The protection of computer systems from theft or damage
POPULARITY
Categories
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Scanning for exposed Anthropic Models https://isc.sans.edu/diary/Scanning%20for%20exposed%20Anthropic%20Models/32674 Notepad++ Hijacked by State-Sponsored Hackers https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/ https://notepad-plus-plus.org/news/hijacked-incident-info-update/ Insecure Websockets in OpenClaw https://zeropath.com/blog/openclaw-clawdbot-credential-theft-vulnerability Malicious OpenClaw Skills https://www.koi.ai/blog/clawhavoc-341-malicious-clawedbot-skills-found-by-the-bot-they-were-targeting Exposed OpenClaw Instances https://censys.com/blog/openclaw-in-the-wild-mapping-the-public-exposure-of-a-viral-ai-assistant
Rob Suárez, Vice President and Chief Information Security Officer at CareFirst BlueCross BlueShield joins Ann on this week's episode of Afternoon Cyber Tea. In the conversation, Rob shares how his career path and personal philosophy have shaped a mission-driven approach to cybersecurity that places patient trust, safety, and privacy at the center of every decision. He discusses the unique challenges of securing a deeply interconnected healthcare ecosystem, the critical role of culture and cyber literacy across organizations, and why transparency and resilience are essential during incidents. The episode also explores secure-by-design principles, the ethical use of AI in healthcare, and how the CISO role is evolving toward a broader focus on trust, collaboration, and human impact. Resources: View Rob Suárez on LinkedIn View Ann Johnson on LinkedIn Related Microsoft Podcasts: Microsoft Threat Intelligence Podcast The BlueHat Podcast Uncovering Hidden Risks Discover and follow other Microsoft podcasts at microsoft.com/podcasts Afternoon Cyber Tea with Ann Johnson is produced by Microsoft, Hangar Studios and distributed as part of N2K media network.
Financial security is about more than just building wealth: it's about resilience, preparation, and having the tools to weather whatever comes your way. And right now, with rising costs, market volatility, and evolving fraud risks, investors need that security more than ever.On this episode, FINRA Investor Education Foundation and Senior Vice President of Investor Education Gerri Walsh discusses what financial security really means in 2026, and how firms can help protect and empower their customers. This conversation that sits right at the heart of FINRA Forward, our commitment to evolving alongside the rapidly changing securities industry in support of our mission of protecting investors and market integrity.Resources mentioned in this episode:BrokerCheckMarket Data CenterFund AnalyzerFixed Income DataFINRA Investor Education FoundationProtecting Consumers from FraudFINRA ForwardBlog Post: FINRA Forward's Rule Modernization—An UpdateBlog Post: Vendors, Intelligence Sharing and FINRA's MissionBlog Post: FINRA Forward Initiatives to Support Members, Markets and the Investors They ServeEp. 168: Investing Wisely in 2025: Avoiding Scams and Achieving Your Financial GoalsEp. 183: Investors in the United States: Key Trends and Insights from the National Financial Capability Study Find us: LinkedIn / X / YouTube / Facebook / Instagram / E-mailSubscribe to our show on Apple Podcasts, Google Play and by RSS.
What happens when AI bots get their own social network, Silicon Valley execs cozy up to power, and Apple takes a cut from creators? This week's panel calls out the bold, bizarre, and often problematic ways tech's biggest players are reshaping everything from AI assistants to your everyday privacy. There's a social network for AI agents, and it's getting weird Moltbook is the most interesting place on the internet right now Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Site Pentagon clashes with Anthropic over military AI use, sources say Salesforce signs $5.6B deal to inject agentic AI into the US Army Angry Norfolk residents lose lawsuit to stop Flock license plate scanners SpaceX wants to put 1 million solar-powered data centers into orbit Elon Musk reportedly wants a June SpaceX IPO to align with his birthday, the planets Tesla hits a grim milestone: its second straight year of decline Tesla says production-ready Optimus robot is coming soon Microsoft reports strong cloud earnings in Q2 as gaming declines What We Learned From Meta, Microsoft and Tesla Apple tells Patreon to move creators to in-app purchase for subscriptions by November Apple CEO Tim Cook 'heartbroken' after repeated ICE killings in Minneapolis A rival smart glasses company is suing Meta over its Ray-Ban products TikTok, YouTube, and Meta are headed to court for a landmark trial over social media addiction The 'Social Media Addiction' Narrative May Be More Harmful Than Social Media Itself TikTok users freak out over app's 'immigration status' collection — here's what it means A Waymo hit a child near an elementary school in Santa Monica Autonomous cars, drones cheerfully obey prompt injection by road sign Samsung's TriFold phone will cost $2,899 in the US Groundhogs are bad at predicting weather, but they're valuable animal engineers Satellites encased in wood are in the works Belkin reminds users that its Wemo smart home products are shutting down this week Host: Leo Laporte Guests: Gary Rivlin, Devindra Hardawar, and Victoria Song Download or subscribe to This Week in Tech at https://twit.tv/shows/this-week-in-tech Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: monarch.com with code TWIT Melissa.com/twit helixsleep.com/twit canary.tools/twit - use code: TWIT expressvpn.com/twit
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Google Presentation Abuse https://isc.sans.edu/diary/Google+Presentations+Abused+for+Phishing/32668/ Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 & CVE-2026-1340) https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US Microsoft NTLM Strategy https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-windows-security-disabling-ntlm-by-default/4489526
What happens when AI bots get their own social network, Silicon Valley execs cozy up to power, and Apple takes a cut from creators? This week's panel calls out the bold, bizarre, and often problematic ways tech's biggest players are reshaping everything from AI assistants to your everyday privacy. There's a social network for AI agents, and it's getting weird Moltbook is the most interesting place on the internet right now Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Site Pentagon clashes with Anthropic over military AI use, sources say Salesforce signs $5.6B deal to inject agentic AI into the US Army Angry Norfolk residents lose lawsuit to stop Flock license plate scanners SpaceX wants to put 1 million solar-powered data centers into orbit Elon Musk reportedly wants a June SpaceX IPO to align with his birthday, the planets Tesla hits a grim milestone: its second straight year of decline Tesla says production-ready Optimus robot is coming soon Microsoft reports strong cloud earnings in Q2 as gaming declines What We Learned From Meta, Microsoft and Tesla Apple tells Patreon to move creators to in-app purchase for subscriptions by November Apple CEO Tim Cook 'heartbroken' after repeated ICE killings in Minneapolis A rival smart glasses company is suing Meta over its Ray-Ban products TikTok, YouTube, and Meta are headed to court for a landmark trial over social media addiction The 'Social Media Addiction' Narrative May Be More Harmful Than Social Media Itself TikTok users freak out over app's 'immigration status' collection — here's what it means A Waymo hit a child near an elementary school in Santa Monica Autonomous cars, drones cheerfully obey prompt injection by road sign Samsung's TriFold phone will cost $2,899 in the US Groundhogs are bad at predicting weather, but they're valuable animal engineers Satellites encased in wood are in the works Belkin reminds users that its Wemo smart home products are shutting down this week Host: Leo Laporte Guests: Gary Rivlin, Devindra Hardawar, and Victoria Song Download or subscribe to This Week in Tech at https://twit.tv/shows/this-week-in-tech Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: monarch.com with code TWIT Melissa.com/twit helixsleep.com/twit canary.tools/twit - use code: TWIT expressvpn.com/twit
What happens when AI bots get their own social network, Silicon Valley execs cozy up to power, and Apple takes a cut from creators? This week's panel calls out the bold, bizarre, and often problematic ways tech's biggest players are reshaping everything from AI assistants to your everyday privacy. There's a social network for AI agents, and it's getting weird Moltbook is the most interesting place on the internet right now Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Site Pentagon clashes with Anthropic over military AI use, sources say Salesforce signs $5.6B deal to inject agentic AI into the US Army Angry Norfolk residents lose lawsuit to stop Flock license plate scanners SpaceX wants to put 1 million solar-powered data centers into orbit Elon Musk reportedly wants a June SpaceX IPO to align with his birthday, the planets Tesla hits a grim milestone: its second straight year of decline Tesla says production-ready Optimus robot is coming soon Microsoft reports strong cloud earnings in Q2 as gaming declines What We Learned From Meta, Microsoft and Tesla Apple tells Patreon to move creators to in-app purchase for subscriptions by November Apple CEO Tim Cook 'heartbroken' after repeated ICE killings in Minneapolis A rival smart glasses company is suing Meta over its Ray-Ban products TikTok, YouTube, and Meta are headed to court for a landmark trial over social media addiction The 'Social Media Addiction' Narrative May Be More Harmful Than Social Media Itself TikTok users freak out over app's 'immigration status' collection — here's what it means A Waymo hit a child near an elementary school in Santa Monica Autonomous cars, drones cheerfully obey prompt injection by road sign Samsung's TriFold phone will cost $2,899 in the US Groundhogs are bad at predicting weather, but they're valuable animal engineers Satellites encased in wood are in the works Belkin reminds users that its Wemo smart home products are shutting down this week Host: Leo Laporte Guests: Gary Rivlin, Devindra Hardawar, and Victoria Song Download or subscribe to This Week in Tech at https://twit.tv/shows/this-week-in-tech Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: monarch.com with code TWIT Melissa.com/twit helixsleep.com/twit canary.tools/twit - use code: TWIT expressvpn.com/twit
What happens when AI bots get their own social network, Silicon Valley execs cozy up to power, and Apple takes a cut from creators? This week's panel calls out the bold, bizarre, and often problematic ways tech's biggest players are reshaping everything from AI assistants to your everyday privacy. There's a social network for AI agents, and it's getting weird Moltbook is the most interesting place on the internet right now Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Site Pentagon clashes with Anthropic over military AI use, sources say Salesforce signs $5.6B deal to inject agentic AI into the US Army Angry Norfolk residents lose lawsuit to stop Flock license plate scanners SpaceX wants to put 1 million solar-powered data centers into orbit Elon Musk reportedly wants a June SpaceX IPO to align with his birthday, the planets Tesla hits a grim milestone: its second straight year of decline Tesla says production-ready Optimus robot is coming soon Microsoft reports strong cloud earnings in Q2 as gaming declines What We Learned From Meta, Microsoft and Tesla Apple tells Patreon to move creators to in-app purchase for subscriptions by November Apple CEO Tim Cook 'heartbroken' after repeated ICE killings in Minneapolis A rival smart glasses company is suing Meta over its Ray-Ban products TikTok, YouTube, and Meta are headed to court for a landmark trial over social media addiction The 'Social Media Addiction' Narrative May Be More Harmful Than Social Media Itself TikTok users freak out over app's 'immigration status' collection — here's what it means A Waymo hit a child near an elementary school in Santa Monica Autonomous cars, drones cheerfully obey prompt injection by road sign Samsung's TriFold phone will cost $2,899 in the US Groundhogs are bad at predicting weather, but they're valuable animal engineers Satellites encased in wood are in the works Belkin reminds users that its Wemo smart home products are shutting down this week Host: Leo Laporte Guests: Gary Rivlin, Devindra Hardawar, and Victoria Song Download or subscribe to This Week in Tech at https://twit.tv/shows/this-week-in-tech Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: monarch.com with code TWIT Melissa.com/twit helixsleep.com/twit canary.tools/twit - use code: TWIT expressvpn.com/twit
The renewable energy sector faces a fundamental disconnect. Cybersecurity teams generate endless alerts and vulnerability reports, while operational managers focus on asset performance and site availability. Neither group speaks the other's language, leaving executives struggling to make informed decisions about where to invest limited resources. Rafael Narezzi, Co-Founder and CEO of Centrii, has built his company specifically to bridge this gap, translating technical cyber risks into the financial business outcomes that drive executive decision-making.Centrii, emerging from its predecessor Cyber Energia, represents a new approach to OT security in the energy sector. The name itself carries meaning: the sentinel of industrial intelligence, signified by the double I at the end. Rather than simply identifying vulnerabilities and presenting red alerts, the platform contextualizes risks in terms that matter to the business. How does a potential compromise affect your power purchase agreements? What happens to your revenue when energy prices fluctuate and your site goes offline? These are the questions that Centrii answers.The company prices its services per megawatt hour, demonstrating its commitment to speaking the language of energy rather than traditional IT security. This approach reflects a deeper understanding that renewable energy assets present vastly different risk profiles. A biomass facility with 24/7 personnel on site faces different challenges than an unmanned offshore wind installation. Solar farms, hydrogen facilities, and battery storage systems each require tailored risk assessments that account for their unique operational characteristics and regulatory requirements.Recent attacks on distributed energy resources, including the compromise of Poland's renewable grid, underscore the urgency of this work. With regulations like NERC CIP 15 in the United States, NIS 2.0 in Europe, and the UK Cyber Security Bill now holding asset owners personally accountable for cybersecurity failures, organizations can no longer afford to treat OT security as an afterthought. Narezzi observes that compliance has become the driving force pushing companies to take responsibility for their critical infrastructure assets.What sets Centrii apart is its ability to help executives identify which risks actually matter. When every cybersecurity tool reports critical alerts, organizations face paralysis. Which red is the red that demands immediate attention? Centrii provides clarity by mapping technical findings to financial impact, reputational damage, and operational consequences specific to each asset type and technology.The company's presentation at DistribuTECH 2026 focuses on battery energy storage systems, an area of explosive growth driven by data center demand and the expanding role of AI. Narezzi draws a parallel to Ocean's 11, where coordinated manipulation of power systems creates cascading failures. As batteries become essential for grid balancing, the risks of compromised dispatch commands affecting multiple installations simultaneously represent a scenario that demands serious attention from asset owners and regulators alike.Operating across 16 countries with diverse energy technologies, Centrii provides a unified platform for organizations managing hundreds of sites across different regions and regulatory environments. The goal is straightforward: give every stakeholder, from technical teams to the C-suite, a common language for understanding and acting on cyber risk in the energy sector.This is a Brand Story. A Brand Story is a ~35-40 minute in-depth conversation designed to tell the complete story of the guest, their company, and their vision. Learn more: https://www.studioc60.com/creation#fullGUESTRafael Narezzi, Co-Founder and CEO, Centriihttps://www.linkedin.com/in/narezzi/RESOURCESCentriihttps://centrii.comCyber Energiahttps://cyberenergia.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSRafael Narezzi, Centrii, Sean Martin, brand story, brand marketing, marketing podcast, brand story, OT security, renewable energy cybersecurity, battery energy storage systems, BESS, critical infrastructure protection, energy sector cybersecurity, NERC CIP, NIS 2.0, power purchase agreements, distributed energy resources, industrial intelligence, cyber risk quantification Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
In this episode of Resilience Unraveled, Dr Russell Thackeray welcomes Kate Macafoose from Chang Robotics. Kate shares her journey from civil engineering in upstate New York to her current role at Chang Robotics in Jacksonville Beach, Florida. She delves into her early career in project management and her transition into the field of automation and robotics. The discussion highlights the challenges and resilience needed in male-dominated sectors, as well as the importance of mentorship for women in STEM. Kate elaborates on how Chang Robotics is revolutionising healthcare with autonomous robots designed to assist nurses by performing nonclinical tasks, ultimately reducing their workload and improving efficiency. The conversation also touches on the development, cybersecurity, implementation, and industry-wide potential of robotic systems.00:00 Introduction and Guest Welcome00:38 Kate's Background and Career Journey02:16 Challenges in Male-Dominated Fields03:23 Women in STEM and Mentorship05:34 Introduction to Robotics06:39 Robotic Applications in Healthcare10:09 Development and Implementation of Robotics12:30 Cybersecurity in Robotics14:11 Leadership and Robotics17:18 Future of Robotics and ConclusionYou can contact us at info@qedod.comResources can be found online or link to our website https://resilienceunravelled.com#resilience, #burnout, #intuition
In this episode, Jim McDonald welcomes back Martin Kuppinger, Principal Analyst at KuppingerCole, to discuss the rapidly evolving landscape of identity in 2026. With Jeff Steadman away, Jim and Martin dive deep into the intellectual challenges posed by AI agents and the limitations of traditional non-human identity frameworks. Martin explains why organizations are feeling a sense of disillusionment with AI and how a capability-based identity fabric approach can help manage the complexity. They also explore the balance between security and business enablement, the rise of workload identities, and what to expect at the upcoming European Identity and Cloud Conference (EIC) in Berlin.Connect with Martin: https://www.linkedin.com/in/martinkuppinger/KuppingerCole: https://www.kuppingercole.comEuropean Identity and Cloud Conference (EIC) (don't forget to use our discount code idac25mko): https://www.kuppingercole.com/events/eic2026Connect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at http://idacpodcast.comTimestamps00:00 - Welcome back to 2026 and EIC preparations02:48 - The shift from future potential to current AI agent challenges03:12 - Understanding AI disillusionment and the lack of control in regulated industries05:19 - Security as a business enabler vs progress prevention09:55 - Why AI agents should not be classified simply as non-human identities11:43 - Complex relationships between humans, agents, and delegated tasks15:17 - Self-service identity for knowledge workers and AI productivity18:40 - The risks of decentralized agent creation and "shadow" AI21:58 - How AI is being baked into identity products beyond role mining26:55 - Using usage data to reduce over-entitlements34:10 - The Identity Fabric: A capability-based approach to IAM40:33 - Vendor rationalization and the flexibility of the fabric47:19 - Previewing EIC 2026 topics: Wallet initiatives and consent52:44 - Final advice: Curing symptoms vs addressing causesKeywords:IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Martin Kuppinger, KuppingerCole, IAM, AI Agents, Identity Fabric, EIC 2026, Non-Human Identity, Workload Identity, ITDR, IGA, Cybersecurity
Fastest 5 Minutes, The Podcast Government Contractors Can't Do Without
This week's episode covers developments regarding the Secure Software Development Attestation, GSA's newly release CUI guidance, GSA's RFI regarding resellers, and the Pentagon's “patent holiday” pilot, and is hosted by Peter Eyre and Yuan Zhou. Crowell & Moring's "Fastest 5 Minutes" is a biweekly podcast that provides a brief summary of significant government contracts legal and regulatory developments that no government contracts lawyer or executive should be without.
Megi Benia is a Georgian diplomat and security and foreign policy professional specialising in Russia's influence operations, NATO's collective defence posture, international cybersecurity, resilience, and transatlantic affairs. She currently serves as a Contributing Editor of New Eastern Europe. At the same time, she is an Associate Fellow at the University of Georgia's Security, Policy and Nationalism Research Center (UGSPN) and a Researcher of South-East Europe and Black Sea Region Programme for the Platform for Peace and Humanity. She is also a member of the EU CyberNet Expert Pool and a PhD candidate at Tbilisi State University, where her doctoral research examines Cybersecurity in NATO's Strategic Doctrine: Applicability of Collective Defense to Cyberspace. As a researcher and public commentator, Ms. Benia analyses Russia's evolving hybrid toolkit, U.S.-Russia strategic competition, and Black Sea regional security. She contributes to international policy discussions through op-eds, research papers, expert commentary, conference moderation, and media engagement. She is also active in academia and professional education, currently lecturing at Caucasus University, and previously teaching at the University of Georgia. She has authored multiple publications on Euro-Atlantic security, cyber diplomacy, resilience, disinformation, NATO's strategic adaptation, and arms control.----------LINKS:https://www.linkedin.com/in/megibenia/https://x.com/megibeniahttps://independent.academia.edu/MegiBeniahttps://neweasterneurope.eu/2025/08/25/as-georgia-dismantles-its-civil-service-the-kremlin-watches-and-wins/ https://gssr.georgetown.edu/the-forum/topics/technology/the-digital-shield-using-cyber-diplomacy-to-strengthen-national-cyber-resilience/ ----------SILICON CURTAIN LIVE EVENTS - FUNDRAISER CAMPAIGN Events in 2026 - Advocacy for a Ukrainian victory with Silicon Curtainhttps://buymeacoffee.com/siliconcurtain/extrasOur first live events this year in Lviv and Kyiv were a huge success. Now we need to maintain this momentum, and change the tide towards a Ukrainian victory. The Silicon Curtain Roadshow is an ambitious campaign to run a minimum of 12 events in 2025, and potentially many more. We may add more venues to the program, depending on the success of the fundraising campaign. https://buymeacoffee.com/siliconcurtain/extrasWe need to scale up our support for Ukraine, and these events are designed to have a major impact. Your support in making it happen is greatly appreciated. All events will be recorded professionally and published for free on the Silicon Curtain channel. Where possible, we will also live-stream events.https://buymeacoffee.com/siliconcurtain/extras----------SUPPORT THE CHANNEL:https://www.buymeacoffee.com/siliconcurtainhttps://www.patreon.com/siliconcurtain----------TRUSTED CHARITIES ON THE GROUND:Save Ukrainehttps://www.saveukraineua.org/Superhumans - Hospital for war traumashttps://superhumans.com/en/UNBROKEN - Treatment. Prosthesis. Rehabilitation for Ukrainians in Ukrainehttps://unbroken.org.ua/Come Back Alivehttps://savelife.in.ua/en/Chefs For Ukraine - World Central Kitchenhttps://wck.org/relief/activation-chefs-for-ukraineUNITED24 - An initiative of President Zelenskyyhttps://u24.gov.ua/Serhiy Prytula Charity Foundationhttps://prytulafoundation.org----------
In this episode, we explore a problem that refuses to go away: the near-impossible task many immigrants in Spain face when trying to secure appointments for their NIE (foreign identity number) or TIE (foreign identity card). Cybersecurity expert René Serral from UPC breaks down what is happening behind the scenes of the 'cita previa' appointment system – and what could be done to fix it. Law professor Natalia Caicedo examines whether the Spanish government is meeting its legal obligations toward newcomers. Honduran-born activist Carmen Juares describes how migrants are "treated as second-class citizens," calling the process of regularising legal status "a continuous obstacle course." We also hear directly from Catalan News readers, many of whom got in touch to share their own experiences navigating the system. With Lorcan Doherty and Oriol Escudé.
Nashville woke up to the strangest Christmas soundtrack imaginable in 2020: an RV parked on 2nd Avenue, a calm recorded warning to evacuate… and “Downtown” playing like a twisted holiday playlist no one asked for. We are going to walk through the accepted timeline of the Christmas Day bombing, what investigators say happened, and what the FBI concluded about the man behind it.Then we follow the story into the weird side streets, where reality starts to bend. Reincarnation loops. “High energy events.” Alleged reptilian watchers in the woods. A camping trip that turned into a front-row seat to paranoia, strange gear, and a belief that something evil was hiding in plain sight.We'll separate confirmed facts from internet fog, explore what fringe and UFO circles claim it all really meant, and bring it home with the uncomfortable truth: sometimes the most unsettling part isn't the conspiracy… it's how fast a mind can build one when everything else is falling apart. All that and more this week on Hysteria 51!Special thanks to this week's research sources:PRIMARY / OFFICIAL1) FBI Nashville Field Office. “FBI Releases Report on Nashville Bombing.” March 15, 2021.https://www.fbi.gov/contact-us/field-offices/nashville/news/fbi-releases-report-on-nashville-bombing2) FBI Nashville Field Office. “Seeking Information Concerning Operator or Owner of RV Linked to Explosion.” December 25, 2020.https://www.fbi.gov/contact-us/field-offices/nashville/news/seeking-information-concerning-operator-or-owner-of-rv-linked-to-explosion3) FBI Nashville Field Office. “FBI Memphis Special Agent in Charge Announces Identity of Remains Discovered in Nashville Explosion Site; Multi-Agency Investigation Continues.” December 27, 2020.https://www.fbi.gov/contact-us/field-offices/nashville/news/fbi-memphis-special-agent-in-charge-announces-identity-of-remains-discovered-in-nashville-explosion-site-multi-agency-investigation-continues4) Cybersecurity and Infrastructure Security Agency (CISA). “SAFE-COM and NCSWIC Release Communications Dependencies Case Study: Nashville.” June 13, 2022.https://www.cisa.gov/news-events/news/safecom-and-ncswic-release-communications-dependencies-case-study-nashville LOCAL / INVESTIGATIVE REPORTING5) Finley, Jeremy (WSMV4 Investigates). “FBI: Nashville Christmas Day bomber wanted explosion to break ‘reincarnation loop' (New photos show Anthony Warner's device…).” December 22, 2025.https://www.wsmv.com/2025/12/22/fbi-nashville-christmas-day-bomber-wanted-explosion-break-reincarnation-loop/6) Hall, Ben & Wisniewski, Kevin (NewsChannel 5 Investigates / WTVF). “Nashville bomber's bizarre writings reveal belief in aliens and lizard people.” January 4, 2021.https://www.newschannel5.com/news/newschannel-5-investigates/nashville-bombers-bizarre-writings-reveal-belief-in-aliens-and-lizard-people NATIONAL / WIRE REPORTING7) ABC News. “FBI report finds Nashville bomber wanted to kill himself, not motivated by terrorism.” March 15, 2021.https://abcnews.go.com/Politics/fbi-report-finds-nashville-bomber-wanted-kill-motivated/story?id=764710788) PBS NewsHour. “FBI says Nashville bomber driven by conspiracies, paranoia.” March 15, 2021.https://www.pbs.org/newshour/nation/fbi-says-nashville-bomber-driven-by-conspiracies-paranoia9) Associated Press. “FBI: Nashville bomber sent material to ‘acquaintances'.” (Published January 2, 2021.)https://apnews.com/article/us-news-bombings-8d59b300ed4b41d050a8cc86f500351a10) CBS News. “Nashville bomber sent writings espousing conspiracy theories to multiple people before explosion.” January 3, 2021.https://www.cbsnews.com/news/nashville-bomber-anthony-quinn-sent-conspiracy-theories-to-people-before-explosion/11) Reuters. “Nashville bombing suspect may have believed in lizard people, aliens — source.” January 3, 2021.https://www.reuters.com/world/us/nashville-bombing-suspect-may-have-believed-lizard-people-aliens-source-2021-01-03/12) Reuters. “‘He was not on our radar': authorities search for motive in Nashville blast.” December 29, 2020.https://www.reuters.com/world/us/he-was-not-our-radar-authorities-search-motive-nashville-blast-2020-12-28/13) Reuters. “Motor home explodes in Nashville, possible human remains found near site.” December 26, 2020.https://www.reuters.com/world/us/motor-home-explodes-nashville-possible-human-remains-found-near-site-2020-12-26/14) NBC (via NBC San Diego). “Feds probing if Nashville bomber believed in lizard people conspiracy.” December 30, 2020.https://www.nbcsandiego.com/news/national-international/feds-probing-if-nashville-bomber-believed-in-lizard-people-conspiracy/2483371/ FACT CHECKS15) Reuters Fact Check. “Debunking conspiracy links between Nashville explosion and Dominion.” December 29, 2020.https://www.reuters.com/article/world/fact-check-debunking-conspiracy-links-between-nashville-explosion-dominion-and-idUSKBN2931AJ/16) PolitiFact. “No, AT&T was not conducting an audit of Dominion Voting Systems machines in Nashville.” December 29, 2020.https://www.politifact.com/factchecks/2020/dec/29/facebook-posts/no-t-was-not-conducting-audit-dominion-voting-syst/17) Associated Press Fact Check. “AT&T not conducting voting machine audit near Nashville after explosion.” December 28, 2020.https://apnews.com/article/fact-checking-989820964118) WRAL. “Fact check: 3 conspiracy theories about the Nashville bombing.” December 30, 2020.https://www.wral.com/story/fact-check-3-conspiracy-theories-about-the-nashville-bombing/19450775/ CONTEXT / BACKGROUND19) Business Insider. “Lizard-people conspiracy theory origins (and why it resurfaced after the Nashville bombing).” January 7, 2021.https://www.businessinsider.com/lizard-people-conspiracy-theory-origin-nashville-bomber-qanon-2021-120) War on the Rocks. “The Nashville Bombing and Threats to Critical Infrastructure: We Saw This Coming.” December 31, 2020.https://warontherocks.com/2020/12/the-nashville-bombing-and-threats-to-critical-infrastructure-we-saw-this-coming/21) Domestic Preparedness (Kelly, Robert F. & Alexander, Dean C.). “Four Takeaways From the Nashville Christmas Bombing.” July 20, 2022.https://domesticpreparedness.com/cbrne/four-takeaways-from-the-nashville-christmas-bombing/22) DataCenterDynamics (Moss, Sebastian). “FBI does not believe Nashville bomber was targeting AT&T.” August 13, 2021.https://www.datacenterdynamics.com/en/news/fbi-does-not-believe-nashville-bomber-was-targeting-att/23) Axios. “Girlfriend told police Nashville man was building bombs year before explosion.” December 30, 2020.https://www.axios.com/2020/12/30/nashville-anthony-warner-bombsEmail us your favorite WEIRD news stories:weird@hysteria51.comSupport the Show:Get exclusive content & perks as well as an ad and sponsor free experience at https://www.patreon.com/Hysteria51 from just $1Shop:Be the Best Dressed at your Cult Meeting!https://www.teepublic.com/stores/hysteria51?ref_id=9022See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network Google dismantled the IPIDEA network that used residential proxies to route malicious traffic. https://cloud.google.com/blog/topics/threat-intelligence/disrupting-largest-residential-proxy-network Fake Clawdbot VS Code Extension Installs ScreenConnect RAT The news about Clawdbot (now Moltbot) is used to distribute malware, in particular malicious VS Code extensions. https://www.aikido.dev/blog/fake-clawdbot-vscode-extension-malware Threat Bulletin: Critical eScan Supply Chain Compromise Anti-virus vendor eScan was compromised, and its update servers were used to install malware on some customer systems. https://www.morphisec.com/blog/critical-escan-threat-bulletin/
This Follower Friday on The Green Insider spotlights the powerhouse UTSI podcast series and the cutting‑edge conversations shaping the future of OT. Mike Nemer and Shaun Six break down the latest in OT innovation, AI, security, and energy efficiency, while showcasing standout partners like Sequre Quantum, Siemens, BlastWave, and EdgeRealm. It's a dynamic deep dive into why OT cybersecurity is becoming mission‑critical for today's infrastructure leaders — and how collaboration, education, and next‑gen technology are driving the industry forward. UTSI Podcast Series Conclusion Final episode of a six‑part podcast series sponsored by UTSI International. Features reflections from Mike Nemer and Shaun Six (CEO, UTSI International) on relationships built during the series. Emphasis on OT cybersecurity as a core theme. Emergent insight: AI's environmental impact surfaced as an unintended but compelling storyline. Episode structure includes a brief series recap, a short CEO segment (8–10 minutes), and post‑production editing support. Critical Infrastructure Security Challenges UTSI's 40‑year history supporting critical infrastructure is underscored. Industry challenges highlighted: Talent shortage (≈5 engineers leaving for every 1 entering). Rapid increase in connectivity of critical infrastructure devices. AI positioned as a force multiplier for operators—but also a potential attack vector if data is exposed. Partnerships discussed: Sequre Quantum – quantum random number generators. BlastWave – insights into AI's dual role as defender and risk. Focus on showcasing technologies that secure operations and protect infrastructure from emerging threats. AI Data Center Energy Solutions Collaboration with Siemens (via Alyssa) on AI's impact on data centers. Key concerns: rising energy and water consumption driven by AI workloads. Edge Realm highlighted for improving energy density at the edge to reduce strain. Introduction of LeakGeek, a rapid leak detection and response tool. Work with EdgeRealm also addresses illegal hot tapping and oil theft, noted as more common than publicly acknowledged. OT Cybersecurity: Collaboration and Education Strong focus on securing operational technology (OT) and industrial control systems. Call for improved private–public collaboration and information sharing. Many cyberattacks go unreported to avoid reputational damage. Attack vectors increasingly include everyday devices (e.g., printers, fax machines). Ransomware incidents can cost organizations millions of dollars per day. Emphasis on educating boards and investors about OT cybersecurity risks and value. UTSI OT Cybersecurity Partnership UTSI's approach includes: Cloaking OT systems. Securing remote access. Improving visibility and auditability of networks. Recognition of sponsorship and education value of a six‑part cybersecurity series. Closing remarks focused on partnership, knowledge sharing, and raising cybersecurity awareness. A special shout out the guest in this UTSI podcast series, Paulina Assmann, Alissa Nixon, Tom Sego, Frank Stepic, and Robert Hilliker. To be an Insider Please subscribe to The Green Insider powered by ERENEWABLE wherever you get your podcast from and remember to leave us a five-star rating. This podcast is sponsored by UTSI International. To learn more about our sponsor or ask about being a sponsor, contact ERENEWABLE and the Green Insider Podcast. The post Breaking Down OT Cybersecurity: Highlights from UTSI's Six‑Part Series appeared first on eRENEWABLE.
Through The Pines Ep. 93 - 2026 Financial Landscape & How to Navigate On this episode of Through The Pines we'll cover the 2026 Financial Landscape when I comes to… Investing AI Interest Rates & Monetary Policy Inflation & Tariff Impacts Geopolitical & Policy Shifts Global Diversification & Emerging Markets Cryptocurrency & Digital Assets Private Markets & Alternatives Labor Market & Consumer Resilience Cybersecurity, Fraud, and Regulatory Evolution Welcome to a Financial Planning Podcast with a down to earth vibe Sasquatch listens while combing out his glorious lochs of fur, this is Through the Pines. Our Advisors for this episode, we welcome back Rex Baxter and Brandyn Smith from planwithbaxter.com 2023, 2024 & 2025 Forbes Best in State Wealth Management Teams For Utah - Advisor Hub Fastest Growing Advisors to Watch under 1 Billion - Receivers of the Ameriprise Client Experience Award - Financial Advisors: Baxter, Smith & Associates Contact: rex.m.baxter@ampf.com Website: planwithbaxter.com ____________________________________ This podcast was produced by The Banyan Collective and recorded in our camp trailer studio located inside the Monarch Building inside the 9 Rails Arts District on Historic 25th Street in Ogden, Utah. ***Find value in this podcast, consider supporting us here: https://www.buymeacoffee.com/banyanmedia WATCH & SUBSCRIBE to us on YouTube @throughthepines LIKE our Facebook Page: https://www.facebook.com/pinespodcast Follow our Instagram: https://www.instagram.com/pines_podcast/ Through the Pines - Reminding you to use Yesterday's Dollars to Finance Tomorrow's Dreams. **** This episode includes financial advice from professionals. Visit the financial planners in this podcast at www.planwithbaxter.com The Banyan Collective & Host, R. Brandon Long are not the financial professionals - podcast pro's, maybe - money men, not so much. Through the Pines Podcast Copyright, The Banyan Collective - 2025 #podcast #money #wealth #retirement #financialplanning #finances #networth
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Odd WebLogic Request. Possible CVE-2026-21962 Exploit Attempt or AI Slop? We are seeing attempts to attack CVE-2026-21962, a recent weblog vulnerability, using a non-working AI slop exploit https://isc.sans.edu/diary/Odd%20WebLogic%20Request.%20Possible%20CVE-2026-21962%20Exploit%20Attempt%20or%20AI%20Slop%3F/32662 Fortinet Patches are Rolling Out Fortinet is starting to roll out patches for the recent SSO vulnerability https://fortiguard.fortinet.com/psirt/FG-IR-26-060 SolarWinds Web Helpdesk Vulnerability Another set of vulnerabilities in SolarWinds Web Helpdesk may result in unauthenticated system access https://horizon3.ai/attack-research/cve-2025-40551-another-solarwinds-web-help-desk-deserialization-issue/
All links and images can be found on CISO Series. Check out this post by Patrick Garrity of VulnCheck for the discussion that is the basis of our conversation on this week's episode, co-hosted by David Spark, the producer of CISO Series, and Steve Zalewski. Joining them is Tom Doughty, CISO, Generate:Biomedicines. In this episode: The 3Ms of product clarity Buzzwords work because buyers aren't experts Investor pressures distort messaging Threading the needle Huge thanks to our sponsor, Alteryx Alteryx is a leading AI and data analytics company that powers actionable insights that help organizations drive smarter, faster decisions. Alteryx One helps security, risk, and operations leaders cut hours of manual work to minutes, generate trusted insights at scale, and turn raw data into action faster than ever. Learn more at www.alteryx.com.
This episode is a part of a special series of interviews conducted at the INCH360 Cybersecurity Conference in Spokane, Washington. Visit their website to learn more about INCH360 and their mission. Host Jethro D. Jones interviews Ryan Nelson from IBM's X-Force about the realities of incident response in cybersecurity. Ryan shares insights into handling cyberattacks, the importance of adaptability, and the role of communication and teamwork during high-stress investigations. The conversation also covers working with law enforcement, threat intelligence, and lessons learned from real-world breaches.
Most startup pain doesn't come from product; it comes from people. In this episode, Lisa Novak, Founder of LMNHR, pulls back the curtain on the most common HR and culture mistakes she's seen across high-growth tech companies, and how to fix them before they derail momentum.Lisa explains how fractional HR leadership gives startups access to senior-level expertise without the full-time overhead, and why getting people strategy right early can fuel growth, strengthen culture, and protect revenue. Whether you're hiring your first employee or scaling past 100, this episode offers practical insights you can apply immediately.
With the advent of the digital age, individuals rely on countless personal devices, each one expanding their exposure to cybercrime. Missing one or two software updates may seem harmless, but this common negligence leaves us vulnerable to cyberattacks. With the number of individuals falling prey to cybercrime increasing on a yearly basis, we must ask: Why have established cybersecurity measures failed to halt or slow down the activity of cybercriminals? And what can we do to better protect ourselves and others?In this episode, Shane interviews Greg Oslan, chairman and CEO of the National Cybersecurity Center, on how we can do just that. Oslan has previously served as a managing partner at One Strategy Group consulting, CEO of Arturo, and a strategic adviser for the US Department of Homeland Security. His wide-ranging experience with this matter helps us make sense of how we can become safer online.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.
In this episode of Manufacturing Hub, Vlad Romanov and Dave Griffith sit down with Benson Hougland from Opto 22 to get brutally practical about what is actually running on shop floors today, and what it takes to move from legacy automation to modern, data ready operations without breaking what already works. If you have ever walked into a plant and seen a mix of decades old controllers, manual processes, islands of automation, and a few shiny modern pockets of connectivity, this conversation will feel very familiar. Benson has spent roughly three decades at Opto 22 and he has seen the full spectrum, from brownfield realities where nothing can go down, to greenfield expansions where teams can finally design with data, security, and integration in mind.A major thread in this discussion is the gap between “the machine runs” and “the business can learn from the machine.” Benson lays out why so many facilities still operate in a world of siloed equipment with minimal visibility, and why digital transformation stalls when the goal is vague or driven by trend chasing. The most actionable insight is simple: start with a real problem, win small, build trust in the data, and only then scale. That approach is how you avoid proof of concept purgatory, and it is also how you get leadership buy in without overpromising. If you are looking at industrial AI, it becomes even more critical, because manufacturing cannot tolerate hallucinated answers. Benson explains why industrial AI starts with sanctity of data, meaning clean, contextualized, trustworthy signals that an organization can actually act on.You will also hear a grounded take on why hardware still matters in 2026. Not because everyone wants to rip and replace working PLCs, but because modern plants need layered edge strategies that can extract the right data, protect legacy assets, and integrate upward using open methods.About the guestBenson Hougland is a long time leader at Opto 22, a US based manufacturer of industrial controllers, edge devices, and IO. He focuses on customer and integrator feedback, product strategy, and the practical challenges teams face when modernizing systems while keeping operations running. Opto 22 is known for building and manufacturing in the United States and for leaning into open connectivity approaches that help reduce lock in and simplify integration.About the hostsVlad Romanov is an electrical engineer with an MBA from McGill University and over a decade of experience delivering automation and modernization work across high performing manufacturing environments. Through Joltek, Vlad supports manufacturers with plant floor assessments, controls and OT architecture, system modernization planning, integration execution, and technical upskilling so teams can own their systems long term. Vlad's work consistently sits at the intersection of reliability, operational execution, and the realities of IT and OT convergence, with a focus on what is feasible in real facilities, not just what looks good in a slide deck.Dave Griffith is a long time manufacturing and automation practitioner focused on bridging the gap between modern technology conversations and what is practical on the plant floor. Dave brings a systems mindset to modernization, with a strong emphasis on outcomes, maintainability, and the human factors that decide whether projects scale or stall.If this episode resonates and you are navigating modernization decisions, especially around OT networking, data infrastructure, platform selection, or plant floor security, Joltek can help you evaluate your current state, define a realistic target architecture, and build a roadmap that your team can execute.Joltek linkshttps://www.joltek.com/serviceshttps://www.joltek.com/education/ot-networking-fundamentalsTimestamps00:00:00 Welcome back and the hardware focused modernization theme00:01:40 Benson Hougland background, entrepreneur to controls to Opto 2200:04:10 A garage manufacturing story and the lessons of building real product00:09:00 The gap between cutting edge plants and manual, siloed operations00:11:10 What actually blocks modernization, capital, planning, and alignment00:13:10 Start small, solve a real problem, and build trust in outcomes00:14:40 Proof of concept purgatory and why leadership buy in changes everything00:17:50 Industrial AI needs data, and data integrity becomes the non negotiable00:22:30 Obsolescence, cybersecurity, and simplifying the industrial tech stack00:28:20 Cybersecurity is a process, not a product, and why defaults are deadly00:37:10 Linux at the edge, containers, and why modern controllers are like smartphones00:53:10 ProveIt and the virtual factories approach, real data, real integration paths
Independent medical practice is under siege, according to Rep. Greg Murphy (R-NC). Murphy, a practicing physician for over 30 years, joins the Rundown to discuss the "explosion" of insurance claim denials and the "destruction of medicine" caused by what he calls vertical integration and the corporate takeover of healthcare. He breaks down the GOP's plan to restore marketplace competition, the debate over Affordable Care Act (ACA) subsidies, and why he believes the current system prioritizes corporate profit over medical necessity. TikTok is set to remain in the U.S. following a deal granting American entities majority ownership, ending the immediate threat of a nationwide ban. But does this restructuring resolve concerns over data privacy and the safety of young users? Cybersecurity expert John Cofrancesco joins to discuss whether the deal addresses the national security risks that sparked the ban, the legal battles over social media addiction, and the race to outpace China in artificial intelligence. Plus, commentary by FOX News contributor Tom Shillue. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Design for Security from the Start: Making Medical Device Cybersecurity More ResilientMedTech innovation is revolutionizing healthcare but is also introducing new cyberattack vectors that can put manufacturers, hospitals, and patients at risk.In Episode 44 of the MedTech Speed to Data Podcast, Key Tech VP of Business Development Andy Rogers and Senior Computer Engineer Jamie Kendall discuss the FDA's latest cybersecurity guidance.Need to knowSmart, connected devices have greater risks — Medical devices are emerging vectors for bad actors targeting the healthcare industry.FDA's 2025 cybersecurity guidance update — The agency recommends risk-based development frameworks to make device cybersecurity more resilient.Clarifying “cyber devices” — The FDA's guidance applies to any medical device that runs software and could connect to the Internet.The nitty-gritty“Cybersecurity was always baked into our process,” Jaime explains. More specifically, Key Tech has adapted the TIR57 risk-based standard for managing medical device security to the new rules. “[The FDA's] 2023 guidance really laid the groundwork for our latest process. We've tweaked it slightly with the [latest update]. There are more explicit documentation requirements around vulnerability monitoring and more details on the software bill of materials (SBOMs).”Jamie goes on to describe how Key Tech's cybersecurity risk management plan informs product development. The security team starts by developing a threat model based on evaluations of data flows, data storage, and the cybersecurity activities protecting that data. “One of the first things that we always do is a threat model. This is a visual model of the system to show the elements of the device, where data is flowing, and where your trust boundaries are. This is a one-page, digestible visual that everyone can look at, assess, and go ‘yep, that makes sense' and then build your initial architecture and risk assessment based on that.”The security team documents the resulting security architectures using the FDA's recommended views:Global System View: Describes how software integrates with hardware and networks and the associated cybersecurity mitigations.Multi-Patient Harm View: Identifies mitigations for vulnerabilities or failures that could compromise multiple devices and harm multiple patients.Updateability/Patchability View: Summarizes the end-to-end process for distributing software updates and patches, especially if manufacturers do not control the entire path.Security Use Case View: Documents scenarios in which vulnerabilities can compromise the device's safety or effectiveness.“To give a sense of scale,” Jamie says, “this isn't one or two documents. It's a pretty large effort, and it's one of those things that you want to start early in your development process.”Data that made the difference:Throughout his conversation with Andy, Jamie shares some of the lessons Key Tech has learned about designing secure medical devices, including:Design for security from the beginning. Late changes are expensive, especially once in pre-production or after your FDA submission.Avoid cyber rabbit holes. Rather than addressing every possible threat, use data and risk to prioritize the real threats.Don't roll your own cybersecurity. Stick to standard practices, or you risk introducing unknown, novel vulnerabilities.Fully document your SBOMs. Standard libraries introduce layers of dependencies that you must understand. That's the only way to control your exposure to new vulnerabilities.Design devices that are truly safe. Cybersecurity risks are real. Don't treat compliance as a check box.Watch the whole conversation in the video below to learn more about designing for cybersecurity, the importance of third-party penetration testing, and more.
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Stop ransomware without the hassle. Allow what you need and block the rest with ThreatLocker Zero Trust Platform — simple to deploy, simple to manage: https://www.threatlocker.com/dailycyber Check out Flare.io Academy at https://simplycyber.io/flare Embrace Enterprise AI and try Airia for free today: https://airia.com/register/?utm_source=daily_cyber_threat_brief&utm_medium=podcast&utm_campaign=q12026 Check out Pay-What-You-Can Antisyphon Training: https://simplycyber.io/antisyphon SC Academy - The Place for Cyber Careers: https://zpr.io/mYV5232V66Qn Join SC Discord: https://SimplyCyber.io/Discord News: https://cisoseries.com Follow SC: https://simplycyber.io/socials
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Stop ransomware without the hassle. Allow what you need and block the rest with ThreatLocker Zero Trust Platform — simple to deploy, simple to manage: https://www.threatlocker.com/dailycyber Check out Flare.io Academy at https://simplycyber.io/flare Embrace Enterprise AI and try Airia for free today: https://airia.com/register/?utm_source=daily_cyber_threat_brief&utm_medium=podcast&utm_campaign=q12026 Check out Pay-What-You-Can Antisyphon Training: https://simplycyber.io/antisyphon SC Academy - The Place for Cyber Careers: https://zpr.io/mYV5232V66Qn Join SC Discord: https://SimplyCyber.io/Discord News: https://cisoseries.com Follow SC: https://simplycyber.io/socials
Overview: Exploring the Future of MSPs: AI, Cybersecurity, and Building Trust In this episode of the SMB Community Podcast, host James Kernan interviews Tim Thomson, founder of Cyber Trends, who shares insights on the future opportunities for Managed Service Providers (MSPs) in 2026. They discuss the role of AI and automation, the importance of cybersecurity and compliance, and strategies for proving value to clients. Tim explains his journey from founding his first MSP in 2002 to building a consulting firm that helps MSPs grow and scale. He emphasizes the need for MSPs to build personal brands and leverage partnerships to succeed in an evolving industry. The episode provides actionable advice for MSPs looking to capitalize on technology trends and improve their business outcomes. --- Chapter Markers: 00:00 Introduction to the SMB Community Podcast 00:26 Meet Tim: From MSP Founder to Consultant 02:07 Tim's Journey: Building and Scaling an MSP 04:29 Tim's Consulting Firm and Services 07:06 Opportunities for MSPs in 2026: AI and Automation 17:21 Cybersecurity and Compliance: A Growing Need 21:36 Proving Your Value: Building Trust and Personal Branding 30:01 Conclusion and Contact Information --- New Book Release: I'm proud to announce the release of my new book, The Anthology of Cybersecurity Experts! This collection brings together 15 of the nation's top minds in cybersecurity, sharing real-world solutions to combat today's most pressing threats. Whether you're an MSP, IT leader, or simply passionate about protecting your data, this book is packed with expert advice to help you stay secure and ahead of the curve. Available now on Amazon! https://a.co/d/f2NKASI --- Sponsor Memo: Since 2006, Kernan Consulting has been through over 30 transactions in mergers & acquisitions - and just this past year, we have been involved in six (6). If you are interested in either buying, selling, or valuation information, please reach out. There is alot of activity and you can be a part of it. For more information, reach out at kernanconsulting.com
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Initial Stages of Romance Scams [Guest Diary] Romance scams often start with random text messages that appear to be misrouted . This guest diary by Faris Azhari is following some of the initial stages of such a scam. https://isc.sans.edu/diary/Initial%20Stages%20of%20Romance%20Scams%20%5BGuest%20Diary%5D/32650 Denial of Service Vulnerabilities in React Server Components Another folowup fix for the severe React vulnerability from last year, but now only fixing a DoS condition. https://github.com/facebook/react/security/advisories/GHSA-83fc-fqcc-2hmg OpenSSL Updates OpenSSL released its monthly updates, fixing a potential RCE. https://openssl-library.org/news/vulnerabilities/ Kubernetes Remote Code Execution Via Nodes/Proxy GET Permission Many Kubernetes Helm Charts are vulnerable to possible remote code executions due to unclear defined access controls. https://grahamhelton.com/blog/nodes-proxy-rce
Send us a textIn this powerhouse episode, Joey Pinz sits down with one of cybersecurity's most influential builders—a serial market maker who has helped shape some of the industry's most iconic companies. From Sourcefire and Fortinet to Cylance, Javelin, and now Sevco Security, Fitz brings unmatched perspective on what separates successful cyber companies from the rest—and what MSPs must do now to stay relevant.Fitz breaks down why visibility is the core of modern security, why most organizations still don't actually know what assets they have, and how exposure management has become the foundation of cyber resilience. He also explains where the real money is flowing in the MSP/MSSP space, the biggest mistakes founders still make, and what MSPs must do to move confidently into security services.On the personal side, Fitz shares insights from a life built around curiosity, communication, and impact—shaped by early roles at Coca-Cola during the Olympics, BMC, Compaq, and decades of startup leadership. His mission today? Protect the planet through better security, better intelligence, and smarter business decisions.
Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Host Jennifer Harris, Chief of Media Services, joins Wade Haubert, Emergency Manager, and George Jenkins, Information Security Officer, to discuss the importance of cybersecurity and what steps Charles County Government are taking to ensure the information of all its residents are safe and secure.Thanks for listening. If you like this podcast and want to hear more, search Charles County Government on Apple Podcast, Spotify or where ever you get your podcast - and be sure to like and subscribe. We're also available on YouTube. Search Charles County Commissioners And Stay Connected for all County news, information, and programs by visiting www.CharlesCountyMD.gov/StayConnected
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Scanning Webserver with pwd as a Starting Path Attackers are adding the output of the pwd command to their web scans. https://isc.sans.edu/diary/x/32654 Microsoft Office Security Feature Bypass Vulnerability CVE-2026-21509 Microsoft released an out-of-band patch for Office fixing a currently exploited vulnerability. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509 Exposed Clawdbot Instances Many users of the AI tool clawdbot expose instances without access control. https://x.com/theonejvo/status/2015485025266098536
OAuth is a widely used authorization (not authentication) protocol that lets a resource owner grant access to a resource using access tokens. These tokens define access attributes, including scope and length of time. OAuth can be used to grant access to human and non-human entities (for example, AI agents). OAuth is increasingly being abused by... Read more »
In this episode of The Jason Cavness Experience, Jason sits down with Akalpit Gadre, a technologist and founder with deep experience in technical leadership, cloud computing, cybersecurity, and emerging technologies. Akalpit shares his journey as a foundry entrepreneur, how he approaches building technology-driven companies, and what strong technical leadership looks like in practice. He talks about navigating complexity in cloud systems, the importance of security-first thinking, and how founders and technical leaders should evaluate new technologies without getting distracted by hype. The conversation also explores problem-solving at scale, decision-making under uncertainty, and what it takes to build resilient systems and teams in fast-moving technical environments. This episode is especially valuable for founders, engineers, and operators building products in AI, cloud, and security-focused spaces. Topics Discussed • Akalpit's background and path into technical leadership • What it means to be a foundry entrepreneur • Building and scaling cloud-based systems • Cybersecurity as a foundational design principle • Evaluating new technologies without chasing hype • Leadership lessons from technical teams • Problem-solving in complex systems • Balancing innovation with reliability • How founders should think about technical tradeoffs • Long-term thinking in engineering and architecture Connect with Akalpit Gadre LinkedIn: https://www.linkedin.com/in/akalpit-gadre/ Website: https://www.othentk.com/ Connect with Jason Cavness LinkedIn: https://www.linkedin.com/in/jasoncavness Instagram: https://www.instagram.com/thejasoncavnessexperience/ TikTok: https://www.tiktok.com/@jasoncavness Podcast: https://www.thejasoncavnessexperience.com
OAuth is a widely used authorization (not authentication) protocol that lets a resource owner grant access to a resource using access tokens. These tokens define access attributes, including scope and length of time. OAuth can be used to grant access to human and non-human entities (for example, AI agents). OAuth is increasingly being abused by... Read more »
What if the simple act of writing could help you betterunderstand yourself, process emotions more effectively, and make clearerdecisions in life and business?In this episode of Give A Heck, I sit down with MicheleNovack, a cybersecurity leader, entrepreneur, author, and empath who hasspent decades navigating high-pressure environments while doing deep innerwork. Michele shares how journaling became one of her most trusted tools forself-awareness, emotional clarity, and breaking long-standing mental patterns.This conversation explores how mindset change actuallyhappens, why self-awareness is foundational to mental health, and how empathscan manage emotional overload without losing their compassion. We also examinefear in entrepreneurship, the role of boundaries in resilience, and why innerclarity directly impacts leadership, decision-making, and purpose-drivenliving.This episode bridges personal growth with real-worldresponsibility, showing how inner work and professional integrity go hand inhand.⭐ Key Takeaways• How journaling supports emotional awareness and mentalclarity• Why self-awareness is the foundation of mindset change and mental health• How empaths can manage emotional overload without shutting down• Why boundaries are essential for resilience, leadership, and relationships• How fear and learned behaviour influence entrepreneurial decisions• Why mindset discipline supports confident decision-making• The often-overlooked cybersecurity risks facing small businesses
What if AI could make you a better fraud investigator?This week I sit down with JR Kunkle, an IT professional with over three decades of experience in IT risk and project management. JR isn't just talking theory—he's actually using AI tools like Claude and Gemini in his daily work, and he shares his hands-on approach to leveraging these tools for professional writing and analysis.We dig into the cybersecurity trends that should be keeping fraud professionals up at night, why organizational transparency remains such a persistent challenge, and what's really going wrong in the accounting and audit sectors.Whether you're curious about integrating AI into your investigative toolkit or you want to understand the IT risks that enable fraud in the first place, JR brings practical insights from someone who's been in the trenches for 30+ years.Connect with JR:
In this episode of Gov Tech Today, Russell Lowery and Jennifer Saha delve into the recently released governor's budget, focusing on its implications for technology initiatives. They discuss the significant role of AI, legacy system updates, and the governor's approach to AI regulation. The duo also explores state procurement changes, including the growing use of RFI2 and the introduction of climate-aligned contracts. With insights on the Middle Mile Broadband initiative and the complexity of state budgets, this episode provides a comprehensive overview of California's tech and budget landscape.00:00 Introduction and Hosts00:13 Governor's Budget Overview01:45 AI's Role in the Budget03:09 AI Regulation and Legislation05:59 Cybersecurity and Staffing Issues07:41 Middle Mile Broadband Initiative11:14 State Procurement Changes17:28 Climate-Aligned Contracts and Final Thoughts
On Season 5 of The Tea on Cybersecurity, one thing became clear: security is not a one-and-done deal. It's a continuous journey.In this episode, host Jara Rowe wraps up the season by highlighting the key takeaways and tackling the biggest myths and misconceptions in cybersecurity and compliance. She also discusses how businesses can future-proof their security posture by focusing on Continuous Threat Exposure Management (CTEM).Tune in to hear actionable advice for 2026 and beyond to keep your business secure as cybersecurity keeps evolving. Key takeaways:The importance of continuous security and complianceHow to keep up with changing frameworks and avoid compliance pitfallsPractical security strategies you can implement todayNeed a partner to help you get on the right path with everything we talked about this season? Visit Trava Security to explore how our integrated services can transform security from a cost center into a competitive advantage: https://travasecurity.com/travas-servicesEpisode highlights:(00:00) Key lessons of Season 5(01:22) Debunking common compliance myths(03:19) How to future-proof your security strategy(06:51) Cybersecurity tips you can apply todayConnect with the host:Jara Rowe's LinkedIn - @jararoweConnect with Trava:Website - www.travasecurity.comBlog - www.travasecurity.com/learn-with-trava/blogLinkedIn - @travasecurityYouTube - @travasecurity
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Cybersecurity in 2026 is more dangerous—and more invisible—than ever. Passwords are still the weakest link, with over 6 billion stolen in the past year alone, including common ones like 123456 and admin. Yet, despite decades of awareness, predictable passwords remain the primary entry point for hackers. Meanwhile, attacker tactics have evolved from noisy, overt breaches to stealthy, living-off-the-land operations—using legitimate tools like VPNs, DNS tunneling, and even marketing infrastructure like Kataro to hide in plain sight.Join me as I dive into the latest breach and compromise reports, revealing how adversaries made a strategic pivot to resilience and invisibility. You'll discover how threat actors have shifted focus from traditional malware to infrastructure abuse, leveraging open-source projects, cloud services, and commercial-grade tools to stay under the radar. Learn about the top attack techniques, from privilege escalation to command-and-control protocols, and get insights on how defenders can adapt in an era where the perimeter no longer exists.This episode unpacks the disturbing reality: when breaches happen inside your network, the damage is already done. You'll hear concrete analysis of data from Lumoo's threat intelligence—highlighting the rise of anonymization tools like Tor and NordVPN used by hackers, and how education, financial services, and government sectors are prime targets. Plus, get expert tips on effective defenses like behavioral detection, password management, and monitoring legitimate-looking traffic.Perfect for cybersecurity pros, IT leaders, and anyone serious about staying ahead of the evolving threats—this episode is your urgent wake-up call. We're entering an era where assumptions no longer hold, and understanding the latest tactics could be the difference between breach and defense. Don't get left behind—hit play and upgrade your security mindset now.
Send us a textIn this episode, Joe and Ben Wilcox dive into the rapid advancements in AI and technology, sharing insights from the recent Microsoft Ignite conference. They explore the transformative impact of AI on security practices, the evolution of agentic robots, and the growing importance of data security in today's digital landscape. Tune in to hear a lively discussion between an AI skeptic and an optimist, and discover how these technological shifts are reshaping business and innovation.Support the showFollow the Podcast on Social Media!Tesla Referral Code: https://ts.la/joseph675128YouTube: https://www.youtube.com/@securityunfilteredpodcastInstagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastAffiliates➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh➡️ OffGrid Coupon Code: JOE➡️ Unplugged Phone: https://unplugged.com/Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout*See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.Support the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast Affiliates➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh➡️ OffGrid Coupon Code: JOE➡️ Unplugged Phone: https://unplugged.com/Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout*See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Analysis of Single Sign-On Abuse on FortiOS Fortinet released an advisory. FortiOS devices are vulnerable if configured with any SAML integration, not just FortiCloud https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios Outlook OOB Update Microsoft released a non-security OOB Update for Outlook, fixing an issue introduced with this months security patches. https://support.microsoft.com/en-us/topic/january-24-2026-kb5078127-os-builds-26200-7628-and-26100-7628-out-of-band-cf5777f6-bb4e-4adb-b9cd-2b64df577491 VMware vCenter Server Vulnerabilities Exploited (CVE-2024-37079, CVE-2024-37080, CVE-2024-37081) A VMWare vCenter vulnerability patched last June is now actively exploited. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453
It has been said that we don't have “big data” in healthcare, but instead a large amount of “small data.”In this episode, Halle speaks with Kyle Armbrester, CEO of Datavant and former CEO of Signify Health (acquired for $8B), about why healthcare data still moves the way it did decades ago and what it will take to modernize it at scale. Kyle reflects on building and leading large health tech companies and explains how fixing data flow could reduce administrative waste, improve security, and make care easier for patients and providers alike.We cover:Why healthcare billing still happens after the fact and how that fuels administrative wasteHow missing data standards led to fax-based workflows and brittle systemsWhy healthcare data is such an attractive target for cyberattacksHow clinical data can be shared digitally without being owned or resoldLeadership lessons from scaling companies through IPOs and acquisitions—About our guest: Kyle Armbrester is Chief Executive Officer of Datavant, a healthcare data platform company with a mission to make the world's health data secure, accessible, and actionable. Datavant operates the largest and most diverse health data exchange in the U.S., connecting more than 70 percent of the 100 largest health systems, all U.S. payers, and 300 plus real world data partners.Previously, Kyle served as CEO of Signify Health, where he led more than 200 percent revenue growth, took the company public in 2021, and guided its acquisition by CVS Health in 2023 for approximately $8 billion. He later served on the CVS Health executive management team, overseeing healthcare delivery strategy and interoperability.Earlier in his career, Kyle was Chief Product Officer and Head of Corporate Development at athenahealth, where he helped scale revenue from $320 million to $1.2 billion and launched the company's partnership marketplace. Kyle has served on multiple healthcare boards and holds an MBA and AB from Harvard University.—Chapters:00:01:20 Introduction to Kyle Armbrester and his journey in healthcare00:03:58 The impact of Athena Health on healthcare innovation00:06:20 Datavant: Revolutionizing health data interoperability00:08:15 The role of Datavant in reducing administrative burden00:12:20 Understanding Datavant's value proposition across stakeholders00:14:00 Consumer products and data accessibility at Datavant00:18:25 The scale and impact of Datavant in healthcare00:19:35 Cybersecurity challenges in healthcare data management00:23:57 Bridging the gap in healthcare regulations00:26:13 Unlocking the value of untapped healthcare data00:29:25 Challenges of value-based care models00:33:23 The reality of being a CEO in healthcare00:37:00 Navigating IPOs vs. Acquisitions00:39:44 Innovating healthcare incentives for better outcomes—Pre-order Halle's new book, Massively Better Healthcare.—
Jeff Steadman is joined by RSM colleagues Rich Servillas and Charles John to explore the critical intersection of identity access management, operational resilience, and disaster recovery. Rich, a director from the cyber response group, shares insights from the front lines of ransomware and cloud intrusions, while Chuck, director of operational resilience, discusses the importance of business continuity planning. The conversation covers the true impact of security incidents on brand reputation and operations, the necessity of out-of-band communication, and why identity is often the first thing challenged and the last thing trusted during a crisis. The guests also provide practical advice for IAM professionals on reducing blast radius through standing privilege reduction and robust logging.Connect with Rich: https://www.linkedin.com/in/richard-servillas-041a0551/Connect with Chuck: https://www.linkedin.com/in/chuckjohn/Connect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at http://idacpodcast.comTimestamps:00:00:00 - Introduction and 2026 conference outlook00:01:44 - Introducing guests Rich and Chuck from RSM00:03:56 - Defining operational resilience and business continuity00:06:22 - When and how to start the planning process00:09:55 - Chuck's background in public health and emergency management00:12:44 - The broad impact of incidents on brand and operations00:16:45 - Key elements every recovery plan must include00:19:14 - Defining incident severity and matrixes00:21:52 - Identity as the new perimeter and its operational dependencies00:24:57 - Why hackers log in rather than break in00:26:46 - The first hours of a cyber incident response00:29:35 - Current threat trends and the role of AI00:31:29 - Updating plans through post-action debriefs00:34:31 - Cyber insurance gaps and contractual SLAs00:40:24 - Advice for identity professionals on reducing blast radius00:46:10 - Personal milestones and looking forward to 2026Keywords:IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, IAM, Cybersecurity, Business Continuity, Disaster Recovery, Operational Resilience, RSM, Incident Response, Ransomware, Cyber Insurance, Identity Governance