Podcasts about cyber threats

Attack on a computer system

  • 780PODCASTS
  • 1,775EPISODES
  • 29mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Oct 4, 2025LATEST
cyber threats

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about cyber threats

Show all podcasts related to cyber threats

Latest podcast episodes about cyber threats

Cyber Security Today
October Cybersecurity Month in Review: Insider Threats, AI's Role, and Cybercrime Trends

Cyber Security Today

Play Episode Listen Later Oct 4, 2025 51:43 Transcription Available


In this episode of 'Cybersecurity Today: Our Month in Review,' host Jim welcomes a panel including Tammy Harper from Flair, Laura Payne from White Tuque, and David Shipley, CEO of Beauceron Securities. The discussion kicks off with an overview of their plans for Cybersecurity Month, including reviving the MapleSEC show and the CIO of the Year awards. David shares his experiences at SECTOR, Canada's largest cybersecurity conference, discussing the importance of security awareness training and the risks of irresponsible tech journalism on public perception. The panel also delves into the resurgence of the Clop ransomware group, their shift to data extortion, and their exploitation of vulnerabilities in Oracle EBS applications. Laura highlights a concerning case of insider threats at RBC, emphasizing the importance of process-driven controls. The episode also touches on the human side of cybersecurity, particularly the impact of romance scams and the growing violence in cybercrime. The panelists underscore the need for improved security awareness and the role of AI in identifying scams. Tammy, Laura, and David conclude by discussing the role of insider threats and the ethical boundaries in cybercrime, sharing insights from recent real-world cases. 00:00 Introduction and Panelist Introductions 00:43 Cybersecurity Month Initiatives 02:46 Security Awareness and Phishing Training 04:03 Impact of Irresponsible Tech Journalism 08:27 AI and Cybersecurity: Hype vs. Reality 10:43 Conference Experiences and Networking 18:33 Clop Ransomware and Data Extortion 23:45 Tammy's Insights on Clop's Tactics 24:58 Scattered Lasus and Cyber Warfare 26:32 Media Savvy Cybercriminals 31:36 Human Impact of Cyber Scams 37:17 Insider Threats and Security Awareness 43:21 Physical Security and Cyber Threats 48:33 Cybercrime Targeting Children 50:58 Conclusion and Upcoming Topics

Moody’s Talks – The Big Picture
How AI, New Tech Will Change Geopolitics

Moody’s Talks – The Big Picture

Play Episode Listen Later Oct 2, 2025 15:21


As artificial intelligence reshapes workplaces and business strategies, firms increasingly depend on AI providers, making AI a tool of geopolitical influence. We'll discuss the impact across industries, as digital currencies affect monetary control and cyber threats challenge operational resilience. Host: William Foster, Senior Vice President, Sovereign Risk Group, Moody's Ratings Guests: Vincent Gusdorf, Associate Managing Director, Digital Finance and AI Analytics, Moody's Ratings; Leroy Terrelonge, Vice President-Analyst, Cyber Credit Risk, Moody's Ratings  Related research:Artificial Intelligence – Global – Nations push for AI sovereignty to capture economic, geopolitical gains 30 September 2025 Sovereigns - Global – Digital currency growth, inconsistent regulation amplify countries' financial risks 25 September 2025Artificial Intelligence – Corporates – Pace of AI advances, regional disparities will steer credit trends across industries 23 September 2025 Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

YAP - Young and Profiting
How to Stop Cyber Attacks From Destroying Your Business | Entrepreneurship | Ramon Ray | Presented by Bitdefender

YAP - Young and Profiting

Play Episode Listen Later Oct 1, 2025 37:28


Small businesses have become the number one target for cyber attacks, yet most entrepreneurs don't realize how vulnerable they are until it's too late. One attack could wipe out years of growth and instantly damage customer trust. In this episode, presented by Bitdefender, Ramon explains why cybersecurity is essential for small business owners and how they can protect their business from today's digital threats without hiring an IT team or becoming a tech expert. In this episode, Hala and Ramon will discuss: (00:00) Introduction (03:03) Entrepreneurship Lessons and Personal Branding (06:09) Public Speaking Strategies to Build Influence (09:51) Why Small Businesses are at Risk of Cyber Threats (12:21) Common Cyber Attacks and How to Prevent Them (18:37) Cyber Attack Scenarios and What to Do (28:49) How Creator Entrepreneurs Build Audience Trust (33:15) How Entrepreneurs Profit by Embracing Failure Ramon Ray is a serial entrepreneur, bestselling author, keynote speaker, and small business expert. He is the publisher of ZoneofGenius.com and has spoken to global audiences on major stages, including SXSW, VeeCon, and the Aspire Tour. As Bitdefender's Small Business Ambassador, Ramon helps entrepreneurs protect their businesses against cybersecurity threats. Sponsored By: Bitdefender Ultimate Small Business Security: Save 30% when you go to bitdefender.com/profiting  Resources Mentioned: Ramon's Book, The Celebrity CEO: bit.ly/CelebCEO  Ramon's Website: zoneofgenius.com Active Deals - youngandprofiting.com/deals  Key YAP Links Reviews - ratethispodcast.com/yap YouTube - youtube.com/c/YoungandProfiting LinkedIn - linkedin.com/in/htaha Instagram - instagram.com/yapwithhala Social + Podcast Services: yapmedia.com Transcripts - youngandprofiting.com/episodes-new  Disclaimer: This episode is a paid partnership with Bitdefender. Sponsored content helps support our podcast and continue bringing valuable insights to our audience. Entrepreneurship, Entrepreneurship Podcast, Business, Business Podcast, Self Improvement, Self-Improvement, Personal Development, Starting a Business, Strategy, Investing, Sales, Selling, Psychology, Productivity, Entrepreneurs, AI, Artificial Intelligence, Technology, Marketing, Negotiation, Money, Finance, Side Hustle, Startup, Mental Health, Career, Leadership, Mindset, Health, Growth Mindset, Passive Income, Online Business, Solopreneur, Founder, Networking

Joey Pinz Discipline Conversations
#748 MSP Summit 2025-Scott Fuhriman:

Joey Pinz Discipline Conversations

Play Episode Listen Later Oct 1, 2025 25:40


Send us a textIn this episode of Joey Pinz Discipline Conversations, Joey sits down with Scott Fuhriman, cybersecurity veteran and leader at Inveri, live from the MSP Summit in Orlando.Scott shares his 25+ years of cybersecurity experience, explaining how Inveri's runtime integrity technology, born from NSA research, helps MSPs and MSSPs detect hidden in-memory attacks, rootkits, and advanced threats that traditional tools miss. He highlights why protecting this overlooked layer is crucial to preserving revenue, preventing churn, and maintaining customer trust.The conversation also touches on Scott's personal discipline journey — from starting as a young PC tech overwhelmed by information to building a career through self-study, mentorship, and consistency. He and Joey discuss how MSPs can choose the right vendors, strengthen their security stacks, and enable long-term resilience in a competitive market.

The American Warrior Show
Episode #418: Under Digital Siege: Cyber Threats Facing America with Andrew Frisbie

The American Warrior Show

Play Episode Listen Later Sep 30, 2025 84:41


Show Featured Sponsor: Precision Holsters:These guys have a lifetime, no questioned asked 100% guarantee. They are makers of high-quality holsters, belts, and magazine pouches. Visit them at: Precision Holsters and use code “seekAWS” for a discount.​​ In this episode of the American Warrior Show, Rich Brown is joined by Andrew Frisbie (Practical Cyber Defense) to dig into the threats America faces in cyberspace—and how we must respond.

GovCast
CyberCast: Federal Cyber Workforce Lags Behind Emerging Tech, GAO Says

GovCast

Play Episode Listen Later Sep 30, 2025 12:53


Cybersecurity has been on the Government Accountability Office's (GAO) high-risk list since 1997. Federal agencies struggle with issues like cyber hygiene, cyber workforce shortages and strategic execution. While agencies put strategies in place to secure their systems, the implementation and execution can be ineffective, according to GAO Managing Director of IT and Cybersecurity Nick Marinos. Marinos says that evolving threats have reshaped the cybersecurity landscape over the years in government, making evolution a moving target. Agencies are adjusting their workforces accordingly, he says, but is is difficult to keep pace with emerging technology. He underscores the urgency of streamlining federal hiring processes to prevent losing top talent to faster-moving private sector opportunities.

Cybercrime Magazine Podcast
Database Security. Defending Against Modern Cyber Threats & More. Terry Ray, Varonis.

Cybercrime Magazine Podcast

Play Episode Listen Later Sep 30, 2025 16:55


Terry Ray is the Vice President of Product Strategy at Varonis. In this episode, he joins host Paul John Spaulding to discuss database security, including defense against modern cyber threats, risks associated with over-permissioned users and applications, and more. This episode is brought to you by Varonis, whose AI-powered data security platform secures your data at scale – across IaaS, SaaS, and hybrid cloud environments. To learn more about our sponsor, visit https://www.Varonis.com.

My Precious Data
Cryptography, cyber threats & the future with Prof. Dr. Bart Preneel (KU Leuven).

My Precious Data

Play Episode Listen Later Sep 29, 2025 53:08


In this English-language episode of the My Precious Data Podcast, cybersecurity expert Eddy Willems sits down with longtime colleague (LSEC) and internationally renowned cryptographer Prof. Dr. Bart Preneel (KU Leuven). Together, they explore the past, present, and future of cybersecurity — from the foundations of cryptography to the political and societal challenges of digital trust today.Topics discussed:The evolution of cryptography and its real-world applicationsThe balance between privacy, security, and surveillanceQuantum computing: a threat or a promise?Europe's role in shaping global cybersecurity standardsWhat needs to change in the next decade?Quotes from the episode:“In the end, trust is not built by technology alone. It's about governance, transparency, and respect for users.” — Prof. Dr. Bart Preneel“People often think cybersecurity is just about hackers and firewalls. But it's deeply tied to our rights, our freedom, and the way societies function.” — Eddy Willems“We are now entering an era where cryptography will face its biggest challenge: quantum resistance.” — Prof. Dr. Bart PreneelThis is not just a technical conversation — it's a thought-provoking dialogue between two world-leading experts who have been part of the cybersecurity evolution for decades.

Business of Tech
Aiceberg's Approach: Using Machine Learning to Protect Generative AI from Cyber Threats

Business of Tech

Play Episode Listen Later Sep 28, 2025 19:48


Alexander Schlager, CEO of Aiceberg.ai, discusses the intersection of artificial intelligence (AI) and cybersecurity, emphasizing the importance of securing AI-powered workflows. Aiceberg employs traditional machine learning techniques to safeguard generative AI systems, providing a deterministic and explainable approach to security. This method allows organizations to understand how their AI systems operate and ensures that they can trace and audit the decisions made by these systems, which is crucial in an era where AI incidents may lead to legal challenges.The conversation highlights the need for organizations to establish robust governance frameworks as they adopt AI technologies. Schlager points out that many businesses are still grappling with basic cybersecurity measures, which complicates their ability to implement effective AI governance. He stresses that organizations must assess their existing security postures and ensure that they are prepared for the rapid deployment of agentic AI, which allows non-technical users to create and manage AI workflows independently.Schlager provides concrete examples of how Aiceberg's technology is integrated into real-world applications, such as in the banking sector, where AI workflows may involve third-party interactions. He explains that Aiceberg monitors these interactions to classify and respond to potential security threats, ensuring that organizations can demonstrate compliance and safety in the event of an incident. This proactive approach to security is essential for maintaining trust and accountability in AI systems.Finally, the discussion touches on the broader implications of AI adoption, including the potential for improved customer experiences across various industries. Schlager notes that while AI can enhance service delivery, organizations must navigate the challenges of user expectations and the maturity of their AI implementations. By focusing on customer service and experience, companies can unlock significant value from their AI investments, but they must also prioritize security and governance to mitigate risks. All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

...and Insurance
From Cyber Threats to Trust That Scales: Who You Work With Matters Episode 99

...and Insurance

Play Episode Listen Later Sep 23, 2025 31:46


What does it take to build a business that's both secure and personal? In this episode, I sit down with Chris Church from PCS to talk about the real-world threats businesses face, from phishing emails to vendors unintentionally opening the door to hackers. But this conversation goes way beyond cybersecurity.We dive into how Chris built his team, the value of genuine networking, and the mindset shift that helped him grow a thriving business without burning out. Whether you're leading a team, protecting your company's data, or just trying to find better balance, this episode is packed with insights and real talk you won't want to miss.

Unsupervised Learning
A Conversation With Harry Wetherald CO-Founder & CEO At Maze

Unsupervised Learning

Play Episode Listen Later Sep 22, 2025 35:03 Transcription Available


➡ Stay Ahead of Cyber Threats with AI-Driven Vulnerability Management with Maze:https://mazehq.com/ In this conversation, I speak with Harry about how AI is transforming vulnerability management and application security. We explore how modern approaches can move beyond endless reports and generic fixes, toward real context-aware workflows that actually empower developers and security teams. We talk about: The Real Problem in Vulnerability ManagementWhy remediation—not just prioritization—remains the toughest challenge, and how AI can help bridge the gap between vulnerabilities and the developers who need to fix them. Context, Ownership, and VelocityHow linking vulnerabilities to the right applications and teams inside their daily tools (like GitHub) reduces friction, speeds up patching, and improves security without slowing developers down. AI Agents and the Future of SecurityWhy we should think of AI agents as “extra eyes and hands,” and how they’re reshaping everything from threat detection to system design, phishing campaigns, and organizational defense models. Attackers Move FirstHow attackers are already building unified world models of their targets using AI, and why defenders need to match (or exceed) this intelligence to stay ahead. From Days to MinutesWhy the tolerance for vulnerability windows is shrinking fast, and how automation and AI are pushing us toward a future where hours—or even minutes—make the difference. Subscribe to the newsletter at:https://danielmiessler.com/subscribe Join the UL community at:https://danielmiessler.com/upgrade Follow on X:https://x.com/danielmiessler Follow on LinkedIn:https://www.linkedin.com/in/danielmiessler Chapters: 00:00 – Welcome and Harry’s Background01:07 – The Real Problem: Remediation vs. Prioritization04:31 – Breaking Down Vulnerability Context and Threat Intel05:46 – Connecting Vulnerabilities to Developers and Workflows08:01 – Why Traditional Vulnerability Management Fails10:29 – Startup Lessons and The State of AI Agents13:26 – DARPA’s AI Cybersecurity Competition14:29 – System Design: Deterministic Code vs. AI16:05 – How the Product Works and Data Sources18:01 – AI as “Extra Eyes and Hands” in Security20:20 – Breaking Barriers: Rethinking Scale with AI23:22 – Building World Models for Defense (and Attack)25:22 – Attackers Move Faster: Why Context Matters27:04 – Phishing at Scale with AI Agents31:24 – Shrinking Windows of Vulnerability: From Days to Minutes32:47 – What’s Next for Harry’s Work34:13 – Closing ThoughtsBecome a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

The Business Times Podcasts
S2E77: Cyber Threats, Trade Frictions, and Oil Gains

The Business Times Podcasts

Play Episode Listen Later Sep 22, 2025 4:22


Headline news for September 22, 2025: European airport disruptions from cyberattacks, South Korea-US trade tensions, and economic updates from China and Japan. Oil prices rise and In Singapore, a new senior care centre is announced. Synopsis: A round up of global headlines to start your day by The Business Times. Written by: Howie Lim / Claressa Monteiro (claremb@sph.com.sg) Produced and edited by: Claressa Monteiro Produced by: BT Podcasts, The Business Times, SPH Media Produced with AI text-to-speech capabilities --- Follow Lens On Daily and rate us on: Channel: bt.sg/btlenson Amazon: bt.sg/lensam Apple Podcasts: bt.sg/lensap Spotify: bt.sg/lenssp YouTube Music: bt.sg/lensyt Website: bt.sg/lenson Feedback to: btpodcasts@sph.com.sg Do note: This podcast is meant to provide general information only. SPH Media accepts no liability for loss arising from any reliance on the podcast or use of third party’s products and services. Please consult professional advisors for independent advice. Discover more BT podcast series: BT Mark To Market at: bt.sg/btmark2mkt WealthBT at: bt.sg/btpropertybt PropertyBT at: bt.sg/btmktfocus BT Money Hacks at: bt.sg/btmoneyhacks BT Market Focus at: bt.sg/btmktfocus BT Podcasts at: bt.sg/podcasts BT Branded Podcasts at: bt.sg/brpod BT Lens On: bt.sg/btlensonSee omnystudio.com/listener for privacy information.

The Business Times Podcasts
S2E11: Is Singapore's peace built to last? With K. Shanmugam

The Business Times Podcasts

Play Episode Listen Later Sep 16, 2025 38:29


AI, Cyber Threats & What’s Next Singapore is 60, are we still secure? In this Lens on Singapore SG60 special, Minister K. Shanmugam, Coordinating Minister for National Security and Minister for Home Affairs, joins Claressa Monteiro for a straight-talking look at the invisible threats facing Singapore today. From state-backed cyberattacks to foreign influence campaigns and AI-powered disinformation; the threats have evolved. But so has our response. Tune in for a serious, insightful, and hopeful conversation on what it takes to keep Singapore strong for the next 60 years. Subscribe for more context-rich conversations that go beyond the headlines. #KShanmugam #SG60 #SingaporePolitics #LensOnSingapore Highlights: 02:52 The hidden danger of cyberattacks 08:56 Foreign influence in Singapore 17:09 Supporting Gaza 23:47 How tensions in Asean impact Singapore 29:50 Exploring nuclear energy --- Now, we want to hear from you! Send us your questions, thoughts, story ideas, and feedback to btpodcasts@sph.com.sg. We’ll look into it for future episodes. --- Podcast written and presented by: Claressa Monteiro (claremb@sph.com.sg) With Coordinating Minister for National Security and Minister for Home Affairs K. Shanmugam Post-production: Claressa Monteiro and Emily Liu Coordinating producer: Chai Pei Chieh Video production: Studio +65 A podcast by BT Podcasts, The Business Times, SPH Media --- Follow Lens On and rate us on: Channel: bt.sg/btlenson Amazon: bt.sg/lensam Apple Podcasts: bt.sg/lensap Spotify: bt.sg/lenssp YouTube Music: bt.sg/lensyt Website: bt.sg/lenson Do note: This podcast is meant to provide general information only. SPH Media accepts no liability for loss arising from any reliance on the podcast or use of third party’s products and services. Please consult professional advisors for independent advice. Discover more BT podcast series: BT Money Hacks at: bt.sg/btmoneyhacks BT Correspondents at: bt.sg/btcobt BT Market Focus at: bt.sg/btmktfocus BT Podcasts at: bt.sg/podcastsSee omnystudio.com/listener for privacy information.

AI in Action Podcast
E554: 'Fighting Cyber Threats with AI' with Dune Security's Kyle Ryan

AI in Action Podcast

Play Episode Listen Later Sep 15, 2025 21:04


Today's guest is Kyle Ryan, Senior Engineering Manager and Principal Engineer at Dune Security. Founded in 2023, Dune Security's User Adaptive Risk Management solution automatically prevents insider threats in real time. With 90% of breaches starting from human error, traditional phishing simulations and compliance training often fail to reduce real-world risk. Dune addresses this with a unified platform that continuously monitors behavior, tailors interventions and adapts protections around high-risk users.Kyle is highly skilled in AI & Machine Learning research and development, with a specialization in building secure, robust and scalable systems for cutting-edge cybersecurity solutions. He is currently developing advanced technologies to prevent AI-powered social engineering attacks and enable real-time, dynamic risk profiling of employees. Kyle believes that as threat actors evolve, organizations must adapt using data-driven methods to reduce the attack surface and strengthen defenses.In this episode, Kyle talks about:0:00 His journey from early chatbot work to founding engineer at Dune2:19 How Dune Security simulates advanced phishing attacks to train users4:45 How his role evolved from generalist to AI R&D8:17 Delivering authentic threat simulations and risk visibility for organizations11:20 Why future threats will be hyper-personalised, cross-channel and AI-driven14:58 His key advice to stay on AI's cutting edge and solve hard problemsTo find out more about all the great work happening at Dune Security, check out the website www.dune.security

Rich Valdés America At Night
“Accountability for Judges, Cyber Threats from China, and " Bound by law”

Rich Valdés America At Night

Play Episode Listen Later Sep 9, 2025 123:40


On this episode of Rich Valdes America at Night, Rep. Randy Fine (R-FL) shares his plan to hold judges accountable for enabling violent repeat offenders to return to the streets. Then, Eric Cole, CEO of Secure Anchor and former CIA cybersecurity expert, explains how Chinese cyber attackers may have stolen data from nearly every American, and what this means for our national security. Later, Humberto Cancio joins the show to discuss injustices in the Cuban community, immigration challenges, and his new book Gabriel Lock: Bound by Law. Learn more about your ad choices. Visit podcastchoices.com/adchoices

The Health Ranger Report
Brighteon Broadcast News, Sep 2, 2025 – Trump questions Operation Warp Speed while CDC demons wage WAR on RFK Jr!

The Health Ranger Report

Play Episode Listen Later Sep 2, 2025 102:56


- Anniversary of Japanese Surrender and U.S. Occupation (0:10) - Trump's Tariffs and the International Emergency Economic Powers Act (2:34) - Impact of Trump's Tariffs on U.S. Allies and Global Relations (9:21) - Challenges of Shifting Manufacturing to the U.S. (10:02) - AI and Knowledge Mining (14:07) - Trump's Criticism of Operation Warp Speed and Vaccines (24:27) - The Future of Medicine and AI (30:09) - Economic and Political Implications of Trump's Policies (48:20) - Interview with Don Brown on Power Grid Security (48:40) - Strategies for Securing the Power Grid (1:16:29) - Challenges of Depending on Foreign Manufacturers (1:19:14) - Rising Domestic Tensions and Power Grid Vulnerabilities (1:23:35) - Legislation and Cyber Threats (1:30:16) - Protecting Against EMP and Solar Threats (1:32:37) - Preparedness and Personal Responsibility (1:37:42) - Final Thoughts and Recommendations (1:41:12) For more updates, visit: http://www.brighteon.com/channel/hrreport NaturalNews videos would not be possible without you, as always we remain passionately dedicated to our mission of educating people all over the world on the subject of natural healing remedies and personal liberty (food freedom, medical freedom, the freedom of speech, etc.). Together, we're helping create a better world, with more honest food labeling, reduced chemical contamination, the avoidance of toxic heavy metals and vastly increased scientific transparency. ▶️ Every dollar you spend at the Health Ranger Store goes toward helping us achieve important science and content goals for humanity: https://www.healthrangerstore.com/ ▶️ Sign Up For Our Newsletter: https://www.naturalnews.com/Readerregistration.html ▶️ Brighteon: https://www.brighteon.com/channels/hrreport ▶️ Join Our Social Network: https://brighteon.social/@HealthRanger ▶️ Check In Stock Products at: https://PrepWithMike.com

Talking Features
Talking Tech - Cyber Threats Put UK Industry on Alert

Talking Features

Play Episode Listen Later Sep 2, 2025 3:01


In this week's Talking Tech, Poppy explains how Jaguar Land Rover's cyberattack shows how even major firms are vulnerable, with SMEs at even greater risk due to weaker defences. Beyond disruption, attacks can trigger lost sales, reputational damage, and financial strain - making cybersecurity a board-level priority for resilience and growth.

Public Sector Podcast
Trends in Cybercrime with NSW Police - Matthew Craft - Episode 148

Public Sector Podcast

Play Episode Listen Later Aug 31, 2025 19:45


In this episode, Matthew Craft, Detective Superintendent, NSW Police Force examines the evolving landscape of cybercrime in 2025—what's changed, what's emerging, and what organisations need to know to stay ahead. From rising threat trends to response readiness, the discussion also highlights the importance of national and international cooperation in combating cyber threats. Whether you're in government, law enforcement, or cyber defence, this episode offers timely insights into staying resilient in a high-risk digital world.   Matthew Craft, Detective Superintendent, NSW Police Force   For more great insights head to www.PublicSectorNetwork.co  

Interpreting India
Military AI and Autonomous Weapons: Gender, Ethics, and Governance

Interpreting India

Play Episode Listen Later Aug 28, 2025 55:00


The episode opens with Bhatt framing the global stakes: from drones on the battlefield to AI-powered early warning systems, militaries worldwide are racing to integrate AI, often citing strategic necessity in volatile security environments. Mohan underscores that AI in conflict cannot be characterized in a single way, applications range from decision-support systems and logistics to disinformation campaigns and border security.The conversation explores two categories of AI-related risks:Inherent risks: design flaws, bias in datasets, adversarial attacks, and human–machine trust calibration.Applied risks: escalation through miscalculation, misuse in targeting, and AI's role as a force multiplier for nuclear and cyber threats.On governance, Mohan explains the fragmentation of current disarmament processes, where AI intersects with multiple regimes, nuclear, cyber, conventional arms, yet lacks a unified framework. She highlights ongoing debates at the UN's Group of Governmental Experts (GGE) on LAWS, where consensus has been stalled over definitions, human-machine interaction, and whether regulation should be voluntary or treaty-based.International humanitarian law (IHL) remains central, with discussions focusing on how principles like distinction, proportionality, and precaution can apply to autonomous systems. Mohan also emphasizes a “life-cycle approach” to weapon assessment, extending legal and ethical oversight from design to deployment and decommissioning.A significant portion of the conversation turns to gender and bias, an area Mohan has advanced through her research at UNIDIR. She draws attention to how gendered and racial biases encoded in AI systems can manifest in conflict, stressing the importance of diversifying participation in both technology design and disarmament diplomacy.Looking forward, Mohan cites UN Secretary-General António Guterres's call for a legally binding instrument on autonomous weapons by 2026. She argues that progress will depend on multi-stakeholder engagement, national strategies on AI, and confidence-building measures between states. The episode closes with a reflection on the future of warfare as inseparable from governance innovation—shifting from arms reduction to resilience, capacity-building, and responsible innovation.Episode ContributorsShimona Mohan is an associate researcher on Gender & Disarmament and Security & Technology at UNIDIR in Geneva, Switzerland. She was named among Women in AI Ethics' “100 Brilliant Women in AI Ethics for 2024.” Her areas of focus include the multifarious intersections of security, emerging technologies (in particular AI and cybersecurity), gender, and disarmament. Charukeshi Bhatt is a research analyst at Carnegie India, where her work focuses on the intersection of emerging technologies and international security. Her current research explores how advancements in technologies such as AI are shaping global disarmament frameworks and security norms.ReadingsGender and Lethal Autonomous Weapons Systems, UNIDIR Factsheet Political Declaration on Responsible Military Use of AI and Autonomy, US Department of StateAI in the Military Domain: A Briefing Note for States by Giacomo Persi Paoli and Yasmin AfinaUnderstanding the Global Debate on Lethal Autonomous Weapons Systems: An Indian Perspective by Charukeshi Bhatt and Tejas Bharadwaj Every two weeks, Interpreting India brings you diverse voices from India and around the world to explore the critical questions shaping the nation's future. We delve into how technology, the economy, and foreign policy intertwine to influence India's relationship with the global stage.As a Carnegie India production, hosted by Carnegie scholars, Interpreting India, a Carnegie India production, provides insightful perspectives and cutting-edge by tackling the defining questions that chart India's course through the next decade.Stay tuned for thought-provoking discussions, expert insights, and a deeper understanding of India's place in the world.Don't forget to subscribe, share, and leave a review to join the conversation and be part of Interpreting India's journey.

Cyber Security Today
From CVE To Cyber Attack In Minutes With AI: Cybersecurity Today

Cyber Security Today

Play Episode Listen Later Aug 25, 2025 8:26 Transcription Available


Host David Shipley explores the latest in cybersecurity, including the rapid development of AI-generated exploits for critical vulnerabilities, record-high searches of digital devices at US borders, and a fired developer jailed for sabotaging his former employer. Additionally, the episode highlights Interpol's Operation Serengeti 2.0, which led to significant arrests and recoveries in the fight against cybercrime in Africa. The episode underscores the speed at which cyber threats can materialize and the importance of global and collaborative defenses. 00:00 Introduction to Cybersecurity Today 00:35 AI-Driven Exploits: A New Era of Cyber Threats 02:48 Record Device Searches at US Borders 04:43 Insider Threats: The Hidden Dangers Within Organizations 06:25 Operation Serengeti 2.0: A Major Blow to Cyber Crime 07:27 Conclusion and Final Thoughts

Cybercrime Magazine Podcast
Microsoft At Black Hat 2025. Combatting Cyber Threats. Travis Schack, Principal Security Researcher.

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 22, 2025 1:43


Travis Schack is the Principal Security Researcher at Microsoft, and lead investigator for their incident response team. Cybercrime Magazine caught up with Schack, who previously served as CISO for the State of Colorado, at Black Hat USA 2025 in Las Vegas, Nevada, where he told us about what Microsoft is doing to combat today's vast cyber threat landscape. • For more on cybersecurity, visit us at https://cybersecurityventures.com

The Briefing Room
UK Resilience 2: How prepared are we for cyber threats?

The Briefing Room

Play Episode Listen Later Aug 21, 2025 28:42


From councils disrupted by ransomware, leaked defence data or individuals duped by deep fakes, the UK faces increasing cyber threats. David Aaronovitch asks his guests how prepared we are - whether as government defending critical infrastructure or as individuals guarding our digital identities.Guests: Sadie Creese, Professor of Cyber Security in the department of computer science, Oxford University Dr Aybars Tuncdogan, Associate Professor in digital innovation and information security, Kings College, London Emily Taylor, CEO of Oxford Information Labs and Associate Fellow, Chatham House Presenter: David Aaronovitch Producers: Ben Carter, Sally Abrahams and Kirsteen Knight Production co-ordinator: Rosie Strawbridge Sound Engineers: Dave O'Neill and James Beard Editor: Richard Vadon

The Gate 15 Podcast Channel
Weekly Security Sprint EP 122. FBI Crime Report, Cyber Threats and be ready for the weather

The Gate 15 Podcast Channel

Play Episode Listen Later Aug 12, 2025 20:01


In this week's Security Sprint, Dave and Andy covered the following topics:Main Topics:Physical Security: • FBI Releases 2024 Reported Crimes in the Nation Statisticso Hate crimes hit second largest record in 2024: FBIo Crime down in every category in 2024, FBI report sayso Jews targeted in 69% of religion hate crimes in 2024, 71% since October 2023, per FBI datao FBI Report: Anti-Jewish Hate Crimes Across U.S. Nearly 10x Higher Than Any Other Groupo NYC Sees Drop in Antisemitic Hate Crimes, Yet Jews Still Targeted Most, Police Say• CDC shooter blamed COVID vaccine for depression; union demands statement against misinformationo CDC Shooter Believed Covid Vaccine Made Him Suicidal, His Father Tells Policeo Suspect identified in Atlanta shooting outside CDC: What to know• Shooter kills three in a Target parking lot in Austin before being captured, police sayo Child among 3 killed in north Austin shooting, suspect detainedo 'I was running for my life' | 3 dead in shooting at North Austin TargetThe Cost of a Call: From Voice Phishing to Data Extortion - Update (August 5) & Google says hackers stole its customers' data by breaching its Salesforce databaseHackers Hijacked Google's Gemini AI With a Poisoned Calendar Invite to Take Over a Smart Home; For likely the first time ever, security researchers have shown how AI can be hacked to create real-world havoc, allowing them to turn off lights, open smart shutters, and more. In a new apartment in Tel Aviv, the internet-connected lights go out. The smart shutters covering its four living room and kitchen windows start to roll up simultaneously. And a connected boiler is remotely turned on, ready to start warming up the stylish flat. The apartment's residents didn't trigger any of these actions. They didn't put their smart devices on a schedule. They are, in fact, under attack. Each unexpected action is orchestrated by three security researchers demonstrating a sophisticated hijack of Gemini, Google's flagship artificial intelligence bot. Quick Hits:• NOAA - Prediction remains on track for above-normal Atlantic hurricane season• New state, local cyber grant rules prohibit spending on MS-ISAC• Joint Counterterrorism Assessment Team (JCAT): Hybrid and Electric Vehicle Emergency Planning and Postattack Response Considerations• Canadian Centre for Cyber Security - Potential SSL VPN Zero-Day vulnerability impacting Gen 7 SonicWall Firewalls• SonicWall Hunts for Zero-Day Amid Surge in Firewall Exploitation• Microsoft Releases Guidance on High-Severity Vulnerability (CVE-2025-53786) in Hybrid Exchange Deployments • CISA Releases Malware Analysis Report Associated with Microsoft SharePoint Vulnerabilities• CISA Issues ED 25-02: Mitigate Microsoft Exchange Vulnerability • Leak Reveals the Workaday Lives of North Korean IT Scammers • US companies spending record amounts to protect executives as threats rise• Mysterious Crime Spree Targeted National Guard Equipment Stashes• American Nazis: The Aryan Freedom Network is riding high in Trump era• Florida Man Sentenced to 20 Years for Conspiring to Destroy Baltimore Region Power Grid & Neo-Nazi leader sentenced to 20 years for plotting Baltimore power grid attack• Leader of Transnational Terrorist Group Pleads Guilty to Soliciting Hate Crimes, Soliciting the Murder of Federal Officials, and Conspiring to Provide Material Support to Terrorists

AHRMM
AHRMM SME Podcast with Scott Gee

AHRMM

Play Episode Listen Later Aug 12, 2025 24:20


This is the AHRMM Subject Matter Expert Podcast hosted by Justin Poulin. Tune in every month as we speak with Industry Experts to highlight success stories and solutions from the field that advance the healthcare supply chain. And now, Justin Poulin with this month's Expert… Guest: Scott Gee, Deputy Advisory for Cybersecurity & Risk @ AHA Topic: From Ransomware to Geopolitics - Assessing Supply Chain Risk Outline: - Welcome Scott - Siloed 3rd Party Risk Management Structure (improvements needed) - Cyber Threats & Criminal Activity * Foreign hackers (primarily Russia) * Attack on 3rd party service provider * Tell us why they are the target? - What is the intent of these attacks * Data theft * Ransomware - Example of a few recent threats - National Threats to Security * China has been heavily integrated into our supply chain through commercial relationships and malware * What are the risks and considerations around the unique dynamics? * Disrupt mission/life critical supply chain to create chaos - The role of Geopolitics and supply chain risk

Cybercrime Magazine Podcast
Black Hat 2025. BreachLock On Facing Today's Cyber Threats. Seemant Sehgal, Founder & CEO.

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 11, 2025 6:49


Seemant Sehgal is the founder and CEO of BreachLock. In this episode, he joins host Amanda Glassner from Black Hat 2025 in Las Vegas, Nevada, to discuss what the company showcased at this year's conference, as well as the latest on facing today's cyber threat landscape. This episode is brought to you by BreachLock. To learn more about our sponsor, visit https://breachlock.com.

IEN Radio
LISTEN: Fire-Damaged LA Community Homes Rebuilt by AI-Powered Robots

IEN Radio

Play Episode Listen Later Aug 8, 2025 1:49


Cosmic Building, a construction technology company, uses AI-driven end-to-end software to run mobile robotic microfactories. At the heart of its newest microfactory in Pacific Palisades are ABB's IRB 6710 robots and RobotStudio digital twin software. Both of which are integrated into Cosmic's Workstation Cell and AI-driven Building Information Model (BIM). #ai   #california  #wildfire  #losangeles  #robot #fire

Fintech Combine
Built for Trust: How DefenseStorm Protects Credit Unions from Evolving Cyber Threats

Fintech Combine

Play Episode Listen Later Aug 1, 2025 36:55


In this episode of The Fintech Combine, host Kris Kovac sits down with Steve Soukup, CEO of DefenseStorm, to discuss how the company protects credit unions and community banks from evolving cyber threats. They explore risk management, fraud prevention, AI‑powered threat detection, and why trust is the foundation of effective cybersecurity in the financial sector.Follow the Pod:https://twitter.com/fintechcombineFollow Kris Kovacs:https://twitter.com/ManagementByteshttps://www.linkedin.com/in/kriskovacs/https://www.instagram.com/kriskovacs/The Fintech Combine is Produced and Edited by Anson Beckler-JonesFollow Anson Beckler-JonesInstagram - @ansonandcoYoutube - @ansonandco

Inside Deschutes County
AI, Cyber Threats and Protecting County Data

Inside Deschutes County

Play Episode Listen Later Jul 31, 2025 30:23


Protecting sensitive information like health records, legal documents, and property data is a critical part of local government. In this episode of Inside Deschutes County, we talk with Zach Neemann, the County's Information Security Manager, about how Deschutes County works to keep digital systems secure. From cyber threats to the growing influence of AI, Zach explains how technology is evolving and what it takes to protect the data that matters most.

ICT Pulse Podcast
ICTP 362: 2025 Expert Insight update on cyber threats and security in the Caribbean, with Lt Col Godphey Sterling of Jamaica CIRT

ICT Pulse Podcast

Play Episode Listen Later Jul 30, 2025 68:41


In the third instalment in our Expert Insights series on cyber threats and security for 2025, we are joined by Lieutenant Colonel (Retired) Godphey Sterling, the head of the Jamaica Cyber Incident Response Team (JaCIRT). Our conversation with Colonel Sterling covers, among other things:   *  how JaCIRT operates and the attitude towards cybersecurity (and the CIRT) in Jamaica;   *  the cyber threat landscape in Jamaica;   *  the challenge of maintaining a uniform level of security across large organisations or bodies; and   *  what Colonel Sterling means by “security by obscurity”.   The episode, show notes and links to some of the things mentioned during the episode can be found on the ICT Pulse Podcast Page (www.ict-pulse.com/category/podcast/)       Enjoyed the episode?  Do rate the show and leave us a review!       Also, connect with us on: Facebook – https://www.facebook.com/ICTPulse/   Instagram –  https://www.instagram.com/ictpulse/   Twitter –  https://twitter.com/ICTPulse   LinkedIn –  https://www.linkedin.com/company/3745954/admin/   Join our mailing list: http://eepurl.com/qnUtj    Music credit: The Last Word (Oui Ma Chérie), by Andy Narrell Podcast editing support:  Mayra Bonilla Lopez   ---------------

ITSPmagazine | Technology. Cybersecurity. Society
ThreatLocker to Unveil Game-Changing Zero Trust Innovations at Black Hat 2025 | Visit Them at Booth #1933 | A ThreatLocker Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with John Lilliston

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 29, 2025 17:51


ThreatLocker to Unveil Game-Changing Zero Trust Innovations at Black Hat 2025 | Visit Them at Booth #1933 | A ThreatLocker Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with John LillistonJoin ITSP Magazine's Marco Ciappelli and Sean Martin as they preview ThreatLocker's exciting Black Hat 2025 presence with Detect Product Director John Lilliston. Discover upcoming major announcements, hands-on hacking demos, and how ThreatLocker's default deny approach is revolutionizing enterprise cybersecurity through comprehensive zero trust implementation.As Black Hat USA 2025 approaches, cybersecurity professionals are gearing up for one of the industry's most anticipated events. ITSP Magazine's Marco Ciappelli and Sean Martin recently sat down with John Lilliston, ThreatLocker's Detect Product Director, to preview what promises to be an exciting showcase of zero trust innovation at booth 1933.ThreatLocker has become synonymous with the "default deny" security approach, a philosophy that fundamentally changes how organizations protect their digital assets. Unlike traditional security models that allow by default and block known threats, ThreatLocker's approach denies everything by default and allows only approved applications, network communications, and storage operations. This comprehensive strategy operates across application, network, and storage levels, creating what Lilliston describes as a "hardened system that stops adversaries in their tracks."The company's rapid growth reflects the industry's embrace of zero trust principles, moving beyond buzzword status to practical, enterprise-ready solutions. Lilliston, who joined ThreatLocker in February after evaluating their products from the enterprise side, emphasizes how the platform's learning mode and ring fencing capabilities set it apart from competitors in the application control space.At Black Hat 2025, ThreatLocker will demonstrate their defense-in-depth strategy through their Detect product line. While their primary zero trust controls rarely fail, Detect provides crucial monitoring for applications that must run in enterprise environments but may have elevated risk profiles. The system can automatically orchestrate responses to threats, such as locking down browsers exhibiting irregular behavior that might indicate data exfiltration attempts.Visitors to booth 1933 can expect hands-on demonstrations and on-demand hacking scenarios that showcase real-world applications of ThreatLocker's technology. The company is preparing major announcements that CEO Danny Houlihan will reveal during the event, promising game-changing developments for both the organization and its client base.ThreatLocker's Black Hat agenda includes a welcome reception on Tuesday, August 5th, from 7-10 PM at the Mandalay Bay Complex, and Houlihan's presentation on "Simplifying Cybersecurity" on Thursday, August 7th, from 10:15-11:05 AM at Mandalay Bay J.The convergence of practical zero trust implementation, cutting-edge threat detection, and automated response capabilities positions ThreatLocker as a key player in the evolving cybersecurity landscape, making their Black Hat presence essential viewing for security professionals seeking comprehensive protection strategies.Keywords: Black Hat 2025, zero trust security, cybersecurity conference, ThreatLocker, default deny strategy, endpoint protection, application control, threat detection, enterprise security, network security, cybersecurity solutions, security automation, malware prevention, cyber threats, information security, security platform, Black Hat USA, cybersecurity innovation, managed detection response, security operationsLearn more about ThreatLocker: https://itspm.ag/threatlocker-r974Note: This story contains promotional content.Learn more.Guests:John LillistonCybersecurity Director | Threat Detection & Response | SOC Leadership | DFIR | EDR/XDR Strategy | GCFA, GISP | https://www.linkedin.com/in/john-lilliston-4725217b/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerThreatLocker® Welcome Reception | Don't gamble with your security! Join us at Black Hat for a lively Welcome Reception hosted by ThreatLocker®. Meet our Cyber Hero® Team and dive into discussions on the latest advancements in ThreatLocker®Endpoint Security. It's a great opportunity to connect and learn together! ‍‍Time: 7PM - 10PM | Location: Mandalay Bay Complex RSVP below and we'll send you a confirmation email with all the details.[ Welcome Reception RSVP ]Learn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Cybercrime Magazine Podcast
Facing Cyber Threats. Incident Management For Organizations. Florian Saettler & Helen Nuttall, Marsh

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 28, 2025 16:50


Florian Saettler, Cyber Incident Management Leader & Cyber Claims Co-Leader, Marsh Europe, and Helen Nuttall, UK Head of Cyber Incident Management at Marsh, join host Amanda Glassner in this episode to discuss today's cyber threat landscape. Together, they cover incident management for organizations, the importance of out-of-band communication, the CISO's role, and more. Marsh is the world's most trusted and innovative cyber risk advisor, simplifying complexity while delivering unmatched results. To learn more about our sponsor, visit https://marsh.com and click on “cyber risk.”

The CyberWire
SharePoint springs a leak.

The CyberWire

Play Episode Listen Later Jul 23, 2025 30:55


The National Nuclear Security Administration was among the organizations impacted by the SharePoint zero-day. Experts testify before congress that OT security still lags.The FBI warns healthcare and critical infrastructure providers about Interlock ransomware. New York proposes new cybersecurity regulations for water and wastewater systems along with grants to fund them. Researchers uncover an active cryptomining campaign targeting cloud environments. A new variant of the Coyote banking trojan exploits Microsoft's Windows UI Automation (UIA) framework for credential theft. The DoD pilots an agentic AI project aimed at helping military planners critique and enhance war plans. Clorox sues its former IT service provider for $380 million. Our guest is Tim Starks from CyberScoop discussing sanctions on Russian hackers and spies. Pirate Prime, do the time. CyberWire Guest Today we are joined by Tim Starks from CyberScoop discussing research on "UK sanctions Russian hackers, spies as US weighs its own punishments for Russia.” Selected Reading US nuclear weapons agency reportedly breached in Microsoft SharePoint attacks (The Verge) Fully Operational Stuxnet 15 Years Later & the Evolution of Cyber Threats to Critical Infrastructure (US House of Representatives Cybersecurity and Infrastructure Protection Subcommittee Hearing) European healthcare network AMEOS Group hit by cyberattack (Beyond Machines) FBI urges vigilance against Interlock ransomware group behind recent healthcare attacks (The Record) New York unveils new cyber regulations, $2.5 million grant program for water systems (The Record) Soco404: Multiplatform Cryptomining Campaign (Wiz) Coyote malware abuses Windows accessibility framework for data theft (Bleeping Computer) Thunderforge Brings AI Agents to Wargames (IEEE Spectrum) Clorox Sues Cognizant for Causing 2023 Cyber-Attack (Infosecurity Magazine) Operator of Jetflix illegal streaming service gets 7 years in prison (Bleeping Computer) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Social-Engineer Podcast
Ep. 313 - Security Awareness Series - The Importance of Securing Virtual Events With Trent Waterhouse

The Social-Engineer Podcast

Play Episode Listen Later Jul 21, 2025 27:56


Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Trent Waterhouse. Trent is the CMO of GlobalMeet, a leading virtual event technology company with a scalable, flexible, and secure hybrid event streaming platform built and supported by experienced event experts. Trent has a proven track record of driving growth and innovation with 35 years of expertise leveraging a field sales marketing model that aligns sales, marketing, and R&D to think like a customer, act like a partner, and measure success through customer satisfaction and net promoters. Built for growth, Trent's unique blend of technology understanding and B2B marketing skills have been proven to help companies grow revenue profitably, improve customer experiences, build new partnerships, and expand opportunity pipelines. [July 21, 2025]   00:00 - Intro 00:50 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                02:30 - Trent Waterhouse Intro 03:11 - Starting Out Pre-Video 04:53 - A Brave New World 08:07 - Going Public 10:21 - Rise of the DeepFakes 13:03 - Video Watermarking 15:23 - A Simple Warning Will Do 19:11 - Staying Up to Date 21:22 - Insider Threat 23:42 - Find Trent Waterhouse Online    -          Website: https://www.globalmeet.com/ -          Instagram: https://www.instagram.com/globalmeet/ -          LinkedIn: https://www.linkedin.com/in/trentonwaterhouse/ 24:44 - Book Recommendations -          Pattern Breakers - Mike Maples, Jr, Peter Ziebelman 27:16 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

AM Best Radio Podcast
Coalition's Simonsen: Insurers Look to Nordics as Cyberthreats, Digital Reliance Surge

AM Best Radio Podcast

Play Episode Listen Later Jul 16, 2025 17:00 Transcription Available


Tine Simonsen, head of insurance for Continental Europe at Coalition, discusses how rising cyberthreats and digital growth in the Nordics are driving demand for active cyber protection and shaping the future of insurance in Europe.

Order of Man
DR. ERIC COLE | How Cyberthreats Endanger Men and Their Families

Order of Man

Play Episode Listen Later Jul 15, 2025 61:34


Considering how often we utilize technology, we don't spend as nearly as much time as we should protecting ourselves against the inherent vulnerabilities and bad actors who would exploit the very tools designed to improve our lives. The fact of the matter is, cybersecurity has become a huge issue (only to become more relevant as technology advances). My guest today, Dr. Eric Cole, has spent decades learning, understanding, and teaching people how to protect themselves and their loved ones from cyber-threats. Today, we talk about the apps that are more dangerous than others, how best to keep your children safe from online predators, what he calls, cyber-hygiene, why passwords are dead and what to do about it, and why social media will never fully protect children. SHOW HIGHLIGHTS 00:00 - Introduction   00:21 - Welcoming Dr. Eric Cole   00:26 - Importance of Cybersecurity for Families   01:24 - Dangers of Sharing Personal Information Online   02:47 - Targeting Vulnerable Individuals   04:26 - Impact of Technology on Parenting   05:45 - Prevalence of Child Exploitation   08:12 - Monitoring Kids' Online Interactions   10:00 - Social Media Security Measures   12:16 - Identifying Suspicious Accounts   15:00 - Limiting Kids' Access to Smartphones   19:09 - Balancing Technology Use   22:32 - Monitoring Social Media Comments   26:00 - Risks of Location Tracking in Photos   30:06 - Moving Beyond Passwords   32:31 - Avoiding Malicious Links   35:13 - Value of Online Protection Services   37:51 - Cell Phones and Privacy Concerns   43:03 - Importance of Software Updates   45:20 - Benefits of Using VPNs   46:43 - Upgrading Technology Safely   49:20 - AI as a Tool, Not a Replacement   52:43 - Practical Cybersecurity Tips   54:24 - Closing Remarks   Battle Planners: Pick yours up today! Order Ryan's new book, The Masculinity Manifesto. For more information on the Iron Council brotherhood. Want maximum health, wealth, relationships, and abundance in your life? Sign up for our free course, 30 Days to Battle Ready

Cyber Security Today
Urgent Cyber Threats: Citrix Exploit, Fortinet RCE, and AI Vulnerabilities

Cyber Security Today

Play Episode Listen Later Jul 14, 2025 17:48 Transcription Available


In this episode of 'Cybersecurity Today,' hosted by David Shipley from the Exchange Security 2025 conference, urgent updates are provided on critical cybersecurity vulnerabilities and threats. CISA mandates a 24-hour patch for Citrix NetScaler due to a severe vulnerability actively being exploited, dubbed 'Citrix Bleed.' Fortinet's FortiWeb also faces a critical pre-auth remote code execution flaw that demands immediate patching. Additionally, significant vulnerabilities in AI-driven developments are highlighted, including shortcomings in Jack Dorsey's BitChat app and a method to extract Windows keys from ChatGPT-4. The episode emphasizes the importance of timely updates, robust security measures, and the potential risks involved with AI-generated code. 00:00 Introduction and Overview 00:35 Urgent Citrix Vulnerability Alert 03:26 Fortinet FortiWeb Exploit Details 06:23 Ingram Micro Ransomware Recovery 09:26 AI Coding and Security Risks 14:03 ChatGPT Security Flaw Exposed 17:20 Conclusion and Contact Information

DailyCyber The Truth About Cyber Security with Brandon Krieger
Inside IR and AI with Paul Caron | DailyCyber 267

DailyCyber The Truth About Cyber Security with Brandon Krieger

Play Episode Listen Later Jul 12, 2025 61:04


Inside IR and AI with Paul Caron | DailyCyber 267 ~ Watch Now ~In today's DailyCyber Podcast, I'm joined by Paul Caron, Head of Cyber Security, Americas at S-RM.Paul brings over 20 years of experience across military intelligence, counterterrorism, and cybersecurity leadership—including senior roles at PwC and as Managing Director of Incident Response at a global consulting firm. We dive deep into Incident Response realities and how AI is reshaping the security landscape.

Joey Pinz Discipline Conversations
#677 Pax8 Beyond-Christopher Marquez:

Joey Pinz Discipline Conversations

Play Episode Listen Later Jul 9, 2025 27:52


Send us a textIn this heartfelt and high-impact episode recorded at Pax8 Beyond 2025, Joey Pinz sits down with Christopher Marquez of IronScales for a powerful conversation that blends vendor strategy, personal resilience, and community leadership.Christopher kicks off by sharing his goals for the week: learning from partners, improving services, and helping MSPs strengthen their security posture. He breaks down how IronScales uses adaptive AI to protect against phishing and email attacks, offering efficient deployment, automation, and education as part of their channel-first approach. MSPs benefit from tools like free email health checks, coaching support, and NFR licenses for internal use.But this episode goes beyond tech. Christopher opens up about his past struggle with alcohol abuse, the wake-up call from his doctor, and his journey to recovery and lasting wellness. He and Joey reflect on the power of discipline, coaching, and community in transforming both business and life.From pork green chili to partner enablement to self-awareness, this conversation is a rich mix of grit, gratitude, and growth — for anyone navigating the MSP space or a personal reset. 

Federal Newscast
FBI urged to step up protection of government officials from mobile cyber threats

Federal Newscast

Play Episode Listen Later Jul 7, 2025 6:13


The FBI is being urged to step up its efforts to protect government officials from mobile cyber threats. In a new letter to the bureau, Senator Ron Wyden says its current spyware guidance isn't enough to protect against advanced cyber tools. He pointed to how spyware has been found on the phones of dozens of government employees.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

North Fulton Business Radio
AI, Cyber Threats, and Your Business with Chris Noles, Beyond Computer Solutions

North Fulton Business Radio

Play Episode Listen Later Jul 2, 2025


AI, Cyber Threats, and Your Business with Chris Noles, Beyond Computer Solutions (North Fulton Business Radio, Episode 880) In this episode of North Fulton Business Radio, host John Ray welcomes back Chris Noles, owner and president of Beyond Computer Solutions, to discuss what every business, large or small, needs to know about modern cybersecurity threats. Chris […] The post AI, Cyber Threats, and Your Business with Chris Noles, Beyond Computer Solutions appeared first on Business RadioX ®.

The Thoughtful Entrepreneur
2225 - The Multi-Factor Authentication is Your First Line of Defense Against Cyber Threats with ReachOut's Rick Jordan

The Thoughtful Entrepreneur

Play Episode Listen Later Jul 1, 2025 20:01


Navigating the Evolving Landscape of Cybersecurity and AI: In-Depth Insights from Rick JordanIn this episode of The Thoughtful Entrepreneur, host Josh Elledge talks with Rick Jordan, speaker, coach, and Founder & CEO of ReachOut Technology. Rick unpacks the rapidly changing worlds of cybersecurity and artificial intelligence, and how business leaders can stay proactive in protecting their organizations. With practical advice, personal stories, and big-picture strategy, Rick shares what it really takes to succeed—and stay secure—in a digital-first world.Exploring the Human and Technical Sides of CybersecurityThe conversation begins on a personal note as Rick shares how technology, particularly gaming, creates meaningful connections with his daughter. Josh adds how gaming fosters deeper bonds in his own family, highlighting the positive impact of shared digital experiences. This sets the stage for the bigger conversation—how the human element influences technology, cybersecurity, and communication.Rick explains how ReachOut Technology addresses cybersecurity for small and mid-sized businesses by offering enterprise-level solutions through a clear and trusted brand. He shares his unique growth-by-acquisition strategy, integrating smaller IT service providers to create a unified, scalable, and culturally aligned company. He also outlines how his team helps SMBs implement practical steps like MFA, employee security training, and credit freezes to reduce risks from modern cyber threats.A consistent theme throughout the episode is the power of communication—whether between parents and kids or tech leaders and their teams. Rick emphasizes that cybersecurity is as much about people as it is about technology. His mission is to equip leaders with both the technical knowledge and communication skills needed to safeguard their organizations in an AI-driven world.About Rick Jordan:Rick Jordan is a nationally recognized speaker, coach, and cybersecurity expert. As the CEO of ReachOut Technology, Rick is committed to simplifying cybersecurity for SMBs and helping leaders take practical steps to protect their teams. He's also a media personality and author, using his platform to educate and inspire through books, interviews, and keynotes.About ReachOut Technology:ReachOut Technology is a managed IT and cybersecurity company that provides enterprise-level protection and support to small and mid-sized businesses. Through a unique acquisition strategy and customer-focused approach, ReachOut is creating a household name in the fragmented IT space.Links Mentioned in this Episode:Rick Jordan's WebsiteRick Jordan on LinkedInReachOut Technology WebsiteEpisode Highlights:The personal and professional ways technology fosters connectionHow ReachOut Technology is scaling through strategic acquisitionsThe biggest cybersecurity threats and why phishing remains a top concernWhy MFA and security awareness training are no longer optionalThe importance of communication in driving cultural change around cybersecurityConclusionJosh and Rick's conversation bridges the gap between technology and human behavior. From protecting digital assets to creating stronger family connections, Rick emphasizes the need for both technical tools and empathetic...

Today in Health IT
2 Minute Drill: Scattered Spider Targets Insurance and Iran Cyber Threats Escalate With Drex DeFord

Today in Health IT

Play Episode Listen Later Jun 26, 2025 4:22 Transcription Available


Drex covers three critical cybersecurity developments: Scattered Spider's shift to targeting insurance companies including Erie Insurance, Philadelphia Insurance, and Aflac using advanced social engineering tactics; escalating Iran-related cyber threats to US critical infrastructure amid Middle East tensions; and a massive dark web leak exposing 1.6 billion login credentials. Don't miss these actionable security recommendations including reviewing password reset processes, implementing strong authentication measures, and preparing for potential nation-state attacks on healthcare infrastructure.Remember, Stay a Little Paranoid X: This Week Health LinkedIn: This Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer

Ones Ready
Ops Brief 065: Daily Drop - 24 June 2025 (Fat Shaming & B-2s)

Ones Ready

Play Episode Listen Later Jun 24, 2025 18:04


Send us a textWelcome back to The Daily Drop—where Jared rants, roasts, and breaks down the news like only the Ones Ready crew can. Today's main event? Iran punches back with a missile strike on Al-Udeid, but 13 of 14 missiles get slapped out of the sky. Trump drops an F-bomb on the lawn. Space and Cyber Command flex behind the scenes. And everyone's favorite stealth bat—the B-2—continues to steal headlines.Meanwhile, the Air Force wants airmen to run two miles... twice a year. Cue the Facebook tears and diaper rash in the NCO groups. Jared lets the fatties have it with a no-holds-barred takedown that would make your Chief blush. Also: the F-15EX has supply chain issues (again), Tech Sergeant promotions spike, and drones in Ukraine are now hiding in IKEA houses.It's blunt. It's brutal. It's your morning slap of reality—Ones Ready style.

Afternoon Drive with John Maytham
Trump, Tehran, and the ticking clock

Afternoon Drive with John Maytham

Play Episode Listen Later Jun 23, 2025 9:17


John Maytham is joined by James Ker-Lindsay, Senior Research Fellow at Kingston University and a leading expert on conflict, security, and statehood, to unpack the dangerous spiral unfolding between Israel, Iran, and the United States Presenter John Maytham is an actor and author-turned-talk radio veteran and seasoned journalist. His show serves a round-up of local and international news coupled with the latest in business, sport, traffic and weather. The host’s eclectic interests mean the program often surprises the audience with intriguing book reviews and inspiring interviews profiling artists. A daily highlight is Rapid Fire, just after 5:30pm. CapeTalk fans call in, to stump the presenter with their general knowledge questions. Another firm favourite is the humorous Thursday crossing with award-winning journalist Rebecca Davis, called “Plan B”. Thank you for listening to a podcast from Afternoon Drive with John Maytham Listen live on Primedia+ weekdays from 15:00 and 18:00 (SA Time) to Afternoon Drive with John Maytham broadcast on CapeTalk https://buff.ly/NnFM3Nk For more from the show go to https://buff.ly/BSFy4Cn or find all the catch-up podcasts here https://buff.ly/n8nWt4x Subscribe to the CapeTalk Daily and Weekly Newsletters https://buff.ly/sbvVZD5 Follow us on social media: CapeTalk on Facebook: https://www.facebook.com/CapeTalk CapeTalk on TikTok: https://www.tiktok.com/@capetalk CapeTalk on Instagram: https://www.instagram.com/ CapeTalk on X: https://x.com/CapeTalk CapeTalk on YouTube: https://www.youtube.com/@CapeTalk567 See omnystudio.com/listener for privacy information.

Today in Health IT
2 Minute Drill: Iran Cyber Threats, Microsoft Scams, and the 1300% Deepfake Surge with Drex DeFord

Today in Health IT

Play Episode Listen Later Jun 19, 2025 3:14 Transcription Available


Drex breaks down three critical cybersecurity developments healthcare organizations need to monitor. First, escalating geopolitical tensions suggest increased cyber attacks from Iran and allied nations targeting U.S. critical infrastructure, including healthcare systems. Second, Vanderbilt University Medical Center reports sophisticated Microsoft Teams impersonation attacks where scammers pose as supervisors to request urgent actions like software installation or payments. Finally, deepfake fraud attempts skyrocketed 1300% in 2024, with new "spoofing as a service" platforms making AI-powered voice and video scams more accessible to cybercriminals. Healthcare IT leaders should prepare defenses against these evolving threats and educate staff on verification protocols for suspicious requests.Remember, Stay a Little Paranoid X: This Week Health LinkedIn: This Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer

Microsoft Threat Intelligence Podcast
A Peek Inside Microsoft's Global Fight Against Cyber Threats

Microsoft Threat Intelligence Podcast

Play Episode Listen Later Jun 11, 2025 46:21


Recorded live at RSAC 2025, this special episode of the Microsoft Threat Intelligence Podcast, hosted by Sherrod DeGrippo, brings together Jeremy Dallman from the Microsoft Threat Intelligence and Steven Masada from Microsoft's Digital Crimes Unit.   The panel explores the psychology and techniques behind nation-state and criminal cyber actors, how Microsoft innovatively uses legal and technical disruption to dismantle threats like Cobalt Strike and Storm-2139, and the growing trend of adversaries leveraging AI. From North Korean fake job interviews to China's critical infrastructure infiltration, this episode highlights how Microsoft is staying ahead of the curve—and sometimes even rewriting the playbook.  In this episode you'll learn:       How targeting attacker techniques is more effective than chasing specific actors  The surprising ways threat actors use AI—for productivity, not just deepfakes  Why North Korean threat actors are building full-blown video games to drop malware  Some questions we ask:      What's the role of Microsoft's Digital Crimes Unit and how is it unique in the industry?  Why should cybersecurity professionals read legal indictments?  What impact did Microsoft's legal actions have on tools like Cobalt Strike and Quakbot?  Resources:   View Jeremy Dallman on LinkedIn   View Steven Masada on LinkedIn   View Sherrod DeGrippo on LinkedIn   Bold action against fraud: Disrupting Storm-1152    Related Microsoft Podcasts:                    Afternoon Cyber Tea with Ann Johnson  The BlueHat Podcast  Uncovering Hidden Risks      Discover and follow other Microsoft podcasts at microsoft.com/podcasts   Get the latest threat intelligence insights and guidance at Microsoft Security Insider    The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.  

Cyber Security Today
Cybersecurity Month in Review: Uncovering Digital and Physical Threats

Cyber Security Today

Play Episode Listen Later Jun 7, 2025 48:37 Transcription Available


  In this episode of the 'Cybersecurity Today: The Month in Review' show, host Jim welcomes regular guests Laura Payne and David Shipley, along with newcomer Anton Levaja. The trio dives deep into various cybersecurity stories, analyzing trends, threats, and recent incidents. Topics include the intriguing Mystery Leaker exposing cyber criminals, the rise and sophistication of LockBit ransomware, the devastating ransomware attack on Coinbase and their bold counter-response, and the physical dangers faced by cryptocurrency entrepreneurs. The episode also highlights the innovation in law enforcement tactics and the pressing need for better cybersecurity awareness and education. They wrap up on a hopeful note, showcasing a young scout's inspiring project on cyber fraud prevention that gained support from the local police. 00:00 Introduction and Panelist Welcome 00:38 Show Format and Story Introduction 01:28 The Mystery Leaker Story 03:35 Law Enforcement and Cyber Crime 10:51 Coinbase Ransomware Incident 18:04 Physical Threats in the Crypto World 24:56 Operation Shamrock and Organized Crime 25:19 Breaking News: Kidnapping Mastermind Arrested 26:18 Quishing: The Clever Side of Cybercrime 27:11 QR Code Scams and Consumer Protection 31:08 Generational Differences in Cyber Threats 32:05 The Evolution of Cyber Attacks 38:40 Physical Crime in the Digital Age 41:10 Law Enforcement and Cybersecurity 43:55 Government Surveillance and Privacy Concerns 46:08 Feel-Good Story: Young Cybersecurity Advocate

The CyberWire
AVCheck goes dark in Operation Endgame.

The CyberWire

Play Episode Listen Later Jun 2, 2025 29:16


An international law enforcement operation dismantles AVCheck. Trump's 2026 budget looks to cut over one thousand positions from CISA. Cyber Command's defensive wing gains sub-unified command status. A critical vBulletin vulnerability is actively exploited. Acreed takes over Russian markets as credential theft kingpin. Qualcomm patches three actively exploited zero-days in its Adreno GPU drivers. Researchers unveil details of a Cisco IOS XE Zero-Day. Microsoft warns a memory corruption flaw in the legacy JScript engine is under active exploitation. A closer look at the stealthy Lactrodectus loader. On today's Afternoon Cyber Tea, Ann Johnson speaks with Hugh Thompson, RSAC program committee chair. Decoding AI hallucinations with physics. Complete our annual audience survey before August 31. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we have our Afternoon Cyber Tea segment with Ann Johnson. On today's episode, Ann speaks with Hugh Thompson, RSAC program committee chair, as they discuss what goes into building the RSA Conference. Selected Reading Police takes down AVCheck site used by cybercriminals to scan malware (Bleeping Computer) DHS budget request would cut CISA staff by 1,000 positions (Federal News Network) Cybercom's defensive arm elevated to sub-unified command (DefenseScoop) vBulletin Vulnerability Exploited in the Wild (SecurityWeek) Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown (Infosecurity Magazine) Qualcomm fixes three Adreno GPU zero-days exploited in attacks (Bleeping Computer) Exploit details for max severity Cisco IOS XE flaw now public (Bleeping Computer) Microsoft Scripting Engine flaw exploited in wild, Proof-of-Concept published (Beyond Machines) Latrodectus Malware Analysis: A Deep Dive into the Black Widow of Cyber Threats in 2025 (WardenShield) The Root of AI Hallucinations: Physics Theory Digs Into the 'Attention' Flaw  (SecurityWeek) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Daily Signal News
Quantum Warfare: How Titanium Secure Protects You From Chinese Cyber Threats

Daily Signal News

Play Episode Listen Later Apr 27, 2025 32:37


Dive deep into the world of cybersecurity with Dr. John Reese, founder and CEO, and Michael Avari, CIO of Titanium Secure. Learn why quantum-resistant encryption has become crucial in an era of Chinese cyber threats and big tech data harvesting. Key Topics: 1) The birth of Titanium Secure: Discover how Reese's unique path from dentistry to cybersecurity led to his founding a secure communications platform 2) Why Parler's deplatforming in 2020 signaled a need for independent secure communications 3) The Chinese threat: Recent telecom infiltrations and infrastructure targeting 4) Quantum computing explained: Why current encryption is vulnerable and how Titanium Secure is resistant 5) Beyond Big Tech: Why free services like WhatsApp and Telegram come with hidden costs 6) Real-world uses: From real estate transactions to sensitive government communications Titanium Secure is available across all major platforms including Windows, Mac, Android, iOS, and Linux, and can be accessed through its website or downloaded from Apple and Google Play app stores. Pricing starts at $6/month for individuals, with enterprise and temporary subscription options. Guest Bios: Dr. John Reese: Former dentist turned tech entrepreneur who founded Titanium Secure after identifying critical gaps in conservative communication security Michael Avari: Former CISO with deep tech background, now CIO of Titanium Secure, bringing expertise in quantum-resistant encryption Resources: Visit https://www.TitaniumSecure.io for more information Download from the Apple or Google Play app stores The Daily Signal cannot continue to tell stories, like this one, without the support of our viewers: https://secured.dailysignal.com/ Learn more about your ad choices. Visit megaphone.fm/adchoices

Sales vs. Marketing
Lessons - Fixing Human Error in Cybersecurity | Theresa Payton - Former White House CIO

Sales vs. Marketing

Play Episode Listen Later Mar 30, 2025 11:29


➡️ Like The Podcast? Leave A Rating: https://ratethispodcast.com/successstory  In this "Lessons" episode, Theresa Payton, former White House CIO, shares how predictable human behavior creates vulnerabilities in cybersecurity and why conventional defenses often fall short. Learn why routine security measures are exploited by sophisticated social engineering and how designing innovative, personalized protocols can disrupt attackers and strengthen digital defenses. ➡️ Show Linkshttps://successstorypodcast.com  YouTube: https://youtu.be/bH8DwhGUg0cApple: https://podcasts.apple.com/us/podcast/theresa-payton-cybersecurity-expert-author-former-white/id1484783544Spotify: https://open.spotify.com/episode/5DLZKqN89CTRVXW2Hi3Pq5➡️ Watch the Podcast on YouTubehttps://www.youtube.com/c/scottdclary