The protection of computer systems from theft or damage
POPULARITY
Categories
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
In this episode we speak with Yossi Barishev - one of the most watched founders in cybersecurity today. He's led security operations and innovation at Sygnia and Fireblocks, advised Fortune 500s, and now, he's building a stealth-mode venture focused on rethinking identity and trust in the age of AI. He's been recognized by outlets like Business Insider, NYTech Media, and NewsBlaze as a leader shaping the future of cybersecurity. This episode is about uncertainty, self-trust, and building the internal tools to lead through volatility. In this conversation, we explore: The trap of seeking external validation. Early on, Yossi found himself chasing reassurance from more experienced founders - until he realized that the same validation could shake him when things got hard. “If you trust this external validation too much, whenever some negative signal comes in, it shakes you.” Learning to trust your internal compass. With time, his confidence shifted inward “There's literally zero way to predict what the hell this journey throws at you… I just believed in my ability to be able to deal with it.” The power of throwing yourself into deep water His biggest moments of growth came when everything was uncertain - and the only path was forward. “The times where I usually flourish the most - it's when my back is against the wall.” Introducing chaos - on your own terms. Rather than waiting for life to disrupt him, Yossi learned to lean into difficult, high-stakes situations. “If you're able to introduce chaos in a controlled manner, it teaches you a lot more.” Becoming the Swiss Army knife. Yossi chose adaptability over specialization, learning how to show up confidently in any scenario. “Honestly- just throw me in the Bronx with no cash and no clothes. I'll work it out.” Comparing yourself to others - and what to do with that. He reflects honestly on the emotional weight of watching peers raise money and start companies first. “What did they have that I lack?” Using doubt as fuel. Naysayers weren't discouragement - they were motivation. “Even if I don't have the answers right now, I believe in my ability to find them… I was like, I'm going to show you that you're wrong.” How he thinks about advice and mentorship. Advice, he says, is always a mix of data and subjective perspective - and the most useful mentors are those who've failed often. “Every single advisor I have is someone who made more mistakes than right decisions.” This episode is for anyone navigating self-doubt, forging a nonlinear path, or learning to lead without a blueprint.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are supposed to identify the researcher conducting the scans https://isc.sans.edu/diary/X-Request-Purpose%3A%20Identifying%20%22research%22%20and%20bug%20bounty%20related%20scans%3F/32436 Proton Breach Observatory Proton opened up its breach observatory. This website will collect information about breaches affecting companies that have not yet made the breach public. https://proton.me/blog/introducing-breach-observatory Microsoft Exchange Server Security Best Practices A new document published by a collaboration of national cyber security agencies summarizes steps that should be taken to harden Exchange Server. https://www.nsa.gov/Portals/75/documents/resources/cybersecurity-professionals/CSI_Microsoft_Exchange_Server_Security_Best_Practices.pdf?ver=9mpKKyUrwfpb9b9r4drVMg%3d%3d MOVEit Vulnerability Progress published an advisory for its file transfer program MOVEIt . This software has had heavily exploited vulnerabilities in the past. https://community.progress.com/s/article/MOVEit-Transfer-Vulnerability-CVE-2025-10932-October-29-2025
Independent investigative journalism, broadcasting, trouble-making and muckraking with Brad Friedman of BradBlog.com
After spending years tracking Al Qaeda, former analyst Gina Bennett talks to SpyTalk about her storied career, her new spy novel and the rising threat of "politicized misogyny." Gina BennettIf Two of Them Are Dead Follow Jeff Stein on Twitter:https://twitter.com/SpyTalkerFollow Karen Greenberg on Twitterhttps://x.com/KarenGreenberg3Follow Michael Isikoff on Twitter:https://twitter.com/isikoff Follow SpyTalk on Twitter:https://twitter.com/talk_spySubscribe to SpyTalk on Substack https://www.spytalk.co/Take our listener survey where you can give us feedback.http://survey.podtrac.com/start-survey.aspx?pubid=BffJOlI7qQcF&ver=short Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Nearly two months after calling on the Office of Management and Budget to bar use of xAI's Grok chatbot in government, a coalition of advocacy groups is pressing its case further after the General Services Administration struck a deal with Elon Musk's AI company to deploy Grok across the federal government. In a letter sent Wednesday to OMB Director Russell Vought, the advocacy groups reiterated their concerns in the wake of the GSA OneGov deal, along with recent comments from Michael Kratsios, the director of the White House Office of Science and Technology Policy. “OMB is entrusted with ensuring that AI systems procured by the federal government meet the highest standards of truth-seeking, accuracy and neutrality,” the letter, led by Public Citizen, stated. “Grok has repeatedly demonstrated failures in these areas and Director Kratsios himself has confirmed that such behavior is the precise type that Executive Order 14319 was designed to prevent.” The letter refers to an executive order signed by President Donald Trump in July that seeks to prevent “woke AI,” or ideological biases in models that are used by the federal government. The groups argued in their August letter to Vought that the use of Grok contradicts this order, given its past controversies with spewing antisemitic and pro-Hitler content. Weeks after the letter was sent, GSA inked a deal with xAI to offer Grok models to the government for a nominal cost. Under the deal, federal agencies can buy Grok 4 and Grok 4 Fast for 42 cents until March 2027. The White House appears to be moving forward with plans to redesign federal government websites, registering a new government domain — techforce.gov — this week. The new URL, which was first discovered Thursday by a bot tracking new government domains, leads to a sign-in page that states “National Design Studio” and “Tech Force” at the top. It includes a form for users to submit their email and receive a code to access the website. Records maintained by the Cybersecurity and Infrastructure Security Agency show the domain was registered Oct. 24 and last changed Wednesday. The domain registration comes more than two months after President Donald Trump signed an executive order launching an “America by Design” initiative focused on both digital and physical spaces. A new National Design Studio and chief design officer will lead the initiative and coordinate agency actions. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on Apple Podcasts, Soundcloud, Spotify and YouTube.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Dive into the creative world behind OTTOBOX: Patch or Perish, Automox's first-ever video game. In this episode of Automox Insiders, host Maddie Regis chats with Senior Brand Manager Jonah Phillips about transforming patch management into an interactive gaming experience. From retro music production to villain design inspired by real IT challenges, discover how Automox blends creativity, technology, and cybersecurity culture into one epic adventure.
The conversation explores how cybersecurity is integral to space operations, drawing parallels with traditional air defense strategies. Blount discusses the historical context of cybersecurity in space, the role of international law, and the challenges posed by non-state actors. He emphasizes the need for a holistic approach to cybersecurity that includes both space-based and terrestrial components, and the importance of international cooperation in addressing these challenges.Blount warns of the increasing threats from cyber-attacks on space assets and the need for robust legal frameworks to ensure accountability and security. He calls for the development of comprehensive cybersecurity strategies that integrate space and cyberspace, ensuring resilience against a wide range of threats.How can nations protect their space assets from cyber threats? What role does international law play in governing space cybersecurity? How should countries collaborate to enhance global space security?Episode ContributorsP. J. Blount is assistant professor of space law at Durham University. He is also a visiting scholar at Mae Fah Luang University in Chiang Rai, Thailand. Previously, he served as a Lecturer in Law at Cardiff University, an adjunct professor for the LL.M. in the Air and Space Law at the University of Mississippi School of Law, a Postdoctoral Researcher at the University of Luxembourg, an adjunct professor at Montclair State University, and a Visiting Scholar at the Beijing Institute of Technology School of Law. Tejas Bharadwaj is a senior research analyst with the Technology and Society Program at Carnegie India. He focuses on space law and policies and also works on areas related to AI in military domain, Defence tech and Cybersecurity. Every two weeks, Interpreting India brings you diverse voices from India and around the world to explore the critical questions shaping the nation's future. We delve into how technology, the economy, and foreign policy intertwine to influence India's relationship with the global stage.As a Carnegie India production, hosted by Carnegie scholars, Interpreting India, a Carnegie India production, provides insightful perspectives and cutting-edge by tackling the defining questions that chart India's course through the next decade.Stay tuned for thought-provoking discussions, expert insights, and a deeper understanding of India's place in the world.Don't forget to subscribe, share, and leave a review to join the conversation and be part of Interpreting India's journey.
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars!Check out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonAllow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform at https://threatlocker.com/dailycyberTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare's next training on Aug. 13th on Web App Testing at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials
In this special Halloween edition of the KuppingerCole Analyst Chat, Matthias Reinwarth is joined by Jonathan Care, Lead Analyst at KuppingerCole Analysts, to explore one of the most talked-about cybersecurity stories of the year — the F5 supply chain incident. The discussion highlights how even well-established organizations can become targets of sophisticated, long-term attacks — and what this means for the future of software supply chain security. Together, Matthias and Jonathan examine how incidents like this can happen, what lessons can be learned across the industry, and how companies can strengthen resilience, transparency, and response capabilities in their own environments. Key topics covered: ✅ Understanding the dynamics of modern supply chain attacks ⚠️✅ Why detection and dwell time remain a major industry challenge✅ The growing importance of vendor risk and software transparency✅ Lessons learned for CISOs and IT leaders✅ Practical measures to improve visibility and response✅ Why collaboration and information sharing are key to resilience
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like dd do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems/32432 Microsoft Azure Front Door Outage Today, Microsoft s Azure Front Door service failed, leading to users not being able to authenticate to various Azure-related services. https://azure.status.microsoft/en-us/status Docker-Compose Vulnerability A vulnerability in docker-compose may be used to trick users into creating files outside the docker-compose directory https://github.com/docker/compose/security/advisories/GHSA-gv8h-7v7w-r22q
Jacob Ward of The Rip Current joins Mikah Sargent this week! OpenAI disclosed stats on mental health from its users' chats within ChatGPT. How deepfake videos are becoming increasingly difficult to differentiate. Cybersecurity concerns over AI-powered browsers. And the latest from Adobe Max! Jacob talks about OpenAI's release of stats surrounding mental health, warning signs, and how its model is doing to recognize and support people in moments of distress. Mikah chats about how it's starting to become harder to recognize videos that are AI-generated. Mikah also talks about AI browsers and how slowly these browsers are becoming a ticking cybersecurity time bomb. And artist Joe Esposito joins us from Adobe Max to share everything that was announced at Adobe's annual creativity conference. Hosts: Mikah Sargent and Jacob Ward Guest: Joe Esposito Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: outsystems.com/twit threatlocker.com/twit auraframes.com/ink ventionteams.com/twit
CVEs, or Common Vulnerabilities and Exposures, are such a routine aspect of tech that most IT pros probably take them for granted. But like many things we take for granted, the CVE process takes some serious organizational infrastructure to function. On today's Packet Protector, sponsored by Cisco, we talk about the organizations and processes that... Read more »
Jacob Ward of The Rip Current joins Mikah Sargent this week! OpenAI disclosed stats on mental health from its users' chats within ChatGPT. How deepfake videos are becoming increasingly difficult to differentiate. Cybersecurity concerns over AI-powered browsers. And the latest from Adobe Max! Jacob talks about OpenAI's release of stats surrounding mental health, warning signs, and how its model is doing to recognize and support people in moments of distress. Mikah chats about how it's starting to become harder to recognize videos that are AI-generated. Mikah also talks about AI browsers and how slowly these browsers are becoming a ticking cybersecurity time bomb. And artist Joe Esposito joins us from Adobe Max to share everything that was announced at Adobe's annual creativity conference. Hosts: Mikah Sargent and Jacob Ward Guest: Joe Esposito Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: outsystems.com/twit threatlocker.com/twit auraframes.com/ink ventionteams.com/twit
Jacob Ward of The Rip Current joins Mikah Sargent this week! OpenAI disclosed stats on mental health from its users' chats within ChatGPT. How deepfake videos are becoming increasingly difficult to differentiate. Cybersecurity concerns over AI-powered browsers. And the latest from Adobe Max! Jacob talks about OpenAI's release of stats surrounding mental health, warning signs, and how its model is doing to recognize and support people in moments of distress. Mikah chats about how it's starting to become harder to recognize videos that are AI-generated. Mikah also talks about AI browsers and how slowly these browsers are becoming a ticking cybersecurity time bomb. And artist Joe Esposito joins us from Adobe Max to share everything that was announced at Adobe's annual creativity conference. Hosts: Mikah Sargent and Jacob Ward Guest: Joe Esposito Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: outsystems.com/twit threatlocker.com/twit auraframes.com/ink ventionteams.com/twit
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware When you forget to authenticate your API Jamming with cool tech GoSpoof and After 35 Years, a Solution to the CIA's Kryptos Puzzle Has Been Found! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-898
Next week, California will hold a major election on Tuesday, November 4, amid heightened cyber risk and increased exposure to potential attacks. With the ongoing government shutdown and reduced grant funding for local counties overseeing the elections, vulnerabilities are growing. Sanny Liao, Co-Founder and CTO of Fable Security, joins to discuss the biggest cyber threats to this election, how attackers could exploit phishing or other tactics to gain access, and where counties should focus training to detect and prevent malicious activity. While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. Get the weekly Caveat Briefing delivered to your inbox. Like what you heard? Be sure to check out and subscribe to our Caveat Briefing, a weekly newsletter available exclusively to N2K Pro members on N2K CyberWire's website. N2K Pro members receive our Thursday wrap-up covering the latest in privacy, policy, and research news, including incidents, techniques, compliance, trends, and more. This week's Caveat Briefing covers the U.S. Department of Energy's $1 billion partnership with AMD to build two supercomputers, Lux and Discovery, aimed at fusion energy, cancer research, and national security. Lux, using AMD's MI355X AI chips, will come online in six months and deliver three times the AI capacity of current supercomputers. Discovery, built with AMD's MI430 chips, is expected to be operational by 2029, highlighting a major DOE-private industry collaboration to accelerate scientific breakthroughs. Curious about the details? Head over to the Caveat Briefing for the full scoop and additional compelling stories. Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com. Hope to hear from you. Learn more about your ad choices. Visit megaphone.fm/adchoices
CVEs, or Common Vulnerabilities and Exposures, are such a routine aspect of tech that most IT pros probably take them for granted. But like many things we take for granted, the CVE process takes some serious organizational infrastructure to function. On today's Packet Protector, sponsored by Cisco, we talk about the organizations and processes that... Read more »
⬥GUEST⬥Eric O'Neill, Keynote Speaker, Cybersecurity Expert, Spy Hunter, Bestselling Author. Attorney | On Linkedin: https://www.linkedin.com/in/eric-m-oneill/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥EPISODE NOTES⬥In this episode of the Redefining CyberSecurity Podcast, host Sean Martin reconnects with Eric O'Neill, National Security Strategist at NeXasure and former FBI counterintelligence operative. Together, they explore how cybercrime has matured into a global economy—and why organizations of every size must learn to compete, not just defend.O'Neill draws from decades of undercover work and corporate investigation to reveal that cybercriminals now operate like modern businesses: they innovate, specialize, and scale. The difference? Their product is your data. He argues that resilience—not prevention—is the true marker of readiness. Companies can't assume they're too small or too obscure to be targeted. “It's just a matter of numbers,” he says. “At some point, you will get struck. You need to be able to take the punch and keep moving.”The discussion covers the practical realities facing small and midsize businesses: limited budgets, fragmented tools, and misplaced confidence. O'Neill explains why so many organizations over-invest in overlapping technologies while under-investing in strategy. His firm helps clients identify these inefficiencies and replace tool sprawl with coordinated defense.Preparation, O'Neill says, should follow his PAID methodology—Prepare, Assess, Investigate, Decide. The goal is to plan ahead, detect fast, and act decisively. Those that do not prepare spend ten times more responding after an incident than they would have spent preventing it.Martin and O'Neill also examine how storytelling bridges the gap between security teams and executive boards. Using relatable analogies—like house fires and insurance—O'Neill makes cybersecurity human. His message is simple: security is not a technical decision; it's a business one.Listen to hear how the business of cybercrime mirrors legitimate enterprise—and why understanding that truth might be your best defense.⬥RESOURCES⬥Book: Spies, Lies, and Cybercrime by Eric O'Neill – Book linkBook: Gray Day by Eric O'Neill – Book linkFree, Weekly Newsletter: spies-lies-cybercrime.ericoneill.netPodcast: Former FBI Spy Hunter Eric O'Neill Explains How Cybercriminals Use Espionage techniques to Attack Us: https://redefiningsocietyandtechnologypodcast.com/episodes/new-book-spies-lies-and-cyber-crime-former-fbi-spy-hunter-eric-oneill-explains-how-cybercriminals-use-espionage-techniques-to-attack-us-redefining-society-and-technology-podcast-with-marco-ciappelli⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast:
Jacob Ward of The Rip Current joins Mikah Sargent this week! OpenAI disclosed stats on mental health from its users' chats within ChatGPT. How deepfake videos are becoming increasingly difficult to differentiate. Cybersecurity concerns over AI-powered browsers. And the latest from Adobe Max! Jacob talks about OpenAI's release of stats surrounding mental health, warning signs, and how its model is doing to recognize and support people in moments of distress. Mikah chats about how it's starting to become harder to recognize videos that are AI-generated. Mikah also talks about AI browsers and how slowly these browsers are becoming a ticking cybersecurity time bomb. And artist Joe Esposito joins us from Adobe Max to share everything that was announced at Adobe's annual creativity conference. Hosts: Mikah Sargent and Jacob Ward Guest: Joe Esposito Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: outsystems.com/twit threatlocker.com/twit auraframes.com/ink ventionteams.com/twit
Drawing from his extensive government and private sector experience, Jeff Greene, former Assistant Executive Director for Cybersecurity at the Cybersecurity and Infrastructure Security Agency (CISA), former Chief of Cyber Response and Policy on the National Security Council, Distinguished Fellow at the Aspen Institute and Founder of Salty Coffee Consulting, explored how public-private partnerships strengthen critical infrastructure protection, highlighted emerging threat actors, discussed the latest cybercrime tactics and shared practical strategies businesses can implement to enhance their cyber resilience. Check out the conversation to gain actionable insights from a seasoned expert who has helped shape national cybersecurity policy and learn how to better protect your organization in an increasingly complex digital environment.Watch the original Wednesdays with Woodward® webinar: https://institute.travelers.com/webinar-series/symposia-series/global-cyber-resilience. ---Visit the Travelers Institute® website: http://travelersinstitute.org/.Join the Travelers Institute® email list: https://travl.rs/488XJZM.Subscribe to the Travelers Institute® Podcast newsletter on LinkedIn: https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7328774828839100417.Connect with Travelers Institute® President Joan Woodward on LinkedIn: https://www.linkedin.com/in/joan-kois-woodward/.
Stephen Ryu, a neurosurgeon and key figure in the Stanford Neuroprosthetics Lab joins Tjaša Zajc on Faces of Digital Health to demystify brain–computer interfaces (BCIs): how they work, why invasive systems outperform non-invasive ones, realistic use cases (motor control and speech), timelines and durability, safety and MRI trade-offs, cybersecurity, business models, and what Paradromics is building as a high-bandwidth BCI platform. Throughout, Stephen separates science fact from sci-fi, stressing near-term potential to restore communication and movement for people living with paralysis, while noting earlier-stage areas like mental health and pain. What we cover: - Invasive vs. non-invasive BCIs, and why electrode proximity to neurons matters for performance - Decoding motor intent and speech: training, language considerations, and LLM-enabled synthesis - Safety, surgery, and durability (why 10-year implant lifespans are a meaningful target) - MRI/CT compatibility trade-offs (and parallels to pacemakers/DBS) - Cybersecurity realities (what BCIs can not do today) - Business models, regulation, and reimbursement paths for medical-grade BCIs - Paradromics' differentiation: a high-bandwidth platform designed to scale across use cases - Future indications: pain, sensory restoration; earlier stage: mental health biomarkers - The human impact: restoring connection for people who can't move or speak Chapters: 01:37 How BCIs work; signals, decoding, invasive vs. non-invasive 07:13 Surgery basics, risks, and why proximity boosts performance 09:36 Decoding speech & language considerations 13:31 What's most advanced today: motor + speech 14:58 Mental health: biomarkers and why it's early 17:48 Longevity, MRI/CT limits, realistic replacement intervals 21:16 Patient perception: fear, performance, and value vs. alternatives 25:04 Paradromics' platform & high-bandwidth approach 29:22 Platform use cases by brain area (motor, auditory, etc.) 31:18 Cybersecurity: risks today vs. sci-fi 32:35 Business models, regulation, and access 36:42 Trials landscape; Paradromics' timeline 37:53 Biggest concerns: hype vs. reality 39:50 Three things everyone should know about BCIs 42:10 Potential in pain management 44:41 Role of AI/ML in decoding and assistive apps 46:36 Final thoughts www.facesofdigitalhealth.com Newsletter: https://fodh.substack.com/
Jacob Ward of The Rip Current joins Mikah Sargent this week! OpenAI disclosed stats on mental health from its users' chats within ChatGPT. How deepfake videos are becoming increasingly difficult to differentiate. Cybersecurity concerns over AI-powered browsers. And the latest from Adobe Max! Jacob talks about OpenAI's release of stats surrounding mental health, warning signs, and how its model is doing to recognize and support people in moments of distress. Mikah chats about how it's starting to become harder to recognize videos that are AI-generated. Mikah also talks about AI browsers and how slowly these browsers are becoming a ticking cybersecurity time bomb. And artist Joe Esposito joins us from Adobe Max to share everything that was announced at Adobe's annual creativity conference. Hosts: Mikah Sargent and Jacob Ward Guest: Joe Esposito Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: outsystems.com/twit threatlocker.com/twit auraframes.com/ink ventionteams.com/twit
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware When you forget to authenticate your API Jamming with cool tech GoSpoof and After 35 Years, a Solution to the CIA's Kryptos Puzzle Has Been Found! Show Notes: https://securityweekly.com/psw-898
Join CJ Dietzman, Cara Murray and Ben Lorentzen, Alliant Cyber, as they discuss the current state of the cyber insurance market and the evolving threats organizations face heading into 2026. Their conversation explores how cultivating a strong culture of cybersecurity that is supported by engaged employees and leadership can strengthen resilience and reduce exposure. They also share actionable steps organizations can take to build a sustainable cyber culture that reinforces strategy and enhances preparedness in today's dynamic risk landscape.
Jacob Ward of The Rip Current joins Mikah Sargent this week! OpenAI disclosed stats on mental health from its users' chats within ChatGPT. How deepfake videos are becoming increasingly difficult to differentiate. Cybersecurity concerns over AI-powered browsers. And the latest from Adobe Max! Jacob talks about OpenAI's release of stats surrounding mental health, warning signs, and how its model is doing to recognize and support people in moments of distress. Mikah chats about how it's starting to become harder to recognize videos that are AI-generated. Mikah also talks about AI browsers and how slowly these browsers are becoming a ticking cybersecurity time bomb. And artist Joe Esposito joins us from Adobe Max to share everything that was announced at Adobe's annual creativity conference. Hosts: Mikah Sargent and Jacob Ward Guest: Joe Esposito Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: outsystems.com/twit threatlocker.com/twit auraframes.com/ink ventionteams.com/twit
Rory McGowan sits down with Simon Onyons, a Senior Advisor to the UK National Cyber Security Centre and someone with over 20 years experience in information technology and cybersecurity, to talk about the state of UK business' cyber security and what businesses should be doing ahead of the Christmas period to ensure that they're safe from hackers and bad faith actors trying to gain access to their data and disrupt their business. Currently working with the risk management firm Kroll, Simon discusses what both businesses can do to tighten their cyber security but also what consumers should be doing if their data is stolen in a cyber attack.
Jo Whitfield, in her first chat since becoming Chair of the British Retail Consortium, tells Sean Farrington how she ended up hat the organisation after a career spanning some of the High Street's biggest businesses. She shares why it's such an important time for retail, and talks about how the sector's changing—thanks to online shopping, social media, and shifting customer habits—and how retailers are adapting. Jo dives into the pressures businesses face, especially around business rates and taxes, and calls for a fairer system that doesn't penalize physical stores. There's also a look at how supermarkets, independents, and online influencers all play a role in today's retail ecosystem. Jo reflects on being the BRC's first female chair and why diversity in leadership—across gender, ethnicity, and background—matters for the future of retail. She also touches on tech, AI, and how retail offers flexibility and opportunity, especially for women, whilst on safety, she highlights rising retail crime, the risks to staff and delivery drivers, and what the industry and government are doing about it. Cybersecurity is another hot topic, with Jo stressing the need for constant vigilance and investment.01:26 Joe Whitfield's career and appointment as Chair of the British Retail Consortium 03:51 Transformation and challenges in the retail sector 07:40 Impact of business rates, taxation, and the upcoming budget on retailers 14:31 Role of large supermarkets, independent retailers, and online influencers 19:58 Inclusion and diversity in retail leadership 23:41 Women's careers, technology, and AI in retail 25:23 Retail crime, safety for workers and delivery drivers 32:33 Threats of cyber crime and security in retail(Picture: Getty)Presenter: Sean Farrington Producer: Angus Tiffin Editor: Henry Jones
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars!Check out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonAllow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform at https://threatlocker.com/dailycyberTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare's next training on Aug. 13th on Web App Testing at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware When you forget to authenticate your API Jamming with cool tech GoSpoof and After 35 Years, a Solution to the CIA's Kryptos Puzzle Has Been Found! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-898
Jacob Ward of The Rip Current joins Mikah Sargent this week! OpenAI disclosed stats on mental health from its users' chats within ChatGPT. How deepfake videos are becoming increasingly difficult to differentiate. Cybersecurity concerns over AI-powered browsers. And the latest from Adobe Max! Jacob talks about OpenAI's release of stats surrounding mental health, warning signs, and how its model is doing to recognize and support people in moments of distress. Mikah chats about how it's starting to become harder to recognize videos that are AI-generated. Mikah also talks about AI browsers and how slowly these browsers are becoming a ticking cybersecurity time bomb. And artist Joe Esposito joins us from Adobe Max to share everything that was announced at Adobe's annual creativity conference. Hosts: Mikah Sargent and Jacob Ward Guest: Joe Esposito Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: outsystems.com/twit threatlocker.com/twit auraframes.com/ink ventionteams.com/twit
In this episode, we discuss the growing threat of online scams and cyber fraud that are increasingly targeting seniors across Australia. Cybersecurity expert Sandeep Taileng joins SBS Hindi to share simple and practical steps to stay safe online, from recognising fake messages and suspicious calls to protecting personal information. We also look at how multicultural communities can help their loved ones navigate the digital world with more confidence and awareness.
Anna Bicker, heise-online-Chefredakteur Dr. Volker Zota und Malte Kirchner sprechen in dieser Ausgabe der #heiseshow unter anderem über folgende Themen: - Big Teams is watching you: Microsoft Teams prüft künftig Büroanwesenheit – Ab Dezember kann Microsoft Teams die Anwesenheit von Mitarbeitern im Büro erfassen. Welche Funktionen bietet das neue Feature genau? Wie reagieren Datenschützer auf diese Überwachungsmöglichkeit? Und welche Auswirkungen könnte das auf die Vertrauenskultur in Unternehmen haben? - Zurückhacken erlaubt? Bundesinnenministerium prüft Abwehrschläge gegen Cyberangriffe – Das Bundesinnenministerium erwägt, aktive Abwehrmaßnahmen gegen Cyberangriffe zu ermöglichen. Wo verläuft die Grenze zwischen Verteidigung und Angriff im digitalen Raum? Welche rechtlichen und technischen Herausforderungen bringt eine solche Strategie mit sich? Und wie könnten andere Staaten auf deutsche Cyber-Gegenschläge reagieren? - Musks neue Wissenswelt: Wie gut ist die Grokipedia? – Elon Musk hat mit Grokipedia eine Wikipedia-Alternative mit 885.000 Artikeln gestartet. Was unterscheidet Grokipedia von Wikipedia und wie funktioniert die KI-gestützte Plattform? Kann eine von Musks X-Plattform betriebene Enzyklopädie neutral und verlässlich sein? Und welche Chancen hat Grokipedia gegen den etablierten Platzhirsch Wikipedia? Außerdem wieder mit dabei: ein Nerd-Geburtstag, das WTF der Woche und knifflige Quizfragen.
⬥GUEST⬥Eric O'Neill, Keynote Speaker, Cybersecurity Expert, Spy Hunter, Bestselling Author. Attorney | On Linkedin: https://www.linkedin.com/in/eric-m-oneill/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥EPISODE NOTES⬥In this episode of the Redefining CyberSecurity Podcast, host Sean Martin reconnects with Eric O'Neill, National Security Strategist at NeXasure and former FBI counterintelligence operative. Together, they explore how cybercrime has matured into a global economy—and why organizations of every size must learn to compete, not just defend.O'Neill draws from decades of undercover work and corporate investigation to reveal that cybercriminals now operate like modern businesses: they innovate, specialize, and scale. The difference? Their product is your data. He argues that resilience—not prevention—is the true marker of readiness. Companies can't assume they're too small or too obscure to be targeted. “It's just a matter of numbers,” he says. “At some point, you will get struck. You need to be able to take the punch and keep moving.”The discussion covers the practical realities facing small and midsize businesses: limited budgets, fragmented tools, and misplaced confidence. O'Neill explains why so many organizations over-invest in overlapping technologies while under-investing in strategy. His firm helps clients identify these inefficiencies and replace tool sprawl with coordinated defense.Preparation, O'Neill says, should follow his PAID methodology—Prepare, Assess, Investigate, Decide. The goal is to plan ahead, detect fast, and act decisively. Those that do not prepare spend ten times more responding after an incident than they would have spent preventing it.Martin and O'Neill also examine how storytelling bridges the gap between security teams and executive boards. Using relatable analogies—like house fires and insurance—O'Neill makes cybersecurity human. His message is simple: security is not a technical decision; it's a business one.Listen to hear how the business of cybercrime mirrors legitimate enterprise—and why understanding that truth might be your best defense.⬥RESOURCES⬥Book: Spies, Lies, and Cybercrime by Eric O'Neill – Book linkBook: Gray Day by Eric O'Neill – Book linkFree, Weekly Newsletter: spies-lies-cybercrime.ericoneill.netPodcast: Former FBI Spy Hunter Eric O'Neill Explains How Cybercriminals Use Espionage techniques to Attack Us: https://redefiningsocietyandtechnologypodcast.com/episodes/new-book-spies-lies-and-cyber-crime-former-fbi-spy-hunter-eric-oneill-explains-how-cybercriminals-use-espionage-techniques-to-attack-us-redefining-society-and-technology-podcast-with-marco-ciappelli⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast:
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware When you forget to authenticate your API Jamming with cool tech GoSpoof and After 35 Years, a Solution to the CIA's Kryptos Puzzle Has Been Found! Show Notes: https://securityweekly.com/psw-898
Jacob Ward of The Rip Current joins Mikah Sargent this week! OpenAI disclosed stats on mental health from its users' chats within ChatGPT. How deepfake videos are becoming increasingly difficult to differentiate. Cybersecurity concerns over AI-powered browsers. And the latest from Adobe Max! Jacob talks about OpenAI's release of stats surrounding mental health, warning signs, and how its model is doing to recognize and support people in moments of distress. Mikah chats about how it's starting to become harder to recognize videos that are AI-generated. Mikah also talks about AI browsers and how slowly these browsers are becoming a ticking cybersecurity time bomb. And artist Joe Esposito joins us from Adobe Max to share everything that was announced at Adobe's annual creativity conference. Hosts: Mikah Sargent and Jacob Ward Guest: Joe Esposito Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: outsystems.com/twit threatlocker.com/twit auraframes.com/ink ventionteams.com/twit
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line/32428 Apache Tomcat PUT Directory Traversal Apache released an update to Tomcat fixing a directory traversal vulnerability in how the PUT method is used. Exploits could upload arbitrary files, leading to remote code execution. https://lists.apache.org/thread/n05kjcwyj1s45ovs8ll1qrrojhfb1tog BIND9 DNS Spoofing Vulnerability A PoC exploit is now available for the recently patched BIND9 spoofing vulnerability https://gist.github.com/N3mes1s/f76b4a606308937b0806a5256bc1f918
Send us a textIn this inspiring conversation, Mitch Macauley shares his journey from a multicultural upbringing in Europe and West Africa to building a career that spans aerospace engineering, product development, and global tech partnerships. He discusses the hurdles of cultural adaptation, the challenges and opportunities facing MSPs, and how AI is reshaping business operations. Mitch also opens up about his personal weight-loss journey, showing how discipline is the key to both professional success and personal well-being.Highlights:
Send us a textRob Purcell shares a conversation that moves from the art of smoking brisket to the urgent mission of saving veteran lives. As co-founder of the 22 Vets Foundation, Rob explains how his team is tackling the devastating statistic of 22 veteran suicides per day. He discusses creating educational programs like the Veterans Day and Memorial Day Projects, forging partnerships with IT vendors for veteran training, and using mission-driven business to drive social change. Rob also reflects on his own discipline journey, from competitive bodybuilding to building trust and emotional loyalty in business.Highlights:
Send us a textIn this episode of Joey Pinz Discipline Conversations, we sit down with Terry McGill, CRO and Partner at Pegasus Technology Solutions, to explore the intersection of barbecue passion, business leadership, and MSP strategy.Terry shares his journey from Toronto to Dallas, his love for mesquite smoking, and how food and relationships connect to leadership. We dive into Pegasus's approach to managed services, including co-managed IT, cloud strategy, and client partnerships. Terry also discusses the challenges MSPs face—cybersecurity, talent retention, and growth—and how discipline, peer groups, and culture fuel long-term success.✨ Highlights:Pegasus's “culture over growth” philosophy in the competitive MSP landscapeThe role of peer groups (Evolve, EOS, Vistage) in shaping business successHow discipline applies equally to fitness, family, and building a sales engine
Cybersecurity is everyone's job. Farra Trompeter, co-director, talks with Joshua Peskay, co-founder of Meet the Moment, about practical ways nonprofits can reduce risk, protect sensitive data, and create a culture of awareness and care. From reasonable security standards to tabletop exercises, learn how to keep the mission and the people you serve safe.
From time to time, we'll re-air a previous episode of the show that our newer audience may have missed. During this episode, Santosh is joined by Carla DeSantis, Operations Transformation Partner at PwC. Carla shares insights on the future of supply chain management, emphasizing the role of technology and business model innovation. Key topics include the challenges of technology investments, AI integration, workforce upskilling, and climate considerations. Carla also highlights findings from PwC's digital trends survey, noting issues like the lack of expected returns on tech investments and the importance of clear objectives. The episode underscores the need for agile methodologies, robust data security, collaborative approaches in supply chain operations, and more. Highlights from their conversation include:Carla's Background and Journey to PwC (1:02)Digital Trends in Operations Survey (2:43)Key Takeaways from the Study (4:40)Clarity in Tech Investments (6:02)AI Integration in Supply Chain (7:06)Workforce Digital Skills (8:18)Technology Integration Challenges (12:04)Climate Considerations in Supply Chain (16:02)State of Supply Chain Technology Investment (19:57)Cybersecurity in Supply Chain Operations (23:22)Rethinking Access Controls (24:55)Expansion of Data Protection Laws (26:05)Digital Twins for Safe Experimentation (28:41)Collaboration Across Functions (32:56)Impact of US Elections on Technology Buying (34:40)Final Thoughts and Takeaways (35:23)Dynamo is a VC firm led by supply chain and mobility specialists that focus on seed-stage, enterprise startups.Find out more at: https://www.dynamo.vc/ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Organizations pour millions into protecting running applications—yet attackers are targeting the delivery path itself.This episode of AppSec Contradictions reveals why CI/CD and cloud pipelines are becoming the new frontline in cybersecurity.
This episode is sponsored by HYPR. Visit hypr.com/idac to learn more.In this episode from Authenticate 2025, Jim McDonald and Jeff Steadman are joined by Bojan Simic, Co-Founder and CEO of HYPR, for a sponsored discussion on the evolving landscape of identity and security.Bojan shares his journey from software engineer to cybersecurity leader and dives into the core mission of HYPR: providing fast, consistent, and secure identity controls that complement existing investments. The conversation explores the major themes from the conference, including the push for passkey adoption at scale and the challenge of securely authenticating AI agents.A key focus of the discussion is the concept of "Know Your Employee" (KYE) in a continuous manner, a critical strategy for today's remote and hybrid workforces. Bojan explains how the old paradigm of one-time verification is failing, especially in the face of sophisticated, AI-powered social engineering attacks like those used by Scattered Spider. They discuss the issue of "identity sprawl" across multiple IDPs and why consolidation isn't always the answer. Instead, Bojan advocates for a flexible, best-of-breed approach that provides a consistent authentication experience and leverages existing security tools.Connect with Bojan: https://www.linkedin.com/in/bojansimic/Learn more about HYPR: https://www.hypr.com/idacConnect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at idacpodcast.comChapter Timestamps:00:00 - Introduction at Authenticate 202500:23 - Sponsored Episode Welcome: Bojan Simic, CEO of HYPR01:11 - How Bojan Simic Got into Identity and Cybersecurity02:10 - The Elevator Pitch for HYPR04:03 - The Buzz at Authenticate 2025: Passkeys and Securing AI Agents05:29 - The Trend of Continuous "Know Your Employee" (KYE)07:33 - Is Your MFA Program Enough Anymore?09:44 - Hackers Don't Break In, They Log In: The Scattered Spider Threat11:19 - How AI is Scaling Social Engineering Attacks Globally13:08 - When a Breach Happens, Who's on the Hook? IT, Security, or HR?16:23 - What is the Right Solution for Identity Practitioners?17:05 - The Critical Role of Internal Marketing for Technology Adoption22:27 - The Problem with Identity Sprawl and the Fallacy of IDP Consolidation25:47 - When is it Time to Move On From Your Existing Identity Tools?28:16 - The Role of Document-Based Identity Verification in the Enterprise32:31 - What Makes HYPR's Approach Unique?35:33 - How Do You Measure the Success of an Identity Solution?36:39 - HYPR's Philosophy: Never Leave a User Stranded39:00 - Authentication as a Tier Zero, Always-On Capability40:05 - Is Identity Part of Your Disaster Recovery Plan?41:36 - From the Ring to the C-Suite: Bojan's Past as a Competitive Boxer47:03 - How to Learn More About HYPRKeywords:IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Bojan Simic, HYPR, Passkeys, Know Your Employee, KYE, Continuous Identity, Identity Verification, Authenticate 2025, Phishing Resistant, Social Engineering, Scattered Spider, AI Security, Identity Sprawl, Passwordless Authentication, FIDO, MFA, IDP Consolidation, Zero Trust, Cybersecurity, IAM, Identity and Access Management, Enterprise Security
In this episode of The Segment, host Raghu Nandakumara sits down with Carl Froggett, Chief Information Officer at Deep Instinct, the first company to apply end-to-end deep learning to cybersecurity.With nearly three decades of experience — including over 20 years at Citi leading global infrastructure defense and cybersecurity services — Carl brings a rare, full-circle perspective on how the cyber landscape, leadership, and culture have evolved from the early 2000s to today's AI-driven world.You'll learn:How Carl “accidentally” fell into cybersecurity — and what the early days of firewalls and compliance-driven security looked like What it was like to pioneer one of Citi's first dedicated cyber teams Lessons in leadership from iconic figures like Charles Blauner, Greg Lavender, and John Miller How Citi became an early adopter of technologies like Palo Alto Networks, Splunk, CrowdStrike, and Illumio Why building business alignment and trust matters more than ever for CISOs How to frame security risks in business terms — and where many leaders go wrong The massive shift from machine learning to deep learning in cybersecurity How generative AI and “dark AI” are redefining the threat landscape — and why the next era of defense demands a mindset change Packed with nostalgia, hard-won wisdom, and forward-looking insight, this episode bridges cybersecurity history, human leadership, and the AI-powered future ahead.Stay Connected with our host, Raghu on LinkedInFor more information about Illumio, check out our website at illumio.com
Send us a textJoin us on this episode of Serious Privacy, as Paul Breitbarth and Ralph O'Brien present the breaking news and hot events in data protection and privacy while Dr. K Royal was out this week. Tune in for a great discussion and catch up! If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vulnerability Unifi fixed a critical vulnerability in it s Access product https://community.ui.com/releases/Security-Advisory-Bulletin-056-056/ce97352d-91cd-40a7-a2f4-2c73b3b30191 OpenAI Atlas Omnibox Prompt Injection OpenAI s latest browser can be jailbroken by inserting prompts in URLs https://neuraltrust.ai/blog/openai-atlas-omnibox-prompt-injection