POPULARITY
Categories
What does cyberwarfare really look like behind the headlines? This week, Roo sits down with Hayley Benedict, a cyber intelligence analyst at RANE, to explore the evolving world of digital conflict. From hacktivists to disinformation specialists, Hayley shares how nation states, criminals, and ideologically driven groups are blurring lines — and why data theft, disruption, and doubt remain the weapons of choice.
In this week's episode of China Insider, Miles Yu covers the recent anti-corruption movement and Gen Z protests that ousted former Prime Minister Oli and government officials, and examine China's role in the transition to the new interim government. Next, Miles breaks down the latest from US-China trade talks in Madrid, as the US seeks to advance the TikTok divestiture and framework for a bilateral trade deal, while China seeks to avoid further tariffs related to purchases of Russian oil. Lastly, Miles unpacks the historical data breach from China's Great Firewall that compromised highly confidential and protected information regarding the CCP's extensive exports of censorship and surveillance technology to foreign countries. China Insider is a weekly podcast project from Hudson Institute's China Center, hosted by China Center Director and Senior Fellow, Dr. Miles Yu, who provides weekly news that mainstream American outlets often miss, as well as in-depth commentary and analysis on the China challenge and the free world's future.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Send us a textMegan and Michelle dish about the Tea app, safety tools, doxxing, green flags, ranking games, being petty, and the big mad.Sources:- Tea App Turns Off DMs After Exposing Messages About Abortions, Cheating- Tea encouraged its users to spill. Then the app's data got leaked- Hackers leak 13,000 user photos and IDs from the Tea app, designed as a women's safe space****************Want to support Prosecco Theory?Become a Patreon subscriber and earn swag!Check out our merch, available on teepublic.com!Follow/Subscribe wherever you listen!Rate, review, and tell your friends!Follow us on Instagram!****************Ever thought about starting your own podcast? From day one, Buzzsprout gave us all the tools we needed get Prosecco Theory off the ground. What are you waiting for? Follow this link to get started. Cheers!!Support the show
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Want to work in cybersecurity but don't know where to begin? Or just curious what it takes to break into the field? This week, we're joined by the internet's very own Heath Adams, better known as The Cyber Mentor. He demystifies the application process and what it takes to build a career in cybersecurity – no matter your background.
We're asking the hard question: is technology the problem… to technology? If cybercrime only exists because the internet does, maybe the real solution is to unplug it all, toss the Wi-Fi router into the river, and go back to quills, scrolls, and smoke signals. In this episode, Darnley takes a tongue-in-cheek look at the rise of tech in cybersecurity, why every “solution” creates new problems, and whether we should just burn it all down.Grab a coffee, sit back, and laugh(or cry) while we wrestle with the paradox of fighting technology with technology, and what you actually need to do to stay safe online.Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
i'm wall-e, welcoming you to today's tech briefing for friday, august 29. here's what's making headlines: commonwealth fusion systems' major funding: the massachusetts-based startup secures $863 million from big names like nvidia and google, pushing total funding to nearly $3 billion. the focus is to accelerate its prototype reactor, sparc, aiming for scientific breakeven by 2027, with plans for a commercial reactor by 2028. transunion data breach: a breach affecting 4.4 million customers via a third-party application. personal data including names, birthdates, and social security numbers were accessed, though no credit information was compromised. mark cuban's healthcare disruption: cuban's cost plus drugs initiative aims to tackle the $5 trillion industry with transparent pricing and a new robotic manufacturing plant to address drug shortages and reduce costs. anthropic's ai data policy update: users have until september 28 to opt in or out of having their chat data used for ai training. data retention could last up to five years, reflecting industry trends for improving ai models. expansion of mathgpt.ai: the 'cheat-proof' tutor is expanding to over 50 colleges, enhancing learning through inquiry-based methods with plans for more features and a potential mobile app launch. that's all for today. we'll see you back here tomorrow!
Class action lawsuits in response to data breaches have skyrocketed as plaintiffs look to take advantage of courts' perceived leniency regarding standing.
EASY LISTENING DEP'T.: The New York Times did not think that the mayor, in the midst of his reelection campaign, having his people hand out cash bribes in public, was anything that its readership might need to know in a timely manner. They got scooped on the news simply because the bribery was so widespread and so blatant that another outlet, one that actually cares about reporting on the city, bumped into a bribe on its own. Please visit, read, and support INDIGNITY! https://www.indignity.net/
Data breaches in the health care sector can carry immense legal, financial, and reputational consequences. Jon Moore, Chief Risk Officer and Head of Consulting Services, Clearwater, speaks with Christine Moundas, Partner, Ropes & Gray LLP, about how health care organizations can mitigate risk through robust breach preparedness plans and ensure legally sound, compliant responses when incidents occur. They discuss how to operationalize breach readiness, key pitfalls to avoid during incident response, and the legal implications of internal decision-making. Sponsored by Clearwater.Watch this episode: https://www.youtube.com/watch?v=Lvo4EsiCK0YLearn more about Clearwater: https://clearwatersecurity.com/ Essential Legal Updates, Now in Audio AHLA's popular Health Law Daily email newsletter is now a daily podcast, exclusively for AHLA Premium members. Get all your health law news from the major media outlets on this podcast! To subscribe and add this private podcast feed to your podcast app, go to americanhealthlaw.org/dailypodcast. Stay At the Forefront of Health Legal Education Learn more about AHLA and the educational resources available to the health law community at https://www.americanhealthlaw.org/.
Strap in, folks—this episode charges into the wild frontier of cybersecurity, where Shadow AI runs loose like a toddler with admin access. Whether your security plan is airtight or held together by paperclips and prayers, this deep dive into the IBM Cost of a Data Breach 2025 report offers plenty to think about. From eye-popping breach costs to the cringe of unsecured AI, we're covering the good, the bad, and the downright reckless. Spoiler: "we don't use AI" might be the biggest myth since "the check's in the mail." More info at HelpMeWithHIPAA.com/523
Chicago 2nd Ward Alderman Brian Hopkins comments on the latest buzz in the City of Chicago, including the Air & Water show damage, the Bears stadium, minimum wage, and his potential mayoral run. McDonald Hopkins Partner Spencer Pollock discusses Kelley Drye's data breach cyberattack, resulting in a class action suit. Law Offices of Bruce Margolin Founding […]
This episode is a family-friendly extravaganza as we unpack the secrets to secure digital parenting. We're joined by Alanna Powers, a research specialist from the renowned Family Online Safety Institute (FOSI).
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Ukraine's president is expected to be pushed to swap land for peace and security during today's White House summit. Texas and California are moving forward with redrawing electoral maps in their respective states. Police are searching for multiple suspects after a deadly shooting at a crowded Brooklyn lounge. We'll tell you why the US is suspending visitor visas for people from Gaza. Plus, AT&T subscribers may be in for a small windfall. Learn more about your ad choices. Visit podcastchoices.com/adchoices
It all depends on what happened to your data and probably on how many people make claims. https://www.lehtoslaw.com
Recorded live from the New Orleans Tax Forum, Roger and Annie sit down with Maggie Romaniello from IRS Stakeholder Liaison to discuss this often overlooked but crucial IRS department. Maggie explains how Stakeholder Liaison serves as an advocate for tax professionals and their clients, handling everything from systemic issues like erroneous extension letters to data breach incidents and disaster response. The conversation reveals how practitioners can access this free resource directly through the IRS website and highlights the department's role in pushing for technological improvements like online accounts and streamlined processes.SponsorsPadgett - Contact Padgett or Email Jeff Phillips(00:00) - Introduction and Setting the Scene (01:02) - Overview of IRS Tax Forums (01:37) - Special Guest: Maggie Romaniello from Stakeholder Liaison (03:07) - History and Evolution of Stakeholder Liaison (04:57) - Current Challenges and Changes in Stakeholder Liaison (05:53) - Addressing Practitioner Issues and Communication (16:05) - How to Contact Stakeholder Liaison (19:55) - Introduction to Data Safetys (22:07) - Steps to Take After a Data Breach (24:00) - IRS Support and Resources (25:12) - State-Specific Requirements for Data Breaches (27:11) - The Importance of Online Accounts (28:45) - Setting Up and Using IRS Online Accounts (37:28) - Power of Attorney and Tax Pro Accounts (42:31) - Handling Disasters and IRS Outreach Get NASBA Approved CPE or IRS Approved CELaunch the course on EarmarkCPE to get free CPE/CE for listening to this episode.Connect with Maggie LinkedIn: https://www.linkedin.com/in/margaret-romaniello-5189758aConnect with the Hosts on LinkedInRoger HarrisAnnie SchwabReviewLeave a review on Apple Podcasts or PodchaserSubscribeSubscribe to the Federal Tax Updates podcast in your favorite podcast app!This podcast is a production of the Earmark MediaThe full transcript for this episode is available by clicking on the Transcript tab at the top of this pageAll content from this podcast by SmallBizPros, Inc. DBA PADGETT BUSINESS SERVICES is intended for informational purposes only.
At Black Hat USA 2025, Sean Martin, co-founder of ITSPmagazine, sat down with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, to discuss the findings from the company's latest ransomware report. Over the past five years, the research has tracked how attack patterns, targets, and business models have shifted—most notably from file encryption to data theft and extortion.Brett explains that many ransomware groups now find it more profitable—and less risky—to steal sensitive data and threaten to leak it unless paid, rather than encrypt files and disrupt operations. This change also allows attackers to stay out of the headlines and avoid immediate law enforcement pressure, while still extracting massive payouts. One case saw a Fortune 50 company pay $75 million to prevent the leak of 100 terabytes of sensitive medical data—without a single file being encrypted.The report highlights variation in attacker methods. Some groups focus on single large targets; others, like the group “LOP,” exploit vulnerabilities in widely used file transfer applications, making supply chain compromise a preferred tactic. Once inside, attackers validate their claims by providing file trees and sample data—proving the theft is real.Certain industries remain disproportionately affected. Healthcare, manufacturing, and technology are perennial top targets, with oil and gas seeing a sharp increase this year. Many victims operate with legacy systems, slow to adopt modern security measures, making them vulnerable. Geographically, the U.S. continues to be hit hardest, accounting for roughly half of all observed ransomware incidents.The conversation also addresses why organizations fail to detect such massive data theft—sometimes hundreds of gigabytes per day over weeks. Poor monitoring, limited security staffing, and alert fatigue all contribute. Brett emphasizes that reducing exposure starts with eliminating unnecessary internet-facing services and embracing zero trust architectures to prevent lateral movement.The ransomware report serves not just as a data source but as a practical guide. By mapping observed attacker behaviors to defensive strategies, organizations can better identify and close their most dangerous gaps—before becoming another statistic in next year's findings.Learn more about Zscaler: https://itspm.ag/zscaler-327152Note: This story contains promotional content. Learn more.Guest:Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, | On LinkedIn: https://www.linkedin.com/in/brett-stone-gross/ResourcesLearn more and catch more stories from Zscaler: https://www.itspmagazine.com/directory/zscalerLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-storyKeywords: sean martin, brett stone-gross, ransomware, data extortion, cyber attacks, zero trust security, threat intelligence, data breach, cyber defense, network security, file transfer vulnerability, data protection, black hat, black hat usa 2025, zscaler
The Data Protection Commission has launched an inquiry into Children's Health Ireland over the physical safety and security of children's personal health records at Tallaght University Hospital. Aengus Cox, Agriculture and Consumer Affairs correspondent, reports.
The panel discusses Apple's AI talent losses amid a rumored shift to third-party models, Meta's aggressive recruitment, and speculation on Apple's long-term AI strategy. Chuck Joiner, David Ginsburg, Marty Jencius, Brian Flanigan-Arthurs, Web Bixby, Guy Serle, Jim Rea, and Jeff Gamet cover Sonos appointing Tom Conrad as CEO, Google's new AI search experiment, a significant SharePoint security breach, and controversy over the women-only Tea app following a massive data exposure and class action lawsuit. http://traffic.libsyn.com/maclevelten/MV25213.mp3 Today's MacVoices is supported by CleanMyMac and the new Cloud Cleanup feature. Get Tidy Today! Try 7 days free and use the code MACVOICES20 for 20% off at clnmy.com/MACVOICES. Show Notes: Chapters: [0:00] Introduction and Apple AI researcher departure to Meta [2:28] Apple's AI strategy shift and market perception [5:08] Practical vs. flashy AI implementations at Apple [7:51] Perspectives on Meta's aggressive AI hiring [9:40] Interpreting Apple's AI direction and talent movement [12:15] Sonos appoints Tom Conrad as CEO [15:47] Google's new AI search product discussion [18:18] SharePoint hack impacts U.S. nuclear agency [19:23] The Tea app controversy and data exposure [27:50] Social shaming and safe spaces online [29:59] Closing remarks and support information Links: Apple just lost another AI researcher as it weighs shift to third-party models https://9to5mac.com/2025/07/29/apple-just-lost-another-ai-researcher-as-it-weighs-shift-to-third-party-models/ Sonos gets to keeps its CEO, as a treat https://www.engadget.com/big-tech/sonos-gets-to-keeps-its-ceo-as-a-treat-164559137.html Google Might Have Made an AI Search Product I Actually Like https://lifehacker.com/tech/google-ai-search-web-guide US nuclear weapons agency breached using Microsoft SharePoint hack https://www.engadget.com/cybersecurity/us-nuclear-weapons-agency-breached-using-microsoft-sharepoint-hack-120027770.html The Microsoft SharePoint breach was massive. The response has been minimal https://www.fastcompany.com/91373183/microsoft-sharepoint-breach-response-minimal Microsoft trials Copilot Mode in Edge https://www.engadget.com/ai/microsoft-trials-copilot-mode-in-edge-201851903.html The Viral 'Tea' App Just Had a Second Data Breach, and It's Even Worse https://lifehacker.com/tech/the-viral-tea-app-just-had-another-data-breach Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn, but prefers Bluesky. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Guy Serle, best known for being one of the co-hosts of the MyMac Podcast, sincerely apologizes for anything he has done or caused to have happened while in possession of dangerous podcasting equipment. He should know better but being a blonde from Florida means he's probably incapable of understanding the damage he has wrought. Guy is also the author of the novel, The Maltese Cube. You can follow his exploits on Twitter, catch him on Mac to the Future on Facebook, at @Macparrot@mastodon.social, and find everything at VertShark.com. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
In today's Cloud Wars Minute, I highlight how the rapid rise of AI — without the right security in place — could be the biggest unseen threat to your business.Highlights00:03 — IBM's new "Cost of a Data Breach" report has revealed that while AI adoption is on the rise, AI security and governance are lagging significantly. Suja Viswesan, Vice President, Security and Runtime Products at IBM, explains that the data shows a gap between AI adoption and oversight already exists, and threat actors are starting to exploit it.00:57 — 13% of organizations reported breaches involving AI models or applications, while 8% of organizations were unsure if they had been compromised in this way. Among those surveyed who experienced a breach, 97% indicated that they had no AI access controls in place. As a result, 60% of AI-related security incidents led to compromised data, and 31% resulted in operational disruptions.01:56 — In contrast, organizations that utilize AI and automation in their security operations save an average of $1.9 million in breach costs and reduce the breach life cycle by approximately 80 days. However, it's important to remember that 16% of breaches still involve AI tools, primarily in phishing or deepfake impersonation attacks. Visit Cloud Wars for more.
The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.
Send us a textOn this week of Serious Privacy, Paul Breitbarth, Ralph O'Brien of Reinbo Consulting, and Dr. K Royal talk about a slew of breaches and what to do if your data is breached. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
A new app was hacked and personal information – including driver's licenses – was leaked. We get the details - and tips on staying safe - from Alex Hamerstone, Director of advisory solutions for TrustedSec
PBS confirms data breach after employee info leaked on Discord servers TSMC fires engineers over suspected semiconductor secrets theft Cloudflare on Perplexity web scraping techniques to avoid robot.txt and network blocks Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO.
Ethical hacker Rachel Tobac joins us to answer a juicy question: How would she hack someone reasonably security savvy like Matt?
PEBCAK Podcast: Information Security News by Some All Around Good People
Welcome to this week's episode of the PEBCAK Podcast! We've got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! Belgium warns seniors about online scams on bread bags https://grahamcluley.com/loaf-and-order-belgian-police-launch-bread-based-cybersecurity-campaign/ https://www.nieuwsblad.be/regio/vlaams-brabant/halle-vilvoorde/pajottegem/politie-waarschuwt-voor-internetcriminaliteit-via-broodzakken-niet-iedereen-is-actief-op-sociale-media/77720193.html Indiana mom busted on Snapchat trying to sell children https://nypost.com/2025/07/19/us-news/indiana-mom-busted-after-trying-to-sell-baby-daughter-for-sex/ Dating safety app Tea suffers multiple data breaches https://techcrunch.com/2025/07/26/dating-safety-app-tea-breached-exposing-72000-user-images/ https://x.com/denzell75399403/status/1949073773639942310?s=46 https://x.com/belowtearline/status/1948891743333585112?s=46 https://www.404media.co/women-dating-safety-app-tea-breached-users-ids-posted-to-4chan/ https://www.bleepingcomputer.com/news/security/tea-app-leak-worsens-with-second-database-exposing-user-chats/ Dad Joke of the Week (DJOW) Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Matt - https://www.linkedin.com/in/disher/ Ben - https://www.linkedin.com/in/benjamincorll/
The Tea app is a place for women to share red or green flags about men, but it recently suffered a major data breach. Plus, why some members of Congress are protesting a deal with China to allow Nvidia to sell its H20 chips to the country. And YouTube is rolling out new age estimation technology to protect younger users. Marketplace's Meghan McCarty Carino is joined by Maria Curi, tech policy reporter at Axios, to discuss all this.
The Tea app is a place for women to share red or green flags about men, but it recently suffered a major data breach. Plus, why some members of Congress are protesting a deal with China to allow Nvidia to sell its H20 chips to the country. And YouTube is rolling out new age estimation technology to protect younger users. Marketplace's Meghan McCarty Carino is joined by Maria Curi, tech policy reporter at Axios, to discuss all this.
In this episode, the host Jim Love discusses the increasing sophistication of supply chain attacks, starting with an account of a blockchain developer who lost $500,000 due to a malicious extension in a popular AI-powered coding tool. The episode also covers a significant cyber emergency in St. Paul, Minnesota, which required National Guard support, and the City's struggle to comprehend the full scope of the hack. Additionally, the US Cybersecurity and Infrastructure Security Agency (CISA) has released a new eviction strategies tool to help cybersecurity teams remove persistent threats. The episode concludes with an update on the Ingram Micro breach, where the Safe Pay ransomware gang has threatened to leak 35 terabytes of stolen data. Listeners are encouraged to focus on preventative measures even when ransomware attacks do not involve encryption. 00:00 Introduction and Headlines 00:25 The $500,000 Crypto Heist 01:26 Supply Chain Attack on Open VSX 04:50 Lessons from the Attack 06:16 Oyster Backdoor Threat 07:54 Cyber Attack on St. Paul 09:09 CISA's New Eviction Strategies Tool 10:43 Ingram Micro Data Breach Update 12:18 Conclusion and Contact Information
Send us a textThis episode covers a week in privacy which feels light and refreshing. Listen to co-hosts Paul Breitbarth, Ralph O'Brien, and Dr. K Royal. Topics include an emergency ban in Italy about publishing images about an autopsy, Germany's actions involving Meta, Poland's enforcement on a McDonald's data breach, UK's collaboration with OpenAI, UK's enforcement against spam/spoof scam calls, age-verification in MS, and more! If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to reflect on a 2006 data breach which served as a cybersecurity wake up call for the Department of Veterans Affairs and the rest of the federal government. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
Oh No! Lenovo You sunk my battleship! Or did you? Russians unable to get a taste of their own medicine Huge thanks to our sponsor, Dropzone AI Security teams everywhere are drowning in alerts. That's why companies like Zapier and CBTS turned to Dropzone AI—the leader in autonomous alert investigation. Their AI investigates everything, giving your analysts time back for real security work. No more 40-minute rabbit holes. If you're at BlackHat, find them in Startup City. Otherwise, check out their self-guided demo at dropzone.ai. This is how modern SOCs are scaling without burning out. Find the stories behind the headlines at CISOseries.com.
Owen Poole runs through the tech news of the day, including OpenAI's new "Study Mode" for ChatGPT, a popular dating safety app that got hacked, and Domino's debut of a pizza delivery robot that can protect your pizza from seagulls on Tech Today.
Please consider buying us a coffee or subscribing to a membership to help keep Centennial World's weekly podcasts going! Every single dollar goes back into this business
Owen Poole runs through the tech news of the day, including OpenAI's new "Study Mode" for ChatGPT, a popular dating safety app that got hacked, and Domino's debut of a pizza delivery robot that can protect your pizza from seagulls on Tech Today.
An app called Tea had a data breach over the weekend that exposed tens of thousands of photos. BJ is over the moon excited about our new BJ and Jamie grocery tote bags. Deion Sanders is going to give a press conference today with his medical team to let us know what has been going on with his health.
An app called Tea had a data breach over the weekend that exposed tens of thousands of photos.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
The Tea app, which allows anonymous women to stalk men, had a massive data breach and now there's a class action lawsuit brewing. For the WOMEN... not the men. However, even CNN admits that Tea might've opened itself up to defamation cases. Here we go... Watch this podcast episode on YouTube and all major podcast hosts including Spotify. CLOWNFISH TV is an independent, opinionated news and commentary podcast that covers Entertainment and Tech from a consumer's point of view. We talk about Gaming, Comics, Anime, TV, Movies, Animation and more. Hosted by Kneon and Geeky Sparkles. D/REZZED News covers Pixels, Pop Culture, and the Paranormal! We're an independent, opinionated entertainment news blog covering Video Games, Tech, Comics, Movies, Anime, High Strangeness, and more. As part of Clownfish TV, we strive to be balanced, based, and apolitical. Get more news, views and reviews on Clownfish TV News - https://news.clownfishtv.com/ On YouTube - https://www.youtube.com/c/ClownfishTV On Spotify - https://open.spotify.com/show/4Tu83D1NcCmh7K1zHIedvg On Apple Podcasts - https://podcasts.apple.com/us/podcast/clownfish-tv-audio-edition/id1726838629
Send us a textWith Dr. K Royal off to Vegas, this week it's Paul Breitbarth and Ralph O'Brien of Reinbo Consulting catching up for the Serious Privacy podcast on all of the news. Two big topics this week: the hidden-until-now data breach of the UK ministry of Defence in Afghanistan and the mess that was the WeTransfer terms update (official blog post, Paul's Linkedin post). The guys also talk about this piece in the New York Times Wirecutter on disappearing from the internet. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
We're back with a brand-new season of Random but Memorable! ✨
The UK sanctions Russian military intelligence officers tied to GRU cyber units. An AI-powered malware called LameHug targets Windows systems. Google files a lawsuit against the operators of the Badbox 2.0 botnet. A pair of healthcare data breaches impact over 3 million individuals. Researchers report a phishing attack that bypasses FIDO authentication by exploiting QR codes. A critical flaw in Nvidia's Container Toolkit threatens managed AI cloud services. A secure messaging app is found exposing sensitive data due to outdated configurations. Meta investors settle their $8 billion lawsuit. Our guest is Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst, with a data-driven look at how AI is affecting jobs. Belgian police provide timely cyber tips, baked right in. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we have Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst, discussing how AI is affecting jobs. Got cybersecurity, IT, or project management certification goals? For the past 25 years, N2K's practice tests have helped more than half a million professionals reach certification success. Grow your career and reach your goals faster with N2K's full exam prep of practice tests, labs, and training courses for Microsoft, CompTIA, PMI, Amazon, and more at n2k.com/certify. Selected Reading Breaking: UK sanctions Russian cyber spies accused of facilitating murders (The Record) Russia Linked to New Malware Targeting Email Accounts for Espionage (Infosecurity Magazine) New “LameHug” Malware Deploys AI-Generated Commands (Infosecurity Magazine) Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet (SecurityWeek) 1.4 Million Affected by Data Breach at Virginia Radiology Practice (SecurityWeek) Anne Arundel Dermatology Data Breach Impacts 1.9 Million People (SecurityWeek) Phishing attack abuses QR codes to bypass FIDO keys (SC Media) Critical Nvidia Toolkit Flaw Exposes AI Cloud Services to Hacking (SecurityWeek) New TeleMessage SGNL Flaw Is Actively Being Exploited by Attackers (Hackread) Meta investors, Zuckerberg settle $8 billion privacy lawsuit tied to Cambridge Analytica scandal (The Record) Loaf and order: Belgian police launch bread-based cybersecurity campaign (Graham Cluley) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
The personal details of British spies and special forces soldiers were included in one of the worst security leaks in modern UK history. Also: Rosebud - the wooden sled from Citizen Kane - sells for millions at auction.
UK government apologises to thousands of Afghans potentially at risk from Taliban after personal details leaked. Also: Trump says Ukraine shouldn't target Moscow, and 114-year-old marathon runner dies after car accident.
Today, Keir Starmer told the House of Commons the previous government had ‘serious questions' to answer about a major data breach from the Ministry of Defence.On Tuesday, a major data breach which led to thousands of Afghans being secretly relocated to the UK became public knowledge for the first time. Chris joins Adam to discuss the former government's account of events, as well as what could happen next. And, Adam speaks to Larisa Brown, Defence Editor at The Times, about how she broke the story. Meanwhile in the US, Donald Trump is being pushed by fellow Republicans to follow through on promises he made during the election to release records relating to sex offender Jeffrey Epstein. Caitriona Perry calls in from Washington to explain why Trump is facing a growing backlash from MAGA supporters, and examines how the president's rhetoric has changed. Tickets for Newscast at the Edinburgh Fringe are available here: https://www.edfringe.com/tickets/whats-on/bbc-newscast-podcastYou can now listen to Newscast on a smart speaker. If you want to listen, just say "Ask BBC Sounds to play Newscast”. It works on most smart speakers. You can join our Newscast online community here: https://tinyurl.com/newscastcommunityhereGet in touch with Newscast by emailing newscast@bbc.co.uk or send us a whatsapp on +44 0330 123 9480.New episodes released every day. If you're in the UK, for more News and Current Affairs podcasts from the BBC, listen on BBC Sounds: https://bit.ly/3ENLcS1 Newscast brings you daily analysis of the latest political news stories from the BBC. It was presented by Adam Fleming. It was made by Miranda Slade with Shiler Mahmoudi and Anna Harris. The social producer was Jada Meosa John. The technical producer was Mike Regaard. The assistant editor is Chris Gray. The senior news editor is Sam Bonham.
WarRoom Battleground EP 794: Future Shock: Massive Data Breach, OpenAI Surveillance, and the Quantum Apocalypse