Podcasts about Cyberwarfare

Use of technological force within cyberspace

  • 628PODCASTS
  • 1,257EPISODES
  • 40mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Sep 18, 2025LATEST
Cyberwarfare

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Cyberwarfare

Show all podcasts related to cyberwarfare

Latest podcast episodes about Cyberwarfare

The Foreign Affairs Interview
Is America Ready for the Age of Cyber Warfare?

The Foreign Affairs Interview

Play Episode Listen Later Sep 18, 2025 54:53


In 2024, the U.S. government discovered that Chinese hackers had penetrated a huge swath of the American telecommunications system—and remained there for years. That attack came to be known as Salt Typhoon. China has not only managed to steal the data and surveil the communications of hundreds of millions of Americans. It also embedded itself in the United States' most important infrastructure, giving Beijing a crucial advantage in a conflict. Anne Neuberger was until recently the top cybersecurity official on the National Security Council. She was in that position when Salt Typhoon was discovered. And to her, the attack is not just an isolated incident of cyberespionage. Rather, it is evidence of American weakness, and Chinese dominance, in a central arena of national security. “Decades after the widespread adoption of the Internet opened a new realm of geopolitical contestation,” she writes in the current issue of Foreign Affairs, “the United States has fallen behind, failing to secure a vast digital home front.” Neuberger warns that, as artificial intelligence grows ever more sophisticated, the threat of a cyberattack that could paralyze the country in a time of crisis has never been higher. You can find sources, transcripts, and more episodes of The Foreign Affairs Interview at https://www.foreignaffairs.com/podcasts/foreign-affairs-interview.

Random but Memorable
How cyber warfare really works with Hayley Benedict | DISRUPT CONFLICT RISK SYSTEM

Random but Memorable

Play Episode Listen Later Sep 16, 2025 69:41


What does cyberwarfare really look like behind the headlines? This week, Roo sits down with Hayley Benedict, a cyber intelligence analyst at RANE, to explore the evolving world of digital conflict. From hacktivists to disinformation specialists, Hayley shares how nation states, criminals, and ideologically driven groups are blurring lines — and why data theft, disruption, and doubt remain the weapons of choice.

CISO Tradecraft
#250 - Understanding Vulnerabilities, Exploits, and Cybersecurity

CISO Tradecraft

Play Episode Listen Later Sep 15, 2025 46:48


Join host G Mark Hardy on CISO Tradecraft as he welcomes Patrick Garrity from VulnCheck and Tod Beardsley from Run Zero to discuss the latest in cybersecurity vulnerabilities, exploits, and defense strategies. Learn about their backgrounds, the complexities of security research, and strategies for effective communication within enterprises. The discussion delves into vulnerabilities, the significant risks posed by ransomware, and actionable steps for CISOs and security executives to protect their organizations. Stay tuned for invaluable insights on cybersecurity leadership and management. Chapters 00:00 Introduction and Guest Welcome 00:57 Meet Patrick Garrity: Security Researcher and Skateboard Enthusiast 02:12 Meet Todd Beardsley: From Hacker to Security Research VP 03:58 The Evolution of Vulnerabilities and Patching 07:06 Understanding CVE Numbering and Exploitation 14:01 The Role of Attribution in Cybersecurity 16:48 Cyber Warfare and Global Threat Landscape 20:18 The Rise of International Hacking 22:01 Delegation of Duties in Offensive Warfare 22:25 The Role of Companies in Cyber Defense 23:00 Attack Vectors and Exploits 24:25 Real-World Scenarios and Threats 28:46 The Importance of Communication Skills for CISOs 31:42 Ransomware: A Divisive Topic 38:39 Actionable Steps for Security Executives 45:58 Conclusion and Final Thoughts

CISO Tradecraft
#250 - Understanding Vulnerabilities, Exploits, and Cybersecurity

CISO Tradecraft

Play Episode Listen Later Sep 15, 2025 46:48 Transcription Available


Join host G Mark Hardy on CISO Tradecraft as he welcomes Patrick Garrity from VulnCheck and Tod Beardsley from Run Zero to discuss the latest in cybersecurity vulnerabilities, exploits, and defense strategies. Learn about their backgrounds, the complexities of security research, and strategies for effective communication within enterprises. The discussion delves into vulnerabilities, the significant risks posed by ransomware, and actionable steps for CISOs and security executives to protect their organizations. Stay tuned for invaluable insights on cybersecurity leadership and management.  Chapters 00:00 Introduction and Guest Welcome 00:57 Meet Patrick Garrity: Security Researcher and Skateboard Enthusiast 02:12 Meet Todd Beardsley: From Hacker to Security Research VP 03:58 The Evolution of Vulnerabilities and Patching 07:06 Understanding CVE Numbering and Exploitation 14:01 The Role of Attribution in Cybersecurity 16:48 Cyber Warfare and Global Threat Landscape 20:18 The Rise of International Hacking 22:01 Delegation of Duties in Offensive Warfare 22:25 The Role of Companies in Cyber Defense 23:00 Attack Vectors and Exploits 24:25 Real-World Scenarios and Threats 28:46 The Importance of Communication Skills for CISOs 31:42 Ransomware: A Divisive Topic 38:39 Actionable Steps for Security Executives 45:58 Conclusion and Final Thoughts

The Institute of World Politics
Russian Information and Cyber Warfare Threats: What We Know from the Russian Attack on Ukraine

The Institute of World Politics

Play Episode Listen Later Sep 10, 2025 59:42


About the Lecture This presentation will explore the scope and evolution of Russian information and cyber warfare, drawing key lessons from the ongoing conflict in Ukraine. Ambassador Smith will begin with an overview of Russia's cyber capabilities and principal actors, then examine how Russian cyber attacks on Ukraine have developed over time and the implications for Ukraine, the United States, and the future of modern warfare. About the Speaker Ambassador David J. Smith is a foreign policy professional with over 40 years of experience spanning the U.S. military, Pentagon, State Department, Congress, diplomatic delegations, defense industry, research institutes, and democratic development initiatives. His expertise includes NATO, the former Soviet Union, the Caucasus and Black Sea regions, arms control, missile defense, and cybersecurity policy. A former U.S. Air Force officer and Professor of Cybersecurity Policy at Utica College, Ambassador Smith has served as the U.S. Chief Negotiator at the U.S.-Soviet Defense and Space talks, a Senior Fellow at the Georgian Foundation for Strategic and International Studies, and founder of the Georgian Security Analysis Center. His work in Georgia from 2002 to 2014 placed him at the forefront of studying the first combined kinetic and cyber war during Russia's 2008 attack on Georgia. Ambassador Smith has delivered his continually updated presentation, Russian Cyber Capabilities, Policy, and Practice, to audiences around the world since 2010.

Let's Know Things
Salt Typhoon

Let's Know Things

Play Episode Listen Later Sep 9, 2025 15:30


This week we talk about cyberespionage, China, and asymmetrical leverage.We also discuss political firings, hardware infiltration, and Five Eyes.Recommended Book: The Fourth Turning Is Here by Neil HoweTranscriptIn the year 2000, then-General Secretary of the Chinese Communist Party, Jiang Zemin (jong ZEM-in), approved a plan to develop so-called “cyber coercive capabilities”—the infrastructure for offensive hacking—partly as a consequence of aggressive actions by the US, which among other things had recently bombed the Chinese embassy in Belgrade as part of the NATO campaign in Yugoslavia.The US was a nuclear power with immense military capabilities that far outshone those of China, and the idea was that the Chinese government needed some kind of asymmetrical means of achieving leverage against the US and its allies to counter that. Personal tech and the internet were still relatively young in 2000—the first iPhone wouldn't be released for another seven years, for context—but there was enough going on in the cyber-intelligence world that it seemed like a good point of leverage to aim for.The early 2000s Chairman of the CCP, Hu Jintao, backed this ambition, citing the burgeoning threat of instability-inducing online variables, like those that sparked the color revolutions across Europe and Asia, and attack strategies similar to Israel's Stuxnet cyberattack on Iran as justification, though China's growing economic dependence on its technological know-how was also part of the equation; it could evolve its capacity in this space relatively quickly, and it had valuable stuff that was targetable by foreign cyberattacks, so it was probably a good idea to increase their defenses, while also increasing their ability to hit foreign targets in this way—that was the logic here.The next CCP Chairman, Xi Jinping, doubled-down on this effort, saying that in the cyber world, everyone else was using air strikes and China was still using swords and spears, so they needed to up their game substantially and rapidly.That ambition seems to have been realized: though China is still reportedly regularly infiltrated by foreign entities like the US's CIA, China's cybersecurity firms and state-affiliated hacker groups have become serious players on the international stage, pulling off incredibly complex hacks of foreign governments and infrastructure, including a campaign called Volt Typhoon, which seems to have started sometime in or before 2021, but which wasn't discovered by US entities until 2024. This campaign saw Chinese hackers infiltrating all sorts of US agencies and infrastructure, initially using malware, and then entwining themselves with the operating systems used by their targets, quietly syphoning off data, credentials, and other useful bits of information, slowly but surely becoming even more interwoven with the fabric of these systems, and doing so stealthily in order to remain undetected for years.This effort allowed hackers to glean information about the US's defenses in the continental US and in Guam, while also helping them breach public infrastructure, like Singapore's telecommunications company, Singtel. It's been suggested that, as with many Chinese cyberattacks, this incursion was a long-game play, meant to give the Chinese government the option of both using private data about private US citizens, soldiers, and people in government for manipulation or blackmail purposes, or to shut down important infrastructure, like communications channels or electrical grids, in the event of a future military conflict.What I'd like to talk about today is another, even bigger and reportedly more successful long-term hack by the Chinese government, and one that might be even more disruptive, should there ever be a military conflict between China and one of the impacted governments, or their allies.—Salt Typhoon is the name that's been given to a so-called '“advanced persistent threat actor,” which is a formal way of saying hacker or hacker group, by Microsoft, which plays a big role in the cybersecurity world, especially at this scale, a scale involving not just independent hackers, but government-level cyberespionage groups.This group is generally understood to be run out of the Chinese Ministry of State Security, or MSS, and though it's not usually possible to say something like that for certain, hence the “generally understood” component of that statement, often everyone kind of knows who's doing what, but it's imprudent to say so with 100% certainty, as cyberespionage, like many other sorts of spy stuff, is meant to be a gray area where governments can knock each other around without leading to a shooting war. If anyone were to say with absolute certainty, yes, China is hacking us, and it's definitely the government, and they're doing a really good job of it, stealing all our stuff and putting us at risk, that would either require the targeted government to launch some sort of counterstrike against China, or would leave that targeted government looking weak, and thus prone to more such incursions and attacks, alongside any loss of face they might suffer.So there's a lot of hand-waving and alluding in this sphere of diplomacy and security, but it's basically understood that Salt Typhoon is run by China, and it's thought that they've been operating since at least 2020.Their prime function seems to be stealing as much classified data as they can from governments around the world, and scooping up all sorts of intellectual property from corporations, too.China's notorious for collecting this kind of IP and then giving it to Chinese companies, which have become really good at using such IP, copying it, making it cheaper, and sometimes improving upon it in other ways, as well. This government-corporation collaboration model is fundamental to the operation of China's economy, and the dynamic between its government, it's military, its intelligence services, and its companies, all of which work together in various ways.It's estimated that Salt Typhoon has infiltrated more than 200 targets in more than 80 countries, and alongside corporate entities like AT&T and Verizon, they also managed to scoop up private text messages from Kamala Harris' and Donald Trump's presidential campaigns in 2024, using hacks against phone services to do so.Three main Chinese tech companies allegedly helped Salt Typhoon infiltrate foreign telecommunications companies and internet service providers, alongside hotel, transportation, and other sorts of entities, which allowed them to not just grab text messages, but also track people, keeping tabs on their movements, which again, might be helpful in future blackmail or even assassination operations.Those three companies seem to be real-deal, actual companies, not just fronts for Chinese intelligence, but the government was able to use them, and the services and products they provide, to sneak malicious code into all kinds of vital infrastructure and all sorts of foreign corporations and agencies—which seems to support concerns from several years ago about dealing with Chinese tech companies like Huawei; some governments decided not to work with them, especially in building-out their 5G communications infrastructure, due to the possibility that the Chinese government might use these ostensibly private companies as a means of getting espionage software or devices into these communications channels or energy grids. The low prices Huawei offered just wasn't worth the risk.The US government announced back in 2024 that Salt Typhoon had infiltrated a bunch of US telecommunications companies and broadband networks, and that routers manufactured by Cisco were also compromised by this group. The group was also able to get into ISP services that US law enforcement and intelligence services use to conduct court-authorized wiretaps; so they weren't just spying on individuals, they were also spying on other government's spies and those they were spying on.Despite all these pretty alarming findings, in the midst of the investigation into these hacks, the second US Trump administration fired the government's Cyber Safety Review Board, which was thus unable to complete its investigation into Salt Typhoon's intrusion.The FBI has since issued a large bounty for information about those involved in Salt Typhoon, but that only addresses the issue indirectly, and there's still a lot we don't know about this group, the extent of their hacking, and where else they might still be embedded, in part because the administration fired those looking into it, reportedly because the administration didn't like this group also looking into Moscow's alleged interference in the 2016 presidential election, and Salt Typhoon's potential interference with the 2024 presidential election, both of which Trump won.The US government has denied these firings are in any way political, saying they intend to focus on cyber offense rather than defense, and pointing out that the current approach to investigating these sorts of things was imperfect; which is something that most outside organizations would agree on.That said, there are concerns that these firings, and other actions against the US's cyberthreat defensive capabilities, are revenge moves against people and groups that have said the 2020 presidential election, which Trump lost to Joe Biden, was the most secure and best-run election in US history; which flies in the face of Trump's preferred narrative that he won in 2020—something he's fond of repeating, though without evidence, and with a vast body of evidence against his claim.The US has also begun pulling away from long-time allies that it has previously collaborated with in the cyberespionage and cyberdefense sphere, including its Five Eyes partners, the UK, Canada, Australia, and New Zealand.Since Tulsi Gabbard was installed as the Director of National Intelligence by Trump's new administration, US intelligence services have been instructed to withhold information about negotiations with Russia and Ukraine from these allies; something that's worrying intelligence experts, partly because this move seems to mostly favor Russia, and partly because it represents one more wall, of many, that the administration seems to be erecting between the US and these allies. Gabbard herself is also said to be incredibly pro-Russian, so while that may not be influencing this decision, it's easy to understand why many allies and analysts are concerned that her loyalties might be divided in this matter.So what we have is a situation in which political considerations and concerns, alongside divided priorities and loyalties within several governments, but the US in particular right now, might be changing the layout of, and perhaps even weakening, cybersecurity and cyberespionage services at the very moment these services might be most necessary, because a foreign government has managed to install itself in all kinds of agencies, infrastructure, and corporations.That presence could allow China to milk these entities for information and stolen intellectual property, but it could also put the Chinese government in a very favorable position, should some kind of conflict break out, including but not limited to an invasion of Taiwan; if the US's electrical grids or telecommunications services go down, or the country's military is unable to coordinate with itself, or with its allies in the Pacific, at the moment China invades, there's a non-zero chance that would impact the success of that invasion in China's favor.Again, this is a pretty shadowy playing field even at the best of times, but right now there seems to be a lot happening in the cyberespionage space, and many of the foundations that were in place until just recently, are also being shaken, shattered, or replaced, which makes this an even more tumultuous, uncertain moment, with heightened risks for everybody, though maybe the opposite for those attacking these now more-vulnerable bits of infrastructure and vital entities.Show Noteshttps://www.nbcnews.com/tech/security/china-used-three-private-companies-hack-global-telecoms-us-says-rcna227543https://media.defense.gov/2025/Aug/22/2003786665/-1/-1/0/CSA_COUNTERING_CHINA_STATE_ACTORS_COMPROMISE_OF_NETWORKS.PDFhttps://www.nytimes.com/2025/04/05/us/politics/trump-loomer-haugh-cyberattacks-elections.htmlhttps://www.france24.com/en/americas/20250826-has-the-us-shut-its-five-eyes-allies-out-of-intelligence-on-ukraine-russia-peace-talkshttps://www.axios.com/2025/09/04/china-salt-typhoon-fbi-advisory-us-datahttps://www.wsj.com/politics/national-security/chinese-spies-hit-more-than-80-countries-in-salt-typhoon-breach-fbi-reveals-59b2108fhttp://axios.com/2025/08/02/china-usa-cyberattacks-microsoft-sharepointhttps://www.axios.com/2024/12/03/salt-typhoon-china-phone-hackshttps://www.nytimes.com/2025/09/04/world/asia/china-hack-salt-typhoon.htmlhttps://www.euronews.com/2025/09/04/trump-and-jd-vance-among-targets-of-major-chinese-cyberattack-investigators-sayhttps://www.congress.gov/crs-product/IF12798https://www.fcc.gov/document/implications-salt-typhoon-attack-and-fcc-responsehttps://en.wikipedia.org/wiki/Salt_Typhoonhttps://en.wikipedia.org/wiki/2024_global_telecommunications_hackhttps://en.wikipedia.org/wiki/Chinese_interference_in_the_2024_United_States_electionshttps://www.theregister.com/2025/08/28/how_does_china_keep_stealing/https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4287371/nsa-and-others-provide-guidance-to-counter-china-state-sponsored-actors-targeti/https://chooser.crossref.org/?doi=10.2307%2Fjj.16040335https://en.wikipedia.org/wiki/Cyberwarfare_and_Chinahttps://en.wikipedia.org/wiki/Volt_Typhoon This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit letsknowthings.substack.com/subscribe

Communism Exposed:East and West
China's Political and Cyber Warfare: Why Canada Needs to Wake Up Now

Communism Exposed:East and West

Play Episode Listen Later Sep 9, 2025 4:12


Voice-Over-Text: Pandemic Quotables
China's Political and Cyber Warfare: Why Canada Needs to Wake Up Now

Voice-Over-Text: Pandemic Quotables

Play Episode Listen Later Sep 9, 2025 4:12


Pandemic Quotables
China's Political and Cyber Warfare: Why Canada Needs to Wake Up Now

Pandemic Quotables

Play Episode Listen Later Sep 9, 2025 4:12


Communism Exposed:East & West(PDF)
China's Political and Cyber Warfare: Why Canada Needs to Wake Up Now

Communism Exposed:East & West(PDF)

Play Episode Listen Later Sep 9, 2025 4:12


WCCO Tech Talk
How vulnerable are we to cyber warfare?

WCCO Tech Talk

Play Episode Listen Later Sep 6, 2025 33:12


Tech Talk with Steve Thomson and Doug Swinhart! Topics include: Cyber warfare and protecting cyber infrastructure and the threat level. Awareness especially for seniors who are often targeted for online scams Is it necessary to upgrade to Windows 11? Recovering an accidentally deleted email inbox Should you be wary of QR codes? Texts and calls from listeners

Worldview Matters With David Fiorazo
Pete Garcia: Cyberwarfare And The Facade Of ‘Peace & Security'

Worldview Matters With David Fiorazo

Play Episode Listen Later Aug 28, 2025 29:07


Today’s topic of discussion are about threats to American infrastructure that would heed zero warning. Rev310: https://www.rev310.net Zero Day Exploit: https://www.rev310.net/post/zero-day-exploit www.worldviewmatters.tv © FreedomProject 2025

Security Now (MP3)
SN 1036: Inside the SharePoint 0-day - Is Our Data Safe Anywhere?

Security Now (MP3)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

All TWiT.tv Shows (MP3)
Security Now 1036: Inside the SharePoint 0-day

All TWiT.tv Shows (MP3)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

Security Now (Video HD)
SN 1036: Inside the SharePoint 0-day - Is Our Data Safe Anywhere?

Security Now (Video HD)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

Security Now (Video HI)
SN 1036: Inside the SharePoint 0-day - Is Our Data Safe Anywhere?

Security Now (Video HI)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

Radio Leo (Audio)
Security Now 1036: Inside the SharePoint 0-day

Radio Leo (Audio)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

Security Now (Video LO)
SN 1036: Inside the SharePoint 0-day - Is Our Data Safe Anywhere?

Security Now (Video LO)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

All TWiT.tv Shows (Video LO)
Security Now 1036: Inside the SharePoint 0-day

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

Radio Leo (Video HD)
Security Now 1036: Inside the SharePoint 0-day

Radio Leo (Video HD)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

IT Privacy and Security Weekly update.
EP 252.5 Deep Dive. The IT Privacy and Security Weekly Update for the Week Ending July 22nd., 2025 and no Trucks

IT Privacy and Security Weekly update.

Play Episode Listen Later Jul 24, 2025 13:19


A single compromised password led to the collapse of 158-year-old UK logistics firm KNP, after hackers—suspected to be the Akira gang—used it to gain access, encrypt systems, and demand a £5 million ransom. Unable to pay, the company lost all its data and folded, putting 700 employees out of work. The breach underscores how weak access controls can have catastrophic consequences.To counter massive botnets, Google is now combining technical defenses with legal action. Its lawsuit against the “BadBox 2.0” operators marks a major shift: targeting criminals behind malware that infected over 10 million Android devices. Google's strategy includes leveraging the CFAA and RICO Act to not just stop malware but dismantle the entire criminal infrastructure—signaling a more aggressive, litigation-driven cybersecurity era.Meanwhile, a new malware delivery method is exploiting DNS—a common but often under-monitored network function. Attackers hide malware in DNS TXT records, break it into chunks, and reassemble it on target systems using standard DNS queries. Since DNS traffic is rarely scrutinized, this technique bypasses traditional defenses, making DNS monitoring essential for comprehensive protection.Travelers to China face serious privacy risks. Authorities are using malware like “Massistant” to extract sensitive data from mobile phones during inspections. Developed by Chinese firm Meiya Pico, the software accesses encrypted texts, location history, and even Signal messages upon installation. Though evidence of compromise may remain, the intrusion happens before detection, raising concerns for anyone bringing devices into the country.China has also shifted its cyberattack strategy by outsourcing operations to private firms. These companies now discover and sell zero-day vulnerabilities to government agencies. This model, which evolved from loosely affiliated hacker groups, blurs the line between state and private enterprise, making attribution difficult. As a result, China-linked hackers increasingly infiltrate U.S. critical infrastructure while masking their origins, and exposure alone no longer seems to deter them.In response to national security concerns, Microsoft has removed China-based engineers from U.S. military cloud projects. A ProPublica investigation revealed their prior involvement, prompting a Pentagon ban on such support. Previously, Chinese engineers worked under U.S. supervision, a practice now deemed too risky for defense-related systems.Microsoft's SharePoint is also under siege. Chinese state actors exploited a critical flaw dubbed “ToolShell” to compromise at least 54 organizations, including those in critical infrastructure. The attack allowed for deep system access, extraction of encryption keys, and installation of web shells—despite prior patches. The incident stresses the need for rapid patching and vigilance, even on widely used enterprise platforms.Cyberwarfare is influencing real-world military dynamics. Ukrainian cyber operatives claim to have digitally crippled a major Russian drone manufacturer, deleting 47TB of production data and disabling access systems. Allegedly backed by military intelligence, the attack highlights how digital sabotage can directly disrupt military production and reshape conflict outcomes. Code is now as consequential as conventional weapons on the modern battlefield.

Gundam Book Club
Gundam Sentinel - The Logistic Bomb (編理爆弾) - Redux

Gundam Book Club

Play Episode Listen Later Jul 5, 2025 12:45


Send us a textMarch 13 UC 0088. The Bald Eagle enters the battlefield and faces his former student. The New Desides and their complement of mobile suits fiercely battle the Task Force Alpha. Also… A.L.I.C.E. becomes more aware.Notebook LLM ironically tackles the use of AI and sabotaging military and government assets, and talks about Battlestar Galactica (reboot).Gundam Sentinel Podcast/Gundam Book Club is performing a critical analysis and commentary and is protected by the Fair Use clause of the United States Copyright law. Gundam content is copyright and/or trademark of Sunrise Inc., Bandai, Sotsu Agency, or its original creator.  Gundam Sentinel content is copyright and/or trademark of Model Graphix, or its original creator.  Gundam Sentinel Podcast/Gundam Book Club is in no way affiliated with or endorsed by Sunrise, Bandai, Sotsu, Model Graphix or any of their subsidiaries, employees, or associates and makes no claim to own Gundam or any of the copyrights or trademarks related to it. Copyrighted content used in Gundam Sentinel Podcast/Gundam Book Club is used in accordance with the Fair Use clause of the United States Copyright law. Music used in this episode is being used under the "Fair Use" clause.  Please email gundamsentinelpodcast@gmail.com with any questions. Reference:https://en.wikipedia.org/wiki/Battlestar_Galactica_(2004_TV_series)https://en.wikipedia.org/wiki/Cyberwarfare_in_the_United_Stateshttps://en.wikipedia.org/wiki/Logic_bombModel Graphix Special Edition "Gundam Wars III" - Gundam Sentinel The Battle of "Real Gundam".

Cybercrime Magazine Podcast
Life Of A Cybersecurity Czar. Understanding Cyber Warfare. Dr. Eric Cole, Secure Anchor.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 3, 2025 17:19


A world renowned cybersecurity expert with more than 30 years of network security experience, Dr. Eric Cole – founder and CEO of Secure Anchor – helps organizations curtail the risk of cyber threats. He has worked with a variety of clients ranging from Fortune 50 companies, to top international banks, to the CIA, for which he was a professional hacker. In this episode, Dr. Cole and host Scott Schober discuss cyber warfare. To learn more about our sponsor, visit https://drericcole.org

The Institute of World Politics
Information as a Domain of War with Professor Larry Dietz

The Institute of World Politics

Play Episode Listen Later Jul 1, 2025 60:02


About the Lecture: Conflict is no longer restricted to the domains of land, sea, and air. The Information Domain has emerged as a more than an equal warfighting domain for conflict from tension through armed conflict. The presentation will look at the information domain in military context in the Ukraine, Gaza, Bosnia, and Iraq. Attendees will get an inside look at how the military orchestrates non-kinetic (systems that don't cause death or damage) using Information Operations (IO) as a battlefield multiplier in support of conflicts or potential conflicts. The Role of Information as a tool of Statecraft will also be addressed. About the Speaker: Lawrence "Larry" Dietz is a distinguished leader with a dual career spanning both military and commercial sectors. With a background in Psychological Operations, Information Operations, Cyber Warfare, Electronic Warfare, Cybersecurity, and Public Affairs, he is recognized as a thought leader in these fields. COL Dietz brings extensive experience in Military Intelligence, encompassing both strategic and tactical assignments, including open-source intelligence roles. In his military career, COL Dietz served at the NATO Four Star level and held key positions such as Deputy Commander of NATO SFOR Combined Joint Information Campaign Task Force in Bosnia, PSYOP Group Staff Officer, PSYOP Battalion Commander, and Military Intelligence Company Commander, among others. His expertise extends to Special Operations Forces, particularly in PSYOP and Civil Affairs. Transitioning into academia and law, COL Dietz has become an exceptional educator, both in traditional classroom settings and online platforms. At IWP, he created and teaches an asynchronous online graduate course on Intelligence and Policy. At Monterey College of Law, he co-developed and taught courses like Negotiation Lab and Data Privacy Elective, as well as the Law of Armed Conflict. As an Attorney at Law with DataPrivacyLaw.com, COL Dietz led a boutique legal practice specializing in complex contract issues and data privacy. His focus includes ensuring compliance with regulations such as the EU's General Data Privacy Directive and state laws like the California Consumer Privacy Act. COL Dietz is also sought after for executive presentations on Privacy, Intelligence, and Cyber Influence, catering to major software and services organizations.

TJ Trout
Greg Mullin

TJ Trout

Play Episode Listen Later Jun 30, 2025 30:02


From ABQ-IT Greg Mullin comes in to talk about "Cyber Warfare", how vulnerable are we from attacks from other countries or domestic terrorists. He also talks about hacking on your personal devices, and what to do, and how to prevent it. All this with TJ on News Radio KKOBSee omnystudio.com/listener for privacy information.

The Gist
Tehran Target Acquired...Damaged...Destroyed...Debated

The Gist

Play Episode Listen Later Jun 24, 2025 59:43


Jerusalem Post military correspondent Yonah Jeremy Bob, co-author of Target Tehran: How Israel Is Using Sabotage, Cyberwarfare, Assassination—and Secret Diplomacy—to Stop a Nuclear Iran and Create a New Middle East, explains how Israel coordinated hundreds of strikes and infiltrations across Iran, what the U.S. MOP strike on Fordow actually accomplished, and why Netanyahu's longtime caution gave way to a high-stakes gamble. He also delves into internal Israeli debates over assassinating Khamenei, the strategy behind targeting Iran's domestic enforcers, and why the Iranian nuclear threat is now both diminished and more unpredictable Plus: Mamdani's cheerful radicalism, Cuomo's glower, and a reminder that aspirational politics can veer into Theranos territory. Produced by Corey WaraProduction Coordinator Ashley KhanEmail us at ⁠⁠⁠⁠thegist@mikepesca.com⁠⁠⁠⁠To advertise on the show, contact ⁠⁠⁠⁠ad-sales@libsyn.com⁠⁠⁠⁠ or visit ⁠⁠⁠⁠https://advertising.libsyn.com/TheGist⁠⁠⁠⁠Subscribe to The Gist: ⁠⁠⁠⁠https://subscribe.mikepesca.com/⁠⁠⁠⁠Subscribe to The Gist Youtube Page: ⁠⁠⁠⁠https://www.youtube.com/channel/UC4_bh0wHgk2YfpKf4rg40_g⁠⁠⁠⁠Subscribe to The Gist Instagram Page: ⁠⁠⁠⁠GIST INSTAGRAM⁠⁠⁠⁠Follow The Gist List at: ⁠⁠⁠⁠Pesca⁠⁠⁠⁠ ⁠⁠⁠⁠Profundities | Mike Pesca | Substack Learn more about your ad choices. Visit podcastchoices.com/adchoices

3 Martini Lunch
U.S. Bombs Iran Nuke Sites: The Mission, The Aftermath, & The Crazy Reactions

3 Martini Lunch

Play Episode Listen Later Jun 23, 2025 26:49


Presidential historian and Ronald Reagan Institute Senior Fellow Tevi Troy is in for Jim today. Join Tevi and Greg as they break down the U.S. bombings of three Iranian nuclear sites on Saturday, the possible responses from Iran and the Trump administration's various comments about regime change, and the weird leftist condemnations of the strikes.First, they highlight the exceptional performance of the B-2 Bomber pilots, the lengthy and complex mission, and the airtight operational security, which may have been achieved by not telling any Democrats about the mission until after it happened. They also highlight how President Trump deftly pushed for a diplomatic solution, ramped up the tough talk, seemed to grant a two-week reprieve and then successfully surprises everyone with the timing of the strikes.Next, they contemplate what will come next - both from Iran and the United States. Will Iran close the Straits of Hormuz, focus on U.S. military bases in the region like today in Qatar, unleash sleeper cells in the U.S., or prioritize cyberterrorism? They also weigh in on Vice President Vance saying the U.S. does not have a goal of regime change in Iran while Trump openly suggests it on social media.Finally, they react to some of the most unhinged reactions to the bombings in Iran. Rep. Alexandria Ocasio-Cortez thinks Trump's actions are impeachable. Obama administration figure Tommy Vietor says any deadly response from Iran will be because we started it. And even the Los Angeles County Sheriff's Office condemned the bombings.Please visit our great sponsors:It's free, online, and easy to start—no strings attached. Enroll in Understanding Capitalism with Hillsdale College. Visit https://Hillsdale.edu/MartiniTalk it out with Betterhelp. Our listeners get 10% off their first month at https://BetterHelp.com/3MLFatty15 is on a mission to help you live healthier, longer.  Get an additional 15% off their 90-daysubscription Starter Kit by going to https://Fatty15.com/3ML and use code 3ML at checkout.

CISO Tradecraft
#238 - The Impact of the Israel Iran Conflict (with Nathan Case)

CISO Tradecraft

Play Episode Listen Later Jun 23, 2025 45:23


In this episode of CISO Tradecraft, host G Mark Hardy discusses the ongoing Israel-Iran conflict and its potential cyber implications with cybersecurity expert Nathan Case. They delve into lessons learned from the Russia-Ukraine conflict, discuss the effectiveness of cyber warfare, and evaluate Iran's cyber capabilities. The conversation also covers the ethical implications of cyber attacks, dual-use targets, and the danger of supply chain vulnerabilities. Practical advice is provided on improving cybersecurity measures, including the importance of MFA, network segmentation, and evaluating internal threats. Join us for an in-depth look at how current geopolitical tensions can impact global cybersecurity. Nathan Case - https://www.linkedin.com/in/nathancase/ Chapters 00:00 Introduction to the Israel-Iran Conflict 00:52 Meet the Expert: Nate Case 01:51 Cyber Warfare Insights from Russia-Ukraine Conflict 03:36 The Impact of Cyber on Critical Infrastructure 08:00 Ethics and Rules of Cyber Warfare 15:01 Iran's Cyber Capabilities and Strategies 16:56 Historical Context and Modern Cyber Threats 23:28 Foreign Cyber Threats: The Iranian Example 24:06 Israel's Cyber Capabilities 25:39 The Role of Cyber Command 26:23 Challenges in Cyber Defense 27:11 The Complexity of Cyber Warfare 32:21 Ransomware and Attribution Issues 36:13 Defensive Cyber Operations 39:39 Final Thoughts and Recommendations

CISO Tradecraft
#238 - The Impact of the Israel Iran Conflict (with Nathan Case)

CISO Tradecraft

Play Episode Listen Later Jun 23, 2025 45:23


In this episode of CISO Tradecraft, host G Mark Hardy discusses the ongoing Israel-Iran conflict and its potential cyber implications with cybersecurity expert Nathan Case. They delve into lessons learned from the Russia-Ukraine conflict, discuss the effectiveness of cyber warfare, and evaluate Iran's cyber capabilities. The conversation also covers the ethical implications of cyber attacks, dual-use targets, and the danger of supply chain vulnerabilities. Practical advice is provided on improving cybersecurity measures, including the importance of MFA, network segmentation, and evaluating internal threats. Join us for an in-depth look at how current geopolitical tensions can impact global cybersecurity. Nathan Case - https://www.linkedin.com/in/nathancase/   Chapters 00:00 Introduction to the Israel-Iran Conflict 00:52 Meet the Expert: Nate Case 01:51 Cyber Warfare Insights from Russia-Ukraine Conflict 03:36 The Impact of Cyber on Critical Infrastructure 08:00 Ethics and Rules of Cyber Warfare 15:01 Iran's Cyber Capabilities and Strategies 16:56 Historical Context and Modern Cyber Threats 23:28 Foreign Cyber Threats: The Iranian Example 24:06 Israel's Cyber Capabilities 25:39 The Role of Cyber Command 26:23 Challenges in Cyber Defense 27:11 The Complexity of Cyber Warfare 32:21 Ransomware and Attribution Issues 36:13 Defensive Cyber Operations 39:39 Final Thoughts and Recommendations

ITCS PIZZATIME TECH PODCAST
#171 - Peace + Security = PEASEC?! Frieden, Sicherheit & IT an der TU Darmstadt

ITCS PIZZATIME TECH PODCAST

Play Episode Listen Later Jun 22, 2025 38:10


Was hat Informatik mit Frieden zu tun? Eine ganze Menge! In dieser Folge nehmen wir dich mit an die TU Darmstadt, genauer gesagt an den einzigartigen Lehrstuhl PEASEC – Wissenschaft und Technik für Frieden und Sicherheit – und sprechen mit Dr. Dr. Christian Reuter. Prof. Reuter erzählt, wie Desinformation unsere Demokratie bedroht, wie Cybersicherheit mehr ist als starke Passwörter und warum Politik und Gesellschaft dringend besser auf Cybergefahren vorbereitet sein müssen. Außerdem sprechen wir über KI in der Security-Forschung, Resilienz, Katastrophenschutz und über die Zukunft von Frieden im digitalen Raum.

Gerde Atash
Over $70M Burned in Cyber Warfare on Iranian Crypto Exchange

Gerde Atash

Play Episode Listen Later Jun 21, 2025 43:01


On July 18th, over $70 million in crypto was burned in a major cyberattack on Iran's largest exchange, Nobitex. The hacker group Predatory Sparrow claimed responsibility. In this video, Ziya and I break down the scale of the attack, discuss possible ties to Israeli intelligence, and explore whether any of the stolen funds can be recovered.---00:00 – Intro 00:47 – Nobitex Hack: What Happened & How Much Was Lost 04:59 – Can the Funds Be Recovered? 07:50 – Was This a State-Sponsored Cyberattack? 13:16 – Is Recovery Really Possible? 19:13 – Unprecedented Cases of Burning Funds22:52 – How Stable Is Tether's Peg? 26:00 – Social Engineering: The Silent Threat in Cybersecurity 35:09 – Why Digital Security Awareness Matters More Than Ever ---

The Electronic Intifada Podcast
Israeli media censors Iranian strike on cyberwarfare base

The Electronic Intifada Podcast

Play Episode Listen Later Jun 20, 2025 31:03


War of attrition could favor Tehran over Tel Aviv.

YOUR BACKUP PLAN APP HOSTS TALKING TABOO with Tina Ginn
WHEN THE WIF-FI DIES & THE MISSILES FLY- WHAT YOU NEED TO KNOW ABOUT NUCLEAR & CYBER WARFARE | EPISODE 304

YOUR BACKUP PLAN APP HOSTS TALKING TABOO with Tina Ginn

Play Episode Listen Later Jun 19, 2025 12:47


The Rest Is Politics
410. China, Russia, and Cyberwarfare: Is the UK preparing for the wrong war?

The Rest Is Politics

Play Episode Listen Later Jun 3, 2025 56:59


Is Labour exaggerating the threat from Russia and missing the real risks? Does the world beyond the West now prefer China over the US? What does Poland's new pro-Trump president mean for Ukraine and European defence? Join Rory and Alastair as they answer all these questions and more. The Rest Is Politics Plus: Become a member for exclusive bonus content, early access to Question Time episodes to live show tickets, ad-free listening for both TRIP and Leading, our exclusive newsletter, discount book prices on titles mentioned on the pod, and our members' chatroom on Discord. Just head to therestispolitics.com to sign up, or start a free trial today on Apple Podcasts: apple.co/therestispolitics. The Rest Is Politics is powered by Fuse Energy. Fuse are giving away FREE TRIP+ membership for all of 2025 to new sign ups

To The Point - Cybersecurity
From Battlefield to Boardroom: Ricoh Danielson's Lessons on Cyber Warfare and Digital Forensics

To The Point - Cybersecurity

Play Episode Listen Later May 27, 2025 43:31


Welcome back to To the Point Cybersecurity, where hosts Rachael Lyon and Jonathan Knepher take you inside the ever-evolving world of cyber threats, digital defense, and the impact of technology on our daily lives. In this episode, they sit down with Ricoh Danielson—national security expert, digital forensics pro, and US Army combat veteran of Iraq and Afghanistan—to unpack the intersections of cyber warfare, digital forensics, and the shifting global threat landscape. Get an inside look at how Ricoh's experiences on the battlefield shaped his career in cybersecurity, and how the strategies used in combat translate directly to the frontlines of cyber defense in both government and the private sector. From ransomware negotiations to the emerging risks of volunteer cyber armies and nation-state actors, Ricoh brings real-world stories and sharp insights on how prepared we really are—personally, organizationally, and nationally—for the next wave of hybrid warfare. Plus, hear candid discussions on the shortcomings of current policy, the growing role of artificial intelligence in both attack and defense, and what practical steps individuals and businesses can take to harden their cyber resilience. It's an eye-opening conversation that puts the realities of global conflict, digital forensics, and security leadership into a uniquely personal perspective. Whether you're a cybersecurity professional, business leader, or just trying to keep your data safe, this episode peels back the curtain on what's really at stake in today's interconnected world. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e334

The Cybersecurity Defenders Podcast
#215 - Inside cyber warfare, intelligence, and investment with Hank Thomas, Managing Partner and Founder at Strategic Cyber Ventures

The Cybersecurity Defenders Podcast

Play Episode Listen Later May 15, 2025 31:17


On episode 215 of the Cybersecurity Defenders Podcast, Hank Thomas, Managing Partner and Founder at Strategic Cyber Ventures, shares his journey from Army intelligence officer to cyber-focused venture capitalist. But the most pressing part of the conversation is his call for a structural overhaul in how the US military handles cyber operations.Thomas argues that cyber is no longer a niche; it is the starting point for modern conflict. Yet cyber capability remains fragmented across service branches, leading to inefficiencies, talent drain, and even internal competition for resources. He makes the case for a separate, fully resourced cyber force, similar to the creation of the Air Force and Space Force, to truly secure the digital domain.He also shares concerns about government overreliance on contractors in critical cyber roles, the need for agile decision-making authority during cyber operations, and why AI must be deployed responsibly to defend a fractured critical infrastructure landscape.

Easy Prey
Cyber Warfare

Easy Prey

Play Episode Listen Later May 7, 2025 37:25


Cyber warfare is no longer something that happens behind closed doors or in some far-off digital corner. It's happening now—and reshaping the rules of conflict in real time. Drone strikes controlled by apps, ransomware attacks on hospitals—today's battleground is just as likely to be online as on the ground. That science fiction scenario is now a critical, constant threat-the kind that affects us all globally. I'm really excited to introduce you to Dr. Chase Cunningham. He's a retired Navy chief cryptologist with a wealth of experience in cyber operations for the NSA, CIA, FBI—and more. He's the one who pioneered zero-trust security strategies and advises top decision-makers in government and private industry. That gives him a front-row seat to how digital warfare is evolving—and what that means for all of us. He's also the author of Cyber Warfare and the gAbriel Series, where his real-world expertise comes to life in stories that are chillingly plausible. We talk about how cyber conflict is already playing out in Ukraine, how different threat actors operate—and why critical infrastructure is such a tempting target. Chase shares practical advice on what individuals and small businesses can do to better protect themselves. We also look at what governments are doing to defend against these growing threats. That conversation is eye-opening-and urgent. You won't want to miss it. Show Notes: [01:21] Chase is a retired Navy Chief and a cryptologist. He also worked at the NSA. He also put Zero Trust in the formal practice at Forrester research. [03:24] We learn how Chase got involved with computer work and cryptology. [05:29] We're seeing cyber war play out in real time with Russia and Ukraine. [07:13] We talk about the future of war and drones. [08:31] Cyber warfare is just the natural evolution of conflict in the digital space. It's the bridge between espionage and kinetic activity. [09:40] Chase talks about the different actors in the cyber warfare space and their primary targets. [12:05] Critical infrastructure includes oil and gas, piping, water systems, healthcare, and even schools. [14:12] Some of the unique issues with dealing with the attacks from cyber criminals. [19:20] How the CCP plays 3D chess. [22:26] Reducing risk and protecting ourselves includes following best practices.  [25:10] What the government is doing to try to mitigate cyber risk. [27:23] Chasing money and finding cyber crime. [32:04] A lot of valuable assets are being developed in the context of war. [35:06] Chase talks about some of the things he covers in his book.  Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Chase Cunningham - Dr. Zero Trust Dr. Chase Cunningham - LinkedIn Cyber Warfare – Truth, Tactics, and Strategies gAbrIel: A Novel in the gAbrIel Series Unrestricted Warfare: China's Master Plan to Destroy America

Dark Rhino Security Podcast
S17 E0 (VIDEO) Tracking Cyber Criminals

Dark Rhino Security Podcast

Play Episode Listen Later Apr 17, 2025 46:34


Jon DiMaggio is the Chief Security Strategist at Analyst1 with over 15 years of experience tracking cyber threats. Specializing in enterprise ransomware and nation-state attacks, Jon is best known for infiltrating the LockBit ransomware gang during a two-year undercover operation. His research, including Ransomware Diaries and The Art of Cyberwarfare, has aided law enforcement and been featured by CBS 60 Minutes, The New York Times, and Wired. A frequent speaker at RSA, he has twice received the SANS Difference Makers Award for his groundbreaking work.00:00 Introduction02:34 You don't need an expensive university11:00 In order to be successful in cyber, you need to…17:38 What are the bad guys doing?23:13 What does the government do to help?26:24 Consequences for bad actors41:35 The Art of Cyber Warfare44:05 Jon's new book--------------------------------------------------------------To learn more about Jon visit https://www.linkedin.com/in/jondimaggio/https://www.amazon.com/Art-Cyberwarfare-Investigators-Ransomware-Cybercrime-ebook/dp/B09BKLRH8P?ref_=ast_author_dpTo learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com

WWL First News with Tommy Tucker
Is cyber warfare going on between the US and other countries all the time?

WWL First News with Tommy Tucker

Play Episode Listen Later Apr 17, 2025 24:27


China has accused America of launching cyber attacks. How often does that go on? What kind of offensive and defensive cyber attacks are going on that the average person has no idea about? Tommy talks with Gary Corn, Director of the Technology, Law & Security Program and an adjunct professor of cyber and national security law and the law of armed conflict at American University

Dark Rhino Security Podcast
S17 E0 Tracking Cyber Criminals

Dark Rhino Security Podcast

Play Episode Listen Later Apr 16, 2025 46:34


Jon DiMaggio is the Chief Security Strategist at Analyst1 with over 15 years of experience tracking cyber threats. Specializing in enterprise ransomware and nation-state attacks, Jon is best known for infiltrating the LockBit ransomware gang during a two-year undercover operation. His research, including Ransomware Diaries and The Art of Cyberwarfare, has aided law enforcement and been featured by CBS 60 Minutes, The New York Times, and Wired. A frequent speaker at RSA, he has twice received the SANS Difference Makers Award for his groundbreaking work.00:00 Introduction02:34 You don't need an expensive university11:00 In order to be successful in cyber, you need to…17:38 What are the bad guys doing?23:13 What does the government do to help?26:24 Consequences for bad actors41:35 The Art of Cyber Warfare44:05 Jon's new book

Talking Cloud with an emphasis on Cloud Security
74-Talking Cloud Podcast-with Steve Winterfeld, Advisory & Fractional CISO, Cyber Vigilance Advice (CVA) LLC

Talking Cloud with an emphasis on Cloud Security

Play Episode Listen Later Apr 14, 2025 46:29


Episode #74 features a great discussion with Steve Winterfeld, Advisor, and Fractional CISO with Cyber Vigilance Advice (CVA) LLC. Steve is passionate about cybersecurity. He served as CISO for Nordstrom Bank, Director of Cybersecurity for Nordstrom, and Director of Incident Response and Threat Intelligence at Charles Schwab. Steve also published a book on Cyber Warfare and holds CISSP, ITIL, and PMP certifications. We discussed a variety of topics, and during our conversation, Steve offered these resources: On finding job: Lessons Learned on Finding a Cybersecurity Job After a Layoff - Security Boulevard On starting / managing a career: Creating a Roadmap for Your Dream Cybersecurity Career - Security Boulevard 

Uncommon Sense with Ginny Robinson
Answering Your Questions – My Stalker, RFK Jr.'s Scandal, & Leaked Government Texts

Uncommon Sense with Ginny Robinson

Play Episode Listen Later Mar 30, 2025 44:01


Today, we're going over your questions. You guys had some follow-ups about my stalker, Timothy C., and I'll be giving you a few more details on that situation. We're also unpacking the RFK Jr. sex scandal—what's real, what's spin, and what it all means. Plus, the government's leaked text messages have been making waves, and I'll be breaking down what they reveal and why you should (and shouldn't) care.—https://policecoffee.com/?gad_source=1&gbraid=0AAAAACG7qmI1dmMkruwgp8vA8w0oECKla&gclid=Cj0KCQjwtJ6_BhDWARIsAGanmKfdkRQ1M1sighZQ-PGpEpsCjrZ8fCigidnvH55bfBUNMa56-yoy_A8aAv34EALw_wcB—https://open.spotify.com/episode/7CcmZWvQEaLTQAQRAFy2BQ?si=FgeO4b9QSi-5eB2cqX2XHw

government fbi conspiracies accountability behind the scenes scandals controversy cia fake news conspiracy theories breaking news propaganda hacking censorship free speech misinformation law enforcement surveillance whistleblowers stalker leaked texts nsa national security robert f kennedy jr stalking breaking barriers deep state dark web answering your questions espionage mainstream media secret societies crisis management blackmail court cases power struggles data breach legal system civil liberties social engineering media bias hidden truth legal battle hidden agendas investigative journalism cyber threats truth seekers sex scandals election interference deep web crisis communications crime and punishment ethical dilemmas cyberwarfare data mining restraining orders intelligence community reputation management public perception surveillance state press freedom public trust privacy concerns investigative reporting security breach surveillance capitalism doxxing crisis response internet safety government overreach personal safety public discourse legal implications false narratives digital privacy information warfare shadow government digital forensics government corruption political strategy news coverage alternative media security challenges cyberstalking intelligence agencies digital rights government accountability public awareness online harassment legal defense wiretapping personal protection media narratives online bullying government transparency government oversight classified information citizen journalism phone hacking state secrets political games media control media spin media circus public scrutiny secret recordings narrative control government ethics inside politics mass deception whistleblower protection online activism victim advocacy opposition research journalism ethics online journalism secret agendas watchdog journalism
Uncommon Sense with Ginny Robinson
Exposing Government Corruption with Teddy Pierce, Author of Dethrone Davos: Save America

Uncommon Sense with Ginny Robinson

Play Episode Listen Later Mar 12, 2025 20:16


Today I'm joined by Teddy Pierce, author of Dethrone Davos: Save America, to discuss the shocking waste, fraud, and abuse that the Department of Government Efficiency (DOGE) has been uncovering. From reckless spending to blatant money laundering, we're breaking down how our government has been misusing our hard-earned tax dollars—and why this corruption must be stopped. Transparency and accountability aren't just buzzwords; they're essential for restoring actual integrity to our system. Tune in as we expose what's really going on behind the scenes and why this fight matters for all of us.—Buy Teddy's book, Dethrone Davos: https://www.amazon.com/Dethrone-Davos-America-Theodore-Pierce-ebook/dp/B0D5NKGGNC—https://www.thebrandsunday.com/collections/all

cancel culture transparency exposing censorship freedom of speech financial freedom world economic forum davos doge new world order deep state great reset financial independence american politics america first secret societies great awakening rothschild gold standard christian nationalism wef self reliance election fraud decentralization puppet master money laundering tax reform homesteading self sufficiency hidden power civil liberties save america media bias false flags national debt election integrity klaus schwab constitutional rights hidden agendas investigative journalism truth seekers federalism dark money breaking the chains cfr government spending cyberwarfare economic justice economic collapse decentralized finance financial crimes biblical justice investigative reporting dethrone independent media fraud prevention ruling class intentional communities special interests one world government corporate greed tax fraud economic inequality shadow government government corruption political corruption alternative media financial responsibility american independence tax havens sound money class warfare government accountability economic warfare fiscal responsibility crony capitalism government waste taxpayer money bilderberg group conservative politics trilateral commission foreign influence money in politics wealth preservation government surveillance controlled opposition government transparency woke capitalism government oversight globalist agenda ballot harvesting american patriotism liberty movement justice warriors economic resilience moral leadership rebuilding america political persecution financial accountability small government political accountability fraud investigation balanced budget shadow banking alternative finance american decline wealth redistribution free speech movement moral economy alternative news free market capitalism parallel economy narrative control government ethics underground economy civil resistance esg scores black budget american restoration davos agenda honest money economic liberty regenerative economy fair taxation populist movement
Hacker Valley Studio
Cyber Warfare, Digital Deception, and the Hidden Threats We Ignore with Dr. Eric Cole

Hacker Valley Studio

Play Episode Listen Later Mar 8, 2025 41:45


We're already in World War III—just not the kind you're thinking of. Cyber warfare is here, and the battlefield is your inbox, your bank account, and your digital identity. So why are we still acting like it's peacetime? Dr. Eric Cole, cybersecurity pioneer and former CIA hacker, joins the show to drop hard truths about the state of cyber warfare, AI's role in our digital future, and why most people are sleepwalking through a war they don't even realize they're in. From the rise of deepfakes to North Korea's billion-dollar hacking economy, this episode is one you can't afford to ignore.   Impactful Moments: 00:00 - Introduction 02:00 - Dr. Eric Cole's journey from the CIA to cybersecurity leadership 07:20 - The fundamentals of hacking and why they still matter 11:00 - AI is only as smart as the data we give it 17:00 - The rise of deepfakes and digital deception 19:45 - Cyber warfare: How North Korea funds its economy through hacking 23:50 - The problem with America's peacetime mentality 30:00 - Should we be worried about AI replacing humans? 36:10 - The key to success: mastering people skills, not just tech skills 40:30 - Final thoughts and where to follow Dr. Eric Cole   Connect with Dr. Eric Cole on LinkedIn: https://www.linkedin.com/in/ericcole1/ Check out Dr. Eric Cole's books –  Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World: https://www.amazon.com/Cyber-Crisis-Protecting-Business-Threats/dp/B093X3YNPT Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet: https://www.amazon.com/Online-Danger-Protect-Yourself-Internet-ebook/dp/B078WK39TT Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

ITSPmagazine | Technology. Cybersecurity. Society
Cyber Wars: How Elite Teams Stay Ahead of the Game | A Conversation with Gary Hayslip | The Soulful CXO Podcast with Dr. Rebecca Wynn

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Mar 4, 2025 15:37


Guest: Gary Hayslip, CISO, SoftBank Investment AdvisorsLinkedIn: https://www.linkedin.com/in/ghayslip/Website: cisodrg.com/biographies/gary-hayslip/Host: Dr. Rebecca WynnOn ITSPmagazine  

Govcon Giants Podcast
Shields UP! The Cyber Warfare Fallout That Could Hit YOU Next!

Govcon Giants Podcast

Play Episode Listen Later Feb 23, 2025 9:57


In this episode we discuss the alarming potential of cyber warfare and its unintended consequences with the Former DoD Cyber Crime Director Jeff Stutzman. Jeff highlighted the vulnerability of surveillance systems and physical security protection due to outdated firmware and neglectful maintenance, emphasizing the critical need for constant vigilance in safeguarding critical infrastructure. Jeff urges listeners, particularly small defense contractors and businesses, to prioritize robust cybersecurity measures, including firewalls, antivirus software, two-factor authentication, and email protection, to mitigate risks in the face of a rapidly evolving cyber threat landscape. Listen now to learn more!

Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

Shawn Ryan Show

Play Episode Listen Later Jan 29, 2025 155:07


Mike Grover is a security researcher, InfoSec expert, and the creator of the infamous O.MG Cable. He gained prominence in 2019 when he showcased his malicious USB cable prototype at DEF CON, capable of recording keystrokes and executing remote commands. Grover's O.MG Cable looks identical to a regular charging cable, but contains a tiny implant that creates a Wi-Fi hotspot, allowing attackers to access the connected device from up to 300 feet away. Since its inception, Grover has refined the O.MG Cable design, making it indistinguishable from normal USB cables and expanding its capabilities. The latest iteration includes features such as geofencing, self-destruct mechanisms, and support for various connector types including Lightning and USB-C. Grover's work aims to raise awareness about hardware security risks while providing tools for red teams and security researchers to test and improve organizational defenses. Shawn Ryan Show Sponsors: https://ROKA.com | Use Code SRS https://ExpressVPN.com/SRS https://ZipRecruiter.com/SRS https://RocketMoney.com/SRS https://prizepicks.onelink.me/LME0/SRS https://ShawnLikesGold.com | 855-936-GOLD #goldcopartner https://americanfinancing.net/srs NMLS 182334, nmlsconsumeraccess.org. Call 866-781-8900 for details about credit costs and terms. Mike Grover Links: Website - https://o.mg.lol/ X - https://x.com/_MG_ LinkedIn - linkedin.com/in/mgrover Please leave us a review on Apple & Spotify Podcasts. Vigilance Elite/Shawn Ryan Links: Website | Patreon | TikTok | Instagram | Download Learn more about your ad choices. Visit podcastchoices.com/adchoices

Macrodosing: Arian Foster and PFT Commenter
Best of 2024 - Part 1 | Dec 26, 2024

Macrodosing: Arian Foster and PFT Commenter

Play Episode Listen Later Dec 26, 2024 186:07


The Macrodosing crew kicks off the "Best of 2024" with a collection of unforgettable moments from the first half of the year. From wild theories to hilarious tangents and everything in between, Part 1 brings you the highlights that made this year so memorable. Part 2 out tomorrow, enjoy! (00:00:53) Wearing shirts with Arian on them (00:08:08) Naming random athletes (00:19:45) Brace Belden (00:38:49) Chicago office vs. NYC office (00:42:35) Donnie saving a plane (01:07:36) Arian's top 5 white people (01:13:36) Jeff D. Lowe + Don Gorske hater (01:27:48) Jerry vs. Cyber Warfare (01:41:01) Draft Day (01:52:13) OJ Simpson (02:07:28) Big T diss track of Joe Biden (02:15:42) Body building forum thread (02:22:46) Worst day of Big T's life + Arian's first pitch (02:37:34) Nick and Donnie (02:51:12) Big T's elbow injuryYou can find every episode of this show on Apple Podcasts, Spotify or YouTube. Prime Members can listen ad-free on Amazon Music. For more, visit barstool.link/macrodosing

1A
ICYMI: Unpacking China And Russia's New Cyber Warfare Strategies

1A

Play Episode Listen Later Dec 10, 2024 11:11


Over the past year, the Chinese government has stepped up its cyber operations, focusing not just on espionage or stealing intellectual property, but on hacking to bolster geopolitical goals.U.S. authorities and institutions are used to digital aggression from the likes of Russia. But are now freshly reconsidering the objectives and capabilities of one of the country's other eastern rivals.We discuss those goals and how China using cyberspace to achieve them. We also discuss the latest from Russia. Want to support 1A? Give to your local public radio station and subscribe to this podcast. Have questions? Connect with us. Listen to 1A sponsor-free by signing up for 1A+ at plus.npr.org/the1a.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy