Cyber attack disrupting service by overloading the provider of the service
POPULARITY
Categories
A senior FBI cyber official warns Salt Typhoon remains an ongoing threat. Data protection authorities issue a joint statement raising serious concerns about AI image creation. A Japanese semiconductor equipment maker confirms a ransomware attack. New number formats seek to reduce AI overhead. A low-skilled Russian-speaking threat actor compromised more than 600 Fortinet FortiGate firewalls. Spanish authorities have arrested four alleged members of Anonymous. CISA tags a pair of Roundcube Webmail flaws. Cybersecurity stocks fell sharply on news of a new security feature in Claude AI. Monday business breakdown. Brandon Karpf, friend of the show discussing sovereignty in space and cyber. Digital disruption drains drumsticks. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today Dave sits down with Brandon Karpf, friend of the show, and Maria Varmazis, host of T-Minus, as they are discussing sovereignty in space and cyber. Selected Reading FBI: Threats from Salt Typhoon are ‘still very much ongoing' (CyberScoop) Joint Statement on AI-Generated Imagery and the Protection of Privacy (International Enforcement Cooperation Working Group (IEWG)) Japanese chip-testing toolmaker Advantest suffers ransomware attack (Help Net Security) AI's Math Tricks Don't Work for Scientific Computing (IEEE) Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls (Infosecurity Magazine) Suspected Anonymous members cuffed in Spain over DDoS attack (The Register) CISA: Recently patched RoundCube flaws now exploited in attacks (Bleeping Computer) Anthropic Unveils 'Claude Code Security,' Sending Cyber Stocks Lower (Bloomberg) RSAC Innovation Sandbox finalists secure $5 million each. (N2K Pro Business Briefing) Cyber attack takes major chicken processor Hazeldenes offline leaving businesses without meat (ABC News) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
An AI-driven hacking campaign breached 600 Fortinet devices, Ivanti was hacked via its own product, Wikipedia bans Archive-dot-Today for DDoS attacks, and Chinese hackers breached Italy's police force. Show notes Risky Bulletin: AI-driven hacking campaign breaches 600+ Fortinet devices
Narty się skończyły, pora wrócić do rzeczywistości, która w świecie technologii pędzi szybciej niż kiedykolwiek. W dzisiejszym odcinku Tomek, Wojtek i Sebastian analizują miesiąc pełen "wow momentów", kontrowersji wokół autonomicznych agentów i fundamentalnych zmian w procesie tworzenia oprogramowania.W tym odcinku:
On April 15th, 2025, something unthinkable happened—4chan was hacked. Not just /b/, not just /pol/, but the very structure of the site was compromised. The boards were flooded with fake posts, the archives rewritten, and some users even claimed their data was leaked. But what really happened? Who's behind the breach? And why is no one in the mainstream media covering the 4chan hack of 2025? In this video, we break down everything you need to know about the April 15 4chan breach: the timeline of the attack, the suspected motivations, the potential groups involved (yes, even Anonymous has been name-dropped), and what it all means for the future of fringe internet culture. This wasn't just a simple DDoS—it was surgical, methodical, and deeply symbolic. Whether you're a longtime 4chan user, a culture junkie, or just curious about how one of the most infamous websites on the internet got utterly wrecked, this video will catch you up on everything. From /g/ to /v/, no board was spared. This hack may very well be the beginning of the end for 4chan as we know it. Watch now to uncover the truth behind the 4chan hack, and decide for yourself—was this an inside job, a rival board, or something even bigger? ------------------------------------------------------------ Wanna send me mail? ReddX Family Castillejos Post Office C/O Nico Garcia Castillejos Zambales Philippines 2208 #4chanHack #InternetHistory #Anonymous #Cybersecurity #WebChaos Discord: https://discord.gg/Sju7YckUWu Twitch: https://www.twitch.tv/daytondo... PayPal: https://www.paypal.me/daytondo... Patreon: http://patreon.com/daytondoes Twitter: http://www.twitter.com/daytond... YouTube: https://www.youtube.com/channe... Discord: https://discord.gg/Sju7YckUWu Twitch: https://www.twitch.tv/daytondo... PayPal: https://www.paypal.me/daytondo... Patreon: http://patreon.com/daytondoes Twitter: http://www.twitter.com/daytond... Facebook: https://www.facebook.com/ReddX... Merch: https://reddx-shop.fourthwall....
Este conteúdo é um trecho do nosso episódio: ”#229 Ataque x defesa: o novo dilema da segurança digital”. Nele, Pedro Dantas, Head de Segurança na dti digital, explica como a inteligência artificial está transformando o cenário de cibersegurança em uma corrida onde atacantes e defensores disputam vantagem tecnológica. Ele ainda reflete sobre a importância da tecnologia para capacitar profissionais que ainda não possuem conhecimento especializado profundo, como os desenvolvedores juniores. Dê o play e ouça agora! Assuntos abordados: IA potencializando ataques cibernéticos; IA na automatização de defesas; Precisão em detecção de ataques DDoS; "Gato e rato" na cibersegurança; Vantagem estratégica dos atacantes; Conhecimento especializado em defesas. Links importantes: Vagas disponíveis Newsletter Dúvidas? Nos mande pelo Linkedin Contato: entrechaves@dtidigital.com.br O Entre Chaves é uma iniciativa da dti digital, uma empresa WPP
On this eye-opening episode, cybersecurity expert Adam Goslin joins Todd Coshow to reveal how AI-enabled prompts are rewriting the rules of cyber threats. Most of us are blissfully unaware that AI-driven attack vectors like "Promptware" are already lurking in everyday tools, and a simple calendar invite could secretly become a cyber weapon. If you think your devices are safe, think again. Learn how hackers are embedding hidden prompts into your favorite apps and messages, capable of turning on your camera, stealing geolocation, or even launching DDoS attacks without you realizing it.
Voor €5 koopt een tiener een DDoS-aanval op YouTube. En dat is nog het minst schokkende dat Barry van Kampen ons vertelt. Van TikTok-kanalen die kinderen ronselen als hackers tot een 14-jarige die 170.000 bots bij elkaar bouwde — de digitale wereld van jongeren is wilder dan de meeste ouders beseffen. Barry “Fish” van Kampen is security technologist bij Exmon, digitaal specialist bij de politie én drijvende kracht achter meerdere initiatieven die jongeren cyberveilig maken. Hij neemt ons mee door de complete “trechter”: van HackShield (de educatieve game voor basisschoolleerlingen) via Hack in the Class en Rebootcamp tot de DIVD Academy, waar jonge hackers een positieve carrière in cybersecurity kunnen opbouwen. Voor wie toch de verkeerde kant op gaat, bestaat HackRight — een alternatieve straf waarbij jonge daders digitale opdrachten uitvoeren in plaats van straat prikken. Onderweg hoor je waarom verbieden zonder dialoog niet werkt, hoe kinderen via Discord en Telegram gemanipuleerd worden, en waarom e-mail eigenlijk een kutplatform is. Over Barry van Kampen Barry “Fish” van Kampen is security technologist bij Exmon en digitaal specialist bij de politie. Hij richtte Hack in the Class op, is medeoprichter en voorzitter van DIVD Academy, medeoprichter van OrangeCon, ambassadeur bij HackShield en oprichter van Hackerspace Random Data in Utrecht. E-mail: barry@xmon.nl (zakelijk), barry@divd.academy (community) LinkedIn DIVD: https://divd.nl In deze aflevering 0:00:00 Voor €5 koop je een DDoS-aanval op YouTube0:02:06 Waarom je kinderen beter kunt leren hacken dan het te verbieden0:07:48 De trechter: van HackShield tot cybersecurity-carrière0:12:55 Hoe TikTok en Discord kinderen ronselen voor cybercrime0:18:10 Smartphones verbieden zonder dialoog werkt niet0:22:16 Rebootcamp: scouting voor jonge hackers0:33:08 DIVD Academy en de weg naar een positieve carrière0:38:39 HackRight: een alternatieve straf voor jonge cybercriminelen0:47:26 Barry’s eigen origin story: van phonefreaking tot purple team0:55:53 De grootste veranderingen in cybercrime in tien jaar1:07:10 Waarom e-mail een waardeloos medium is1:11:00 Bonus: de man die 709 miljoen aan bitcoin op de vuilnisbelt gooide Genoemd in deze aflevering HackShield — educatieve cybersecurity-game voor kinderen (8-12 jaar) DIVD (Dutch Institute for Vulnerability Disclosure): DIVD Academy re_B00TCMP — interventie/scouting voor jonge hackers Hack_Right — alternatieve straf voor minderjarige cybercriminelen OrangeCon — cybersecurity-conferentie Hackerspace Randomdata Utrecht COPS (Cyber Offender Prevention Squad) MNOT 426 over HackShield (met Emily Jacometti en Tim Murck) MNOT 456 over smartphonevrij opgroeien James Howell — verloor 8.000 bitcoin op een vuilnisbelt in Newport, Wales Tips van de tafel Barry: Ga de dialoog aan met je kinderen over wat ze online doen. Verbieden zonder uitleg werkt niet — zodra het half vier is staan ze alsnog op hun telefoon. Leer ze de spelregels: “If you don’t own it, you won’t pwn it.” Randal: Wees bewust met je data in AI-tools. Gebruik ze slim (bijvoorbeeld via Claude Code op je eigen server) in plaats van alles klakkeloos in een chatvenster te slepen. Barry: Kijk eens kritisch naar je e-mail inbox. Staat er een scan van je paspoort in? Dan staat die ook in de inbox van een ander. E-mail is daar niet voor gemaakt. See omnystudio.com/listener for privacy information.
チェック・ポイント・ソフトウェア・テクノロジーズ株式会社は2月9日、「金融業界サイバー脅威動向レポート2025年版(2025 Finance Threat Landscape Report)」を発表した。
The recent U.S. Executive Order 14365, Ensuring a National Policy Framework for Artificial Intelligence, is the administration's latest attempt to prevent the enforcement of most of the AI laws passed in individual US states. Because it is only an executive order (EO), it cannot directly nullify, supersede, forestall, or put a pause on state-level laws.... Read more »
The recent U.S. Executive Order 14365, Ensuring a National Policy Framework for Artificial Intelligence, is the administration's latest attempt to prevent the enforcement of most of the AI laws passed in individual US states. Because it is only an executive order (EO), it cannot directly nullify, supersede, forestall, or put a pause on state-level laws.... Read more »
Today on Tech and Science Daily from The Standard: the UK sets out new measures aimed at protecting universities from foreign interference, as concerns grow about pressure on researchers and sensitive collaboration. Plus, a record-setting DDoS attack is linked to the AISURU/Kimwolf botnet — a reminder that insecure everyday devices can end up powering serious cyber disruption. And in gaming, Sony confirms a 60+ minute State of Play landing this week, with major updates expected for the PS5 slate. We also look to science, with new research pointing to an empty lava tube beneath Venus, and a fresh method for measuring energy loss in nanoscale systems that could help shape future electronics. Hosted on Acast. See acast.com/privacy for more information.
Episode S12E11 avec Aurélien, Sébastien B., Sévastien S., et Thierry.• (00:00:00) : • De ClawdBot a OpenClaw, en passant par MoltBook (00:02:23) : L'agent IA personnel dont tout le monde parle. (Sources : openclaw.ai et moltbook.com) • La CNIL donne une amende de 3 millions (00:26:44) : Mais est-ce finalement bien raisonnable? (Source : lefigaro.fr) • L'Inauguration de FAMES, une ligne pilote pour le Chip Act (00:38:56) : L'UE veut produire des puces électroniques plus rapidement. (Sources : www.cea.fr et nxp.com) • Une centrale solaire suisse sur rails à Buttes (00:48:16) : SNCF s'associe à Sun-Ways pour installer une centrale solaire sur rails à Buttes. (Source : latele.ch) • Claude AI, ou la fin d'une profession (00:53:42) : Et le futur de l'humanité, dans tout ça? (Source : clubic.com) • Le réacteur nucléaire : avec ou sans glaçons ? (01:12:48) : Vous avez déjà propulsé des glaçons d'hydrogène à 1800km/h? (Source : www.cea.fr) • Retour du CES avec une paire de lunettes (01:17:38) : Even Realities G2 est la première paire de lunettes AR que j'achèterais réellement. (Sources : lifehacker.com, dezeen.com et evenrealities.com) • Quand La Poste française est attaquée (01:31:16) : La plus grande attaque DDoS en France. (Source : zdnet.fr) Retrouvez toutes nos informations, liens, versions du podcast via notre site Abonnez-vous à notre infolettre afin d'être informé de notre veille technologique de la semaine et de la parution de nos épisodes
V této epizodě se podíváme na případ Moltbooku – AI sociální sítě, která byla prezentována jako revoluce, ale realita ukázala úplně jiný obrázek.Zůstaneme v Česku u podvodných webů vydávajících se za státní instituce a varování policie. Ukážeme i pozitivní roli AI v bezpečnosti, kdy model Claude pomohl odhalit stovky kritických chyb v open-source kódu.Na závěr se dotkneme rekordních DDoS útoků a zranitelnosti v OpenClaw, kde k napadení stačil jediný klik.
Referências do EpisódioThe Shadow Campaigns: Uncovering Global EspionageKnife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework2025 Q4 DDoS threat report: A record-setting 31.4 Tbps attack caps a year of massive DDoS assaultsPro-Russian group Noname057(16) launched DDoS attacks on Milano Cortina 2026 Winter OlympicsRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Jeff & Shannon expose communist interference, ICE sabotage funding, and Rumble DDOS attacks—plus JoRae Perkins' Senate run in OR, Tulsi under fire, and elites showing their true colors. Shredding the deep state live—tune in at Rumble, YouTube, X and Red State Talk Radio! Patriots, the communists are dropping the mask—Season 8 Episode 021 “Z-2-ZLC” rips into the raw, unfiltered battle unfolding right now! @intheMatrixxx and @shadygrooove dive headfirst into JoRae Perkins' powerhouse update and bold move into the Oregon US Senate race, while a middle school green-lights kids to protest ICE—proof the indoctrination pipeline is running full throttle. They expose Siembra North Carolina's training sessions teaching people to spot unmarked ICE vehicles, blow whistles, and obstruct federal agents—straight-up anti-ICE funding laid bare for all to see. Dan Bongino's massive Rumble revival gets hammered by a blatant DDOS attack just before President Trump joins, yet the platform fights back—classic censorship playbook against truth-tellers. The hosts break down the DJT gaggle on AF1 heading to Dan Scavino's wedding, spotlight Mandami's commie problem as his own voters turn on him, and call out the real intent behind the coordinated attacks on law enforcement and Trump's agenda. From Rumble resilience to communists revealing their hand, this episode is packed with live intel and zero apologies. The truth is learned, never told. The constitution is your weapon. Tune in at noon-0-five Eastern LIVE to stand with Trump! MG Show: America First MAGA Podcast & Conservative Talk Show Launched in 2019 and now in Season 8, the MG Show is your go-to source for unfiltered truth on Trump policies, border security, economic nationalism, and exposing globalist psyops. Hosted by Jeffrey Pedersen (@InTheMatrixxx) and Shannon Townsend (@ShadyGrooove), it champions sovereignty, traditional values, and critiques of establishment politics. Tune in weekdays at 12pm ET / 9am PT for patriotic insights strengthening the Republic under President Trump's America First agenda. Hosts - Jeffrey Pedersen (@InTheMatrixxx): Expert in political analysis and exposing hidden agendas, with a focus on Trump's diplomatic wins and media bias. - Shannon Townsend (@ShadyGrooove): Delivers sharp insights on intelligence operations, Constitutional rights, and defenses of Trump's strategies against mainstream critiques. Where to Watch & Listen Catch live episodes or on-demand replays packed with MAGA victories like inflation drops, border awards, Trump pardons, and psyop exposures: - Live Streams: https://rumble.com/mgshow for premium America First content. - Radio: https://mgshow.link/redstate on Red State Talk Radio. - X Live: https://x.com/inthematrixxx for real-time pro-Trump discussions. - Podcasts: Search "MG Show" on PodBean, Apple Podcasts, Pandora, and Amazon Music. - YouTube: Full episodes at https://youtube.com/c/inthematrixxx and https://www.youtube.com/c/TruthForFreedom. Follow for daily pro-Trump alerts: - X: @InTheMatrixxx (https://x.com/inthematrixxx) and @ShadyGrooove (https://x.com/shadygrooove). Support the MG Show Fuel the MAGA movement against establishment lies: - Donate: https://mg.show/support or contribute at https://givesendgo.com/helpmgshow. - Merch: https://merch.mg.show for official gear. - MyPillow Special: Use code MGSHOW at https://mypillow.com/mgshow. - Crypto: https://mgshow.link/rumblewallet. All Links Everything MG Show Related: https://linktr.ee/mgshow. MG Show Anthem Get chills with the patriotic track: https://youtu.be/SyfI8_fnCAs
Notes:Dr Bekkers describes his academic pathway from psychology to criminology and explains why his research focus has consistently been on offenders and their behaviour rather than on offences or technologies.Cybercrime offenders are often portrayed as a homogeneous group of highly skilled hackers, but research shows they are a heterogeneous population with distinct motivations, skills, and pathways into crime.A key distinction can be made between financially motivated cybercrime, such as online fraud, and more technically complex cyber-dependent crimes such as hacking, DDoS attacks, and website defacement.Financially motivated cybercrime offenders often resemble traditional offline offenders and may commit both online and offline crimes, with similar risk factors, peer influences, and personality profiles.Technically skilled cyber offenders tend to show different characteristics, including higher levels of self-control and intrinsic motivations such as curiosity, challenge, and skill development.Research suggests that traditional criminological theories still help explain some forms of cybercrime, particularly financially motivated offences, while other forms require additional or adapted theoretical approaches.Gaming environments may act as pathways into certain forms of cybercrime by facilitating skill development, exposure to deviant peers, and access to illicit online forums, though gaming may also be protective in some contexts.Parental supervision and open communication may play a role in shaping online behaviour, similar to the role of guardianship and social control in offline offending.Law enforcement responses differ depending on the type of cybercrime, with financially motivated offences often handled by local police and more technical crimes investigated by specialized units.Dr Bekkers highlights the need for longitudinal research and greater engagement with offenders to better understand pathways into cybercrime and to inform prevention and intervention strategies.About our guest:Dr Luuk Bekkershttps://www.thuas.com/research/research-groups/team-cybercrime-cybersecurityhttps://www.linkedin.com/in/luuk-bekkers-79621b162/Papers or resources mentioned in this episode:Bekkers, L. M. J., Moneva, A., & Leukfeldt, E. R. (2025). Distinct group, distinct traits? A comparison of risk factors across cybercrime offenders, traditional offenders and non-offenders. Psychiatry, Psychology and Law, 1–25. https://doi.org/10.1080/13218719.2025.2546311Bekkers, L. M., Holt, T. J., & Leukfeldt, E. R. (2025). The psychological correlates of cybercrime offending: Exploring the self-control/social learning relationship in serious cyber-dependent crime. European Journal of Criminology, 0(0). https://doi.org/10.1177/14773708251378356Bekkers, L. M. J., Holt, T. J., & Leukfeldt, E. R. (2025). Exploring the factors that differentiate individual and group offenders in cyber-dependent crime. Journal of Criminal Justice, 101, 102522. https://doi.org/10.1016/j.jcrimjus.2025.102522
BS Section and House Keeping Discord Server geekoholics.com/discord/ Whatcha Been Playing? Spider-Man 2 - PS Pro Upgraded to deluxe - Game trials ( Borderlands 4, Expeditions, Ball x Pit) Humanity HighGuard Blood West Gorn 2 - VR Trialled tutorial in VR for Demeo X DND News: Cross Platform / PC / Misc. Ubisoft Unions Vote to Strike Disney Afternoon collection incoming Monster Hunter Wilds gets patch to fix DLC performance issue Blizzard announces four showcases over the next two weeks for World of Warcraft, Overwatch, Hearthstone and Diablo Fantasy MMO from husband-and-wife duo who worked on formative games like EverQuest and Asheron's Call leaves Steam early access after 8 years Arc Raiders hit with "extensive, coordinated DDoS attacks" Nintendo Dispatch will be censored on Nintendo Platforms Xbox Xbox Developer Direct PSA's: Epic Games Store Freebies: Definitely Not Fried Chicken Playstation+ Feb Games revealed Free 4 All Watching - Devil May Cry Anime Watching - Misfits Watching - Trap Help support the show: - Subscribe to our Twitch channel http://twitch.tv/geekoholics - Please review the show (bit.ly/geekoholics) on Apple Music, Apple Podcasts and to share with your friends!
ARC Raiders has been hit with a cyber attack. In this episode, host Paul John Spaulding, Kyle Haglund, VP, Audio Engineering at Cybercrime Magazine, and Sam White, Video Producer at Cybercrime Magazine, discuss this news, alongside a discussion about the Ubisoft union proposing a mass walkout and Scotland's Chief Games Officer. • For more on cybersecurity, visit us at cybersecurityventures.com
If you like what you hear, please subscribe, leave us a review and tell a friend!
Podcast: Safe Mode Podcast (LS 25 · TOP 10% what is this?)Episode: Opportunistic by Default: How OT gets pulled into the blast radiusPub date: 2026-01-29Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Safe Mode, we look at how opportunistic campaigns—often starting as loud disruption like DDoS—can probe for weak points and, in some cases, move closer to operational technology and industrial control systems. Using a recent Justice Department case tied to pro‑Russia hacktivist groups as a jumping-off point, we discuss what this pattern says about the OT threat landscape in 2025, from remote access and trust boundaries to engineering workflows and data integrity risk. Chris Grove, Director of Cybersecurity Strategy at Nozomi Networks, joins to explain what defenders should prioritize now to keep “noise” from becoming real-world operational impact.The podcast and artwork embedded on this page are from Safe Mode Podcast, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
If you like what you hear, please subscribe, leave us a review and tell a friend!
In this week's Security Sprint, Dave and Andy covered the following topics:Opening:• Cyber Insights 2026: Information Sharing (SecurityWeek, 16 Jan 2026)• ICYMI: Homeland Republicans underscore importance of strong public-private sector partnerships to deter cyber threats — House Homeland Security Committee (Majority) | Jan 17, 2026 Main Topics:Pro-Russia hacktivist activity continues to target UK organisations & NCSC warns of hacktivist groups disrupting UK online services (UK National Cyber Security Centre, Jan 2026). The NCSC reports sustained, low-sophistication but high-volume hacktivist campaigns—primarily DDoS and website defacements—linked to pro-Russia narratives and opportunistic targeting of UK public- and private-sector organizations. While technically unsophisticated, the activity is persistent, media-aware, and designed to generate disruption, reputational harm, and psychological impact rather than deep network compromise. The NCSC emphasizes preparedness measures including DDoS resilience, clear incident communications, and executive awareness that “noise” activity can still impose real operational cost. • Russia-linked APT28 targets energy and defense groups tied to NATO • UAT-8837 targets critical infrastructure sectors in North America • A Day Without ICS: The real impact of ICS/OT security threats Ransomware• Worldwide ransomware roundup: 2025 end-of-year report • Global ransomware attacks rose 32% in 2025, as manufacturers emerged as top target• 2025 Shattered Records: Key takeaways from the GRIT 2026 Ransomware & Cyber Threat Report• DeadLock Ransomware: Smart Contracts for Malicious Purposes Domestic Operations: Joint Interagency Task Force-Counter Cartel (JIATF-CC) established & US Northern Command establishes JTF-GOLD Quick Hits:• (TLP:CLEAR) Assessing Terrorism Trends on the Horizon in 2026 — WaterISAC — Jan 15, 2026 • UK NCSC: Designing safer links: secure connectivity for operational technology• NCSC UK: Secure connectivity principles for OT (collection) • FBI: Secure Connectivity Principles for Operational Technology (OT) (PDF)• ACSC (Australia): New publication for small businesses managing cyber risks from AI • Artificial intelligence for small business: Managing cyber security risks• Developing your IT recovery plan (Canadian Centre for Cyber Security, Jan 2026)• Improving cyber security resilience through emergency preparedness planning (Canadian Centre for Cyber Security, Jan 2026)• Developing your incident response plan (Canadian Centre for Cyber Security, Jan 2026)• Developing your business continuity plan (Canadian Centre for Cyber Security, Jan 2026)
Neste episódio do Camada 8, conversamos com Daniel Damito, CEO e fundador da Sage Networks. Daniel falou sobre sua carreira, sua participação na comunidade técnica e como foi a sua trajetória no empreendedorismo, criando uma empresa com foco em mitigação de ataques DDoS. Além disso, também foram discutidos temas relevantes como tendências tecnológicas, incluindo o uso de Inteligência Artificial no combate a ataques DDoS, o futuro da segurança de redes e dicas para quem quer empreender na área.Dê o play e confira agora mesmo o novo episódio do quadro Fluxo Empreendedor do Camada 8!#FluxoEmpreendedor #Empreendedorismo #DDoS #MitigacaoDDoSParticipantes:Antonio Marcos Moreiras (Host) - Gerente de projetos e desenvolvimento no NIC.brhttps://www.linkedin.com/in/moreiras Eduardo Barasal Morales (Host) - Coordenador da área de formação de sistemas autônomos do Ceptro.br no NIC.br https://www.linkedin.com/in/eduardo-barasal-moralesDaniel Damito (Convidado) - CEO na Sage Networkshttps://www.linkedin.com/in/daniel-damito/Links citados:Semana de Infraestrutura da Internet no Brasil: https://semanainfra.nic.br/Agenda de cursos do Ceptro|NIC.br: https://ceptro.br/cursos-eventosRedes Sociais:https://www.youtube.com/nicbrvideos/https://x.com/comuNICbr/https://www.telegram.me/nicbr/https://www.linkedin.com/company/nic-br/https://www.instagram.com/nicbr/https://www.facebook.com/nic.br/https://www.flickr.com/NICbr/Contato:Equipe Ceptro.brcursosceptro@nic.brDireção e áudio:Equipe Ceptro.brEquipe de Comunicação do NIC.brEdição completa por Rádiofobia Podcast e Multimídia: https://radiofobia.com.br/Veja também:https://nic.br/https://ceptro.br/
We're just over a week into 2026 but already, enterprise cybersecurity teams will be hard at work repelling attacks – and business leaders will be worrying about the year ahead.On the one hand, we're told that AI tools are beginning to empower security teams to go further and faster. On the other, the use of AI by hackers to launch attacks also appears to be on the rise.All of this is happening against a backdrop of rising geopolitical tensions and continual attacks by state-sponsored hacking groups against businesses. How will all this come together in 2026 and beyond?In this episode, Jane and Rory are joined by Jamie Collier, lead advisor in Europe at Google Threat Intelligence Group, to explore the risks – both novel and ordinary – enterprises face in 2026.Read more:NCSC issues urgent warning over growing AI prompt injection risks – here's what you need to knowCyber experts have been warning about AI-powered DDoS attacks – now they're becoming a realitySalt Typhoon attack on US congressional email system ‘exposes how vulnerable core communications systems remain to nation-state actors'OpenAI says prompt injection attacks are a serious threat for AI browsers – and it's a problem that's ‘unlikely to ever be fully solved'OpenAI turns to red teamers to prevent malicious ChatGPT use as company warns future models could pose 'high' security riskA flaw in Google's new Gemini CLI tool could've allowed hackers to exfiltrate dataGoogle says you shouldn't worry about AI malware – but that won't last long as hackers refine techniquesNorth Korean IT workers: The growing threatNorth Korean hackers...
In this episode of The Digital Executive, host Brian Thomas sits down with David Sztyman, Chief Architect at Hydrolix, to explore how real-time streaming data and AI are reshaping observability and security operations. Drawing on two decades of experience across streaming, caching, security, and analytics, David explains why scale remains a constant challenge—and why traditional data warehouses can't keep up with today's real-time demands.The conversation dives into the critical role of streaming data architectures in detecting issues as they happen, from video performance problems to active security threats like DDoS attacks. David also shares a pragmatic approach to AI, emphasizing how teams can use machine learning and LLMs selectively to detect anomalies without driving up costs. Looking ahead, he discusses the rise of AI agents, automated remediation, and natural-language access to data—capabilities that will make observability and security insights accessible to far more people across the enterprise.If you liked what you heard today, please leave us a review - Apple or Spotify. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Send us a textCheck us out at: https://www.cisspcybertraining.com/Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkoutGet access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouvYour TV, camera, or even a smart bird feeder can be a beachhead for attackers. We dive into the Kimwolf botnet and expose how low-cost IoT turns into residential proxies that scan, DDoS, and quietly pivot across your home or enterprise network. From weak defaults and exposed ADB to shady apps, we call out the telltale signs and the simple architecture changes that shut the door: dedicated IoT VLANs, strict egress controls, and logging that actually sees what leaves your network.Then we switch gears into CISSP Domain 7.1 and break down what a defensible investigation looks like when the alarms go off. Evidence collection starts with a mindset: don't touch originals, document everything, and assume you'll need to defend the process in court. We cover IOCE-aligned practices, creating bit-for-bit copies with hashes, and when to engage a forensic retainer so you are not building a plan mid-incident. Memory captures, media recovery, network telemetry, and software analysis all play a role in reconstructing the timeline and proving what happened.Legal readiness sits at the core. We talk about involving counsel early, understanding insurer-approved panels, and mapping out rules of engagement for interviews and device access in your IR policy and onboarding. We clarify evidence authorities—voluntary surrender, subpoenas, and search warrants—plus the three evidence types and how chain of custody preserves admissibility. By the end, you'll have a clear blueprint: segment IoT, monitor outbound traffic, and run investigations that survive scrutiny.If this helped sharpen your security playbook, subscribe, share with your team, and leave a quick review to help others find the show.Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Coordinated scams target MENA region Pen Test Partners accused of 'blackmail' Hackers steal record $2.7B in crypto in 2025 Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us March 4–6 in Orlando, plus a live CISO Series episode on March 6. Get $200 off with ZTWCISO26 at ztw.com.
EP 271. For this week's holiday update:Santa's naughty list exposed in data breach. A lighthearted reminder from a past holiday hoax: even Santa's list isn't immune to data breaches.How China Built Its 'Manhattan Project' To Rival the West in AI Chips. China's clandestine push to master extreme ultraviolet lithography signals a major leap toward semiconductor self-sufficiency, challenging Western dominance in AI-enabling technology.Apple Fined $116 Million Over App Privacy Prompts. Italy's antitrust authority has penalized Apple €100 million for imposing stricter privacy consent requirements on third-party apps than on its own, tilting the playing field in the App Store ecosystem.Cyberattack Disrupts France's Postal & Banking Services During Christmas Rush. A major DDoS attack crippled La Poste's online services and banking arm at the peak of the holiday season, highlighting the vulnerability of critical infrastructure during high-traffic periods.Browser Extensions With 8 Million Users Collect Extended AI Conversations. Popular Chrome and Edge extensions trusted by millions have been caught secretly harvesting full AI chat histories, raising serious concerns about privacy in everyday browsing tools.How a PNG Icon Infected 50,000 Firefox Users. A clever malware campaign hid malicious JavaScript inside innocent-looking PNG extension icons, infecting tens of thousands of Firefox users through trusted add-ons.Most Parked Domains Now Serving Malicious Content. Expired and typosquatted domains, once benign placeholders, now predominantly redirect users to scams, malware, and fraudulent sites, making casual web navigation riskier than ever.What's up with the TV? Massive Android Botnet infects 1.8 Million Devices. The Kimwolf botnet has compromised over 1.8 million Android TV boxes, turning everyday smart devices into powerful tools for proxy traffic and massive DDoS attacks.Mass Hacking of IP Cameras Leave Koreans Feeling Vulnerable in Homes, Businesses. Widespread breaches of 120,000 internet-connected cameras in South Korea exposed private footage sold online, eroding public trust in consumer surveillance technology.The FCC has barred new imports of foreign-made drones, citing unacceptable risks of espionage and disruption, with DJI-the market leader-facing the most significant impact.FSF Says Nintendo's New DRM Allows Them to Remotely Render User Devices 'Permanently Unusable' Nintendo's updated terms grant the company sweeping authority to remotely disable Switch consoles and accounts for perceived violations, sparking debate over true ownership in the digital age.This week we've got the sleigh piled high, so call out the reindeer and we'll get this update out to children all over the world!
Spotify music library scraped DDoS disrupts France's postal and banking services Fake delivery websites hit holiday shoppers Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us March 4–6 in Orlando, plus a live CISO Series episode on March 6. Get $200 off with ZTWCISO26 at ztw.com.
In today's episode of iGaming Daily, SEO expert Ivana Flynn is joined by Sean Bianco, Co-founder of Gain Changer, as the duo discuss the brutal reality of modern iGaming SEO, the rise of negative SEO warfare, and what affiliates must do to survive heading into 2026.Tune in to today's episode to find out:Why Google core updates are wiping out iGaming affiliates overnightHow fake DMCA takedowns and DDoS attacks are being used to steal rankingsWhy relying on a single website is now a critical business riskThe role automation plays in defending and scaling SEO assetsWhat strategies and partnerships are essential to survive the “cowboy” iGaming marketHost: Ivana FlynnGuest: Sean BiancoProducer: Anaya McDonaldEditor: Anaya McDonaldiGaming Daily is also now on TikTok. Make sure to follow us at iGaming Daily Podcast (@igaming_daily_podcast) | TikTok for bite-size clips from your favourite podcast. Finally, remember to check out Optimove at https://hubs.la/Q02gLC5L0 or go to Optimove.com/sbc to get your first month free when buying the industry's leading customer-loyalty service.
Watch The X22 Report On Video No videos found (function(w,d,s,i){w.ldAdInit=w.ldAdInit||[];w.ldAdInit.push({slot:17532056201798502,size:[0, 0],id:"ld-9437-3289"});if(!d.getElementById(i)){var j=d.createElement(s),p=d.getElementsByTagName(s)[0];j.async=true;j.src="https://cdn2.decide.dev/_js/ajs.js";j.id=i;p.parentNode.insertBefore(j,p);}})(window,document,"script","ld-ajs");pt> Click On Picture To See Larger PictureThe [CB][WEF] is struggling, Trump and team has designated the offshore wind projects as a national security risk. They have been paused. The people are still struggling with the [CB] system, soon the people will get their buying power back. The [CB] will try to stop Trump’s new economic system, it will fail. The [DS] is feeling the pain every step of the way. The criminal syndicate money laundering system is being exposed is the blue states. The people are waking up to the real system that has been hidden from them. The [DS] continues to tax the people for the money laundering system. Trump is continually countering the [DS], he is using Emissaries to negotiate the peace deals. The [DS] is blind to the conversation. Economy Trump Administration Announces Change to Offshore Wind Construction President Donald Trump's Department of the Interior is pausing offshore wind project construction due to “national security risks.” “Due to national security concerns identified by the Department of War, Interior is PAUSING leases for 5 expensive, unreliable, heavily subsidized offshore wind farms!” Interior Secretary Doug Burgum wrote on X. “ONE natural gas pipeline supplies as much energy as these 5 projects COMBINED,” Burgum added. “POTUS is bringing common sense back to energy policy & putting security FIRST!” Leases with Vineyard Wind1, Revolution Wind, CVOW, Sunrise Wind, and Empire Wind will be paused. Source: dailysignal.com https://twitter.com/elonmusk/status/2002605302932517339?s=20 Gas is About to Get Expensive . . . A gallon of gas costs about twice as much in California as it does pretty much anywhere else in the United States. The reason why, of course, is that California makes it cost about twice as much – by reducing supply and by adding costs, chiefly for “environmental” reasons. This includes a new requirement – going into effect very soon (Dec. 31) that all gas stations must either replace single-walled underground storage tanks or permanently close them – no matter whether the tanks are actually leaking and no matter how much it costs to replace them. It is estimated that about 473 gas stations in California are going to close – because the owners cannot afford the mandatory underground storage tank upgrade costs or the $5,000 per day fines for non-compliance. At the same time, the state's regulatory bureaucracy has essentially shut down supply by denying 97 percent of permits for new refineries to supply the extra-special (and extra-expensive) gasoline formulations that all gas stations in California are required to sell. If this hypothetical scenario ends up becoming the actual scenario it could result in the collapse of California as a state. Source: ericpetersautos.com https://twitter.com/KobeissiLetter/status/2003104230945464505?s=20 As a % of total employment, multiple jobholders rose to 5.8%, nearly matching the 2 previous highs seen over the last 25 years. At the same time, Americans working primary full-time and secondary part-time jobs jumped to 5.3 million, the 2nd-highest in history. As a % of employment, this metric now stands at 3.4%, the 2nd-highest since 2000. The cost of living crisis is real. (function(w,d,s,i){w.ldAdInit=w.ldAdInit||[];w.ldAdInit.push({slot:18510697282300316,size:[0, 0],id:"ld-8599-9832"});if(!d.getElementById(i)){var j=d.createElement(s),p=d.getElementsByTagName(s)[0];j.async=true;j.src="https://cdn2.decide.dev/_js/ajs.js";j.id=i;p.parentNode.insertBefore(j,p);}})(window,document,"script","ld-ajs"); https://twitter.com/KobeissiLetter/status/2003109247232655382?s=20 Political/Rights Teary-Eyed Bus Driver Speaks Out After Getting FIRED for Posting a ‘Racially Insensitive' Sign on School Bus Window In Response to Unruly Spanish-Speaking Kid – DOJ to Launch Investigation (VIDEO) An elderly bus driver terminated earlier this year for posting a so-called ‘racially insensitive' sign toward a Spanish-speaking kid has broken her silence and the DOJ is launching an investigation. The note on the window read, “Out of respect to English-only students, there will be no speaking Spanish on this bus.” Crawford, who had served the school district as a bus driver for more than 30 years, was promptly suspended and later lost her job posting the note. https://twitter.com/_johnnymaga/status/2002937980013650119?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E2002937980013650119%7Ctwgr%5E9387ff3c86f279c9837393510bf08034917fc6bd%7Ctwcon%5Es1_c10&ref_url=https%3A%2F%2Fwww.thegatewaypundit.com%2F2025%2F12%2Fteary-eyed-bus-driver-speaks-after-getting-fired%2F https://twitter.com/AAGDhillon/status/2002952621032677759?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E2002952621032677759%7Ctwgr%5E9387ff3c86f279c9837393510bf08034917fc6bd%7Ctwcon%5Es1_c10&ref_url=https%3A%2F%2Fwww.thegatewaypundit.com%2F2025%2F12%2Fteary-eyed-bus-driver-speaks-after-getting-fired%2F Source: thegatewaypundit.com https://twitter.com/EndWokeness/status/2002782448191693130?s=20 https://twitter.com/C_3C_3/status/2002906389560414648?s=20 SEATTLE https://twitter.com/KeenanPeachy/status/2002902633439445012?s=20 https://twitter.com/PressSec/status/2003099681778499980?s=20 https://twitter.com/FBIDirectorKash/status/2002822669507379549?s=20 This is part of a year long effort FBI has undertaken with state and local law enforcement all across the country to crack down on child abusers and take them off the street. That work has seen historic results. -6,000 children located or reduced – up 22% from 2024 -Nearly 2,000 child predators arrested – up 10% -300+ human traffickers arrested – up 15% Lives being saved. We're not letting up. DOGE Geopolitical https://twitter.com/elonmusk/status/2002602838149697684?s=20 https://twitter.com/AlboMP/status/2002974532475490578?s=20 https://twitter.com/visegrad24/status/2003101218076545039?s=20 Cyberattack disrupts France’s postal service, banking during Christmas rush A suspected cyberattack has knocked France's national postal service and its banking arm offline during the busy Christmas season The postal service, called La Poste, said in a statement that a distributed denial of service incident, or DDoS, “rendered its online services inaccessible.” It said the incident had no impact on customer data, but disrupted package and mail delivery. There was no immediate claim of responsibility. France and other European allies of Ukraine allege that Russia is waging “hybrid warfare” against them, using sabotage, assassinations, cyberattacks, disinformation and other hostile acts that are often hard to quickly trace back to Moscow. Source: tribdem.com War/Peace Kushner and Witkoff Reportedly Draft $112B Plan to Turn Gaza Into ‘Smart City' With Beach Resorts, High-Speed Rail, and AI Grids — U.S. Pushes Back on Claims It Would Foot $60B Project Sunrise,” envisions a decade-long, $112.1 billion redevelopment effort featuring beachside luxury resorts, high-speed rail, and AI-optimized infrastructure. The draft proposal was developed by a team led by Jared Kushner, President Trump's son-in-law, and U.S. special envoy Steve Witkoff, along with senior White House aide Josh Gruenbaum and other administration officials. The plan is being presented to prospective donor governments via a 32-slide PowerPoint labeled “sensitive but unclassified,” U.S. officials told the Journal. According to the presentation, Project Sunrise would convert Gaza's devastated landscape into a modern coastal metropolis. New Rafah (Credit: Wall Street Journal) Smart City (Credit: Wall Street Journal) However, the proposal does not specify which governments or private entities would ultimately finance the project, nor does it detail where Gaza's roughly two million displaced residents would live during reconstruction, according to WSJ. The draft estimates total costs at $112.1 billion over 10 years, including humanitarian relief, infrastructure rebuilding, and public-sector payrolls. https://twitter.com/StateDept_NEA/status/2002545412729942278?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E2002545412729942278%7Ctwgr%5Ef3310cb42b34b4ad502fd5957962a1d8fbe38397%7Ctwcon%5Es1_c10&ref_url=https%3A%2F%2Fwww.thegatewaypundit.com%2F2025%2F12%2Fkushner-witkoff-reportedly-draft-112b-plan-turn-gaza%2F The proposal also assumes that Gaza could begin to self-fund portions of the development in later years, eventually paying down debt as economic activity expands. Source: thegatewaypundit.com https://twitter.com/disclosetv/status/2003088356876677484?s=20 Macron Seeks New Talks With Putin, Forcing ‘Alternative’ Path To Stalled US Negotiations Suddenly French President Emmanuel Macron is deciding to revive his diplomacy with Moscow and is Macron wants to step in to force France’s say in any future outcome or settlement, rather than wait on the diplomatic sidelines. Arming Kiev to the teeth has done nothing but prolong the needless killing, and perhaps at least some European capitals are beginning to realize this. Source: zerohedge.com https://twitter.com/BRICSinfo/status/2003114957060137421?s=20 to be killed in a bombing this year.” Russian General Killed By Car Bomb In Moscow, Marks 3rd Top Officer Assassinated In A Year This adds to a growing list of high profile assassinations related to the Ukraine war. To review: —Darya Dugina was killed in a car bombing in 2022 which was likely meant for her father, prominent political thinker and often dubbed “Putin ally” Aleksandr Dugin. —Gen Igor Kirillov died in December 2024 outside of his residence when a bomb planted in a nearby scooter detonated. —Gen Yaroslav Moskalik, who served as deputy head of the Main Operations Directorate of the General Staff of the Russian Armed Forces, was killed in a car bomb attack last April. A “homemade” explosive device detonated under his Volkswagen Golf in a residential neighborhood. Throughout the course of the war there’s been a string of these high profile assassinations on Russian soil involving car and even cafe bombs. America’s CIA or Britain’s MI6 has long been suspected of being involved in these targeted killings, or at least assisting in such brazen Ukrainian-linked operations, but ultimately little has been uncovered or proven in terms of a potential Western hidden hand in this ongoing ‘dirty war’. Source: zerohedge.com https://twitter.com/LeadingReport/status/2002809124674035943?s=20 Medical/False Flags [DS] Agenda DOJ Charges California Food Stamp Official for Sending Benefits to Dead People – Then Spending Them Federal prosecutors have charged a longtime California welfare worker with carrying out a multi-year fraud scheme involving food assistance benefits and dead people. The U.S. Department of Justice announced the arrest of former Madera County benefits eligibility worker Leticia Mariscal, 55, of Madera. Prosecutors alleged that Mariscal stole tens of thousands of dollars in CalFresh benefits by exploiting her access to county databases. CalFresh is California's version of the Supplemental Nutrition Assistance Program. According to the Justice Department, the alleged scheme took place between December 2020 and April 2025. https://twitter.com/FBISacramento/status/1999625371268886611?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1999625371268886611%7Ctwgr%5Ee26f93739a10984d47aeb35b0088270daeb01aef%7Ctwcon%5Es1_c10&ref_url=https%3A%2F%2Fwww.thegatewaypundit.com%2F2025%2F12%2Fdoj-charges-california-food-stamp-official-sending-benefits%2F Source: thegatewaypundit.com https://twitter.com/KevinKileyCA/status/2002791344566411594?s=20 “high-risk.” This means they exhibit serious “waste, fraud, abuse, or mismanagement,” costing taxpayers billions. The number has doubled during Newsom’s tenure. I bet you California fraud is 10 times worse than Minnesota. https://twitter.com/EricLDaugh/status/2002457150904238280?s=20 taxpayer dollars, per NYP. A HUD audit found that at least 221 deceased people received grants. MORE FRAUD! Expose it all! (VIDEO) Thomas Massie and Ro Khanna Announce Plans to Bring Inherent Contempt Charges Against Attorney General Pam Bondi Over Epstein Files – “We're Building a Bipartisan Coalition” Reps. Thomas Massie (R-KY) and Ro Khanna (D-CA), the authors of the Epstein Files Transparency Act, signed into law by President Trump last month, announced their intention to bring charges for inherent contempt against Attorney General Pam Bondi. Under the rarely used congressional power, “the House or Senate has its Sergeant-At-Arms, or deputy, take a person into custody for proceedings to be held in Congress,” according to the National Constitution Center. However, it is unclear how effective this would be in the face of legal challenges and the executive branch's power. This is the latest in an escalating saga of threats, with Massie and Khanna claiming the DOJ has not complied fully with the law due to redactions in the files and not releasing every document available. Deputy Attorney General Todd Blanche appeared on NBC's Meet the Press this morning, where he dared Massie and Khanna to “bring it on,” maintaining that the DOJ is simply following the law and taking the necessary time to make redactions before releasing all of the files. Blanche told NBC's Kristen Welker that ensuring victim information is redacted “very much Trumps some deadline in the statute,” and he dared Khanna and Massie to file Articles of Impeachment. “We are complying with the statute, we will continue to comply with the statute, and if by complying with the statute, we don't produce everything on Friday, we produce things next week, and the week after, that's still compliance with the statute,” Blanche added. Source: thegatewaypundit.com Trump is ‘bored, tired and running on fumes’ — and he’s given up the fight: analyst A year into his second term, Donald Trump has undergone a major change in “tactics” as he deflects questions about his policies — and it’s an indication that he is now “just running on fumes,” an analyst wrote Monday. Salon's Amanda Marcotte pointed out that the president has developed an over-reliance on deflecting questions while claiming he is not up to speed on the topic or person he is being asked about, and that often begins with, “I don't know…” That is a change from his previous deflections, where he promised everything would sort itself out in “two weeks.” Source: rawstory.com President Trump's Plan https://twitter.com/amuse/status/2002836773236306381?s=20 polygraph which they claim he failed to justify keeping their activities secret from Trump’s team. Scott isn’t blocking Plankey because he’s unqualified, he’s blocking him until Trump restores a Coast Guard shipbuilding contract for one of his major political donors Brian D'Isernia – he’s the CEO of Eastern Shipbuilding Group. Scott's hold has blocked Plankey from being included in the bipartisan nominations package the Senate GOP leadership is advancing before year-end. Because the Senate is winding down for the session, that procedural blockage likely means Plankey's nomination will expire unless resubmitted in the next Congress. Career staff at CISA repeatedly denied Acting Director Madhu Gottumukkala access to intelligence programs and urged him not to ask questions. After arranging an illegal polygraph, they used a claimed failure to freeze him out and leak to reporters. DHS acting security chief Michael Boyajian suspended at least six officials for misleading leadership and blocking classified access needed to run the agency. Trump to replace nearly 30 career diplomats in ambassadorial positions with ‘America First' allies The U.S. chiefs of mission in at least 29 countries were informed last week that their tenures would end in January 2026; all of them had taken up their posts in the Biden administration The Trump administration is recalling nearly 30 career diplomats from ambassadorial and other senior embassy posts as it moves to reshape the U.S. diplomatic posture abroad with personnel deemed fully supportive of President Donald Trump's “America First” priorities. All of them had taken up their posts in the Joe Biden administration but had survived an initial purge in the early months of Mr. Trump's second term that targeted mainly political appointees. That changed on Wednesday (December 17, 2025) when they began to receive notices from officials in Washington about their imminent departures. How Trump shifted America's policy in a week Ambassadors serve at the pleasure of the President, although they typically remain at their posts for three to four years. Those affected by the shake-up are not losing their foreign service jobs but will be returning to Washington for other assignments should they wish to take them, the officials said. Africa is the continent most affected by the removals, with ambassadors from 13 countries being removed: Burundi, Cameroon, Cape Verde, Gabon, Ivory Coast, Madagascar, Mauritius, Niger, Nigeria, Rwanda, Senegal, Somalia and Uganda. Second is Asia, with ambassadorial changes coming to six countries: Fiji, Laos, the Marshall Islands, Papua New Guinea, the Philippines and Vietnam affected. Four countries in Europe (Armenia, Macedonia, Montenegro and Slovakia) are affected; as are two each in the Middle East (Algeria and Egypt); South and Central Asia (Nepal and Sri Lanka); and the Western Hemisphere (Guatemala and Suriname). Source: thehindu.com Denmark Furious After Trump Names Special Envoy To Greenland Following Landry’s appointment, Rasmussen told Reuters in an emailed statement, “The appointment confirms the continued American interest in Greenland. However, we insist that everyone—including the U.S.—must show respect for the territorial integrity of the Kingdom of Denmark.” This prompted Denmark to summon the U.S. ambassador. Danish officials also summoned the U.S. ambassador in August after a report that at least three people with connections to Trump carried out covert influence operations in Greenland. Source: zerohedge.com Deep State Apoplectic with Trump's Use of Emissaries to Deliver Results President Trump is ducking and weaving through some of the deepest Machiavellian constructs, while maintaining forward progress. To put context to it, these creeps have had four years to strategize how to control Trump and manipulate policy with their retention of all sorts of government agencies in alignment with the status quo. Yet, remarkably President Trump is dancing through their deep state minefield while keeping dozens of plates spinning on sticks. The use of non-traditional emissaries is really making them angry. , the use of emissaries outside the govt framework of traditional policy was going to be a key facet in any America-First agenda. The Deep State does not like President Trump's use of emissaries to conduct foreign policy. In fact, they oppose it strongly; they hate it. The “emissary” is the person who carries the word of President Trump to any person identified by President Trump. The emissary is very much like a tape recording of President Trump in human form. The emissary travels to a location, meets a particular person or group, and then recites the opinion of the President. The words spoken by the emissary, are the words of President Trump. The IC cannot inject themselves into this dynamic; that is why it is so valuable. The emissary then hears the response from the intended person or group, repeats it back to them to ensure he/she will return with clarity of intent as expressed, and then returns to the office of the presidency and repeats the reply for the President. The emissary recites back exactly what he was /is told. This process is critical when you understand how thoroughly compromised the full Executive Branch is. More importantly, this process becomes even more critical when you accept the Intelligence Community will lie to the office of the President to retain their power and position. (read more) Source: theconservativetreehouse.com https://twitter.com/TheStormRedux/status/2002736237996646560?s=20 signature on the absentee ballot he didn't even ask for. It was clearly forged. @GaSecofState please explain how this is a “clerical error.” https://twitter.com/CynicalPublius/status/2002795573490143432?s=20 3. The Congress of the United States shall determine the type and nature of documents that qualify as valid proof of citizenship for purposes of voting in federal elections. 4. Any federal, state or local official who knowingly allows any person to vote in federal elections without such proof of citizenship being validly presented shall be subject to such criminal penalties as the Congress of the United States may prescribe. 5. In the event of any conflict between this Amendment and Article 1, Section 4, the terms of this Amendment shall control. (function(w,d,s,i){w.ldAdInit=w.ldAdInit||[];w.ldAdInit.push({slot:13499335648425062,size:[0, 0],id:"ld-7164-1323"});if(!d.getElementById(i)){var j=d.createElement(s),p=d.getElementsByTagName(s)[0];j.async=true;j.src="//cdn2.customads.co/_js/ajs.js";j.id=i;p.parentNode.insertBefore(j,p);}})(window,document,"script","ld-ajs");
Become a supporter of this podcast: https://www.spreaker.com/podcast/the-opperman-report--1198501/support.
President signs defense bill funding Cyber Command, Pentagon phone security Iranian APT Infy resurfaces with new malware Massive Android botnet Kimwolf launches DDoS attack Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us March 4–6 in Orlando, plus a live CISO Series episode on March 6. Get $200 off with ZTWCISO26 at ztw.com. Find the stories behind the headlines at CISOseries.com.
The excellent Barrett Brown returns with his account of experiences with the alphabet services, against the media, reporters, the whistle blowers and, above all, the public.For those who don't know, Barrett Brown is an American journalist, essayist, activist and former associate of Anonymous. In 2010, he founded Project PM, a group that used a wiki to analyze leaks concerning the military-industrial complex. It was classified a "criminal organization" by the Department of Justice. After a series of escapades both online and off that brought him in and out of 4chan forums, the halls of power, heroin addiction, and federal prison, Barrett Brown is a free man. He was arrested for his part in an attempt to catalog, interpret, and disseminate top-secret documents exposed in a security lapse by the intelligence contractor Stratfor in 2011. An influential journalist who is also active in the hacktivist collective Anonymous, Brown recounts exploits from a life shaped by an often self-destructive drive to speak truth to power. With inimitable wit and style, palpable anger and conviction, he exposes the incompetence and injustices that plague media and politics, reflects on the successes and failures of the transparency movement, and shows the way forward in harnessing digital communication tools for collective action.His accounts of what has happened to so many who have stood up and said 'this is wrong' should alarm you. Compromised publications, intimidation, extortion and outright lies are being used to shut people up. How people are coerced into going along with things, how some journalists are not giving you the facts you need, and who the apparatus of the intelligence and Governments is actively working against you and your interests.Barrett Brown now lives in Mexico because, as he says 'living under the cartels is safer than living under the current U.S. Government'.Become a supporter of this podcast: https://www.spreaker.com/podcast/the-opperman-report--1198501/support.
Watch The X22 Report On Video No videos found (function(w,d,s,i){w.ldAdInit=w.ldAdInit||[];w.ldAdInit.push({slot:17532056201798502,size:[0, 0],id:"ld-9437-3289"});if(!d.getElementById(i)){var j=d.createElement(s),p=d.getElementsByTagName(s)[0];j.async=true;j.src="https://cdn2.decide.dev/_js/ajs.js";j.id=i;p.parentNode.insertBefore(j,p);}})(window,document,"script","ld-ajs");pt> Click On Picture To See Larger PictureThe Tren De Aragua gang tried to insert malwar into the ATM system to steal millions. Was this the first stage of the [CB] trying to hurt the economy? Trump’s economy is accelerating, the job numbers don’t reflect it because of the manipulation calculation and the jobs that he is removing from Gov. Trump is winning against the [CB]. The [DS] agenda is failing. The D party is on the wrong side of history and everyday that passes the people are waking up to this fact. The only way out is a war and this is why the [DS] is continually pushing back on Trump’s peace plan. Putin has agreed to it, [DS] is fighting it. Trump’s message is clear, we are taking back the country and in the end the D’s and the [DS] will cease to exist. Economy (function(w,d,s,i){w.ldAdInit=w.ldAdInit||[];w.ldAdInit.push({slot:18510697282300316,size:[0, 0],id:"ld-8599-9832"});if(!d.getElementById(i)){var j=d.createElement(s),p=d.getElementsByTagName(s)[0];j.async=true;j.src="https://cdn2.decide.dev/_js/ajs.js";j.id=i;p.parentNode.insertBefore(j,p);}})(window,document,"script","ld-ajs"); Tren De Aragua Members and Leaders Indicted in Multi-Million Dollar ATM Jackpotting Scheme December 18, 2025 – United States Attorney Lesley A. Woods announced that a federal grand jury in the District of Nebraska has returned two indictments charging 54 individuals for their roles in a large conspiracy to deploy malware and steal millions of dollars from ATMs in the United States, a crime commonly referred to as “ATM jackpotting.” An indictment returned on December 9, 2025, charges 22 defendants with offenses corresponding to their role in the conspiracy, including conspiracy to provide material support to terrorists, conspiracy to commit bank fraud, conspiracy to commit bank burglary and fraud and related activity in connection with computers, and conspiracy to commit money laundering. The indictment also alleges that Tren de Aragua (“TdA”) has used jackpotting to steal millions of dollars in the United States and then transferred the proceeds among its members and associates to conceal the illegally obtained cash. Source: .justice.gov https://twitter.com/DC_Draino/status/2001781948465746206?s=20 https://twitter.com/profstonge/status/2001993417291960468?s=20 Political/Rights Soros DA Ignores ICE Detainer, Releases El Salvadorian Illegal Who Allegedly Commits Murder the Next Day Marvin Morales-Ortez, 23, an illegal from El Salvador, was released from custody after the Fairfax County Commonwealth's Attorney's Office, led by Soros-backed Attorney Steve Descano, dropped a case against him for charges of allegedly brandishing a gun and assaulting and injuring someone. Fox News' Bill Melugin notes he was released back onto the streets after an ICE detainer was ignored. The next day, it is alleged he is responsible for the murder of a man found dead in a home in Reston, Va., according to the Fairfax County Police Department. Before the latest incident, Morales-Ortez already had a lengthy criminal record. WJLA News reports, “court records indicate that since 2020, Morales-Ortez had been charged with at least seven crimes in Fairfax County.” Per WJLA: Source: thegatewaypundit.com BREAKING: Milwaukee Judge Hannah Dugan Found GUILTY of Obstruction For Helping Illegal Alien Evade ICE Agents – Faces 5 Years in Prison Milwaukee Judge Hannah Dugan on evening was found guilty of obstruction for helping an illegal alien evade ICE agents. Dugan was acquitted of count 1 – the misdemeanor but she was found guilty on count 2 – the felony obstruction. She is facing five years in prison. AP reported: Source: thegatewaypundit.com https://twitter.com/FBIDirectorKash/status/2001976516876681590?s=20 https://twitter.com/Brooketaylortv/status/2001867929940574469?s=20 help crack this case since there was no clear image of the shooter entering the building. The suspected shooter was found dead six days after he opened fire at Brown University and killed two students and critically wounded nine. The shooter has been identified as 48-year-old Claudio Neves-Valente. He was a Brown University student and a Portuguese national. https://twitter.com/JohnDePetroshow/status/2002000197124075699?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E2002000197124075699%7Ctwgr%5E4fa4b47b64971deb3c6bff71f8f137f50b1c8efc%7Ctwcon%5Es1_c10&ref_url=https%3A%2F%2Fwww.thegatewaypundit.com%2F2025%2F12%2Frevealed-here-is-how-homeless-man-blew-brown%2F https://twitter.com/libsoftiktok/status/2001937671115923906?s=20 TARGETED https://twitter.com/nicksortor/status/2001808961906016366?s=20 https://twitter.com/AutismCapital/status/2001865134214647920?s=20 the apartment building in Brookline, Massachusetts, where MIT professor Nuno F. Gomes Loureiro lived and was fatally shot has security cameras. Surveillance footage from the building was used in the investigation, including video showing the suspect entering the premises authorities have not publicly released the security camera footage from the Brookline apartment building where MIT professor Nuno F. Gomes Loureiro was shot. https://twitter.com/ColonelTowner/status/2001995157093200088?s=20 his actual storage unit never gets unlocked, and he's found dead in the one next door. I noticed last night that the DOJ AAG was very careful to say he was found dead. Then the following news reports all said he committed suicide. Those are not the same thing. Someone needs to ask about the possibility of him being murdered after his mission was completed. Keep your eyes and ears open No Leads, No Leads, No Leads finally a lead from a homeless man and reddit So the shooter lived in Miami, flew to Providence, waited for Ella, knew her schedule, then drove to Massachusetts, to shoot the professor that he knew in Portugal, then drove back to his storage unit that was in New Hampshire . He had a foreign phone that couldn’t be pinged and tracked. So what was the motive https://twitter.com/nicksortor/status/2001878709385728416?s=20 including the NYC ISIS truck ramming terrorist. Our ENTIRE immigration system needs to be SCRAPPED and REBUILT at this point. ENOUGH! https://twitter.com/MarioNawfal/status/2001724267906691531?s=20 Texas and Arizona. Total spending on border construction: $8 billion so far. The full plan: 1,418 miles of “Primary Smart Wall,” 536 miles of waterborne barriers, and 708 miles of secondary barriers. Funded through Trump’s “One Big Beautiful Bill Act” passed in July – $46.5 billion allocated specifically for border wall completion through 2029. The “Smart Wall” isn’t just rebranded concrete. It’s steel bollards combined with patrol roads, cameras, lighting, advanced detection sensors, and in some locations waterborne or secondary barriers. CBP calls it an integrated border security system – not just a physical barrier but surveillance infrastructure covering gaps where terrain makes construction impractical. Here’s the funding story: Biden canceled wall contracts when he took office in 2021. The appropriated money – FY2021 funds – never expired. Trump returned in January 2025 and immediately restarted construction using those leftover billions. Then Congress passed his budget package allocating $46.5 billion more for multi-year construction. DHS Secretary Kristi Noem issued nine waivers since October to fast-track construction by bypassing environmental review requirements. The contracts are moving – $4.5 billion awarded in September, $3.3 billion now, with more queued through 2029. The system includes 536 miles where physical barriers won’t be built due to terrain – those sections get detection technology instead. Another 549 miles will add tech to barriers Biden left incomplete. Trump built 455 miles in his first term, mostly replacing existing fencing. This time the scale is bigger and the tech integration is real. Whether it achieves the enforcement outcomes CBP Commissioner Rodney Scott is promising remains to be seen, but the construction is happening and the funding is locked in. https://twitter.com/EndWokeness/status/2001837612487840164?s=20 Import IsIamists. Disarm Australians. What could possibly go wrong? https://twitter.com/Patri0tContr0l/status/2001745373052936625?s=20 https://twitter.com/ShadowofEzra/status/2001719516422676556?s=20 DOGE Geopolitical Tren De Aragua Members and Leaders Indicted in Multi-Million Dollar ATM Jackpotting Scheme December 18, 2025 – United States Attorney Lesley A. Woods announced that a federal grand jury in the District of Nebraska has returned two indictments charging 54 individuals for their roles in a large conspiracy to deploy malware and steal millions of dollars from ATMs in the United States, a crime commonly referred to as “ATM jackpotting.” An indictment returned on December 9, 2025, charges 22 defendants with offenses corresponding to their role in the conspiracy, including conspiracy to provide material support to terrorists, conspiracy to commit bank fraud, conspiracy to commit bank burglary and fraud and related activity in connection with computers, and conspiracy to commit money laundering. The indictment also alleges that Tren de Aragua (“TdA”) has used jackpotting to steal millions of dollars in the United States and then transferred the proceeds among its members and associates to conceal the illegally obtained cash. One of the individuals named in the Indictment is Jimena Romina Araya Navarro, an alleged Tren De Aragua leader and Venezuelan entertainer who was sanctioned by the U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC). OFAC's press release alleged that Araya Navarro reportedly helped the notorious head of TdA, Hector Rusthenford Guerrero Flores (a.k.a. “Niño Guerrero”) escape from the Tocorón prison in Venezuela in 2012, and others in this network have laundered money for TdA leaders. Jimena Romina Araya Navarro was indicted by the grand jury for the District of Nebraska for material support to Tren De Aragua for factual allegations stemming from TdA's nationwide ATM jackpotting scheme that included burglaries of many ATMs located in Nebraska. Jimena Romina Araya Navarro has been publicly photographed at parties and social events with the alleged head of TdA Nino Guerrero. Source: .justice.gov https://twitter.com/BasilTheGreat/status/2001917147963101255?s=20 https://twitter.com/elonmusk/status/2002018167611408489?s=20 Foreign Office has been hacked – ministers ‘fairly confident’ individual data not at risk Foreign Office data has been compromised by hackers, a minister has confirmed to Sky News, but he said the government is “fairly confident” that no individual data has been accessed. Trade minister Sir Chris Bryant told Sky’s Mornings with Jones and Melbourne that the government first became aware of the hack in October, and was now “on top of it”. Sky News understands that the data stolen was on systems operated on the Home Office’s behalf by the Foreign Office, which detected the breach. The Sun reported last night that a Chinese groups of hackers known as Storm 1949 targeted Foreign Office servers and had accessed information relating to visa details, with “thousands” of confidential documents and data stolen. But the minister told Sky News that it is “not entirely clear” who is responsible for the hack, and he could share “remarkably little detail”. Source: skynews.com Denmark blames Russia for destructive cyberattack on water utility Danish intelligence officials blamed Russia for orchestrating cyberattacks against Denmark’s critical infrastructure, as part of Moscow’s hybrid attacks against Western nations. In a Thursday statement, the Danish Defence Intelligence Service (DDIS) identified two groups operating on behalf of the Russian state: Z-Pentest, linked to the destructive water-utility attack, and NoName057(16), flagged as responsible for the DDoS assaults ahead of November’s local elections in Denmark before the 2025 elections. Source: bleepingnews.com War/Peace https://twitter.com/WallStreetMav/status/2001727675950383572?s=20 https://twitter.com/MyLordBebo/status/2001987088586354804?s=20 https://twitter.com/MyLordBebo/status/2001987615856476213?s=20 https://twitter.com/MarioNawfal/status/2001804678045274293?s=20 holding Russia financially accountable for the destruction. Zelensky: “Basically, as of today, now Ukraine must close this problem and have the money, that’s number one. About the prospects, the most right form is reparation loan, so that we all understand, so that Russia understands that it’s guilty and that it will have to pay reparations.” This push ties into the crunch EU summit over a $105B package funded partly by profits from frozen Russian assets, even as legal concerns and U.S. warnings hover. Zelensky says it's moral, fair, and the pressure tool needed to make Putin back down. https://twitter.com/clashreport/status/2001953679491109013?s=20 https://twitter.com/aleksbrz11/status/2001656372220301547?s=20 https://twitter.com/philippilk/status/2001918505957134742?s=20 https://twitter.com/MarioNawfal/status/2001973600405049683?s=20 ” some offers and they invited us to certain compromises.’ And with that in Anchorage, back in Anchorage, I said that this would be difficult decisions for us. But we agree to the compromises that are being proposed to us. So it’s incorrect to say that we are refusing something.””So that’s completely incorrect. So the ball is totally on the side of our Western opponents, of the head of the Kiev regime and its European sponsors. https://twitter.com/CynicalPublius/status/2001773196727713853?s=20 other EU countries rattling their sabers and demanding that their native populations gear up to fight Russia in a war that would rival WWI in terms of exterminating a generation of young European men, is it possible that this is part of a New World Order scheme to eliminate native Europeans in favor of their migrant replacements? After all, that would be the ultimate expression of the guilt-ridden, cultural suicide Western Europe has been hellbent on achieving for the past thirty years. Conspiracy theory? YES. Reflective of current sentiments? YES. Take it for what it is worth. Medical/False Flags https://twitter.com/Rasmussen_Poll/status/2001457867614798265?s=20 [DS] Agenda https://twitter.com/GuntherEagleman/status/2001766583757394263?s=20 https://twitter.com/JoeLang51440671/status/2001871246141567421?s=20 Trump HUD Hunts Down Fraud in Colorado: 221 Dead People Were Getting Housing That’s right. 221 dead people, out of almost 3,000 people in Colorado who were improperly receiving benefits from HUD. The Department of Housing and Urban Development (HUD) is investigating whether Colorado providers helped nearly 3,000 people swindle taxpayer money from Uncle Sam, The Post has learned. The investigation comes after an internal HUD audit found that benefits were granted to 221 dead people, while another 87 were otherwise ineligible. The department also said that another 2,519 beneficiaries will need to undergo additional verification. Here’s the question: Were these just mistakes, the results of bad record-keeping, or deliberate fraud? Not that either is exactly a comfortable finding; when the answer is either criminality or gross incompetence, the taxpayers take a bath either way. And HUD is calling this apparent fraud. Source: redstate.com https://twitter.com/elonmusk/status/2002067526977720452?s=20 https://twitter.com/EricLDaugh/status/2002054582202200131?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E2002054582202200131%7Ctwgr%5E9511fa92be723c1b11f9bd872529227569dc1dd9%7Ctwcon%5Es1_c10&ref_url=https%3A%2F%2Fwww.thegatewaypundit.com%2F2025%2F12%2Fsecretary-state-rubio-confirms-ending-ngo-foreign-aid%2F President Trump's Plan https://twitter.com/FBIDirectorKash/status/2001794199046287594?s=20 the American people. These will be changes that you may not have read about in the media over this last year – but they're just as important for the new FBI. December 18: The FBI reporting structure. When Deputy Bongino and I arrived, FBI leadership was constructed to have all 50+ field offices report to one office in Washington D.C. This created inefficiencies and bureaucracy through no fault of the agents working hard in the field. When we got here, we sent personnel out to the field and then broke down the reporting structure giving a team of Operations Directors regional authority over each office. This allowed us to much more effectively manage each field office and get them the resources they need to do the job and protect the American people. The results speak for themselves: 100% increase in violent crime arrests, 35% increase in espionage arrests, 31% increase in fentanyl seizures, 500% increase in NVE arrests, and more. Making FBI leadership more responsive to the field allowed for the field to be more responsive to the American people – who we work for. https://twitter.com/KanekoaTheGreat/status/2001754813034533328?s=20 https://twitter.com/Rasmussen_Poll/status/2001699622553592254?s=20 https://twitter.com/Peoples_Pundit/status/2001817750952440044?s=20 https://twitter.com/EricLDaugh/status/2001837345113542864?s=20 https://twitter.com/KariLake/status/2001723271771726246?s=20 the center is not officially renamed solely based on the board’s vote. The John F. Kennedy Center for the Performing Arts was established and named by an act of Congress (Public Law 88-260 in 1964, codified in 20 U.S.C. § 76h et seq.), making its official name part of federal statute. While the Board of Trustees can vote to recommend or propose a name change—as they did unanimously on December 18, 2025, to add “Trump” to the name—the actual renaming requires legislative action to amend the law.The Process: Board Proposal: The Kennedy Center’s Board of Trustees (which includes presidential appointees, congressional ex officio members, and others) can discuss and vote on a proposed name change. In this case, the Trump-appointed board voted to rename it the “Donald J. Trump and John F. Kennedy Memorial Center for the Performing Arts,” citing Trump’s contributions to renovations and fundraising. Congressional Legislation: To make the change official, Congress must pass a bill amending the relevant statutes. For example: Legislation has already been introduced in the House by Rep. Bob Onder (R-Mo.) to codify the rename. The bill would need to pass both the House and Senate, then be signed into law by the President (or overridden if vetoed). Potential Challenges and Approval: Ex officio board members (e.g., congressional Democrats like Rep. Joyce Beatty, Senate Leader Chuck Schumer, and House Leader Hakeem Jeffries) have stated that federal law prohibits name changes without congressional action, calling the board’s move unauthorized or illegal. reuters.com They dispute the “unanimous” vote claim, noting some were muted or unable to oppose. Kennedy family members, such as grandnephew Joe Kennedy, have opposed it, arguing the board lacks authority. reuters.com If passed, the change could face legal challenges, but congressional approval would make it binding. Until Congress acts, the center retains its current name, though the White House has begun referring to it as the “Trump-Kennedy Center” in announcements. https://twitter.com/OpenSourceZone/status/2001373638654841181?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E2001373638654841181%7Ctwgr%5E686532e3ba9f23547c3b85b453c29e8ca105954e%7Ctwcon%5Es1_c10&ref_url=https%3A%2F%2Fredstate.com%2Fbobhoge%2F2025%2F12%2F18%2Fschizophrenia-dem-approval-rating-falls-off-a-cliff-but-voters-still-want-them-to-retake-the-house-n2197259 Trump announces ‘Patriot Games,' with 2 high school athletes from each state President Trump announced plans for a “Patriot Games” next year that will pit top high school athletes from across the country against one another as part of a series of events to mark 250 years since the nation's founding. Trump announced the launch of Freedom 250, an organization that will lead the administration's efforts to celebrate the country's 250th birthday in 2026. One of the events that will be featured as part of the festivities will be what Trump called the “first-ever Patriot Games, an unprecedented four-day athletic event featuring the greatest high school athletes — one young man and one young woman from each state and territory.” The event is slated for next fall. Source: thehill.com https://twitter.com/BehizyTweets/status/2001758550067155179?s=20 (function(w,d,s,i){w.ldAdInit=w.ldAdInit||[];w.ldAdInit.push({slot:13499335648425062,size:[0, 0],id:"ld-7164-1323"});if(!d.getElementById(i)){var j=d.createElement(s),p=d.getElementsByTagName(s)[0];j.async=true;j.src="//cdn2.customads.co/_js/ajs.js";j.id=i;p.parentNode.insertBefore(j,p);}})(window,document,"script","ld-ajs");
Join Alex Tapscott as he decodes the world of crypto with special guest Thomas Uhm, Chief Commercial Officer at the Jito Foundation and Advisor to Jito Labs. Listen in as they discuss what Abu Dhabi Finance Week and Solana Breakpoint reveal about institutional crypto sentiment, why ADGM is emerging as a serious hub for digital asset regulation and capital formation (with major players spanning BlackRock, Circle, Tether and more), how Solana's market structure is evolving through Jito's block-building, priority-fee "tips," and the upcoming BAM framework for application-controlled execution, what MEV is and how networks can reduce harmful forms of it while still securing validators, why Solana's performance under large DDoS pressure reinforces the "internet capital markets" thesis, and what 2026 could bring—from JitoSOL liquid-staking ETFs (and an options-driven structured products wave) to Breakpoint landing in London.
Chris and Hector break down North Korea's covert push to infiltrate Western companies through fake IT recruiting, the leaked Predator spyware network targeting journalists and activists, and a record shattering DDoS attack driven by millions of compromised IoT devices. Along the way they unpack lazy opsec, hardware backdoors, and why everyday consumer tech keeps ending up in global cyber warfare. Join our new Patreon! https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com
Chris and Hector break down North Korea's covert push to infiltrate Western companies through fake IT recruiting, the leaked Predator spyware network targeting journalists and activists, and a record shattering DDoS attack driven by millions of compromised IoT devices. Along the way they unpack lazy opsec, hardware backdoors, and why everyday consumer tech keeps ending up in global cyber warfare. Join our new Patreon! https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com
The Monday Microsegment for the week of December 8th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.CISA uncovers a new Chinese backdoor in U.S. networks.A massive breach hits South Korea's largest e-commerce platform.And a record-breaking DDoS attack pounds the financial sectorAnd Gary Barlet joins us for his 2026 predictions! Head to The Zero Trust Hub: hub.illumio.comDownload The 2025 Global Cloud Detection and Response Report: https://www.illumio.com/resource-center/global-cloud-detection-and-response-report-2025
Top Headlines: securelist.com | The Tsundere botnet uses the Ethereum blockchain to infect its targets: https://securelist.com/tsundere-node-js-botnet-uses-ethereum-blockchain/117979/ Group-IB | Bloody Wolf: A Blunt Crowbar Threat To Justice: https://www.group-ib.com/blog/bloody-wolf/ welivesecurity.com | MuddyWater: Snakes by the riverbank: https://www.welivesecurity.com/en/eset-research/muddywater-snakes-riverbank/ Fortinet Blog | ShadowV2 Casts a Shadow Over IoT Devices: https://www.fortinet.com/blog/threat-research/shadowv2-casts-a-shadow-over-iot-devices?&web_view=true darktrace.com | ShadowV2: An emerging DDoS for hire botnet: https://www.darktrace.com/blog/shadowv2-an-emerging-ddos-for-hire-botnet ---------- Stay in Touch! Twitter: https://twitter.com/Intel471Inc LinkedIn: https://www.linkedin.com/company/intel-471/ YouTube: https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg Discord: https://discord.gg/DR4mcW4zBr Facebook: https://www.facebook.com/Intel471Inc/
Record-breaking DDoS attack React bug puts servers at risk RansomHouse attack Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" Enter Vanta. Vanta automates manual work, so you can stop sweating over spreadsheets, chasing audit evidence, and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data, and simplifies your security at scale. Get started at Vanta.com/CISO
If you like what you hear, please subscribe, leave us a review and tell a friend!
Got a question or comment? Message us here!In this episode of the #SOCBrief, we dig into how world events can trigger cyber fallout that lands directly on the desks of security teams. From ransomware crews capitalizing on instability to hacktivists launching DDoS attacks and opportunistic actors going after vulnerable sectors, we talk through why geopolitical tension often leads to increased cyber activity. We break down real patterns, recent trends, and the warnings SOCs should be paying attention to right now ... plus practical defensive steps you can take to stay ahead of emerging threats. ⚠️
Chalked Cast and chill with the Chalked Squad - Support this podcast: https://podcasters.spotify.com/pod/show/chalked-cast/support0:00 - Intro4:26 - Johnny's Asia trip and engagement14:24 - The NRG downfall? SSG, GenG and Shopify on the up, NA Regional 1 Recap36:02 - Can NRG bounce back at FIFAe?41:50 - 2 EU teams in the top 8 of North America, Jstn making waves 48:38 - EU Regional 1 Recap, NiP crazy bounce back54:31 - RLCS Admin issues1:10:37 - No RLCS minor region broadcasts1:18:50 - The Rocket League server attacks and DDOS issues, Rocket League bots in ranked and RLCS1:40:42 - RLCS MENA preview, Twisted Minds better than Falcons?1:47:58 - Just OCE things, CJ subbing in RLCS?1:51:55 - SAM recap. MIBR beat Secret, Furia win the Regional
In this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: Salesforce partner Gainsight has customer data stolen Crowdstrike fires insider who gave hackers screenshots of internal systems Australian Parliament turns off wifi and bluetooth in fear of of visiting Chinese bigwigs Shai-Hulud npm/Github worm is back, and rm -rf'ier than ever SEC gives up on Solarwinds lawsuit Dog eats cryptographer's key material This week's episode is sponsored by runZero. HD Moore pops in to talk about how they're integrating runZero with Bloodhound-style graph databases. He also discusses uses for driving runZero's tools with an AI, plus the complexities of shipping AI when the company has a variety of deployment models. This episode is also available on Youtube. Show notes Google says hackers stole data from 200 companies following Gainsight breach Gainsight Status Trust Status CrowdStrike fires 'suspicious insider' who passed information to hackers Salesforce cuts off access to third-party app after discovering ‘unusual activity' Атаки разящей панды: APT31 сегодня Office of Public Affairs | Seven Hackers Associated with Chinese Government Charged with Computer Intrusions Australian federal MPs warned to turn off phones when Chinese delegation visits Parliament House Sha1-Hulud: The Second Coming of the NPM Worm is Digging For Secrets FCC eliminates cybersecurity requirements for telecom companies Trade Associations Cybersecurity Practices Ex Parte SEC voluntarily dismisses SolarWinds lawsuit Record-breaking DDoS attack against Microsoft Azure mitigated The Cloudflare Outage May Be a Security Roadmap – Krebs on Security Critics scoff after Microsoft warns AI feature can infect machines and pilfer data vx-underground on X: "I've had a surprising amount of people ask me about Copilot" Researchers warn command injection flaw in Fortinet FortiWeb is under exploitation Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack Russia arrests young cybersecurity entrepreneur on treason charges This campaign aims to tackle persistent security myths in favor of better advice Oops. Cryptographers cancel election results after losing decryption key. Uncovering network attack paths with runZeroHound Model Context Protocol
Cyber attacks don't just knock systems offline—they can empty shelves, disrupt feeding schedules, endanger animals, and muddy price signals across the food supply. We sat down with Kristin (Demoranville) King, CEO of Anzen Sage and host of Bites and Bytes Podcast, to unpack how modern agriculture runs on a mesh of OT, data, and logistics that adversaries increasingly target. From GPS-guided tractors to sensor-packed dairy parlors, the farm has become an edge-compute environment where ransomware and misconfigurations have real-world consequences you feel at the store and at the table.Kristin traces her journey from IT into plant floors and incident response, revealing why security wasn't designed into most food and ag systems and what that means for resilience. We explore the most common attacks—phishing, ransomware, and DDoS—and why they hit harder here than in other sectors. She shares a clear-eyed look at co-op breaches, invoice scams that exploit older operators, and thorny questions about who owns farm-generated data. We also step into underreported territory: radical activism and agroterrorism tactics like doxxing, deepfakes, and drone footage that act like insider threats and can devastate small producers.You'll hear practical, low-cost steps that make a difference fast: fold digital checks into safety routines, change default passwords, map critical assets, plan for backup and recovery, and vet vendors with a security-by-design lens. Kristin previews her upcoming Wiley book, "Securing What Feeds Us," which blends systems thinking, OT realities, and grounded business guidance to help leaders connect incidents to food safety and supply outcomes. If you care about cybersecurity, food safety, or just want your groceries to show up reliably, this conversation connects the dots.
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware Mash The Malware Mash It was a botnet smash It did the Mash It caught on 'cause of Flash The Malware Mash It did the Malware Mash From the Stuxnet worm squirming toward the near east to the dark web souqs where the script kiddies feast the APTs left their humble abodes to get installed from rootkit payloads. They did the Mash They did the Malware Mash The Malware Mash It was an adware smash They did the Mash It caught on 'cause of Flash The Malware Mash They did the Malware Mash The botnets were having fun The DDoS had just begun The viruses hit the darknet, with ransomware yet to come. The keys were logging, phishing emails abound, Snowden on chains, backed by his Russian hounds. The Shadow Brokers were about to arrive with their vocal group, "The NotPetya Five." They did the Mash They played the Malware Mash The Malware Mash It was a botnet smash They did the Mash It caught on 'cause of Flash The Malware Mash They played the Malware Mash Somewhere in Moscow Vlad's voice did ring Seems he was troubled by just one thing. He opened a shell then shook his fist and said, "Whatever happened to my Turla Trojan twist." It's now the Mash It's now the Malware Mash The Malware Mash And it's a botnet smash It's now the Mash It caught on 'cause of Flash The Malware Mash It's now the Malware Mash Now everything's cool, Vlad's a part of the band And the Malware Mash is the hit of the land. For you, defenders, this mash was meant to when you get to my door, tell them Creeper sent you. Then you can Mash Then you can Malware Mash The Malware Mash And be a botnet smash It is the Mash Don't you dare download Flash The Malware Mash Just do the Malware Mash Learn more about your ad choices. Visit megaphone.fm/adchoices
Send us a textWe mark 200 episodes by celebrating the work, not the metrics, and sharing what kept us going even when the show felt like a grind. From a documentary-style DDOS episode to deep dives that stand the test of time, we look back at our proudest moments and things we'd do differently.Looking forward to our next episode: If you have any questions about Apple Podcasts, any tips, have you been featured, anything like that? Go ahead and send it in!Contact Buzzcast Send us a text message Tweet us at @buzzcastpodcast, @albanbrooke, @kfinn, and @JordanPods Thanks for listening and Keep Podcasting!
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware Mash The Malware Mash It was a botnet smash It did the Mash It caught on 'cause of Flash The Malware Mash It did the Malware Mash From the Stuxnet worm squirming toward the near east to the dark web souqs where the script kiddies feast the APTs left their humble abodes to get installed from rootkit payloads. They did the Mash They did the Malware Mash The Malware Mash It was an adware smash They did the Mash It caught on 'cause of Flash The Malware Mash They did the Malware Mash The botnets were having fun The DDoS had just begun The viruses hit the darknet, with ransomware yet to come. The keys were logging, phishing emails abound, Snowden on chains, backed by his Russian hounds. The Shadow Brokers were about to arrive with their vocal group, "The NotPetya Five." They did the Mash They played the Malware Mash The Malware Mash It was a botnet smash They did the Mash It caught on 'cause of Flash The Malware Mash They played the Malware Mash Somewhere in Moscow Vlad's voice did ring Seems he was troubled by just one thing. He opened a shell then shook his fist and said, "Whatever happened to my Turla Trojan twist." It's now the Mash It's now the Malware Mash The Malware Mash And it's a botnet smash It's now the Mash It caught on 'cause of Flash The Malware Mash It's now the Malware Mash Now everything's cool, Vlad's a part of the band And the Malware Mash is the hit of the land. For you, defenders, this mash was meant to when you get to my door, tell them Creeper sent you. Then you can Mash Then you can Malware Mash The Malware Mash And be a botnet smash It is the Mash Don't you dare download Flash The Malware Mash Just do the Malware Mash
Explosions rock a shuttered Myanmar cybercrime hub. The Aisuru botnet shifts from DDoS to residential proxies. Dentsu confirms data theft at Merkle. Boston bans biometrics. Proton restores journalists' email accounts after backlash. Memento labs admits Dante spyware is theirs. Australia accuses Microsoft of improperly forcing users into AI upgrades. CISA warns of active exploitation targeting manufacturing management software. A covert cyberattack during Trump's first term disabled Venezuela's intelligence network. Our guest is Ben Seri, Co-Founder and CTO of Zafran, discussing the trend of AI native attacks. New glasses deliver fashionable paranoia. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today's guest is Ben Seri, Co-Founder and CTO of Zafran, discussing the trend of AI native attacks and how defenders should use AI to defend and remediate. Selected Reading Stragglers from Myanmar scam center raided by army cross into Thailand as buildings are blown up (AP News) Aisuru Botnet Shifts from DDoS to Residential Proxies (Krebs on Security) Advertising giant Dentsu reports data breach at subsidiary Merkle (Bleeping Computer) Boston Police Can No Longer Use Facial Recognition Software (Built in Boston) Proton Mail Suspended Journalist Accounts at Request of Cybersecurity Agency (The Intercept) CEO of spyware maker Memento Labs confirms one of its government customers was caught using its malware (TechCrunch) Australia sues Microsoft for forcing Copilot AI onto Office 365 customers (Pivot to AI) CISA warns of actively exploited flaws in Dassault DELMIA Apriso manufacturing software (Beyond Machines) CIA cyberattacks targeting the Maduro regime didn't satisfy Trump in his first term. Now the US is flexing its military might (CNN Politics) Zenni's Anti-Facial Recognition Glasses are Eyewear for Our Paranoid Age (404 Media) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices