Podcasts about ESET

  • 350PODCASTS
  • 865EPISODES
  • 30mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jun 12, 2025LATEST
ESET

POPULARITY

20172018201920202021202220232024


Best podcasts about ESET

Latest podcast episodes about ESET

Aprenda em 5 Minutos
Como aliviar a carga mental? #155

Aprenda em 5 Minutos

Play Episode Listen Later Jun 12, 2025 8:12


Esse virou um daqueles termos que entram na vida cotidiana, mas que nem todo mundo entende bem do que se trata: carga mental.É o nome que a psicologia dá para o esforço mental de planejar, organizar e lembrar de todas as tarefas do dia a dia, mesmo aquelas que não envolvem esforço físico direto. É como se sua cabeça tivesse uma lista infinita de “coisas a fazer” que nunca acaba. Não é só lavar a roupa, mas lembrar de comprar sabão, saber quando precisa lavar, perceber que o uniforme da escola tá pequeno, marcar consulta no médico, pensar no cardápio da semana, cuidar das contas, organizar o aniversário do filho, e por aí vai.Uma pesquisa internacional mostrou que as mulheres são responsáveis por 71% das tarefas de carga mental dentro de casa, incluindo planejamento e organização, e 79% das tarefas diárias, como limpeza e cuidado com os filhos. Isso explica por que elas relatam mais sintomas de estresse, insônia, irritação e até depressão. Neste episódio a gente fala sobre esse problema e traz dicas que podem ajudar a contorná-lo. ============================ APRENDA EM 5 MINUTOS é o podcast sobre coisas que você nem sabia que queria saber. Os episódios são roteirizados e apresentados por Alvaro Leme. Jornalista, mestre e doutorando em Ciências da Comunicação na ECA-USP e criador de conteúdo há vinte anos, ele traz episódios sobre curiosidades dos mais variados tipos. São episódios curtos, quase sempre com 5 minutos — mas alguns passam disso, porque tem tema que precisa mesmo de mais um tempinho.Edição dos episódios em vídeo: André Glasner http://instagram.com/andreglasner Direção de arte: Dorien Barretto https://www.instagram.com/dorienbarretto66/Fotografia: Daniela Toviansky https://www.instagram.com/dtoviansky/ Siga o APRENDA no Instagram: http://instagram.com/aprendapodcast http://instagram.com/alvarolemeComercial e parcerias: contato@alvaroleme.com.br ====================== Quer saber mais? Confira as fontes que consultei enquanto criava o episódio - Carga mental feminina: por que as mulheres estão exaustas? Por Maiara Ribeiro, Portal Drauzio Varella - 86% das mulheres consideram ter muita carga de responsabilidades, aponta pesquisa Por Guilherme Gama, CNN Brasil - Carga mental: a tarefa invisível das mulheres de que ninguém fala Por Tita Abundancia, El País- Papéis sociais atribuídos às mulheres afetam a saúde mental Valor Econômico - Desigualdade entre homens e mulheres também se reflete na saúde mental Por André Jácomo, Exame - Mulheres: Como lidar com a sobrecarga física e mental do dia a dia feminino O Globo - O cansaço mental das mulheres Por Jô Alvim, G1 - Desigualdade de gênero, desafios invisíveis e como as empresas podem contribuir para a equidade ESET

The CyberWire
Beware of BADBOX.

The CyberWire

Play Episode Listen Later Jun 6, 2025 33:20


The DOJ files to seize over $7 million linked to illegal North Korean IT workers. The FBI warns of BADBOX 2.0 malware targeting IoT devices. Researchers uncover a major security flaw in Chrome extensions. ESET uncovers Iranian hackers targeting Kurdish and Iraqi government officials. Hitachi Energy, Acronis and Cisco patch critical vulnerabilities. 20 suspects are arrested in a major international CSAM takedown. Hackers exploit a critical flaw in Roundcube webmail. Today's guest is Ian Bramson, Global Head of Industrial Cybersecurity at Black & Veatch, exploring how organizations can close the cyberattack readiness gap.  ChatGPT logs are caught in a legal tug-of-war.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today's guest is Ian Bramson, Global Head of Industrial Cybersecurity at Black & Veatch. Ian joins us to explore how organizations can close the cyberattack readiness gap in industrial environments—especially as cyber threats grow more sophisticated and aggressive. Selected Reading Department Files Civil Forfeiture Complaint Against Over $7.74M Laundered on Behalf of the North Korean Government (U.S. Department of Justice) FBI: BADBOX 2.0 Android malware infects millions of consumer devices (Bleeping Computer) Chrome Extensions Vulnerability Exposes API Keys, Secrets, and Tokens (Cyber Security News) Iran-linked hackers target Kurdish and Iraqi officials in long-running cyberespionage campaign (The Record) CISA reports critical flaw in Hitachi Energy Relion devices (Beyond Machines) Critical security vulnerabilities discovered in Acronis Cyber Protect software (Beyond Machines) Cisco Patches Critical ISE Vulnerability With Public PoC (SecurityWeek) Police arrests 20 suspects for distributing child sexual abuse content  (Bleeping Computer) Hacker selling critical Roundcube webmail exploit as tech info disclosed (Bleeping Computer)– mentioning this in the Briefing OpenAI slams court order to save all ChatGPT logs, including deleted chats (Ars Technica) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

WeTalkSecurity
Cyberangriffe als Haftungsfallen: Die NIS2-Umsetzung und ihre Auswirkungen | Folge 33

WeTalkSecurity

Play Episode Listen Later Jun 4, 2025 25:35


In dieser Folge von WeTalkSecurity dreht es sich um ein brandaktuelles Thema: die NIS2-Richtlinie und die daraus resultierenden Veränderungen für die Geschäftsführung. Gemeinsam mit Dr. Jens Eckhardt, Fachanwalt für IT-Recht und Compliance-Experte in der Kanzlei pitc Legal, beleuchten wir, wie sich die Anforderungen an Geschäftsführer durch die NIS2-Umsetzung verschärfen, welche neuen Pflichten auf das Management zukommen und warum IT-Sicherheit heute Chefsache ist. Dabei werfen wir auch einen Blick auf den aktuellen Stand der Gesetzgebung in Deutschland und geben praxisnahe Empfehlungen, wie sich Unternehmensleitungen jetzt optimal aufstellen können.

Paul's Security Weekly
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Karl Van den Bergh, Tony Anscombe, Eyal Benishti, Nick Carroll, Chad Alessi, Chris Peluso - ESW #409

Paul's Security Weekly

Play Episode Listen Later Jun 2, 2025 98:33


Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what's keeping IT decision-makers awkward at night, and the best approach to creating a proactive security measure. Cyber Resilience in Action: A Guide for Mid-Market Firms This segment is sponsored by CTG. Visit https://securityweekly.com/ctgrsac to learn more about them! Nightwing Interview Nightwing divested from Raytheon in April 2024 and is entering another year of redefining national security. Amid emerging threats and shifting industry regulations and compliance frameworks, traditional security measures are no longer cutting it. As Cyber Incident Response Manager at Nightwing, Nick Carroll discusses how organizations can continue to build cyber resiliency and stay one step ahead in today's threat landscape. This segment is sponsored by Nightwing. Visit https://securityweekly.com/nightwingrsac to learn more about them! Segment 2 Libraesva Interview Generative AI is having a transformative effect across almost every industry, but arguably the area it has had the most significant impact is cybercrime. Discriminative AI can now learn to recognize what constitutes normal communication patterns, so anything out of the ordinary can be flagged. AI is also enabling human security analysts to automate the triage of reported emails, to rapidly identify false positives and keep up with emerging cybercriminal tactics. Finally, specialized Small Language Models (SLMs) using neural networks are able to analyze and comprehend the semantic intent of the message. This segment is sponsored by Libraesva. Visit https://securityweekly.com/libraesvarsac to learn more about them! IRONSCALES Interview Phishing has evolved—fast. What started as basic email scams has transformed into AI-powered cyber deception. Phishing 1.0: Early phishing relied on spam emails, fake banking alerts, and malware links to trick users into clicking Phishing 2.0: Attackers got smarter—instead of mass emails, they started impersonating real people Phishing 3.0: Now, cybercriminals are using AI to generate fake but highly convincing voices, videos, and images IRONSCALES discusses the current gaps in SEG technology and will showcase industry-first innovations for protection against deepfakes. Assessing Organizational Readiness in the Face of Emerging Cyber Threat Using AI to Enhance Defensive Cybersecurity white paper The Hidden Gaps of SEG Protection white paper This segment is sponsored by IRONSCALES. Visit https://securityweekly.com/ironscalesrsac to learn more about them! Segment 3 Illumio Interview In the post-breach world, speed and clarity are essential for effective cybersecurity. Security teams are inundated with vast amounts of data, much of which is not actionable. To combat cyber threats—and level the playing field—defenders need precise intelligence to identify attacks, dynamically quarantine threats, and prevent cyber disasters, highlighting the power of the security graph. Segment Resources: Rethinking Threat Detection in a Decentralized World Illumio Insights Announcement More information about Illumio Insights This segment is sponsored by Illumio. Visit https://securityweekly.com/illumiorsac for information on Illumio Insights or to sign up for a private preview! ESET Interview The ransomware landscape is rapidly changing. ESET global research team has been closely following ransomware gang disruptions, new players and how the RaaS business model continues to evolve. In this segment, Tony Anscombe will take a look into recent research, hacks and attacks, and explore how the industry and businesses are responding to combat financial risk and mitigate threats. Segment Resources: https://www.welivesecurity.com/en/eset-research/shifting-sands-ransomhub-edrkillshifter/ https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2024/ This segment is sponsored by ESET. Visit https://securityweekly.com/esetrsac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-409

Enterprise Security Weekly (Audio)
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Karl Van den Bergh, Tony Anscombe, Eyal Benishti, Nick Carroll, Chad Alessi, Chris Peluso - ESW #409

Enterprise Security Weekly (Audio)

Play Episode Listen Later Jun 2, 2025 98:33


Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what's keeping IT decision-makers awkward at night, and the best approach to creating a proactive security measure. Cyber Resilience in Action: A Guide for Mid-Market Firms This segment is sponsored by CTG. Visit https://securityweekly.com/ctgrsac to learn more about them! Nightwing Interview Nightwing divested from Raytheon in April 2024 and is entering another year of redefining national security. Amid emerging threats and shifting industry regulations and compliance frameworks, traditional security measures are no longer cutting it. As Cyber Incident Response Manager at Nightwing, Nick Carroll discusses how organizations can continue to build cyber resiliency and stay one step ahead in today's threat landscape. This segment is sponsored by Nightwing. Visit https://securityweekly.com/nightwingrsac to learn more about them! Segment 2 Libraesva Interview Generative AI is having a transformative effect across almost every industry, but arguably the area it has had the most significant impact is cybercrime. Discriminative AI can now learn to recognize what constitutes normal communication patterns, so anything out of the ordinary can be flagged. AI is also enabling human security analysts to automate the triage of reported emails, to rapidly identify false positives and keep up with emerging cybercriminal tactics. Finally, specialized Small Language Models (SLMs) using neural networks are able to analyze and comprehend the semantic intent of the message. This segment is sponsored by Libraesva. Visit https://securityweekly.com/libraesvarsac to learn more about them! IRONSCALES Interview Phishing has evolved—fast. What started as basic email scams has transformed into AI-powered cyber deception. Phishing 1.0: Early phishing relied on spam emails, fake banking alerts, and malware links to trick users into clicking Phishing 2.0: Attackers got smarter—instead of mass emails, they started impersonating real people Phishing 3.0: Now, cybercriminals are using AI to generate fake but highly convincing voices, videos, and images IRONSCALES discusses the current gaps in SEG technology and will showcase industry-first innovations for protection against deepfakes. Assessing Organizational Readiness in the Face of Emerging Cyber Threat Using AI to Enhance Defensive Cybersecurity white paper The Hidden Gaps of SEG Protection white paper This segment is sponsored by IRONSCALES. Visit https://securityweekly.com/ironscalesrsac to learn more about them! Segment 3 Illumio Interview In the post-breach world, speed and clarity are essential for effective cybersecurity. Security teams are inundated with vast amounts of data, much of which is not actionable. To combat cyber threats—and level the playing field—defenders need precise intelligence to identify attacks, dynamically quarantine threats, and prevent cyber disasters, highlighting the power of the security graph. Segment Resources: Rethinking Threat Detection in a Decentralized World Illumio Insights Announcement More information about Illumio Insights This segment is sponsored by Illumio. Visit https://securityweekly.com/illumiorsac for information on Illumio Insights or to sign up for a private preview! ESET Interview The ransomware landscape is rapidly changing. ESET global research team has been closely following ransomware gang disruptions, new players and how the RaaS business model continues to evolve. In this segment, Tony Anscombe will take a look into recent research, hacks and attacks, and explore how the industry and businesses are responding to combat financial risk and mitigate threats. Segment Resources: https://www.welivesecurity.com/en/eset-research/shifting-sands-ransomhub-edrkillshifter/ https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2024/ This segment is sponsored by ESET. Visit https://securityweekly.com/esetrsac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-409

Enterprise Security Weekly (Video)
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Eyal Benishti, Chris Peluso, Chad Alessi, Tony Anscombe, Karl Van den Bergh, Nick Carroll - ESW #409

Enterprise Security Weekly (Video)

Play Episode Listen Later Jun 2, 2025 98:33


Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what's keeping IT decision-makers awkward at night, and the best approach to creating a proactive security measure. Cyber Resilience in Action: A Guide for Mid-Market Firms This segment is sponsored by CTG. Visit https://securityweekly.com/ctgrsac to learn more about them! Nightwing Interview Nightwing divested from Raytheon in April 2024 and is entering another year of redefining national security. Amid emerging threats and shifting industry regulations and compliance frameworks, traditional security measures are no longer cutting it. As Cyber Incident Response Manager at Nightwing, Nick Carroll discusses how organizations can continue to build cyber resiliency and stay one step ahead in today's threat landscape. This segment is sponsored by Nightwing. Visit https://securityweekly.com/nightwingrsac to learn more about them! Segment 2 Libraesva Interview Generative AI is having a transformative effect across almost every industry, but arguably the area it has had the most significant impact is cybercrime. Discriminative AI can now learn to recognize what constitutes normal communication patterns, so anything out of the ordinary can be flagged. AI is also enabling human security analysts to automate the triage of reported emails, to rapidly identify false positives and keep up with emerging cybercriminal tactics. Finally, specialized Small Language Models (SLMs) using neural networks are able to analyze and comprehend the semantic intent of the message. This segment is sponsored by Libraesva. Visit https://securityweekly.com/libraesvarsac to learn more about them! IRONSCALES Interview Phishing has evolved—fast. What started as basic email scams has transformed into AI-powered cyber deception. Phishing 1.0: Early phishing relied on spam emails, fake banking alerts, and malware links to trick users into clicking Phishing 2.0: Attackers got smarter—instead of mass emails, they started impersonating real people Phishing 3.0: Now, cybercriminals are using AI to generate fake but highly convincing voices, videos, and images IRONSCALES discusses the current gaps in SEG technology and will showcase industry-first innovations for protection against deepfakes. Assessing Organizational Readiness in the Face of Emerging Cyber Threat Using AI to Enhance Defensive Cybersecurity white paper The Hidden Gaps of SEG Protection white paper This segment is sponsored by IRONSCALES. Visit https://securityweekly.com/ironscalesrsac to learn more about them! Segment 3 Illumio Interview In the post-breach world, speed and clarity are essential for effective cybersecurity. Security teams are inundated with vast amounts of data, much of which is not actionable. To combat cyber threats—and level the playing field—defenders need precise intelligence to identify attacks, dynamically quarantine threats, and prevent cyber disasters, highlighting the power of the security graph. Segment Resources: Rethinking Threat Detection in a Decentralized World Illumio Insights Announcement More information about Illumio Insights This segment is sponsored by Illumio. Visit https://securityweekly.com/illumiorsac for information on Illumio Insights or to sign up for a private preview! ESET Interview The ransomware landscape is rapidly changing. ESET global research team has been closely following ransomware gang disruptions, new players and how the RaaS business model continues to evolve. In this segment, Tony Anscombe will take a look into recent research, hacks and attacks, and explore how the industry and businesses are responding to combat financial risk and mitigate threats. Segment Resources: https://www.welivesecurity.com/en/eset-research/shifting-sands-ransomhub-edrkillshifter/ https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2024/ This segment is sponsored by ESET. Visit https://securityweekly.com/esetrsac to learn more about them! Show Notes: https://securityweekly.com/esw-409

Párásító
494 - Az eddigi legdurvább eset, letartóztatás!

Párásító

Play Episode Listen Later Jun 1, 2025 60:26 Transcription Available


Az e-cigi ipar történetének eddigi legdurvább hazai botrányába csöppentünk: letartóztatták egy bűnszervezet tagjait, akik költségvetési csalással gyanúsíthatók. A gőz mögött most nem aroma, hanem milliárdok lebegnek – és már a bíróság is beleszívott az ügybe. Show notes Letartóztatások kibeszélő

Puzsér Podcast | Rádiós beszélgetések
Kétharmados Tisza-győzelem esetén átadja-e Orbán a hatalmat? | Puzsér Róbert Bolgár György műsorában

Puzsér Podcast | Rádiós beszélgetések

Play Episode Listen Later May 28, 2025


Puzsér Róbert

Canaltech Podcast
Golpes com biometria facial no Gov.br expõem riscos da autenticação por imagem

Canaltech Podcast

Play Episode Listen Later May 23, 2025 15:52


No episódio de hoje do Podcast Canaltech, destacamos as fraudes digitais com uso de Inteligência Artificial. Conversamos com Daniel Barbosa, especialista em segurança da informação da ESET, sobre como golpistas estão manipulando rostos com deepfakes para invadir contas do Gov.br e outros serviços. E, claro, ele dá dicas práticas pra você se proteger. Você também vai conferir: Manus AI abriu acesso total e liberou créditos grátis diariamente SpaceX lançou 23 satélites Starlink e estreou um novo foguete Amazon já está entregando iPhones e celulares Galaxy com drones nos EUA Computex 2025: IA, velocidade e potencia são destaques Este episódio tem roteiro e apresentação de Fernanda Santos, reportagens de Lilian Sibila, Viviane França, Bruno de Blasi, Vinicius Moschen e João Melo. A trilha sonora de Guilherme Zomer, edição de Jully Cruz e arte de capa de Erick Teixeira.See omnystudio.com/listener for privacy information.

Vida Digital
Ataques a Escuelas y Universidades: Cómo proteger el sector educativo | Vida Digital x ESET

Vida Digital

Play Episode Listen Later May 21, 2025 26:19


En este episodio de #VidaDigital, Alex Neuman conversa con Mario Micucci, investigador de #ESET Latinoamérica, sobre por qué las instituciones educativas se han convertido en uno de los blancos favoritos de los cibercriminales. Analizamos los casos de ataques dirigidos, las amenazas como ransomware y phishing, el rol de los estudiantes como vectores de ataque, y qué pueden hacer escuelas, universidades y padres para protegerse.

Het Digitale Front
#45: Wat kom je tegen in de krochten van het Dark Web?

Het Digitale Front

Play Episode Listen Later Apr 25, 2025 46:00


Verborgen achter versleutelde lagen, onzichtbaar voor de gewone internetgebruiker, vind je het Dark Web. Dé plek voor wie anoniem wil blijven — denk aan klokkenluiders en activisten, maar ook aan hackers en drugshandelaren. Maar: ben je wel écht 100% anoniem op het Dark Web?Dat bespreekt techjournalist Daniël Verlaan in deze laatste aflevering van het seizoen met Dave en Harm. Hij doet verslag van wat hij zoal tegenkomt op de schaduwkant van het internet en merkt op dat mainstream platformen als Telegram en Snapchat steeds populairder worden voor het uitvoeren van illegale praktijken. Betekent dat het einde van het Dark Web?In de nieuwsronde:Nu.nl - ‘MIVD zag vorig jaar eerste Russische sabotageaanval in Nederland'RTL Nieuws - ‘MIVD: Russische hackers wilden stembusgang Europese verkiezingen saboteren'De cybertips van deze week:Tools van Objective CPodcast The Vergecast - ‘How to keep your data safe when you travel'Game mee met je kinderenHet Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.

WeTalkSecurity
Cybersecurity vom Graumarkt | Folge 30

WeTalkSecurity

Play Episode Listen Later Apr 17, 2025 28:06


Graumarkt, Lizenzschlüssel und versteckte Risiken: In dieser Folge von WeTalkSecurity beleuchten Philipp Plum und Stefan Heitkamp von ESET mit Peter Lindner (Compeva GmbH) den kaum bekannten, aber weit verbreiteten Graumarkt im Softwarebereich. Was auf Verkaufsplattformen oft wie ein Schnäppchen aussieht, kann für Endkunden und Unternehmen schnell zum Problem werden. Wie funktioniert der Graumarkt? Wer steckt dahinter? Und wie können Hersteller sich schützen? Ein spannender Blick hinter die Kulissen des digitalen Lizenzhandels.

Het Digitale Front
#44: Samenwerken met de FBI tegen illegale datahandelaren en witwassende oligarchen

Het Digitale Front

Play Episode Listen Later Apr 11, 2025 45:57


Cybercriminaliteit overstijgt de landsgrenzen - dat blijkt deze week opnieuw bij de ontmanteling van de kindermisbruiksite Kidflix. Een samenwerkingsverband van maar liefst 30 landen, dat leidde tot 79 arrestaties wereldwijd.Hoe pak je als politie zulke enorme cyberoperaties aan? Dave en Harm stellen die vraag aan Ruben van Well, die leiding gaf aan het Nederlandse cyberteam tijdens ‘Operatie Cookiemonster'. Hij vertelt over de ‘klapdag', de onwetendheid van sommige daders en wat nu precies de Nederlandse specialiteit is in deze cybermissies.Dave haakt in met het ongelofelijke verhaal van ‘Operation Destabilise' en laat daarmee zien hoe cybercriminaliteit tegenwoordig in alle aspecten van onze samenleving verweven is. Jeroen de Wit van KPMG schuift aan om te bespreken hoe wij als Nederland onze cyberskills het beste kunnen overbrengen aan onze bondgenoten.In de nieuwsronde:The Guardian - ‘How the Atlantic's Jeffrey Goldberg got added to the White House Signal group chat'NOS - ‘Klanten verruilen Amerikaanse techbedrijven voor Europese alternatieven'De cybertips van deze week:Podcast: Veroordeeld - aflevering 2The Record - ‘Inside Operation Destabilise'Boek: ‘Warfare Reimagined: Embracing AI In The Military' - Igor van GemertBoek: ‘Ghost In The Wires' - Kevin MitnickDocumentaire: ‘Intercepted'Het Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.

Sláger FM
„Rendkívüli (eset) vagy!" | Vámos Robi, Dobay Edina és S. Miller András a Sláger KULT-

Sláger FM

Play Episode Listen Later Apr 10, 2025 34:47


Vámos Robi művész-mentor, író, aki a „Rendkívüli (eset) vagy!” című hiánypótló alkotásával érkezett a stúdióba. Robi könyve a szuperérzékenység belső erejéről és az önelfogadás fontosságáról szól, miközben segít szülőknek és gyerekeknek egyaránt jobban megérteni saját érzéseiket. Ez az olvasmány nemcsak szórakoztató történeteket mesél el, hanem gyakorlati tanácsokat is nyújt mindazoknak, akik mély érzelmeikkel szeretnének boldogulni egy érzéketlen világban. Hogyan segíthet az érzékenységünk megélésében egy könyv? Miként válhat a legnagyobb „hibánk” a legerősebb szupererőnkké? Robi megosztja velünk, hogyan hozza közelebb egymáshoz a generációkat, és miért fontos, hogy elfogadjuk magunkat olyannak, amilyenek vagyunk.Az adás azonban egy meglepetéssel is szolgál, ugyanis Vámos Robi nem egyedül érkezik! Dobay Edina tetoválóművész is csatlakozik hozzá, hogy hármasban, remek hangulatban beszélgessünk az érzelmek, a művészet és az önkifejezés összefonódásáról. Hogyan támogatja egymást két ilyen különböző, mégis hasonló küldetéstudatú ember? Miért fontos, hogy a csendes lelkek is megélhessék erejüket?Ahogyan Robi mondaná: „Engedd, hogy ez az érzelmes és inspiráló beszélgetés megmutassa, hogy 'pont elég vagy, úgy, ahogy vagy'…”!A Sláger FM-en minden este 22 órakor a kultúráé a főszerep S. Miller András az egyik oldalon, a másikon pedig a térség kiemelkedő színházi kulturális, zenei szcena résztvevői Egy óra Budapest és Pest megye aktuális kult történeteivel. Sláger KULT – A természetes emberi hangok műsora.

The CyberWire
Using AI to sniff out opposition.

The CyberWire

Play Episode Listen Later Apr 8, 2025 37:23


Is DOGE using AI to monitor federal employees? Google's latest Android update addresses two zero-days. Scattered Spider continues its phishing and malware campaigns. Ransomware's grip is slipping. ToddyCat exploits a critical flaw in ESET products. Oracle privately confirms a legacy system breach. Over 5,000 Ivanti Connect Secure appliances remain exposed online to a critical remote code execution vulnerability. CISA confirms active exploitation of a critical vulnerability in CrushFTP. In our Industry Voices segment, we are joined by Matt Radolec, VP of Incident Response at Varonis, on turning to gamers to to Build Resilient Cyber Teams. AI outphishes human red teams.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest In our Industry Voices segment, we are joined by Matt Radolec, VP of Incident Response, Cloud Operations & SE EU from Varonis, as he is discussing research on “From Gamer to Leader: How to Build Resilient Cyber Teams.” Catch Matt's keynote at RSAC 2025 on April 30th.  Selected Reading Exclusive: Musk's DOGE using AI to snoop on U.S. federal workers, sources say (Reuters) Tariff Wars: The Technology Impact (BankInfo Security) Google Patched Android 0-Day Vulnerability Exploited in the Wild (Cyber Security News)  Scattered Spider adds new phishing kit, malware to its web (The Register) Ransomware Underground Faces Declining Relevance (BankInfo Security) ESET Vulnerability Exploited for Stealthy Malware Execution (SecurityWeek) Oracle Confirms that Hackers Broke Systems & Stole Client Login Credentials (Cyber Security News)  Exploited Vulnerability Puts 5,000 Ivanti VPN Appliances at Risk (SecurityWeek) CISA Warns of CrushFTP Vulnerability Exploitation in the Wild (Infosecurity Magazine) AI Outsmarts Human Red Teams in Phishing Tests (GovInfo Security) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

MSP Unplugged
Exploring the Changing Landscape: An Interview with ESET

MSP Unplugged

Play Episode Listen Later Apr 8, 2025 28:40


Join Paco as he sits down with Cameron Tousey and Tony Anscombe to delve into the evolving landscape of cybersecurity. In this insightful interview, they discuss ESET's perspective on the latest trends and how Managed Service Providers (MSPs) can navigate these changes to better protect their clients. Don't miss out on expert advice and valuable insights that can help you stay ahead in the cybersecurity game! --------------------------------------------------- Connect with us! --------------------------------------------------- MSP Unplugged https://mspunplugged.com/ Paco Lebron from ProdigyTeks  Email: paco@mspunplugged.com Rick Smith from Renactus Technology  Email: rick@mspnplugged.com Corey L Kirkendoll from 5K Technical Services https://linkedin.com/in/coreykirkendoll/

The Cyberman Show
March 2025 Cybersecurity Recap EP 94

The Cyberman Show

Play Episode Listen Later Apr 6, 2025 17:43


Send us a textGet up to speed with everything that mattered in cybersecurity this month. In this episode of The Cyberman Show, we break down March 2025's top cyber incidents, threat actor tactics, security product launches, and vulnerabilities actively exploited in the wild.Here's what we cover:

Het Digitale Front
#43: Signal-gate: kantelpunt in de inlichtingenrelatie met de V.S.?

Het Digitale Front

Play Episode Listen Later Apr 5, 2025 42:07


Na ‘Signal-gate' rijst de vraag: kunnen we in Nederland nog wel blind vertrouwen op Amerikaanse inlichtingen?Dave en Harm duiken in de gevolgen van een mogelijke vertrouwensbreuk met de VS. Wat betekent dat voor onze veiligheid – en voor de digitale samenwerking tussen bondgenoten? Te gast is Willemijn Aerdts, expert op het gebied van inlichtingen- en veiligheidsdiensten én Eerste Kamerlid voor D66.Daarnaast schuift reserve-officier Pascal Hogenboom aan. Hij legt uit hoe KPMG in actie komt als Nederland wordt getroffen door een ramp die onze samenleving kan ontwrichten.De cybertips van deze week:De Volkskrant - ‘AIVD speelde sleutelrol in geheime operatie met CIA in Oekraïne'Serie ‘Adolescence'PimEyesHet Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.

Monde Numérique - Jérôme Colombain

Les messageries instantanées chiffrées comme WhatsApp, Signal ou Telegram sont devenues des outils du quotidien… y compris pour les plus hauts responsables politiques et militaires. Mais leur utilisation massive n'est pas sans risques.En partenariat avec ESET.Dans cet épisode, Benoît Grünemwald, expert en cybersécurité chez ESET, analyse une incroyable affaire survenue aux États-Unis : un journaliste a accidentellement eu accès à une conversation confidentielle entre hauts responsables militaires. L'incident, dû à une erreur humaine, relance la question cruciale de l'usage professionnel de ces outils, initialement conçus pour le grand public.L'épisode revient aussi sur l'arsenal sécurisé utilisé par les forces de l'ordre françaises (terminaux NEO, messagerie Tchap), sur la transparence du code de Signal, sur les menaces posées par des logiciels espions comme Pegasus, et sur les dérives potentielles des propositions législatives visant à introduire des "portes dérobées" pour les enquêtes judiciaires.Enfin, Benoît Grünemwald alerte sur une nouvelle forme d'hameçonnage via QR code : le quishing, une technique redoutable déjà exploitée sur les terrains de guerre… et désormais à surveiller dans la sphère civile.-----------

Hírstart Robot Podcast - Tech hírek
Bolondok napja – appok, amelyekkel megtréfálhatod barátaidat

Hírstart Robot Podcast - Tech hírek

Play Episode Listen Later Apr 1, 2025 4:31


Bolondok napja – appok, amelyekkel megtréfálhatod barátaidat Digital Hungary     2025-04-01 10:27:02     Mobiltech Hoax Álhír Elérkezett április 1, azaz a bolondok napja. Az április elsején ünnepelt bolondok napja már évszázadok óta része különböző kultúráknak, bár pontos eredete továbbra is ismeretlen. A hagyományos tréfák közé tartozik az álhírek terjesztése és mások megviccelése. A népszokás szerint, ha valakit e napon rászednek, akkor "bolondot csinálnak belőle", és ő Videón, ahogy 320 km magasságig tör fel a Naprendszer egyik legbrutálisabb vulkánkitörése Player     2025-04-01 04:54:07     Infotech Világűr Vulkán A földi tűzhányók ehhez képest szinte csak éppenhogy pislákoló tábortüzeknek tűnnek. Túl sok döntés? – Egy magyar közösségi app segít kevesebbet agyalni és stresszmentesebben dönteni Márkamonitor     2025-04-01 08:06:08     Mobiltech Kampány Közösségi média Stressz Coca-Cola A Coca-Cola volt marketingvezetője új közösségi appot indított: itt a magyar fejlesztésű Ask@Round.   Kölcsei Gergely, aki több mint egy évtizeden át dolgozott a hazai Fmcg szektorban, és a Coca-Cola magyarországi marketingvezetőjeként számos sikeres kampány fűződik a nevéhez, most egy számára is új területre lépett: egy közösségi média alkalmazást Láthatatlan hatás: közvetlen kapcsolat van a légszennyezés és a csökkenő születésszám között Helló Sajtó!     2025-04-01 09:48:03     Tudomány Légszennyezettség A HUN-REN Közgazdaság- és Regionális Tudományi Kutatóközpont egyik friss kutatása szerint – melyben 2013 és 2020 között Európa 657 régióját vizsgálták – összefüggés van a levegőszennyezés és a csökkenő termékenységi ráta között, ennek pedig az egészségügyi mellett jelentős politikai következményei is vannak. Ritka kincsekre akadtak a dunavecsei temetőben First Class     2025-04-01 10:55:37     Tudomány Ékszerek, dobókocka, fegyverek – rengeteg izgalmas leletet találtak a régészek egy új dunavecsei gyár építéséhez kapcsolódó ásatáson. Félelemkeltő programokkal veszik rá az online csalók a felhasználókat bizalmas adataik megosztására ICT Global     2025-04-01 06:03:30     Infotech Kiberbiztonság Félelemkeltő programokkal veszik rá a csalók az internetes felhasználókat bizalmas adataik megosztására, az ESET kiberbiztonsági cég elemzése szerint. Megvan ki lép az oroszok helyére az európai Mars expedícióban Mínuszos     2025-04-01 13:33:05     Tudomány Világűr Mars Leányvállalat Airbus Az Airbus brit részlege 194 millió dolláros szerződést nyert a Mars-járó leszállóplatformjának megépítésére. Az Airbus brit leányvállalata 194 millió dolláros szerződést nyert az Európai Űrügynökségtől (ESA) az első brit gyártmányú leszállóplatform a Mars-járók történetében. A leszálló platform az ExoMars űrszonda azon része, amely a 2030-ban a Mar 3800 éves amulettet talált egy hároméves kislány Izraelben Telex     2025-04-01 16:06:25     Tudomány Izrael A kislány és családja egy régészeti ásatás közelében túrázott, a Biblia szerint ezen a területen csapott össze Dávid és Góliát. Rekordméretű tőkebevonással erősít az OpenAI Igényesférfi.hu     2025-04-01 10:04:22     Infotech Mesterséges intelligencia ChatGPT OpenAI Ilyet még nem látott a technológiai világ: az OpenAI, a ChatGPT mögött álló cég történelmi jelentőségű, 40 milliárd dolláros tőkebevonást jelentett be, amivel nemcsak új szintre emelik a mesterséges intelligenciába vetett bizalmat, hanem minden idők legnagyobb privát techfinanszírozási körét is magukénak tudhatják. Az orka–cápa háború átrajzolja a tengeri erőviszonyokat: elszaporodtak a fókák, fogynak a halak Dél-Afrika partjainál Qubit     2025-04-01 12:55:42     Tudomány háború Afrika Cápa A fehér cápák eltűnésével teljesen átalakult a Jóreménység fokához közeli öböl ökoszisztémája. Megérkezett a Messenger nagy újdonsága hazánkba 24.hu     2025-04-01 11:56:27     Mobiltech Mesterséges intelligencia Messenger A chatalkalmazásban már használható a Meta mesterséges intelligenciája. A Világgazdasági Fórum kutatása a STEM és AI területek nemi egyenlőtlenségeiről Szakmát Szerzek     2025-04-01 04:51:01     Karrier Mesterséges intelligencia A mesterséges intelligencia (AI) forradalmasítja a munka világát, átalakítva a gazdaságot és a munkaerőpiacot. Az új technológiák térhódítása azonban nem egyformán érinti a férfiakat és a nőket. A Világgazdasági Fórum friss kutatása szerint a STEM területeken, különösen az AI-val kapcsolatos munkakörökben továbbra is jelentős a nemi egyenlőtlenség. Elindult a SpaceX történelmi űrküldetése 24.hu     2025-04-01 12:23:39     Tudomány Világűr SpaceX A misszió legénysége számos úttörő tudományos kísérletet végez majd el. A további adásainkat keresd a podcast.hirstart.hu oldalunkon.

TREND.sk
We Know How: Phishing aj ransomvér sú s AI nebezpečnejšie. Čo čaká firmy a ako sa brániť?

TREND.sk

Play Episode Listen Later Mar 31, 2025 37:16


Deepfake, phishing s pomocou umelej inteligencie či ransomvér útoky schopné prispôsobiť sa každej firme. Kyberbezpečnosť čelí novým výzvam, na ktoré musíme byť pripravení všetci. O tom, ale aj o smernici NIS2, hovorí Július Selecký zo spoločnosti ESET. Článok s označením We Know How vznikol v spolupráci s komerčným partnerom.

Het Digitale Front
#42: Lone wolfs, pubers of de Russen? - hoe ziet de wereld van hacken eruit?

Het Digitale Front

Play Episode Listen Later Mar 28, 2025 46:15


In aanloop naar de NAVO-top in Den Haag scherpt de overheid de straffen voor digitale spionage aan. Dat roept de vraag op: wie zijn er eigenlijk uit op het achterhalen van onze staatsgeheimen of het binnendringen van vitale infrastructuur zoals het stroomnet, internet of stoplichten? En waarom? Dat leggen Dave en Harm, vergezeld door Jordi van den Breekel (ethisch hacker bij KPMG) je in deze aflevering uit door in de huid van een hacker te kruipen. De cybertips van deze week: Hack The BoxWired - ‘SolarWinds: The Untold Story of the Boldest Supply-Chain Hack Ever'Boek: ‘Careless People: A story of where I used to work' - Sarah Wynn-Williams Het Digitale Front wordt mede mogelijk gemaakt door KPMG. Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.

The CyberWire
Brute force and broken trust.

The CyberWire

Play Episode Listen Later Mar 21, 2025 31:23


Over 150 government database servers are dangerously exposed to the internet. Threat actors are exploiting a vulnerability in CheckPoint's ZoneAlarm antivirus software. Albabat ransomware goes cross-platform. ESET reports on the Chinese Operation FishMedley campaign. VanHelsing ransomware targets Windows systems in the U.S. and France. CISA issues five ICS advisories warning of high-severity vulnerabilities across critical infrastructure systems. A former NFL coach is indicted for allegedly hacking into the accounts of thousands of college athletes. Brandon Karpf joins us with a look at cyberspace in space. A fraud detection firm gets shut down for fraud.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Brandon Karpf, friend of N2K CyberWire, joins T-Minus Space Daily host Maria Varmazis for the Space and Cyber March segment. Selected Reading Over 150 US Government Database Servers Vulnerable to Internet Exposure (GB Hackers) White House Shifting Cyber Risk to State and Local Agencies (Data Breach Today) Cybercriminals Exploit CheckPoint Driver Flaws in Malicious Campaign (Infosecurity Magazine) Albabat Ransomware Attacking Windows, Linux & macOS by Leveraging GitHub (Cyber Security News) Chinese I-Soon Hackers Hit 7 Organizations in Operation FishMedley (SecurityWeek) VanHelsing Ransomware Attacking Windows Systems With New Evasion Technique & File Extension (Cyber Security News) CISA Releases Five Industrial Control Systems Advisories Covering Vulnerabilities & Exploits (Cyber Security News) Former NFL, Michigan Assistant Coach Matt Weiss Charged With Hacking for Athletes' Intimate Photos (SecurityWeek) AdTech CEO whose products detected ad fraud jailed for fraud (The Register)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Het Digitale Front
#41: Sabotage van diepzeekabels: de Noordzee als oorlogsfront

Het Digitale Front

Play Episode Listen Later Mar 21, 2025 44:36


Het wordt steeds duidelijker dat Rusland de hybride oorlog op het Westen heeft geopend. Niet alleen via satelliet-sabotage (waar Nederland deze week samen met 7 andere landen een officiële VN-klacht tegen indiende), maar ook op zee.Schimmige spionage schepen en schade aan diepzeekabels, wat betekent dat voor ons? Samen met commandeur buiten dienst Michiel Hijmans kijken Dave en Harm deze week wat er allemaal op onze eigen Noordzee gebeurt. Als oud-leider van het NAVO-vlootverband weet Michiel als geen ander hoe belangrijk maritieme stabiliteit is om onze samenleving draaiende te houden.In de nieuwsronde bespreken Dave en Harm:De Telegraaf - ‘Hoeveel last heeft Nederland van Russische satelliet-sabotage?'De Volkskrant - ‘Tweede Kamer wil een ‘rijkscloud' om los te komen van Amerikaanse big tech'Rapport Europol - ‘EU Serious and Organised Crime Threat Assessment'De cybertips van deze week:Podcast Pointer - ‘Spionnen op de Noordzee'De Volkskrant - ‘Sabotage onder water: de Russische schaduwoorlog legt kwetsbaarheid van het Westen bloot'Het Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.

Het Digitale Front
#40: Hoe AI onverwacht deel uitmaakt van ons dagelijks leven

Het Digitale Front

Play Episode Listen Later Mar 14, 2025 47:51


Nederland dreigt zijn sterke positie in AI te verliezen, waarschuwt Google. Terwijl andere landen volop investeren en hun AI-ondernemingen laten uitgroeien tot wereldspelers, blijft Nederland twijfelen.In deze aflevering onderzoeken Dave en Harm samen met AI-ondernemer Maarten Sukel hoe kunstmatige intelligentie al onverwacht verweven is met ons dagelijks leven. Van slimme assistenten tot onzichtbare algoritmes—AI is dichterbij dan je denkt. En waarom lijkt Nederland achter te blijven in deze technologische revolutie?Ook schuift Frank van Praat (KPMG) aan: hij deed onderzoek naar hoe we écht over AI denken.In de nieuwsronde bespreken Dave en Harm:VRT - ‘Hoe Rusland ook in ons land mensen online ronselt voor sabotage en spionage'De nieuwe Chinese AI-agent ManusDe cybertips van deze week:De Nationale AI cursusDocumentaire VRT - ‘Einde van oorlog in Oekraïne zal geen einde maken aan hybride oorlog'The Verge - ‘How to stop the AI you're using from training with your data'Het boek van Maarten: De AI-revolutieHet Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.

The Best of Azania Mosaka Show
Tech Feature: Cybercrime-South Africa Ranked as the Most Targeted Country in Africa, According to Report 

The Best of Azania Mosaka Show

Play Episode Listen Later Mar 11, 2025 12:09


Relebogile Mabotja speaks to Tony Anscombe the Chief Security Evangelist at ESET about South Africa being ranked the most targeted country in Africa for cybercrime, accounting for 40% of all ransomware attacks and nearly 35% of infostealer incidents on the continent.See omnystudio.com/listener for privacy information.

Het Digitale Front
#39: Trump stopt cyberaanvallen op Rusland: wat zijn de gevolgen voor ons?

Het Digitale Front

Play Episode Listen Later Mar 7, 2025 39:52


Nadat Trump zich recentelijk al vaker verrassend positief over Rusland uitliet, verrast hij deze week opnieuw: hij kondigt aan dat de VS Rusland niet langer als cyberdreiging zien en hun digitale offensief zal gaan afbouwen. Wat is er precies aan de hand? Ontstaat hier een ondenkbaar samenwerkingsverband tussen de twee landen die decennialang lijnrecht tegenover elkaar stonden? En worden de pijlen dan nu op Europa gericht?Door het veranderende wereldtoneel vragen Harm en Dave zich af of het tijd is om minder afhankelijk van Amerika te worden. Welke opties hebben we dan? De mannen lopen er een paar met je door.Vind de gehele lijst voor Europese tech-alternatieven op https://european-alternatives.eu/.En in het geval dat we daadwerkelijk meer cyberaanvallen in Europa gaan ondervinden, dan hebben we gelukkig de kennis van incident responder Lars Jacobs van KPMG. Hij vertelt hoe hij te werk gaat wanneer een aanval een datalek of sabotage van een productieproces veroorzaakt.In de nieuwsronde bespreken Dave en Harm:De Telegraaf - ‘Niet 48 maar 72 uur zelfredzaam bij nood'The Record - ‘North Koreans finish initial laundering stage after more than $1 billion stolen from Bybit'En de cybertips van deze week:Boek: Sandworm, A New Era Of Cyberwar and the Hunt for Kremlin's Most Dangerous Hackers - Andy GreenbergBoek: The Heat of the Moment - Sabrina Cohen-HattonPodcast Dutch DragonsThe New York Times - ‘Drones Now Rule the Battlefield in the Ukraine-Russia War'Het Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.

Het Digitale Front
#38: Cyberoorlog in de lucht: hoe piloten GPS-jamming ervaren

Het Digitale Front

Play Episode Listen Later Feb 28, 2025 41:32


We horen vaak dat het vliegtuig technisch gezien het veiligste vervoersmiddel is van allemaal, maar heb je er weleens bij stilgestaan dat je - nog vóórdat je op je stoel zit - al van tientallen digitale systemen gebruik gemaakt hebt? En ook in de lucht worden besturingssystemen steeds geavanceerder en digitaler. Die kunnen, bijvoorbeeld door GPS-jamming, door kwaadwillenden worden verstoord. Welke gevaren brengt dit met zich mee? Dave en Harm bespreken het met Serge Christiaans, piloot en aviation cybersecurity expert. Ook schuift Henrik Smit van KPMG weer aan. De cybertips van deze week: Harm: Artikel over airplane crashes + album DioDave: Deep research ChatGPT + tweestapsverificatie op WhatsappZie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.

Het Digitale Front
#37: 3 jaar (cyber)oorlog in Oekraïne: een blauwdruk voor de toekomst?

Het Digitale Front

Play Episode Listen Later Feb 21, 2025 50:50


Het is op 24 februari drie jaar geleden dat Rusland Oekraïne binnenviel. Opnieuw oorlog in Europa. Hoewel dit niet de eerste oorlog is waar cyber een rol speelt, is het wél de eerste keer dat cyber zo'n invloed heeft op het verloop van een conflict. Op welke manier heeft dat oorlogsvoering veranderd? Dave en Harm horen het van correspondent Chris Colijn, vanuit Kyiv. Ook schuift cyberexpert Meret Keeris van KPMG aan, zij vertelt dat Nederlandse bedrijven het risico van cyberspionage door vijandige regimes onderschatten. Daar wordt nu iets aan gedaan met de NIS2-richtlijn. De cybertips van deze week: Meret: Meer lezen over NIS2? Chris: Innovation in isolationDave: Isolatiemodus op iPhone Harm: Artikel over Musk: & artikel van Ilyaz Nasrullah Het Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.

Het Digitale Front
#36: De propagandapiramide van ISIS (en andere terreurbewegingen)

Het Digitale Front

Play Episode Listen Later Feb 14, 2025 40:57


Terwijl onze ogen gevestigd zijn op Amerika, Rusland en China, zijn we organisaties als ISIS, Al Qaida en Hamas uit het oog verloren. Maar: zijn zij daadwerkelijk zo inactief als het lijkt? Het nieuws dat enkele honderden Nederlandse jongeren terroristische propaganda blijken te verspreiden, suggereert iets anders.Daarom onderzoeken Dave & Harm deze week de online kanalen waarmee terreurbewegingen onze jongeren op sociale media targetten. Wat ze daar aantreffen, is schokkend - zo blijkt ISIS dit jaar al 1,6 miljoen views te hebben behaald en worden op Telegram door de rechts-extremistische groep ‘Terrorgram' uitvoerig handleidingen gedeeld over hoe het beste een aanslag te plegen.Verder in de nieuwsronde:Europa gaat 200 miljard euro investeren in AI - Europese Commissie‘Russische spionnen en de hack van Amsterdam' - Huib Modderkolk, De VolkskrantEn de cybertips van deze week:Documentaire NOS - ‘Tienduizenden moderne slaven gedwongen tot oplichten van Nederlanders en anderen'Game Kingdom Come Deliverance 2, nieuwsbrief techjournalist Rutger OttoHet Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.

Het Digitale Front
#35: ‘Nederland moet een digitaal wapen ontwikkelen voordat het te laat is'

Het Digitale Front

Play Episode Listen Later Feb 7, 2025 46:30


Sinds de waarschuwing van Mark Rutte dat we ons als NAVO moeten voorbereiden op een ‘wartime mindset' is de discussie losgebarsten: bevinden we ons door de oplopende geopolitieke spanningen nu al in een oorlog, nog voordat er een schot gelost is?Harm en Dave vragen dit aan hoogleraar cyberoperaties Paul Ducheine. Zijn conclusie is duidelijk: Nederland moet hard aan de bak om onze vijanden geloofwaardig af te kunnen schrikken, het liefst met een digitaal wapen.Cyberexpert Ronald Heil onderstreept dit belang en laat zien dat samenwerking tussen bedrijven essentieel is ten tijde van een crisis om ontwrichting van de samenleving te voorkomen.De cybertips van deze week:Ronald: Whole of Society-initiatief voor een grotere digitale weerbaarheidDave: Cybersecurity Outlook 2025 - World Economic ForumPaul: artikel Wired - ‘The Young, Inexperienced Engineers Aiding Elon Musk's Government Takeover'Harm: AI-agent Le ChatHet Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.

Ráno Nahlas
IT projekty sú na Slovensku Klondajkom. Dôležité štátne inštitúcie obsadzujú "Majky z Gurunu," tvrdí šéf NKÚ Andrassy.

Ráno Nahlas

Play Episode Listen Later Feb 2, 2025 42:04


Mimoriadna inventúra všetkých kľúčových inštitúcií štátu, ale najmä Katastra nehnuteľností. To je odporúčanie šéfa NKÚ v exkluzívnom rozhovore pre Ráno Nahlas. Podľa neho po hekerskom útoku nemáme istotu, že nedošlo k posunom na listoch vlastníctva. Prípad odhalil zásadné rezervy v kybernetickej bezpečnosti Slovenska, ako i masívne mrhanie financií v oblasti informatizácie, tvrdí Ľubomír Andrassy. A prečo si štát nenajme služby firmy Eset?Kataster nehnuteľností čelil masívnemu útoku neznámych hekerov. Útok, ktorý Katastrálny úrad doslova paralyzoval, tak v plnej sile odhalil slabiny v oblasti kybernetickej bezpečnosti kritickej infraštruktúry nášho štátu."Ak celý projekt vznikal v roku 2007 a mal byť spustený do prevádzky v roku 2012, tak my sme sa pozreli na tento projekt v roku 2019. Vtedy sme skonštatovali, že ani 7 rokov po tom ako projekt mal slúžiť občanom i štátnym inštitúciám, tak nič v tom čase nefungovalo. Čo je však ešte horšie, štátne úrady, ktoré za tento projekt zodpovedali, verejnosť - i Brusel (ktorý to platil) zavádzali a tvrdili, že všetko funguje, čo ale vôbec nebola pravda." Tvrdí šéf NKÚ pre Aktuality. Do informatizácie Slovenska pritom Európska únia naliala už niekoľko miliárd eur, výsledky v podobe moderného digitálneho štátu na úrovni 21. storočia sú však až neuveriteľne žalostné. Natíska sa preto logická otázka: Kam všetky tieto peniaze vlastne išli, kto z nich mal skutočný profit a prečo je stav digitalizácie - ale i kybernetickej bezpečnosti tohto štátu, na tak chabej úrovni?Na premrhané financie v oblasti informatizácie pritom dlhodobo upozorňuje aj Najvyšší kontrolný úrad. Ten ale aktuálne čelí čoraz častejším a ostrejším útokom. Dôvodom sú zistenia jeho kontrolórov voči ktorým sa kontrolované subjekty bránia šikanou či dokonca zastrašovaním. Namiesto nápravy odhalených nedostatkov si za verejné zdroje najímajú právnikov, ktorí sa snažia kontrolu nielen sťažiť, ale dokonca chcú utajiť jej výsledky pred verejnosťou, hovorí pre Aktuality šéf NKÚ Ľubomír Andrassy."Ak sa budú v dôležitých štátnych funkciách objavovať ľudia ako Majka z Gurunu na Štrbskom plese a ak budeme do pozícií v rámci kľúčových inštitúcií štátu pre riadenie krajiny v mimoriadnych situáciách dosadzovať ľudí nie na základe odbornosti, ale na základe ich kamarátstva s politikmi, tak schopnosť štátu reagovať na výzvy doby bude čoraz komplikovanejšia a občania si budú čoraz viac klásť otázku, či je Slovenská republika vedená ľuďmi, ktorí vôbec tušia, kam ju chcú doviesť a majú aspoň nejakú predstavu, ako má fungovať moderná demokratická krajina." odkazuje verejnosti šéf štátnych kontrolórov. Vzhľadom na závažnosť zistení NKÚ, ich celospoločenský dosah, opakovanú relevantnosť, ale rovnako tak i rastúcu mieru tlaku na NKÚ, sme sa v Aktualitách rozhodli poskytnúť šéfovi Najvyššieho kontrolného úradu pravidelný priestor na zistenia kontrolórov NKÚ.Počúvate Ráno Nahlas, pekný deň a pokoj v duši praje Braňo Dobšinský.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

In today's episode, we start by talking about the PFSYNC protocol used to synchronize firewall states to support failover. Oracle released it's quarterly critical patch update. ESET is reporting about a critical VPN supply chain attack and CISA released guidance for victims of recent Ivanti related attacks. Catching CARP: Fishing for Firewall States in PFSync Traffic https://isc.sans.edu/diary/Catching%20CARP%3A%20Fishing%20for%20Firewall%20Stat%20es%20in%20PFSync%20Traffic/31616)** Discover how attackers exploit PFSync traffic to manipulate firewall states. This deep dive explores vulnerabilities and mitigation strategies in network defense. Oracle Critical Patch Update January 2025 https://www.oracle.com/security-alerts/cpujan2025.html)** Oracle's January 2025 patch release addresses numerous critical vulnerabilities across their product suite. Learn about key updates and how to secure your systems. PlushDaemon: Compromising the Supply Chain of a Korean VPN Service https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-supply-chain-korean-vpn-service/ ESET Research uncovers PlushDaemon, a sophisticated supply chain attack targeting a Korean VPN provider. Understand the implications for supply chain security. CISA Cybersecurity Advisory: AA25-022A https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-022a The latest advisory highlights active threats and mitigation strategies for critical infrastructure. Stay ahead with CISA s guidance on emerging cyber risks.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

In this episode, we cover how to use honeypot data to keep your offensive infrastructure alive longer, three critical vulnerabilities in SimpleHelp that must be patched now, and an interesting vulnerability affecting many systems allowing UEFI Secure Boot bypass. Leveraging Honeypot Data for Offensive Security Operations [Guest Diary] A recent guest diary on the SANS Internet Storm Center discusses how offensive security professionals can utilize honeypot data to enhance their operations. The diary highlights the detection of scans from multiple IP addresses, emphasizing the importance of monitoring non-standard user-agent strings in web requests. https://isc.sans.edu/diary/Leveraging%20Honeypot%20Data%20for%20Offensive%20Security%20Operations%20%5BGuest%20Diary%5D/31596 Security Vulnerabilities in SimpleHelp 5.5.7 and Earlier SimpleHelp has released version 5.5.8 to address critical security vulnerabilities present in versions 5.5.7 and earlier. Users are strongly advised to upgrade to the latest version to prevent potential exploits. Detailed information and upgrade instructions are available on SimpleHelp's official website. https://simple-help.com/kb---security-vulnerabilities-01-2025#send-us-your-questions Under the Cloak of UEFI Secure Boot: Introducing CVE-2024-7344 ESET researchers have identified a new vulnerability, CVE-2024-7344, that allows attackers to bypass UEFI Secure Boot on most UEFI-based systems. This flaw enables the execution of untrusted code during system boot, potentially leading to the deployment of malicious UEFI bootkits. Affected users should apply available patches to mitigate this risk. https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/

Irish Tech News Audio Articles
ESET Research discovers UEFI Secure Boot bypass vulnerability

Irish Tech News Audio Articles

Play Episode Listen Later Jan 17, 2025 4:21


ESET researchers have discovered a vulnerability affecting the majority of UEFI-based systems that allows actors to bypass UEFI Secure Boot. This vulnerability, assigned CVE-2024-7344, was found in a UEFI application signed by Microsoft's "Microsoft Corporation UEFI CA 2011" third-party UEFI certificate. ESET researchers discovered a new vulnerability, CVE-2024-7344, that allows actors to bypass UEFI Secure Boot on the majority of UEFI-based systems. Exploitation of this vulnerability allows execution of untrusted code during system boot, enabling deployment of malicious UEFI bootkits. The issue was fixed by affected vendors; the vulnerable binaries were revoked by Microsoft in the January 14, 2025, Patch Tuesday update. Exploitation of this vulnerability can lead to the execution of untrusted code during system boot, enabling potential attackers to easily deploy malicious UEFI bootkits (such as Bootkitty or BlackLotus) even on systems with UEFI Secure Boot enabled, regardless of the operating system installed. ESET reported the findings to the CERT Coordination Center (CERT/CC) in June 2024, which successfully contacted the affected vendors. The issue has now been fixed in affected products, and the old, vulnerable binaries were revoked by Microsoft in the January 14, 2025, Patch Tuesday update. The affected UEFI application is part of several real-time system recovery software suites developed by Howyar Technologies Inc., Greenware Technologies, Radix Technologies Ltd., SANFONG Inc., Wasay Software Technology Inc., Computer Education System Inc., and Signal Computer GmbH. "The number of UEFI vulnerabilities discovered in recent years and the failures in patching them or revoking vulnerable binaries within a reasonable time window shows that even such an essential feature as UEFI Secure Boot should not be considered an impenetrable barrier," says ESET researcher Martin Smolár, who discovered the vulnerability. "However, what concerns us the most with respect to the vulnerability is not the time it took to fix and revoke the binary, which was quite good compared to similar cases, but the fact that this isn't the first time that such an obviously unsafe signed UEFI binary has been discovered. This raises questions of how common the use of such unsafe techniques is among third-party UEFI software vendors, and how many other similar obscure, but signed, bootloaders there might be out there." Exploitation of this vulnerability is not limited to systems with the affected recovery software installed, as attackers can bring their own copy of the vulnerable binary to any UEFI system with the Microsoft third-party UEFI certificate enrolled. Also, elevated privileges are required to deploy the vulnerable and malicious files to the EFI system partition (local administrator on Windows; root on Linux). The vulnerability is caused by the use of a custom PE loader instead of using the standard and secure UEFI functions LoadImage and StartImage. All UEFI systems with Microsoft third-party UEFI signing enabled are affected (Windows 11 Secured-core PCs should have this option disabled by default). The vulnerability can be mitigated by applying the latest UEFI revocations from Microsoft. Windows systems should be updated automatically. Microsoft's advisory for the CVE-2024-7344 vulnerability can be found here. For Linux systems, updates should be available through the Linux Vendor Firmware Service. For a more detailed analysis and technical breakdown of the UEFI vulnerability, check out the latest ESET Research blog post, "Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344" on WeLiveSecurity.com. Guest post by ESET Ireland. You can follow ESET Ireland on X (ex-Twitter), Facebook or LinkedIn for more cybersecurity tips.

Startitup.sk
Harabin: Opozícia sú dilentanti, čo nerozumejú ničomu [Zo zákulisia politiky]

Startitup.sk

Play Episode Listen Later Jan 12, 2025 30:39


The CyberWire
China's shadow over U.S. telecom networks.

The CyberWire

Play Episode Listen Later Jan 6, 2025 32:41


New reports shed light on both Volt and Salt Typhoons. Tenable updates faulty Nessus Agents and resumes plugin updates. A new infostealer campaign targets gamers on Discord. A fake version of a popular browser extension has been discovered stealing login credentials and conducting phishing attacks. ESET warns Windows 10 users of a potential “security fiasco.” A vulnerability in Nuclei allows attackers to bypass template signature verification and inject malicious code. An Indiana dental practice pays a $350,000 settlement over an alleged ransomware coverup. Tim Starks, Senior Reporter from CyberScoop, joins us today to discuss a new United Nations cybercrime treaty and his outlook for 2025. Farewell to a visionary leader.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Tim Starks, Senior Reporter from CyberScoop, joins us today to discuss a new United Nations cybercrime treaty and his outlook for 2025. Read Tim's article on the UN cybercrime treaty here.  Selected Reading The US's Worst Fears of Chinese Hacking Are on Display in Guam (Bloomberg) How Chinese Hackers Graduated From Clumsy Corporate Thieves to Military Weapons (Wall Street Journal) China protests US sanctions for its alleged role in hacking, complains of foreign hacker attacks (AP News) Tenable Disables Nessus Agents Over Faulty Updates (SecurityWeek) New Infostealer Campaign Uses Discord Videogame Lure (Infosecurity Magazine) Beware! Malicious EditThisCookie Chrome Extension Steals Login Credentials (Cyber Security News) Windows 10 users urged to upgrade to avoid "security fiasco" (Bleeping Computer) Nuclei flaw lets malicious templates bypass signature verification (Bleeping Computer) Dental Practice Pays State in Alleged Data Breach 'Cover Up' (GovInfo Security) Tenable CEO Amit Yoran Dead at 54 (SecurityWeek) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Monde Numérique - Jérôme Colombain
[ITW] Piratages en 2024 : gare aux arnaques en 2025 !

Monde Numérique - Jérôme Colombain

Play Episode Listen Later Dec 24, 2024 15:17


[En partenariat avec ESET] Les cyberattaques et les fuites de données se sont multiplié en 2024. Les conséquences pourraient se faire sentir à partir de 2025, selon Benoît Grünemwald, expert en cybersécurité chez Eset.———L'année a été marquée par une augmentation alarmante des fuites de données et un renforcement des capacités des cybercriminels. De grandes entreprises comme Free, SFR et Auchan ont été touchées par des incidents récurrents, soulevant d'importantes préoccupations concernant la protection des données personnelles et bancaires. Avec presque un incident par mois, la banalisation des fuites est préoccupante, permettant aux attaquants de programmer des arnaques complexes utilisant les informations volées.Les conséquences de ces fuites sont dramatiques, les victimes étant souvent piégées par des escroqueries d'ingénierie sociale. Grünemwald insiste sur l'importance d'une vigilance accrue pour éviter de céder à la panique. Des mesures de cybersécurité rigoureuses comme des mots de passe robustes, l'authentification multifacteur et l'utilisation de gestionnaires de mots de passe sont essentielles pour se protéger.Benoit Grünemwald souligne les efforts notables dans la lutte contre la cybercriminalité, comme l'opération Magnus, qui a permis d'arrêter plus de 1000 suspects d'arnaques en ligne. La collaboration entre les forces de l'ordre et le secteur privé commence à porter ses fruits, mais il reste crucial d'éduquer le public sur les meilleures pratiques en matière de cybersécurité. En somme, l'expert appelle à une bonne "cyberhygiène" pour naviguer efficacement dans cette ère technologique tout en préservant ses données.-----------

RCN Digital
Ciberseguridad para esta época del año.

RCN Digital

Play Episode Listen Later Dec 2, 2024 22:18


En el episodio de hoy, hablamos con la gente de ESET sobre la ciberseguridad en la época má bella del año y qué debemos tener en cuenta para cuidarnos de los robos y estafas para el próximo año.

Security Conversations
Volexity's Steven Adair on Russian Wi-Fi hacks, memory forensics, appliance 0days and network inspectability

Security Conversations

Play Episode Listen Later Nov 30, 2024 78:33


Three Buddy Problem - Episode 23: Volexity founder Steven Adair joins the show to explore the significance of memory analysis and the technical challenges associated with memory dumping and forensics. We dig into Volexity's “nearest neighbor” Wi-Fi hack discovery, gaps in EDR detection and telemetry, and some real-talk on the Volt Typhoon intrusions. We also cover news on a Firefox zero-day exploited on the Tor browser, the professionalization of ransomware, ESET's discovery of a Linux bootkit (we have a scoop on the origins of this!), Binarly research on connections to LogoFAIL, and major visibility gaps in the firmware ecosystem. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs) (SentinelLabs), Costin Raiu (https://twitter.com/craiu) (Art of Noh) and Ryan Naraine (https://twitter.com/ryanaraine) (SecurityWeek). Honorary buddy: Steven Adair (https://twitter.com/sadair) (Volexity)

.týždeň podcast
.jednoducho veda: Špeciál s laureátmi ocenenia ESET Science Award za roky 2019 – 2024

.týždeň podcast

Play Episode Listen Later Nov 29, 2024 76:30


Od roku 2019 nadácia ESET ocenila už šesť výnimočných osobností vedy na Slovensku. V špeciálnom vydaní relácie .jednoducho veda s moderátorom Jurajom Petrovičom sa laureáti ocenenia ESET Science Award podelia o to, ako im toto ocenenie pomohlo, aké príležitosti im prinieslo, a spolu sa zamyslia nad budúcnosťou vedy na Slovensku, ako aj nad jej najväčšími výzvami. Hosťami relácie budú: - Mária Bieliková z Kempelenovho inštitútu inteligentných technológií,

The CyberWire
No more spinach for PopeyeTools.

The CyberWire

Play Episode Listen Later Nov 21, 2024 37:05


The feds take down the PopeyeTools cybercrime market. Five alleged Scattered Spider members have been charged.  CISA warns of critical vulnerabilities in VMware's vCenter Server. Global AI experts convene to discuss safety. MITRE updates its list of Top 25 Most Dangerous Software Weaknesses. US and Australian agencies warn critical infrastructure organizations about evolving tactics by the BianLian ransomware group. A new report looks at rising threats to the U.S. manufacturing industry. Researchers at ESET uncover the WolfsBane Linux backdoor. A pair of malicious Python packages impersonating ChatGPT went undetected for over a year. A data breach at a French hospital compromised the medical records of 750,000 patients. On our Industry Voices segment, guest Avihai Ben-Yossef, Cymulate's Co-Founder and CTO, joins us to discuss "The Evolution and Outlook of Exposure Management." AI Pimping is the scourge of Instagram.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Industry Voices segment, guest Avihai Ben-Yossef, Cymulate's Co-Founder and CTO, joins us to discuss "The Evolution and Outlook of Exposure Management." Resources:  Security Validation Essentials Hertz Israel Reduced Cyber Risk by 81% within 4 Months with Cymulate SecOps Roundtable: Security Validation and the Path to Exposure Management Double Agent: Exploiting Pass-through Authentication Credential Validation in Azure AD Selected Reading US seizes PopeyeTools cybercrime marketplace, charges administrators (Bleeping Computer) Five Charged in Scattered Spider Case (Infosecurity Magazine) CISA Warns of VMware VCenter Vulnerabilities Actively Exploited in Attacks (Cyber Security News) US Gathers Allies to Talk AI Safety as Trump's Vow to Undo Biden's AI Policy Overshadows Their Work (SecurityWeek) MITRE Updates List of 25 Most Dangerous Software Vulnerabilities (SecurityWeek) BianLian Ransomware Group Adopts New Tactics, Posing Significant Risk (Infosecurity Magazine) Manufacturing Sector Under Siege: Industry Faces Wave of Advanced Email Attacks (Abnormal Security) Gelsemium APT Hackers Attacking Linux Servers With New WolfsBane Malware (Cyber Security News) Two PyPi Malicious Package Mimic ChatGPT & Claude Steals Developers Data (GB Hackers) Cyberattack at French hospital exposes health data of 750,000 patients (Bleeping Computer) Inside the Booming 'AI Pimping' Industry (404 Media) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Portfolio Checklist
Összeomlás jöhet Ukrajnában Trump győzelme esetén?

Portfolio Checklist

Play Episode Listen Later Nov 4, 2024 25:31


Mi várható az Egyesült Államok Ukrajna-politikájában attól függően, hogy Donald Trump vagy Kamala Harris nyeri a keddi elnökválasztást? A témáról Huszák Dánielt, a Portfolio Globál rovatának vezető elemzőjét kérdeztük. Az adás folytatásában a Magyarországgal szemben indított túlzottdeficit-eljárásról lesz szó, és arról a frissen megjelent középtávú strukturális tervről, amellyel a magyar kormány az uniós célszintek alá kívánja szorítani a magyar államadósságot, valamint a költségvetési hiányt. Erről Szabó Dánielt, a Portfolio EU-ügyekkel foglalkozó elemzőjét kérdeztük. Főbb részek: Intro - (00:00) Amerikai elnökválasztás és Ukrajna - (01:18) Így teljesítené az uniós elvárásokat a kormány - (11:58) Makronaptár - (23:08) Kép forrása: Getty ImagesSee omnystudio.com/listener for privacy information.

The CyberWire
Securing democracy.

The CyberWire

Play Episode Listen Later Oct 29, 2024 35:15


Chinese hacking into US telecoms draws federal scrutiny. ESET examines Evasive Panda's CloudScout toolset. A new ChatGPT jailbreak bypassed security safeguards. Nintendo warns users of a phishing scam. The Five Eyes launch the Secure Innovation initiative for startups. CISA releases “Product Security Bad Practices” guidelines. Apple's new bug bounty program offers a million bucks for critical vulnerabilities. The City of Columbus drops its suit of a cybersecurity researcher. On our Solution Spotlight today, N2K's Simone Petrella speaks with Chris Porter, CISO at Fannie Mae, on cultivating cybersecurity culture and talent. Spooky spam is back. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Solution Spotlight today, N2K's Simone Petrella speaks with Chris Porter, CISO at Fannie Mae, on cultivating cybersecurity culture and talent. You can hear Simone's and Chris' full conversation in this special edition podcast. Selected Reading Key Federal Cyber Panel to Probe Chinese Telecoms Hacking (Bank Info Security) CloudScout: Evasive Panda scouting cloud services (We Live Security) ChatGPT Jailbreak: Researchers Bypass AI Safeguards Using Hexadecimal Encoding and Emojis (SecurityWeek) Nintendo Warns of Phishing Attack Mimics Company Email Address (gbhackers) Five Eyes Agencies Launch Startup Security Initiative (Infosecurity magazine) CISA sees elimination of ‘bad practices' as next secure-by-design step (CyberScoop) Apple Launches 'Apple Intelligence' and Offers $1M Bug Bounty for Security (Hackread) Columbus drops lawsuit against data leak whistleblower Connor Goodwolf, but with a catch (NBC) Spooky Spam, Scary Scams: Halloween Threats Rise (Security Boulevard) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Risky Business
Risky Business #767 – SEC fines Check Point, Mimecast, Avaya and Unisys over hacks

Risky Business

Play Episode Listen Later Oct 23, 2024 62:21


On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: SEC fines tech firms for downplaying the Solarwinds hacks Anonymous Sudan still looks and quacks like a Russian duck Apple proposes max 10 day TLS certificate life Oopsie! Microsoft loses a bunch of cloud logs Veeam and Fortinet are bad and should feel bad North Koreans are good (at hacking) And much, much more. This week's episode is sponsored by Proofpoint. Chief Strategy Officer Ryan Kalember joins to talk about their work keeping up with prolific threat actor SocGholish. This episode is also available on Youtube. Show notes Four cyber companies fined for SolarWinds disclosure failures U.S. charges Sudanese men with running powerful cyberattack-for-hire gang Hacker Charged With Seeking to Kill Using Cyberattacks on Hospitals | WIRED Risky Biz News: Anonymous Sudan's Russia Links Are (Still) Obvious Microsoft confirms partial loss of security log data on multiple platforms | Cybersecurity Dive Risky Biz News: Apple wants to reduce the lifespan of TLS certificates to 10 days Encrypted Chat App ‘Session' Leaves Australia After Visit From Police Crypto platform Radiant Capital says $50 million in digital coins stolen following account compromises North Korean hackers use newly discovered Linux malware to raid ATMs - Ars Technica Brazil Arrests ‘USDoD,' Hacker in FBI Infragard Breach – Krebs on Security Here's how SIM swap in alleged bitcoin pump-and-dump scheme worked - Ars Technica Critical Veeam CVE actively exploited in ransomware attacks | Cybersecurity Dive FortiGate admins report active exploitation 0-day. Vendor isn't talking. - Ars Technica Hackers reportedly impersonate cyber firm ESET to target organizations in Israel The latest in North Korea's fake IT worker scheme: Extorting the employers

The Cybersecurity Defenders Podcast
#164 - Intel Chat: Wazuh, .io, AI, Discord, Palo Alto & GoldenJackal

The Cybersecurity Defenders Podcast

Play Episode Listen Later Oct 21, 2024 40:36


In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel.A recent malware campaign has been discovered that exploits the open-source Wazuh SIEM agent to deliver a cryptomining payload. There is uncertainty surrounding the .io domain following the UK's decision to return the Chagos Islands, including the British Indian Ocean Territory, to Mauritius.The October 2024 report, "Influence and Cyber Operations," explores how AI is being leveraged by both state and non-state actors in cyber campaigns. Key findings show that AI tools are increasingly being used to enhance traditional cyberattacks, particularly in areas like vulnerability research, malware debugging, and influence operations. Discord has recently been blocked in both Russia and Turkey due to claims of illegal activity on the platform.Palo Alto Networks recently patched several critical vulnerabilities in its Expedition tool, which could allow attackers to take control of firewall systems. The most severe flaw, CVE-2024-9463, allows unauthenticated attackers to execute arbitrary OS commands as root, exposing sensitive data like usernames, passwords, and API keys.The article from ESET highlights a cyberespionage campaign conducted by a group known as GoldenJackal, which is targeting government and diplomatic entities, focusing specifically on air-gapped systems in regions such as Europe, the Middle East, and South Asia.

Security Conversations
ESET Israel wiper malware, China's Volt Typhoon response, Kaspersky sanctions and isolation

Security Conversations

Play Episode Listen Later Oct 18, 2024 98:18


Three Buddy Problem - Episode 17: News of a wiper malware attack in Israel implicating ESET, threats from wartime hacktivists, China's strange response to Volt Typhoon attribution and Section 702 messaging, an IE zero-day discovery and web browser rot in South Korea, the ongoing isolation of Kaspersky due to sanctions, and the geopolitical influences affecting cybersecurity reporting. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs) (SentinelLabs), Costin Raiu (https://twitter.com/craiu) (Art of Noh) and Ryan Naraine (https://twitter.com/ryanaraine) (SecurityWeek).

Cyber Security Today
Evilginx - an open source program to bypass MFA: Cyber Security Today for Wednesday, September 25, 2024

Cyber Security Today

Play Episode Listen Later Sep 25, 2024 8:30 Transcription Available


Evilginx: MFA Bypass Tool, Kaspersky's Exit & FTC's Data Surveillance Report - Cyber Security Today In this episode of Cyber Security Today, host Jim Love discusses a new cyber security tool called Evilginx that bypasses multi factor authentication (MFA), Kaspersky's unexpected software replacement for North American users, ESET's patches for critical vulnerabilities, and a scathing FTC report on data collection by major tech companies. Learn about the latest cyber security threats and updates to stay informed and protected. 00:00 Introduction to Today's Cyber Security News 00:26 Evilginx: The New Threat to Multi-Factor Authentication 02:45 Kaspersky's Controversial Exit from the U.S. Market 04:36 ESET Patches Critical Vulnerabilities 06:33 FTC's Scathing Report on Big Tech's Data Practices 08:11 Conclusion and Show Notes

Rich On Tech
Pixel 9, Massive Data Breach & Dangers of AI

Rich On Tech

Play Episode Listen Later Aug 17, 2024 107:11 Transcription Available


Rich discusses the new Pixel hardware from the latest Made By Google Event. Here's how to check if your SSN was involved in that massive data breach. Links to freeze credit reports: Experian, TransUnion, Equifax Ryan Montgomery, founder of cybersecurity firm Pentester. NPD Breach Check Tool Mentioned: Bitdefender and ESET for anti-virus, iVPN and Mullvad for VPNs Follow Ryan on Instagram for more cybersecurity info and tips Eric in the I.E. asks there's something similar to Pixel's Call Notes feature for the iPhone. Apple is adding a call recording feature in iOS 18. Samsung is bringing Circle to Search to select Galaxy A series smartphones. Rich shares details on the Pixel Watch 3 and Pixel Buds Pro 2. Maxx in Lake Worth, FL says you should consider freezing one more system from ChexSystems to avoid identify theft with bank accounts being opened in your name. Mark in Woodland Hills is wondering if there's a way to keep his phone cool while cycling outside. Rich mentioned the Phoozy phone case. Fitbit Premium users will have access to some Peloton classes starting in September. Rishi Chandra, Google Home, Shenaz Zack, Google Pixel and Sandeep Waraich, Pixel Wearables. Melody in Carlsbad says random photos are showing up on her Mac computer. Check the folder you're using for your screensaver: Open System Preferences, Screen Saver, Photos and check the library or folder. Elsa in Playa Del Rey wants to use DIRECTV Stream but it doesn't work with Samsung. Robert is trying to make his DIRECTV Genies tune to a certain sports game at a certain time. California will soon let you add your Driver's License and ID to Apple Wallet. Max Tegmark of the Future of Life Institute will talk about the good and bad of AI. Proton VPN now has a browser extension and it's completely free. There's a new world record for most consoles hooked up to one TV: 444. Dylan from St. Louis wrote in to say how much he likes the discount gift card website GCX, formerly Raise. Rich DeMuro talks about tech news, tips, and gadget reviews and conducts interviews in this weekly show. Airs 11 AM - 2 PM PT on KFI AM 640 and syndicated on 350+ stations nationwide. Stream live on the iHeartRadio App or subscribe to the podcast. Follow Rich on X, Instagram and Facebook. Call 1-888-RICH-101 (1-888-742-4101) to join in! Links may be affiliate. RichOnTech.tv See omnystudio.com/listener for privacy information.