Podcasts about cybersecurity

The protection of computer systems from theft or damage

  • 11,180PODCASTS
  • 59,815EPISODES
  • 30mAVG DURATION
  • 10+DAILY NEW EPISODES
  • Jun 27, 2025LATEST
cybersecurity

POPULARITY

20172018201920202021202220232024

Categories




    Best podcasts about cybersecurity

    Show all podcasts related to cybersecurity

    Latest podcast episodes about cybersecurity

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Friday, June 27th, 2025: Open-VSX Flaw; Airoha Bluetooth Vulnerablity; Critical Cisco Identity Service Engine Vuln;

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Jun 27, 2025 6:47


    Open-VSX Flaw Puts Developers at Risk A flaw in the open-vsx extension marketplace could have let to the compromise of any extension offered by the marketplace. https://blog.koi.security/marketplace-takeover-how-we-couldve-taken-over-every-developer-using-a-vscode-fork-f0f8cf104d44 Bluetooth Vulnerability Could Allow Eavesdropping A vulnerability in the widely used Airoha Bluetooth chipset can be used to compromise devices and use them for eavesdropping. https://insinuator.net/2025/06/airoha-bluetooth-security-vulnerabilities/ Critical Cisco Identity Services Engine Vulnerability Multiple vulnerabilities in Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an unauthenticated, remote attacker to issue commands on the underlying operating system as the root user. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6

    Business of Tech
    Cybersecurity Overhaul: AI, Ransomware, and 400M Fewer Windows PCs Challenge SMBs in 2025

    Business of Tech

    Play Episode Listen Later Jun 27, 2025 18:48


    The podcast discusses the evolving landscape of cybersecurity for small and mid-market businesses, emphasizing the dual threats posed by advanced artificial intelligence tools and a resurgence of ransomware attacks. As cybercriminals leverage AI for sophisticated phishing and impersonation tactics, traditional security measures are becoming obsolete. Organizations are urged to adopt enterprise-grade solutions, such as unified security platforms and zero-trust frameworks, to protect their operations. The introduction of secure browser technologies is highlighted as a critical step in enhancing defenses against the 95% of security incidents linked to browser vulnerabilities.A significant decline in the number of active Windows PCs, with 400 million devices disappearing in three years, indicates a shift in consumer behavior towards mobile devices and tablets. This trend reflects a broader change in endpoint strategy, as the traditional perimeter dissolves and the focus shifts from device management to user and data control across platforms. The implications of the upcoming end of support for Windows 10 in October 2025 may further influence this trend, as users may opt not to invest in new devices.The podcast also covers Microsoft's new security measures aimed at preventing incidents similar to the CrowdStrike meltdown, which caused extensive damages. The company plans to move third-party security drivers out of the Windows kernel to enhance reliability and reduce risks. Additionally, Microsoft is offering extended security updates for Windows 10 users, allowing them to continue receiving support even after the end of support date. This initiative reflects a commitment to improving system stability and addressing vulnerabilities.Finally, the discussion touches on the broader implications of AI in various sectors, including its impact on the workforce and democratic processes. The podcast highlights concerns about AI's role in elections and education, as well as the ethical challenges arising from its use. The conversation emphasizes the need for businesses to manage the complexities of AI, including compliance and creativity loss, while pushing back against inflated vendor claims. This approach will help build trust and ensure that organizations can navigate the rapidly changing digital landscape effectively. Three things to know today 00:00 400 Million Missing PCs Mark the End of the Endpoint Era—MSPs Must Evolve or Fade06:04 From Kernel Changes to Cyber Insurance: Why Structural Resilience Now Defines MSP Value10:23 From Productivity to Manipulation: The Expanding and Uneven Impact of AI Across Sectors This is the Business of Tech.    Supported by: https://timezest.com/mspradio/https://www.huntress.com/mspradio/  All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

    TD Ameritrade Network
    Cybersecurity Adapting & Adopting A.I. Tech

    TD Ameritrade Network

    Play Episode Listen Later Jun 27, 2025 6:05


    Nathaniel Bradley joins Diane King Hall to chat about cybersecurity stocks Palo Alto Networks (PANW), CrowdStrike (CRWD) and how these companies adapt to A.I. technology. Later, he discusses Zscaler (ZS) calling it a "value play" in the space expecting "upside potential" for investors looking to add in the cybersecurity space. Nathaniel stresses the significance of owning cybersecurity tools, as they are "insurance policies" for the future.======== Schwab Network ========Empowering every investor and trader, every market day.Subscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – / schwabnetwork Follow us on Facebook – / schwabnetwork Follow us on LinkedIn - / schwab-network About Schwab Network - https://schwabnetwork.com/about

    TD Ameritrade Network
    CRWD, PANW & ZS Growth Show Cybersecurity is Here to Stay

    TD Ameritrade Network

    Play Episode Listen Later Jun 27, 2025 13:24


    "Cybersecurity is going to continue to grow," says Alex Hamerstone. Companies like CrowdStrike (CRWD), Palo Alto Networks (PANW), and ZScaler (ZS) have seen tremendous growth over the last year, a trend Alex says will continue with larger companies looking to boost online security. However, he also notes downside risk these companies could face long-term. Tom White later joins to offer example options trades for CrowdStrike and Palo Alto Networks.======== Schwab Network ========Empowering every investor and trader, every market day.Options involve risks and are not suitable for all investors. Before trading, read the Options Disclosure Document. http://bit.ly/2v9tH6DSubscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about

    JSA Podcasts for Telecom and Data Centers
    Imaginative's Jen Waltz on Mentorship, Cybersecurity & AI | JSA TV at Channel Partners 2025

    JSA Podcasts for Telecom and Data Centers

    Play Episode Listen Later Jun 27, 2025 7:46


    JSA Podcasts for Telecom and Data Centers
    Seceon Inc.'s Chandra Pandey on Cybersecurity Resilience at Channel Partners 2025

    JSA Podcasts for Telecom and Data Centers

    Play Episode Listen Later Jun 27, 2025 9:58


    Kentucky Edition
    June 26, 2025

    Kentucky Edition

    Play Episode Listen Later Jun 27, 2025 27:30


    More than 100 new laws go into effect Friday in Kentucky, lawmakers provide a tour of the new temporary chambers, Gov. Beshear explains what he's waiting for before deciding if a special session is needed, a cybersecurity expert discusses a troubling trend, and working to prevent adult loneliness among the elderly.

    Federal Drive with Tom Temin
    A cybersecurity ‘awakening' at the VA

    Federal Drive with Tom Temin

    Play Episode Listen Later Jun 27, 2025 8:43


    Nearly two decades ago, the Department of Veterans Affairs came under scrutiny for a massive data breach. The incident involved a stolen laptop and the personal information of more than 26 million veterans. The breach served as a wake up call for the VA and for the rest of the federal government on the importance of information security. Federal News Network's Justin Doubleday wrote about the VA data breach for our 25th anniversary series, and he joins me now to discuss it. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Thursday, June 26th, 2025: Another Netscaler Vuln; CentOS Web Panel Vuln; IP Based Certs

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Jun 26, 2025 5:53


    NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543 Citrix patched a memory overflow vulnerability leading to unintended control flow and denial of service. https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788 Remote code execution in CentOS Web Panel - CVE-2025-48703 An arbitrary file upload vulnerability in the user (not admin) part of Web Panel can be used to execute arbitrary code https://fenrisk.com/rce-centos-webpanel Gogs Arbitrary File Deletion Vulnerability Due to the insufficient patch for the CVE-2024-39931, it's still possible to delete files under the .git directory and achieve remote command execution. https://github.com/gogs/gogs/security/advisories/GHSA-wj44-9vcg-wjq7 Let s Encrypt Will Soon Issue IP Address-Based Certs Let s Encrypt is almost ready to issue certificates for IP address SANs from Let's Encrypt's production environment. They'll only be available under the short-lived profile (which has a 6-day validity period), and that profile will remain allowlist-only for a while. https://community.letsencrypt.org/t/getting-ready-to-issue-ip-address-certificates/238777

    Common Denominator
    Fortune 500 Recruiter on the Future of the Tech Industry and What's Next for AI

    Common Denominator

    Play Episode Listen Later Jun 26, 2025 28:37


    Tech industry expert Chris Schwenk breaks down the hottest jobs in the tech sector. Plus, he discusses the impact data collection has on all of us and how AI will shape the world over the next ten years.  If you enjoy this episode, please consider leaving a rating and a review. It makes a huge difference in spreading the word about the show and helps us get more great guests.  Thanks for listening!This episode was produced in partnership with Neighborhood Farms USA, a national nonprofit whose mission is to promote health, wellness, and nutritional education through the development of community gardens and healthy food programs, and shared best practices.Check out Chris on IG @chris_delosstaffingFollow Moshe on social media:Facebook: https://www.facebook.com/MoshePopack/Instagram: https://www.instagram.com/mpopack/YouTube: https://www.youtube.com/@mpopackTopics:  0:00 – Introduction2:00 –  Tech job market5:00 – Why Chris started his tech podcast7:30 – The importance of building your brand8:50 –  Tech jobs trending now12:00 – Cybersecurity  16:00 – How the recruitment business works20:00 – Job interview hacks24:00 – AI's impact on tech

    Remarkable Marketing
    Buena Vista Social Club: B2B Marketing Lessons on the Importance of Live Experiences with Chief Marketing Officer at Blackbird.AI, Dan Lowden

    Remarkable Marketing

    Play Episode Listen Later Jun 26, 2025 47:00


    Some performances fade. Others stay with you for decades.Buena Vista Social Club is one of them. It isn't just a musical—it's a masterclass in resonance, memory, and experience.In this episode, we're pulling B2B marketing lessons from that spirit of storytelling with the help of Dan Lowden, Chief Marketing Officer at Blackbird.AI.Together, we explore why content should come first, how honesty builds brand resilience, and what it takes to create live experiences your audience will talk about for years.About our guest, Dan LowdenDan is the CMO at Blackbird.AI and leads the company's strategic marketing efforts, including demand generation and brand leadership. He has over 20 years of strategic experience at the executive level. He has served as CMO at cybersecurity firm HUMAN Security (acquired by Goldman Sachs), named one of the TIME100 Most Influential Companies of 2023. Lowden also served as the CMO at Digital Shadows (acquired by Reliaquest) and, before that, CMO at Invincea (acquired by Sophos) and VP of Marketing at vArmour (acquired by Night Dragon). He has held marketing leadership positions at Wayport (acquired by AT&T), IBM ThinkPad (acquired by Lenovo), NEC Technologies, and Sharp Electronics. Lowden holds an MBA in International Business from Rutgers Graduate School of Management and a Bachelor of Science from Rider University.What B2B Companies Can Learn From Buena Vista Social Club:Content is the foundation—not an afterthought. Even in cybersecurity, content is king. Dan says, “My first hire was a content person. You can have the best ABM strategy or tools, but if you don't have really valuable content, you're not going to get anywhere.” His advice? Lead with education, not asks. Thoughtful reports, relevant use cases, and engaging narratives will earn your audience's attention—and their trust.Honesty builds brand resilience. When it comes to trust, marketing can't cut corners. Especially in high-stakes industries like cybersecurity. Dan says, “There's been a lot of overstatement of things by marketers and salespeople. That's when marketing takes a ding.” Instead, he urges CMOs to stay grounded: deliver real value, communicate with clarity, and show your audience you're in it for the long haul.Live experiences create a lasting impact. If you want your brand to be unforgettable, you need to create moments that move people. “People still come up to us today and say that band and that experience 10-plus years ago—they remember. There's not been anything like that,” Dan says, reflecting on a live concert his team produced. Whether it's a concert, a rooftop dinner, or a one-of-a-kind conference, remarkable experiences turn into word-of-mouth—and brand love that lingers.Quotes*“To me, in marketing—B2B or B2C—it's about creating a relationship, trust, even friendship, a community with your audience.”*"If you treat your customers well, if you serve them well, if you're honest with them… then you have a chance of being very successful as a company.”*“Music is really, really important, really powerful… as a marketer, especially in cybersecurity where there's 5,000 cybersecurity companies, you have to do something different. You have to stand out.”Time Stamps[00:55] Meet Dan Lowden, CMO at Blackbird.AI[03:42] The Magic of Live Theater[06:21] The Role of a CMO in Cybersecurity[10:23] Understanding Narrative Attacks[14:29] The Evolution of Narrative Intelligence[22:36] The Story Behind Buena Vista Social Club[28:31] The Power of Live Music in Marketing[30:33] Creating Remarkable Experiences[39:21] The Importance of Content in Marketing[45:05] Final Thoughts and TakeawaysLinksConnect with Dan on LinkedInLearn more about Blackbird.AIAbout Remarkable!Remarkable! is created by the team at Caspian Studios, the premier B2B Podcast-as-a-Service company. Caspian creates both nonfiction and fiction series for B2B companies. If you want a fiction series check out our new offering - The Business Thriller - Hollywood style storytelling for B2B. Learn more at CaspianStudios.com. In today's episode, you heard from Ian Faison (CEO of Caspian Studios) and Meredith Gooderham (Head of Production). Remarkable was produced this week by Jess Avellino, mixed by Scott Goodrich, and our theme song is “Solomon” by FALAK. Create something remarkable. Rise above the noise.

    Hacker Valley Studio
    Purple Teaming Is the New Job Security with Maril Vernon

    Hacker Valley Studio

    Play Episode Listen Later Jun 26, 2025 43:26


    Cybersecurity isn't just red or blue anymore... it's purple, white, and deeply human. Maril Vernon, award-winning ethical hacker and Senior Solutions Architect at NetSPI, returns to the Hacker Valley Studio to discuss purple teaming as the most future-proof career path in cyber. She opens up about mentorship, burnout, compensation realities, and how we're still failing the fundamentals. Together, Ron and Maril dig into what purple teaming really is (and isn't), why soft skills matter more than ever, and how defenders are the frontline signal source for law enforcement. From guiding her mom into IR to co-founding Mind Over Cyber, Maril embodies what it means to show up for the cyber community and demand more from the culture itself.   Impactful Moments 00:00 - Introduction 01:01 - Maril's role at NetSPI 03:00 - Why purple skills are future-proof 05:19 - Salary truths in purple teaming 08:30 - Know your value, negotiate wisely 13:07 - How defenders enable law enforcement 16:22 - The real meaning of purple teaming 18:39 - Common misconceptions debunked 24:45 - People are always the soft spot 26:01 - The two security stack must-haves 29:00 - Mom made it to incident response 30:48 - Maril's mentorship philosophy 34:09 - Why you need to post anyway 36:35 - What Mind Over Cyber is really about 40:00 - CISOs are burning out silently 41:31 - Closing thoughts Links: Connect with our guest, Maril Vernon: https://www.linkedin.com/in/marilvernon   Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

    The Buzz with ACT-IAC
    Innovators Unite: ET&I Conference Highlights Part 2

    The Buzz with ACT-IAC

    Play Episode Listen Later Jun 26, 2025 23:42 Transcription Available


    We are still live at the Emerging Tech and Innovation Conference, talking with amazing folks, like, Elizabeth McNamara, Health IT Innovation Officer at Next Phase Solutions Services, Virginia Huth a 30-year civil servant who is now CEO of Vanalytix, and Basil White, Senior Informaticist. Discussions revolve around the importance of innovation in public health, the application of AI in healthcare, and efforts to streamline federal policies and grant opportunities. The episode also explores career journeys and personal experiences, culminating in practical advice for those transitioning between public service and private sectors. Subscribe on your favorite podcast platform to never miss an episode! For more from ACT-IAC, follow us on LinkedIn or visit http://www.actiac.org.Learn more about membership at https://www.actiac.org/join.Donate to ACT-IAC at https://actiac.org/donate. Intro/Outro Music: See a Brighter Day/Gloria TellsCourtesy of Epidemic Sound(Episodes 1-159: Intro/Outro Music: Focal Point/Young CommunityCourtesy of Epidemic Sound)

    Unspoken Security
    Why is Fighting Cybercrime Worth the Effort?

    Unspoken Security

    Play Episode Listen Later Jun 26, 2025 45:52


    Cyber crime continues to grow each year, but should organizations give up fighting it? On this episode of Unspoken Security, host AJ Nash speaks with Robert Duncan from Netcraft, who argues the answer is absolutely not. Robert makes the case that fighting cyber crime is worth the effort, even when it feels like an endless battle.Robert challenges the common view that "whack-a-mole" tactics are pointless. He believes the key is changing the game from single-player to multiplayer whack-a-mole. By working with domain registrars, hosting providers, and government agencies, defenders can hit criminals at multiple points in their attack chain. This coordinated response makes cyber crime more expensive and less profitable for attackers.The conversation covers everything from traditional phishing to sophisticated pig butchering scams. Robert shares how Netcraft uses AI to engage with scammers and gather intelligence at scale. He also discusses the national security implications of cyber crime and why whole-of-government responses in countries like Australia and the UK show promise for reducing fraud rates.Send us a textSupport the show

    Retire Smarter
    Cybersecurity and Your Retirement: Protecting What You've Built

    Retire Smarter

    Play Episode Listen Later Jun 26, 2025 36:12


    Get your customized planning started by scheduling a no-cost discovery call: http://bit.ly/calltruewealth Retirees are increasingly targeted by cybercriminals — and the scams are getting more sophisticated. From fake emails and stolen phones to account takeovers and SIM card fraud, even cautious investors can be at risk. In this episode, Tyler Emrick, CFA®, CFP®, shares a real story of an attempted security breach involving a True Wealth Design client — and what made the firm catch it before damage was done. You'll learn the most common cybersecurity threats facing retirees, how to secure your financial accounts, and what to do if you think you've been scammed. Plus, we cover smart strategies like using a password manager, enabling two-factor authentication, freezing your credit, and why every retiree should have a Trusted Contact on file. If you've worked hard to build a secure retirement, this episode will help you protect it. Here's some of what we discuss in this episode:

    Cybercrime Magazine Podcast
    Cybercrime Wire For Jun. 25, 2025. Cyberattack Strikes Scotland City Authority. WCYB Digital Radio.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Jun 26, 2025 1:17


    The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

    Simply Cyber

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: https://barricadecyber.comCheck out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonAllow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform at https://simplycyber.io/threatlockerTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare Academy's next training, CRYPTOS: Hunting Adversaries in the Crypto Underground on July 15th at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials

    Security Now (MP3)
    SN 1031: How Salt Typhoon Gets In - What "AI" Really Means

    Security Now (MP3)

    Play Episode Listen Later Jun 25, 2025 180:38


    China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Tuesday, June 24th, 2025: Telnet/SSH Scan Evolution; Fake Sonicwall Software; File-Fix vs Click-Fix

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Jun 25, 2025 4:03


    Quick Password Brute Forcing Evolution Statistics After collecting usernames and passwords from our ssh and telnet honeypots for about a decade, I took a look back at how scans changed. Attackers are attempting more passwords in each scans than they used to, but the average length of passwords did not change. https://isc.sans.edu/diary/Quick%20Password%20Brute%20Forcing%20Evolution%20Statistics/32068 Introducing FileFix A New Alternative to ClickFix Attacks Attackers may trick the user into copy/pasting strings into file explorer, which will execute commands similar to the ClickFix attack that tricks users into copy pasting the command into the start menu s cmd feature. https://www.mobile-hacker.com/2025/06/24/introducing-filefix-a-new-alternative-to-clickfix-attacks/ Threat Actors Modify and Re-Create Commercial Software to Steal User s Information A fake Sonicwall Netextender clone will steal user s credentials https://www.sonicwall.com/blog/threat-actors-modify-and-re-create-commercial-software-to-steal-users-information

    All TWiT.tv Shows (MP3)
    Security Now 1031: How Salt Typhoon Gets In

    All TWiT.tv Shows (MP3)

    Play Episode Listen Later Jun 25, 2025 180:38 Transcription Available


    China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

    Security Now (Video HD)
    SN 1031: How Salt Typhoon Gets In - What "AI" Really Means

    Security Now (Video HD)

    Play Episode Listen Later Jun 25, 2025


    China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

    Security Now (Video HI)
    SN 1031: How Salt Typhoon Gets In - What "AI" Really Means

    Security Now (Video HI)

    Play Episode Listen Later Jun 25, 2025


    China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

    Radio Leo (Audio)
    Security Now 1031: How Salt Typhoon Gets In

    Radio Leo (Audio)

    Play Episode Listen Later Jun 25, 2025 180:38 Transcription Available


    China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

    The Official SaaStr Podcast: SaaS | Founders | Investors
    SaaStr 808: AI and Cybersecurity: Scaling Rubrik to a Billion Dollar Enterprise with Rubrik's Co-Founder and CTO

    The Official SaaStr Podcast: SaaS | Founders | Investors

    Play Episode Listen Later Jun 25, 2025 25:32


    SaaStr 808: AI and Cybersecurity: Scaling Rubrik to a Billion Dollar Enterprise with Rubrik's Co-Founder and CTO In this episode, Kit Colbert, former CTO of VMware and Platform CTO at Invisible, sits down with Arvind  Nithrakashyap, Co-founder and CTO of Rubrik, to discuss the company's journey and innovations over the last 11 years.    Arvind  shares insights into Rubrik's platform for cyber resilience, their approach to scaling with multiple product pillars, and their unique use of hackathons to spark innovation. The conversation also delves into customer satisfaction strategies, the implementation of AI in both their products and internal processes, and how they measure the ROI of AI initiatives. With highlights of Rubrik's 39% year-over-year growth, a Net Promoter Score (NPS) of 80, and the launch of their AI product Ana, this episode offers valuable takeaways for businesses looking to scale and innovate.   ------------------ This episode of the SaaStr podcast is sponsored by: Attio This episode is brought to you by Attio — the AI-native CRM. Connect your email, and Attio instantly builds a powerful CRM - with every company, contact and interaction you've ever had. Get 15% off your first year at https://attio.com/saastr   ------------------ This episode of the SaaStr podcast is sponsored by: Attention.com Tired of listening to hours of sales calls? Recording is yesterday's game. Attention.com unleashes an army of AI sales agents that auto-update your CRM, build custom sales decks, spot cross-sell signals, and score calls before your coffee's cold. Teams like BambooHR and Scale AI already automate their Sales and RevOps using customer conversations. Step into the future at attention.com/saastr ------------------ Hey everyone, we just hosted 10,000 of you at the SaaStr Annual in the SF Bay Area, and now get ready, because SaaStr AI is heading to London! On December 2nd and 3rd, we're bringing SaaStr AI to the heart of Europe. This is your chance to connect with 2,500+ SaaS and AI executives, founders, and investors, all sharing the secrets to scaling in the age of AI. Whether you're a founder, a revenue leader, or an investor, SaaStr AI in London is where the future of SaaS meets the power of AI. And we just announced tickets and sponsorships, so don't wait! Head to SaaStrLondon.com to grab yours and join us this December in London. SaaStr AI in London —where SaaS meets AI, and the next wave of innovation begins. See you there!

    Business of Tech
    Malware in ConnectWise, Telecom Hacks, and MSPs' False Confidence in Cybersecurity

    Business of Tech

    Play Episode Listen Later Jun 25, 2025 14:43


    ConnectWise is currently facing a significant crisis of trust as attackers exploit its signed software to distribute malware. This alarming trend has seen a notable increase in infections since March 2025, primarily due to poor signing practices that allow malicious users to embed harmful code within legitimate applications. Reports indicate that the ConnectWise ScreenConnect remote access tool was the most commonly abused legitimate tool in 2024, with a staggering 56% of all active threat reports involving remote access tools. The rise in phishing schemes utilizing ConnectWise samples has raised concerns about the security measures in place and the implications for managed service providers (MSPs).Despite the increasing number of breaches, a recent survey revealed that 76% of MSP leaders remain confident in their cybersecurity efforts, even as nearly 70% reported experiencing multiple cyber breaches in the past year. This disconnect between confidence and reality poses a significant problem, as many MSPs recognize the need to improve their defenses but feel ill-equipped to guide customers through complex regulatory changes. The situation is further complicated by sensationalized reports of massive data breaches, which can divert attention from verified security threats and contribute to a false sense of security.The podcast also highlights the ongoing Salt Typhoon hack, which has reportedly led to major U.S. telecommunications companies instructing their incident response teams not to seek evidence of the intrusion. This directive raises concerns about the scale of the breach and the lack of accountability within the telecom sector, where deregulation has diminished incentives for companies to invest in security measures. Experts warn that this willful ignorance sets a dangerous precedent, particularly in critical infrastructure, and emphasizes the need for a reevaluation of vendor liability in the face of such breaches.In response to the evolving challenges faced by MSPs, several vendors have introduced new tools and features aimed at improving operational efficiency and security. Synchro's Universal Billing feature aims to streamline billing processes, while Manage Engine's MSP Central platform seeks to enhance service delivery and device management. Additionally, Hornet Security has launched an AI Cyber Assistant to bolster cybersecurity for Microsoft 365 users. These developments indicate that while vendors are recognizing the challenges MSPs face, they often lag behind in providing the necessary solutions, underscoring the importance of selecting platforms that prioritize practical integration and real-world impact. Three things to know today 00:00 Legit Tools, Real Breaches: ConnectWise Malware Surge and Telecom Hacks Highlight Systemic Security Failures06:54 MSP Tools Evolve as Syncro, ManageEngine, and Hornetsecurity Target Profitability, Consolidation, and AI Security09:47 Bitdefender, Pia and Nexus IT Signal Strategic Evolution in the MSP and Security Landscape This is the Business of Tech.    Supported by:  https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

    The Roundtable
    6/25/25 Panel

    The Roundtable

    Play Episode Listen Later Jun 25, 2025 57:45


    The Roundtable Panel: a daily open discussion of issues in the news and beyond. Today's panelists are Dean of the College of Emergency Preparedness, Homeland Security and Cybersecurity at the University at Albany Robert Griffin, Diplomat in residence at Bard College Ambassador Frederic Hof, and CEO of The Business Council of New York State Heather Mulligan.

    Security Now (Video LO)
    SN 1031: How Salt Typhoon Gets In - What "AI" Really Means

    Security Now (Video LO)

    Play Episode Listen Later Jun 25, 2025


    China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

    ITSPmagazine | Technology. Cybersecurity. Society
    Building a Dynamic Framework for Cyber Risk and Control Alignment: A Threat-Adaptive Approach to Cybersecurity Readiness | A HITRUST Brand Story with Michael Moore

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Jun 25, 2025 35:41


    Cyber threats are not static—and HITRUST knows assurance can't be either. That's why HITRUST's Michael Moore is leading efforts to ensure the HITRUST framework evolves in step with the threat environment, business needs, and the technologies teams are using to respond.In this episode, Moore outlines how the HITRUST Cyber Threat Adaptive (CTA) program transforms traditional assessment models into something far more dynamic. Instead of relying on outdated frameworks or conducting audits that only capture a point-in-time view, HITRUST is using real-time threat intelligence, breach data, and frameworks like MITRE ATT&CK and MITRE ATLAS to continuously evaluate and update its assessment requirements.The E1 and I1 assessments—designed for organizations at different points in their security maturity—serve as flexible baselines that shift with current risk. Moore explains that by leveraging CTA, HITRUST can add or update controls in response to rising attack patterns, such as the resurgence of phishing or the emergence of AI-driven exploits. These updates are informed by a broad ecosystem of signals, including insurance claims data and AI-parsed breach reports, offering both frequency and impact context.One of the key advantages Moore highlights is the ability for security teams to benefit from these updates without having to conduct their own exhaustive analysis. As Moore puts it, “You get it by proxy of using our frameworks.” In addition to streamlining how teams manage and demonstrate compliance, the evolving assessments also support conversations with business leaders and boards—giving them visibility into how well the organization is prepared for the threats that matter most right now.HITRUST is also planning to bring more of this intelligence into its assessment platform and reports, including showing how individual assessments align with the top threats at the time of certification. This not only strengthens third-party assurance but also enables more confident internal decision-making—whether that's about improving phishing defenses or updating incident response playbooks.From AI-enabled moderation of threats to proactive regulatory mapping, HITRUST is building the connective tissue between risk intelligence and real-world action.Note: This story contains promotional content. Learn more.Guest: Michael Moore, Senior Manager, Digital Innovation at HITRUST | On LinkedIn: https://www.linkedin.com/in/mhmoore04/Hosts:Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | https://www.seanmartin.com/Marco Ciappelli, Co-Founder at ITSPmagazine and Host of Redefining Society Podcast & Audio Signals Podcast | https://www.marcociappelli.com/______________________Keywords: sean martin, marco ciappelli, michael moore, hitrust, cybersecurity, threat intelligence, risk management, compliance, assurance, ai security, brand story, brand marketing, marketing podcast, brand story podcast______________________ResourcesVisit the HITRUST Website to learn more: https://itspm.ag/itsphitwebLearn more and catch more stories from HITRUST on ITSPmagazine: https://www.itspmagazine.com/directory/hitrustLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

    ITSPmagazine | Technology. Cybersecurity. Society
    Bridging Worlds: How Technology Connects — or Divides — Our Communities | Guest: Lawrence Eta | Redefining Society And Technology Podcast With Marco Ciappelli

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Jun 25, 2025 39:12


    ⸻ Podcast: Redefining Society and Technologyhttps://redefiningsocietyandtechnologypodcast.com Title: Bridging Worlds: How Technology Connects — or Divides — Our Communities Guest: Lawrence EtaGlobal Digital AI Thought Leader | #1 International Best Selling Author | Keynote Speaker | TEDx Speaker | Multi-Sector Executive | Community & Smart Cities Advocate | Pioneering AI for Societal AdvancementWebSite: https://lawrenceeta.comOn LinkedIn: https://www.linkedin.com/in/lawrence-eta-9b11139/ Host: Marco CiappelliCo-Founder & CMO @ITSPmagazine | Master Degree in Political Science - Sociology of Communication l Branding & Marketing Consultant | Journalist | Writer | Podcasts: Technology, Cybersecurity, Society, and Storytelling.WebSite: https://marcociappelli.comOn LinkedIn: https://www.linkedin.com/in/marco-ciappelli/_____________________________This Episode's SponsorsBlackCloak provides concierge cybersecurity protection to corporate executives and high-net-worth individuals to protect against hacking, reputational loss, financial loss, and the impacts of a corporate data breach.BlackCloak:  https://itspm.ag/itspbcweb_____________________________⸻ Podcast Summary ⸻ In this episode of Redefining Society and Technology, I sit down with Lawrence Eta — global technology leader, former CTO of the City of Toronto, and author of Bridging Worlds. We explore how technology, done right, can serve society, reduce inequality, and connect communities. From public broadband projects to building smart — sorry, connected — cities, Lawrence shares lessons from Toronto to Riyadh, and why tech is only as good as the values guiding it. ⸻ Article ⸻ As much as I love shiny gadgets, blinking lights, and funny noises from AI — we both know technology isn't just about cool toys. It's about people. It's about society. It's about building a better, more connected world. That's exactly what we explore in my latest conversation on Redefining Society and Technology, where I had the pleasure of speaking with Lawrence Eta. If you don't know Lawrence yet — let me tell you, this guy has lived the tech-for-good mission. Former Chief Technology Officer for the City of Toronto, current Head of Digital and Analytics for one of Saudi Arabia's Vision 2030 mega projects, global tech consultant, public servant, author… basically, someone who's been around the block when it comes to tech, society, and the messy, complicated intersection where they collide. We talked about everything from bridging the digital divide in one of North America's most diverse cities to building entirely new digital infrastructure from scratch in Riyadh. But what stuck with me most is his belief — and mine — that technology is neutral. It's how we use it that makes the difference. Lawrence shared his experience launching Toronto's Municipal Broadband Network — a project that brought affordable, high-speed internet to underserved communities. For him, success wasn't measured by quarterly profits (a refreshing concept, right?) but by whether kids could attend virtual classes, families could access healthcare online, or small businesses could thrive from home. We also got into the “smart city” conversation — and how even the language we use matters. In Toronto, they scrapped the “smart city” buzzword and reframed the work as building a “connected community.” It's not about making the city smart — it's about connecting people, making sure no one gets left behind, and yes, making technology human. Lawrence also shared his Five S principles for digital development: Stability, Scalability, Solutions (integration), Security, and Sustainability. Simple, clear, and — let's be honest — badly needed in a world where tech changes faster than most cities can adapt. We wrapped the conversation with the big picture — how technology can be the great equalizer if we use it to bridge divides, not widen them. But that takes intentional leadership, community engagement, and a shared vision. It also takes reminding ourselves that beneath all the algorithms and fiber optic cables, we're still human. And — as Lawrence put it beautifully — no matter where we come from, most of us want the same basic things: safety, opportunity, connection, and a better future for our families. That's why I keep having these conversations — because the future isn't just happening to us. We're building it, together. If you missed the episode, I highly recommend listening — especially if you care about technology serving people, not the other way around. Links to connect with Lawrence and to the full episode are below — stay tuned for more, and let's keep redefining society, together. ⸻ Keywords ⸻ Connected Communities, Smart Cities, Digital Divide, Public Broadband, Technology and Society, Digital Infrastructure, Technology for Good, Community Engagement, Urban Innovation, Digital Inclusion, Public-Private Partnerships, Tech LeadershipEnjoy. Reflect. Share with your fellow humans.And if you haven't already, subscribe to Musing On Society & Technology on LinkedIn — new transmissions are always incoming.You're listening to this through the Redefining Society & Technology podcast, so while you're here, make sure to follow the show — and join us as we continue exploring life in this Hybrid Analog Digital Society.End of transmission.____________________________Listen to more Redefining Society & Technology stories and subscribe to the podcast:

    Cyber Security Today
    Cybersecurity Today: Balancing Trust, Risks, and Innovations

    Cyber Security Today

    Play Episode Listen Later Jun 25, 2025 13:17 Transcription Available


    In this episode of Cybersecurity Today, host Jim Love discusses various pressing issues and trends in the realm of cybersecurity. The episode starts with a revelation from Okta's 2025 Customer Identity Trends report, which highlights the conflicting digital behaviors of Canadians who, despite their fear of identity theft, often reuse passwords across multiple accounts. The show also dives into the sophisticated 'Lap Dogs' campaign led by Chinese hackers who have compromised home and small office devices worldwide. Jim further touches upon the surprising decline in cyber insurance premiums despite persisting threats, alongside a story about Jeff Bezos potentially spying through smart mattresses with security vulnerabilities. The episode underscores the critical need for better security measures and the potential business risks of weak authentication systems. 00:00 Introduction and Host Welcome 00:24 Canadian Identity Theft Concerns 03:02 Chinese Hacking Operation Exposed 06:02 Cyber Insurance Premiums Drop 09:39 Smart Mattress Security Nightmare 12:46 Conclusion and Contact Information

    TechTimeRadio
    258: ALERT: 16 billion Credentials Leaked, don't panic! We break down why this isn't new at all. Executives from OpenAI, Meta, join the Army Reserve as Lieutenant Colonels. Gaming gets Bizarre with "Date Everything" Dating Sim | Air Date

    TechTimeRadio

    Play Episode Listen Later Jun 25, 2025 56:51 Transcription Available


    Cybersecurity headlines might have you worried about the so-called "new" 16 billion credential leak, but don't panic! We break down why this widely-reported security breach isn't actually new at all—we covered it on Tech Time Radio six months ago. Learn why two-factor authentication is your best defense and how this compilation of previously leaked data affects your digital security.The tech and military worlds are colliding as executives from OpenAI, Meta, and Palantir join the Army Reserve as lieutenant colonels. But there's a twist: these digital leaders are skipping traditional boot camp for "express training." We dive into the controversy and debate whether tech expertise should override traditional military integration processes or if this risks creating officers without proper understanding of military culture.Gaming gets bizarre with "Date Everything"—a dating sim that lets you romance inanimate objects in your home that garnered a million downloads in just 24 hours. From washing machines to microwave ovens, this game raises fascinating questions about our relationship with technology and objects. We also explore Splitgate 2's unusual feature that gives players a 1-in-100 chance of emitting a fart sound when crouching, which adds a surprising tactical element to gameplay.Don't miss our Two Truths and a Lie game, Mike's mesmerizing moment on the psychological implications of dating simulators, and our whiskey tasting featuring Old Grandad Bonded Bourbon. Plus, we unveil MidJourney's new video generation capabilities and what they mean for creators. Join our Patreon at patreon.com/techtimeradio and subscribe to our social channels to keep up with the latest in technology news and whiskey appreciation from hosts who deliver expertise with a side of humor.Support the show

    Cybercrime Magazine Podcast
    Steve Satterwhite On Cyber. Women In Cybersecurity. Theresa Payton, Former White House CIO.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Jun 25, 2025 26:56


    Steve Satterwhite On Cyber is a Cybercrime Magazine Podcast series brought to you by Entelligence. In this episode, Steve Satterwhite, founder and CEO at Entelligence, joins host Heather Engel and Theresa Payton, former White House CIO and CEO at Fortalice Solutions, to discuss women in cybersecurity, including female representation in today's workforce, what it will look like by the end of this year, and more. An industry leader in delivering affordable, high value professional services to security-conscious enterprise and government organizations worldwide, Entelligence addresses the cyber skills gap by working as a seamless extension of each customer's organization, providing a set of customized services that include security readiness assessments, quick-start solution deployments, and longer-term resident expert engagements. Learn more about our sponsor at https://entelligence.com

    Cybercrime Magazine Podcast
    Cybercrime Wire For Jun. 25, 2025. Columbia Uni. Hit By Potential Cyberattack. WCYB Digital Radio.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Jun 25, 2025 1:14


    The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

    NCUSCR Interviews
    China & the Hill: Beijing Hacks Moscow, Courts Tehran, and Flies By Taiwan

    NCUSCR Interviews

    Play Episode Listen Later Jun 25, 2025 8:29


    China & the Hill is a weekly newsletter covering Washington DC's China-focused debates, actions, and reactions. Readers will receive a curated digest of each week's most pressing U.S.-China news and its impact on businesses and policy, and can listen to the top stories in podcast form on the U.S.-China Podcast. Read this week's edition. China & the Hill is published by the National Committee on U.S.-China Relations, the leading nonprofit nonpartisan organization that encourages understanding of China and the United States among citizens of both countries.      

    All TWiT.tv Shows (Video LO)
    Security Now 1031: How Salt Typhoon Gets In

    All TWiT.tv Shows (Video LO)

    Play Episode Listen Later Jun 25, 2025 181:01 Transcription Available


    China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

    Simply Cyber

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: https://barricadecyber.comCheck out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonAllow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform at https://simplycyber.io/threatlockerTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare Academy's next training, CRYPTOS: Hunting Adversaries in the Crypto Underground on July 15th at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials

    Tech Hive: The Tech Leaders Podcast
    #115: The Rt Hon Stephen McPartland, Former MP and Minister for National Security

    Tech Hive: The Tech Leaders Podcast

    Play Episode Listen Later Jun 25, 2025 53:51


    "You can't have good Cyber Security without Economic Security.'' Join us this week on The Tech Leaders Podcast, where Gareth Davies sits down with The Rt Hon Stephen McPartland, former MP and author of the McPartland Review into Cyber Security. Stephen talks about his time in Parliament, the impact of AI on Cyber Security, and why the UK is both uniquely well prepared and uniquely vulnerable. On this episode, Stephen and Gareth discuss what it's like to work with Prime Ministers, how to prevent the widespread adoption of AI leading to “digital exclusion”, why we need to automate processes rather than jobs, and how a Scouser became Tory MP for Stevenage…Timestamps: Intro and good leadership (1:33) Proudest achievements and lessons learned in Politics (7:54) Ministerial role, and working with Prime Ministers (10:09) Cyber Security and the Digital Economy (17:50) AI, Government and Cyber Security (23:23) Fostering a Cyber workforce (29:35) LLMs and Agentic AI (33:14) Cryptocurrencies and Post-Quantum Cryptography (38:28) AI concerns – Digital exclusion and Rules of Engagement (46:25) Stephen's advice to his younger self (49:00) https://www.bedigitaluk.com/

    The Aubrey Masango Show
    Change your Mindset: How to leverage AI and cybersecurity as a service in the brave new world order

    The Aubrey Masango Show

    Play Episode Listen Later Jun 25, 2025 40:58


    Aubrey converses with Joe Tsotetsi, computer scientist, AI enthusiast, futurist/futurologist, motivational speaker, martial artist and technology evangelist talking about how to leverage AI and cybersecurity as a service in the brave new world order. The Aubrey Masango Show is presented by late night radio broadcaster Aubrey Masango. Aubrey hosts in-depth interviews on controversial political issues and chats to experts offering life advice and guidance in areas of psychology, personal finance and more. All Aubrey’s interviews are podcasted for you to catch-up and listen. Thank you for listening to this podcast from The Aubrey Masango Show. Listen live on weekdays between 20:00 and 24:00 (SA Time) to The Aubrey Masango Show broadcast on 702 https://buff.ly/gk3y0Kj and on CapeTalk between 20:00 and 21:00 (SA Time) https://buff.ly/NnFM3Nk Find out more about the show here https://buff.ly/lzyKCv0 and get all the catch-up podcasts https://buff.ly/rT6znsn Subscribe to the 702 and CapeTalk Daily and Weekly Newsletters https://buff.ly/v5mfet Follow us on social media: 702 on Facebook: https://www.facebook.com/TalkRadio702 702 on TikTok: https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/Radio702 702 on YouTube: https://www.youtube.com/@radio702 CapeTalk on Facebook: https://www.facebook.com/CapeTalk CapeTalk on TikTok: https://www.tiktok.com/@capetalk CapeTalk on Instagram: https://www.instagram.com/ CapeTalk on X: https://x.com/CapeTalk CapeTalk on YouTube: https://www.youtube.com/@CapeTalk567See omnystudio.com/listener for privacy information.

    The CyberWire
    Iran's digital threat after U.S. strikes.

    The CyberWire

    Play Episode Listen Later Jun 24, 2025 31:35


    Cybersecurity warnings about possible Iranian retaliation have surged. A potential act of sabotage disrupts the NATO Summit in The Hague. Canadian cybersecurity officials discover Salt Typhoon breached a major telecom provider. The U.S. House bans WhatsApp from all government devices. APT28 uses Signal chats in phishing campaigns targeting Ukrainian government entities. A China-linked APT has built a covert network of over 1,000 compromised devices  for long-term espionage. FileFix is a new variant of the well-known ClickFix method. SparkKitty targets Android and iOS users for image theft. Scammers steal $4 million from Coinbase users by posing as support staff. On today's Threat Vector, host David Moulton sits down with Tyler Shields, Principal Analyst at ESG, to discuss the fine line between thought leadership and echo chambers in the industry. War Thunder gamers just can't resist state secrets. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment In this segment of Threat Vector, host David Moulton sits down with Tyler Shields, Principal Analyst at ESG, entrepreneur, and cybersecurity marketing expert, to discuss the fine line between thought leadership and echo chambers in the industry. You can hear David and Tyler's full discussion on Threat Vector ⁠here⁠ and catch new episodes every Thursday on your favorite podcast app. Selected Reading Warnings Ratchet Over Iranian Cyberattack (BankInfoSecurity) NATO Summit in The Hague hit by potential sabotage as rail cables set on fire (The Record) Canada says Salt Typhoon hacked telecom firm via Cisco flaw (BleepingComputer)  Scoop: WhatsApp banned on House staffers' devices (Axios) APT28 hackers use Signal chats to launch new malware attacks on Ukraine (Bleeping Computer) Chinese APT Hacking Routers to Build Espionage Infrastructure (SecurityWeek) FileFix - A ClickFix Alternative (mr.d0x) Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play (SecurityWeek) Hackers Impersonate Coinbase User Support To Scam Victims of $4,000,000 Before Blowing Most of Money on Gambling: ZachXBT (The Daily Hodl) Reset the clock! War Thunder fan posts restricted Harrier data to game forum (Cyber Daily) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Tuesday, June 24th, 2025: Ichano ATHome IP Camera Scans; Netscaler Vulnerability; WinRar Vulnerability

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Jun 24, 2025 5:04


    Scans for Ichano AtHome IP Cameras A couple days ago, a few sources started scanning for the username super_yg and the password 123. This is associated with Ichano IP Camera software. https://isc.sans.edu/diary/Scans%20for%20Ichano%20AtHome%20IP%20Cameras/32062 Critical Netscaler Security Update CVE-2025-5777 CVE 2025-5777 is a critical severity vulnerability impacting NetScaler Gateway, i.e. if NetScaler has been configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server. https://www.netscaler.com/blog/news/critical-security-updates-for-netscaler-netscaler-gateway-and-netscaler-console/ WinRar Vulnerability CVE-2025-6218 WinRar may be tricked into extracting files into attacker-determined locations, possibly leading to remote code execution https://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=276&cHash=b5165454d983fc9717bc8748901a64f9

    The FOX News Rundown
    The Trump Administration's Call For "A Show Of Force In The Region"

    The FOX News Rundown

    Play Episode Listen Later Jun 24, 2025 32:23


    After the U.S. strikes on Iran's nuclear facilities over the weekend, on Monday Iran began their retaliation. Several Iranian missiles were launched at the U.S. Air Force base in Qatar, which were ultimately intercepted. This week, American lawmakers are seeking further information about these strikes, with some even questioning why this mission occurred without congressional approval. Senator Deb Fischer (R-NE) joins the Rundown to explain the strategic implications of President Trump's decision, the potential for regime change in Iran, and the ongoing debate over Congress's role in authorizing military action. Iran's retaliation against the United States goes beyond military force. There is also the threat of cyberwarfare, including the potential for infiltrating social media. Cybersecurity expert and American AI Logistics CEO John Cofrancesco discusses the risk of Iranian hackers targeting American businesses and infrastructure, how America is prepared to respond, and why he believes Russia and China have a vested interest in using misinformation online to divide the U.S. and exploit its conflict with Iran. Plus, commentary from FOX News Legal Analyst Gregg Jarrett. Photo Credit: AP Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Packet Pushers - Full Podcast Feed
    PP068: Common Kubernetes Risks and What to Do About Them

    Packet Pushers - Full Podcast Feed

    Play Episode Listen Later Jun 24, 2025 39:09


    Today’s Packet Protector digs into risks and threats you might encounter in a Kubernetes environment, what to do about them, and why sometimes a paved path (or boring technology) is the smartest option. My guest is Natalie Somersall, Principal Solutions Engineer for the Public Sector at Chainguard. We talk about risks including identity and access... Read more »

    What the Hack with Adam Levin
    Episode 205: Cybersecurity Girl Caitlin Sarian Tries to Delete Herself Online

    What the Hack with Adam Levin

    Play Episode Listen Later Jun 24, 2025 34:42


    Every part of life that comes in contact with the Internet is tracked, packed and sold to a a seemingly infinite network of data brokers. Caitlin Sarian AKA Cybersecurity Girl joined us this week to discuss why scrubbing your information is trickier than it sounds and what you can do about it. 

    Packet Pushers - Fat Pipe
    PP068: Common Kubernetes Risks and What to Do About Them

    Packet Pushers - Fat Pipe

    Play Episode Listen Later Jun 24, 2025 39:09


    Today’s Packet Protector digs into risks and threats you might encounter in a Kubernetes environment, what to do about them, and why sometimes a paved path (or boring technology) is the smartest option. My guest is Natalie Somersall, Principal Solutions Engineer for the Public Sector at Chainguard. We talk about risks including identity and access... Read more »

    The Secret Sauce
    TSS866 Mastercard ประกาศสงครามกับเงินสด ปฏิวัติ Cybersecurity

    The Secret Sauce

    Play Episode Listen Later Jun 24, 2025 55:57


    เปิดพอดแคสต์เอพิโสดนี้ใน YouTube เพื่อประสบการณ์การรับชมที่ดีที่สุด ​เมื่อโลกก้าวสู่ยุคไร้เงินสด ธุรกิจบัตรชำระเงินจะปรับตัวอย่างไร? Mastercard ในฐานะผู้นำด้านเทคโนโลยีการชำระเงิน มีแนวทางรับมืออย่างไร? อะไรคือหัวใจของการชำระเงินดิจิทัลที่ไร้รอยต่อ? ทำไมคุณ Winnie Wong ผู้บริหารของ Mastercard จึงกล่าวว่า ความสำเร็จอยู่ที่การ "บาลานซ์ระหว่างความซับซ้อนหลังบ้านกับความเรียบง่ายหน้าบ้าน"? ติดตามคำตอบได้ใน The Secret Sauce อีพีนี้

    The Segment: A Zero Trust Leadership Podcast
    Breaking Barriers: Women Redefining Cybersecurity

    The Segment: A Zero Trust Leadership Podcast

    Play Episode Listen Later Jun 24, 2025 43:52


    In this powerful and thought-provoking episode, we sit down with three powerhouse women in cybersecurity—Emma, Aparna, and Sumi—who bring distinctly different journeys from pharmacy, law, technical sales, and engineering into one common mission: reshaping the cybersecurity industry from within. Together, they dive deep into what makes cybersecurity exciting, how resilience and authenticity fuel success, and why community—not conformity—is key to lasting impact.With candid conversations about navigating gender bias, building real allyship, and mentoring the next generation of women in tech, this episode pulls back the curtain on what it really takes to thrive in a male-dominated space. From managing cross-functional teams to balancing business needs with technical demands, these leaders share practical advice, hard-won lessons, and a powerful vision for a more inclusive, empowered future in cyber.Other topics we talked about:What drew each guest to cybersecurity from nontraditional backgrounds The role of mentorship and sponsorship in career growth Confronting misconceptions and biases in the workplace Why visibility and feedback are crucial for career advancement Balancing empathy and authority in leadership Retention strategies for women in tech The power of storytelling in inspiring the next generation How to build trust across business and security teams Whether you're deep in the industry or just cyber-curious, you'll leave inspired to challenge the status quo—and uplift others along the way.Stay Connected with our host, Raghu on LinkedInFor more information about Illumio, check out our website at illumio.com 

    The Fearless Mindset
    Inside the Mind of a Tech CEO: Automation, Adversity & the Future of Cybersecurity

    The Fearless Mindset

    Play Episode Listen Later Jun 24, 2025 30:09


    In this episode, Mark Ledlow is joined by Michael LaVista, Founder and CEO of Caxy Interactive, a software company based in the Midwest. They discuss various topics including handling adversity, the rise of AI, and its implications for businesses. Mike shares insights on the software industry's evolution, the significance of automation, and the challenges posed by AI security. He also provides his perspective on the future of the tech industry, the impact of quantum computing, and the volatile nature of cryptocurrencies. The conversation gives listeners a comprehensive view of the current and future trends in technology and business.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSAdapting to AI: The discussion emphasizes the rapid integration of AI in businesses, moving from experimental phases to becoming part of operational systems. Efficiency and Automation: Mike discusses his passion for automation, stressing the importance of optimizing processes to eliminate manual, time-consuming tasks. AI and Security: There's an outlined concern about AI's role in cybersecurity, particularly the risks of AI being exploited for malicious purposes. Economic Volatility: Tariffs and geopolitical changes are influencing operational costs and strategies for businesses, especially those involved in manufacturing and trading. Technological Talent: There's a notable shortage of skilled developers, emphasizing the necessity for continuous learning and adapting hiring practices to include self-taught individuals. Future Trends: Quantum computing poses significant future risks to current encryption methods, indicating a paradigm shift in cybersecurity.QUOTES"I hate the idea of people doing manual slow, stupid things that drives me crazy." "The idea of like kind of protecting yourself and, you know, putting it in a walled garden where it's protected against hacking." "We're really looking for all of our growth around Chicago to develop like a good, you know, culture, corporate family there." "For me, cryptocurrency is really just gambling and that's okay. I'm not putting a judgment on it." "You have to be able to compete. And I feel like when you have all that waste lying around, that's where your margin dollars just slip away." "Developers aren't going away completely. It's just like a different, your job will be different."Get to know more about Michael LaVista through the links below.https://www.linkedin.com/in/michaellavista/To hear more episodes of The Fearless Mindset podcast, you can go to  https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.

    Bite Size Sales
    Unlocking Business Value In Cybersecurity From a 25+ Year Cyber Sales Veteran

    Bite Size Sales

    Play Episode Listen Later Jun 24, 2025 49:09


    Are you struggling to turn small niche security products into strategic, high-value revenue streams? Curious how to elevate your sales approach from feature dumping to genuine value conversations? Ever wonder why comp plans always seem so complicated—or how real sales leaders attract and keep A-players? This episode has got you covered.In this conversation we discuss: 

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Monday, June 23rd, 2025: ADS and Python; More Secure Cloud PCs; Zend.to Path Traversal; Parser Differentials

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Jun 23, 2025 5:36


    ADS & Python Tools Didier explains how to use his tools cut-bytes.py and filescanner to extract information from alternate data streams. https://isc.sans.edu/diary/ADS%20%26%20Python%20Tools/32058 Enhanced security defaults for Windows 365 Cloud PCs Microsoft announced more secure default configurations for its Windows 365 Cloud PC offerings. https://techcommunity.microsoft.com/blog/windows-itpro-blog/enhanced-security-defaults-for-windows-365-cloud-pcs/4424914 CVE-2025-34508: Another File Sharing Application, Another Path Traversal Horizon3 reveals details of a recently patched directory traversal vulnerability in zend.to. https://horizon3.ai/attack-research/attack-blogs/cve-2025-34508-another-file-sharing-application-another-path-traversal/ Unexpected security footguns in Go's parsers Go parsers for JSON and XML are not always compatible and can parse data in unexpected ways. This blog by Trails of Bits goes over the various security implications of this behaviour. https://blog.trailofbits.com/2025/06/17/unexpected-security-footguns-in-gos-parsers/

    Jason in the House
    Morgan Wright: The Growing Importance Of Cybersecurity 

    Jason in the House

    Play Episode Listen Later Jun 23, 2025 52:59


    Jason describes why, as the most significant state supporter of terrorism, Iran is a threat to the United States and absolutely cannot get a hold of a nuclear weapon. He also delves into the current state of the President's "big, beautiful bill" in the Senate as the July 4th deadline nears.  CEO and Founder of the National Center for Open and Unsolved Cases and Senior Fellow with the Center for Digital Government, Morgan Wright, joins to discuss the growing importance of cybersecurity and artificial intelligence in modern warfare. He also explains the risks of artificial intelligence, particularly for using deepfakes and autonomous weapon systems. Bring on the stupid: A Michigan woman makes a peanut butter and jelly sandwich during her virtual court session, and the judge is unhappy.  Learn more about your ad choices. Visit podcastchoices.com/adchoices