Podcasts about cybersecurity

The protection of computer systems from theft or damage

  • 11,421PODCASTS
  • 63,478EPISODES
  • 30mAVG DURATION
  • 10+DAILY NEW EPISODES
  • Nov 13, 2025LATEST
cybersecurity

POPULARITY

20172018201920202021202220232024

Categories




    Best podcasts about cybersecurity

    Show all podcasts related to cybersecurity

    Latest podcast episodes about cybersecurity

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Thursday, November 13th, 2025: OWASP Top 10 Update; Cisco/Citrix Exploits; Test post quantum readiness

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Nov 13, 2025 6:33


    OWASP Top 10 2025 Release Candidate OWASP published a release candidate for the 2025 version of its Top 10 list https://owasp.org/Top10/2025/0x00_2025-Introduction/ Citrix/Cisco Exploitation Details Amazon detailed how Citrix and Cisco vulnerabilities were used by advanced actors to upload webshells https://aws.amazon.com/blogs/security/amazon-discovers-apt-exploiting-cisco-and-citrix-zero-days/ Testing Quantum Readyness A website tests your services for post-quantum computing-resistant cryptographic algorithms https://qcready.com/

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Wednesday, November 12th, 2025: Microsoft Patch Tuesday; Gladinet Triofox Vulnerability; SAP Patches

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Nov 12, 2025 6:03


    Microsoft Patch Tuesday for November 2025 https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+for+November+2025/32468/ Gladinet Triofox Vulnerability Triofox uses the host header in lieu of proper access control, allowing an attacker to access the page managing administrators by simply setting the host header to localhost. https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480/ SAP November 2025 Patch Day SAP fixed a critical vulnerability, fixed default credentials in its SQL Anywhere Monitor https://onapsis.com/blog/sap-security-patch-day-november-2025/ Ivanti Endpoint Manager Updates https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2025-for-EPM-2024?language=en_US

    Joey Pinz Discipline Conversations
    #769 Cyber Bay 2025 - Darnell Taylor:

    Joey Pinz Discipline Conversations

    Play Episode Listen Later Nov 12, 2025 14:34 Transcription Available


    Send us a textRecorded live at Cyber Bay 2025 in Tampa Bay, this conversation dives into how educators are preparing students for a rapidly changing tech world.

    Joey Pinz Discipline Conversations
    #771 Cyber Bay 2025 - Deral Heiland: Coins, Code & Cyber: From Visual History to IoT Security

    Joey Pinz Discipline Conversations

    Play Episode Listen Later Nov 12, 2025 22:40 Transcription Available


    Send us a textMeet Rapid7's Deral Heiland—a self-described “visual historian” who balances high-tech research with hands-on artifacts from Roman coins to Civil War relics

    Business of Tech
    U.S. Cyber Defense Weakens as CISA Faces Cuts; EU Eases GDPR for AI; UK Tightens Cybersecurity Laws

    Business of Tech

    Play Episode Listen Later Nov 12, 2025 15:15


    The expiration of the Cybersecurity Information Sharing Act (CISA) on September 30, 2025, has resulted in a notable decline in U.S. cyber defense capabilities, with a reported drop of over 70% in the sharing of threat indicators. This lapse has created a legal and operational vacuum, leading to increased delays in alert dissemination and a rise in cyber threats, particularly in critical sectors such as healthcare and energy. Federal agencies and private companies are now hesitant to report incidents without the liability protections that CISA previously provided, resulting in a fragmented response to cyber threats.In response to the growing concerns over cybersecurity, the U.S. Congress has included a provision in the federal government shutdown legislation to extend CISA through the end of January 2026. This extension is crucial for facilitating the sharing of threat data between businesses and government agencies. Meanwhile, the Cybersecurity and Resilience Bill introduced in the UK mandates that medium and large IT management and cybersecurity service providers comply with minimum security standards, reflecting a shift towards greater accountability in protecting critical infrastructure.Additionally, Microsoft and 1Password are advancing passwordless technology, with Microsoft enabling the syncing of passkeys across devices and 1Password integrating a new native Passkeys plugin API for Windows 11. These developments aim to enhance user convenience and security, signaling a shift away from traditional password reliance. EasyDMARC has also launched Touchpoint, an AI-driven sales enablement tool for MSPs, while Enable has introduced a cyber warranty program offering financial protection for cyber incidents.For MSPs and IT service leaders, these developments underscore the importance of adapting to evolving cybersecurity regulations and technologies. The expiration of CISA highlights the need for private networks and MSPs to fill the intelligence gap left by government agencies. As compliance requirements tighten in the UK and the U.S., MSPs that can navigate these changes and assist clients in maintaining security and compliance will find significant opportunities in a rapidly changing landscape. Three things to know today00:00 U.S. Cyber Defense Falters as CISA Act Expires, Threat Sharing Plummets 70% Amid Budget Cuts04:35 Compliance Crossroads: New EU, UK, and U.S. Rules Reshape Data Protection and Cybersecurity for MSPs09:42 Vendors Push Simpler, Smarter Security: Microsoft Syncs Passkeys, N-able Adds Cyber Warranty, EasyDMARC Targets MSP Sales This is the Business of Tech.     Supported by:  https://getflexpoint.com/msp-radio/https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship

    Let's Talk Club Management
    Ep. 148 - Navigating Cybersecurity Trends

    Let's Talk Club Management

    Play Episode Listen Later Nov 12, 2025 44:11


    We are thrilled to welcome back to our podcast, our favorite cybersecurity experts at Pulsar Security, a CMAA Education Partner, for answers to our questions about current cybersecurity trends. Pulsar is a company whose mission extends to protect clubs and their members against malicious attacks. The company is a Veteran, privately owned business built on vision and trust, whose leadership has extensive military experience enabling it to think strategically and plan beyond the problems at hand. We are excited to welcome back the CEO and Founder of Pulsar Security, Patrick Hynds and Chief Technology Officer Duane Laflotte.

    Cyber Security Today
    Industrial Phishing Kit QRR Discovered: New Cyber Threats Unveiled | Cybersecurity Today

    Cyber Security Today

    Play Episode Listen Later Nov 12, 2025 16:30


    In this episode of Cybersecurity Today, host David Shipley covers the latest threats in the cybersecurity landscape. Highlights include the emergence of the quantum root redirect (QRR) phishing kit, a sophisticated automated phishing platform targeting Microsoft 365 credentials across 90 countries. The hospitality industry is also being hit with a new 'click fix' phishing campaign, compromising booking systems and targeting hotel guests. Researchers discover new vulnerabilities in ChatGPT, exposing private data via indirect prompt injection attacks. Additionally, the University of Pennsylvania confirms a massive data breach, highlighting the risks of not implementing comprehensive MFA protocols. Stay informed with the latest cybersecurity news and insights to protect your organization. Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst 00:00 Introduction and Sponsor Message 00:46 Quantum Root Redirect: A New Phishing Threat 03:47 Click Fix Phishing Attacks on Hotels 07:58 ChatGPT Vulnerabilities and AI Security Risks 11:37 University of Pennsylvania Data Breach 15:12 Conclusion and Call to Action

    Cybercrime Magazine Podcast
    Cybercrime Wire For Nov. 12, 2025. Cyberattack Strikes Popular Museum In Germany. WCYB Digital Radio

    Cybercrime Magazine Podcast

    Play Episode Listen Later Nov 12, 2025 1:28


    The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

    Cyber Crime Junkies
    What's The FUTURE of QUANTUM?

    Cyber Crime Junkies

    Play Episode Listen Later Nov 12, 2025 47:54 Transcription Available


    Discover the cutting-edge technology of CYBER EAGLE, a revolutionary system designed to defend against the threats of quantum warfare. As the world enters a new era of cybersecurity challenges, CYBER EAGLE is poised to be at the forefront of protecting sensitive information and national security.In this conversation, host David Mauro engages with Carlo Tortora Brayda and Michael Tiesemer, leaders of the Cyber Eagle Project, to discuss the future of AI in Cybersecurity and global protection of critical infrastructure.  Chapters 00:00 Introduction to Cyber Eagle Project02:33 The Genesis of Cyber Eagle and Its Vision05:31 Understanding Critical Infrastructure Vulnerabilities08:00 The Age of Compression in Cybersecurity10:42 Building Resilience in Cyber Defense13:44 Dynamic Defense Strategies Against Evolving Threats16:19 Polymorphic AI Defense: Adapting to Attacks19:19 The Future of Cyber Eagle and Its Innovations25:25 Cyber Eagle's Global Deployment Strategy27:56 Building a Compliant Cybersecurity Channel30:40 Innovative Partnerships and Global Reach31:42 Quantum Safety and Cybersecurity Innovations36:58 The Future of Cyber Eagle and Its Mission Send us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Tuesday, November 11th, 2025: 3CX Related Scans; Watchguard Default Password;

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Nov 11, 2025 7:25


    It isn t always defaults: Scans for 3CX Usernames Our honeypots detected scans for usernames that may be related to 3CX business phone systems https://isc.sans.edu/diary/It%20isn%27t%20always%20defaults%3A%20Scans%20for%203CX%20usernames/32464 Watchguard Default Password Controversy A CVE number was assigned to a default password commonly used in Watchguard products. This was a documented username and password that was recently removed in a firmware upgrade. https://github.com/cyberbyte000/CVE-2025-59396/blob/main/CVE-2025-59396.txt https://nvd.nist.gov/vuln/detail/CVE-2025-59396 JavaScript expr-eval Vulnerability The JavaScript expr-eval library was vulnerable to a code execution issue. https://www.kb.cert.org/vuls/id/263614

    Joey Pinz Discipline Conversations
    #770 Cyber Bay 2025 - Nia Luckey:

    Joey Pinz Discipline Conversations

    Play Episode Listen Later Nov 11, 2025 27:36 Transcription Available


    Send us a textFormer Army veteran and cybersecurity strategist Nia Luckey joins Joey Pinz Conversations live at Cyber Bay 2025 to explore how calm, creativity, and courage intersect in today's fast-moving digital world.From 13 years in the U.S. Army to leading major security operations for Cisco, JSOC, and AT&T, Nia reveals how adaptability, humility, and trust fuel progress in both tech and life. She reflects on her TEDx Sugar Creek journey, turning raw burnout into a message that now inspires thousands.We dive into:1️⃣ How her military mindset evolved into collaborative cybersecurity leadership2️⃣ Why AI and quantum bring both opportunity and risk3️⃣ The life lessons behind her motto — “Choose your hard.”Nia reminds us that real success starts with stillness, service, and consistent action — whether hiking mountain peaks or leading global security teams.

    The Tech Blog Writer Podcast
    3482: IGEL CEO Klaus Oestermann on Why the Endpoint Is the Forgotten Link in Cybersecurity

    The Tech Blog Writer Podcast

    Play Episode Listen Later Nov 11, 2025 28:02


    What if the real weakness in enterprise cybersecurity isn't the cloud or the network, but the endpoint sitting on every desk? In this episode, Klaus Oestermann, CEO of IGEL Technology, joins me at the Now and Next event in Frankfurt to discuss why he calls the endpoint the forgotten link in digital transformation. Klaus explains how decades of detect and mitigate thinking have left enterprises vulnerable, and why it is time to move toward a prevention-first security model that stops attacks before they start. He shares how IGEL's dual boot architecture allows organizations to recover thousands of devices in minutes, and why prevention-first design can deliver measurable ROI with an average 62 percent reduction in endpoint IT costs and more than 900,000 dollars in annual savings. During our conversation, Klaus also reflects on the surge in ransomware across critical sectors and why governments and enterprises alike are rethinking their endpoint strategies. He talks about how IGEL has become an essential part of modern Zero Trust frameworks, protecting sectors like healthcare, manufacturing, and public services, while partnering with leading technology providers to build stronger, integrated defenses. We also explore how those savings can be reinvested into Zero Trust, AI innovation, and new layers of defense, as well as how IGEL is helping secure critical national sectors from healthcare to manufacturing. From Audi's factory floors to government agencies, Klaus outlines a future where resilience begins at the endpoint, not the data center. Do you think enterprises are ready to make that shift? I would love to hear your thoughts after the episode. Useful Links Connect with Klaus Oestermann on LinkedIn Learn more about IGEL Follow on LinkedIn, Twitter and YouTube Tech Talks Daily is Sponsored by NordLayer: Get the exclusive Black Friday offer: 28% off NordLayer yearly plans with the coupon code: techdaily-28. Valid until December 10th, 2025. Try it risk-free with a 14-day money-back guarantee.

    Packet Pushers - Full Podcast Feed
    PP086: Using Let's Encrypt and the ACME Protocol for Domain Validation Certificates

    Packet Pushers - Full Podcast Feed

    Play Episode Listen Later Nov 11, 2025 44:39


    Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a domain validation certificate from a Certificate Authority (CA). Our guest, Ed Harmoush, a former network engineer with AWS... Read more »

    Packet Pushers - Fat Pipe
    PP086: Using Let's Encrypt and the ACME Protocol for Domain Validation Certificates

    Packet Pushers - Fat Pipe

    Play Episode Listen Later Nov 11, 2025 44:39


    Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a domain validation certificate from a Certificate Authority (CA). Our guest, Ed Harmoush, a former network engineer with AWS... Read more »

    ITSPmagazine | Technology. Cybersecurity. Society
    How to Make One SOC Analyst Work Like Ten: Stop Normalizing Everything—Start Solving Something | A Crogl Brand Story Conversation with CEO, Monzy Merza

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Nov 11, 2025 39:06


    When “Normal” Doesn't Work: Rethinking Data and the Role of the SOC AnalystMonzy Merza, Co-Founder and CEO of Crogl, joins Sean Martin and Marco Ciappelli to discuss how cybersecurity teams can finally move beyond the treadmill of normalization, alert fatigue, and brittle playbooks that keep analysts from doing what they signed up to do—find and stop bad actors.Merza draws from his experience across research, security operations, and leadership roles at Splunk, Databricks, and one of the world's largest banks. His message is clear: the industry's long-standing approach of forcing all data into one format before analysis has reached its limit. Organizations are spending millions trying to normalize data that constantly changes, and analysts are paying the price—buried under alerts they can't meaningfully investigate.The conversation highlights the human side of this issue. Analysts often join the field to protect their organizations, but instead find themselves working on repetitive tickets with little context, limited feedback loops, and an impossible expectation to know everything—from email headers to endpoint logs. They are firefighters answering endless 911 calls, most of which turn out to be false alarms.Crogl's approach replaces that normalization-first mindset with an analyst-first model. By operating directly on data where it lives—without requiring migration or schema alignment—it allows every analyst to investigate deeper, faster, and more consistently. Each action taken by one team member becomes shared knowledge for the next, creating an adaptive, AI-driven system that evolves with the organization.For CISOs, this means measurable consistency, auditability, and trust in outcomes. For analysts, it means rediscovering purpose—focusing on meaningful investigations instead of administrative noise.The result is a more capable, connected SOC where AI augments human reasoning rather than replacing it. As Merza puts it, the new normal is no normalization—just real work, done better.Watch the full interview and product demo: https://youtu.be/7C4zOvF9sdkLearn more about CROGL: https://itspm.ag/crogl-103909Note: This story contains promotional content. Learn more.GUESTMonzy Merza, Founder and CEO of CROGL | On LinkedIn: https://www.linkedin.com/in/monzymerza/RESOURCESLearn more and catch more stories from CROGL: https://www.itspmagazine.com/directory/croglBrand Spotlight: The Schema Strikes Back: Killing the Normalization Tax on the SOC: https://brand-stories-podcast.simplecast.com/episodes/the-schema-strikes-back-killing-the-normalization-tax-on-the-soc-a-corgl-spotlight-brand-story-conversation-with-cory-wallace [Video: https://youtu.be/Kx2JEE_tYq0]Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Spotlight Brand Story: https://www.studioc60.com/content-creation#spotlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    ITSPmagazine | Technology. Cybersecurity. Society
    The Schema Strikes Back: Killing the Normalization Tax on the SOC | A Corgl Spotlight Brand Story Conversation with Cory Wallace

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Nov 11, 2025 20:23


    Breaking Free from Data Normalization: A Smarter Path for Security TeamsTraditional security models were built on a simple idea: collect data, normalize it, and analyze it. But as Director of Product Marketing Cory Wallace explains in this conversation with Sean Martin, that model no longer fits the reality of modern security operations. Data now lives across systems, clouds, and lakes—making normalization an inefficient, error-prone step that slows teams down and risks critical blind spots.Rethinking How Analysts Work with DataCory describes how schema drift, inconsistent field naming, and vendor-specific query languages have turned the analyst's job into a maze of manual mapping and guesswork. Each product update or schema change introduces a chance to miss something important—something an attacker is counting on. Crogl's new patent eliminates this problem by enabling search and correlation across unnormalized data, creating a unified analytical view without forcing everything into one rigid format.From Data Chaos to Analyst EmpowermentThis shift isn't just technical—it's cultural. Instead of treating SOC analysts as passive alert closers, Crogl's model empowers them with meaningful context from the start. Alerts now come with historical data, cross-referenced fields, and prebuilt queries, giving analysts the information they need to make decisions faster and more confidently.Efficiency with IntelligenceWallace explains how this approach saves time, reduces training burdens, and cuts dependency on multiple query languages. It helps overworked teams move from reactive triage to proactive investigation. By removing unnecessary layers of data transformation, organizations can accelerate incident resolution, minimize risk, and help analysts focus on what matters most—catching what others miss.At its core, the conversation highlights how removing the barriers of data normalization can redefine what's possible in modern security operations.Watch the full interview: https://youtu.be/Kx2JEE_tYq0Learn more about CROGL: https://itspm.ag/crogl-103909Note: This story contains promotional content. Learn more.GUESTCory Wallace, Director of Product Marketing at CROGL | On LinkedIn: https://www.linkedin.com/in/corywallacecrogl/RESOURCESLearn more and catch more stories from CROGL: https://www.itspmagazine.com/directory/croglPress Release: https://www.globenewswire.com/news-release/2025/11/05/3181815/0/en/Crogl-Granted-Patent-for-Analyzing-Non-Normalized-Data-for-Security.htmlForbes Article: https://www.forbes.com/sites/justinwarren/2025/11/05/tackling-cybersecurity-data-sprawl-without-normalizing-everything/LinkedIn Post: https://www.linkedin.com/posts/activity-7391913358817517569-QaCHAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Spotlight Brand Story: https://www.studioc60.com/content-creation#spotlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Cybercrime Magazine Podcast
    Cybercrime Wire For Nov. 11, 2025. Iran-Backed Hack Hits Aussie Military. WCYB Digital Radio.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Nov 11, 2025 1:24


    The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

    Simply Cyber

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars!Check out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonAllow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform at https://threatlocker.com/dailycyberTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare's next training on Aug. 13th on Web App Testing at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials

    Security Forum Podcasts
    S36 Ep11: S36 Ep11: Why Cybersecurity Should Be a Boardroom Conversation

    Security Forum Podcasts

    Play Episode Listen Later Nov 11, 2025 32:25


    Today's special episode features Steve's recent Business Matters broadcast interview with Juliette Foster, featuring conversation about critical cybersecurity challenges facing organizations today. Steve and Juliette discuss targeted phishing, the growing threat of Crime-as-a-Service, the increase in AI-driven cybercrime, and more.  Key Takeaways: Cyber attacks will continue to increase, and businesses must adjust. Regulators must strike a balance to have clear guidelines without stifling businesses. To take advantage of new technologies like AI, businesses must invest in upskilling their employees.  Tune in to hear more about: Why cyber crime is on the rise (2:17) How cyber criminals target their victims (4:00) Solving the cyber skills shortage (29:02) Standout Quotes: “The bad guys only need to get lucky once and they can cause havoc. And so the sorts of numbers you are seeing are them plugging away at it, trying to break down defenses, trying to find a way through. And on the defensive side, of course, we have to be at the top of our game 24/7, and that's just impossible.” - Steve Durbin “We also have very complex supply chains now that obviously are made up of small to mid-size companies. [...] So an easier way of accessing some of this high value information is often via the third party. So you don't necessarily need to be attacking the larger enterprise. You can target a smaller to mid-size, which probably doesn't have the same level of defense, maybe not the same level of awareness. And because it's in the supply chain and sharing information, you can then access through to the larger enterprise.” Steve Durbin “You have to invest in actually looking at the skill sets that you need within your organization and making some hard calls, I think, as to whether or not you do have the right capabilities within your organization. That doesn't necessarily mean that you have to get rid of a lot of people. It means you probably do need to invest significantly in upskilling and training and thinking very hard about how you're going to use some of that new technology.” - Steve Durbin Read the transcript of this episode Subscribe to the ISF Podcast wherever you listen to podcasts Connect with us on LinkedIn and Twitter From the Information Security Forum, the leading authority on cyber, information security, and risk management.

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Monday, November 10th, 2025: Code Repo Requests; Time Delayed ICS Attacks; Encrypted LLM Traffic Sidechannel Attacks

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Nov 10, 2025 7:06


    Honeypot Requests for Code Repository Attackers continue to scan websites for source code repositories. Keep your repositories outside your document root and proactively scan your own sites. https://isc.sans.edu/diary/Honeypot%3A%20Requests%20for%20%28Code%29%20Repositories/32460 Malicious NuGet Packages Deliver Time-Delayed Destructive Payloads Newly discovered malicious .NET packages attempt to deliver a time-delayed attack targeting ICS systems. https://socket.dev/blog/9-malicious-nuget-packages-deliver-time-delayed-destructive-payloads Side Channel Leaks in Encrypted Traffic to LLMs Traffic to LLMs can be profiled to discover the nature of prompts sent by a user based on the amount and structure of the encrypted data. https://www.microsoft.com/en-us/security/blog/2025/11/07/whisper-leak-a-novel-side-channel-cyberattack-on-remote-language-models/

    Geopolitics & Empire
    Michael Ginsburg: Digital ID is Game Over, Time to Sabotage Technocracy

    Geopolitics & Empire

    Play Episode Listen Later Nov 10, 2025 129:38


    Michael Ginsburg discusses the new world order and the most imminent threat we face which is technocracy and digital ID. He argues if digital ID gets installed, it is game over. He proposes some ideas but urges us all to crowdsource solutions for the way forward. Watch on BitChute / Brighteon / Rumble / Substack / YouTube *Support Geopolitics & Empire! Become a Member https://geopoliticsandempire.substack.com Donate https://geopoliticsandempire.com/donations Consult https://geopoliticsandempire.com/consultation **Visit Our Affiliates & Sponsors! Above Phone https://abovephone.com/?above=geopolitics easyDNS (15% off with GEOPOLITICS) https://easydns.com Escape The Technocracy (15% off with GEOPOLITICS) https://escapethetechnocracy.com/geopolitics Outbound Mexico https://outboundmx.com PassVult https://passvult.com Sociatates Civis https://societates-civis.com StartMail https://www.startmail.com/partner/?ref=ngu4nzr Wise Wolf Gold https://www.wolfpack.gold/?ref=geopolitics Websites Actionable Truth https://www.actionabletruth.media Mailing List https://sendfox.com/actionabletruth Substack https://actionabletruth.substack.com X https://x.com/actionabletruth We MUST regain our focus! https://actionabletruth.substack.com/p/must-regain-focus About Michael Ginsburg Michael Ginsburg, the Founder of Actionable Truth Media, has a over two decades of experience working in IT, including Cybersecurity and Technology Consulting, and has put significant effort into researching and identifying the most secure means to communicate online, while making sure these remain usable to non-techies. He is a technologist turned independent researcher and investigative journalist. *Podcast intro music is from the song "The Queens Jig" by "Musicke & Mirth" from their album "Music for Two Lyra Viols": http://musicke-mirth.de/en/recordings.html (available on iTunes or Amazon)

    RAISING HER CONFIDENTLY | Parenting Teens, How to Talk to Teens,  Family Communication, Raising Teen Girls
    283\\ Strategies to Keep Your Teen Safe From Online Predators with Cyber Security Expert Tom Arnold

    RAISING HER CONFIDENTLY | Parenting Teens, How to Talk to Teens, Family Communication, Raising Teen Girls

    Play Episode Listen Later Nov 10, 2025 46:38


    Confused about when to let you teen girl have a TikTok account?  Is she old enough for an Instagram account? Are you frustrated by your teenage daughter's constant use of her phone? Today I have cybersecurity expert Tom Arnold on with some tips on keeping your teens safe from online predators and the conversations you can have with her.   Tom Arnold (CISSP, ISSMP, CISA, CFS, GCFE-Gold, GNFA, GWEB, GBFA) is a cybersecurity expert, digital forensics investigator, and educator. He lectures on digital forensics and incident response at San Jose State University and the University of Nevada, Las Vegas, where he is also helping to develop a new digital evidence and forensics degree program. A co-founder of Payment Software Company (PSC), now part of NCC Group, Arnold has led large-scale breach investigations—some involving more than 7,000 servers—and served as lead investigator in complex threat-hunting operations. He has testified before the U.S. Senate and House on cybersecurity legislation and sits on the steering committee for the Las Vegas branch of the USSS/Cyber Fraud Task Force. He also serves as Operations Manager at Cloud 10 Studios, a full-service animation studio that creates original series, long-form content, and commercial projects. His novel The Digital Detective: First Intervention was inspired by a real-life cybersecurity scare when Arnold's grandson was approached by a stranger on Roblox despite parental controls. That moment launched Arnold's mission to help families and schools recognize hidden online dangers—and to give kids the tools they need to stay safe in the digital world.   Are you looking for ways to communicate with your girl so she can start opening up to you? Do you want to understand why is it so hard to approach your girl? Are you stuck on how to approach your teenage daughter in conversation without her freaking out?   SIGN UP FOR TALK TO YOUR TEEN GIRL FRAMEWORK!!  A 6-WEEK JOURNEY TO SHIFT HOW YOU COMMUNICATE SO SHE CAN COME TO YOU!   You'll walk away with a deeper understanding the changes happening to your girl, Equipped in your new role as COACH in this teen stage, and establish better communication pathways to connect and grow closer with your daughter   Imagine if you and your daughter can finally have conversations at a level where she doesn't need to hide anything from you! Plus, you'll get to meet other mamas who are all in the same boat.... SIGN UP HERE!      You can find me here: Work with me:  www.talktyourteengirl.com Connect: hello@jeanniebaldomero.com Instagram:   https://www.instagram.com/raisingherconfidently Free mom support community: www.raisingherconfidently.com  

    The PowerShell Podcast
    200 Episodes of Community with Frank Lesniak

    The PowerShell Podcast

    Play Episode Listen Later Nov 10, 2025 70:46


    In this milestone 200th episode of The PowerShell Podcast, Frank Lesniak returns to chat with Andrew Pla about automation, community, and what it means to “bet on yourself.” Frank shares his experiences leading cybersecurity and enterprise architecture projects, using PowerShell for AWS security automation, and developing tools to simplify complex data exports. He also discusses the upcoming PowerShell Summit, his work with DuPage Animal Friends, and the value of giving back through mentorship, community involvement, and open source.   Key Takeaways: PowerShell in the cloud – Frank dives deep into AWS automation and explains how PowerShell can simplify security and configuration management at scale. From console to community – After years of speaking and mentoring, Frank emphasizes how collaboration and consistent effort lead to career growth and confidence. Giving back through leadership – As VP of DuPage Animal Friends, Frank highlights the power of using your professional skills for good beyond tech. Guest Bio: Frank Lesniak is a Sr. Cybersecurity & Enterprise Technology Architect at West Monroe, where he leads a 45-member team focused on Microsoft's M365/Modern Work platform. His team specializes in navigating the technical complexities of corporate M&A, executing at-scale divestitures and integrations centered on Azure, Microsoft 365, Entra ID, Active Directory, and Windows. An active contributor to the tech community, Frank is a published author, open-source contributor, and a frequent speaker at conferences and user groups on topics including PowerShell, artificial intelligence, and offbeat technical talks related to his hobbies. In his local community, he serves as the Vice President of DuPage Animal Friends, a non-profit dedicated to supporting DuPage County's sole open-admission animal shelter.   Resource Links: Connect with Frank -https://linktr.ee/franklesniak Frank Lesniak on X (Twitter) – https://x.com/FrankLesniak Frank on LinkedIn – https://linkedin.com/in/flesniak Connect with Andrew - https://andrewpla.tech/links DuPage Animal Friends – https://dupageanimalfriends.org Previous Podcasts with Frank - https://powershellpodcast.podbean.com/?s=Frank%20Lesniak PowerShell Wednesdays – YouTube Playlist PDQ Discord (PowerShell Scripting Channel) – https://discord.gg/PDQ PowerShell Summit OnRamp Scholarship – https://www.powershellsummit.org/on-ramp/ The PowerShell Podcast on YouTube: https://youtu.be/cQvs5s3T1DA

    SaaS Scaled - Interviews about SaaS Startups, Analytics, & Operations
    Great Products are Grounded in Deep Empathy with Chris Mchenry

    SaaS Scaled - Interviews about SaaS Startups, Analytics, & Operations

    Play Episode Listen Later Nov 10, 2025 35:58


    Today, we're joined by Chris McHenry, Chief Product Officer at Aviatrix, a cloud native network security company. We talk about:Prerequisites to driving operational efficiency with agentic AIBridging the gap between security & engineering so organizations can go fast & be secure What's required in order for agentic AI to create a magical momentWith cloud powering so much of our society, the need to get security right The security challenges introduced by agentic AI apps, including new attack vectors

    Cyber Security Today
    US Congressional Budget Office Breach, AI in Cyber Attacks & Veterans Defend Canada

    Cyber Security Today

    Play Episode Listen Later Nov 10, 2025 9:01


    Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst In today's episode, we cover the breach at the US Congressional Budget Office and its implications on national security, Microsoft Teams' chat feature being exploited for phishing attacks, and the increasing use of AI in cyber attacks. We also highlight how Canadian veterans are being retrained for careers in cybersecurity through the Coding for Veterans program. Hosted by Jim Love, we thank Meter for supporting this podcast with their complete networking stack solutions. 00:00 Introduction and Sponsor Message 00:51 US Congressional Budget Office Breach 02:27 Microsoft Teams Phishing Exploit 03:42 AI in Cybersecurity Attacks 06:09 Veterans in Cybersecurity 07:44 Conclusion and Sponsor Message

    PEBCAK Podcast: Information Security News by Some All Around Good People
    Episode 233 - Microsoft Edge Scam Detection, Cybersecurity Employees Worked for Ransomware Crew, L3 Harris Executive Stole Zero Days, Line-Waiting-as-a-Service

    PEBCAK Podcast: Information Security News by Some All Around Good People

    Play Episode Listen Later Nov 10, 2025 39:36


    Welcome to this week's episode of the PEBCAK Podcast!  We've got four amazing stories this week so sit back, relax, and keep being awesome!  Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast   Please share this podcast with someone you know!  It helps us grow the podcast and we really appreciate it!   https://www.youtube.com/shorts/RibEPALlVE4   Microsoft Edge gets scam detection https://www.bleepingcomputer.com/news/microsoft/microsoft-edge-gets-scareware-sensor-for-faster-scam-detection/  https://torontosun.com/uncategorized/ontario-couple-gives-up-more-than-1m-to-online-scammers-despite-bank-warning   Cybersecurity employees worked for ransomware group https://www.bleepingcomputer.com/news/security/us-cybersecurity-experts-indicted-for-blackcat-ransomware-attacks/   L3 Harris Trenchant executive stole zero days https://x.com/jsrailton/status/1985494477033656371?s=46  https://techcrunch.com/2025/11/03/how-an-ex-l3-harris-trenchant-boss-stole-and-sold-cyber-exploits-to-russia/   Line waiting as a service https://www.taskrabbit.com/services/shopping-delivery/waiting-in-line   Dad Joke of the Week (DJOW)   Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Glenn - https://www.linkedin.com/in/glennmedina/

    Serious Privacy
    If it ain't California, it's Texas

    Serious Privacy

    Play Episode Listen Later Nov 10, 2025 38:28 Transcription Available


    Send us a textIn this episode of Serious Privacy, Ralph O'Brien and Dr. K Royal discuss the weekly news, including the Google settlement in Texas, ClearviewAI and much more. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.

    TD Ameritrade Network
    Parent of Norton, Lifelock Gen (GEN) CFO on Consumer Cybersecurity & Earnings Beat

    TD Ameritrade Network

    Play Episode Listen Later Nov 10, 2025 8:13


    Natalie Derse, CFO of the cybersecurity company Gen (GEN), joins Trading 360 to discuss their earnings. Consumer brands include Norton, Avast, Lifelock and other online security services. She breaks down the numbers and covers their recent acquisition of MoneyLion. She emphasizes the importance of strong messaging and consumer relationships to the company's success.======== Schwab Network ========Empowering every investor and trader, every market day. Subscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/ About Schwab Network - https://schwabnetwork.com/about

    UNSECURITY: Information Security Podcast
    Unsecurity Live: Special 250th Edition with Oscar Minks & Evan Francen

    UNSECURITY: Information Security Podcast

    Play Episode Listen Later Nov 10, 2025 32:41


    Celebrating 250 episodes of Unsecurity, Megan and Brad go live at Hacks & Hops with former hosts and leaders of FRSecure, Evan Francen and Oscar Minks.Stories of navigating the growing team and the evolution of Unsecurity weaves personal testimonies of leadership, trust in self, and growth. This is a milestone episode you won't want to miss!Thank you to our listeners for the support! Reach out at unsecurity@frsecure.com and follow us for more!LinkedIn: https://www.linkedin.com/company/frsecure/ Instagram: https://www.instagram.com/frsecureofficial/ Facebook: https://www.facebook.com/frsecure/ BlueSky: https://bsky.app/profile/frsecure.bsky.social … About FRSecure: https://frsecure.com/ FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start or looking for a team of experts to collaborate with you, we are ready to serve.

    CEO Perspectives
    Are Companies Paying Enough Attention to AI Risks?

    CEO Perspectives

    Play Episode Listen Later Nov 10, 2025 28:39


    Companies in the S&P 500 are increasingly disclosing AI-related risks. Find out what this means for C-Suite leaders and boards.     More than 70% of the S&P 500 disclosed material AI risks in 2025, up from only 12% in 2023. What are the biggest AI-related risks for these companies, and how can they integrate AI into governance and risk frameworks?     Join Steve Odland and guest Andrew Jones, principal researcher at the Governance & Sustainability Center of The Conference Board, to discover why AI disclosures have soared since 2023, the challenges of divergent regulations in the EU and US, and why AI further complicates cybersecurity.    For more from The Conference Board:  AI Risk Disclosures in the S&P 500: Reputation, Cybersecurity, and Regulation  How Should Companies Approach Reputation Building in the AI Era?  A Coach for Every Worker: Scaling Access and Performance with AI 

    Simply Cyber

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars!Check out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonAllow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform at https://threatlocker.com/dailycyberTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare's next training on Aug. 13th on Web App Testing at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials

    Cyber Crime Junkies
    This New Rule Can DESTROY Your Sales Overnight: CMMC's Wide Reach

    Cyber Crime Junkies

    Play Episode Listen Later Nov 10, 2025 39:41 Transcription Available


    CMMC 2.0 explained in plain English — what it means for small businesses, defense contractors, and vendors across the DoD supply chain. Learn about Level 1 vs Level 2, self-attestation risks, C3PAO shortages, compliance deadlines, and how to stay audit-ready before 2025.Don't miss out on crucial information about the CMMC 2025 deadline. The Cybersecurity Maturity Model Certification is a vital requirement for businesses dealing with the Department of Defense. If you miss the deadline, you risk losing contracts and facing severe penalties. In this video, we'll explore the consequences of missing the CMMC 2025 deadline and provide valuable insights on how to prepare and stay compliant. Stay ahead of the game and ensure your business is CMMC-ready. Find out what happens if you missed the deadline and learn how to avoid costly mistakes. Tune in now and take the first step towards CMMC compliance. CHAPTERS00:00 – The 4 Letters That Can End Your Business00:15 – CMMC 2.0: Why November 10, 2025 Changes Everything01:35 – Meet the Expert: Frontline View from a CMMC Assessor02:59 – What Is CMMC (In Plain English)?04:20 – FCI vs CUI: The Data That Decides Your Level07:05 – Are You Level 1 or Level 2? How the Flow-Down Really Work10:05 – Why the DoD Stopped “Trusting” Small Contractors11:40 – Supply-Chain Breaches: How Third Parties Take You Down13:00 – Level 1: The 17 “Basic” Controls Everyone Ignores17:00 – The Dangerous Game of Fudging Your Self-Attestation21:15 – Level 2: 110 Controls, SSPs, and the Reality of NIST 800-17123:40 – C3PAO Bottleneck: Why Waiting Means Losing Contracts26:30 – POA&M and the 180-Day “Grace” Trap32:05 – Surprise: Printers, MSPs, and “Non-Defense” Vendors in the Blast Radius35:15 – CMMC Is Not Going Away (And Other Hard Truths)37:05 – Countdown to FallSend us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show

    Software Process and Measurement Cast

    AI, the Future of Work, and Cybersecurity Are Intertwined! Why it matters: Business processes are being transformed, yielding opportunities and RISKS - leaders should be aware. Bio: Ephraim Ebstein is the CEO and Co-founder of FIT Solutions, LLC. Ephraim is not just another cybersecurity guy-he's a $30M entrepreneur who built two national companies from the ground up, and now helps business leaders turn tech headaches into growth engines. .IG: @kingspear @fitsolutionsllc Ephraim Ebstein | LinkedIn https://fitsolutions.biz/ Web Mastering Work Intake sponsors SPaMCAST! Starting Everything Means Finishing Nothing One big thing: Poor work entry means delivering less. Why it matters: Work Intake controls what a team works on and when they work on it. Overloaded teams deliver less value. Poor prioritization leads to delivering the wrong work. Chaotic work intake costs organizations money and time. Zoom in: Mastering Work Intake by Jeremy Willets and Tom Cagley provides the reader with ideas, principles, actionable advice, worksheets, and examples to deliver more value. Buy a copy! JRoss Publishing: https://bit.ly/474ul6G Amazon: https://amzn.to/4236013 Process Debt Swamp Platform Teams! Over-abstraction slows teams by INCREASING complexity. Why this matters: Profitability is HIGHLY related to productivity. SPaMCAST 879 will be posted in two weeks. If you would like to participate in the panel discussions, email me at spamcastinfo@gmail.com.

    T-Minus Space Daily
     The Cybersecurity Maturity Model Certification Program.

    T-Minus Space Daily

    Play Episode Listen Later Nov 8, 2025 30:28


     Defense contractors, including space industry companies who are doing work with the Department of Defense, have requirements in their contracts right now to implement cybersecurity requirements to various degrees.  Those requirements have been in contracts for a very long time. Unfortunately, there has never been a mechanism in those contracts to make contractors prove that they're doing those things. And over the years, there have been multiple instances where the DOD has paid the price as a result of their contractors being compromised.  That's about to change. The Cybersecurity Maturity Model Certification (CMMC) Program comes into effect on November 10, 2025. Find out more about the requirements from Jacob Horne, Chief Cybersecurity Evangelist at Summit 7. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at space@n2k.com to request more info. Want to join us for an interview? Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

    Cyber Security Today
    A Former Black Hat Hacker Advises Us On Security Weaknesses

    Cyber Security Today

    Play Episode Listen Later Nov 8, 2025 55:44


    Unveiling the Double-Edged Sword of AI in Cybersecurity with Brian Black In this episode of Cybersecurity Today, host Jim Love interviews Brian Black, the head of security engineering at Deep Instinct and a former black hat hacker. Brian shares his journey into hacking from a young age, his transition to ethical hacking, and his experiences working with major companies. The discussion delves into the effectiveness of cybersecurity defenses against modern AI-driven attacks, the importance of understanding organizational data, and the challenges of maintaining robust security in the age of AI. Brian emphasizes the need for preemptive security measures and shares insights on the evolving threats posed by AI as well as the need for continuous education and adaptation in the cybersecurity field. 00:00 Introduction and Sponsor Message 00:21 Meet Brian Black: From Black Hat to Good Guy 00:55 Brian's Early Hacking Days 02:46 Transition to Ethical Hacking 04:11 Life in the Hacking Community 08:54 Advice for Aspiring Hackers and Parents 11:05 Corporate Career and Red Teaming 13:12 The Importance of Basics in Cybersecurity 21:41 Multifactor Authentication: The Good and the Bad 24:19 Challenges in Vendor Security Testing 27:41 Weaknesses in Cyber Defense 28:22 AI Speed vs Human Speed 28:37 AI in Cybersecurity Attacks 30:08 Dark AI Tools and Their Capabilities 32:54 AI Agents and Offensive Strategies 35:43 Challenges in Cybersecurity Defense 41:48 The Role of Red Teaming 42:46 Hiring the Right Red Team 46:59 Burnout in Cybersecurity 48:17 AI as a Double-Edged Sword 52:43 Deep Instinct's Approach to Security 53:58 Conclusion and Final Thoughts

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Friday, November 7th, 2025: PowerShell Log Correlation; RondoBox Disected; Google Chrome and Cisco Patches

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Nov 7, 2025 5:31


    Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary] Windows, with PowerShell, has a great scripting platform to match common Linux/Unix command line utilities. https://isc.sans.edu/diary/Binary%20Breadcrumbs%3A%20Correlating%20Malware%20Samples%20with%20Honeypot%20Logs%20Using%20PowerShell%20%5BGuest%20Diary%5D/32454 RondoDox v2 Increases Exploits The RondoDox (or RondoWorm) added a substantial amount of new exploits to its repertoire. https://beelzebub.ai/blog/rondo-dox-v2/ Google Chrome Updates Google released an update for Google Chrome addressing five vulnerabilities. https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop.html Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities Cisco patched two critical vulnerabilities in its Contact Center Express software. These vulnerabilities may lead to a full system compromise. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-unauth-rce-QeN8h7mQ

    Destination Linux
    442: Is Tor Safe? The Big Security Questions w/ Sandfly CEO Craig Rowland

    Destination Linux

    Play Episode Listen Later Nov 7, 2025 82:10


    Support the show by becoming a patron at tuxdigital.com/membership or get some swag at tuxdigital.com/store Hosted by: Ryan (DasGeek) = dasgeek.net Jill Bryant = jilllinuxgirl.com Chapters: 00:00:00 Intro 00:01:44 Community Feedback: New Linux User and Maya Issues 00:12:50 Ryan's New PC Build Update 00:16:18 SPECIAL Sponsor Ad w/ Q&A On Sandfly Security 00:22:50 Does TOR really keep you anonymous? 00:52:13 Nvidia & Crowdstrike Partner on open-source security ecosystem 01:08:30 Linux Kernel Flaw Under Active Exploit 01:19:40 Outro Special Guest: Craig Rowland CEO of Sandfly Special Guest: Craig Rowland.

    Cyber Security Today
    Innovative Tools and Tactics in Cybersecurity

    Cyber Security Today

    Play Episode Listen Later Nov 7, 2025 8:15


    In this episode of 'Cybersecurity Today,' hosted by Jim Love, the focus is on recent developments and tactics in cybersecurity. The episode discusses Meter's networking solutions, the innovative tactics of the ransomware group Killen using common Windows tools, and three new open-source offerings aimed at improving security: Heisenberg for software bills of materials, OpenAI's Aardvark for automated vulnerability detection, and Open PCC for securing AI data flows. The show emphasizes the importance of detecting unusual behaviors in legitimate tools and highlights the need for proactive security measures in development pipelines. Listeners are encouraged to explore these initiatives further through show notes and upcoming discussions. 00:00 Introduction and Sponsor Message 00:43 Ransomware Tactics: Using Everyday Tools 02:05 Heisenberg: Active Supply Chain Defense 03:38 Aardvark: Autonomous Security Researcher 04:56 Open PCC: Securing Enterprise AI Data 06:38 Final Thoughts and Resources 07:02 Closing and Upcoming Episodes

    The Raving Patients Podcast
    Dental Office Cybersecurity and HIPAA Compliance : How Not to Make a $50,000 Mistake

    The Raving Patients Podcast

    Play Episode Listen Later Nov 7, 2025 46:48


    Cybersecurity breaches and ransomware attacks are no longer a "big company problem." Dental offices are prime targets because patient data is gold on the dark web. In this episode, I'm joined once again by the expert who has been leading the charge in dental technology protection for over 20 years: Dr. Lorne Lavine, The Digital Dentist. If you've ever thought "it won't happen to my practice," this conversation will change your mind fast. Returning guest Dr. Lorne Lavine dives deep into what every dental practice must know about protecting their patient data, technology systems, and reputation. Lorne breaks down how ransomware attacks actually happen, why HIPAA compliance is still widely misunderstood, and the real consequences practices face if they don't take security seriously. You'll learn: • The #1 way ransomware breaks into dental offices • Why cloud-based software does not eliminate HIPAA responsibility • What a proper HIPAA risk assessment really involves • Best practices for backups and disaster recovery • How cyber liability insurance protects your bottom line • The surprising percentage of practices that get hit with ransomware • The essentials every IT setup needs in 2025 and beyond • Why leaning on a healthcare-focused IT provider matters more than ever Lorne also shares his own powerful journey from perio to the forefront of dental tech security, plus personal insights in our lightning-round close. This episode gives dentists the clarity and action steps needed to stay protected, stay compliant, and stay in business.   — Key Takeaways Audio 00:41 Introduction and Event Highlights 03:35 Meet Dr. Lorne Lavine: Expert in Dental Technology 06:58 Transitioning from Dentistry to Technology Consulting 07:37 Managed Services and HIPAA Compliance 10:45 The Shift to Cloud-Based Solutions 14:55 Understanding Ransomware and Cybersecurity 22:25 Navigating Cybersecurity Liability and Insurance 25:41 The Importance of HIPAA Risk Assessments 28:20 Navigating HIPAA Compliance and Risk Management 29:35 Data Backup Strategies for Modern Practices 33:39 Cybersecurity Best Practices for Healthcare 36:38  The Importance of IT Consultation in Healthcare 43:13 Personal Insights and Entrepreneurial Advice   — Connect with Dr Lorne Website: TheDigitalDentist.com Email: drlavine@thedigitaldentist.com Phone: 866-204-3398 Free Offer for Listeners: Complimentary cybersecurity & HIPAA technical audit plus a personal review call with Dr. Lavine.   — Learn proven dental marketing strategies and online reputation management techniques at DrLenTau.com. This podcast is sponsored by Dental Intelligence. Learn more here. This podcast is sponsored by CallRail, call tracking & lead conversion software for dentists. Find out more here. Raving Patients Podcast is your go-to place for the latest and best dental marketing strategies that will help you skyrocket your practice. Follow us for more!

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Thursday, November 6th, 2025: Domain API Update; Teams Spoofing; VShell Report

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Nov 6, 2025 5:43


    Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing Vulnerabilities Checkpoint released details about recently patched spoofing and impersonation vulnerabilities in Microsoft Teams https://research.checkpoint.com/2025/microsoft-teams-impersonation-and-spoofing-vulnerabilities-exposed/ NViso Report: VSHELL NViso published an amazingly detailed report describing the remote control implant VSHELL. The report includes details about the inner workings of the tool as well as detection ideas. https://www.nviso.eu/blog/nviso-analyzes-vshell-post-exploitation-tool

    ITSPmagazine | Technology. Cybersecurity. Society
    Building a Real Security Culture: Why Most AppSec Champion Programs Fall Short | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 5 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Nov 6, 2025 2:24


    Most organizations have security champions. Few have a real security culture.In this episode of AppSec Contradictions, Sean Martin explores why AppSec awareness efforts stall, why champion programs struggle to gain traction, and what leaders can do to turn intent into impact.

    Hacker Valley Studio
    Making Cybersecurity Marketing Creative (and a Little Sexy) with Maria Velasquez

    Hacker Valley Studio

    Play Episode Listen Later Nov 6, 2025 30:04


    Who said cybersecurity had to be serious? The future of cyber is creative, human, and even a little sexy. In this special 400th episode, Ron Eddings celebrates six incredible years of Hacker Valley Studio with one of cyber's most creative voices, Maria Velasquez, Co-Founder of the Cybersecurity Marketing Society and Co-Host of Breaking Through in Cybersecurity Marketing. Together, they discuss how bold storytelling, authentic community, and a touch of fun are reshaping the way we connect in cybersecurity. Maria opens up about turning burnout into purpose, building a 4,000-strong global movement, and why the next frontier in cyber might just be entertainment.   Impactful Moments: 00:00 - Introduction 02:00 - CISA layoffs and collaboration fragility 04:00 - Welcoming Maria Velasquez 06:00 - How loneliness sparked a global community 08:00 - Why collaboration fuels cybersecurity growth 10:00 - When cybersecurity marketing was “boring” 12:00 - The rise of creativity and brand power 14:00 - Story behind Torque's “Kill the S.O.A.R” campaign 15:00 - Making cybersecurity emotional and human 17:00 - Maria's advice for bold marketing leaders 18:00 - The next big thing: experiential marketing 20:00 - Inside Cyber Marketing Con 2025 24:00 - Final reflections on community and creativity 27:00 - Ron's takeaways: connection drives innovation Links: Connect with Maria on LinkedIn: https://www.linkedin.com/in/maria-vepa/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

    The Cybertraps Podcast
    INCH360 2025: Tara Chandler

    The Cybertraps Podcast

    Play Episode Listen Later Nov 6, 2025 8:18


    This episode is a part of a special series of interviews conducted at the INCH360 Cybersecurity Conference in Spokane, Washington. Visit their website to learn more about INCH360 and their mission. Host Jethro D. Jones interviews Tara Chandler, Treasury Management Officer at ICCU. They discuss fraud prevention in banking, the importance of protecting business accounts, and practical tools for safeguarding funds. Tara also shares her approach to digital note-taking for increased productivity. We're thrilled to be sponsored by IXL. IXL's comprehensive teaching and learning platform for math, language arts, science, and social studies is accelerating achievement in 95 of the top 100 U.S. school districts. Loved by teachers and backed by independent research from Johns Hopkins University, IXL can help you do the following and more:Simplify and streamline technologySave teachers' timeReliably meet Tier 1 standardsImprove student performance on state assessments

    Prepping Academy
    The Truth About Internet Browsers

    Prepping Academy

    Play Episode Listen Later Nov 6, 2025 31:00


    Podcast Summary – Prepping Academy Podcast: “The Truth About Internet Browsers – Which Ones Keep You Safe?”In this episode of The Prepping Academy Podcast, host Forrest Garvin breaks down one of the most overlooked areas of online privacy — your internet browser. Every click, search, and website visit leaves a digital trail, and your browser is often the biggest source of data collection, tracking, and surveillance.Forrest compares the most popular browsers — Chrome, Firefox, Brave, Edge, and DuckDuckGo — revealing which ones spy on you, which actually protect your privacy, and how to configure your browser for maximum anonymity. You'll learn about browser fingerprinting, private search engines, extensions that protect your data, and the crucial settings every prepper and privacy-minded American should change today.If you care about staying private online, blocking trackers, and avoiding Big Tech surveillance, this episode is packed with practical, easy-to-follow advice. Don't miss this deep dive into the tools that keep your digital footprint off the grid.Keywords: private browsers, privacy tools, online security, browser tracking, DuckDuckGo, Brave browser, digital privacy, PrepperNet, Prepping Academy Podcast, Forrest Garvin.FREE Webinars:Seating is limited, so reserve your spot now!  Dissappear On the InternetCrypto Digital Assets CourseGain Freedom with a Home-Based Business Join PrepperNet.Net - https://www.preppernet.netPrepperNet is an organization of like-minded individuals who believe in personal responsibility, individual freedoms and preparing for disasters of all origins.PrepperNet Support the showPlease give us 5 Stars! www.preppingacademy.com Daily deals for preppers, survivalists, off-gridders, homesteaders & everyday Americans. The best gear & supplies—posted in one place, every dayCheck out https://prepperfinds.com Contact us: https://preppingacademy.com/contact/ www.preppernet.net Amazon Store: https://amzn.to/3lheTRTwww.forrestgarvin.com

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Wednesday, November 5th, 2025: Apple Patches; Exploits against Trucking and Logistic; Google Android Patches

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Nov 5, 2025 6:29


    Apple Patches Everything, Again Apple released a minor OS upgrade across its lineup, fixing a number of security vulnerabilities. https://isc.sans.edu/diary/Apple%20Patches%20Everything%2C%20Again/32448 Remote Access Tools Used to Compromise Trucking and Logistics Attackers infect trucking and logistics companies with regular remote management tools to inject malware into other companies or learn about high-value loads in order to steal them. https://www.proofpoint.com/us/blog/threat-insight/remote-access-real-cargo-cybercriminals-targeting-trucking-and-logistics Google Android Patch Day Google released its usual monthly Android updates this week https://source.android.com/docs/security/bulletin/2025-11-01

    Packet Pushers - Full Podcast Feed
    PP085: News Roundup – Naked Satellite Signals, Account Recovery Buddies, Busting Ghost Networks

    Packet Pushers - Full Podcast Feed

    Play Episode Listen Later Nov 5, 2025 52:28


    Did you know college students are snooping on satellite transmissions? On today’s news roundup we discuss new research in which university investigators use off-the-shelf equipment to intercept traffic from geostationary satellites and discover that a lot of it is unencrypted. We also dig into the credential hygiene lessons we can learn from a corpus of... Read more »

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Tuesday, November 4th, 2025: XWiki SolrSearch Exploits and Rapper Feud; AMD Zen 5 RDSEED Bug; More Malicious Open VSX Extensions

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Nov 4, 2025 6:56


    XWiki SolrSearch Exploit Attempts CVE-2025-24893 We have detected a number of exploit attempts against XWiki taking advantage of a vulnerability that was added to the KEV list on Friday. https://isc.sans.edu/diary/XWiki%20SolrSearch%20Exploit%20Attempts%20%28CVE-2025-24893%29%20with%20link%20to%20Chicago%20Gangs%20Rappers/32444 AMD Zen 5 Random Number Generator Bug The RDSEED function for AMD s Zen 5 processors does return 0 more often than it should. https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7055.html SleepyDuck malware invades Cursor through Open VSX Yet another Open VSX extension stealing crypto credentials https://secureannex.com/blog/sleepyduck-malware/

    Mike Force
    Cyber Security Expert Prometheus

    Mike Force

    Play Episode Listen Later Nov 3, 2025 49:07


    Cyber Apocalypse Survival:Join us to learn how people with no technicality can defend themselves from cybercrime, privacy abuse, government overreach and cyber warfare:https://www.youtube.com/@CyberApocalypseSurvival Cyber Security For ALL: How Non-Technical People Can Survive The Digital Apocalypse:And grab a copy of our book, for the blueprint to your cyber security and survival:https://www.amazon.com/dp/B0F9LMYYSL Download your FREE bomb drone defense manual, on our Resources page:https://fightingchancepublications.com And reach out on X if you have a topic request:https://x.com/CyberSurvival4U Help us turn the tides of this dystopian age and set people free, by giving them the fighting chance that they deserve.CarniVault now has single serving Freeze dried Beef-Chicken-Pork Use “EATMEAT” to save https://carnivault.comJoin my Patreonhttps://patreon.com/mikegloverJoin DEAD DROP INTEL for FREEhttps://deaddropintel.substack.com/?utm_source=global-searchUse MG25 to save 25% SITE WIDEhttps://thewolf21.com/products/stand-down-mushroom-sleep-gummies?selling_plan=2813067400

    This Week in Tech (Audio)
    TWiT 1056: The Big Sleep - The Great Router Ban

    This Week in Tech (Audio)

    Play Episode Listen Later Nov 3, 2025 169:26


    From AI-powered code generation boosting productivity to adversaries using the same tools to hunt zero-days, the panel exposes the coming wave of AI-fueled cyberattacks—and why most companies aren't ready for it. Cotton blocks Trump-backed effort to make daylight saving time permanent The End of Cybersecurity Amazon says it didn't cut 14,000 people because of money. It cut them because of 'culture' Here's How the AI Crash Happens US government is getting closer to banning TP-Link routers Neato cloud shutdown sees robocleaners robbed of their smarts FCC will vote to scrap telecom cybersecurity requirements Trump FCC Votes To Make It Easier For Your Broadband ISP To Rip You Off Swedish Death Cleaning But for Your Ditital Life The F5 Hack is a Big Deal OpenAI Releases Agentic Security Researcher 'Do not trust your eyes': AI generates surge in expense fraud Proton Data Breach Observatory aims to alert you in near real-time Using a Security Key on X? Re-Enroll Now or Your Account Will Be Locked YouTube denies AI was involved with odd removals of tech tutorials 10M people watched a YouTuber shim a lock; the lock company sued him. Bad idea. Samsung's $2000 smart fridges are getting ads - gHacks Tech News ESPN, ABC, and other Disney channels go dark on YouTube TV Host: Leo Laporte Guests: Jill Duffy, Alex Stamos, and Stacey Higginbotham Download or subscribe to This Week in Tech at https://twit.tv/shows/this-week-in-tech Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: ziprecruiter.com/twit zscaler.com/security miro.com canary.tools/twit - use code: TWIT Melissa.com/twit