Podcasts about Data breach

  • 1,197PODCASTS
  • 3,408EPISODES
  • 29mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Dec 17, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Data breach

Show all podcasts related to data breach

Latest podcast episodes about Data breach

Legal 123s with ByrdAdatto
Does My Practice Need Cybersecurity Insurance? with Kaitlin Upchurch

Legal 123s with ByrdAdatto

Play Episode Listen Later Dec 17, 2025 29:53


Cybersecurity is essential for every practice that relies on technology. In this episode, guest Kaitlin Upchurch, Senior Vice President and Cyber & Tech Practice Leader at Lockton, addresses the cybersecurity questions practices are—and are not—thinking about. She explains why cybersecurity risks are often misunderstood, what makes health care a prime target, and why insurance alone is not enough. Tune in to understand your cyber exposure, the biggest threats facing practices today, and the first steps to strengthen your protection beyond buying a policy.  Chapters00:00 Intro00:47 Banter04:25 Guest background10:20 Tell us about Lockton.13:40 Do medical practices need cybersecurity?18:40 What are cybersecurity misconceptions?20:48 What are some cybersecurity threats?25:00 How can medical practices avoid cybersecurity issues?26:37 Access+27:16 Legal Takeaways28:45 OutroWatch full episodes of our podcast on our YouTube channel: https://www.youtube.com/@byrdadatto  Stay connected for the latest business and health care legal updates:WebsiteFacebookInstagramLinkedIn

Cyber Security Today
React2Shell Vulnerability, Black Force Phishing Kit, Microsoft OAuth Attacks, and PornHub Data Breach

Cyber Security Today

Play Episode Listen Later Dec 17, 2025 14:46


In this episode of Cybersecurity Today, host Jim Love discusses a range of pressing cybersecurity threats. The show covers the escalating React2Shell vulnerability, which has led to widespread automated exploitation campaigns involving crypto miners and back doors. Additionally, Jim reports on the Black Force phishing kit, which bypasses multifactor authentication and is gaining traction among cybercriminals. Microsoft OAuth consent attacks are also highlighted, with users being tricked into granting access to their accounts. Finally, the episode touches on PornHub's data breach involving the Shiny Hunters cybercrime group and the importance of patching vulnerabilities and being cautious during the holiday season. 00:00 Introduction and Sponsor Message 00:22 React2Shell Vulnerability Deep Dive 03:46 Black Force Phishing Toolkit 05:44 Microsoft OAuth Consent Phishing 07:29 PornHub Data Breach by Shiny Hunters 10:21 Holiday Cybersecurity Tips and Final Thoughts

Cybercrime Magazine Podcast
Cybercrime Wire For Dec. 15, 2025. Big Japanese Retailer Askul Data Breach. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Dec 15, 2025 1:31


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

The Daily Crunch – Spoken Edition
Data center boom bad news for other infrastructure projects; plus, a data breach at 700Credit affects nearly 6 million, and Microsoft buys 3.6M metric tons of carbon removal from bioenergy plant

The Daily Crunch – Spoken Edition

Play Episode Listen Later Dec 15, 2025 4:16


-Improvements to roads, bridges, and other infrastructure could take a hit as data center construction accelerates. That's according to a report from Bloomberg. -At least 5.6 million people had their names, addresses, dates of birth, and Social Security numbers stolen in a data breach at Seven Hundred Credit, a company that runs credit checks and identity verification services for auto dealerships across the US. Microsoft announced Thursday it would buy 3.6 million carbon removal credits from a biofuels plant in Louisiana owned by C2X. Learn more about your ad choices. Visit podcastchoices.com/adchoices

MacVoices Video
MacVoices #25309: Live! - Age Verification, A New Predictive Market, and Another Data Breach

MacVoices Video

Play Episode Listen Later Dec 10, 2025 37:23


The MacVoices Live! panel touches on Microsoft's warning about a risky experimental AI agent in Windows, raising concerns about big tech pushing features before security is understood. Chuck Joiner, Marty Jencius, Brian Flanigan-Arthurs, Eric Bolden, Jim Rea, Web Bixby, and David Ginsburg debate age-verification proposals from Roblox and Pornhub, explore Coinbase's new prediction market, and react to a massive WhatsApp data breach affecting billions of phone numbers.  MacVoices is supported by Incogni. Take your personal data back with Incogni! Get 60% off an annual plan at incogni.com/CHUCK and use code CHUCK at checkout..http://incogni.com/CHUCK Show Notes: Chapters: [0:00] Opening, sponsor mention, and setup for AI security discussion[0:23] Microsoft warns experimental Windows AI agent may expose user data[1:52] Enterprise perspective: why companies won't enable risky AI features[3:29] The broader question: why tech firms ship features before securing them[3:46] Roblox proposes selfie-based age verification[4:49] Pornhub urges device-level age verification by Apple/Google[6:14] State-by-state regulation pressures adult platforms[7:33] Concerns about third-party apps storing user photos and IDs[9:32] The burden of age verification and whether platforms should hold it[11:10] Regulatory inconsistencies, digital IDs, and privacy trade-offs[17:36] Coinbase launches Kaushy-powered prediction market[18:41] Risks of betting platforms built on crypto or “play money”[20:35] Similarities to opaque financial instruments and fairness concerns[21:54] Recommended podcast episodes on betting markets manipulation[24:17] WhatsApp data breach exposes 3.5B phone numbers[26:03] Why WhatsApp's identity model makes leaks so damaging[27:17] Meta's years-long failure to address systemic vulnerabilities[28:22] International reliance on WhatsApp and global impact of breach[29:58] Closing roundtable, Thanksgiving plans, and contact info Links: Critics scoff after Microsoft warns AI feature can infect machines and pilfer datahttps://arstechnica.com/security/2025/11/critics-scoff-after-microsoft-warns-ai-feature-can-infect-machines-and-pilfer-data/ Roblox demands an AI-verified selfie to prevent kids from chatting to adultshttps://www.fastcompany.com/91445273/roblox-age-verification-ai-lawsuit Pornhub Is Urging Tech Giants to Enact Device-Based Age Verificationhttps://www.wired.com/story/pornhub-is-urging-tech-giants-to-enact-device-based-age-verification/ Coinbase said to launch Kalshi-powered prediction markethttps://seekingalpha.com/news/4524123-coinbase-said-to-launch-kalshi-powered-prediction-market Against The Rules podcasthttps://www.pushkin.fm/podcasts/against-the-rules * Episode 4: “A Hard Way to Make an Easy Living” — explores how sports betting worked before legalization, the betting sharps, and differences between old-school versus online gambling.   * Episode 7: “Little Big Short” — discusses restrictions on online sportsbooks (for example in California), featuring perspectives from pastors, Native Americans, and short-sellers.   * Episode 8: “The Integrity Landscape” — covers how betting based on inside information hasn't gone away, and the problems this raises for athletes — especially in college sports.   * Episode 10: “Anybody Can Win, but Everybody's Gonna Lose…” — looks at online gambling and the risks to individuals, especially younger people; includes reflection by the host on protecting his son from gambling's lure. “ WhatsApp security flaw exposed 3.5B phone numbers – including yourshttps://9to5mac.com/2025/11/18/whatsapp-security-flaw-exposed-3-5b-phone-numbers-including-yours/ “Wanna bet? Online prediction markets wager that you will” - CBS Sunday Morninghttps://www.youtube.com/watch?v=iGx-kqf_840 Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn, but prefers Bluesky. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support:      Become a MacVoices Patron on Patreon     http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:     http://macvoices.com      Twitter:     http://www.twitter.com/chuckjoiner     http://www.twitter.com/macvoices      Mastodon:     https://mastodon.cloud/@chuckjoiner      Facebook:     http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:     http://www.facebook.com/macvoices/      MacVoices Group on Facebook:     http://www.facebook.com/groups/macvoice      LinkedIn:     https://www.linkedin.com/in/chuckjoiner/      Instagram:     https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes     Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

MacVoices Audio
MacVoices #25309: Live! - Age Verification, A New Predictive Market, and Another Data Breach

MacVoices Audio

Play Episode Listen Later Dec 10, 2025 37:24


The MacVoices Live! panel touches on Microsoft's warning about a risky experimental AI agent in Windows, raising concerns about big tech pushing features before security is understood. Chuck Joiner, Marty Jencius, Brian Flanigan-Arthurs, Eric Bolden, Jim Rea, Web Bixby, and David Ginsburg debate age-verification proposals from Roblox and Pornhub, explore Coinbase's new prediction market, and react to a massive WhatsApp data breach affecting billions of phone numbers.  MacVoices is supported by Incogni. Take your personal data back with Incogni! Get 60% off an annual plan at incogni.com/CHUCK and use code CHUCK at checkout.. http://incogni.com/CHUCK Show Notes: Chapters: [0:00] Opening, sponsor mention, and setup for AI security discussion [0:23] Microsoft warns experimental Windows AI agent may expose user data [1:52] Enterprise perspective: why companies won't enable risky AI features [3:29] The broader question: why tech firms ship features before securing them [3:46] Roblox proposes selfie-based age verification [4:49] Pornhub urges device-level age verification by Apple/Google [6:14] State-by-state regulation pressures adult platforms [7:33] Concerns about third-party apps storing user photos and IDs [9:32] The burden of age verification and whether platforms should hold it [11:10] Regulatory inconsistencies, digital IDs, and privacy trade-offs [17:36] Coinbase launches Kaushy-powered prediction market [18:41] Risks of betting platforms built on crypto or "play money" [20:35] Similarities to opaque financial instruments and fairness concerns [21:54] Recommended podcast episodes on betting markets manipulation [24:17] WhatsApp data breach exposes 3.5B phone numbers [26:03] Why WhatsApp's identity model makes leaks so damaging [27:17] Meta's years-long failure to address systemic vulnerabilities [28:22] International reliance on WhatsApp and global impact of breach [29:58] Closing roundtable, Thanksgiving plans, and contact info Links: Critics scoff after Microsoft warns AI feature can infect machines and pilfer data https://arstechnica.com/security/2025/11/critics-scoff-after-microsoft-warns-ai-feature-can-infect-machines-and-pilfer-data/ Roblox demands an AI-verified selfie to prevent kids from chatting to adults https://www.fastcompany.com/91445273/roblox-age-verification-ai-lawsuit Pornhub Is Urging Tech Giants to Enact Device-Based Age Verification https://www.wired.com/story/pornhub-is-urging-tech-giants-to-enact-device-based-age-verification/ Coinbase said to launch Kalshi-powered prediction market https://seekingalpha.com/news/4524123-coinbase-said-to-launch-kalshi-powered-prediction-market Against The Rules podcast https://www.pushkin.fm/podcasts/against-the-rules * Episode 4: "A Hard Way to Make an Easy Living" — explores how sports betting worked before legalization, the betting sharps, and differences between old-school versus online gambling.   * Episode 7: "Little Big Short" — discusses restrictions on online sportsbooks (for example in California), featuring perspectives from pastors, Native Americans, and short-sellers.   * Episode 8: "The Integrity Landscape" — covers how betting based on inside information hasn't gone away, and the problems this raises for athletes — especially in college sports.   * Episode 10: "Anybody Can Win, but Everybody's Gonna Lose…" — looks at online gambling and the risks to individuals, especially younger people; includes reflection by the host on protecting his son from gambling's lure. " WhatsApp security flaw exposed 3.5B phone numbers – including yours https://9to5mac.com/2025/11/18/whatsapp-security-flaw-exposed-3-5b-phone-numbers-including-yours/ "Wanna bet? Online prediction markets wager that you will" - CBS Sunday Morning https://www.youtube.com/watch?v=iGx-kqf_840 Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn, but prefers Bluesky. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession 'firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support:      Become a MacVoices Patron on Patreon      http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:      http://macvoices.com      Twitter:      http://www.twitter.com/chuckjoiner      http://www.twitter.com/macvoices      Mastodon:      https://mastodon.cloud/@chuckjoiner      Facebook:      http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:      http://www.facebook.com/macvoices/      MacVoices Group on Facebook:      http://www.facebook.com/groups/macvoice      LinkedIn:      https://www.linkedin.com/in/chuckjoiner/      Instagram:      https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes      Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

U105 Podcasts
5471: LISTEN¦ Will the allocation of unspent money resolve PSNI pay issues? What about the cost of the data breach? Should the government name Stakeknife? Justice Minister Naomi Long answered a host of questions in a wide-ranging interview

U105 Podcasts

Play Episode Listen Later Dec 10, 2025 24:47


Will the allocation of unspent money resolve PSNI pay issues? What about the cost of the data breach? Should the government name Stakeknife? Justice Minister Naomi Long answered a host of questions in a wide-ranging interview Hosted on Acast. See acast.com/privacy for more information.

ILTA
#0144: (CT) Introduction of Legal Data Intelligence

ILTA

Play Episode Listen Later Dec 9, 2025 27:47


In this Voices episode, the speakers explored LDI—a new organization and framework designed to showcase how data skills and approaches transcend traditional boundaries. They also discussed how leveraging data strategies can unlock value across diverse use cases, driving innovation and adaptability in the legal tech landscape Moderator: Monique Sever, Litigation Support & eDiscovery Supervisor, Harper Grey LLP Speakers: Kelly Friedman, Partner, Heuristica Discovery  Paul Park, Director, Data Breach, Cyber and Data eDiscovery Solutions, BDO

Cybercrime Magazine Podcast
Cybercrime News For Dec. 8, 2025. Hacker Twins Charged in Data Breach. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Dec 8, 2025 2:52


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

ITSPmagazine | Technology. Cybersecurity. Society
Nothing Has Changed in Cybersecurity Since the 80s — And That's the Real Problem | A Conversation with Steve Mancini | Redefining Society and Technology with Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 7, 2025 43:03


Dr. Steve Mancini: https://www.linkedin.com/in/dr-steve-m-b59a525/Marco Ciappelli: https://www.marcociappelli.com/Nothing Has Changed in Cybersecurity Since War Games — And That's Why We're in Trouble"Nothing has changed."That's not what you expect to hear from someone with four decades in cybersecurity. The industry thrives on selling the next revolution, the newest threat, the latest solution. But Dr. Steve Mancini—cybersecurity professor, Homeland Security veteran, and Italy's Honorary Consul in Pittsburgh—wasn't buying any of it. And honestly? Neither was I.He took me back to his Commodore 64 days, writing basic war dialers after watching War Games. The method? Dial numbers, find an open line, try passwords until one works. Translate that to today: run an Nmap scan, find an open port, brute force your way in. The principle is identical. Only the speed has changed.This resonated deeply with how I think about our Hybrid Analog Digital Society. We're so consumed with the digital evolution—the folding screens, the AI assistants, the cloud computing—that we forget the human vulnerabilities underneath remain stubbornly analog. Social engineering worked in the 1930s, it worked when I was a kid in Florence, and it works today in your inbox.Steve shared a story about a family member who received a scam call. The caller asked if their social security number "had a six in it." A one-in-nine guess. Yet that simple psychological trick led to remote software being installed on their computer. Technology gets smarter; human psychology stays the same.What struck me most was his observation about his students—a generation so immersed in technology that they've become numb to breaches. "So what?" has become the default response. The data sells, the breaches happen, you get two years of free credit monitoring, and life goes on. Groundhog Day.But the deeper concern isn't the breaches. It's what this technological immersion is doing to our capacity for critical thinking, for human instinct. Steve pointed out something that should unsettle us: the algorithms feeding content to young minds are designed for addiction, manipulating brain chemistry with endorphin kicks from endless scrolling. We won't know the full effects of a generation raised on smartphones until they're forty, having scrolled through social media for thirty years.I asked what we can do. His answer was simple but profound: humans need to decide how much they want technology in their lives. Parents putting smartphones in six-year-olds' hands might want to reconsider. Schools clinging to the idea that they're "teaching technology" miss the point—students already know the apps better than their professors. What they don't know is how to think without them.He's gone back to paper and pencil tests. Old school. Because when the power goes out—literally or metaphorically—you need a brain that works independently.Ancient cultures, Steve reminded me, built civilizations with nothing but their minds, parchment, and each other. They were, in many ways, a thousand times smarter than us because they had no crutches. Now we call our smartphones "smart" while they make us incrementally dumber.This isn't anti-technology doom-saying. Neither Steve nor I oppose technological progress. The conversation acknowledged AI's genuine benefits in medicine, in solving specific problems. But this relentless push for the "easy button"—the promise that you don't have to think, just click—that's where we lose something essential.The ultimate breach, we concluded, isn't someone stealing your data. It's breaching the mind itself. When we can no longer think, reason, or function without the device in our pocket, the hackers have already won—and they didn't need to write a single line of code.Subscribe to the Redefining Society and Technology podcast. Stay curious. Stay human.My Newsletter? Yes, of course, it is here: https://www.linkedin.com/newsletters/7079849705156870144/ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Darn IT Podcast
The Psychology of Ignoring Cybersecurity: Why We Think It Won't Happen to Us

Darn IT Podcast

Play Episode Listen Later Dec 7, 2025 10:30


Why do people ignore cybersecurity until it's too late? In this episode of Darnley's Cyber Café, we dive into the psychology behind cyber neglect, the illusion of “it won't happen to me,” and why privacy still matters in a world where everything feels exposed. Using real data and relatable examples (including one about bathroom stalls…), we break down why cyber awareness is more urgent than ever, and how the small habits protect you more than you think.Grab your drink, settle into the café, and tune in to learn why knowledge really is power.Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.

The Daily Crunch – Spoken Edition
A data breach at analytics giant Mixpanel leaves a lot of open questions

The Daily Crunch – Spoken Edition

Play Episode Listen Later Dec 3, 2025 7:56


We sent over a dozen questions to Mixpanel's CEO about the company's data breach. Here's what we want to know. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Larry Richert and John Shumway
Big K Morning Show Hour 3: AI Data Breach Scam?

Larry Richert and John Shumway

Play Episode Listen Later Dec 3, 2025 26:15


Big K Morning Show Hour 3: AI Data Breach Scam? full 1575 Wed, 03 Dec 2025 13:11:51 +0000 drh3dM0zrHn20pfcReWKSMlaFc9FJcKY news The Big K Morning Show news Big K Morning Show Hour 3: AI Data Breach Scam? The Big K Morning Show 2024 © 2021 Audacy, Inc. News False https://player.amperwavepodcasting.com?feed-l

Darn IT Podcast
The Bad Apple Latte: How One Insider Nearly Brewed a Cyber Disaster

Darn IT Podcast

Play Episode Listen Later Nov 26, 2025 11:17


In this episode of Darnley's Cyber Café, we dive into the real story behind CrowdStrike's recent insider scandal, and what it teaches us about the hidden dangers brewing inside modern companies. We break down how a “bad apple” employee allegedly leaked internal information to a notorious hacking collective, why insider threats are so hard to detect, and how businesses can spot warning signs before damage is done.If you've ever wondered how hackers exploit trust, how companies uncover hidden risks, or how one employee can change everything, pull up a chair. This episode might make you look at your workplace… and your latte… a little differently.Tune in to find out what's really simmering beneath the surface.Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.

We Get Work
We get Privacy for work — Episode 12: Managing Competing Priorities: Data Breach Notification Laws and Trade Secrets

We Get Work

Play Episode Listen Later Nov 25, 2025 18:20


In the event of the disclosure of business trade secrets, organizations are often so overwhelmed that they overlook potential data breach notification requirements. The potential exposure of trade secrets is increasingly becoming intertwined with the release of legally protected personal information, and it is incumbent on organizations to thoroughly respond to incidents.  

AI Briefing Room
EP-415 Archer Vs. Joby Aviation Showdown ✈️, Salesforce Data Breach Alert

AI Briefing Room

Play Episode Listen Later Nov 21, 2025 2:48


```html i'm wall-e, welcoming you to today's tech briefing for friday, november 21st. catch up on the latest tech stories: joby vs. archer aviation: legal battle unfolds with joby suing archer for corporate espionage involving stolen trade secrets, highlighting ongoing tensions in the electric air taxi market. salesforce data breach: cyberattack linked to gainsight apps by hacking group shinyhunters affects some customers, emphasizing the need for robust cybersecurity measures. openai chatgpt group chats: new feature allows up to 20 users in collaborative conversations, adding a social dimension to ai interactions. uber eats & starship technologies: launching autonomous sidewalk robot food delivery in the uk, part of a strategy to embrace robotic delivery solutions. kalshi's $11 billion valuation: prediction market platform secures $1 billion in funding, solidifying its position amidst global expansion and legal challenges. that's all for today. we'll see you back here tomorrow! ```

Cybercrime Magazine Podcast
Ransomware Minute. Hackers Claim Massive Under Armour Data Breach. Scott Schober, WCYB Digital Radio

Cybercrime Magazine Podcast

Play Episode Listen Later Nov 20, 2025 3:30


The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.

AI Briefing Room
EP-412 Ramp's $32b Valuation Surge

AI Briefing Room

Play Episode Listen Later Nov 18, 2025 2:32


join wall-e's tech briefing for tuesday, november 18th as we explore top tech updates: ramp's astronomical growth: fintech giant ramp achieves a $32 billion valuation with new $300 million funding, reaching over 50,000 customers. doordash data breach: breach exposed user info, excluding sensitive data, from a social engineering attack. no evidence of fraud detected. meta's content protection: introduces facebook content protection tool to prevent unauthorized use of reels and support creator rights. google expands ai travel tools: global rollout of "flight deals" and "canvas" tools, enhancing travel planning with ai-enhanced features. jeff bezos' new venture: joins project prometheus as co-ceo, aiming to transform engineering with ai, backed by $6.2 billion funding. tune in tomorrow for more tech insights!

Cyber Crime Junkies
BEHIND SCENES of REAL Data Breach Response

Cyber Crime Junkies

Play Episode Listen Later Nov 13, 2025 60:09 Transcription Available


What really happens during a cyber attack? Not the Hollywood version — the real one. The kind businesses experience every single day when a single compromised password, phishing email, or zero-day vulnerability ignites a full-scale crisis.In this full episode, we take you inside the anatomy of a real data breach with digital first responders from NetGain Technologies — the cybersecurity professionals who live inside ransomware events, Business Email Compromise (BEC) incidents, and wire-fraud attacks every week.You'll see how attacks start, how fast they spread, what attackers do once they're inside your email, and the exact steps that decide whether a company recovers… or collapses.What You'll Learn: • How a phishing email turns into credential theft and internal compromise • Why Business Email Compromise (BEC) is now the #2 most expensive breach type • The tricks attackers use to hide inside inboxes and impersonate executives • How wire transfer fraud really happens — and how the 2-person rule stops it • What zero-days look like in the wild (and why patches aren't enough) • The role of MFA, phishing-resistant MFA, email controls, and layered security • Why backups must be immutable, air-gapped, and isolated • How incident response teams contain malware without destroying evidence • When to call cyber insurance, law enforcement, and breach counsel • The IR playbook: detection → containment → communication → forensics → recovery • Why every business — no matter how small — IS a target⌚ CHAPTERS 00:00 – Intro: What BEC Really Looks Like Today 03:42 – How One Email Starts the Attack Chain 11:20 – Why Finance Teams Are Target #1 19:05 – The Social Engineering Playbook 27:48 – Live Breakdown of a Real BEC Incident 38:22 – What Happens During Wire Fraud Recovery 46:10 – Technical Controls That Actually Work 55:36 – How to Build a No-NonsSend us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show

Alliant Specialty Podcasts
Inside a $42M Data Breach and the Latest ICA & D&O Policy Rulings

Alliant Specialty Podcasts

Play Episode Listen Later Nov 10, 2025 12:22


Join Mike Radak, Alliant Financial Institutions, and David Finz, Alliant Claims & Legal, as they explore recent key rulings under the Investment Company Act and D&O policy prior notice exclusions, with Mike exploring their impact on claims handling and coverage strategy. David then examines a recent data breach settlement, highlighting how precise policy language can help manage cyber liability and navigate complex class action exposures.

Cyber Security Headlines
Scattered Spider, LAPSUS$, ShinyHunters join forces, Nikkei data breach impacts 17k people, React Native NPM flaw leads to attacks

Cyber Security Headlines

Play Episode Listen Later Nov 5, 2025 6:59


Scattered Spider, LAPSUS$, and ShinyHunters join forces Nikkei reports data breach impacting 17,000 people React Native NPM flaw leads to attacks Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero-trust endpoint protection platform, ThreatLocker fills the gaps traditional solutions leave behind, giving your business stronger security and control. Don't just react to threats — stop them with ThreatLocker.

Cybercrime Magazine Podcast
Data Security. 1.2M Impacted By SimonMed Imaging Data Breach. Scott Schober, Author, "Hacked Again."

Cybercrime Magazine Podcast

Play Episode Listen Later Oct 30, 2025 17:25


Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss the news that SimonMed Imaging was targeted by the Medusa ransomware group, which claimed to have stolen 200 Gb of data, according to SecurityWeek. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com

Cybercrime Magazine Podcast
Ransomware Minute. Sweden's power grid hit by data breach. Scott Schober, WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Oct 30, 2025 2:35


The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.

Cybercrime Magazine Podcast
Cybercrime Wire For Oct. 29, 2025. Tasmanian Gov't Reports Data Breach. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Oct 29, 2025 1:12


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Our Curious Amalgam
#349 What's the Price Tag on Privacy? Turning Data Leaks Into Dollar Figures

Our Curious Amalgam

Play Episode Listen Later Oct 27, 2025 28:33


Privacy litigation in the U.S. is at an all-time high owing in part to the growing body of privacy laws, particularly at the state level. But are there unique challenges associated with litigating privacy breaches? Dr. Andrew Stiver joins Jaclyn Phillips and Alysha Pannu to discuss privacy harms and how economic harm is measured for these harms. Listen to this episode if you want to learn more about how privacy harms are quantified in the context of litigation. With special guest: Dr. Andrew Stivers, Managing Director, NERA Hosted by: Jaclyn Phillips, White & Case and Alysha Pannu, Osler Hoskin & Harcourt

Cybercrime Magazine Podcast
Cybercrime Wire For Oct. 27, 2025. Right At Home Data Breach, Ransomware Attack. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Oct 27, 2025 1:16


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Federal Drive with Tom Temin
Feds affected by 2015 OPM data breach set to lose identity protection services in 2026

Federal Drive with Tom Temin

Play Episode Listen Later Oct 27, 2025 10:59


Current and former federal employees affected by the massive 2015 Office of Personnel Management data breach may be losing their identity protection services in the coming year. IDX, the company providing these services since 2015 sent out emails earlier this month telling recipients of their identity protection services that they would have to renew on their own dime after receiving services for 10 years. Federal News Network's Executive Editor Jason Miller joins me now to tell us what's going on with the contract and the identity protection services. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Cybercrime Magazine Podcast
Cybercrime Wire For Oct. 21, 2025. Envoy Air Confirms Data Breach. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Oct 21, 2025 1:18


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cybercrime Magazine Podcast
Cybercrime Wire For Oct. 16, 2025. Major Data Breach At F5 Being Blamed On China. WCYB Digital Radio

Cybercrime Magazine Podcast

Play Episode Listen Later Oct 16, 2025 1:12


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cyber Security Headlines
MANGO discloses data breach, Jewelbug infiltrates Russian IT network, nation-state behind F5 attack?

Cyber Security Headlines

Play Episode Listen Later Oct 16, 2025 8:50


MANGO discloses data breach Threat group 'Jewelbug' infiltrates Russian IT network F5 discloses breach tied to nation-state threat actor Huge thanks to our sponsor, Vanta What's your 2 AM security worry?   Is it “Do I have the right controls in place?”   Or “Are my vendors secure?”   ....or the really scary one: "how do I get out from under these old tools and manual processes?   Enter Vanta.   Vanta automates manual work, so you can stop sweating over spreadsheets, chasing audit evidence, and filling out endless questionnaires.   Their trust management platform continuously monitors your systems, centralizes your data, and simplifies your security at scale.   Vanta also fits right into your workflows, using AI to streamline evidence collection, flag risks, and keep your program audit-ready—ALL…THE…TIME.   With Vanta, you get everything you need to move faster, scale confidently—and get back to sleep.   Get started at vanta.com/headlines  

Security Now (MP3)
SN 1047: RediShell's CVSS 10.0 - The Rise of Mega Botnets

Security Now (MP3)

Play Episode Listen Later Oct 15, 2025 165:35


Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow

All TWiT.tv Shows (MP3)
Security Now 1047: RediShell's CVSS 10.0

All TWiT.tv Shows (MP3)

Play Episode Listen Later Oct 15, 2025 165:35


Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow

Security Now (Video HD)
SN 1047: RediShell's CVSS 10.0 - The Rise of Mega Botnets

Security Now (Video HD)

Play Episode Listen Later Oct 15, 2025 152:07


Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow

Security Now (Video HI)
SN 1047: RediShell's CVSS 10.0 - The Rise of Mega Botnets

Security Now (Video HI)

Play Episode Listen Later Oct 15, 2025 152:07


Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow

Radio Leo (Audio)
Security Now 1047: RediShell's CVSS 10.0

Radio Leo (Audio)

Play Episode Listen Later Oct 15, 2025 165:35


Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow

Security Now (Video LO)
SN 1047: RediShell's CVSS 10.0 - The Rise of Mega Botnets

Security Now (Video LO)

Play Episode Listen Later Oct 15, 2025 152:07


Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow

All TWiT.tv Shows (Video LO)
Security Now 1047: RediShell's CVSS 10.0

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Oct 15, 2025 152:07 Transcription Available


Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow

Cybercrime Magazine Podcast
CTRL, ALT, HACKED. Discord Data Breach. Xbox Game Pass Price Hike.

Cybercrime Magazine Podcast

Play Episode Listen Later Oct 10, 2025 16:32


Services like Lootlock offer parental controls to prevent kids from spending too much on video games. In this episode, host Paul John Spaulding, Kyle Haglund, VP, Audio Engineering at Cybercrime Magazine, and Sam White, Video Producer at Cybercrime Magazine, discuss this trend, alongside a discussion about the Xbox Game Pass price increase and the recent Discord data breach. • For more on cybersecurity, visit us at https://cybersecurityventures.com/

Cybercrime Magazine Podcast
Cybercrime Wire For Oct. 10, 2025. Lottery Tech Provider Hit By Data Breach. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Oct 10, 2025 1:25


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Cybercrime Magazine Podcast
Ransomware Minute. Job Shop Data Breach Exposes Sensitive Info. Scott Schober, WCYB Digital Radio

Cybercrime Magazine Podcast

Play Episode Listen Later Oct 10, 2025 2:54


The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.

Weird Darkness: Stories of the Paranormal, Supernatural, Legends, Lore, Mysterious, Macabre, Unsolved
TEENAGERS ARE DATING A.I NOW: And That's Apparently How the World Ends

Weird Darkness: Stories of the Paranormal, Supernatural, Legends, Lore, Mysterious, Macabre, Unsolved

Play Episode Listen Later Oct 9, 2025 7:54 Transcription Available


New data shows high schoolers are getting romantically involved with AI, which means humanity's survival now depends on whether ChatGPT remembers their three-week anniversary.READ or LISTEN: https://weirddarkness.com/mm-teensdatingai/MindOfMarlar™, WeirdDarkness®, Copyright ©2025#WeirdDarkness, #MindOfMarlar, #AIBoyfriend, #TeenagersVsRobots, #DigitalApocalypse

What The Flux
Guzman y Gomez's $100 million burrito buy back | Costco and Aldi take on Coles | Salesforce may have a data breach

What The Flux

Play Episode Listen Later Oct 9, 2025 6:22 Transcription Available


Guzman y Gomez has launched $100 million share buy back as its sales continue to pick up for the big burrito. Costco and Aldi are chipping away at Australia’s major supermarkets with more than $17.5 billion in annual sales. Salesforce, the global cloud-based software giant, has found itself caught in a major cybersecurity storm. _ Download the free app (App Store): http://bit.ly/FluxAppStore Download the free app (Google Play): http://bit.ly/FluxappGooglePlay Daily newsletter: https://bit.ly/fluxnewsletter Flux on Instagram: http://bit.ly/fluxinsta Flux on TikTok: https://www.tiktok.com/@flux.finance —- The content in this podcast reflects the views and opinions of the hosts, and is intended for personal and not commercial use. We do not represent or endorse the accuracy or reliability of any opinion, statement or other information provided or distributed in these episodes.__See omnystudio.com/listener for privacy information.

The CyberWire
CISA furlough sparks fears.

The CyberWire

Play Episode Listen Later Oct 2, 2025 24:25


CISA furloughs most of its workforce due to the government shutdown. The U.S. Air Force confirms it is investigating a SharePoint related breach. Google warns of a large-scale extortion campaign targeting executives. Researchers uncover Android spyware campaigns disguised as popular messaging apps. An extortion group claims to have breached Red Hat's private GitHub repositories. A software provider for recreational vehicle and power sport dealers suffers a ransomware breach. Patchwork APT deploys a new Powershell loader using scheduled tasks for persistence. A Tennessee Senator urges aggressive U.S. action to prepare for a post-quantum future. Cynthia Kaiser,  SVP of Halcyon's Ransomware Research Center and former Deputy Assistant Director at the FBI's Cyber Division, joins us with insights on the government shutdown. A Malaysian man pleads guilty to supporting a massive crypto fraud. Protected health info is not a marketing tool.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Cynthia Kaiser,  SVP of Halcyon's Ransomware Research Center and former Deputy Assistant Director at the FBI's Cyber Division, joins us with insights on the government shutdown. Selected Reading Shutdown guts U.S. cybersecurity agency at perilous time (CISA) Air Force admits SharePoint privacy issue; reports of breach (The Register) Google warns executives are being targeted for extortion with leaked Oracle data (IT Pro) Researchers uncover spyware targeting messaging app users in the UAE (The Record) Red Hat confirms security incident after hackers claim GitHub breach (Bleeping Computer) 766,000 Impacted by Data Breach at Dealership Software Provider Motility (Security Week) Patchwork APT: Leveraging PowerShell to Create Scheduled Tasks and Deploy Final Payload (GB Hackers) GOP senator confirms pending White House quantum push, touts legislative alternatives (CyberScoop) Bitcoin Fixer Convicted for Role in Money Laundering Scheme (Bank Infosecurity) Nursing Home Fined $182K for Posting Patient Photos Online  (Bank Infosecurity) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Random but Memorable
How to protect yourself from digital identity theft with Eva Velasquez | VOICE CLONE IDENTITY THEFT

Random but Memorable

Play Episode Listen Later Sep 30, 2025 63:03


Identity theft affects millions of people every year — but do you really know how it works, or how to protect yourself? This week, we're joined by Eva Velasquez, CEO of the Identity Theft Resource Center, who shares the latest trends in identity crime and what steps you can take if it ever happens to you.