POPULARITY
Categories
Class action lawsuits in response to data breaches have skyrocketed as plaintiffs look to take advantage of courts' perceived leniency regarding standing.
EASY LISTENING DEP'T.: The New York Times did not think that the mayor, in the midst of his reelection campaign, having his people hand out cash bribes in public, was anything that its readership might need to know in a timely manner. They got scooped on the news simply because the bribery was so widespread and so blatant that another outlet, one that actually cares about reporting on the city, bumped into a bribe on its own. Please visit, read, and support INDIGNITY! https://www.indignity.net/
Data breaches in the health care sector can carry immense legal, financial, and reputational consequences. Jon Moore, Chief Risk Officer and Head of Consulting Services, Clearwater, speaks with Christine Moundas, Partner, Ropes & Gray LLP, about how health care organizations can mitigate risk through robust breach preparedness plans and ensure legally sound, compliant responses when incidents occur. They discuss how to operationalize breach readiness, key pitfalls to avoid during incident response, and the legal implications of internal decision-making. Sponsored by Clearwater.Watch this episode: https://www.youtube.com/watch?v=Lvo4EsiCK0YLearn more about Clearwater: https://clearwatersecurity.com/ Essential Legal Updates, Now in Audio AHLA's popular Health Law Daily email newsletter is now a daily podcast, exclusively for AHLA Premium members. Get all your health law news from the major media outlets on this podcast! To subscribe and add this private podcast feed to your podcast app, go to americanhealthlaw.org/dailypodcast. Stay At the Forefront of Health Legal Education Learn more about AHLA and the educational resources available to the health law community at https://www.americanhealthlaw.org/.
Strap in, folks—this episode charges into the wild frontier of cybersecurity, where Shadow AI runs loose like a toddler with admin access. Whether your security plan is airtight or held together by paperclips and prayers, this deep dive into the IBM Cost of a Data Breach 2025 report offers plenty to think about. From eye-popping breach costs to the cringe of unsecured AI, we're covering the good, the bad, and the downright reckless. Spoiler: "we don't use AI" might be the biggest myth since "the check's in the mail." More info at HelpMeWithHIPAA.com/523
Chicago 2nd Ward Alderman Brian Hopkins comments on the latest buzz in the City of Chicago, including the Air & Water show damage, the Bears stadium, minimum wage, and his potential mayoral run. McDonald Hopkins Partner Spencer Pollock discusses Kelley Drye's data breach cyberattack, resulting in a class action suit. Law Offices of Bruce Margolin Founding […]
This episode is a family-friendly extravaganza as we unpack the secrets to secure digital parenting. We're joined by Alanna Powers, a research specialist from the renowned Family Online Safety Institute (FOSI).
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Ukraine's president is expected to be pushed to swap land for peace and security during today's White House summit. Texas and California are moving forward with redrawing electoral maps in their respective states. Police are searching for multiple suspects after a deadly shooting at a crowded Brooklyn lounge. We'll tell you why the US is suspending visitor visas for people from Gaza. Plus, AT&T subscribers may be in for a small windfall. Learn more about your ad choices. Visit podcastchoices.com/adchoices
It all depends on what happened to your data and probably on how many people make claims. https://www.lehtoslaw.com
Recorded live from the New Orleans Tax Forum, Roger and Annie sit down with Maggie Romaniello from IRS Stakeholder Liaison to discuss this often overlooked but crucial IRS department. Maggie explains how Stakeholder Liaison serves as an advocate for tax professionals and their clients, handling everything from systemic issues like erroneous extension letters to data breach incidents and disaster response. The conversation reveals how practitioners can access this free resource directly through the IRS website and highlights the department's role in pushing for technological improvements like online accounts and streamlined processes.SponsorsPadgett - Contact Padgett or Email Jeff Phillips(00:00) - Introduction and Setting the Scene (01:02) - Overview of IRS Tax Forums (01:37) - Special Guest: Maggie Romaniello from Stakeholder Liaison (03:07) - History and Evolution of Stakeholder Liaison (04:57) - Current Challenges and Changes in Stakeholder Liaison (05:53) - Addressing Practitioner Issues and Communication (16:05) - How to Contact Stakeholder Liaison (19:55) - Introduction to Data Safetys (22:07) - Steps to Take After a Data Breach (24:00) - IRS Support and Resources (25:12) - State-Specific Requirements for Data Breaches (27:11) - The Importance of Online Accounts (28:45) - Setting Up and Using IRS Online Accounts (37:28) - Power of Attorney and Tax Pro Accounts (42:31) - Handling Disasters and IRS Outreach Get NASBA Approved CPE or IRS Approved CELaunch the course on EarmarkCPE to get free CPE/CE for listening to this episode.Connect with Maggie LinkedIn: https://www.linkedin.com/in/margaret-romaniello-5189758aConnect with the Hosts on LinkedInRoger HarrisAnnie SchwabReviewLeave a review on Apple Podcasts or PodchaserSubscribeSubscribe to the Federal Tax Updates podcast in your favorite podcast app!This podcast is a production of the Earmark MediaThe full transcript for this episode is available by clicking on the Transcript tab at the top of this pageAll content from this podcast by SmallBizPros, Inc. DBA PADGETT BUSINESS SERVICES is intended for informational purposes only.
At Black Hat USA 2025, Sean Martin, co-founder of ITSPmagazine, sat down with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, to discuss the findings from the company's latest ransomware report. Over the past five years, the research has tracked how attack patterns, targets, and business models have shifted—most notably from file encryption to data theft and extortion.Brett explains that many ransomware groups now find it more profitable—and less risky—to steal sensitive data and threaten to leak it unless paid, rather than encrypt files and disrupt operations. This change also allows attackers to stay out of the headlines and avoid immediate law enforcement pressure, while still extracting massive payouts. One case saw a Fortune 50 company pay $75 million to prevent the leak of 100 terabytes of sensitive medical data—without a single file being encrypted.The report highlights variation in attacker methods. Some groups focus on single large targets; others, like the group “LOP,” exploit vulnerabilities in widely used file transfer applications, making supply chain compromise a preferred tactic. Once inside, attackers validate their claims by providing file trees and sample data—proving the theft is real.Certain industries remain disproportionately affected. Healthcare, manufacturing, and technology are perennial top targets, with oil and gas seeing a sharp increase this year. Many victims operate with legacy systems, slow to adopt modern security measures, making them vulnerable. Geographically, the U.S. continues to be hit hardest, accounting for roughly half of all observed ransomware incidents.The conversation also addresses why organizations fail to detect such massive data theft—sometimes hundreds of gigabytes per day over weeks. Poor monitoring, limited security staffing, and alert fatigue all contribute. Brett emphasizes that reducing exposure starts with eliminating unnecessary internet-facing services and embracing zero trust architectures to prevent lateral movement.The ransomware report serves not just as a data source but as a practical guide. By mapping observed attacker behaviors to defensive strategies, organizations can better identify and close their most dangerous gaps—before becoming another statistic in next year's findings.Learn more about Zscaler: https://itspm.ag/zscaler-327152Note: This story contains promotional content. Learn more.Guest:Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, | On LinkedIn: https://www.linkedin.com/in/brett-stone-gross/ResourcesLearn more and catch more stories from Zscaler: https://www.itspmagazine.com/directory/zscalerLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-storyKeywords: sean martin, brett stone-gross, ransomware, data extortion, cyber attacks, zero trust security, threat intelligence, data breach, cyber defense, network security, file transfer vulnerability, data protection, black hat, black hat usa 2025, zscaler
The Data Protection Commission has launched an inquiry into Children's Health Ireland over the physical safety and security of children's personal health records at Tallaght University Hospital. Aengus Cox, Agriculture and Consumer Affairs correspondent, reports.
The panel discusses Apple's AI talent losses amid a rumored shift to third-party models, Meta's aggressive recruitment, and speculation on Apple's long-term AI strategy. Chuck Joiner, David Ginsburg, Marty Jencius, Brian Flanigan-Arthurs, Web Bixby, Guy Serle, Jim Rea, and Jeff Gamet cover Sonos appointing Tom Conrad as CEO, Google's new AI search experiment, a significant SharePoint security breach, and controversy over the women-only Tea app following a massive data exposure and class action lawsuit. http://traffic.libsyn.com/maclevelten/MV25213.mp3 Today's MacVoices is supported by CleanMyMac and the new Cloud Cleanup feature. Get Tidy Today! Try 7 days free and use the code MACVOICES20 for 20% off at clnmy.com/MACVOICES. Show Notes: Chapters: [0:00] Introduction and Apple AI researcher departure to Meta [2:28] Apple's AI strategy shift and market perception [5:08] Practical vs. flashy AI implementations at Apple [7:51] Perspectives on Meta's aggressive AI hiring [9:40] Interpreting Apple's AI direction and talent movement [12:15] Sonos appoints Tom Conrad as CEO [15:47] Google's new AI search product discussion [18:18] SharePoint hack impacts U.S. nuclear agency [19:23] The Tea app controversy and data exposure [27:50] Social shaming and safe spaces online [29:59] Closing remarks and support information Links: Apple just lost another AI researcher as it weighs shift to third-party models https://9to5mac.com/2025/07/29/apple-just-lost-another-ai-researcher-as-it-weighs-shift-to-third-party-models/ Sonos gets to keeps its CEO, as a treat https://www.engadget.com/big-tech/sonos-gets-to-keeps-its-ceo-as-a-treat-164559137.html Google Might Have Made an AI Search Product I Actually Like https://lifehacker.com/tech/google-ai-search-web-guide US nuclear weapons agency breached using Microsoft SharePoint hack https://www.engadget.com/cybersecurity/us-nuclear-weapons-agency-breached-using-microsoft-sharepoint-hack-120027770.html The Microsoft SharePoint breach was massive. The response has been minimal https://www.fastcompany.com/91373183/microsoft-sharepoint-breach-response-minimal Microsoft trials Copilot Mode in Edge https://www.engadget.com/ai/microsoft-trials-copilot-mode-in-edge-201851903.html The Viral 'Tea' App Just Had a Second Data Breach, and It's Even Worse https://lifehacker.com/tech/the-viral-tea-app-just-had-another-data-breach Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn, but prefers Bluesky. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Guy Serle, best known for being one of the co-hosts of the MyMac Podcast, sincerely apologizes for anything he has done or caused to have happened while in possession of dangerous podcasting equipment. He should know better but being a blonde from Florida means he's probably incapable of understanding the damage he has wrought. Guy is also the author of the novel, The Maltese Cube. You can follow his exploits on Twitter, catch him on Mac to the Future on Facebook, at @Macparrot@mastodon.social, and find everything at VertShark.com. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
In today's Cloud Wars Minute, I highlight how the rapid rise of AI — without the right security in place — could be the biggest unseen threat to your business.Highlights00:03 — IBM's new "Cost of a Data Breach" report has revealed that while AI adoption is on the rise, AI security and governance are lagging significantly. Suja Viswesan, Vice President, Security and Runtime Products at IBM, explains that the data shows a gap between AI adoption and oversight already exists, and threat actors are starting to exploit it.00:57 — 13% of organizations reported breaches involving AI models or applications, while 8% of organizations were unsure if they had been compromised in this way. Among those surveyed who experienced a breach, 97% indicated that they had no AI access controls in place. As a result, 60% of AI-related security incidents led to compromised data, and 31% resulted in operational disruptions.01:56 — In contrast, organizations that utilize AI and automation in their security operations save an average of $1.9 million in breach costs and reduce the breach life cycle by approximately 80 days. However, it's important to remember that 16% of breaches still involve AI tools, primarily in phishing or deepfake impersonation attacks. Visit Cloud Wars for more.
The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.
Send us a textOn this week of Serious Privacy, Paul Breitbarth, Ralph O'Brien of Reinbo Consulting, and Dr. K Royal talk about a slew of breaches and what to do if your data is breached. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
A new app was hacked and personal information – including driver's licenses – was leaked. We get the details - and tips on staying safe - from Alex Hamerstone, Director of advisory solutions for TrustedSec
Welcome to the Identity Theft Resource Center's (ITRC's) Weekly Breach Breakdown for August 8, 2025. I'm Alex Achten, Senior Director of Communications & Media Relations of the ITRC. Thanks to Sentilink for supporting the ITRC and this podcast. Each week, we look at the most recent events and trends related to data security and privacy. Today, we are going to look at how a weak password at a large corporation led to the exposure of millions of people's personal information, and explore good password practices. In the past on this podcast, we have joked about the password “123456”. It is a very weak password and, according to the 2025 Hive Systems Password Table, it would be cracked instantly by an identity criminal. This weak password provides no security, and while you'd think no one would use it today, it is still commonly used. In fact, NordPass reports that it is the most commonly used password worldwide, with a count of 3,018,050. Follow on LinkedIn: www.linkedin.com/company/idtheftcenter/ Follow on Twitter: twitter.com/IDTheftCenter
PBS confirms data breach after employee info leaked on Discord servers TSMC fires engineers over suspected semiconductor secrets theft Cloudflare on Perplexity web scraping techniques to avoid robot.txt and network blocks Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO.
Ethical hacker Rachel Tobac joins us to answer a juicy question: How would she hack someone reasonably security savvy like Matt?
PEBCAK Podcast: Information Security News by Some All Around Good People
Welcome to this week's episode of the PEBCAK Podcast! We've got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! Belgium warns seniors about online scams on bread bags https://grahamcluley.com/loaf-and-order-belgian-police-launch-bread-based-cybersecurity-campaign/ https://www.nieuwsblad.be/regio/vlaams-brabant/halle-vilvoorde/pajottegem/politie-waarschuwt-voor-internetcriminaliteit-via-broodzakken-niet-iedereen-is-actief-op-sociale-media/77720193.html Indiana mom busted on Snapchat trying to sell children https://nypost.com/2025/07/19/us-news/indiana-mom-busted-after-trying-to-sell-baby-daughter-for-sex/ Dating safety app Tea suffers multiple data breaches https://techcrunch.com/2025/07/26/dating-safety-app-tea-breached-exposing-72000-user-images/ https://x.com/denzell75399403/status/1949073773639942310?s=46 https://x.com/belowtearline/status/1948891743333585112?s=46 https://www.404media.co/women-dating-safety-app-tea-breached-users-ids-posted-to-4chan/ https://www.bleepingcomputer.com/news/security/tea-app-leak-worsens-with-second-database-exposing-user-chats/ Dad Joke of the Week (DJOW) Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Matt - https://www.linkedin.com/in/disher/ Ben - https://www.linkedin.com/in/benjamincorll/
The Tea app is a place for women to share red or green flags about men, but it recently suffered a major data breach. Plus, why some members of Congress are protesting a deal with China to allow Nvidia to sell its H20 chips to the country. And YouTube is rolling out new age estimation technology to protect younger users. Marketplace's Meghan McCarty Carino is joined by Maria Curi, tech policy reporter at Axios, to discuss all this.
The Tea app is a place for women to share red or green flags about men, but it recently suffered a major data breach. Plus, why some members of Congress are protesting a deal with China to allow Nvidia to sell its H20 chips to the country. And YouTube is rolling out new age estimation technology to protect younger users. Marketplace's Meghan McCarty Carino is joined by Maria Curi, tech policy reporter at Axios, to discuss all this.
In this episode, the host Jim Love discusses the increasing sophistication of supply chain attacks, starting with an account of a blockchain developer who lost $500,000 due to a malicious extension in a popular AI-powered coding tool. The episode also covers a significant cyber emergency in St. Paul, Minnesota, which required National Guard support, and the City's struggle to comprehend the full scope of the hack. Additionally, the US Cybersecurity and Infrastructure Security Agency (CISA) has released a new eviction strategies tool to help cybersecurity teams remove persistent threats. The episode concludes with an update on the Ingram Micro breach, where the Safe Pay ransomware gang has threatened to leak 35 terabytes of stolen data. Listeners are encouraged to focus on preventative measures even when ransomware attacks do not involve encryption. 00:00 Introduction and Headlines 00:25 The $500,000 Crypto Heist 01:26 Supply Chain Attack on Open VSX 04:50 Lessons from the Attack 06:16 Oyster Backdoor Threat 07:54 Cyber Attack on St. Paul 09:09 CISA's New Eviction Strategies Tool 10:43 Ingram Micro Data Breach Update 12:18 Conclusion and Contact Information
Send us a textThis episode covers a week in privacy which feels light and refreshing. Listen to co-hosts Paul Breitbarth, Ralph O'Brien, and Dr. K Royal. Topics include an emergency ban in Italy about publishing images about an autopsy, Germany's actions involving Meta, Poland's enforcement on a McDonald's data breach, UK's collaboration with OpenAI, UK's enforcement against spam/spoof scam calls, age-verification in MS, and more! If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to reflect on a 2006 data breach which served as a cybersecurity wake up call for the Department of Veterans Affairs and the rest of the federal government. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
Oh No! Lenovo You sunk my battleship! Or did you? Russians unable to get a taste of their own medicine Huge thanks to our sponsor, Dropzone AI Security teams everywhere are drowning in alerts. That's why companies like Zapier and CBTS turned to Dropzone AI—the leader in autonomous alert investigation. Their AI investigates everything, giving your analysts time back for real security work. No more 40-minute rabbit holes. If you're at BlackHat, find them in Startup City. Otherwise, check out their self-guided demo at dropzone.ai. This is how modern SOCs are scaling without burning out. Find the stories behind the headlines at CISOseries.com.
Owen Poole runs through the tech news of the day, including OpenAI's new "Study Mode" for ChatGPT, a popular dating safety app that got hacked, and Domino's debut of a pizza delivery robot that can protect your pizza from seagulls on Tech Today.
Please consider buying us a coffee or subscribing to a membership to help keep Centennial World's weekly podcasts going! Every single dollar goes back into this business
Owen Poole runs through the tech news of the day, including OpenAI's new "Study Mode" for ChatGPT, a popular dating safety app that got hacked, and Domino's debut of a pizza delivery robot that can protect your pizza from seagulls on Tech Today.
An app called Tea had a data breach over the weekend that exposed tens of thousands of photos. BJ is over the moon excited about our new BJ and Jamie grocery tote bags. Deion Sanders is going to give a press conference today with his medical team to let us know what has been going on with his health.
An app called Tea had a data breach over the weekend that exposed tens of thousands of photos.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
The Tea app, which allows anonymous women to stalk men, had a massive data breach and now there's a class action lawsuit brewing. For the WOMEN... not the men. However, even CNN admits that Tea might've opened itself up to defamation cases. Here we go... Watch this podcast episode on YouTube and all major podcast hosts including Spotify. CLOWNFISH TV is an independent, opinionated news and commentary podcast that covers Entertainment and Tech from a consumer's point of view. We talk about Gaming, Comics, Anime, TV, Movies, Animation and more. Hosted by Kneon and Geeky Sparkles. D/REZZED News covers Pixels, Pop Culture, and the Paranormal! We're an independent, opinionated entertainment news blog covering Video Games, Tech, Comics, Movies, Anime, High Strangeness, and more. As part of Clownfish TV, we strive to be balanced, based, and apolitical. Get more news, views and reviews on Clownfish TV News - https://news.clownfishtv.com/ On YouTube - https://www.youtube.com/c/ClownfishTV On Spotify - https://open.spotify.com/show/4Tu83D1NcCmh7K1zHIedvg On Apple Podcasts - https://podcasts.apple.com/us/podcast/clownfish-tv-audio-edition/id1726838629
The Tea app, which allows anonymous women to stalk men, had a massive data breach and now there's a class action lawsuit brewing. For the WOMEN... not the men. However, even CNN admits that Tea might've opened itself up to defamation cases. Here we go...Watch this podcast episode on YouTube and all major podcast hosts including Spotify.CLOWNFISH TV is an independent, opinionated news and commentary podcast that covers Entertainment and Tech from a consumer's point of view. We talk about Gaming, Comics, Anime, TV, Movies, Animation and more. Hosted by Kneon and Geeky Sparkles.D/REZZED News covers Pixels, Pop Culture, and the Paranormal! We're an independent, opinionated entertainment news blog covering Video Games, Tech, Comics, Movies, Anime, High Strangeness, and more. As part of Clownfish TV, we strive to be balanced, based, and apolitical. Get more news, views and reviews on Clownfish TV News - https://news.clownfishtv.com/On YouTube - https://www.youtube.com/c/ClownfishTVOn Spotify - https://open.spotify.com/show/4Tu83D1NcCmh7K1zHIedvgOn Apple Podcasts - https://podcasts.apple.com/us/podcast/clownfish-tv-audio-edition/id1726838629
Afternoon Headlines: US Beef imports ban lifted, Former PM Scott Morrison addresses US Congress, and Brian Kohberger sentenced for Idaho University student murders. Deep Dive: Genea IVF is the latest company to reveal the enormity of a major data breach that has compromised the private medical information of thousands of its patients. In this episode of The Briefing, Natarsha Belling is joined by one of the victims of the data breach who reveals exactly what confidential details the hackers were able to steal and then publish on the dark web. Anna says patients should have confidence that their private details will be kept safe and has an important warning for others. You can read Genea's statement on the incident in full here. Follow The Briefing: TikTok: @thebriefingpodInstagram: @thebriefingpodcast YouTube: @LiSTNRnewsroom Facebook: @LiSTNR NewsroomSee omnystudio.com/listener for privacy information.
Send us a textWith Dr. K Royal off to Vegas, this week it's Paul Breitbarth and Ralph O'Brien of Reinbo Consulting catching up for the Serious Privacy podcast on all of the news. Two big topics this week: the hidden-until-now data breach of the UK ministry of Defence in Afghanistan and the mess that was the WeTransfer terms update (official blog post, Paul's Linkedin post). The guys also talk about this piece in the New York Times Wirecutter on disappearing from the internet. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
Get the Gear: https://brushbeater.store/ Guerrilla's Guide to the Baofeng Radio: https://www.amazon.com/Guerrillas-Guide-Baofeng-Radio/dp/B0BNV21F4P/ref=zg_bs_g_13818_d_sccl_4/135-1141614-7547609?psc=1
We're back with a brand-new season of Random but Memorable! ✨
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
The UK sanctions Russian military intelligence officers tied to GRU cyber units. An AI-powered malware called LameHug targets Windows systems. Google files a lawsuit against the operators of the Badbox 2.0 botnet. A pair of healthcare data breaches impact over 3 million individuals. Researchers report a phishing attack that bypasses FIDO authentication by exploiting QR codes. A critical flaw in Nvidia's Container Toolkit threatens managed AI cloud services. A secure messaging app is found exposing sensitive data due to outdated configurations. Meta investors settle their $8 billion lawsuit. Our guest is Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst, with a data-driven look at how AI is affecting jobs. Belgian police provide timely cyber tips, baked right in. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we have Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst, discussing how AI is affecting jobs. Got cybersecurity, IT, or project management certification goals? For the past 25 years, N2K's practice tests have helped more than half a million professionals reach certification success. Grow your career and reach your goals faster with N2K's full exam prep of practice tests, labs, and training courses for Microsoft, CompTIA, PMI, Amazon, and more at n2k.com/certify. Selected Reading Breaking: UK sanctions Russian cyber spies accused of facilitating murders (The Record) Russia Linked to New Malware Targeting Email Accounts for Espionage (Infosecurity Magazine) New “LameHug” Malware Deploys AI-Generated Commands (Infosecurity Magazine) Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet (SecurityWeek) 1.4 Million Affected by Data Breach at Virginia Radiology Practice (SecurityWeek) Anne Arundel Dermatology Data Breach Impacts 1.9 Million People (SecurityWeek) Phishing attack abuses QR codes to bypass FIDO keys (SC Media) Critical Nvidia Toolkit Flaw Exposes AI Cloud Services to Hacking (SecurityWeek) New TeleMessage SGNL Flaw Is Actively Being Exploited by Attackers (Hackread) Meta investors, Zuckerberg settle $8 billion privacy lawsuit tied to Cambridge Analytica scandal (The Record) Loaf and order: Belgian police launch bread-based cybersecurity campaign (Graham Cluley) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this edition of The World This Week: Is Donald Trump's 50-day deadline to Vladimir Putin "Much ado about nothing?", the Afghan leak and the UK superinjunction, plus why did Israel bomb Damascus?
The personal details of British spies and special forces soldiers were included in one of the worst security leaks in modern UK history. Also: Rosebud - the wooden sled from Citizen Kane - sells for millions at auction.
In this episode of GRC Chat, we tackle the pressing topic of "AI vs Human: The Future of Fraud Prevention" with Iremar Brayner, a seasoned fraud prevention and risk management professional with over 17 years of experience. Currently leading fraud prevention at G2A, the world's largest digital entertainment platform with over 35 million users, Iremar shares invaluable insights into the evolving landscape of fraud mitigation across industries. We discussed real-world examples such as first-party fraud, social engineering scams, and the challenges posed by fraudsters leveraging AI to scale their attacks. Iremar explains how industries, particularly digital entertainment, face unique hurdles due to low average order values and the fast-paced customer demands for real-time responses. He also emphasizes the importance of combining human expertise with AI technology to create efficient and emotionally informed fraud prevention strategies. If you want to be our guest or suggest one, send your email to info@globalriskconsult.com with the subject line “Guest Proposal.”
UK government apologises to thousands of Afghans potentially at risk from Taliban after personal details leaked. Also: Trump says Ukraine shouldn't target Moscow, and 114-year-old marathon runner dies after car accident.
Today, Keir Starmer told the House of Commons the previous government had ‘serious questions' to answer about a major data breach from the Ministry of Defence.On Tuesday, a major data breach which led to thousands of Afghans being secretly relocated to the UK became public knowledge for the first time. Chris joins Adam to discuss the former government's account of events, as well as what could happen next. And, Adam speaks to Larisa Brown, Defence Editor at The Times, about how she broke the story. Meanwhile in the US, Donald Trump is being pushed by fellow Republicans to follow through on promises he made during the election to release records relating to sex offender Jeffrey Epstein. Caitriona Perry calls in from Washington to explain why Trump is facing a growing backlash from MAGA supporters, and examines how the president's rhetoric has changed. Tickets for Newscast at the Edinburgh Fringe are available here: https://www.edfringe.com/tickets/whats-on/bbc-newscast-podcastYou can now listen to Newscast on a smart speaker. If you want to listen, just say "Ask BBC Sounds to play Newscast”. It works on most smart speakers. You can join our Newscast online community here: https://tinyurl.com/newscastcommunityhereGet in touch with Newscast by emailing newscast@bbc.co.uk or send us a whatsapp on +44 0330 123 9480.New episodes released every day. If you're in the UK, for more News and Current Affairs podcasts from the BBC, listen on BBC Sounds: https://bit.ly/3ENLcS1 Newscast brings you daily analysis of the latest political news stories from the BBC. It was presented by Adam Fleming. It was made by Miranda Slade with Shiler Mahmoudi and Anna Harris. The social producer was Jada Meosa John. The technical producer was Mike Regaard. The assistant editor is Chris Gray. The senior news editor is Sam Bonham.
The High Court has lifted a super injunction revealing that the last government set up a secret relocation scheme for Afghans at risk of retribution by the Taliban after their personal data was leaked by the Ministry of Defence. John Torode has been sacked as a presenter of MasterChef, after an allegation that he used "an extremely offensive racist term" was upheld.The two men who felled the Sycamore Gap tree in Northumberland have each been jailed for four years and three months.
Tax professional data breaches have exploded in 2025, with 327 reported incidents affecting over 342,000 taxpayers in just half a year. Glenn Gizzy, a 36-year IRS veteran now specializing in data breach prevention, reveals the sophisticated tactics criminals use to infiltrate tax practices. From phishing emails disguised as client referrals, to hackers who wait until returns are filed before changing bank account information. This conversation covers essential protection measures including Written Information Security Plans (WISP), IP PINs, proper cyber insurance coverage, and the critical steps to take immediately after discovering a breach.SponsorsPadgett - Contact Padgett or Email Jeff Phillips(00:00) - Introduction and Greetings (02:21) - Today's Guest and Topic: Scams and Data Breaches (02:56) - IRS Statistics on Data Breaches (05:33) - Common Scams and How They Work (09:48) - Phishing Emails and Ransomware (14:51) - Fake Charities and Donation Scams (17:30) - Refund Thefts and Data Breaches (21:28) - IRS Communication and Taxpayer Awareness (30:10) - Signs of a Data Breach for Practitioners (32:42) - Immediate Steps After a Data Breach (34:32) - Multi-Step Process and Insurance Involvement (37:42) - Filing Returns After a Breach (40:54) - Identity Protection PIN (IP PIN) (48:10) - Written Information Security Plan (WISP) (53:06) - Protecting EFIN, PTIN, and CAF Numbers (55:25) - Final Thoughts and Conclusion Connect with Glennhttps://www.linkedin.com/in/glenn-gizzi-4b6ab5205Get NASBA Approved CPE or IRS Approved CELaunch the course on EarmarkCPE to get free CPE/CE for listening to this episode.Connect with the Roger and Annie on LinkedInhttps://www.linkedin.com/in/rogerharrispbs/https://www.linkedin.com/in/annie-schwab-852418261/ReviewLeave a review on Apple Podcasts or PodchaserSubscribeSubscribe to the Federal Tax Updates podcast in your favorite podcast app!This podcast is a production of the Earmark Media
WarRoom Battleground EP 794: Future Shock: Massive Data Breach, OpenAI Surveillance, and the Quantum Apocalypse