POPULARITY
AI applications are evolving beyond chatbots into more complex and transformative solutions, according to Marco Palladino, CTO and co-founder of Kong. In a recent episode of The New Stack Makers, he discussed the rise of AI agents, which act as "virtual employees" to enhance organizational efficiency. For instance, AI can now function as a product manager for APIs—analyzing documentation, detecting inaccuracies, and making corrections.However, reliance on AI agents brings security risks, such as data leakage and governance challenges. Organizations need observability and safeguards, but developers often resist implementing these requirements manually. As GenAI adoption matures, teams seek ways to accelerate development without rebuilding security measures repeatedly.To address these challenges, Kong introduced AI Gateway, an open-source plugin for its API Gateway. AI Gateway supports multiple AI models across providers like AWS, Microsoft, and Google, offering developers a universal API to integrate AI securely and efficiently. It also features automated retrieval-augmented generation (RAG) pipelines to minimize hallucinations.Palladino emphasized the need for consistent security in AI infrastructure, ensuring developers can focus on innovation while leveraging built-in protections.Learn more from The New Stack about Kong's AI GatewayKong: New ‘AI-Infused' Features for API Management, Dev ToolsFrom Zero to a Terraform Provider for Kong in 120 HoursJoin our community of newsletter subscribers to stay on top of the news and at the top of your game.
A former developer at Eaton Corp, Davis Lu, is convicted of deploying a kill switch script that disrupted thousands of users worldwide—he's now facing up to 10 years in prison. A major AI image generator, GenNomis, accidentally exposed 95,000 image prompts online, raising serious privacy and security concerns. And finally, researchers discover debug commands in the popular ESP32 Bluetooth chip, sparking worries about potential exploitation. Note: We mention and explain this in the last episode, but we're in the process of pumping the brakes on the ads and keeping our reads faster. Things got overstuffed—that's on us. Thanks for the honest feedback. Got a strange tale of technology, security, or hacking? Share it at HotlineHacked.com. Hacked is brought to you by Push Security. Check them out at PushSecurity.com Learn more about your ad choices. Visit podcastchoices.com/adchoices
Send us a textTrump Rumors & Federal Cannabis Legalization Update | Cannabis Legalization News - March 9, 2025Join Tom & Miggie in this episode of Cannabis Legalization News as they discuss this week's latest stories, including rumors about Donald Trump's stance on cannabis legalization, updates on federal and state cannabis news, and zoning plans for their dispensary. They dive into federal legalization efforts, the hemp industry, regulatory challenges, and the impact on the cannabis market. Get insights into legislative reform and the practicalities of opening a dispensary in a regulated industry. Don't forget to subscribe, leave your comments, and support the push for responsible cannabis use and regulations.
Stav, Abby & Matt Catch Up - hit105 Brisbane - Stav Davidson, Abby Coleman & Matty Acton
Subscribe on LiSTNR: https://play.listnr.com/podcast/stav-abby-and-mattSee omnystudio.com/listener for privacy information.
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Stav, Abby & Matt Catch Up - hit105 Brisbane - Stav Davidson, Abby Coleman & Matty Acton
Subscribe on LiSTNR: https://play.listnr.com/podcast/stav-abby-and-mattSee omnystudio.com/listener for privacy information.
In this episode of the Other Side of the Firewall podcast, the hosts discuss the latest cybersecurity news, focusing on the recent breach of the DeepSeek AI database. They explore the implications of this breach for the AI industry, the challenges faced by startups in maintaining security, and the broader impact on market dynamics and privacy regulations. The conversation emphasizes the need for robust security measures in the rapidly evolving tech landscape. Article: DeepSeek AI Database Exposed: Over 1 Million Log Lines, Secret Keys Leaked https://thehackernews.com/2025/01/deepseek-ai-database-exposed-over-1.html?m=1&fbclid=IwZXh0bgNhZW0CMTAAAR3wwq78tAR4BpHrSlFgNfqB_0B1IKuGHn_fV-CZEX3XF84r47p4JQ_Vu2Q_aem_9h6h9QtJ_QWYRMV6PiiQ0w Please LISTEN
New York Blood Center suffers ransomware attack DeepSeek's exposed database leaks sensitive data CISA's future unclear under new administration Huge thanks to our sponsor, Conveyor Let me guess, another security questionnaire just landed in your inbox. Which means all the follow up tasks you don't have time for are close behind. What are you going to do? Here's a better question: what would Sue do? Sue is Conveyor's new AI Agent for Customer Trust. She handles the entire security review process like answering every customer request from sales, completing every questionnaire or executing every communications and coordination task in-between. No more manual work. Just a quick review when she's done. Ready to let Sue take the reins? Learn more at www.conveyor.com. Find the stories behind the headlines at CISOseries.com.
Why is everyone suddenly talking about DeepSeek?
Navigating AI's impact on work, the rise of transnational threats, a grim new reality in air travel, and how to harness the chaos of 2025 for personal and professional growth. Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at:https://danielmiessler.com/upgrade Follow on X:https://twitter.com/danielmiessler Follow on LinkedIn:https://www.linkedin.com/in/danielmiessler See you in the next one!Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.
Happy snow day!* Did you know our license plate readers are leaking data? And what's up with the transit referendum lawsuit? Host Marie Cecile Anderson, new producer Daniel Sumstine, and executive producer Whitney Pastorek run it all down on today's Friday News Roundup. Plus, the Bonnaroo lineup is out! Are we getting a Sphere?? *if it is not snowing when you hear this, we jinxed it by recording the show yesterday. Send angry letters to @NashSevereWx. Want some more City Cast Nashville news? Then make sure to sign up for our Hey Nashville newsletter. Follow us @citycastnashville You can also text us or leave a voicemail at: 615-200-6392 Interested in advertising with City Cast? Find more info HERE.
This week on The Lockdown, The Practical Privacy & Security Podcast, we're kicking off the new year with reflections, updates, and a deep dive into key privacy issues that are shaping 2025. From privacy settings on iOS and GrapheneOS, to AI assistants and their potential privacy pitfalls, this episode covers practical advice, insights, and solutions for everyday users. Additionally, I explore new state-level privacy laws across the U.S. and what they mean for both businesses and individuals.In this week's episode:Reflecting on personal privacy practices and professional projects.A look at U.S. state privacy regulations taking effect in 2025.Privacy and security implications of voice assistants like Siri, Alexa, and Google Assistant.Detailed privacy settings for iOS and why GrapheneOS is the better alternative.AI assistants like ChatGPT and Claude, and their risks.Privacy concerns with vehicles, focusing on data leaks and constant surveillance.The intersection of cybersecurity and OSINT in modern attacks.Show Links:Apple offers $95 million in Siri privacy violation settlementAmazon to pay $31 million in privacy violation penalties for Alexa voice assistant and Ring cameraNulide / FindMyDevice · GitLabBritish journalist could face years in prison for refusing to hand over his passwords to the police - Il Fatto QuotidianoVolkswagen EV data leak exposes personal information of 3.3 million peopleTesla data helped police after Las Vegas truck explosion, but experts have wider privacy concernsSupport this show: https://www.patreon.com/c/TheLockdownOfficial website: https://psysecure.com/podcast/"If you want to keep a secret, you must also hide it from yourself."-George OrwellPodcast music: The R3cluse
U.S. soldier arrested for alleged leak of Trump and Harris call logs Iranian and Russian entities sanctioned for election interference Rhode Island's health benefits data leaked Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a proactive, default-deny approach to cybersecurity and provides a full audit of every action, allowed or blocked, for risk management and compliance. Onboarding and operation are fully supported by their US-based support team. To learn more about how ThreatLocker can help keep your organization running efficiently and protected from ransomware, visit ThreatLocker.com. For the story behind the headlines, go to CISOSeries.com
Cisco confirms data leak Microsoft announces urgent .NET domain transition Stories of the year from Cyber Security Headlines reporters Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a proactive, default-deny approach to cybersecurity and provides a full audit of every action, allowed or blocked, for risk management and compliance. Onboarding and operation are fully supported by their US-based support team. To learn more about how ThreatLocker can help keep your organization running efficiently and protected from ransomware, visit ThreatLocker.com. For the story behind the headlines, go to CISOSeries.com
The city has been ramping up its attempt to relocate people staying in tents in Humboldt Park. Block Club's Manny Ramos tells host Jacoby Cochran how removals have unfolded at Chicago's largest encampment of unhoused people. Chalkbeat's Samantha Smylie is also here with an update on all the education news in Chicago (Spoiler: It's a lot). Plus, a Morgan Park housing development, a new state head of early education, and some weekend holiday plans. Good News: Christmas Tree Shopping, One-of-a-Kind-Show, Western Ave. Holiday Road Want some more City Cast Chicago news? Then make sure to sign up for our Hey Chicago newsletter. Follow us @citycastchicago You can also text us or leave a voicemail at: 773 780-0246 Learn more about the sponsors of this Dec. 6 episode: The Second City Paramount Theatre – CityCast for $5 off of up to 4 tickets! BetterHelp – Get 10% off at betterhelp.com/CITYCAST Become a member of City Cast Chicago. Interested in advertising with City Cast? Find more info HERE
國防部 guófángbù - Ministry of National Defense 重大 zhòngdà - major, significant 洩密事件 xièmì shìjiàn - leak incident 涉及 shèjí - involve, relate to 部長 bùzhǎng - minister 參謀總長 cānmóu zǒngzhǎng - chief of general staff 被流出 bèi liúchū - be leaked 官員 guānyuán - official 據知情人士指出 jù zhīqíng rénshì zhǐchū - according to informed sources 政風室 zhèngfēngshì - ethics office 進行 jìnxíng - carry out 財產申報 cáichǎn shēnbào - asset declaration 逐步 zhúbù - gradually 承辦人員 chéngbàn rényuán - handling personnel 包含 bāohán - include 名冊 míngcè - roster, name list 附件 fùjiàn - attachment 申報人 shēnbào rén - declarant 各個軍種 gè ge jūnzhǒng - each military branch 誇張 kuāzhāng - ridiculous 羅列 luóliè - list 軍情局 jūnqíngjú - Military Intelligence Bureau 機密情報員 jīmì qíngbàoyuán - confidential intelligence personnel 人身危害 rénshēn wéihài - personal harm 服務機關 fúwù jīguān - service agency 職稱 zhíchēng - job title 風險管控 fēngxiǎn guǎnkòng - risk control 措施 cuòshī - measure 檢討 jiǎntǎo - review, reflect 強化 qiánghuà - strengthen 公文作業 gōngwén zuòyè - official document processing 管制 guǎnzhì - control 流程 liúchéng - process 防止 fángzhǐ - prevent 健保署 jiànbǎo shǔ - National Health Insurance Bureau 政府單位 zhèngfǔ dānwèi - government unit 駭客 hàikè - hacker 駭入 hàirù - hack into 擷取 jiéqǔ - extract 詐騙集團 zhàpiàn jítuán - scam syndicate 身分證字號 shēnfènzhèng zìhào - ID number 假扮 jiǎbàn - impersonate 檢察官 jiǎncháguān - prosecutor If your Chinese is already quite good, but you want to discuss more complex topics like news, economics, politics, or the environment with your Taiwanese friends, and you sometimes feel unsure how to join those conversations, Let me help you. In our one-on-one lessons, we'll look at the challenges you're facing, set your learning goals, and work together to boost your Chinese skills quickly! Book a one-on-one trial lesson with me !
Khu is back! The biggest pokemon leak in years! What a world! BECOME A MEMBER: https://www.youtube.com/channel/UCC1dr278XrRkoZReO4QoBiA/join SUPPORT US BY BUYING MERCH: https://bellhopproductions-shop.fourthwall.com/ JOIN OUR DISCORD: https://discord.gg/yBaGQKafeY Please leave 5 stars and a review on Apple Podcasts and follow us on Spotify! https://rss.com/podcasts/bnwpod/ Subscribe to Bellhop Productions on YouTube: https://www.youtube.com/channel/UCC1dr278XrRkoZReO4QoBiA @BellhopProductions on IG and TikTok (Our old merch: https://my-store-7405526.creator-spring.com/listing/bellsnwhistles) Love you!
Drex covers the latest on 23andMe's leadership shakeup and breach settlement, Craigslist founder Craig Newmark's $100M donation to strengthen U.S. cybersecurity, and the devastating aftermath of Synovus's breach in the UK, impacting nearly 1 million NHS patients.Remember, Stay a little paranoid.Subscribe: https://www.thisweekhealth.com/subscribe/Linkedin: https://www.linkedin.com/company/ThisWeekHealthTwitter: https://twitter.com/thisweekhealthDonate: Alex's Lemonade Stand: Foundation for Childhood Cancer - https://www.alexslemonade.org/mypage/3173454
In this episode I cover announcements from the recent IGEL Disrupt event, an update on Apple iPhone 16 preorders, a worrying story about ServiceNow Customer KB data leaking online and an interesting tale about HDD Backup flaws from the world of entertainment plus much more! Reference Links: https://www.rorymon.com/blog/servicenow-customer-kb-data-leaks-igel-disrupt-announcements-changes-to-windows-enrollment/
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Disney's financials just got leaked from that big data leak a few months ago, and it's pretty eye-opening. Among the information gathered? Genie Plus is BIG business for Disney... almost three-quarters of a BILLION in Disney Parks Guest upcharges since its debut! Also, there's some interesting news about Hulu and its value to the company... ➡️ Tip Jar and Fan Support: http://ClownfishSupport.com ➡️ Official Merch Store: http://ShopClownfish.com ➡️ Official Website: http://ClownfishTV.com ➡️ Audio Edition: https://open.spotify.com/show/6qJc5C6OkQkaZnGCeuVOD1 About Us: Clownfish TV is an independent, opinionated news and commentary channel that covers Entertainment and Tech from a consumer's point of view. We talk about Gaming, Comics, Anime, TV, Movies, Animation and more. Hosted by Kneon and Geeky Sparkles. Disclaimer: This series is produced by Clownfish Studios and WebReef Media, and is part of ClownfishTV.com. Opinions expressed by our contributors do not necessarily reflect the views of our guests, affiliates, sponsors, or advertisers. ClownfishTV.com is an unofficial news source and has no connection to any company that we may cover. This channel and website and the content made available through this site are for educational, entertainment and informational purposes only. These so-called “fair uses” are permitted even if the use of the work would otherwise be infringing. #Disney #Streaming #Hulu #News #Commentary #Reaction #Podcast #Comedy #Entertainment #Hollywood #PopCulture #Tech
NBC's Erin Real on North Korea infiltrating I.T.
Democratic delegates at the national convention talk about their enthusiasm over the Harris Walz presidential ticket and what they need to do to win in November.Then, we speak with the State Epidemiologist about the viral illnesses concerning the nation and Mississippi.Plus, a company that collects your information was hacked. Now what? We have some tips on protecting your privacy and credit. Hosted on Acast. See acast.com/privacy for more information.
In today's episode, we explore the critical challenges to AI adoption revealed by CISOs, including data privacy concerns, insufficient staff skills, and misaligned organizational priorities, as highlighted in a new survey by Tines. We also discuss how security leaders can address these blockers by leveraging automation, strategic alignment, and continuous training. Additionally, we delve into the rise of malware such as FakeBat, recent data breaches affecting FlightAware and National Public Data, and necessary steps for individuals to secure their personal information. Video Episode: https://youtu.be/HQt1nCHKgxI 00:00 - Intro 01:14 - NPD Hack Exposes Billions of User's Data 04:01 - FlightAware Configuration Error Exposed User Data 07:35 - FakeBat Malware Targets Brave, Zoom, Notion Users 09:45 - Top AI Adoption Challenges and CISO Solutions Articles referenced: https://www.cybersecuritydive.com/spons/the-biggest-blockers-to-ai-adoption-according-to-cisos-and-how-to-remove/723672/ https://thehackernews.com/2024/08/cybercriminals-exploit-popular-software.html https://www.bleepingcomputer.com/news/security/flightaware-configuration-error-leaked-user-data-for-years/ https://www.cbsnews.com/news/social-security-number-leak-npd-breach-what-to-know/ Sign up for digestible cyber news delivered to your inbox: https://news.thedailydecrypt.com Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/ Logo Design by https://www.zackgraber.com/ Tags: Tines, Generative AI, Security, CISOs, FakeBat, malvertising, MSIX, Mandiant, FlightAware, Configuration, Cybersecurity, Data Leak, Data breach, Cybercriminals, Social Security, National Public Data Search Phrases: What are today's top cybersecurity news stories?, Tines generative AI security risks, FakeBat malware protection, FlightAware data breach user impact, Cybersecurity measures for CISOs, Understanding malvertising threats, How to safeguard against data leaks, Mandiant findings on malware, Protecting personal information from breaches, Addressing skill shortages in cybersecurity -- Transcript: Aug20 You probably heard about the data breach that alleged the compromised, the personal information of nearly every American citizen exposing social security numbers addresses. And so much more to the dark web cybercriminals. And so today we're going to talk about how this happened, what data was impacted and what you can do to make sure you stay safe. With your social security number on the dark web. Thousands of flight aware, users are now urged to reset their passwords after a configuration error, exposed, sensitive, personal data. For over three years. How did this FlightAware configuration error managed to leak user data for such an extended period of time. Cyber criminals are exploiting popular software searches to spread the fake bat malware using malvertising campaigns and Trojan ISED M S I. X installers to infect unsuspecting users. And finally a recent survey by tines shows that 98% of large tech executives have halted their generative AI projects due to security risks. What strategic measures are CSOs employing to overcome the biggest blockers to AI implementation in their organization. You're listening to the daily decrypt.. Hackers have allegedly infiltrated, a company known as national public data or NPD to steal un-encrypted personal information of billions of people, including social security numbers addresses. And family member names. This breach attributed to the hacker group, U S D O D in April of 2024, puts almost everyone at risk of identity theft. If your data was a part of this breach, which it likely is. People can access it or bid on it on the dark web. So if they could open new financial accounts or take out loans in your name. Luckily, this type of fraud is very preventable. All you have to do is contact the three major credit bureaus and place freezes on your accounts. And even before this breach, this is something that I would recommend to everybody. Unless they're in the process of buying a new home. Or opening up a new credit card. You don't need your credit accounts to be unfrozen. And this is something that I actually didn't do until about a year ago during the, at T and T breach. Where my social security number was also linked to the dark web. And I was very shocked to see how quickly it could be done. They all have web based interfaces where you can go sign up for an account. And click a button to place a freeze on your credit. It's also important to know that once your information is out there, it's out there forever. There's no company that can go and scrub your data from the dark web. If any company is selling you that service? It's not a real service. It's a scam. Or if you purchase the services of a specific company, Uh, under the impression that they can do that. Maybe they're not actually selling that, but maybe that's what you're thinking they're going to do. They're not going to be able to do that. What they are going to be able to do is coach you through the process of placing these credit freezes and help inform you about what that will actually prevent. Alternatively, you can listen to this episode of the daily decrypt and continue to for these tips for free. But placing these freezes on your credit. Essentially just prevents people or entities from running soft or hard credit checks. Against your credit. Which is the barrier for most lines of credit, like new credit cards or home loans. And so by proxy, it prevents new home loans and new credit cards from being opened in your name, which is one of the biggest risks for having your social security number out there. Now if an attacker is really motivated to get you personally, they can use that information to do all kinds of damage, primarily in information gathering about you. To craft more effective phishing campaigns against you. Which is the secondary risk of this type of data breach. So besides placing these credit checks, just be extra vigilant when you're looking at and clicking links through texts or emails. Knowing that this information can help craft more effective phishing emails. Look at everything skeptically. And you should be good to go. Very similarly to that last story. There's an app called FlightAware, which is the world's largest flight tracking platform. That has just revealed a major security data incident. FlightAware discovered a configuration error dating back to January of 2021, which exposed user data for over three years. This data that it exposed can include your user ID, password, email address. And possibly even more sensitive information like your full name, billing and shipping address, social media accounts, phone number, and even social security number. The error was fixed by flight aware on July 25th, 2024. So just a few weeks ago. But the breaches duration leaves significant room for potential misuse of your data. As we talked about in that last story. So if you have a FlightAware account, you'll need to reset your password immediately. If you log into the platform, it will prompt you to do so on your next login. But what they're not going to tell you is that you also need to change. The password to every account that uses the password to your FlightAware account. And that's because the username and combo that was leaked in the FlightAware data breach. We'll now be entered into every one of your accounts automatically. It's not a personal target. They're just going to. Try their luck and see if you may be reuse that username, Cabo password, if that's ringing any bells for you. PEI go change your password. To all of those accounts, and if it sounds too daunting to do that task manually. Or you're not even sure what accounts share passwords. It's time to start using a password manager. I personally use one password as do all of my friends. And I have almost a thousand accounts in there just for myself alone. Managing that amount of passwords is impossible, especially trying to maintain unique passwords. Across all of them. Nobody's memory can handle that. It will also create secure random passwords for you. So you don't have to use your creativity to come up with them or just changing the. The characters that follow the password. Which, by the way, if you use a password, even similar to the one. That was leaked in your FlightAware bridge. That too is considered compromised because attackers will do manipulations common manipulations to all passwords and just use those to try to log into your accounts as well. It's all automated. So, yeah, if you want more information about a password manager, Check out one password. There's also a blog on our website@thedailydecrypt.com that will outline. A simple three-step process to converting over to a password manager. It doesn't have to be as daunting as it may sound. FlightAware is also offering a free 24 month identity protection package through Equifax. So given these two stories back to back. Whoever is listening is likely impacted. Go take advantage of that. That will actually. Monitor for any credit inquiries to Equifax. In addition to you placing those freezes. Like I highly don't. I highly recommend against. Simply monitoring because by the time you get that alert, it's a little too late, right. Place the freeze, and then sign up for that free monitoring. And if you can't tell. Passwords are getting breached every day. I don't like talking about data breaches on this platform. I don't like hearing about them because they happen so frequently. I don't consider it cybersecurity news. The only reason this one made the cut is because they were so long standing. This one has been going on for three years. But if you're hearing this and you still don't use a password manager and you don't change your passwords, the implications are pretty bad. Go do that. Reach out to us on Instagram or YouTube, if you want any help or guidance along that process. It really is a lot simpler of a workflow as well. Like it's a quality of life improvement and a security improvement. I promise you it's worth it. Cyber criminals are using popular Google searches. To help them craft more effective info stealing campaigns. So, what does this mean? They're letting Google tell them what people are searching for specifically around business-related softwares. So for example, if you're going to Google and you're looking for a software that will help you manage personnel. Or manage your tasks or store your documents, et cetera. You're going to go to Google and you say, what are the best softwares? For this type of business task. Well, Google will happily give you the information. If you look for it about what is the most common things to search for around this space, right? So hackers are taking that information. And they're creating fake websites that will offer you services. Inline with what you're searching for. These websites might be carbon copies of actual services. That you could find on the web that would satisfy your search. Or they could be new services. After they've created these imitation websites, they purchase Google ads to get those websites at the top of the search results specifically. For what you're searching for. Then within those websites. You're going to click a link. That's going to download a malware called fake bat. This malware will live in the installer for the software. You're trying to find and download such as brave, like the browser. Key pass, which I'm assuming is a password manager notion, which is like a confluence style thing. Steam for games and zoom for business meetings online. It's important to know that even if you know the software you're searching for like, ah, I'm looking for notion, someone recommended it, you Google the words, notion. That first link. If it's an ad, can still be malicious. So not everyone is searching for what's a business software I can use to hold all my documents. Some of them are just searching for, Hey, where do I go to download notion? That download link. You click from Google. If it's a paid advertisement, could be malicious. And we always say it on this podcast. Just don't click ads. If you don't have to. That's one of the best ways you can avoid this type of thing. And finally 98% of large tech executives have paused AI initiatives due to security risks. This was discovered by an automation from tines during a recent survey and reveals the top barriers to AI adoption. 66% of CSOs, worry about losing control over this sensitive information. This can be anything from customer data, employee data. All the way down to proprietary code, you're feeding into AI to have it help you fix. 60% of the CSOs report lacking AI expertise. 51% find friction between departments from cross-functional teams to align on AI priorities and risks. 49% face issues without dated systems. So choose AI tools to integrate seamlessly with your existing tech stacks. This survey by times can be very valuable, especially if you're someone who's trying to get your CSO to allow you to use AI. AI. Has a lot of potential for automating a lot of work. And freeing up capacity for more impactful work. But. If you have a good CSO. They're going to try to push back on the security risks. Check out the article linked in the show notes below for more information on how and what statistics you can use to help combat your CSOs fears. And start using AI in your workplace. This has been the Daily Decrypt. If you found your key to unlocking the digital domain, show your support with a rating on Spotify or Apple Podcasts. It truly helps us stand at the frontier of cyber news. Don't forget to connect on Instagram or catch our episodes on YouTube. Until next time, keep your data safe and your curiosity alive.
It’s National Radio Day! Steve King and Johnnie Putman are back again with a whole bunch of fun and not so fun things to talk about! Axios reporter Monica Eng walks over from the DNC kickoff party and airs some grievances with the paths and walkways allowing us to cross Lake Shore Drive safely. Naturally, […]
Priest sues gay hookup app Grindr over data leakCatholic News Agency, By Daniel Payne, on Jul 26, 2024https://www.catholicnewsagency.com/news/258413/priest-sues-gay-hookup-app-grindr-over-data-leak In this segment, the discussion centers around Monsignor Jeffrey Burr, a Catholic priest who faced public scrutiny and resigned from his position after being accused of using the social app Grinder for casual encounters, which conflicted with his public persona and the Church's stance on celibacy. Burr subsequently sued Grinder for allegedly mishandling his private data, claiming the app's privacy practices were fraudulent and dishonest. This case highlights broader issues of privacy and personal integrity within religious institutions, especially concerning LGBTQ+ identities and the challenges individuals face in reconciling personal and public lives. The conversation delves into the repercussions for Monsignor Burr, noting the significant impact on his career and personal life. His outing as a result of these revelations, against his will, underscores the lack of agency individuals often have in controlling their narrative, especially within conservative religious contexts that stigmatize non-heteronormative identities. The panelists express sympathy for Burr's plight, emphasizing the ethical implications of public exposure and its effects on personal well-being and professional reputation. Criticism is directed towards the Catholic Church's historical stance on LGBTQ+ issues, highlighting systemic oppression and the challenges faced by queer individuals within religious settings. The discussion questions whether religious institutions like the Catholic Church should reassess their policies on celibacy and sexuality, advocating for greater acceptance and support for LGBTQ+ clergy members to live authentically without fear of reprisal or condemnation. The lawsuit against Grinder raises broader concerns about data privacy and corporate responsibility. Panelists argue for stricter regulations to protect user data from unauthorized access and exploitation by third parties, advocating for legislative measures akin to those seen in the European Union. This case underscores the need for transparency and ethical standards in how tech companies handle sensitive user information, challenging current practices that prioritize profit over privacy rights. Overall, the segment highlights the complex interplay between personal identity, institutional norms, and legal rights, urging a reevaluation of societal attitudes towards privacy and sexuality in both religious and secular contexts.The Non-Prophets, Episode 23.33.1 featuring Scott Dickie, Aaron Jensen, Jimmy Jr. and "Eli" (Eli Slack)Become a supporter of this podcast: https://www.spreaker.com/podcast/the-non-prophets--3254964/support.
- Up to 2.9 Billion Records Stolen in a Hack of US Background Check Company https://www.nobsbitcoin.com/up-to-2-9-billion-records-stolen-in-a-hack-of-a-us-background-check-company/ - UN Cybercrime Draft Convention Approved Unanimously Despite Widespread Opposition https://www.nobsbitcoin.com/un-cybercrime-draft-convention-approved-unanimously-despite-widespread-opposition/ - Russia, Venezuela Block Signal Messenger https://www.nobsbitcoin.com/russia-venezuela-block-signal-messenger/ - SimpleX Raises $1.3M from Jack Dorsey & Asymmetric VC, Releases Chat v6.0 https://www.nobsbitcoin.com/simplex-chat-v6-0/ - Nigerian Bitcoiner Sues Government for the Right to Own, Acquire, and Trade Bitcoin https://www.nobsbitcoin.com/nigerian-bitcoiner-sues-government-for-the-right-to-own-acquire-and-trade-bitcoin/ - OpenSats Announces New Round of Grants Focused on Bitcoin Core https://www.nobsbitcoin.com/opensats-announces-new-round-of-grants-focused-on-bitcoin-core/ - Human Rights Foundation Story of the Week Venezuela | Restricts Access to Binance and Blocks X Amid Post-Election Upheaval Venezuelans are now struggling to access Binance, the world's largest cryptocurrency exchange. “Like several company websites in different segments in Venezuela, including social media, Binance's pages have been facing access restrictions,” Binance announced. Binance is a peer-to-peer exchange popular with Venezuelans in search of US dollars, stablecoins, and Bitcoin to escape the regime's ongoing devaluation of the bolívar. With Binance now inaccessible, many find themselves financially trapped and increasingly vulnerable in a country where 82% live in poverty and 53% live in extreme poverty. Alongside censoring Binance, Maduro has blocked access to social media platform X for 10 days, revoked passports arbitrarily, and detained over 2,000 activists, lawyers, opposition figures, and civilians protesting the fraudulent election results. FinancialFreedomReport.org - Validating Lightning Signer v0.12: 'Benevolent Basilisk' https://www.nobsbitcoin.com/validating-lightning-signer-v0-12/ - Bankify: Turn Cashu Mints into Lightning Wallets with NWC https://www.nobsbitcoin.com/introducing-bankify/ - El Salvador Attracts $1.6 Billion for Port Infrastructure Development Near Bitcoin City https://www.nobsbitcoin.com/el-salvador-attracts-1-6-billion-for-port-infrastructure-development-near-bitcoin-city/ 2:52 - How the turntables 6:54 - Dashboard 9:27 - Bitcoin policy 19:23 - Big leak 25:18 - Stak 26:36 - UN cybercrime 37:43 - Russia & Venezuela block Signal 39:53 - SimpleX raise 48:27 - Nigerian bitcoiner sues gov 53:31 - OpenSats grants 58:51 - HRF Story of the Week 1:04:25 - Boosts 1:09:45 - Software updates 1:15:41 - El Salvador infrastructure investment Shoutout to our sponsors: Unchained Capital https://unchained.com/concierge/ Coinkite https://coinkite.com/ TFTC Merch is Available: Shop Now https://merch.tftc.io/ Join the TFTC Movement: Main YT Channel https://www.youtube.com/c/TFTC21/videos Clips YT Channel https://www.youtube.com/channel/UCUQcW3jxfQfEUS8kqR5pJtQ Website https://tftc.io/ Twitter https://twitter.com/tftc21 Instagram https://www.instagram.com/tftc.io/ Follow Marty Bent: Twitter https://twitter.com/martybent Newsletter https://tftc.io/martys-bent/ Podcast https://tftc.io/podcasts/ Follow Odell: Twitter https://twitter.com/ODELL Newsletter https://tftc.io/the-sat-standard/ Podcast https://citadeldispatch.com/
WE GOT ANOTHER DATA LEAK, MY BRAIN.
A massive data leak affects virtually everyone in the USA and Canada. What do you need to do? Apple will soon be allowing third party apps to make NFC transactions. We think that's pretty cool, and we'll tell you why. It's a new week, which means there's another variant of stealer malware. And we've got a big reason to avoid browser extensions: they may contain malware. Show Notes: Developers can soon offer in‑app NFC transactions using the Secure Element Apple's requirements are about to hit creators and fans on Patreon Travel Tripod by Peak Design Daring Fireball: Apple's Profits From Services Are on the Cusp of Surpassing Its Profits From Device Sales How Apple is changing from a hardware company to a services and media company Apple results: Quarterly record, all-time high in Services Invisible laser beam detects what a MacBook user is typing A critical security issue in 1Password for Mac left credentials vulnerable to attack ';--have i been pwned? Massive data leak: 2.7 billion records of U.S., Canada, UK residents, including Social Security numbers What to do after a data breach—and how to avoid getting hacked—in 9 easy steps Chrome and Edge users infected with malicious browser extensions that steal personal data Chrome extensions are a security nightmare; here's why you should avoid them Intego Mac Premium Bundle X9 is the ultimate protection and utility suite for your Mac. Download a free trial now at intego.com, and use this link for a special discount when you're ready to buy.
It is Monday, August 12th, and Stuff has Happened.A near record-breaking data breach happened. San Francisco has a continuing X-odus. The Beast from within is emerging. Disney announced a sequel or two.Today's newsletter: https://skh.news/2-9-billion-stolen-socialsDiscover Proscenium, my brand new tabletop role-playing game project! https://proscenium.game
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
July 10, 2024: John Kirkman, VP of Government, Healthcare, and Education at Island joins Drex for the news. They discuss the recent AT&T data leak affecting 110 million customers, highlighting the persistent challenges in data security. How can companies prevent such breaches, and what are the implications for customer trust? They also explore the tension between user experience and robust security measures, particularly the resistance to multi-factor authentication. Is it possible to streamline security without disrupting workflows? Additionally, the conversation touches on the legacy tech debt in healthcare and the importance of modernizing systems. What innovative solutions can be implemented to balance security with efficiency? The episode wraps up with a look at the future of enterprise browsers and their role in enhancing business processes. How can rethinking user interfaces drive productivity and security?Key Points:00:52 John Kirkman from Island01:23 AT&T Data Leak Discussion02:46 MFA and Legacy Systems10:06 Enterprise Browsers and Future TechNews articles:Massive Snowflake-linked attack exposes data on nearly 110M AT&T customersInternet Browsers Are Getting a Makeover for the WorkplaceThis Week Health SubscribeThis Week Health TwitterThis Week Health LinkedinAlex's Lemonade Stand: Foundation for Childhood Cancer Donate
Priest Sues Grindr for Data Leak
Unpacking the Google Data Leak: Fact or Fiction?Interested in exploring the Google Data Leak without doing all the research? We do the research for you and give you the highlights. Let's dive into the buzz surrounding the alleged Google data leak that has sent shockwaves through the SEO community together. And get to the bottom of is the leak authentic, and what does it reveal about Google's ranking signals? Join us as we do the research, and find out what it says, separating fact from fiction and what we know is true from data sets in the field we can replicate. We will also discuss actionable steps to safeguard and strengthen your SEO and Content strategies to stay ahead of the competition.—Guest's Contact Informationhttps://www.linkedin.com/in/mattbertramlive/Other Resources Discussed:https://cloud.google.com/document-warehouse/docs/overviewhttps://sparktoro.com/blog/an-anonymous-source-shared-thousands-of-leaked-google-search-api-documents-with-me-everyone-in-seo-should-see-them/https://www.blindfiveyearold.com/is-click-through-rate-a-ranking-signalhttps://www.searchenginejournal.com/google-data-leak-clarification/517711/https://www.amazon.com/stores/Matt-Bertram/author/B07FCQXDC7Please like, review and comment if you got value!https://g.page/r/CccGEk37CLosEB0/reviewFree SEO Consultationhttps://www.ewrdigital.com/discovery-call—The Unknown Secrets of Internet Marketing podcast is a podcast hosted by Internet marketing expert Matthew Bertram. The show provides insights and advice on digital marketing, SEO, and online business. Topics covered include keyword research, content optimization, link building, local SEO, and more. The show also features interviews with industry leaders and experts who share their experiences and tips. Additionally, Matt shares his own experiences and strategies, as well as his own successes and failures, to help listeners learn from his experiences and apply the same principles to their businesses. The show is designed to help entrepreneurs and business owners become successful online and get the most out of their digital marketing efforts.Find more great episodes here: bestseopodcast.com/https://seo-podcast-the-unknown-secrets-of-internet-marketing.buzzsprout.comSupport the Show.
News and Updates: CDK Global ransomware attack cripples car dealerships then pays ransom Entire AT&T Customer Base phone and text data released. White hat hacker deletes the data Apple will not upgrade Siri with new AI until Spring 2025 Google Maps gets upgrades on Car Play Google Advanced Account Protection is easier to use Google will monitor Dark Web for you for free
The LowdownApple caught scraping YouTube to train AIAppStore Monopoly case to be heard by juryApple back on top with 3.62 Trillion valuationStealing software from Apple Stores2nd StringVirtually all of AT&T's consumer data leakedFor The CultureThe Voice of The Blacks… Amber Rose?!The HookupDon't sleep on Siri RemoteYou CAN subscribe to Amazon Prime Video onlyPlease visit website for show links
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
On today's episode of Equity, we're taking a look at news you might've missed over the holiday weekend here in the U.S., starting with the recent OpenAI security breach. While it doesn't seem that people have to be too worried about what the hackers actually accessed, the fact that it happened is worth paying attention to. TechCrunch's Devin Coldeway argues that AI companies are treasure troves of data and will likely become more of a target for hackers. Companies that work with the large AI companies should pay attention. We also had an update on Fisker's slide into bankruptcy. The EV startup, that you've already heard about on Equity, had a new update this week. The company asked its bankruptcy judge for permission to sell its remaining inventory for $14,000 a vehicle, a noticeable drop from the $70,000 Fisker was initially asking for. This has some fearing that this chapter 11 bankruptcy could turn into a chapter 7. To close out, we looked at a new trend of venture funds helping seed investors exercise their pro rata rights and avoid their equity stake being diluted. This is interesting because while it could be good for smaller funds to have a way to maintain their equity stakes, pro rata rights discussions can get contentious and bringing more capital to the table won't necessarily help that. Equity will be back on Wednesday with an interesting conversation between Mary Ann and angel investor and Floodgate Co-Founder, Mike Maples Jr, so we'll talk to you then!Equity is TechCrunch's flagship podcast, produced by Theresa Loconsolo, and posts every Wednesday and Friday. Subscribe to us on Apple Podcasts, Overcast, Spotify and all the casts.You also can follow Equity on X and Threads, at @EquityPod. For the full episode transcript, for those who prefer reading over listening, check out our full archive of episodes over at Simplecast. Credits: Equity is produced by Theresa Loconsolo with editing by Kell. Bryce Durbin is our Illustrator. We'd also like to thank the audience development team and Henry Pickavet, who manages TechCrunch audio products.
Voices of Search // A Search Engine Optimization (SEO) & Content Marketing Podcast
SEO at Previsible, Jordan Koene, shares his perspectives on the Google search data leak. In this episode, Jordan shares some details on the leaked 2,500 documents that allegedly contain Google search data strategies and shares insights into how this defines SEO practices going forward.Connect With: Jordan Koene: Website // LinkedInThe Voices of Search Podcast: Email // LinkedIn // TwitterBenjamin Shapiro: Website // LinkedIn // TwitterSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
This was one heck of a week with Google's search ranking data features being leaked...
Have you ever bought a concert ticket? Over 500 million people could be impacted by a suspected Ticketmaster data leak! Smallzy has the deets...See omnystudio.com/listener for privacy information.
Big show today, folks! Buckle up! Check the time stamps but we got a bunch: Stellar Blade petition is pretty dumb (but I sorta get it), PSN Data Leak just dropped (a NEW ONE!) and we dive deep to see what it means! Some Marvel Rivals news along with Manor Lords, Makami explaining why he left Tango Gameworks, Media Molecule's new IP, No Rest For The Wicked Chat, and SO MUCH MORE! Let's talk games, ya basterdz!!! :) JAFFE!
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
The company belatedly conceded both that it had paid the cybercriminals extorting it and that patient data nonetheless ended up on the dark web. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoices
Episode 324 features discussions on a significant AT&T data breach affecting 73 million customers and a sophisticated thread jacking attack targeting a journalist. Co-host Scott Wright joins the discussion, highlighting how millions of AT&T customer account passcodes, along with personal information, were compromised due to a leak discovered by a security researcher and reported by […] The post Massive AT&T Data Leak, The Danger of Thread Hijacking appeared first on Shared Security Podcast.
Listen to a recap of the top stories of the day from 9to5Mac. 9to5Mac Daily is available on iTunes and Apple's Podcasts app, Stitcher, TuneIn, Google Play, or through our dedicated RSS feed for Overcast and other podcast players. Sponsored by Capital One Shopping: Capital One Shopping users saved over $800 million in the past year. Get automatic free coupons at over 100+ stores. New episodes of 9to5Mac Daily are recorded every weekday. Subscribe to our podcast in Apple Podcast or your favorite podcast player to guarantee new episodes are delivered as soon as they're available. Stories discussed in this episode: iPhone 16 Pro may have polished titanium instead of brushed AT&T resetting account passcodes after data leak impacting 73M current and former users What's next for the iPad mini? Here's what the rumors say Listen & Subscribe: Apple Podcasts Overcast RSS Spotify TuneIn Google Podcasts Subscribe to support Chance directly with 9to5Mac Daily Plus and unlock: Ad-free versions of every episode Monthly bonus episodes Catch up on 9to5Mac Daily episodes! Don't miss out on our other daily podcasts: Quick Charge 9to5Toys Daily Share your thoughts! Drop us a line at happyhour@9to5mac.com. You can also rate us in Apple Podcasts or recommend us in Overcast to help more people discover the show. Also, connect with us in the official 9to5Mac Discord server with forums, chatrooms, and more!
Data of 73 million AT&T customers leaked on dark web Accidental Linux backdoor discovery likely prevented thousands of infections DHS expected to stop buying access to your phone info Thanks to today's episode sponsor, Vanta Managing the requirements for modern security programs is increasingly challenging. Vanta's trust management platform helps you quickly assess risk, streamline security reviews, and automate compliance for SOC 2, ISO 27001, HIPAA, and more. Plus, you can save time by completing security questionnaires with Vanta AI. Join over 7,000 global companies that use Vanta to automate evidence collection, unify risk management, and secure customer trust. To learn more, go to vanta.com/ciso. For the stories behind the headlines, visit CISOseries.com.
21-year-old Air National Guardsman, Jack Teixeira will appear in court on charges of leaking classified documents. Some doctors are saying the back-and-forth legal battles over abortion rights are complicating medical care for patients. And, North Korea says it tested a new powerful type of intercontinental ballistic missile (ICBM) that could be a game changer for the country's military.