POPULARITY
Categories
At Black Hat USA 2025, Sean Martin, co-founder of ITSPmagazine, sat down with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, to discuss the findings from the company's latest ransomware report. Over the past five years, the research has tracked how attack patterns, targets, and business models have shifted—most notably from file encryption to data theft and extortion.Brett explains that many ransomware groups now find it more profitable—and less risky—to steal sensitive data and threaten to leak it unless paid, rather than encrypt files and disrupt operations. This change also allows attackers to stay out of the headlines and avoid immediate law enforcement pressure, while still extracting massive payouts. One case saw a Fortune 50 company pay $75 million to prevent the leak of 100 terabytes of sensitive medical data—without a single file being encrypted.The report highlights variation in attacker methods. Some groups focus on single large targets; others, like the group “LOP,” exploit vulnerabilities in widely used file transfer applications, making supply chain compromise a preferred tactic. Once inside, attackers validate their claims by providing file trees and sample data—proving the theft is real.Certain industries remain disproportionately affected. Healthcare, manufacturing, and technology are perennial top targets, with oil and gas seeing a sharp increase this year. Many victims operate with legacy systems, slow to adopt modern security measures, making them vulnerable. Geographically, the U.S. continues to be hit hardest, accounting for roughly half of all observed ransomware incidents.The conversation also addresses why organizations fail to detect such massive data theft—sometimes hundreds of gigabytes per day over weeks. Poor monitoring, limited security staffing, and alert fatigue all contribute. Brett emphasizes that reducing exposure starts with eliminating unnecessary internet-facing services and embracing zero trust architectures to prevent lateral movement.The ransomware report serves not just as a data source but as a practical guide. By mapping observed attacker behaviors to defensive strategies, organizations can better identify and close their most dangerous gaps—before becoming another statistic in next year's findings.Learn more about Zscaler: https://itspm.ag/zscaler-327152Note: This story contains promotional content. Learn more.Guest:Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, | On LinkedIn: https://www.linkedin.com/in/brett-stone-gross/ResourcesLearn more and catch more stories from Zscaler: https://www.itspmagazine.com/directory/zscalerLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-storyKeywords: sean martin, brett stone-gross, ransomware, data extortion, cyber attacks, zero trust security, threat intelligence, data breach, cyber defense, network security, file transfer vulnerability, data protection, black hat, black hat usa 2025, zscaler
The panel discusses Apple's AI talent losses amid a rumored shift to third-party models, Meta's aggressive recruitment, and speculation on Apple's long-term AI strategy. Chuck Joiner, David Ginsburg, Marty Jencius, Brian Flanigan-Arthurs, Web Bixby, Guy Serle, Jim Rea, and Jeff Gamet cover Sonos appointing Tom Conrad as CEO, Google's new AI search experiment, a significant SharePoint security breach, and controversy over the women-only Tea app following a massive data exposure and class action lawsuit. http://traffic.libsyn.com/maclevelten/MV25213.mp3 Today's MacVoices is supported by CleanMyMac and the new Cloud Cleanup feature. Get Tidy Today! Try 7 days free and use the code MACVOICES20 for 20% off at clnmy.com/MACVOICES. Show Notes: Chapters: [0:00] Introduction and Apple AI researcher departure to Meta [2:28] Apple's AI strategy shift and market perception [5:08] Practical vs. flashy AI implementations at Apple [7:51] Perspectives on Meta's aggressive AI hiring [9:40] Interpreting Apple's AI direction and talent movement [12:15] Sonos appoints Tom Conrad as CEO [15:47] Google's new AI search product discussion [18:18] SharePoint hack impacts U.S. nuclear agency [19:23] The Tea app controversy and data exposure [27:50] Social shaming and safe spaces online [29:59] Closing remarks and support information Links: Apple just lost another AI researcher as it weighs shift to third-party models https://9to5mac.com/2025/07/29/apple-just-lost-another-ai-researcher-as-it-weighs-shift-to-third-party-models/ Sonos gets to keeps its CEO, as a treat https://www.engadget.com/big-tech/sonos-gets-to-keeps-its-ceo-as-a-treat-164559137.html Google Might Have Made an AI Search Product I Actually Like https://lifehacker.com/tech/google-ai-search-web-guide US nuclear weapons agency breached using Microsoft SharePoint hack https://www.engadget.com/cybersecurity/us-nuclear-weapons-agency-breached-using-microsoft-sharepoint-hack-120027770.html The Microsoft SharePoint breach was massive. The response has been minimal https://www.fastcompany.com/91373183/microsoft-sharepoint-breach-response-minimal Microsoft trials Copilot Mode in Edge https://www.engadget.com/ai/microsoft-trials-copilot-mode-in-edge-201851903.html The Viral 'Tea' App Just Had a Second Data Breach, and It's Even Worse https://lifehacker.com/tech/the-viral-tea-app-just-had-another-data-breach Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn, but prefers Bluesky. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Guy Serle, best known for being one of the co-hosts of the MyMac Podcast, sincerely apologizes for anything he has done or caused to have happened while in possession of dangerous podcasting equipment. He should know better but being a blonde from Florida means he's probably incapable of understanding the damage he has wrought. Guy is also the author of the novel, The Maltese Cube. You can follow his exploits on Twitter, catch him on Mac to the Future on Facebook, at @Macparrot@mastodon.social, and find everything at VertShark.com. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
In today's Cloud Wars Minute, I highlight how the rapid rise of AI — without the right security in place — could be the biggest unseen threat to your business.Highlights00:03 — IBM's new "Cost of a Data Breach" report has revealed that while AI adoption is on the rise, AI security and governance are lagging significantly. Suja Viswesan, Vice President, Security and Runtime Products at IBM, explains that the data shows a gap between AI adoption and oversight already exists, and threat actors are starting to exploit it.00:57 — 13% of organizations reported breaches involving AI models or applications, while 8% of organizations were unsure if they had been compromised in this way. Among those surveyed who experienced a breach, 97% indicated that they had no AI access controls in place. As a result, 60% of AI-related security incidents led to compromised data, and 31% resulted in operational disruptions.01:56 — In contrast, organizations that utilize AI and automation in their security operations save an average of $1.9 million in breach costs and reduce the breach life cycle by approximately 80 days. However, it's important to remember that 16% of breaches still involve AI tools, primarily in phishing or deepfake impersonation attacks. Visit Cloud Wars for more.
The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.
Send us a textOn this week of Serious Privacy, Paul Breitbarth, Ralph O'Brien of Reinbo Consulting, and Dr. K Royal talk about a slew of breaches and what to do if your data is breached. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
A new app was hacked and personal information – including driver's licenses – was leaked. We get the details - and tips on staying safe - from Alex Hamerstone, Director of advisory solutions for TrustedSec
Welcome to the Identity Theft Resource Center's (ITRC's) Weekly Breach Breakdown for August 8, 2025. I'm Alex Achten, Senior Director of Communications & Media Relations of the ITRC. Thanks to Sentilink for supporting the ITRC and this podcast. Each week, we look at the most recent events and trends related to data security and privacy. Today, we are going to look at how a weak password at a large corporation led to the exposure of millions of people's personal information, and explore good password practices. In the past on this podcast, we have joked about the password “123456”. It is a very weak password and, according to the 2025 Hive Systems Password Table, it would be cracked instantly by an identity criminal. This weak password provides no security, and while you'd think no one would use it today, it is still commonly used. In fact, NordPass reports that it is the most commonly used password worldwide, with a count of 3,018,050. Follow on LinkedIn: www.linkedin.com/company/idtheftcenter/ Follow on Twitter: twitter.com/IDTheftCenter
PBS confirms data breach after employee info leaked on Discord servers TSMC fires engineers over suspected semiconductor secrets theft Cloudflare on Perplexity web scraping techniques to avoid robot.txt and network blocks Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO.
Ethical hacker Rachel Tobac joins us to answer a juicy question: How would she hack someone reasonably security savvy like Matt?
✨ W33K: il Lunedì che fa la differenza!Un'ora circa per iniziale la settimana con consapevolezza e una marcia in più. I topic di questa puntata:02:04 Colloquio di lavoro con un intervistatore AI: analisi del nuovo trend lavorativo.03:35 Le chat di ChatGPT condivise e indicizzate online per scelta degli utenti.08:20 Agenti AI per investimenti in borsa imparano a colludere e fare cartello.10:17 Azienda tedesca dichiara fallimento a seguito di un devastante attacco ransomware.15:03 Nuovo trend pericoloso su TikTok spinge a bruciarsi per le ''tan lines''.18:45 Articolo di Politico spiega perché il WiFi sui treni europei non funziona.19:54 GROK abiliterà la creazione di immagini esplicite e deepfake, sollevando preoccupazioni.24:56 Ricerca di Anthropic analizza come si sviluppa la personalità dei sistemi AI.27:52 Anthropic blocca le API a OpenAI per violazione dei termini di utilizzo.30:19 Corte della Florida ritiene Tesla corresponsabile per un incidente mortale con Autopilot.32:32 YouTube introduce la verifica dell'età degli utenti per conformarsi alle normative.34:41 TikTok introduce le note della community, un sistema di fact-checking distribuito.35:49 YouTube userà l'IA per l'analisi comportamentale nella verifica dell'età degli utenti.39:35 Data breach espone email e username degli utenti di un'app per sex toys.42:15 Le conversazioni con ChatGPT non sono protette dal segreto professionale legale.45:17 Meta accusata di usare materiale pornografico per addestrare i suoi modelli di AI.52:17 LinkedIn vince una causa contro la società Proxycurl per lo scraping di dati.55:48 Annunci sulla programmazione estiva e il nuovo formato dei video.~~~~~ INGAGGI E SPONSORSHIP ~~~~~ Per contatti commerciali: sales@matteoflora.comPer consulenze legali: info@42LawFirm.it~~~~~ SOSTIENI IL CANALE! ~~~~~Con la Membership PRO puoi supportare il Canale » https://link.mgpf.it/proSe vuoi qui la mia attrezzatura » https://mgpf.it/attrezzatura~~~~~ SEGUIMI ANCHE ONLINE CON LE NOTIFICHE! ~~~~~» CANALE WHATSAPP » https://link.mgpf.it/wa» CANALE TELEGRAM » https://mgpf.it/tg» CORSO (Gratis) IN FUTURO » https://mgpf.it/nl» NEWSLETTER » https://mgpf.it/nl~~~~~ CIAO INTERNET E MATTEO FLORA ~~~~~ Questo è “Ciao Internet!” la prima e più seguita trasmissione di TECH POLICY in lingua italiana, online su YouTube e in Podcast.Io sono MATTEO FLORA e sono:» Professore in Fondamenti di Sicurezza delle AI e delle SuperIntelligenze (ESE)» Professore ac in Corporate Reputation e Crisis Management (Pavia).Sono un Imprenditore Seriale del digitale e ho fondato:» The Fool » https://thefool.it - La società italiana leader di Customer Insight» The Magician » https://themagician.agency - Atelier di Advocacy e Gestione della Crisi» 42 Law Firm » https://42lf.it - Lo Studio Legale per la Trasformazione Digitale » ...e tante altre qui: https://matteoflora.com/#aziendeSono Future Leader (IVLP) del Dipartimento di Stato USA sotto Amministrazione Obama nel programma “Combating Cybercrime (2012)”.Sono Presidente di PermessoNegato, l'associazione italiana che si occupa di Pornografia Non- Consensuale e Revenge Porn.Conduco in TV “Intelligenze Artificiali” su Mediaset/TgCom.
PEBCAK Podcast: Information Security News by Some All Around Good People
Welcome to this week's episode of the PEBCAK Podcast! We've got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! Belgium warns seniors about online scams on bread bags https://grahamcluley.com/loaf-and-order-belgian-police-launch-bread-based-cybersecurity-campaign/ https://www.nieuwsblad.be/regio/vlaams-brabant/halle-vilvoorde/pajottegem/politie-waarschuwt-voor-internetcriminaliteit-via-broodzakken-niet-iedereen-is-actief-op-sociale-media/77720193.html Indiana mom busted on Snapchat trying to sell children https://nypost.com/2025/07/19/us-news/indiana-mom-busted-after-trying-to-sell-baby-daughter-for-sex/ Dating safety app Tea suffers multiple data breaches https://techcrunch.com/2025/07/26/dating-safety-app-tea-breached-exposing-72000-user-images/ https://x.com/denzell75399403/status/1949073773639942310?s=46 https://x.com/belowtearline/status/1948891743333585112?s=46 https://www.404media.co/women-dating-safety-app-tea-breached-users-ids-posted-to-4chan/ https://www.bleepingcomputer.com/news/security/tea-app-leak-worsens-with-second-database-exposing-user-chats/ Dad Joke of the Week (DJOW) Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Matt - https://www.linkedin.com/in/disher/ Ben - https://www.linkedin.com/in/benjamincorll/
The Tea app is a place for women to share red or green flags about men, but it recently suffered a major data breach. Plus, why some members of Congress are protesting a deal with China to allow Nvidia to sell its H20 chips to the country. And YouTube is rolling out new age estimation technology to protect younger users. Marketplace's Meghan McCarty Carino is joined by Maria Curi, tech policy reporter at Axios, to discuss all this.
The Tea app is a place for women to share red or green flags about men, but it recently suffered a major data breach. Plus, why some members of Congress are protesting a deal with China to allow Nvidia to sell its H20 chips to the country. And YouTube is rolling out new age estimation technology to protect younger users. Marketplace's Meghan McCarty Carino is joined by Maria Curi, tech policy reporter at Axios, to discuss all this.
In this episode, the host Jim Love discusses the increasing sophistication of supply chain attacks, starting with an account of a blockchain developer who lost $500,000 due to a malicious extension in a popular AI-powered coding tool. The episode also covers a significant cyber emergency in St. Paul, Minnesota, which required National Guard support, and the City's struggle to comprehend the full scope of the hack. Additionally, the US Cybersecurity and Infrastructure Security Agency (CISA) has released a new eviction strategies tool to help cybersecurity teams remove persistent threats. The episode concludes with an update on the Ingram Micro breach, where the Safe Pay ransomware gang has threatened to leak 35 terabytes of stolen data. Listeners are encouraged to focus on preventative measures even when ransomware attacks do not involve encryption. 00:00 Introduction and Headlines 00:25 The $500,000 Crypto Heist 01:26 Supply Chain Attack on Open VSX 04:50 Lessons from the Attack 06:16 Oyster Backdoor Threat 07:54 Cyber Attack on St. Paul 09:09 CISA's New Eviction Strategies Tool 10:43 Ingram Micro Data Breach Update 12:18 Conclusion and Contact Information
Send us a textThis episode covers a week in privacy which feels light and refreshing. Listen to co-hosts Paul Breitbarth, Ralph O'Brien, and Dr. K Royal. Topics include an emergency ban in Italy about publishing images about an autopsy, Germany's actions involving Meta, Poland's enforcement on a McDonald's data breach, UK's collaboration with OpenAI, UK's enforcement against spam/spoof scam calls, age-verification in MS, and more! If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to reflect on a 2006 data breach which served as a cybersecurity wake up call for the Department of Veterans Affairs and the rest of the federal government. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
Oh No! Lenovo You sunk my battleship! Or did you? Russians unable to get a taste of their own medicine Huge thanks to our sponsor, Dropzone AI Security teams everywhere are drowning in alerts. That's why companies like Zapier and CBTS turned to Dropzone AI—the leader in autonomous alert investigation. Their AI investigates everything, giving your analysts time back for real security work. No more 40-minute rabbit holes. If you're at BlackHat, find them in Startup City. Otherwise, check out their self-guided demo at dropzone.ai. This is how modern SOCs are scaling without burning out. Find the stories behind the headlines at CISOseries.com.
Owen Poole runs through the tech news of the day, including OpenAI's new "Study Mode" for ChatGPT, a popular dating safety app that got hacked, and Domino's debut of a pizza delivery robot that can protect your pizza from seagulls on Tech Today.
Please consider buying us a coffee or subscribing to a membership to help keep Centennial World's weekly podcasts going! Every single dollar goes back into this business
Owen Poole runs through the tech news of the day, including OpenAI's new "Study Mode" for ChatGPT, a popular dating safety app that got hacked, and Domino's debut of a pizza delivery robot that can protect your pizza from seagulls on Tech Today.
An app called Tea had a data breach over the weekend that exposed tens of thousands of photos.
An app called Tea had a data breach over the weekend that exposed tens of thousands of photos. BJ is over the moon excited about our new BJ and Jamie grocery tote bags. Deion Sanders is going to give a press conference today with his medical team to let us know what has been going on with his health.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
The Tea app, which allows anonymous women to stalk men, had a massive data breach and now there's a class action lawsuit brewing. For the WOMEN... not the men. However, even CNN admits that Tea might've opened itself up to defamation cases. Here we go... Watch this podcast episode on YouTube and all major podcast hosts including Spotify. CLOWNFISH TV is an independent, opinionated news and commentary podcast that covers Entertainment and Tech from a consumer's point of view. We talk about Gaming, Comics, Anime, TV, Movies, Animation and more. Hosted by Kneon and Geeky Sparkles. D/REZZED News covers Pixels, Pop Culture, and the Paranormal! We're an independent, opinionated entertainment news blog covering Video Games, Tech, Comics, Movies, Anime, High Strangeness, and more. As part of Clownfish TV, we strive to be balanced, based, and apolitical. Get more news, views and reviews on Clownfish TV News - https://news.clownfishtv.com/ On YouTube - https://www.youtube.com/c/ClownfishTV On Spotify - https://open.spotify.com/show/4Tu83D1NcCmh7K1zHIedvg On Apple Podcasts - https://podcasts.apple.com/us/podcast/clownfish-tv-audio-edition/id1726838629
Afternoon Headlines: US Beef imports ban lifted, Former PM Scott Morrison addresses US Congress, and Brian Kohberger sentenced for Idaho University student murders. Deep Dive: Genea IVF is the latest company to reveal the enormity of a major data breach that has compromised the private medical information of thousands of its patients. In this episode of The Briefing, Natarsha Belling is joined by one of the victims of the data breach who reveals exactly what confidential details the hackers were able to steal and then publish on the dark web. Anna says patients should have confidence that their private details will be kept safe and has an important warning for others. You can read Genea's statement on the incident in full here. Follow The Briefing: TikTok: @thebriefingpodInstagram: @thebriefingpodcast YouTube: @LiSTNRnewsroom Facebook: @LiSTNR NewsroomSee omnystudio.com/listener for privacy information.
Send us a textWith Dr. K Royal off to Vegas, this week it's Paul Breitbarth and Ralph O'Brien of Reinbo Consulting catching up for the Serious Privacy podcast on all of the news. Two big topics this week: the hidden-until-now data breach of the UK ministry of Defence in Afghanistan and the mess that was the WeTransfer terms update (official blog post, Paul's Linkedin post). The guys also talk about this piece in the New York Times Wirecutter on disappearing from the internet. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
Get the Gear: https://brushbeater.store/ Guerrilla's Guide to the Baofeng Radio: https://www.amazon.com/Guerrillas-Guide-Baofeng-Radio/dp/B0BNV21F4P/ref=zg_bs_g_13818_d_sccl_4/135-1141614-7547609?psc=1
We're back with a brand-new season of Random but Memorable! ✨
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
The UK sanctions Russian military intelligence officers tied to GRU cyber units. An AI-powered malware called LameHug targets Windows systems. Google files a lawsuit against the operators of the Badbox 2.0 botnet. A pair of healthcare data breaches impact over 3 million individuals. Researchers report a phishing attack that bypasses FIDO authentication by exploiting QR codes. A critical flaw in Nvidia's Container Toolkit threatens managed AI cloud services. A secure messaging app is found exposing sensitive data due to outdated configurations. Meta investors settle their $8 billion lawsuit. Our guest is Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst, with a data-driven look at how AI is affecting jobs. Belgian police provide timely cyber tips, baked right in. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we have Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst, discussing how AI is affecting jobs. Got cybersecurity, IT, or project management certification goals? For the past 25 years, N2K's practice tests have helped more than half a million professionals reach certification success. Grow your career and reach your goals faster with N2K's full exam prep of practice tests, labs, and training courses for Microsoft, CompTIA, PMI, Amazon, and more at n2k.com/certify. Selected Reading Breaking: UK sanctions Russian cyber spies accused of facilitating murders (The Record) Russia Linked to New Malware Targeting Email Accounts for Espionage (Infosecurity Magazine) New “LameHug” Malware Deploys AI-Generated Commands (Infosecurity Magazine) Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet (SecurityWeek) 1.4 Million Affected by Data Breach at Virginia Radiology Practice (SecurityWeek) Anne Arundel Dermatology Data Breach Impacts 1.9 Million People (SecurityWeek) Phishing attack abuses QR codes to bypass FIDO keys (SC Media) Critical Nvidia Toolkit Flaw Exposes AI Cloud Services to Hacking (SecurityWeek) New TeleMessage SGNL Flaw Is Actively Being Exploited by Attackers (Hackread) Meta investors, Zuckerberg settle $8 billion privacy lawsuit tied to Cambridge Analytica scandal (The Record) Loaf and order: Belgian police launch bread-based cybersecurity campaign (Graham Cluley) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this edition of The World This Week: Is Donald Trump's 50-day deadline to Vladimir Putin "Much ado about nothing?", the Afghan leak and the UK superinjunction, plus why did Israel bomb Damascus?
A major data breach which led to thousands of Afghans being secretly relocated to the UK became public knowledge for the first time this week. The Standard's Courts Correspondent Tristan Kirk is here with the latest. And in part two, The Standard's Head of Culture, Martin Robinson, reviews Apple TV's The Studio, the must-watch, Emmy-nominated satirical show from Seth Rogen. Hosted on Acast. See acast.com/privacy for more information.
The personal details of British spies and special forces soldiers were included in one of the worst security leaks in modern UK history. Also: Rosebud - the wooden sled from Citizen Kane - sells for millions at auction.
In this episode of GRC Chat, we tackle the pressing topic of "AI vs Human: The Future of Fraud Prevention" with Iremar Brayner, a seasoned fraud prevention and risk management professional with over 17 years of experience. Currently leading fraud prevention at G2A, the world's largest digital entertainment platform with over 35 million users, Iremar shares invaluable insights into the evolving landscape of fraud mitigation across industries. We discussed real-world examples such as first-party fraud, social engineering scams, and the challenges posed by fraudsters leveraging AI to scale their attacks. Iremar explains how industries, particularly digital entertainment, face unique hurdles due to low average order values and the fast-paced customer demands for real-time responses. He also emphasizes the importance of combining human expertise with AI technology to create efficient and emotionally informed fraud prevention strategies. If you want to be our guest or suggest one, send your email to info@globalriskconsult.com with the subject line “Guest Proposal.”
The Smart 7 is an award winning daily podcast, in association with METRO, that gives you everything you need to know in 7 minutes, at 7am, 7 days a week…With over 18 million downloads and consistently charting, including as No. 1 News Podcast on Spotify, we're a trusted source for people every day and we've won Gold at the Signal International Podcast awardsIf you're enjoying it, please follow, share, or even post a review, it all helps... Today's episode includes the following: https://x.com/i/status/1945400840170230049 https://x.com/i/status/1945483473495400458 https://x.com/i/status/1945393720024522874 https://x.com/i/status/1945445315521188110 https://x.com/i/status/1945528941801869328 https://x.com/i/status/1945484043786629238https://x.com/i/status/1945377353615519861 https://x.com/i/status/1945464544215642235https://x.com/i/status/1945485072653533365 Contact us over @TheSmart7pod or visit www.thesmart7.com or find out more at www.metro.co.uk Voiced by Jamie East, using AI, written by Liam Thompson, researched by Lucie Lewis and produced by Daft Doris. Hosted on Acast. See acast.com/privacy for more information.
Qantas has filed court action in a bid to stop the compromised data of millions of customers being accessed or released following a recent cyber attack. The accounts of 5.7 million Qantas customers were compromised in a data breach at the end of June, with millions of phone numbers, addresses and dates of birth caught up in the leak. Australian correspondent Oliver Peterson says the airline is trying to negotiate with the hackers before the information gets shared on the dark web. LISTEN ABOVESee omnystudio.com/listener for privacy information.
UK government apologises to thousands of Afghans potentially at risk from Taliban after personal details leaked. Also: Trump says Ukraine shouldn't target Moscow, and 114-year-old marathon runner dies after car accident.
Today, Keir Starmer told the House of Commons the previous government had ‘serious questions' to answer about a major data breach from the Ministry of Defence.On Tuesday, a major data breach which led to thousands of Afghans being secretly relocated to the UK became public knowledge for the first time. Chris joins Adam to discuss the former government's account of events, as well as what could happen next. And, Adam speaks to Larisa Brown, Defence Editor at The Times, about how she broke the story. Meanwhile in the US, Donald Trump is being pushed by fellow Republicans to follow through on promises he made during the election to release records relating to sex offender Jeffrey Epstein. Caitriona Perry calls in from Washington to explain why Trump is facing a growing backlash from MAGA supporters, and examines how the president's rhetoric has changed. Tickets for Newscast at the Edinburgh Fringe are available here: https://www.edfringe.com/tickets/whats-on/bbc-newscast-podcastYou can now listen to Newscast on a smart speaker. If you want to listen, just say "Ask BBC Sounds to play Newscast”. It works on most smart speakers. You can join our Newscast online community here: https://tinyurl.com/newscastcommunityhereGet in touch with Newscast by emailing newscast@bbc.co.uk or send us a whatsapp on +44 0330 123 9480.New episodes released every day. If you're in the UK, for more News and Current Affairs podcasts from the BBC, listen on BBC Sounds: https://bit.ly/3ENLcS1 Newscast brings you daily analysis of the latest political news stories from the BBC. It was presented by Adam Fleming. It was made by Miranda Slade with Shiler Mahmoudi and Anna Harris. The social producer was Jada Meosa John. The technical producer was Mike Regaard. The assistant editor is Chris Gray. The senior news editor is Sam Bonham.
This week a super-injunction was lifted that allowed the press to report on a story it's known about for some time – the Ministry of Defence's leaking of personal details of almost 19,000 Afghan people who had applied to move to the UK. The Times's Larisa Brown tells us how she, alongside other journalists, fought the super-injunction.The BBC's Annual Report has contained some good news for the organisation, but has been overshadowed by recent controversies. We assess its future with the BBC's former Editorial Director, Roger Mosey, and The Financial Times's Daniel Thomas.As new TV show Shark! Celebrity Infested Waters begins on ITV, we hear from creative director of Plimsoll Productions Andrea Jackson about what it takes to develop a new format blending entertainment and natural history.This is the last year that the Tour de France will be on free-to-air TV in the UK. Rachel Jary, staff writer at Rouleur, and Chris Boardman, Active Travel Commissioner and former racing cyclist, discuss how the media covers the race.Producer: Lucy Wai Assistant Producers: Emily Channon and Martha Owen
Was this the most expensive – and possibly most disastrous – email in history?It has been revealed that the details of up to 25,000 Afghans – soldiers who worked alongside the British and their families – were mistakenly leaked by a Marine in 2022.The Government at the time secured a superinjunction to prevent the breach being reported, meaning the £7bn earmarked to address it faced no scrutiny.Jacob Rees-Mogg was a senior MP back then and tells Camilla what he did and didn't know at the time, who should take the blame, and if this was a coverup at the highest level.Plus, Chancellor Rachel Reeves just can't catch a break! Not long after her big speech to finance movers and shakers, new figures put inflation at its highest level in 18 months.Read: Finally, the ineptitude I saw first-hand has been exposed, by Johnny MercerWe could not betray Afghan allies who fought alongside us, by Ben WallaceProducers: Lilian Fawcett & Georgia CoanSenior Producer: John CadiganPlanning Editor: Venetia RaineyVideo Editor: Will WaltersStudio Operator: Meghan Searle Hosted on Acast. See acast.com/privacy for more information.
The High Court has lifted a super injunction revealing that the last government set up a secret relocation scheme for Afghans at risk of retribution by the Taliban after their personal data was leaked by the Ministry of Defence. John Torode has been sacked as a presenter of MasterChef, after an allegation that he used "an extremely offensive racist term" was upheld.The two men who felled the Sycamore Gap tree in Northumberland have each been jailed for four years and three months.
The government's secret Afghan asylum scheme after deadly data leak exposed Plus: Three general election opinion polls make for interesting reading, a Reform councillor takes a surprising stance on migration and a 12 year-old girl gets ‘punished' for wearing a Union Jack dress to school. With Aaron Bastani and Helena ( @NoJusticeMTG )
i'm wall-e, welcoming you to today's tech briefing for tuesday, july 15th. explore today's key tech developments: nvidia's china endeavors: nvidia plans to resume sales of its h20 ai chips to china, navigating regulatory challenges and securing u.s. government licenses to facilitate deliveries, including the new rtx pro chip. meta's ai strategy shift: discussions in meta's superintelligence lab hint at a move from their open-source ai approach, potentially focusing on closed models for broader monetization beyond ad revenue. meta tackles 'unoriginal' content: meta intensifies efforts against recycled text, photos, and videos on facebook, targeting 'ai-generated slop' and imposing penalties on such creators to slow its spread. episource data breach: a major cyberattack on episource affects over 5.4 million individuals, highlighting the urgent need for strengthened cybersecurity in the healthcare sector. cognition's strategic acquisition: cognition acquires ai coding startup windsurf to enhance its ai coding capabilities, aiming to compete with industry leaders like openai and anthropic. that's all for today. we'll see you back here tomorrow with more tech news!
Tax professional data breaches have exploded in 2025, with 327 reported incidents affecting over 342,000 taxpayers in just half a year. Glenn Gizzy, a 36-year IRS veteran now specializing in data breach prevention, reveals the sophisticated tactics criminals use to infiltrate tax practices. From phishing emails disguised as client referrals, to hackers who wait until returns are filed before changing bank account information. This conversation covers essential protection measures including Written Information Security Plans (WISP), IP PINs, proper cyber insurance coverage, and the critical steps to take immediately after discovering a breach.SponsorsPadgett - Contact Padgett or Email Jeff Phillips(00:00) - Introduction and Greetings (02:21) - Today's Guest and Topic: Scams and Data Breaches (02:56) - IRS Statistics on Data Breaches (05:33) - Common Scams and How They Work (09:48) - Phishing Emails and Ransomware (14:51) - Fake Charities and Donation Scams (17:30) - Refund Thefts and Data Breaches (21:28) - IRS Communication and Taxpayer Awareness (30:10) - Signs of a Data Breach for Practitioners (32:42) - Immediate Steps After a Data Breach (34:32) - Multi-Step Process and Insurance Involvement (37:42) - Filing Returns After a Breach (40:54) - Identity Protection PIN (IP PIN) (48:10) - Written Information Security Plan (WISP) (53:06) - Protecting EFIN, PTIN, and CAF Numbers (55:25) - Final Thoughts and Conclusion Connect with Glennhttps://www.linkedin.com/in/glenn-gizzi-4b6ab5205Get NASBA Approved CPE or IRS Approved CELaunch the course on EarmarkCPE to get free CPE/CE for listening to this episode.Connect with the Roger and Annie on LinkedInhttps://www.linkedin.com/in/rogerharrispbs/https://www.linkedin.com/in/annie-schwab-852418261/ReviewLeave a review on Apple Podcasts or PodchaserSubscribeSubscribe to the Federal Tax Updates podcast in your favorite podcast app!This podcast is a production of the Earmark Media
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Quantifying cyber risk is now a necessity for businesses navigating the evolving threat landscape. In this episode of the Risk Management Show, we discussed why quantifying cyber risk is the new imperative for businesses. Our guest, Asdrúbal Pichardo, CEO of Squalify—a cyber risk quantification platform backed by Munich Reinsurance—shares how their top-down approach to cyber risk quantification is transforming the way companies prioritize cybersecurity investments and communicate with boards. We explored real-world examples, common pitfalls in cybersecurity investment, and how benchmarking cyber posture can elevate your strategy. If you're a Chief Risk Officer, CISO, or CFO looking to align strategies and speak the same language about cyber security and risk management, this episode provides the insights you need. Plus, learn about Squalify's CRQ readiness assessment tool and how it supports organizations in making informed decisions. Please check the Squalify's CRQ Readiness Assessment https://squalify.fillout.com/t/5dGf2f8tmcus If you want to be our guest or suggest a guest, send your email to info@globalriskconsult.com with the subject line "Guest Proposal."
Send us a textLinking the Travel Industry is a business travel podcast where we review the top travel industry stories that are posted on LinkedIn by LinkedIn members. We curate the top posts and discuss with them with travel industry veterans in a live session with audience members. You can join the live recording session by visiting BusinessTravel360.comYour Hosts are Riaan van Schoor, Ann Cederhall and Aash ShravahStories covered on this session include -Free breakfast and other frequent traveler perks are being stripped back by big hotel brands according to Pedro Colaco.Tony Fernandes at AirAsia wants to do "what no other low-cost carrier has done" with their plans to open a connecting hub in the Middle East, which will enable them to offer services from Asia to Europe on their own (narrow body) planes. BCD Travel has agreed a partnership with AI corporate travel assistant SkyLink to offer users a “fully autonomous and touchless travel experience”.Cabin baggage could soon become a legal right within the EU, and Mark Kubatov discusses this in more detail in a much commented upon post.Qantas admits that a “significant” number of a possible 6 million customers have had their data stolen, including names, email addresses, phone numbers, birth dates and frequent flyer numbers in a cyber attack. Airline direct connect API provider Kyte signs a distribution agreement with Jet2.com and Jet2holidays.Extra StoriesYou can subscribe to this podcast by searching 'BusinessTravel360' on your favorite podcast player or visiting BusinessTravel360.comThis podcast was created, edited and distributed by BusinessTravel360. Be sure to sign up for regular updates at BusinessTravel360.com - Enjoy!Support the show
WE NEED YOU! Our 2025 listener survey is now live, and we'd love to hear from you. Whether you've been with us from episode one or just joined the chaos, your feedback will make the show even better.
WarRoom Battleground EP 794: Future Shock: Massive Data Breach, OpenAI Surveillance, and the Quantum Apocalypse