerging threat of generative AI in the hands of cyber criminals. Discover how AI models like ChatGPT, WormGPT, and FraudGPT have drastically lowered the skill floor for launching sophisticated attacks. Tyler breaks down the four major use cases: hyper-personalized phishing, real-time social engineering, AI-generated malware, and deep fakes. Learn the impact of this technology on real-world cyber crime and how AI-driven defense strategies are evolving to combat these threats. Tune in for essential insights and stay skeptical!Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70 Chief Information Security Officer CISO Podcasts rankings.
Ingram Micro suffers a ransomware attack by the SafePay gang. Spanish police dismantle a large-scale investment fraud ring. The SatanLock ransomware group says it is shutting down. Brazilian police arrest a man accused of stealing over $100 million from the country's banking system. Qantas confirms contact from a “potential cybercriminal” following its recent customer data breach. The XWorm RAT evolves to better evade detection. Cybercriminals ramp up fraudulent domains ahead of Amazon Prime day. Apple sues a former engineer allegedly stealing confidential data. Our guest is Rob Allen, Chief Product Officer at Threat Locker, discussing why 'Default Deny' could be the Antidote to Security Fatigue. AI image editing blurs the evidence. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Industry Voices segment, we are joined by Rob Allen, Chief Product Officer at Threat Locker, discussing From Noise to Control: Why 'Default Deny' Is the Antidote to Security Fatigue. If you want to hear more from Rob or Threat Locker, you can listen to them here. Selected Reading Ingram Micro outage caused by SafePay ransomware attack (Bleeping Computer) Police dismantles investment fraud ring stealing €10 million (Bleeping Computer) SatanLock Ransomware Ends Operations, Says Stolen Data Will Be Leaked (Hackread) Police in Brazil Arrest a Suspect Over $100M Banking Hack (SecurityWeek) Qantas Contacted by Potential Cybercriminal Following Data Breach (Infosecurity Magazine) Arbor Associates reports data breach exposing patient information (Beyond Machines) XWorm RAT Deploys New Stagers and Loaders to Bypass Defenses (GB Hackers) Amazon Prime Day 2025: Deals Await, But So Do the Cyber Criminals (Check Point) Apple Accuses Ex-Engineer Of Stealing Vision Pro Secrets, Silently Accepting Job At Snap Inc., And Covering His Tracks By Wiping Data From Work Laptop (WCCF TECH) Cops Use ChatGPT to Edit Drugs Bust Photo, Goes Horribly Wrong (PetaPixel) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Cybercriminals target financial institutions across Africa using open-source tools. Threat actors are using a technique called Authenticode stuffing to abuse ConnectWise remote access software. A fake version of SonicWall's NetExtender VPN app steals users' credentials. CISA and the NSA publish a guide urging the adoption of Memory Safe Languages. Researchers identify multiple security vulnerabilities affecting Brother printers. Fake AI-themed websites spread malware. Researchers track a sharp rise in signup fraud. A new Common Good Cyber Fund has been launched to support nonprofits that provide essential cybersecurity services. Tim Starks from CyberScoop joins us to discuss calls for a federal cyberinsurance backstop. A Moscow court says ‘nyet' to more jail time for cyber crooks. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest We are again joined by Tim Starks, Senior Reporter from CyberScoop. Tim discusses his recent piece on “Federal cyber insurance backstop should be tied to expiring terrorism insurance law, report recommends.” Selected Reading Cybercriminals Abuse Open-Source Tools To Target Africa's Financial Sector (Unit 42) Hackers Abuse ConnectWise to Hide Malware (SecurityWeek) Fake SonicWall VPN app steals user credentials (The Register) CISA Publishes Guide to Address Memory Safety Vulnerabilities in Modern Software Development (GB Hackers) New Vulnerabilities Expose Millions of Brother Printers to Hacking (SecurityWeek) Black Hat SEO Poisoning Search Engine Results For AI (ThreatLabz) Half of Customer Signups Are Now Fraudulent (Infosecurity Magazine) Common Good Cyber Fund Launched to Support Non-Profit Security Efforts (Infosecurity Magazine) Russia releases REvil members after convictions for payment card fraud (The Record) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
We start with negotiations between European leaders and Iran in Geneva. Cybercriminals have breached insurance giant Aflac. Pro-Palestinian activists broke into Britain's largest air base. President Donald Trump passed on honoring Juneteenth and made this complaint about federal holidays instead. Plus, why smart phone users are disabling news alerts. Learn more about your ad choices. Visit podcastchoices.com/adchoices
The Czech Republic accuses Chinese state-backed hackers of cyber-espionage. CISA's leaders head for the exits. Cybercriminals are using fake AI video generator websites to spread malware. A stealthy phishing campaign delivers the Remcos RAT via DBatLoader. A fake Bitdefender website spreads malware targeting financial data. Medusa ransomware claims to have breached global real estate firm RE/MAX. An Iranian national faces up to 30 years in prison for ransomware targeting US cities. Our guest is Tony Velleca, CyberProof's CEO, discussing exposure management and a more risk-focused approach to prioritize threats. Mind reading for fun and profit. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On today's Industry Voices segment, at the 2025 RSA Conference we were joined by Tony Velleca, CyberProof's CEO, who is discussing exposure management and moving towards a more risk-focused approach to prioritize threats. Listen to Tony's interview here. Selected Reading Chinese spies blamed for attempted hack on Czech government network (The Record) CISA loses nearly all top officials as purge continues- (Cybersecurity Dive) Google warns of Vietnam-based hackers using bogus AI video generators to spread malware (The Record) Chrome 137, Firefox 139 Patch High-Severity Vulnerabilities (SecurityWeek) New Phishing Campaign Uses DBatLoader to Drop Remcos RAT: What Analysts Need to Know (Hack Read) Hackers Mimic Popular Antivirus Site to Deliver VenomRAT & Steal Finance Data (Cybersecurity News) RE/MAX deals with alleged 150GB data theft: Medusa ransomware demands $200K (Cyber News) CISA Releases ICS Advisories Covering Vulnerabilities & Exploits (Cybersecurity News) Iranian pleads guilty to launching Baltimore ransomware attack, faces 30 years behind bars (The Record) Neural Privacy Under Threat: The Battle for Neural Data (tsaaro consulting) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices