Podcasts about Cyberwarfare

Use of technological force within cyberspace

  • 619PODCASTS
  • 1,216EPISODES
  • 40mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jul 30, 2025LATEST
Cyberwarfare

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Cyberwarfare

Show all podcasts related to cyberwarfare

Latest podcast episodes about Cyberwarfare

Security Now (MP3)
SN 1036: Inside the SharePoint 0-day - Is Our Data Safe Anywhere?

Security Now (MP3)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

All TWiT.tv Shows (MP3)
Security Now 1036: Inside the SharePoint 0-day

All TWiT.tv Shows (MP3)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

Security Now (Video HD)
SN 1036: Inside the SharePoint 0-day - Is Our Data Safe Anywhere?

Security Now (Video HD)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

Security Now (Video HI)
SN 1036: Inside the SharePoint 0-day - Is Our Data Safe Anywhere?

Security Now (Video HI)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

Radio Leo (Audio)
Security Now 1036: Inside the SharePoint 0-day

Radio Leo (Audio)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

Security Now (Video LO)
SN 1036: Inside the SharePoint 0-day - Is Our Data Safe Anywhere?

Security Now (Video LO)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

All TWiT.tv Shows (Video LO)
Security Now 1036: Inside the SharePoint 0-day

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

Radio Leo (Video HD)
Security Now 1036: Inside the SharePoint 0-day

Radio Leo (Video HD)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

IT Privacy and Security Weekly update.
EP 252.5 Deep Dive. The IT Privacy and Security Weekly Update for the Week Ending July 22nd., 2025 and no Trucks

IT Privacy and Security Weekly update.

Play Episode Listen Later Jul 24, 2025 13:19


A single compromised password led to the collapse of 158-year-old UK logistics firm KNP, after hackers—suspected to be the Akira gang—used it to gain access, encrypt systems, and demand a £5 million ransom. Unable to pay, the company lost all its data and folded, putting 700 employees out of work. The breach underscores how weak access controls can have catastrophic consequences.To counter massive botnets, Google is now combining technical defenses with legal action. Its lawsuit against the “BadBox 2.0” operators marks a major shift: targeting criminals behind malware that infected over 10 million Android devices. Google's strategy includes leveraging the CFAA and RICO Act to not just stop malware but dismantle the entire criminal infrastructure—signaling a more aggressive, litigation-driven cybersecurity era.Meanwhile, a new malware delivery method is exploiting DNS—a common but often under-monitored network function. Attackers hide malware in DNS TXT records, break it into chunks, and reassemble it on target systems using standard DNS queries. Since DNS traffic is rarely scrutinized, this technique bypasses traditional defenses, making DNS monitoring essential for comprehensive protection.Travelers to China face serious privacy risks. Authorities are using malware like “Massistant” to extract sensitive data from mobile phones during inspections. Developed by Chinese firm Meiya Pico, the software accesses encrypted texts, location history, and even Signal messages upon installation. Though evidence of compromise may remain, the intrusion happens before detection, raising concerns for anyone bringing devices into the country.China has also shifted its cyberattack strategy by outsourcing operations to private firms. These companies now discover and sell zero-day vulnerabilities to government agencies. This model, which evolved from loosely affiliated hacker groups, blurs the line between state and private enterprise, making attribution difficult. As a result, China-linked hackers increasingly infiltrate U.S. critical infrastructure while masking their origins, and exposure alone no longer seems to deter them.In response to national security concerns, Microsoft has removed China-based engineers from U.S. military cloud projects. A ProPublica investigation revealed their prior involvement, prompting a Pentagon ban on such support. Previously, Chinese engineers worked under U.S. supervision, a practice now deemed too risky for defense-related systems.Microsoft's SharePoint is also under siege. Chinese state actors exploited a critical flaw dubbed “ToolShell” to compromise at least 54 organizations, including those in critical infrastructure. The attack allowed for deep system access, extraction of encryption keys, and installation of web shells—despite prior patches. The incident stresses the need for rapid patching and vigilance, even on widely used enterprise platforms.Cyberwarfare is influencing real-world military dynamics. Ukrainian cyber operatives claim to have digitally crippled a major Russian drone manufacturer, deleting 47TB of production data and disabling access systems. Allegedly backed by military intelligence, the attack highlights how digital sabotage can directly disrupt military production and reshape conflict outcomes. Code is now as consequential as conventional weapons on the modern battlefield.

Gundam Book Club
Gundam Sentinel - The Logistic Bomb (編理爆弾) - Redux

Gundam Book Club

Play Episode Listen Later Jul 5, 2025 12:45


Send us a textMarch 13 UC 0088. The Bald Eagle enters the battlefield and faces his former student. The New Desides and their complement of mobile suits fiercely battle the Task Force Alpha. Also… A.L.I.C.E. becomes more aware.Notebook LLM ironically tackles the use of AI and sabotaging military and government assets, and talks about Battlestar Galactica (reboot).Gundam Sentinel Podcast/Gundam Book Club is performing a critical analysis and commentary and is protected by the Fair Use clause of the United States Copyright law. Gundam content is copyright and/or trademark of Sunrise Inc., Bandai, Sotsu Agency, or its original creator.  Gundam Sentinel content is copyright and/or trademark of Model Graphix, or its original creator.  Gundam Sentinel Podcast/Gundam Book Club is in no way affiliated with or endorsed by Sunrise, Bandai, Sotsu, Model Graphix or any of their subsidiaries, employees, or associates and makes no claim to own Gundam or any of the copyrights or trademarks related to it. Copyrighted content used in Gundam Sentinel Podcast/Gundam Book Club is used in accordance with the Fair Use clause of the United States Copyright law. Music used in this episode is being used under the "Fair Use" clause.  Please email gundamsentinelpodcast@gmail.com with any questions. Reference:https://en.wikipedia.org/wiki/Battlestar_Galactica_(2004_TV_series)https://en.wikipedia.org/wiki/Cyberwarfare_in_the_United_Stateshttps://en.wikipedia.org/wiki/Logic_bombModel Graphix Special Edition "Gundam Wars III" - Gundam Sentinel The Battle of "Real Gundam".

Cybercrime Magazine Podcast
Life Of A Cybersecurity Czar. Understanding Cyber Warfare. Dr. Eric Cole, Secure Anchor.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 3, 2025 17:19


A world renowned cybersecurity expert with more than 30 years of network security experience, Dr. Eric Cole – founder and CEO of Secure Anchor – helps organizations curtail the risk of cyber threats. He has worked with a variety of clients ranging from Fortune 50 companies, to top international banks, to the CIA, for which he was a professional hacker. In this episode, Dr. Cole and host Scott Schober discuss cyber warfare. To learn more about our sponsor, visit https://drericcole.org

The Institute of World Politics
Information as a Domain of War with Professor Larry Dietz

The Institute of World Politics

Play Episode Listen Later Jul 1, 2025 60:02


About the Lecture: Conflict is no longer restricted to the domains of land, sea, and air. The Information Domain has emerged as a more than an equal warfighting domain for conflict from tension through armed conflict. The presentation will look at the information domain in military context in the Ukraine, Gaza, Bosnia, and Iraq. Attendees will get an inside look at how the military orchestrates non-kinetic (systems that don't cause death or damage) using Information Operations (IO) as a battlefield multiplier in support of conflicts or potential conflicts. The Role of Information as a tool of Statecraft will also be addressed. About the Speaker: Lawrence "Larry" Dietz is a distinguished leader with a dual career spanning both military and commercial sectors. With a background in Psychological Operations, Information Operations, Cyber Warfare, Electronic Warfare, Cybersecurity, and Public Affairs, he is recognized as a thought leader in these fields. COL Dietz brings extensive experience in Military Intelligence, encompassing both strategic and tactical assignments, including open-source intelligence roles. In his military career, COL Dietz served at the NATO Four Star level and held key positions such as Deputy Commander of NATO SFOR Combined Joint Information Campaign Task Force in Bosnia, PSYOP Group Staff Officer, PSYOP Battalion Commander, and Military Intelligence Company Commander, among others. His expertise extends to Special Operations Forces, particularly in PSYOP and Civil Affairs. Transitioning into academia and law, COL Dietz has become an exceptional educator, both in traditional classroom settings and online platforms. At IWP, he created and teaches an asynchronous online graduate course on Intelligence and Policy. At Monterey College of Law, he co-developed and taught courses like Negotiation Lab and Data Privacy Elective, as well as the Law of Armed Conflict. As an Attorney at Law with DataPrivacyLaw.com, COL Dietz led a boutique legal practice specializing in complex contract issues and data privacy. His focus includes ensuring compliance with regulations such as the EU's General Data Privacy Directive and state laws like the California Consumer Privacy Act. COL Dietz is also sought after for executive presentations on Privacy, Intelligence, and Cyber Influence, catering to major software and services organizations.

TJ Trout
Greg Mullin

TJ Trout

Play Episode Listen Later Jun 30, 2025 30:02


From ABQ-IT Greg Mullin comes in to talk about "Cyber Warfare", how vulnerable are we from attacks from other countries or domestic terrorists. He also talks about hacking on your personal devices, and what to do, and how to prevent it. All this with TJ on News Radio KKOBSee omnystudio.com/listener for privacy information.

The Gist
Tehran Target Acquired...Damaged...Destroyed...Debated

The Gist

Play Episode Listen Later Jun 24, 2025 59:43


Jerusalem Post military correspondent Yonah Jeremy Bob, co-author of Target Tehran: How Israel Is Using Sabotage, Cyberwarfare, Assassination—and Secret Diplomacy—to Stop a Nuclear Iran and Create a New Middle East, explains how Israel coordinated hundreds of strikes and infiltrations across Iran, what the U.S. MOP strike on Fordow actually accomplished, and why Netanyahu's longtime caution gave way to a high-stakes gamble. He also delves into internal Israeli debates over assassinating Khamenei, the strategy behind targeting Iran's domestic enforcers, and why the Iranian nuclear threat is now both diminished and more unpredictable Plus: Mamdani's cheerful radicalism, Cuomo's glower, and a reminder that aspirational politics can veer into Theranos territory. Produced by Corey WaraProduction Coordinator Ashley KhanEmail us at ⁠⁠⁠⁠thegist@mikepesca.com⁠⁠⁠⁠To advertise on the show, contact ⁠⁠⁠⁠ad-sales@libsyn.com⁠⁠⁠⁠ or visit ⁠⁠⁠⁠https://advertising.libsyn.com/TheGist⁠⁠⁠⁠Subscribe to The Gist: ⁠⁠⁠⁠https://subscribe.mikepesca.com/⁠⁠⁠⁠Subscribe to The Gist Youtube Page: ⁠⁠⁠⁠https://www.youtube.com/channel/UC4_bh0wHgk2YfpKf4rg40_g⁠⁠⁠⁠Subscribe to The Gist Instagram Page: ⁠⁠⁠⁠GIST INSTAGRAM⁠⁠⁠⁠Follow The Gist List at: ⁠⁠⁠⁠Pesca⁠⁠⁠⁠ ⁠⁠⁠⁠Profundities | Mike Pesca | Substack Learn more about your ad choices. Visit podcastchoices.com/adchoices

Abosobaie Deutsch Arabisch أبو سبيع عربي ألماني
إسرائيل وإيران - ما علاقة ألمانيا بالموضوع؟

Abosobaie Deutsch Arabisch أبو سبيع عربي ألماني

Play Episode Listen Later Jun 24, 2025 34:02


مناسبة تصريحات ميرتس - مستشار ألمانيا الجديد - عن الأعمال القذرة اللي بتنفذها إسرائيل لصالح الغرب،تعرف إن ألمانيا هي اللي عملت أول مفاعل نووي إيراني؟وإن أجهزة الطرد المركزي لتخصيب اليورانيوم، أصلاً ألمانية؟!طيب تعرف إن ألمانيا عندها علاقة اقتصادية قوية بإيران، وقبلها علاقة سياسية، وعرقية كمان؟كمان الحرب بين إسرائيل وإيران مش مجرد حرب عسكرية، دي حرب سيبرانية كمان، وألمانيا داخلة فيها من ساعة هجوم ستاكس نت؟ونرحب بدعمكم للقناة مادياً كذلك عن طريق الاشتراك.

3 Martini Lunch
U.S. Bombs Iran Nuke Sites: The Mission, The Aftermath, & The Crazy Reactions

3 Martini Lunch

Play Episode Listen Later Jun 23, 2025 26:49


Presidential historian and Ronald Reagan Institute Senior Fellow Tevi Troy is in for Jim today. Join Tevi and Greg as they break down the U.S. bombings of three Iranian nuclear sites on Saturday, the possible responses from Iran and the Trump administration's various comments about regime change, and the weird leftist condemnations of the strikes.First, they highlight the exceptional performance of the B-2 Bomber pilots, the lengthy and complex mission, and the airtight operational security, which may have been achieved by not telling any Democrats about the mission until after it happened. They also highlight how President Trump deftly pushed for a diplomatic solution, ramped up the tough talk, seemed to grant a two-week reprieve and then successfully surprises everyone with the timing of the strikes.Next, they contemplate what will come next - both from Iran and the United States. Will Iran close the Straits of Hormuz, focus on U.S. military bases in the region like today in Qatar, unleash sleeper cells in the U.S., or prioritize cyberterrorism? They also weigh in on Vice President Vance saying the U.S. does not have a goal of regime change in Iran while Trump openly suggests it on social media.Finally, they react to some of the most unhinged reactions to the bombings in Iran. Rep. Alexandria Ocasio-Cortez thinks Trump's actions are impeachable. Obama administration figure Tommy Vietor says any deadly response from Iran will be because we started it. And even the Los Angeles County Sheriff's Office condemned the bombings.Please visit our great sponsors:It's free, online, and easy to start—no strings attached. Enroll in Understanding Capitalism with Hillsdale College. Visit https://Hillsdale.edu/MartiniTalk it out with Betterhelp. Our listeners get 10% off their first month at https://BetterHelp.com/3MLFatty15 is on a mission to help you live healthier, longer.  Get an additional 15% off their 90-daysubscription Starter Kit by going to https://Fatty15.com/3ML and use code 3ML at checkout.

CISO Tradecraft
#238 - The Impact of the Israel Iran Conflict (with Nathan Case)

CISO Tradecraft

Play Episode Listen Later Jun 23, 2025 45:23


In this episode of CISO Tradecraft, host G Mark Hardy discusses the ongoing Israel-Iran conflict and its potential cyber implications with cybersecurity expert Nathan Case. They delve into lessons learned from the Russia-Ukraine conflict, discuss the effectiveness of cyber warfare, and evaluate Iran's cyber capabilities. The conversation also covers the ethical implications of cyber attacks, dual-use targets, and the danger of supply chain vulnerabilities. Practical advice is provided on improving cybersecurity measures, including the importance of MFA, network segmentation, and evaluating internal threats. Join us for an in-depth look at how current geopolitical tensions can impact global cybersecurity. Nathan Case - https://www.linkedin.com/in/nathancase/   Chapters 00:00 Introduction to the Israel-Iran Conflict 00:52 Meet the Expert: Nate Case 01:51 Cyber Warfare Insights from Russia-Ukraine Conflict 03:36 The Impact of Cyber on Critical Infrastructure 08:00 Ethics and Rules of Cyber Warfare 15:01 Iran's Cyber Capabilities and Strategies 16:56 Historical Context and Modern Cyber Threats 23:28 Foreign Cyber Threats: The Iranian Example 24:06 Israel's Cyber Capabilities 25:39 The Role of Cyber Command 26:23 Challenges in Cyber Defense 27:11 The Complexity of Cyber Warfare 32:21 Ransomware and Attribution Issues 36:13 Defensive Cyber Operations 39:39 Final Thoughts and Recommendations

ITCS PIZZATIME TECH PODCAST
#171 - Peace + Security = PEASEC?! Frieden, Sicherheit & IT an der TU Darmstadt

ITCS PIZZATIME TECH PODCAST

Play Episode Listen Later Jun 22, 2025 38:10


Was hat Informatik mit Frieden zu tun? Eine ganze Menge! In dieser Folge nehmen wir dich mit an die TU Darmstadt, genauer gesagt an den einzigartigen Lehrstuhl PEASEC – Wissenschaft und Technik für Frieden und Sicherheit – und sprechen mit Dr. Dr. Christian Reuter. Prof. Reuter erzählt, wie Desinformation unsere Demokratie bedroht, wie Cybersicherheit mehr ist als starke Passwörter und warum Politik und Gesellschaft dringend besser auf Cybergefahren vorbereitet sein müssen. Außerdem sprechen wir über KI in der Security-Forschung, Resilienz, Katastrophenschutz und über die Zukunft von Frieden im digitalen Raum.

Gerde Atash
Over $70M Burned in Cyber Warfare on Iranian Crypto Exchange

Gerde Atash

Play Episode Listen Later Jun 21, 2025 43:01


On July 18th, over $70 million in crypto was burned in a major cyberattack on Iran's largest exchange, Nobitex. The hacker group Predatory Sparrow claimed responsibility. In this video, Ziya and I break down the scale of the attack, discuss possible ties to Israeli intelligence, and explore whether any of the stolen funds can be recovered.---00:00 – Intro 00:47 – Nobitex Hack: What Happened & How Much Was Lost 04:59 – Can the Funds Be Recovered? 07:50 – Was This a State-Sponsored Cyberattack? 13:16 – Is Recovery Really Possible? 19:13 – Unprecedented Cases of Burning Funds22:52 – How Stable Is Tether's Peg? 26:00 – Social Engineering: The Silent Threat in Cybersecurity 35:09 – Why Digital Security Awareness Matters More Than Ever ---

The Electronic Intifada Podcast
Israeli media censors Iranian strike on cyberwarfare base

The Electronic Intifada Podcast

Play Episode Listen Later Jun 20, 2025 31:03


War of attrition could favor Tehran over Tel Aviv.

YOUR BACKUP PLAN APP HOSTS TALKING TABOO with Tina Ginn
WHEN THE WIF-FI DIES & THE MISSILES FLY- WHAT YOU NEED TO KNOW ABOUT NUCLEAR & CYBER WARFARE | EPISODE 304

YOUR BACKUP PLAN APP HOSTS TALKING TABOO with Tina Ginn

Play Episode Listen Later Jun 19, 2025 12:47


The Rest Is Politics
410. China, Russia, and Cyberwarfare: Is the UK preparing for the wrong war?

The Rest Is Politics

Play Episode Listen Later Jun 3, 2025 56:59


Is Labour exaggerating the threat from Russia and missing the real risks? Does the world beyond the West now prefer China over the US? What does Poland's new pro-Trump president mean for Ukraine and European defence? Join Rory and Alastair as they answer all these questions and more. The Rest Is Politics Plus: Become a member for exclusive bonus content, early access to Question Time episodes to live show tickets, ad-free listening for both TRIP and Leading, our exclusive newsletter, discount book prices on titles mentioned on the pod, and our members' chatroom on Discord. Just head to therestispolitics.com to sign up, or start a free trial today on Apple Podcasts: apple.co/therestispolitics. The Rest Is Politics is powered by Fuse Energy. Fuse are giving away FREE TRIP+ membership for all of 2025 to new sign ups

To The Point - Cybersecurity
From Battlefield to Boardroom: Ricoh Danielson's Lessons on Cyber Warfare and Digital Forensics

To The Point - Cybersecurity

Play Episode Listen Later May 27, 2025 43:31


Welcome back to To the Point Cybersecurity, where hosts Rachael Lyon and Jonathan Knepher take you inside the ever-evolving world of cyber threats, digital defense, and the impact of technology on our daily lives. In this episode, they sit down with Ricoh Danielson—national security expert, digital forensics pro, and US Army combat veteran of Iraq and Afghanistan—to unpack the intersections of cyber warfare, digital forensics, and the shifting global threat landscape. Get an inside look at how Ricoh's experiences on the battlefield shaped his career in cybersecurity, and how the strategies used in combat translate directly to the frontlines of cyber defense in both government and the private sector. From ransomware negotiations to the emerging risks of volunteer cyber armies and nation-state actors, Ricoh brings real-world stories and sharp insights on how prepared we really are—personally, organizationally, and nationally—for the next wave of hybrid warfare. Plus, hear candid discussions on the shortcomings of current policy, the growing role of artificial intelligence in both attack and defense, and what practical steps individuals and businesses can take to harden their cyber resilience. It's an eye-opening conversation that puts the realities of global conflict, digital forensics, and security leadership into a uniquely personal perspective. Whether you're a cybersecurity professional, business leader, or just trying to keep your data safe, this episode peels back the curtain on what's really at stake in today's interconnected world. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e334

The Cybersecurity Defenders Podcast
#215 - Inside cyber warfare, intelligence, and investment with Hank Thomas, Managing Partner and Founder at Strategic Cyber Ventures

The Cybersecurity Defenders Podcast

Play Episode Listen Later May 15, 2025 31:17


On episode 215 of the Cybersecurity Defenders Podcast, Hank Thomas, Managing Partner and Founder at Strategic Cyber Ventures, shares his journey from Army intelligence officer to cyber-focused venture capitalist. But the most pressing part of the conversation is his call for a structural overhaul in how the US military handles cyber operations.Thomas argues that cyber is no longer a niche; it is the starting point for modern conflict. Yet cyber capability remains fragmented across service branches, leading to inefficiencies, talent drain, and even internal competition for resources. He makes the case for a separate, fully resourced cyber force, similar to the creation of the Air Force and Space Force, to truly secure the digital domain.He also shares concerns about government overreliance on contractors in critical cyber roles, the need for agile decision-making authority during cyber operations, and why AI must be deployed responsibly to defend a fractured critical infrastructure landscape.

Easy Prey
Cyber Warfare

Easy Prey

Play Episode Listen Later May 7, 2025 37:25


Cyber warfare is no longer something that happens behind closed doors or in some far-off digital corner. It's happening now—and reshaping the rules of conflict in real time. Drone strikes controlled by apps, ransomware attacks on hospitals—today's battleground is just as likely to be online as on the ground. That science fiction scenario is now a critical, constant threat-the kind that affects us all globally. I'm really excited to introduce you to Dr. Chase Cunningham. He's a retired Navy chief cryptologist with a wealth of experience in cyber operations for the NSA, CIA, FBI—and more. He's the one who pioneered zero-trust security strategies and advises top decision-makers in government and private industry. That gives him a front-row seat to how digital warfare is evolving—and what that means for all of us. He's also the author of Cyber Warfare and the gAbriel Series, where his real-world expertise comes to life in stories that are chillingly plausible. We talk about how cyber conflict is already playing out in Ukraine, how different threat actors operate—and why critical infrastructure is such a tempting target. Chase shares practical advice on what individuals and small businesses can do to better protect themselves. We also look at what governments are doing to defend against these growing threats. That conversation is eye-opening-and urgent. You won't want to miss it. Show Notes: [01:21] Chase is a retired Navy Chief and a cryptologist. He also worked at the NSA. He also put Zero Trust in the formal practice at Forrester research. [03:24] We learn how Chase got involved with computer work and cryptology. [05:29] We're seeing cyber war play out in real time with Russia and Ukraine. [07:13] We talk about the future of war and drones. [08:31] Cyber warfare is just the natural evolution of conflict in the digital space. It's the bridge between espionage and kinetic activity. [09:40] Chase talks about the different actors in the cyber warfare space and their primary targets. [12:05] Critical infrastructure includes oil and gas, piping, water systems, healthcare, and even schools. [14:12] Some of the unique issues with dealing with the attacks from cyber criminals. [19:20] How the CCP plays 3D chess. [22:26] Reducing risk and protecting ourselves includes following best practices.  [25:10] What the government is doing to try to mitigate cyber risk. [27:23] Chasing money and finding cyber crime. [32:04] A lot of valuable assets are being developed in the context of war. [35:06] Chase talks about some of the things he covers in his book.  Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Chase Cunningham - Dr. Zero Trust Dr. Chase Cunningham - LinkedIn Cyber Warfare – Truth, Tactics, and Strategies gAbrIel: A Novel in the gAbrIel Series Unrestricted Warfare: China's Master Plan to Destroy America

Dark Rhino Security Podcast
S17 E0 (VIDEO) Tracking Cyber Criminals

Dark Rhino Security Podcast

Play Episode Listen Later Apr 17, 2025 46:34


Jon DiMaggio is the Chief Security Strategist at Analyst1 with over 15 years of experience tracking cyber threats. Specializing in enterprise ransomware and nation-state attacks, Jon is best known for infiltrating the LockBit ransomware gang during a two-year undercover operation. His research, including Ransomware Diaries and The Art of Cyberwarfare, has aided law enforcement and been featured by CBS 60 Minutes, The New York Times, and Wired. A frequent speaker at RSA, he has twice received the SANS Difference Makers Award for his groundbreaking work.00:00 Introduction02:34 You don't need an expensive university11:00 In order to be successful in cyber, you need to…17:38 What are the bad guys doing?23:13 What does the government do to help?26:24 Consequences for bad actors41:35 The Art of Cyber Warfare44:05 Jon's new book--------------------------------------------------------------To learn more about Jon visit https://www.linkedin.com/in/jondimaggio/https://www.amazon.com/Art-Cyberwarfare-Investigators-Ransomware-Cybercrime-ebook/dp/B09BKLRH8P?ref_=ast_author_dpTo learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com

WWL First News with Tommy Tucker
Is cyber warfare going on between the US and other countries all the time?

WWL First News with Tommy Tucker

Play Episode Listen Later Apr 17, 2025 24:27


China has accused America of launching cyber attacks. How often does that go on? What kind of offensive and defensive cyber attacks are going on that the average person has no idea about? Tommy talks with Gary Corn, Director of the Technology, Law & Security Program and an adjunct professor of cyber and national security law and the law of armed conflict at American University

Dark Rhino Security Podcast
S17 E0 Tracking Cyber Criminals

Dark Rhino Security Podcast

Play Episode Listen Later Apr 16, 2025 46:34


Jon DiMaggio is the Chief Security Strategist at Analyst1 with over 15 years of experience tracking cyber threats. Specializing in enterprise ransomware and nation-state attacks, Jon is best known for infiltrating the LockBit ransomware gang during a two-year undercover operation. His research, including Ransomware Diaries and The Art of Cyberwarfare, has aided law enforcement and been featured by CBS 60 Minutes, The New York Times, and Wired. A frequent speaker at RSA, he has twice received the SANS Difference Makers Award for his groundbreaking work.00:00 Introduction02:34 You don't need an expensive university11:00 In order to be successful in cyber, you need to…17:38 What are the bad guys doing?23:13 What does the government do to help?26:24 Consequences for bad actors41:35 The Art of Cyber Warfare44:05 Jon's new book

Talking Cloud with an emphasis on Cloud Security
74-Talking Cloud Podcast-with Steve Winterfeld, Advisory & Fractional CISO, Cyber Vigilance Advice (CVA) LLC

Talking Cloud with an emphasis on Cloud Security

Play Episode Listen Later Apr 14, 2025 46:29


Episode #74 features a great discussion with Steve Winterfeld, Advisor, and Fractional CISO with Cyber Vigilance Advice (CVA) LLC. Steve is passionate about cybersecurity. He served as CISO for Nordstrom Bank, Director of Cybersecurity for Nordstrom, and Director of Incident Response and Threat Intelligence at Charles Schwab. Steve also published a book on Cyber Warfare and holds CISSP, ITIL, and PMP certifications. We discussed a variety of topics, and during our conversation, Steve offered these resources: On finding job: Lessons Learned on Finding a Cybersecurity Job After a Layoff - Security Boulevard On starting / managing a career: Creating a Roadmap for Your Dream Cybersecurity Career - Security Boulevard 

Conspiracy Files : Conspiracy Theories
The Stuxnet Virus: The First Digital Weapon of World War 3?

Conspiracy Files : Conspiracy Theories

Play Episode Listen Later Apr 2, 2025 34:57


Episode Link: https://open.spotify.com/show/3f8YJAs522S0319YvAYT8TIt didn't drop from the sky—it crept through code. In this jaw-dropping episode of Conspiracy Files, we explore the secret origins of Stuxnet, a sophisticated computer worm so advanced, many believe it was the first true cyberweapon ever unleashed. Who created it? What was the real target? And has it already opened the floodgates to digital warfare we can't see coming?This isn't just about hacking—this is about weaponized technology, covert operations, and a new kind of war the public was never meant to know about.Connect with The Conspiracy Files Podcast:

Uncommon Sense with Ginny Robinson
Answering Your Questions – My Stalker, RFK Jr.'s Scandal, & Leaked Government Texts

Uncommon Sense with Ginny Robinson

Play Episode Listen Later Mar 30, 2025 44:01


Today, we're going over your questions. You guys had some follow-ups about my stalker, Timothy C., and I'll be giving you a few more details on that situation. We're also unpacking the RFK Jr. sex scandal—what's real, what's spin, and what it all means. Plus, the government's leaked text messages have been making waves, and I'll be breaking down what they reveal and why you should (and shouldn't) care.—https://policecoffee.com/?gad_source=1&gbraid=0AAAAACG7qmI1dmMkruwgp8vA8w0oECKla&gclid=Cj0KCQjwtJ6_BhDWARIsAGanmKfdkRQ1M1sighZQ-PGpEpsCjrZ8fCigidnvH55bfBUNMa56-yoy_A8aAv34EALw_wcB—https://open.spotify.com/episode/7CcmZWvQEaLTQAQRAFy2BQ?si=FgeO4b9QSi-5eB2cqX2XHw

government fbi conspiracies accountability behind the scenes scandals controversy cia fake news conspiracy theories breaking news propaganda hacking censorship free speech misinformation law enforcement surveillance whistleblowers stalker leaked texts nsa national security stalking robert f kennedy jr breaking barriers deep state dark web answering your questions espionage mainstream media secret societies crisis management blackmail court cases power struggles data breach legal system civil liberties social engineering media bias hidden truth legal battle investigative journalism hidden agendas cyber threats truth seekers sex scandals election interference deep web crisis communications crime and punishment ethical dilemmas data mining cyberwarfare intelligence community restraining orders reputation management public perception surveillance state press freedom public trust privacy concerns investigative reporting security breach surveillance capitalism doxxing crisis response internet safety government overreach personal safety legal implications public discourse false narratives digital privacy information warfare shadow government digital forensics government corruption political strategy news coverage alternative media security challenges cyberstalking intelligence agencies digital rights government accountability online harassment public awareness legal defense wiretapping personal protection media narratives online bullying government transparency government oversight citizen journalism classified information phone hacking state secrets political games media control media spin media circus public scrutiny secret recordings narrative control inside politics government ethics mass deception victim advocacy online activism opposition research whistleblower protection journalism ethics online journalism secret agendas watchdog journalism
Uncommon Sense with Ginny Robinson
Exposing Government Corruption with Teddy Pierce, Author of Dethrone Davos: Save America

Uncommon Sense with Ginny Robinson

Play Episode Listen Later Mar 12, 2025 20:16


Today I'm joined by Teddy Pierce, author of Dethrone Davos: Save America, to discuss the shocking waste, fraud, and abuse that the Department of Government Efficiency (DOGE) has been uncovering. From reckless spending to blatant money laundering, we're breaking down how our government has been misusing our hard-earned tax dollars—and why this corruption must be stopped. Transparency and accountability aren't just buzzwords; they're essential for restoring actual integrity to our system. Tune in as we expose what's really going on behind the scenes and why this fight matters for all of us.—Buy Teddy's book, Dethrone Davos: https://www.amazon.com/Dethrone-Davos-America-Theodore-Pierce-ebook/dp/B0D5NKGGNC—https://www.thebrandsunday.com/collections/all

cancel culture transparency exposing censorship freedom of speech financial freedom world economic forum davos doge new world order deep state great reset financial independence american politics america first secret societies great awakening rothschild gold standard christian nationalism wef self reliance election fraud decentralization puppet master money laundering tax reform homesteading self sufficiency civil liberties hidden power save america false flags media bias national debt election integrity klaus schwab constitutional rights investigative journalism hidden agendas truth seekers federalism dark money breaking the chains cfr government spending cyberwarfare economic justice economic collapse decentralized finance financial crimes biblical justice investigative reporting dethrone independent media fraud prevention ruling class intentional communities one world government special interests corporate greed tax fraud economic inequality shadow government government corruption political corruption alternative media financial responsibility american independence tax havens sound money class warfare government accountability economic warfare fiscal responsibility crony capitalism government waste taxpayer money bilderberg group conservative politics trilateral commission foreign influence money in politics wealth preservation government surveillance controlled opposition woke capitalism government transparency government oversight globalist agenda ballot harvesting american patriotism liberty movement justice warriors economic resilience moral leadership rebuilding america political persecution small government financial accountability political accountability fraud investigation balanced budget shadow banking alternative finance american decline wealth redistribution free speech movement moral economy free market capitalism alternative news parallel economy narrative control underground economy government ethics civil resistance esg scores black budget american restoration davos agenda honest money economic liberty regenerative economy populist movement fair taxation
Hacker Valley Studio
Cyber Warfare, Digital Deception, and the Hidden Threats We Ignore with Dr. Eric Cole

Hacker Valley Studio

Play Episode Listen Later Mar 8, 2025 41:45


We're already in World War III—just not the kind you're thinking of. Cyber warfare is here, and the battlefield is your inbox, your bank account, and your digital identity. So why are we still acting like it's peacetime? Dr. Eric Cole, cybersecurity pioneer and former CIA hacker, joins the show to drop hard truths about the state of cyber warfare, AI's role in our digital future, and why most people are sleepwalking through a war they don't even realize they're in. From the rise of deepfakes to North Korea's billion-dollar hacking economy, this episode is one you can't afford to ignore.   Impactful Moments: 00:00 - Introduction 02:00 - Dr. Eric Cole's journey from the CIA to cybersecurity leadership 07:20 - The fundamentals of hacking and why they still matter 11:00 - AI is only as smart as the data we give it 17:00 - The rise of deepfakes and digital deception 19:45 - Cyber warfare: How North Korea funds its economy through hacking 23:50 - The problem with America's peacetime mentality 30:00 - Should we be worried about AI replacing humans? 36:10 - The key to success: mastering people skills, not just tech skills 40:30 - Final thoughts and where to follow Dr. Eric Cole   Connect with Dr. Eric Cole on LinkedIn: https://www.linkedin.com/in/ericcole1/ Check out Dr. Eric Cole's books –  Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World: https://www.amazon.com/Cyber-Crisis-Protecting-Business-Threats/dp/B093X3YNPT Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet: https://www.amazon.com/Online-Danger-Protect-Yourself-Internet-ebook/dp/B078WK39TT Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

ITSPmagazine | Technology. Cybersecurity. Society
Cyber Wars: How Elite Teams Stay Ahead of the Game | A Conversation with Gary Hayslip | The Soulful CXO Podcast with Dr. Rebecca Wynn

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Mar 4, 2025 15:37


Guest: Gary Hayslip, CISO, SoftBank Investment AdvisorsLinkedIn: https://www.linkedin.com/in/ghayslip/Website: cisodrg.com/biographies/gary-hayslip/Host: Dr. Rebecca WynnOn ITSPmagazine  

Snapshots
#109 - Revolutionary War Mystery Meets Modern Cyber Warfare

Snapshots

Play Episode Listen Later Feb 25, 2025 19:08


A mysterious Revolutionary War coin, modern cyber terrorism, and a shadowy organization known as the Liberty Unit converge in this groundbreaking techno-thriller that bridges America's past and present. Join Books and Looks for an in-depth review of "Going Dark" by George K. Mehok, a stunning debut novel that weaves together historical intrigue and contemporary cyber warfare. When NSA analyst Paul Knox inherits a mysterious coin from the Revolutionary War, he becomes entangled in a centuries-old fight to protect America from those who would destroy it from within. Written by a former cybersecurity expert, this thriller exposes the frightening possibilities of modern cyber warfare while connecting it to a fascinating piece of Revolutionary War history. Discover how a forgotten historical figure named Jack Jouett and a modern-day NSA analyst might hold the key to America's survival.S ubscribe to Books and Looks for weekly deep dives into the best new releases in history, mystery, fiction, and nonfiction. Links: "Going Dark" Book: https://amzn.to/4khszqe George K. Mehok Website: https://www.georgemehok.com/ Watch on YouTube: https://youtu.be/B97GnLZ_o38 _ Produced by Podcast Studio X.

Govcon Giants Podcast
Shields UP! The Cyber Warfare Fallout That Could Hit YOU Next!

Govcon Giants Podcast

Play Episode Listen Later Feb 23, 2025 9:57


In this episode we discuss the alarming potential of cyber warfare and its unintended consequences with the Former DoD Cyber Crime Director Jeff Stutzman. Jeff highlighted the vulnerability of surveillance systems and physical security protection due to outdated firmware and neglectful maintenance, emphasizing the critical need for constant vigilance in safeguarding critical infrastructure. Jeff urges listeners, particularly small defense contractors and businesses, to prioritize robust cybersecurity measures, including firewalls, antivirus software, two-factor authentication, and email protection, to mitigate risks in the face of a rapidly evolving cyber threat landscape. Listen now to learn more!

Security Unfiltered
Understanding Cyber Warfare and Emerging Security Trends With Jeremy Kirk From Intel 471

Security Unfiltered

Play Episode Listen Later Feb 18, 2025 50:39 Transcription Available


Send us a textWe dive into the complex world of cybersecurity through the eyes of Jeremy from Intel 471, exploring his journey from journalism to cyber threat intelligence. The discussion encompasses the evolution of cybercrime, the significance of ransomware, and future trends impacting cybersecurity.• Transition from journalism to cyber intelligence • Engaging with threat actors in cyber forums • Overview of Intel 471 and its mission • Ransomware trends and their implications • The intersection of nation-state actors and cybercrime • Impact of law enforcement collaboration on cyber investigations • Predictions for cybersecurity trends in 2025 • Importance of securing exposed attack surfaces • Call to action for increased cyber resilienceSupport the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today

The I.T. Career Podcast
89: The Cyber Warfare Secrets Every Cybersecurity Pro Should Know

The I.T. Career Podcast

Play Episode Listen Later Feb 17, 2025 68:14


3 Takeaways
The CIA's Secrets: Spy Missions, Cyber Wars & Covert Operations (#235)

3 Takeaways

Play Episode Listen Later Feb 4, 2025 23:18


The CIA may not be thrilled with this conversation. Here, Pulitzer Prize-winning author and highly regarded CIA expert Tim Weiner reveals stunning details about the agency's  espionage and covert activities. Learn about the CIA's greatest successes and failures, its best weapon, how China and Russia are spying on the U.S., and much more.

Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

Shawn Ryan Show

Play Episode Listen Later Jan 29, 2025 155:07


Mike Grover is a security researcher, InfoSec expert, and the creator of the infamous O.MG Cable. He gained prominence in 2019 when he showcased his malicious USB cable prototype at DEF CON, capable of recording keystrokes and executing remote commands. Grover's O.MG Cable looks identical to a regular charging cable, but contains a tiny implant that creates a Wi-Fi hotspot, allowing attackers to access the connected device from up to 300 feet away. Since its inception, Grover has refined the O.MG Cable design, making it indistinguishable from normal USB cables and expanding its capabilities. The latest iteration includes features such as geofencing, self-destruct mechanisms, and support for various connector types including Lightning and USB-C. Grover's work aims to raise awareness about hardware security risks while providing tools for red teams and security researchers to test and improve organizational defenses. Shawn Ryan Show Sponsors: https://ROKA.com | Use Code SRS https://ExpressVPN.com/SRS https://ZipRecruiter.com/SRS https://RocketMoney.com/SRS https://prizepicks.onelink.me/LME0/SRS https://ShawnLikesGold.com | 855-936-GOLD #goldcopartner https://americanfinancing.net/srs NMLS 182334, nmlsconsumeraccess.org. Call 866-781-8900 for details about credit costs and terms. Mike Grover Links: Website - https://o.mg.lol/ X - https://x.com/_MG_ LinkedIn - linkedin.com/in/mgrover Please leave us a review on Apple & Spotify Podcasts. Vigilance Elite/Shawn Ryan Links: Website | Patreon | TikTok | Instagram | Download Learn more about your ad choices. Visit podcastchoices.com/adchoices

Thought For Today
Weapons of Warfare

Thought For Today

Play Episode Listen Later Jan 24, 2025 3:20


I greet you in Jesus' precious name! It is Friday morning, the 24th of January, 2025, and this is your friend, Angus Buchan, with a thought for today. We go straight to 2 Corinthians 10:4 (Amplified Version): “The weapons of our warfare are not physical [weapons of flesh and blood]. Our weapons are divinely powerful for the destruction of fortresses.” Folks, we need to understand something. We are in a war. We are in a full-scale war and it's not a physical war. It's a war raging in the mind, and we need to use the weapons God has given us to combat this war. “What weapons?” You say. I am talking about prayer, the power of prayer. We've got to pray more and speak less. The Bible - that is our weapon. It's the sword of the Spirit. The word of God says we've got to use it. We've got to watch what we read, what we watch on TV and especially social media. This very message you are listening to now is coming to you on social media, and thank you very much for praying for me and for listening and watching it, because there is so much rubbish that can be watched even by a small child, ten, fourteen years old - things like pornography which is poisoning people, causing people to be depressed, and causing people to stress and to even contemplate suicide.Now I want to read something to you that I've heard from a lady named Cindy McGarvie. She is an Australian lady, and I want you to listen to the power of social media. Iran attacked America and they were expecting the Americans to retaliate with bombs and guns. Listen to this. “The US could have ordered air strikes on Iran's military bases where the missiles were launched, but instead they used both soundless and formless computer technology to achieve a similar end. This is called Cyber Warfare. Cyber Warfare is the use of computer technology to destruct activities of a state or organisation.” They didn't even send a missile or anything. They destructed the whole thing by social media.We need to be careful what we allow our children to watch and what we are watching and we need to use it for the benefit of the Kingdom of God. Remember the Bible tells us in 1 John 4:4: “…greater is He that is within us than he that is in the world.” And that is the whole purpose of thought for today, to bring to your attention, every morning, the importance of God's Holy Word which He has given us to stand against the lies of the devil.Jesus bless you and have a wonderful day. Goodbye.

Discover Daily by Perplexity
The RedNote App's Boom in the US, FBI Hacked Computers to Uninstall Malware, and Gaia Sky Scan Completed

Discover Daily by Perplexity

Play Episode Listen Later Jan 18, 2025 6:00 Transcription Available


We're experimenting and would love to hear from you!In this episode of Discover Daily, we explore how RedNote, a Chinese social media platform, has become the unexpected refuge for TikTok users ahead of the January 19th ban, with over 700,000 new American users joining in just two days.Next, we delve into a groundbreaking cybersecurity operation where the FBI, in partnership with French authorities and Sekoia.io, successfully removed dangerous PlugX malware from 4,258 U.S. computers. This sophisticated operation, conducted between August 2024 and January 2025, showcases how law enforcement turned the malware's own self-delete mechanism against itself to protect American digital infrastructure from Chinese state-sponsored hackers.Finally, we celebrate a historic moment in astronomy as the European Space Agency's Gaia telescope concludes its revolutionary sky-scanning mission after 11 years. Having collected over three trillion observations of two billion celestial objects, Gaia's legacy will continue through two major data releases planned for 2026 and beyond, promising to reshape our understanding of the Milky Way galaxy.From Perplexity's Discover Feed:https://www.perplexity.ai/page/the-rednote-apps-boom-in-the-u-1NnpJxlbSEGE_F6HqwBpdwhttps://www.perplexity.ai/page/fbi-hacked-computers-to-uninst-54mfC_E0SUS.e2kNPl191whttps://www.perplexity.ai/page/gaia-sky-scan-completed-gS0fkLxDRyCfaZsPGKrF0wPerplexity is the fastest and most powerful way to search the web. Perplexity crawls the web and curates the most relevant and up-to-date sources (from academic papers to Reddit threads) to create the perfect response to any question or topic you're interested in. Take the world's knowledge with you anywhere. Available on iOS and Android Join our growing Discord community for the latest updates and exclusive content. Follow us on: Instagram Threads X (Twitter) YouTube Linkedin

Security Conversations
Palo Alto network edge device backdoor, Cyberhaven browser extension hack, 2024 research highlights

Security Conversations

Play Episode Listen Later Dec 27, 2024 113:11


Three Buddy Problem - Episode 26: We discuss the discovery of a Palo Alto network firewall attack and a stealthy network edge device backdoor (LITTLELAMB.WOOLTEA), the Cyberhaven hack and the shady world of browser extensions, and a look back at the top research projects that caught our attention in 2025. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).

Macrodosing: Arian Foster and PFT Commenter
Best of 2024 - Part 1 | Dec 26, 2024

Macrodosing: Arian Foster and PFT Commenter

Play Episode Listen Later Dec 26, 2024 186:07


The Macrodosing crew kicks off the "Best of 2024" with a collection of unforgettable moments from the first half of the year. From wild theories to hilarious tangents and everything in between, Part 1 brings you the highlights that made this year so memorable. Part 2 out tomorrow, enjoy! (00:00:53) Wearing shirts with Arian on them (00:08:08) Naming random athletes (00:19:45) Brace Belden (00:38:49) Chicago office vs. NYC office (00:42:35) Donnie saving a plane (01:07:36) Arian's top 5 white people (01:13:36) Jeff D. Lowe + Don Gorske hater (01:27:48) Jerry vs. Cyber Warfare (01:41:01) Draft Day (01:52:13) OJ Simpson (02:07:28) Big T diss track of Joe Biden (02:15:42) Body building forum thread (02:22:46) Worst day of Big T's life + Arian's first pitch (02:37:34) Nick and Donnie (02:51:12) Big T's elbow injuryYou can find every episode of this show on Apple Podcasts, Spotify or YouTube. Prime Members can listen ad-free on Amazon Music. For more, visit barstool.link/macrodosing

Security Conversations
US government's VPN advice, dropping bombs on ransomware gangs

Security Conversations

Play Episode Listen Later Dec 23, 2024 118:40


Three Buddy Problem - Episode 26: We dive deep into the shadowy world of surveillance and cyber operations, unpacking Amnesty International's explosive report on NoviSpy, a previously unknown Android implant used against Serbian activists, and the links to Israeli forensics software vendor Cellebrite. Plus, thoughts on the US government's controversial guidance on VPNs, Chinese reports on US intel agency hacking, TP-Link sanctions chatter, Mossad's dramatic exploding beeper operation and the ethical, legal, and security implications of escalating cyber-deterrence. Also, a mysterious BeyondTrust 0-day! Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).

1A
ICYMI: Unpacking China And Russia's New Cyber Warfare Strategies

1A

Play Episode Listen Later Dec 10, 2024 11:11


Over the past year, the Chinese government has stepped up its cyber operations, focusing not just on espionage or stealing intellectual property, but on hacking to bolster geopolitical goals.U.S. authorities and institutions are used to digital aggression from the likes of Russia. But are now freshly reconsidering the objectives and capabilities of one of the country's other eastern rivals.We discuss those goals and how China using cyberspace to achieve them. We also discuss the latest from Russia. Want to support 1A? Give to your local public radio station and subscribe to this podcast. Have questions? Connect with us. Listen to 1A sponsor-free by signing up for 1A+ at plus.npr.org/the1a.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy

The Brian Kilmeade Show Free Podcast
China's cyberwarfare, AI and hacking threat

The Brian Kilmeade Show Free Podcast

Play Episode Listen Later Nov 29, 2024 42:51


With Tristan Harris, Aza Raskin and Theresa Payton. Learn more about your ad choices. Visit megaphone.fm/adchoices

Forbidden Knowledge News
The Final War: Cyber Warfare, Espionage, Disinformation & Surveillance | Greg Lebow

Forbidden Knowledge News

Play Episode Listen Later Nov 23, 2024 63:42


Max's podcast https://podcasts.apple.com/us/podcast/the-final-war/id1770261300Make a Donation to Forbidden Knowledge News https://www.paypal.me/forbiddenknowledgenehttps://buymeacoffee.com/forbiddenReconnect to Everything with BrainsupremeGet 25% off your order here!!https://brainsupreme.co/discount/FKN15Subscribe to Cory Hughe's "Bloody History" substackhttps://bloodyhistory.substack.comSign up for the IMT crypto community Imt.networkBook a free consultation with Jennifer Halcame Emailjenniferhalcame@gmail.comFacebook pagehttps://www.facebook.com/profile.php?id=61561665957079&mibextid=ZbWKwLSick of having mediocre health? Transform your health and vitality with Christian Yordanov's program. Learn more and book a free intro call here (mention FKN at time of booking and he will have a special gift for youhttps://christianyordanov.com/fkn/Watch The Forbidden Documentary: Occult Louisiana on Tubi: https://link.tubi.tv/pGXW6chxCJbC60 PurplePowerhttps://go.shopc60.com/FORBIDDEN10/or use coupon code knowledge10FKN Link Treehttps://linktr.ee/FKNlinksForbidden Knowledge Network https://forbiddenknowledge.news/ Sign up on Rokfin!https://rokfin.com/fknplusPodcastshttps://www.spreaker.com/show/forbiddenAvailable on all platforms Support FKN on Spreaker https://spreaker.page.link/KoPgfbEq8kcsR5oj9FKN ON Rumblehttps://rumble.com/c/FKNpGet Cory Hughes Book!https://www.buymeacoffee.com/jfkbookhttps://www.amazon.com/Warning-History-Cory-Hughes/dp/B0CL14VQY6/ref=mp_s_a_1_1?crid=72HEFZQA7TAP&keywords=a+warning+from+history+cory+hughes&qid=1698861279&sprefix=a+warning+fro%2Caps%2C121&sr=8-1https://coryhughes.org/Johnny Larson's artworkhttps://www.patreon.com/JohnnyLarsonYouTube https://youtube.com/@fknclipspBecome Self-Sufficient With A Food Forest!!https://foodforestabundance.com/get-started/?ref=CHRISTOPHERMATHUse coupon code: FORBIDDEN for discountsThe FKN Store!https://www.fknstore.net/Our Facebook pageshttps://www.facebook.com/forbiddenknowledgenewsconspiracy/https://www.facebook.com/FKNNetwork/Instagram @forbiddenknowledgenews1@forbiddenknowledgenetworkXhttps://x.com/ForbiddenKnow10?t=uO5AqEtDuHdF9fXYtCUtfw&s=09Email meforbiddenknowledgenews@gmail.comsome music thanks to:https://www.bensound.com/Become a supporter of this podcast: https://www.spreaker.com/podcast/forbidden-knowledge-news--3589233/support.

True Spies
True Spies: Debriefs - Eric O'Neill on the frontiers of cyberwarfare

True Spies

Play Episode Listen Later Oct 15, 2024 41:28


What will cost the global economy $20 trillion come 2026? In this latest Debrief, hear from author and famed security expert: Eric O'Neill. Eric discusses with Morgan Childs the growing hotbeds for cyber espionage, crime and warfare in the world right now, their consequences. Crucially, they also discuss how individuals and companies alike can safeguard now, to prevent catastrophe moving forward. From SPYSCAPE, the HQ of secrets. A Cup And Nuzzle production. Series producer: Joe Foley. Produced by Morgan Childs. Learn more about your ad choices. Visit megaphone.fm/adchoices