Cyber attack disrupting service by overloading the provider of the service
POPULARITY
Categories
SentinelOne suffers a global service outage. A major DDoS attack hits a Russian internet provider. U.S. banking groups urge the SEC to scrap cybersecurity disclosure rules. Australia mandates reporting of ransomware payments. Researchers uncover a new Browser-in-the-Middle (BitM) attack targeting Safari users. A Florida health system pays over $800,000 to settle insider breach concerns. CISA issues five urgent ICS advisories. Our guest is Matt Covington, VP of Product at BlackCloak, discussing the emergence of advanced impersonation techniques like deepfakes and the importance of digital executive protection. The feds are putting all our digital data in one basket. CyberWire Guest On our Industry Voices segment, at the 2025 RSA Conference, we were joined by Matt Covington, VP of Product at BlackCloak, discussing the emergence of advanced impersonation techniques like deepfakes and digital executive protection. Listen to Matt's conversation here. Selected Reading Cybersecurity Firm SentinelOne Suffers Major Outage (Bank Infosecurity) DDoS incident disrupts internet for thousands in Moscow (The Record) Banks Want SEC to Rescind Cyberattack Disclosure Requirements (PYMNTS.com) Australian ransomware victims now must tell the government if they pay up (The Record) New BitM Attack Exploits Safari Vulnerability to Steal Login Credentials (Cyber Security News) Florida Health System Pays $800K for Insider Record Snooping (Bank Infosecurity) UTG-Q-015 Hackers Launched Large Scale Brute-Force Attacks Against Govt Web Servers (Cyber Security News) CISA Releases Five ICS Advisories Targeting Vulnerabilities and Exploits (Cyber Security News) Trump Taps Palantir to Compile Data on Americans (The New York Times) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of Cybersecurity Today, host David Shipley dives into several alarming cyber incidents. The show starts with Nova Scotia Power's confirmation of a ransomware attack that forced the shutdown of customer-facing systems and led to data being published on the dark web. The company decided not to pay the ransom, adhering to law enforcement guidance and sanctions laws. A shocking case in New York follows, involving a crypto investor charged with kidnapping and torturing a man to obtain his Bitcoin wallet password. The next segment highlights a record-setting DDoS botnet, Aisuru, which performed a test attack that peaked at 6.3 terabits per second, posing a disproportionate threat to online retailers. The final story covers Microsoft's controversial AI feature, Recall, which takes screenshots every three seconds and raises significant privacy concerns. The episode underscores the growing need for robust cybersecurity measures and effective legislation. 00:00 Introduction and Headlines 00:30 Nova Scotia Power Ransomware Attack 02:57 Ransomware Trends and Statistics 03:51 Operation End Game: A Global Win Against Ransomware 04:25 Crypto Investor's Shocking Crime 05:57 Record-Breaking DDoS Botnet 07:36 Microsoft's Controversial AI Feature Recall 09:10 Conclusion and Sign-Off
Step inside AWS's cutting-edge approach to network protection with AWS VP and Distinguished Engineer Tom Scholl. In this eye-opening conversation, discover how threat detection tools like MadPot are helping AWS identify and disrupt DDoS-as-a-service providers who sell attack capabilities on the dark web. Scholl reveals how AWS's massive network scale provides unique insights into emerging threats, enabling proactive security measures and even the take down of criminal organizations like Anonymous Sudan. He also discusses AWS's approach to seamless security integration and the importance of implementing strong "front door" security measures to reinforce potential entry points in your network. This conversation is a must-watch for CISOs and security leaders looking to enhance their cloud security posture in 2025 and beyond.
A joint advisory warns of Fancy Bear targeting Western logistics and technology firms. A nonprofit hospital network in Ohio suffers a disruptive ransomware attack. The Consumer Financial Protection Bureau (CFPB) drops plans to subject data brokers to tighter regulations. KrebsOnSecurity and Google block a record breaking DDoS attack. A phishing campaign rerouted employee paychecks. Atlassian patches multiple high-severity vulnerabilities. A Wisconsin telecom provider confirms a cyberattack caused a week-long outage. VMware issues a Security Advisory addressing multiple high-risk vulnerabilities. Prosecutors say a 19-year-old student from Massachusetts will plead guilty to hacking PowerSchool. Our guest is Rob Allen, Chief Product Officer at ThreatLocker, discussing deliberate simplicity of fundamental controls around zero trust. Oversharing your call location data. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Industry Voices segment, today we are joined by Rob Allen, Chief Product Officer at ThreatLocker from RSAC 2025. Rob is discussing the deliberate simplicity of fundamental controls around zero trust. Token theft and phishing attacks bypass traditional MFA protections, letting attackers impersonate users and access critical SaaS platforms — without needing passwords. Listen to Rob's interview here. Learn more from the ThreatLocker team here. Selected Reading Russian GRU Targeting Western Logistics Entities and Technology Companies ( CISA) Ransomware attack disrupts Kettering Health Network in Ohio (Beyond Machines) America's CFPB bins proposed data broker crackdown (The Register) Krebs on Security hit by 'test run' DDoS attack that peaked at 6.3 terabits of data per second (Metacurity) SEO poisoning campaign swipes direct deposits from employees (SC Media) Atlassian Warns of Multiple High-Severity Vulnerabilities Hits Data Center Server (Cybersecurity News) Cellcom Service Disruption Caused by Cyberattack (SecurityWeek) VMware releases patches for security flaws in multiple virtualization products (Beyond Machines) Massachusetts man will plead guilty in PowerSchool hack case (CyberScoop) O2 VoLTE: locating any customer with a phone call (Mast Database) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: Struggling to find that pesky passwords.xlsx in Sharepoint? Copilot has your back! The ransomware ecosystem is finding life a bit tough lately SAP Netweaver bug being used by Chinese APT crew Academics keep just keep finding CPU side-channel attacks And of course… bugs! Asus, Ivanti, Fortinet… and a Nissan LEAF? This week's episode is sponsored by Resourcely, who will soothe your Terraform pains. Founder and CEO Tracis McPeak joins to talk about how to get from a very red dashboard full of cloud problems to a workable future. This episode is also available on Youtube. Show notes Exploiting Copilot AI for SharePoint | Pen Test Partners MrBruh's Epic Blog Ransomware group Lockbit appears to have been hacked, analysts say | Reuters "CONTI LEAK: Video they tried to bury! 6+ Conti members on a private jet. TARGET's birthday — $10M bounty on his head. Filmed by TARGET himself. Original erased — we kept a copy." Mysterious hackers who targeted Marks and Spencer's computer systems hint at political allegiance as they warn other tech criminals not to attack former Soviet states The organizational structure of ransomware groups is evolving rapidly. SAP NetWeaver exploitation enters second wave of threat activity China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures DOGE software engineer's computer infected by info-stealing malware Hackers hijack Japanese financial accounts to conduct nearly $2 billion in trades FBI and Dutch police seize and shut down botnet of hacked routers Poland arrests four in global DDoS-for-hire takedown School districts hit with extortion attempts after PowerSchool breach EU launches vulnerability database to tackle cybersecurity threats Training Solo - vusec Branch Privilege Injection: Exploiting Branch Predictor Race Conditions – Computer Security Group Remote Exploitation of Nissan Leaf: Controlling Critical Body Elements from the Internet PSIRT | FortiGuard Labs EPMM Security Update | Ivanti
Episode SummaryJeremy Snyder is the co-founder and CEO of FireTail, a company that enables organizations to adopt AI safely without sacrificing speed or innovation. In this conversation, Jeremy shares his deep expertise in API and AI security, highlighting the second wave of cloud adoption and his pivotal experiences at AWS during key moments in its growth from startup onwards.Show NotesIn this episode of The Secure Developer, host Danny Allan sits down with Jeremy Snyder, the Co-founder and CEO of FireTail, to unravel the complexities of API security and explore its critical intersection with the burgeoning field of Artificial Intelligence. Jeremy brings a wealth of experience, tracing his journey from early days in computational linguistics and IT infrastructure, through a pivotal period at AWS during its startup phase, to eventually co-founding FireTail to address the escalating challenges in API security driven by modern, decoupled software architectures.The conversation dives deep into the common pitfalls and crucial best practices for securing APIs. Jeremy clearly distinguishes between authentication (verifying identity) and authorization (defining permissions), emphasizing that failures in authorization are a leading cause of API-related data breaches. He sheds light on vulnerabilities like Broken Object-Level Authorization (BOLA), explaining how seemingly innocuous practices like using sequential integer IDs can expose entire datasets if server-side checks are missed. The discussion also touches on the discoverability of backend APIs and the persistent challenges surrounding multi-factor authentication, including the human element in security weaknesses like SIM swapping.Looking at current trends, Jeremy shares insights from FireTail's ongoing research, including their annual "State of API Security" report, which has uncovered novel attack vectors such as attempts to deploy malware via API calls. A significant portion of the discussion focuses on the new frontier of AI security, where APIs serve as the primary conduit for interaction—and potential exploitation. Jeremy details how AI systems and LLM integrations introduce new risks, citing a real-world example of how a vulnerability in an AI's web crawler API could be leveraged for DDoS attacks. He speculates on the future evolution of APIs, suggesting that technologies like GraphQL might become more prevalent to accommodate the non-deterministic and data-hungry nature of AI agents. Despite the evolving threats, Jeremy concludes with an optimistic view, noting that the gap between business adoption of new technologies and security teams' responses is encouragingly shrinking, leading to more proactive and integrated security practices.LinksFireTailRapid7Snyk - The Developer Security Company Follow UsOur WebsiteOur LinkedIn
Europol shuts down six DDoS-for-hire services used in global attacks CrowdStrike says it will lay off 500 workers Passkeys set to protect GOV.UK accounts against cyber-attacks Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO. Find the stories behind the headlines at CISOseries.com.
This is the Catch Up on 3 Things by The Indian Express and I am Ichha Sharma.Today is the 7th of May and here are the headlines.In a decisive military action, India launched "Operation Sindoor" in the early hours today, executing precision strikes on nine terrorist camps located in Pakistan and Pakistan-occupied Kashmir (PoK). This operation was a direct response to the April 22 Pahalgam terror attack, which resulted in the deaths of 26 Indian tourists. During a press briefing in New Delhi, Foreign Secretary Vikram Misri, Colonel Sofiya Qureshi, and Wing Commander Vyomika Singh detailed the operation's objectives and outcomes. They confirmed the destruction of camps associated with notorious terrorists Ajmal Kasab and David Headley. The strikes were meticulously planned to avoid civilian casualties, utilizing advanced weaponry and precision-guided munitions. Targets were carefully selected to dismantle terrorist infrastructure while sparing Pakistani military installations, underscoring India's intent to avoid escalation.Colonel Qureshi emphasised that the operation aimed to deliver justice to the victims of the Pahalgam attack and their families. Wing Commander Singh highlighted the use of "niche technology weapons" to ensure that only intended targets were neutralized, minimizing collateral damage. In the wake of the operation, Pakistan has condemned the strikes as an "act of war," claiming civilian casualties and asserting that Indian military aircraft were downed—a claim not corroborated by India. The situation has led to heightened tensions along the Line of Control, with reports of cross-border shelling and civilian casualties on both sides. The cross-border shelling by Pakistani forces has claimed at least nine civilians lives and 38 injured in Jammu and Kashmir today. The international community, including the United Nations, has expressed concern and urged both nations to exercise restraint to prevent further escalation.The ministries of IT and Information and Broadcasting are “constantly monitoring” content being uploaded to social media platforms for misleading content related to the aftermath of ‘Operation Sindoor' to issue takedown orders, and have sensitised social media platforms to block any content that is unlawful, a senior government official told The Indian Express. Agencies and organisations which are in charge of India's critical infrastructure, such as the Power Ministry, financial institutions including banks, and telecom operators are also on “high alert” after having faced a number of cyber attacks following the Pahalgam terror attack last month. “There have been some DDoS attacks on some infrastructure, but we have contained them. Now we are on high alert because such attempts will certainly be made,” the official said. A DDoS (Distributed Denial of Service) attack is a cyberattack where an attacker overwhelms a website, server, or network with malicious traffic from multiple sources, making it slow or inaccessible to legitimate users.India conducted a nationwide civil defence exercise, codenamed 'Operation Abhyas,' across 244 districts. This large-scale mock drill, organized by the Ministry of Home Affairs and coordinated by the National Disaster Management Authority, aimed to bolster emergency preparedness amid escalating tensions with Pakistan following the Pahalgam terror attack. The drills simulated various hostile scenarios, including air raids with siren activations, blackout procedures, urban fire emergencies, search and rescue operations, casualty evacuations, and the establishment of temporary hospitals. Major cities such as Delhi, Mumbai, Chennai, Kolkata, Hyderabad, and Pune participated, with specific activities like a 10-minute blackout observed in Haryana and siren activations in Delhi's 11 districts.Cardinals from around the world will begin casting their votes for a new pope under Michelangelo's The Last Judgment as 133 cardinals would begin their secretive and centuries old ritual to elect the successor of Pope Francis, who passed away on April 21. The conclave to select the new pope will begin behind the closed doors of the Sistine Chapel today afternoon as cardinals from 70 countries will be secluded, their cellphones surrendered and airwaves around the Vatican jammed in order to find the next leader of the 1.4-billion-member Catholic Church. Ahead of the Papal Conclave, a few names have propped up who are being seen as favourites to succeed Pope Francis, namely Italian Cardinal Pietro Parolin, Filipino Cardinal Luis Antonio Tagle, Hungarian Cardinal Peter Erdo among others. The uncertainty over the level of support for any one cardinal amongst the 133 cardinal electors suggests that it is one of the most wide-open conclaves in history.
At RSAC Conference 2025, Rupesh Chokshi, Senior Vice President and General Manager of the Application Security Group at Akamai, joined ITSPmagazine to share critical insights into the dual role AI is playing in cybersecurity today—and what Akamai is doing about it.Chokshi lays out the landscape with clarity: while AI is unlocking powerful new capabilities for defenders, it's also accelerating innovation for attackers. From bot mitigation and behavioral DDoS to adaptive security engines, Akamai has used machine learning for over a decade to enhance protection, but the scale and complexity of threats have entered a new era.The API and Web Application Threat SurgeReferencing Akamai's latest State of the Internet report, Chokshi cites a 33% year-over-year rise in web application and API attacks—topping 311 billion threats. More than 150 billion of these were API-related. The reason is simple: APIs are the backbone of modern applications, yet many organizations lack visibility into how many they have or where they're exposed. Shadow and zombie APIs are quietly expanding attack surfaces without sufficient monitoring or defense.Chokshi shares that in early customer discovery sessions, organizations often uncover tens of thousands of APIs they weren't actively tracking—making them easy targets for business logic abuse, credential theft, and data exfiltration.Introducing Akamai's Firewall for AIAkamai is addressing another critical gap with the launch of its new Firewall for AI. Designed for both internal and customer-facing generative AI applications, this solution focuses on securing runtime environments. It detects and blocks issues like prompt injection, PII leakage, and toxic language using scalable, automated analysis at the edge—reducing friction for deployment while enhancing visibility and governance.In early testing, Akamai found that 6% of traffic to a single LLM-based customer chatbot involved suspicious activity. That volume—within just 100,000 requests—highlights the urgency of runtime protections for AI workloads.Enabling Security LeadershipChokshi emphasizes that modern security teams must engage collaboratively with business and data teams. As AI adoption outpaces security budgets, CISOs are looking for trusted, easy-to-deploy solutions that enable—not hinder—innovation. Akamai's goal: deliver scalable protections with minimal disruption, while helping security leaders shoulder the growing burden of AI risk.Learn more about Akamai: https://itspm.ag/akamailbwcNote: This story contains promotional content. Learn more.Guest: Rupesh Chokshi, SVP & General Manager, Application Security, Akamai | https://www.linkedin.com/in/rupeshchokshi/ResourcesLearn more and catch more stories from Akamai: https://www.itspmagazine.com/directory/akamaiLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, rupesh chokshi, akamai, rsac, ai, security, cisos, api, firewall, llm, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Join us on this week's episode of Insights into Technology, where we unravel the chaos caused by the latest Windows security update gone wrong, and explore how Apple's AirPlay is vulnerable to attack, putting millions of devices at risk. Discover how Cloudflare is heroically defending against unprecedented DDoS assaults, and delve into the brewing tension between tech giants OpenAI and Microsoft over AI's future. Plus, learn about Mastercard's AI-powered shopping assistant that's redefining online retail. With the backdrop of these technological upheavals, we'll guide you through the current landscape of innovation and its challenges.
Join us on this week's episode of Insights into Technology, where we unravel the chaos caused by the latest Windows security update gone wrong, and explore how Apple's AirPlay is vulnerable to attack, putting millions of devices at risk. Discover how Cloudflare is heroically defending against unprecedented DDoS assaults, and delve into the brewing tension between tech giants OpenAI and Microsoft over AI's future. Plus, learn about Mastercard's AI-powered shopping assistant that's redefining online retail. With the backdrop of these technological upheavals, we'll guide you through the current landscape of innovation and its challenges.
Nesse episódio trouxemos as notícias e novidades do mundo da programação que nos chamaram atenção dos dias 26/04 a 02/05.
Nesse episódio trouxemos as notícias e novidades do mundo da programação que nos chamaram atenção dos dias 26/04 a 02/05.
Link to episode page This week's Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest DJ Schleen, Head of Security, Boats Group Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO. All links and the video of this episode can be found on CISO Series.com
In episode 133 of Cybersecurity Where You Are, Sean Atkinson is joined by Lauren McFayden, Threat Intelligence Analyst at the Center for Internet Security® (CIS®). Together, they discuss the Distributed Denial of Service (DDoS) hacktivism of DieNet and how the group continues to evolve its Tactics, Techniques, and Procedures (TTPs). Here are some highlights from our episode:01:22. An overview of DieNet and its emergence on Telegram01:55. DDoS attacks and the potential for service disruptions02:55. DieNet's pro-Palestinian ideology and opposition to the 47th U.S. Presidential Administration05:00. U.S. and foreign targets claimed by the group06:30. DieNet's history of claiming attacks against U.S. critical national infrastructure (CNI)10:33. Two pieces of evidence used to partially assess the credibility of a claimed attack15:16. How DieNet v2 suggests an escalation of attack strategies20:43. How the DDoS hacktivist group may continue to evolve its TTPs in subsequent versions23:48. The use of the CIS Critical Security Controls (CIS Controls) to reduce an attack surface25:56. How ThreatWA stands out in keeping you informed about emerging threatsResourcesHacktivist Group DieNet Claims DDoS Attacks against U.S. CNIMS-ISAC Guide to DDoS AttacksThreatWACIS Critical Security Control 1: Inventory and Control of Enterprise AssetsCIS Critical Security Control 2: Inventory and Control of Software AssetsCIS Critical Security Control 3: Data ProtectionEpisode 44: A Zero Trust Framework Knows No EndIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
Scammers are getting smarter, understanding the psychology behind social engineering and the challenges companies face every day can help keep networks secure. This episode will show how to anticipate these threats and secure networks against ever-changing vulnerabilities. We'll focus on practical, real-world solutions to protect data and trust. Dr. Jared Smith joins us to share his insights from his role leading research and development at SecurityScorecard. He also co-founded UnCat, a B2B accounting technology company serving thousands of customers and teaches as an adjunct professor at the University of Tennessee, Knoxville and NYU. His experience shows why social engineering is so effective and how companies can adapt to a world where attackers are always refining their techniques. This episode shows how even small oversights or minor issues can lead to big breaches. Dr. Smith shares concrete steps to strengthen defenses, and why we need both technical solutions and employee awareness. By looking at the psychology behind the attacks, he'll show that staying one step ahead depends on using smart security tools and a culture that recognizes vigilance at every level. Show Notes: [01:19] Jared is a distinguished thought researcher at SecurityScorecard. He's built systems and helps vendors monitor and secure their networks. He also has a PHD in computer science. He focuses on Border Gateway Protocol or BGP. [02:16] He was also a high clearance government national security researcher. [03:02] Jared shares a story about how sophisticated phishing scams are becoming. [08:43] How large language models are making more sophisticated social engineering possible. [10:26] The importance of thinking about cybersecurity needed in the next 10 years. [11:02] BGP is like the plumbing of the internet. BGP poisoning breaks the typical internet traffic route. It's very nuanced traffic engineering that uses the Border Gateway Protocol. [13:34] BGP is also useful when you have multiple internet connections and one goes down. [14:20] The most sophisticated DDoS works are called link flooding attacks, where they identify links that have a certain amount of bandwidth, and they flood that specific border gateway protocol link, effectively segmenting the internet in those places. [15:39] Managing DDOS attacks and where the traffic comes from. [16:02] Being aware of botnets, because they are what's rented out or being used for these attacks. [17:32] Lizard Squad launched DDoS as a service. [21:00] Attackers try to get the actual IP addresses from behind a CDN. [23:41] How AWS has the ability to manage large amounts of traffic. [25:24] There are some DDoS that just require sending enough traffic to fill up the buffers on the other side of the application. [28:15] The size of a botnet for DDoS to take down a big network like X. We explore potential paths for these attacks. [32:21] We talk about the uptick on attacks during tax season. A large accounting firm with a lot of clients could be spoofed. [36:50] The predominant attacks are coming from organized cybercrime groups and ransomware groups. [45:40] The vast majority of large networks taken out are usually a result of user error. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Jared M. Smith Dr. Jared Smith - SecurityScorecard Dr. Jared Smith - LinkedIn Uncat Evasive AI Jared Smith - X
Uyghur Language Software Hijacked to Deliver Malware Cloudflare sees a big jump in DDoS attacks 4chan back online Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO.
Tal van overheidssites van gemeenten en provincies in Nederland waren vandaag een tijdlang niet bereikbaar als gevolg van een DDoS-aanval, die opgeëist is door de pro-Russische hackersgroep NoName. Joe van Burik vertelt erover in deze Tech Update. Ondertussen speelt er een massale stroomstoring in Spanje, Portugal en Frankrijk, waarbij niet volledig uit te sluiten is dat die veroorzaakt is door een cyberaanval. Die wordt nu namelijk opgeeist door een andere groep, Dark Storm, in een post op X waarin ook verwezen wordt de actie van NoName op de betreffende overheidssites in Nederland. Verder in deze Tech Update: IBM, het eens zo machtige techbedrijf in de VS, gaat de komende jaren 150 miljard dollar in eigen land investeren Nike wordt aangeklaagd door een groep die NFT's van Nike hadden gekocht, nadat het sportmerk afgelopen december de NFT-afdeling opdoekte See omnystudio.com/listener for privacy information.
Blizzard is getting DDOSed so be careful on your hardcore characters! Also, bugs are happening for everyone!
Os ataques cibernéticos não são mais os mesmos e, infelizmente, estão ficando cada vez mais sofisticados e difíceis de detectar. No novo episódio do Podcast Canaltech, recebemos Kleber Carriello, engenheiro de telecomunicações da NETSCOUT Brasil, para explicar como a Inteligência Artificial e a Internet das Coisas (IoT) estão sendo usadas por criminosos digitais para realizar ataques cada vez mais devastadores. Durante a entrevista, Carriello detalha o funcionamento de técnicas como o ataque slow-and-low, que imita o comportamento de usuários reais para enganar sistemas de defesa, e os perigos dos ataques DDoS multivetor, que misturam estratégias para derrubar serviços online. Ele também aponta caminhos possíveis para proteger empresas e usuários, inclusive com soluções que combinam mitigação local, análise em nuvem e machine learning. Você também vai conferir: Nova lei dos retrovisores entra em vigor no Brasil ChatGPT ganha galeria para salvar e organizar suas imagens criadas por IA Bike elétrica com carregamento via USB-C Nova febre do mundo fitness chega ao Brasil Nova interface cérebro-máquina do tamanho de um fio de cabelo pode controlar dispositivos com a mente Se você quer entender como funcionam essas ameaças modernas, por que elas estão mais difíceis de identificar e o que pode ser feito para se proteger, dá o play e vem com a gente nesse papo essencial sobre segurança digital no mundo hiperconectado. Este podcast foi roteirizado e apresentado por Fernanda Santos e contou com reportagens de Marcelo Fisher, Gabriel Cavalheiro, Lilian Sibila, Raphael Gianoti e Leo Alves.A trilha sonora é de Guilherme Zomer, a edição de Jully Cruz e a arte da capa é de Erick Teixeira.See omnystudio.com/listener for privacy information.
Chalked Cast and chill with the Chalked Squad - Support this podcast: https://podcasters.spotify.com/pod/show/chalked-cast/support0:00 - Intro4:08 - Tawk situation 9:07 - TECH roster drama JC Hammer / Evoh tweets, boost pad drama?21:00 - Turbopolsa vs Torment, How did Garrett decide which player to pick up? What makes a good RLCS team?32:26 - Back to roster moves, JKnaps and Retals to Shopify Rebellion, Jstn to GenG, what makes a good coach?47:38 - Final thoughts on Roster changes, Frosty to Complexity, Zineel to 9Lives, Yujin to Gentlemates55:17 - Full EU team in APAC, Th0, Tehqoz and Oscillon57:23 - Reysbull back to SAM, PWR pick up Lunr and Caleb with Gus, Toxiic to MENA, Maxeew joins Kinotrope, Team BDS return to RLCS1:03:35 - Rocket League Monthly Cash Cups!1:17:22 - The DDoS-er situation
Canon printer driver vulnerabilities enable Windows kernel exploitation. Astonishing cyber-security awareness from a household appliance manufacturer. France tries to hook 2.5 million school children with a Phishing test. Wordpress added an abuse prone feature in 2022. Guess what happened? Oracle? Is there something you'd like to tell us? Utah's governor just signed the App Store Accountability Act. Now what? AI bots hungry for new data are DDoSing FOSS projects. No Microsoft Account? No Microsoft Windows 11. Gmail claims it now offers E2EE. It kinda sorta does. Somewhat. A dreaded CVSS 10.0 was discovered in Apache Parquet. A bunch of terrific listener feedback. What's Multi-Perspective Issuance Corroboration and why must all certificate authorities now do it? Show Notes - https://www.grc.com/sn/SN-1020-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: material.security threatlocker.com for Security Now canary.tools/twit - use code: TWIT joindeleteme.com/twit promo code TWIT bitwarden.com/twit
Canon printer driver vulnerabilities enable Windows kernel exploitation. Astonishing cyber-security awareness from a household appliance manufacturer. France tries to hook 2.5 million school children with a Phishing test. Wordpress added an abuse prone feature in 2022. Guess what happened? Oracle? Is there something you'd like to tell us? Utah's governor just signed the App Store Accountability Act. Now what? AI bots hungry for new data are DDoSing FOSS projects. No Microsoft Account? No Microsoft Windows 11. Gmail claims it now offers E2EE. It kinda sorta does. Somewhat. A dreaded CVSS 10.0 was discovered in Apache Parquet. A bunch of terrific listener feedback. What's Multi-Perspective Issuance Corroboration and why must all certificate authorities now do it? Show Notes - https://www.grc.com/sn/SN-1020-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: material.security threatlocker.com for Security Now canary.tools/twit - use code: TWIT joindeleteme.com/twit promo code TWIT bitwarden.com/twit
Canon printer driver vulnerabilities enable Windows kernel exploitation. Astonishing cyber-security awareness from a household appliance manufacturer. France tries to hook 2.5 million school children with a Phishing test. Wordpress added an abuse prone feature in 2022. Guess what happened? Oracle? Is there something you'd like to tell us? Utah's governor just signed the App Store Accountability Act. Now what? AI bots hungry for new data are DDoSing FOSS projects. No Microsoft Account? No Microsoft Windows 11. Gmail claims it now offers E2EE. It kinda sorta does. Somewhat. A dreaded CVSS 10.0 was discovered in Apache Parquet. A bunch of terrific listener feedback. What's Multi-Perspective Issuance Corroboration and why must all certificate authorities now do it? Show Notes - https://www.grc.com/sn/SN-1020-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: material.security threatlocker.com for Security Now canary.tools/twit - use code: TWIT joindeleteme.com/twit promo code TWIT bitwarden.com/twit
Canon printer driver vulnerabilities enable Windows kernel exploitation. Astonishing cyber-security awareness from a household appliance manufacturer. France tries to hook 2.5 million school children with a Phishing test. Wordpress added an abuse prone feature in 2022. Guess what happened? Oracle? Is there something you'd like to tell us? Utah's governor just signed the App Store Accountability Act. Now what? AI bots hungry for new data are DDoSing FOSS projects. No Microsoft Account? No Microsoft Windows 11. Gmail claims it now offers E2EE. It kinda sorta does. Somewhat. A dreaded CVSS 10.0 was discovered in Apache Parquet. A bunch of terrific listener feedback. What's Multi-Perspective Issuance Corroboration and why must all certificate authorities now do it? Show Notes - https://www.grc.com/sn/SN-1020-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: material.security threatlocker.com for Security Now canary.tools/twit - use code: TWIT joindeleteme.com/twit promo code TWIT bitwarden.com/twit
Canon printer driver vulnerabilities enable Windows kernel exploitation. Astonishing cyber-security awareness from a household appliance manufacturer. France tries to hook 2.5 million school children with a Phishing test. Wordpress added an abuse prone feature in 2022. Guess what happened? Oracle? Is there something you'd like to tell us? Utah's governor just signed the App Store Accountability Act. Now what? AI bots hungry for new data are DDoSing FOSS projects. No Microsoft Account? No Microsoft Windows 11. Gmail claims it now offers E2EE. It kinda sorta does. Somewhat. A dreaded CVSS 10.0 was discovered in Apache Parquet. A bunch of terrific listener feedback. What's Multi-Perspective Issuance Corroboration and why must all certificate authorities now do it? Show Notes - https://www.grc.com/sn/SN-1020-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: material.security threatlocker.com for Security Now canary.tools/twit - use code: TWIT joindeleteme.com/twit promo code TWIT bitwarden.com/twit
Canon printer driver vulnerabilities enable Windows kernel exploitation. Astonishing cyber-security awareness from a household appliance manufacturer. France tries to hook 2.5 million school children with a Phishing test. Wordpress added an abuse prone feature in 2022. Guess what happened? Oracle? Is there something you'd like to tell us? Utah's governor just signed the App Store Accountability Act. Now what? AI bots hungry for new data are DDoSing FOSS projects. No Microsoft Account? No Microsoft Windows 11. Gmail claims it now offers E2EE. It kinda sorta does. Somewhat. A dreaded CVSS 10.0 was discovered in Apache Parquet. A bunch of terrific listener feedback. What's Multi-Perspective Issuance Corroboration and why must all certificate authorities now do it? Show Notes - https://www.grc.com/sn/SN-1020-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: material.security threatlocker.com for Security Now canary.tools/twit - use code: TWIT joindeleteme.com/twit promo code TWIT bitwarden.com/twit
Canon printer driver vulnerabilities enable Windows kernel exploitation. Astonishing cyber-security awareness from a household appliance manufacturer. France tries to hook 2.5 million school children with a Phishing test. Wordpress added an abuse prone feature in 2022. Guess what happened? Oracle? Is there something you'd like to tell us? Utah's governor just signed the App Store Accountability Act. Now what? AI bots hungry for new data are DDoSing FOSS projects. No Microsoft Account? No Microsoft Windows 11. Gmail claims it now offers E2EE. It kinda sorta does. Somewhat. A dreaded CVSS 10.0 was discovered in Apache Parquet. A bunch of terrific listener feedback. What's Multi-Perspective Issuance Corroboration and why must all certificate authorities now do it? Show Notes - https://www.grc.com/sn/SN-1020-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: material.security threatlocker.com for Security Now canary.tools/twit - use code: TWIT joindeleteme.com/twit promo code TWIT bitwarden.com/twit
Canon printer driver vulnerabilities enable Windows kernel exploitation. Astonishing cyber-security awareness from a household appliance manufacturer. France tries to hook 2.5 million school children with a Phishing test. Wordpress added an abuse prone feature in 2022. Guess what happened? Oracle? Is there something you'd like to tell us? Utah's governor just signed the App Store Accountability Act. Now what? AI bots hungry for new data are DDoSing FOSS projects. No Microsoft Account? No Microsoft Windows 11. Gmail claims it now offers E2EE. It kinda sorta does. Somewhat. A dreaded CVSS 10.0 was discovered in Apache Parquet. A bunch of terrific listener feedback. What's Multi-Perspective Issuance Corroboration and why must all certificate authorities now do it? Show Notes - https://www.grc.com/sn/SN-1020-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: material.security threatlocker.com for Security Now canary.tools/twit - use code: TWIT joindeleteme.com/twit promo code TWIT bitwarden.com/twit
The Daily Shower Thoughts podcast is produced by Klassic Studios. [Promo] Check out the Daily Dad Jokes podcast here: https://dailydadjokespodcast.com/ [Promo] Like the soothing background music and Amalia's smooth calming voice? Then check out "Terra Vitae: A Daily Guided Meditation Podcast" here at our show page [Promo] The Daily Facts Podcast. Get smarter in less than 10 minutes a day. Pod links here Daily Facts website. [Promo] The Daily Life Pro Tips Podcast. Improve your life in less than 10 minutes a day. Pod links here Daily Life Pro Tips website. [Promo] Check out the Get Happy Headlines podcast by my friends, Stella and Mickey. It's a podcast dedicated to bringing you family friendly uplifting stories from around the world. Give it a listen, I know you will like it. Pod links here Get Happy Headlines website. Shower thoughts are sourced from reddit.com/r/showerthoughts Shower Thought credits: AceofSpadesYT, rczrider, Crocodile_Banger, DDOS_the_Trains, Fitted4, Fingerbob73, Dinosaurs-Rule, Pengdacorn, Devastanteque, PhotographMobile5350, Oobrex, CounterSYNK, Professional_Denizen, jablair51, MidwestUnimpressed, fatheraabed, , brittanylovesphil, vaginalextract, , Epic-Gamer_09, badusernameused, jackmatelol, DrowningInFeces, baaabaaabitch, Firesondiego, deftmute, Queasy-Secret-4287, Certified_Cichlid, _F3lix_ Podcast links: Spotify: https://open.spotify.com/show/3ZNciemLzVXc60uwnTRx2e Apple Podcasts: https://podcasts.apple.com/us/podcast/daily-shower-thoughts/id1634359309 Stitcher: https://www.stitcher.com/podcast/daily-dad-jokes/daily-shower-thoughts iHeart: https://iheart.com/podcast/99340139/ Amazon Music: https://music.amazon.com/podcasts/a5a434e9-da18-46a7-a434-0437ec49e1d2/daily-shower-thoughts Website: https://cms.megaphone.fm/channel/dailyshowerthoughts Social media links Facebook: https://www.facebook.com/DailyShowerThoughtsPodcast/ Twitter: https://twitter.com/DailyShowerPod Instagram: https://www.instagram.com/DailyShowerThoughtsPodcast/ TikTok: https://www.tiktok.com/@dailyshowerthoughtspod Learn more about your ad choices. Visit megaphone.fm/adchoices
Big thanks to Radware for sponsoring this video and sharing technical insights with us! // Radware reports REFERENCE // Executive Summary: https://davidbombal.wiki/2025threats 2025 Global Threat Analysis Report: https://davidbombal.wiki/2025threatsu... // Pascal Geenens' SOCIAL // LinkedIn: / geenensp Website: https://www.radware.com/ // Radware SOCIAL // YouTube: / radwareinc Webinars: https://www.radware.com/newsroom/events/ LinkedIn / radware // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 01:03 - Intro 01:40 - What are the Reports About? 06:59 - Hacktivists (Dark Storm Team) 10:19 - DDos For Hire (Telegram) 13:24 - Check-Host.net 14:27 - Dienet 19:44 - How to Bring Down a Website 21:46 - DNS DDoS Attacks 26:28 - HTTP/2 29:22 - Botnet Capability 31:51 - Noname057 35:09 - Home Routers (TRS-069) 39:05 - Bullet Proof Cloud Services 45:13 - Vulnerable IoT 49:04 - Shodan (IoT Search Engine) 50:07 - Downloading Threats 52:45 - Application Programming Interfaces (APIs) 57:15 - Artificial Intelligence (AI) 01:06:49 - The Fight Against Bad AI 01:08:49 - How to Protect Yourself 01:14:52 - What is Radware? 01:16:00 - The Struggle of Downloading Models 01:20:06 - Should AI Keep your Data? 01:22:01 Connect with Pascal 01:22:36 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Support Inside Games on Patreon: https://www.patreon.com/insidegamesYTHosted by:Lawrence: http://twitch.tv/sirlarr | Bruce: http://twitch.tv/brucegreene Edited by:Shooklyn: https://linktr.ee/ShooklynSources --https://www.dexerto.com/world-of-warcraft/blizzard-servers-targeted-in-ddos-attacks-impacting-onlyfangs-hardcore-wow-raid-3167994/https://www.reddit.com/r/wowhardcore/comments/1ji817e/sodapoppin_declares_the_end_of_onlyfangs/https://www.wowhead.com/classic/news/ddos-attacks-against-blizzards-servers-lead-to-onlyfangs-wipe-in-blackwing-lair-376045https://us.forums.blizzard.com/en/wow/t/hardcore-deaths-from-ddos-are-not-okay-%E2%80%94-we-deserve-better/2081681https://www.twitch.tv/sodapoppinMusic —Switch It Up - Silent Partner https://youtu.be/r_HRbXhOir8Funk Down - MK2 https://youtu.be/SPN_Ssgqlzc
In this episode of Cisco Champion Radio, we dive into Cisco's groundbreaking efforts to simplify network architecture and streamline the future of networking. The discussion focuses on the evolution of network design, from the collapse of transponders into routers in routed optical networking to the benefits of adopting coherent optics and segment routing. We explore how Cisco's Crosswork automation solutions are driving efficiency in network management with features like multi-vendor support and automation for inventory, service provisioning, and assurance. Cisco's revolutionary Silicon One is also highlighted, showcasing its ability to reduce cost, footprint, and chip variants while enabling seamless integration of new functionality across networks. In addition, we look at the platform Cisco offers for hosting apps on iOS XR devices, including advanced security features like Edge Protect for DDoS mitigation, and how AI-driven traffic decisions are shaping the future of network performance. Resources: For more information, click here: o Cisco Agile Services Networking: https://www.cisco.com/site/us/en/solutions/service-provider/networking/agile-services/index.html o Cisco Routed Optical Networking: https://www.cisco.com/site/us/en/solutions/routed-optical-networking/index.html o Cisco Crosswork Network Automation: https://www.cisco.com/site/us/en/products/networking/software/crosswork-network-automation/index.html Customer Stories: o Swisscom adoption on Agile Services Networking: https://www.cisco.com/site/us/en/solutions/service-provider/networking/agile-services/index o Colt adoption on Agile Services Networking – Video: https://www.cisco.com/site/us/en/solutions/service-provider/networking/agile-services/index.html?socialshare=colt . Case Study: https://www.cisco.com/site/us/en/about/case-studies-customer-stories/colt-technology.html Cisco guest: Andy Schutz, VP Product Management, Cisco Cisco Champions Donald Robb, Principal Network Architect, The Walt Disney Liam Keegan, CTO, Rio Bravo Systems Alexander Deca, Principal Network Engineer, NTT Piere Besombes, Senior Network Engineer, Tech Leader, Rakuten
March 19, 2025: Troy Ament, Industry Leader for Healthcare at Palo Alto Networks Joins Drex for the News. The conversation delves into the importance of establishing relationships with law enforcement before a crisis occurs and why including them in tabletop exercises is crucial. Troy examines why threat actors deliberately target healthcare systems during weekend hours when staffing is minimal. From DDoS attacks serving as distractions to threat actors contacting board members directly, this episode provides an insider's view of today's cybersecurity landscape.Key Points:03:03 The FBI and Cyber Threats07:36 Ransomware Attack Patterns12:31 Distributed Denial of Service (DDoS) Attacks15:52 Personal and Organizational CybersecurityNews Articles:This is the FBI, open up. China's Volt Typhoon is on your networkInvestigator says differing names for hacker groups, hackers studying investigative methods hinders law enforcementX suffered a DDoS attack. Its CEO and security researchers can't agree on who did it.Subscribe: This Week HealthTwitter: This Week HealthLinkedIn: This Week HealthDonate: Alex's Lemonade Stand: Foundation for Childhood Cancer
Forecast = Router-geddon: Ballista storms brewing with a chance of unforgivable vulnerabilities. Patch umbrella required. In this episode of Storm ⚡ ️Watch, the crew laments the sorry state of modern edge computing through the lens of Steve Coley's 2007 paper on "Unforgivable Vulnerabilities". The discussion examines security flaws that should never appear in properly developed software yet continue to plague systems today. These vulnerabilities demonstrate a systematic disregard for secure development practices and would be immediately obvious to anyone with basic security awareness. The team breaks down "The Lucky 13" vulnerabilities, including buffer overflows, cross-site scripting, SQL injection, and hard-coded credentials, while also exploring how modern AI tools might inadvertently introduce these same issues into today's codebase, and how one might go about properly and safely use them in coding and security engineering. The episode also features an in-depth analysis of the newly discovered Ballista botnet that's actively targeting TP-Link Archer routers through a vulnerability discovered two years ago. First detected on January 10, 2025, this botnet has already infected over 6,000 devices worldwide, with the most recent activity observed in mid-February. The threat actors behind Ballista, believed to be based in Italy, have targeted organizations across multiple sectors including manufacturing, healthcare, services, and technology in the US, Australia, China, and Mexico. The botnet exploits CVE-2023-1389 to spread malware that establishes encrypted command and control channels, enabling attackers to launch DDoS attacks and further compromise vulnerable systems. The team rounds out the episode with updates from their partner organizations. Censys shares insights on JunOS vulnerabilities and the RedPenguin threat actor, along with an investigation into server misidentification issues. RunZero discusses the importance of cybersecurity labeling for end-of-life and end-of-support consumer IoT devices. GreyNoise alerts listeners to a new surge in SSRF exploitation attempts reminiscent of the 2019 Capital One breach and promotes their upcoming webinar on March 24th. As always, the Storm⚡️Watch crew delivers actionable intelligence and expert analysis to help security professionals stay ahead of emerging threats in the ever-evolving cybersecurity landscape. Storm Watch Homepage >> Learn more about GreyNoise >>
In this episode of Normal World, 1/4 Black Garrett and Angela are joined by returning guest Gerard Michaels, filling in for Dave Landau. They discuss Gerard's struggles with X (formerly Twitter) censorship after speaking out on the pharmaceutical industry and Israel, followed by a massive cyber attack on X. Elon Musk speculates it could be a coordinated effort from a group or nation, possibly Ukraine, while Gerard mocks Musk's uncertainty and explains DDoS attacks with humor. The conversation shifts to USAID funding protests, causing civil unrest and business destruction. They highlight government inefficiency, global tensions, and protests against Tesla, as well as a drop in Tesla stock. The conversation turns to Trump's unforced error targeting Representative Thomas Massey, contrasting steady conservatism with more spending. They talk about the economic consequences of tariffs, automation, and the collapse of work ethic among younger generations. The hosts critique the increasing influence of foreign entities on American politics and discuss the need for change in governance. The episode wraps with a discussion on the tragic murder of InfoWars reporter Jamie White in Austin, Texas. They also discuss Hollywood's casting issues, nepotism, and the impact of progressivism in entertainment. This episode of Normal World features Gerard Michaels. Go to https://republicanred.com/ and use code NORMAL for $5.00 off! Learn more about your ad choices. Visit megaphone.fm/adchoices
Cybersecurity Today: From DDoS Attacks to Developer Sabotage In today's episode, host Jim Love discusses several major cybersecurity incidents: the pro-Palestinian group Dark Storm's claimed DDoS attack on X Twitter and its implications; the impact of budget cuts from the Department of Government Efficiency on the US Cybersecurity and Infrastructure Security Agency; the recovery of $23 million from the Ripple wallet hack allegedly linked to the LastPass breach; New York State's lawsuit against Allstate Insurance for inadequate data security and resultant breaches compromising 200,000 individuals' data; and finally, the conviction of a developer who sabotaged his employer's systems post-termination. The episode underscores the importance of robust cybersecurity measures and responsible handling of personnel changes. 00:00 Pro-Palestinian Group Claims Credit for Twitter Outage 02:51 US Cybersecurity Agency Faces Devastating Cuts 04:23 US Authorities Recover $23 Million from Cryptocurrency Hack 06:31 New York Sues Allstate Over Data Breaches 09:12 Developer Sentenced for Malicious Code Sabotage 11:34 Support the Podcast
Drex analyzes three significant cybersecurity developments: the widespread outage of a major social media platform (formerly Twitter) caused by a DDoS attack claimed by hacker group Dark Storm Team, NIST's recent addition of the "govern function" to their cybersecurity framework that emphasizes optimizing existing tools over acquiring new ones, and concerning reports that OpenAI's latest GPT-4.5 model hallucinates 37% of the time, raising important questions about AI reliability for everyday users.Remember, Stay a Little Paranoid Subscribe: This Week Health Twitter: This Week Health LinkedIn: This Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer
Wes, Eneasz, and David keep the rationalist community informed about what's going on outside of the rationalist communitySupport us on Substack!News discussed:Making nuclear fusers is a DIY thing for tech people, but you can kill yourselfDoJ dismissed police/fire cases against Durham, Maryland, and South BendPEPFAR is not, in fact, backIt's effectiveness is probably overstated, but still substantialRFK says you should maybe, perhaps, consider getting the MMR vaccineTexas measles outbreak now has 29 hospitalizations and 1 deathKash Patel in as director of the ATF.25% tariffs went into effect on Mexico & CanadaExemptions for car makers. Also all USMCA-compliant goodsOntario put 25% surcharge on electricity sales to U.S.They backed down 20 minutes agoTrump: our tariffs will increase by however much you tariff us!Some Canada and Mexico tariffs paused, then more pausedTrump says we're increasing Canadian steel tariff to 50% and will increase tariff on cars April 2nd.Trump wants to sell green (“gold”) cards for $5 millionICE arrested a grad student Palestinian activist on a green cardVolokh: it's unclear if they can actually do thisBeing held in Louisiana.“Antisemitism Task Force” cut $400 million from Columbia universityAdministration revoked Chevron's license to pump oil in VenezuelaTrump EO: law firm that represented Hilary Clinton in 2016 loses security clearances, contracts, and access to federal buildings (like courts!)Trump DoJ dropped civil fraud charges against Justin Sun after he invested $75mil in Trump's shitcoinBitcoin lost value immediately after announcing Bitcoin ReserveThe CDC is doing a study on vaccines & autism. JFCAutism diagnoses have probably been rising because of incentives, not because of vaccinesduring state of union Rep Al Green was so disruptive he was escorted out by the sergeant-at-arms.Twitter is currently getting DDOS'd apparentlyArmed gunman arrested outside the White HouseSCOTUS: Trump must pay USAID contractors who completed work before EO was issuedSCOTUS: San Francisco can s**t all over the ocean and the EPA can't stop themVirologists found a coronavirus in bats that can spread to humans and did experiments with it in a lab that doesn't have good biosafety protocols. This year.Emergent Misalignment. Training an AI to write intentional vulnerable code will make it broadly evil across many domains!“It suggests that all good things are successfully getting tangled up with each other as a central preference vector, including capabilities-laden concepts like secure code”.See Zvi for a comprehensive postPoland planning to give military training to every adult male, wants an army of 500,000 (currently 200,000) and announces plans to develop a nuclear arsenal.Zelenski s**t the bed and torpedoed Ukrainian relations with the Trump adminA Nordic company refused to sell fuel to an American navy submarine, which is a decision you sure could make.US cut off intelligence sharing (satellite surveillance) with UkraineLast year US fit Ukrainian F-16s with EW pods (radar jammers). They require regular updates to remain useful, Trump is cancelling them (French fighter jets to step in)Europe is realizing US can just stop supporting the weapons they buythe Ukrainians threw a box of bees into a Russian bunker to clear it.The South Korean fighters bombed Seoul (by accident)Syria erupts in conflictKurdish break-away section of Syria agrees to reintegrate into SyriaHappy News!Sick video https://x.com/Firefly_Space/status/1898033592191582430Colorado Gov Polis moving to abolish 2-staircase requirement for midrise buildings.We have a new mRNA vaccine for pancreatic cancerChildren with autosomal recessive deafness 9 were given single shots of a new gene therapy in each ear, and after just a month, they were able to hear. (ht Cremieux)Covid killed Influenza B!Sweep The Leg Johnny!! Martial Arts instructor chases down purse-snatcher, kicks him in the leg, recovers purse.42-yr-old lady with black belt attacks a man robbing a gas station, kicks him in the leg, he flees.Troop DeploymentEneasz - Folks are sleeping on married peopleGot something to say? Come chat with us on the Bayesian Conspiracy Discord or email us at themindkillerpodcast@gmail.com. Say something smart and we'll mention you on the next show!Follow us!RSS: http://feeds.feedburner.com/themindkillerGoogle: https://play.google.com/music/listen#/ps/Iqs7r7t6cdxw465zdulvwikhekmPocket Casts: https://pca.st/vvcmifu6Stitcher: https://www.stitcher.com/podcast/the-mind-killerApple: Intro/outro music: On Sale by Golden Duck Orchestra This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit mindkiller.substack.com/subscribe
X was hit with a major DDOS attack yesterday, and a pro-Palestinian group took credit for taking the website down. However, Elon Musk claims the IP addresses appeared to originate from Ukraine. Glenn discusses the attack and wonders if Russia is actually the country behind the attack. Glenn and Pat also discuss a green card holder facing deportation after advocating for hate and division. Glenn lays out why our government has every right to deport this individual. Glenn explains why our government is at fault for the rising inflation for not working within the capitalistic framework and spending money the government doesn't actually have. If you're blowing up Teslas because you want to discourage people from buying Teslas, you're a terrorist. Glenn discusses Secretary of State Marco Rubio's latest move to cut 83% of USAID contracts and explains why he would have cut 100%. Author of "The Unarmed Truth" John Dodson joins to discuss the lawsuit Mexico filed against U.S. gunmakers, blaming them for the drug cartel violence plaguing Mexico. Why are your taxes paying for union members at TSA instead of protecting the airports? Glenn argues that airport security needs to be privatized. Glenn calls out a Salt Lake Tribune reporter for doxxing DataRepublican's husband. Learn more about your ad choices. Visit megaphone.fm/adchoices
BestPodcastintheMetaverse.com Canary Cry News Talk #822 - 03.10.2025 - Recorded Live to 1s and 0s XYBERPANDEMIC XIGILS | Dark Storm DDOS, Kim Jung Golf, New Newsom, Wooly Mice Deconstructing World Events from a Biblical Worldview Declaring Jesus as Lord amidst the Fifth Generation War! CageRattlerCoffee.com SD/TC email Ike for discount Join the Canary Cry Roundtable This Episode was Produced By: Executive Producers Anonymous*** Sir Jamey Not the Lanister*** Sir LX Protocol Baron of the Berrean Protocol*** Producers of TREASURE (CanaryCry.Support) Cage Rattler Coffee Producers of TALENT Eden Pearl, JonathanF, Shoofly, Psalm40, Sir Sammons Knight of the Fishes, MDBS Producers of TIME Timestampers: Jade Bouncerson, Morgan E Clippy Team: Courtney S, JOLMS, Kristen Reminders: Clankoniphius Links: JAM SHOW NOTES/TIMESTAMPS HELLO WORLD EFNO RUN DOWN EXECS MEMES JD Vance memes must be devastating (Slate) Tha Atlantic is Catching on, meme ddos attack (The Atlantic) Forbes Nails it (Forbes) JD Vance memes NEWSOM Clip: Kirk Gives away the sauce to Newsome Clip: Newsom Book Burning Clip: Newsome on Transgender sports Newsom Says Transgender Athletes Playing In Women's Sports Is “Deeply Unfair” (Vanity Fair) TEXT MESSAGES ELON Dark Storm Team Claims DDoS Attack on X, Causing Major Outage: Live Updates (Newsweek) → BLM Plaza dismantling begins (X) Musk's Tesla facilities in US face 'Takedown' protests (BBC) Clip: Tesla protest, woman speaks on why they are protesting Clip: Burning cybertruck BITCOIN Establishment of Bitcoin Reserve (White House) Clip: David Sacks on why we need a Strategic Bitcoin Reserve (X) → More from David Sacks on the EO UKRAINE Clip: MSNBC Guest Iraq War Vet Paul Rieckhoff, Ukraine more American than Americans (X) PRODUCERS NORTH KOREA Kim Jong-un 'caught disguising North Korea military base as a golf course' (Mirror UK) NEPHILIM/CRISPR Woolly mice are a first step to resurrecting mammoths, but long way to go (Conversation) TALENT/MEET UP TIME/END SHOW NOTES/TIMESTAMPS HELLO WORLD EFNO RUN DOWN EXECS MEMES JD Vance memes must be devastating (Slate) Tha Atlantic is Catching on, meme ddos attack (The Atlantic) Forbes Nails it (Forbes) JD Vance memes NEWSOM Clip: Kirk Gives away the sauce to Newsome Clip: Newsom Book Burning Clip: Newsome on Transgender sports Newsom Says Transgender Athletes Playing In Women's Sports Is “Deeply Unfair” (Vanity Fair) TEXT MESSAGES ELON Dark Storm Team Claims DDoS Attack on X, Causing Major Outage: Live Updates (Newsweek) → BLM Plaza dismantling begins (X) Musk's Tesla facilities in US face 'Takedown' protests (BBC) Clip: Tesla protest, woman speaks on why they are protesting Clip: Burning cybertruck BITCOIN Establishment of Bitcoin Reserve (White House) Clip: David Sacks on why we need a Strategic Bitcoin Reserve (X) → More from David Sacks on the EO UKRAINE Clip: MSNBC Guest Iraq War Vet Paul Rieckhoff, Ukraine more American than Americans (X) PRODUCERS NORTH KOREA Kim Jong-un 'caught disguising North Korea military base as a golf course' (Mirror UK) NEPHILIM/CRISPR Woolly mice are a first step to resurrecting mammoths, but long way to go (Conversation) TALENT/MEET UP TIME/END
A federal judge blocks the deportation of Palestinian activist Mahmoud Khalil, igniting debates on free speech as Trump and Rubio weigh in, while Candace Owens exposes AIPAC's unique influence on American politics. Meanwhile, Congressman Thomas Massie faces Trump's wrath after opposing government spending, revealing how AIPAC's reach extends into Congress. In the digital war, Elon Musk claims X is under a massive DDoS attack, with IPs traced back to Ukraine, as Rumble's Chris Pavlovski reports similar targeting—raising questions about coordinated cyber efforts against alternative media platforms. Get started today for just $99 per month for your first three months by using code BRAND at http://joincrowdhealth.com. Mandatory Disclaimer: CrowdHealth is not insurance. Go to http://brickhouserussell.com and use my code BRAND for 20% off to get you started.
March 11, 2025Have you had your dose of The Daily MoJo today? Download the APP HERE"Ep 031125 - Trump's Tanking Economy - The Daily MoJo"A countdown to a launch leads to discussions on National Worship of Tools Day and serious issues like cyber attacks from Dark Storm. DDoS attacks are explained, followed by critiques of political statements and new legislation banning THC in Texas. The economy's transitional phase is linked to political decisions, while concerns about red flag laws and cultural controversies arise. The dialogue also touches on real estate preferences, climate change skepticism, and upcoming podcast topics.Phil Bell's Morning Update - Is Trump Tanking The Economy? HEREDan Andros - host of The QuickStart Podcast and Managing Editor at CBN.com - has a few things to say about the Climate Change hysterics & tiny homes.Dan on XOur affiliate partners:Romika Designs is an awesome American small business that specializes in creating laser-engraved gifts and awards for you, your family, and your employees. Want something special for someone special? Find exactly what you want at MoJoLaserPros.com There have been a lot of imitators, but there's only OG – American Pride Roasters Coffee. It was first and remains the best roaster of fine coffee beans from around the world. You like coffee? You'll love American Pride – from the heart of the heartland – Des Moines, Iowa. AmericanPrideRoasters.com Find great deals on American-made products at MoJoMyPillow.com. Mike Lindell – a true patriot in our eyes – puts his money where his mouth (and products) is/are. Find tremendous deals at MoJoMyPillow.com – Promo Code: MoJo50 Life gets messy – sometimes really messy. Be ready for the next mess with survival food and tools from My Patriot Supply. A 25 year shelf life and fantastic variety are just the beginning of the long list of reasons to get your emergency rations at PrepareWithMoJo50.comStay ConnectedWATCH The Daily Mojo LIVE 7-9a CT: www.TheDailyMojo.com (RECOMMEDED)Rumble: HEREFacebook: HEREMojo 5-0 TV: HEREFreedomsquare: HEREOr just LISTEN:The Daily MoJo Channel Become a supporter of this podcast: https://www.spreaker.com/podcast/the-daily-mojo-with-brad-staggs--3085897/support.
X suffers a major DDoS attack causing multiple outages, AI chatbots cannot be trusted to cite factual information, and Bluesky now allows 3-minute video uploads. MP3 Please SUBSCRIBE HERE for free or get DTNS Live ad-free. A special thanks to all our supporters–without you, none of this would be possible. If you enjoy what youContinue reading "X Suffers A Major DDoS Attack Causing Multiple Outages – DTH"
TALK TO ME, TEXT ITFreedom of speech under attack? The recent DDoS assault on X raises alarming questions about who's targeting our digital town squares. Though Ukraine faces accusations, the real culprits may lurk closer to home among politicians with concerning foreign connections.The window for meaningful accountability seems to be narrowing. As journalist Nick Sorter aptly observes, "We need to start perp walking people while the momentum is in our favor." This urgency reflects a growing concern that public demand for justice could fade without decisive action now. Meanwhile, in the culture wars, we're spotlighting true activism beyond social media posturing - particularly the courageous work of Kelly J. Keene, whose "Let Women Speak" events confront transgender activism head-on with remarkable effectiveness.From Olympic glory to FBI's Most Wanted - the shocking transformation of snowboarder Ryan Wedding into an alleged cartel-connected drug kingpin serves as a dark reminder of how dramatically lives can derail. We also examine the troubling case of Wendy Williams, potentially held against her will in an assisted living facility despite showing signs of coherence in recent media appearances. Is this another example of guardianship abuse? Finally, the tragic murder of InfoWars reporter Jamie White near his Austin home highlights growing safety concerns in a once-peaceful city. Join the conversation about these pressing issues and don't forget to answer our question of the day - what's your perfect baked potato topping combination? Exit bumper Not A Democracy Podcast Network made by @FuryanEnergySupport the showTip Jar for coffee $ - Thanks Blog - Carol ReMarksX - Carol ReMarks Instagram - Carol.ReMarksFacebook Page - Carol ReMarks Blog
Kicking off the new week with a little news, and some open topics for calls. Twitter and Rumble under DDoS attack. The craziness that is incubated on Reddit is nothing new, but some have begun to wonder if this is being allowed/promoted to prompt heavy-handed censorship measures on the internet—@LibsOfReddit (Instagram) and @reddit_lies (Twitter/x), whose accounts regularly document the illness displayed on Reddit, join us for comment. Open lines in the second half for whatever is on the audience's mind, including how YOU alleviate stress! Unleash Your Brain w/ Keto Brainz Nootropic Promo code FRANKLY: https://tinyurl.com/2cess6y7 Read the latest Quite Frankly Bulletin: http://www.tinyurl.com/5c8ybku7 Sponsor The Show and Get VIP Perks: https://www.quitefrankly.tv/sponsor Badass QF Apparel: https://tinyurl.com/f3kbkr4s Elevation Blend Coffee: https://tinyurl.com/2p9m8ndb One-Time Tip: http://www.paypal.me/QuiteFranklyLive Send Holiday cards, Letters, and other small gifts, to the Quite Frankly P.O. Box! 15 East Putnam Ave, #356 Greenwich, CT, 06830 Send Crypto: BTC: 1EafWUDPHY6y6HQNBjZ4kLWzQJFnE5k9PK LTC: LRs6my7scMxpTD5j7i8WkgBgxpbjXABYXX ETH: 0x80cd26f708815003F11Bd99310a47069320641fC For Everything Else Quite Frankly: Official Website: http://www.QuiteFrankly.tv Official Forum: https://bit.ly/3SToJFJ Official Telegram: https://t.me/quitefranklytv Twitter Community: https://tinyurl.com/5n8zmwx8 GUILDED Chat: https://bit.ly/3SmpV4G Discord Chat: https://discord.gg/KCdh92Fn Twitter: @QuiteFranklyTV Gab: @QuiteFrankly Truth: @QuiteFrankly GETTR: @QuiteFrankly MINDS: @QuiteFrankly Streaming Live On: QuiteFrankly.tv (Powered by Foxhole) FULL Episodes On Demand: Spotify: https://spoti.fi/301gcES iTunes: http://apple.co/2dMURMq Amazon: https://amzn.to/3afgEXZ SoundCloud: http://bit.ly/2dTMD13 Google Play: https://bit.ly/2SMi1SF BitChute: https://bit.ly/2vNSMFq Rumble: https://bit.ly/31h2HUg Kick: https://kick.com/quitefranklytv
Cybersecurity Today: Rising Fraud in Canada and Major Cyber Crime Crackdowns Welcome to another episode of Cybersecurity Today with your host, Jim Love. As fraud prevention month begins, we delve into the rising fraud rates in Canada, with new data from Equifax revealing Canadians' growing concerns about data protection, particularly among seniors and Quebec residents. We also cover the significant international law enforcement actions that dismantled the 8Base ransomware group and Garantex, a Russian cryptocurrency exchange linked to cybercriminal activities. Additionally, we discuss the emergence of a new botnet orchestrating record-breaking DDoS attacks, highlighting the persistent vulnerabilities in IoT devices. Don't miss our deeper analysis and the latest updates in cybersecurity. 00:00 Introduction to Fraud Prevention Month 00:23 Rising Fraud Concerns in Canada 02:24 Law Enforcement Actions Against Cyber Crime 04:34 Emergence of a New Botnet 06:46 Conclusion and Upcoming Shows
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: Did the US decide to stop caring about Russian cyber, or not? Adam stans hard for North Korea's massive ByBit crypto-theft Cellebrite firing Serbia is an example of the system working Starlink keeps scam compounds in Myanmar running Biggest DDoS botnet yet pushes over 6Tbps This week's episode is sponsored by network visibility company Corelight. Vincent Stoffer, field CTO at Corelight joins to talk through where eyes on your network can spot attackers like Salt and Volt Typhoon. This episode is also available on Youtube. Show notes Sygnia Preliminary Bybit Investigation Report Verichains Bybit Incident Investigation Preliminary Report North Koreans finish initial laundering stage after more than $1 billion stolen from Bybit | The Record from Recorded Future News Risky Bulletin: Trump administration stops treating Russian hackers as a threat - Risky Business Did Trump Admin Order U.S. Cyber Command and CISA to Stand Down on Russia? (Story updated) Russia to redeploy resources freed up by end of war in Ukraine, warns Finnish intelligence | The Record from Recorded Future News FBI urges crypto community to avoid laundering funds from Bybit hack | The Record from Recorded Future News Risky Bulletin: Cellebrite bans bad boy Serbia - Risky Business Belgium probes suspected Chinese hack of state security service | The Record from Recorded Future News Gabbard: UK demand to Apple for backdoor access is 'grave concern' to US | The Record from Recorded Future News Elon Musk's Starlink Is Keeping Modern Slavery Compounds Online | WIRED U.S. Soldier Charged in AT&T Hack Searched “Can Hacking Be Treason” – Krebs on Security Google Password Manager finally syncs to iOS—here's how - Ars Technica Gmail Security Alert: Google To Ditch SMS Codes For Billions Of Users Massive Iran-linked botnet launches DDoS attacks against telecom, gaming platforms | Cybersecurity Dive Microsoft-signed driver used in ransomware attacks | Cybersecurity Dive London member of ‘Com' network convicted of making indecent images of children | The Record from Recorded Future News Volt Typhoon & Salt Typhoon Attackers Are Evading EDR: What Can You Do? | Corelight
eM Client CAN be purchased outright. An astonishing 5-year-old typo in MasterCard's DNS. An unwelcome surprise received by 18,459 low-level hackers. DDoS attacks continue growing, seemingly without any end in sight. Let's Encrypt clarifies their plans for 6-day "we barely knew you" certificates. SpinRite uncovers a bad brand new 8TB drive. Listener feedback about TOTP, Syncthing and UDP hole punching, email spam, ValiDrive speed, AI neural nets, DJI geofencing, and advertising in the "New" Outlook. A look into the tradeoffs required to obtain privacy for our DNS lookups Show Notes - https://www.grc.com/sn/SN-1010-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: uscloud.com joindeleteme.com/twit promo code TWIT bitwarden.com/twit zscaler.com/security