Podcasts about Europol

  • 514PODCASTS
  • 919EPISODES
  • 37mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Apr 15, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Europol

Latest podcast episodes about Europol

The technology blog and podcast
A crocodile that can't be trusted: episode 234 of The Security Box

The technology blog and podcast

Play Episode Listen Later Apr 10, 2025 160:52


Hello gang, welcome to the security box, podcast 234. There is quite a bit of things coming down the pike as it comes to news including the extension of the ban which was supposed to take affect already. We've got a topic dealing with Crocodilus coming up, and of course our answer on the trivia from last week. If you'd like to contact the show, contact information is available on the show, or go to the">http://www.jaredrimer.net">the web site to learn how to do so. A">https://technology.jaredrimer.net/2025/04/03/a-hacker-within-the-mix-of-the-doge/">A hacker within the mix of the Doge? Europol">https://technology.jaredrimer.net/2025/04/03/europol-took-down-a-vast-pedophile-network/">Europol took down a vast pedophile network Find anything else not listed? Let us know! Other news will be posted that we go in to more detail on during the show but there is not room on these notes.We don't name these, so don't yell at us. Crocodilus">https://technology.jaredrimer.net/2025/03/31/crocodilus-is-new-steals-crypto-wallets-abuses-accessibility-features/">Crocodilus is new, steals crypto wallets, abuses accessibility features is the blog post and New">https://www.bleepingcomputer.com/news/security/new-crocodilus-malware-steals-android-users-crypto-wallet-keys/">New Crocodilus malware steals Android users' crypto wallet keys is the article itself. If you'd like to support our efforts on what this podcast is doing, you can feel free to donate">http://www.jaredrimer.net/donations.html">donate to the network, subscribing">https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list or sending us a note through contact information throughout the podcast. You can also find contact details on our blog">https://technology.jaredrimer.net/contact-admins/">blog page found here. Thanks so much for listening, reading and learning! We can't do this alone.

IT Privacy and Security Weekly update.
EP 237.5 Deep Dive: Artificial General Intelligence and The IT Privacy and Security Weekly Update for the Week Ending April 8th., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Apr 9, 2025 15:39


1. Concerns About AGI DevelopmentDeepMind's 108-page report outlines four major risks of Artificial General Intelligence (AGI):Misuse: AGI used maliciously (e.g., creating viruses).Misalignment: AGI acting contrary to intended goals.Mistakes: Errors causing unintended harm, especially in high-stakes sectors like defense.Structural Risks: Long-term impacts on trust, power, and truth in society. While safety measures are urged, full control of AGI remains uncertain.2. Improving Machine Learning SecurityThe open-source community is adopting model signing (via Sigstore), applying digital signatures to AI models. This ensures the model's authenticity and integrity—helping prevent the use of tampered or untrusted code in AI systems.3. Risks from AI Coding AssistantsA newly identified threat—Rules File Backdoor—allows attackers to embed malicious instructions in configuration files used by AI coding assistants (like GitHub Copilot or Cursor). This can lead to AI-generated code with hidden vulnerabilities, increasing risk through shared or open-source repos.4. Italy's Controversial Piracy ShieldPiracy Shield, Italy's system for blocking pirated content, has mistakenly blacklisted legitimate services like Google Drive. Critics highlight issues around lack of transparency, violations of net neutrality and digital rights, and risks of censorship. Despite backlash, the system is being expanded, raising further concerns.5. EU's Push on Data Access and EncryptionThe EU's ProtectEU strategy includes strengthening Europol into a more FBI-like agency and proposing roadmaps for law enforcement access to encrypted data. This indicates a potential push toward backdoor access, reigniting debates on privacy vs. security.6. Cyberattacks on Australian Pension FundsCoordinated cyberattacks have compromised over 20,000 accounts across Australian retirement funds, with some user savings stolen. The incidents expose vulnerabilities in financial infrastructure, prompting a government initiative to bolster sector-wide cybersecurity.7. Lessons from Oracle's Security BreachesOracle reported two separate breaches in a short span. The latest involved theft of outdated login credentials. These incidents reveal persistent challenges in securing large tech platforms and highlight the need for ongoing security improvements and scrutiny of legacy systems.8. Closure of OpenSNP Genetic DatabaseOpenSNP is shutting down after 14 years, deleting all user data due to rising concerns over misuse of genetic data, especially amid growing political threats from authoritarian regimes. The founder emphasized protecting vulnerable populations and reevaluated the risks of continued data availability versus its research value.

IT Privacy and Security Weekly update.
Artificial General Intelligence and The IT Privacy and Security Weekly Update for the Week Ending April 8th., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Apr 8, 2025 18:30


EP 237. DeepMind just released a 108-page manual on not getting wiped out by our own invention.  Highlighting the fact that planning for an AI apocalypse could now be a core business line function.Sigstore machine learning model signing - AI models are finally getting digital signatures, because “mystery code from the internet” just wasn't a scalable trust strategy.Turns out your AI  programmer can be tricked into writing malware.  Helping us understand that “copilot” isn't necessarily synonymous with “competent”.Italy's anti-piracy tool is blocking legit services like it's playing "whack-a-mole" blindfolded, but in this case the moles are  cloud storage, like your Google drive.The EU wants Europol to act like the FBI because privacy for our citizens is important, except when we want to read their encrypted messages.Hackers hit Aussie retirement funds, proving the only thing scarier than blowing through all your retirement money is someone else blowing through it all for you.Oracle's been hacked again—because who doesn't love a sequel with worse security and a bigger cleanup bill?OpenSNP just quit the internet after realizing DNA + authoritarian vibes = one dystopia too many.This week is a wild ride, so saddle up and hold on tight!

The CyberWire
The invisible force fueling cyber chaos.

The CyberWire

Play Episode Listen Later Apr 3, 2025 30:59


A joint advisory labels Fast Flux a national security threat. Europol shuts down a major international CSAM platform. Oracle verifies a data breach. A new attack targets Apache Tomcat servers. The Hunters International group pivots away from ransomware. Hackers target Juniper routers using default credentials. A controversy erupts over a critical CrushFTP vulnerability.  Johannes Ullrich, Dean of Research at SANS Technology Institute unpacks Next.js.  Abracadabra, alakazam — poof! Your credentials are gone. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Johannes Ullrich, Dean of Research at SANS Technology Institute, is discussing Next.js and how similar problems have led to vulnerabilities recently. Selected Reading Fast Flux: A National Security Threat (CISA) Don't cut CISA personnel, House panel leaders say, as they plan legislation giving the agency more to do (CyberScoop) CSAM platform Kidflix shut down by international operation (The Record) AI Image Site GenNomis Exposed 47GB of Underage Deepfakes (Hackread) Oracle tells clients of second recent hack, log-in data stolen, Bloomberg News reports (Reuters) Hackers Exploiting Apache Tomcat Vulnerability to Steal SSH Credentials & Gain Server Control (Cyber Security News) Hunters International Ransomware Gang Rebranding, Shifting Focus (SecurityWeek) Hackers Actively Scanning for Juniper's Smart Router With Default Password (Cyber Security News) Details Emerge on CVE Controversy Around Exploited CrushFTP Vulnerability (SecurityWeek)  New Malware Attacking Magic Enthusiasts to Steal Login Credentials (Cyber Security News) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

WDR 5 Morgenecho
Kinderpornografie-Seite gestoppt: "Riesige Herausforderung"

WDR 5 Morgenecho

Play Episode Listen Later Apr 3, 2025 5:58


Ermittler:innen ist es gelungen, eine kinderpornografische Streamingplattform abzuschalten. Nun müssten die Personalien der Tatverdächtigen ermittelt werden, was lange dauern könnte, sagt Markus Hartmann, Zentral- und Ansprechstelle Cybercrime NRW. Von WDR 5.

WDR aktuell - Der Tag
Riesiges Netzwerk von Pädosexuellen zerschlagen

WDR aktuell - Der Tag

Play Episode Listen Later Apr 2, 2025 10:07


Bayerische Ermittler und Europol haben im Darknet ein riesiges Netzwerk von Pädosexuellen zerschlagen. Die US-Zölle kommen - wie gehen NRW-Firmen damit um? Erschwerte Einreise - für Großbritannien braucht man jetzt eine Genehmigung. Von Jutta Hammann.

WDR 5 Morgenecho
Sicherheitsstrategie für die EU: "Wegweisende Ausrichtungen"

WDR 5 Morgenecho

Play Episode Listen Later Apr 2, 2025 7:54


Die EU-Kommission stellt "ProtectEU" vor: Europol soll einsatzfähiger werden und Sicherheitsbehörden besseren Zugriff auf Daten bekommen. Solch ein legaler Zugriff sei wichtig, sagt EU-Abgeordnete und Kriminalpolizistin Verena Mertens (CDU). Von WDR 5.

Storm⚡️Watch by GreyNoise Intelligence
Cybercrime Evolution: Robot Dog Backdoors & Mob's Digital Takeover

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Apr 1, 2025 58:12


Forecast = Cloudy with a chance of cyber meatballs. ‍ We're not fooling around in this episode of Storm⚡️Watch! The show kicks off with some positive news about the Journal Times returning to full operations following a cyberattack. This is followed by important information for VMware users regarding Broadcom's significant licensing changes effective April 10, including an increase in minimum core requirements from 16 to 72 cores per command line and a new 20% penalty for late subscription renewals that will be applied retroactively. The crew then reviews results from their recent poll asking listeners which feature of encrypted messaging apps concerns them most, with options including data storage, unencrypted backups, metadata, and accidental adds. In our first segment, we discuss security concerns with the Unitree Go1 consumer-grade robot dog, specifically focusing on the recently disclosed Zhexi Oray Tunnel backdoor that has raised alarm in the security community. Next up, the team explores FamousSparrow and their SparrowDoor malware, examining the techniques and implications of this threat actor's operations. In light of recent event, the hosts provide comprehensive guidance on secure messaging practices, drawing from recent Washington Post and Wired articles. They emphasize that secure communication depends not just on the app but also on how you use it. Key recommendations include choosing contacts wisely, securing your devices by using personal rather than work equipment, setting messages to automatically delete, and selecting the right messaging apps with Signal being the top recommendation for its verifiable end-to-end encryption. They also warn about potential vulnerabilities in cross-platform messaging and advise caution with apps like Telegram. We quickly review Europol's 2025 report on the evolving landscape of organized crime, which now heavily intersects with cybercrime. Traditional criminal networks have transformed into technology-driven enterprises using AI, blockchain, and cryptocurrency to enhance their operations. The internet has become the primary theater for organized crime with data as the new currency of power. The report identifies seven key threat areas and calls for improved global financial security measures, noting that criminal asset confiscation remains stagnant at around 2%. Finally, we conclude with updates from our benevolent overlords, including Censys' reports on JunOS vulnerabilities and Kubernetes issues, VulnCheck's partnership with Filigran, runZero's approach to exposure management, and GreyNoise's observations on DrayTek router activity and Palo Alto Networks scanner activity that may indicate upcoming threats. Storm Watch Homepage >> Learn more about GreyNoise >>  

Informationen am Abend - Deutschlandfunk
Bedrohungen - EU-Kommission plant grundlegende Reform der Polizeibehörde Europol

Informationen am Abend - Deutschlandfunk

Play Episode Listen Later Apr 1, 2025 3:20


Brockhues, Annabell www.deutschlandfunk.de, Informationen am Abend

The Artificial Intelligence Podcast
Today in AI - March 18, 2025

The Artificial Intelligence Podcast

Play Episode Listen Later Mar 27, 2025 50:28


Today in AI is a daily recap of the latest news and developments in the AI industry. See your story and want to be featured in an upcoming episode? Reach out at tonyphoang.com Zeekr, a subsidiary of Geely, is offering advanced driver-assistance systems (ADAS) for free to local customers in China. This strategic move, incorporating Nvidia's advanced Thor chip and lidar technology, is designed to attract safety-conscious consumers. By providing these features at no additional cost, Zeekr aims to accelerate the adoption of semi-autonomous driving technologies, positioning itself competitively in the rapidly evolving Chinese electric vehicle market. GrubMarket has successfully raised $50 million in Series G funding, bringing its valuation to over $3.5 billion. The company utilizes AI technology to streamline its supply chain, increase operational efficiency, and support its growth through strategic acquisitions. This significant investment solidifies GrubMarket's position as a leading entity in the food technology sector, paving the way for further advancements and market expansion. Google's acquisition of cybersecurity firm Wiz for $32 billion marks its largest purchase to date, aimed at enhancing its cloud computing security capabilities amidst rising AI technology demands. This acquisition strengthens Google Cloud's security offerings, helping it to compete more effectively with Amazon Web Services and Microsoft Azure. However, this move also brings potential antitrust scrutiny, highlighting the complex regulatory environment surrounding large-scale tech acquisitions. Nvidia's CEO Jensen Huang announced major advancements in AI and robotics at the GTC 2025 conference, including new graphics architectures and synthetic data generation methods. These breakthroughs are expected to transform various industries by improving AI capabilities and autonomous systems. The conference also featured the unveiling of the Blackwell Ultra chip family and Vera Rubin GPU, which are poised to enhance the development and deployment of AI models, showcasing Nvidia's commitment to innovation in the technology sector. Europol has reported an increase in the misuse of AI by organized crime groups, involving activities such as cyber-attacks, money laundering, and the creation of child sexual abuse material. This trend presents significant challenges for law enforcement agencies. Europol's report calls for sophisticated technological solutions and enhanced international cooperation to effectively address and mitigate these evolving threats.

De Dag
#1828 - Hoe jonge jongens criminelen worden

De Dag

Play Episode Listen Later Mar 26, 2025 22:25


In de podcast het verhaal van Jamal (niet zijn echte naam) die op zijn 13e geronseld werd om criminelen te helpen. Inmiddels is hij 16 en zet hij zelf andere 'sukkels' aan het werk.  Het jongerenkanaal van de NOS, NOS Stories, dook in de wereld van ronselaars en geronselde kinderen in het criminele circuit. Presentator Crystalina Agyeman-Prempeh sprak onder meer met een 16-jarige jongen die vrijuit vertelt over zijn criminele activiteiten. Zelf werd hij op zijn dertiende benaderd en inmiddels zet hij andere jongens aan het werk. 'Die klusjes laat ik doen door kneuzen,' zegt hij. 'Want zelf doen, dat is teveel risico. En ja, ik weet wel dat ik deze jongens meetrek in het criminele leven, maar goed, dat is natuurlijk hun eigen keuze.' De Europese politiedienst Europol waarschuwt voor de kwetsbaarheid van jongeren. Zij zouden steeds vaker "het vuile werk" voor criminele organisaties opknappen. Abdellaziz Akhath is jongerenwerker, werkte 10 jaar in een jeugdgevangenis, en staat in nauw contact met jongens die in het criminele circuit terecht zijn gekomen of ertegenaan schurken. Hij vertelt vanuit de praktijk welke verhalen hij tegenkomt. 'We krijgen het steeds drukker.'  Reageren? Mail dedag@nos.nl Presentatie & Montage: Elisabeth Steinz Redactie: Lisa Konings

Learn Irish & other languages with daily podcasts
20250326_IRISH__dhareag_gafa_in_eirinn_agus_sa_spainn_faoi_choireacht_eagraithe

Learn Irish & other languages with daily podcasts

Play Episode Listen Later Mar 26, 2025 5:39


jQuery(document).ready(function(){ cab.clickify(); }); Original Podcast with clickable words https://tinyurl.com/2bu895q6 Contact: irishlingos@gmail.com Twelve arrested in Ireland and Spain for organised crime. Dháréag gafa in Éirinn agus sa Spáinn faoi choireacht eagraithe. Twelve people have been arrested by the Gardaí in this country and by police in Spain as part of a coordinated investigation by Europol into international organised crime, particularly drug trafficking. Tá dháréag gafa ag na Gardaí sa tír seo agus ag póilíní sa Spáinn mar chuid d'fhiosrúchan comhordaithe atá ar bun ag Europol faoi choireacht eagraithe idirnáisúnta, go háirithe gáinneáil ar dhrugaí. Six were arrested in Ireland and six in Spain. Gabhadh seisear in Éirinn agus seisear sa Spáinn. The investigation concerns the trafficking of cocaine and heroin between the two countries in trucks. Baineann an fiosrúchán le gáinneáil ar chócaon agus hearóin idir an dá thír i leoraithe. The six men, aged between 30 and 60, were arrested in Ireland yesterday and have been questioned at various Garda stations in Dublin. Arú inné a gabhadh an seisear in Éirinn, ar fir iad idir na tríochaidí agus na seascaidí, agus tá siad á gceistiú ó shin i stáisiúin Ghardaí éagsúla i mBaile Átha Cliath. They can be kept for up to a week. Is féidir iad a choinneáil ar feadh suas le seachtain. At least one Irishman is among the men arrested in Spain. Tá Éireannach amháin ar a laghad i measc na bhfear a gabhadh sa Spáinn. It is understood that the men are linked to the crime gang known as 'The Family', which has replaced the Kinahans as the head of drug trafficking in the greater Dublin area and beyond. Tuigtear go bhfuil baint ag na fir leis an drong coireachta dá ngairtear 'The Family' agus atá tagtha in áit lucht Kinahan i gceann na mangaireachta drugaí i mórcheantar Bhaile Átha Cliath agus níos faide amach. RTÉ News and Current Affairs Nuacht agus Cúrsaí Reatha RTÉ

Reimagining Cyber
AI and Cybercrime: Europol's New Warning and Global Threats

Reimagining Cyber

Play Episode Listen Later Mar 25, 2025 17:13


In this episode of Reimagining Cyber, we dive into Europol's latest report, The Changing DNA of Serious and Organised Crime, which highlights how AI is accelerating cybercrime and global information warfare.  Rob Aragao, breaks down the report's key findings, including AI-driven fraud, deepfake scams, and automated cybercrime operations.We also explore the broader implications of AI in shaping misinformation campaigns, with major players like China, Russia, and Iran investing billions in disinformation efforts. As law enforcement agencies struggle to keep up, we discuss the challenges of combating AI-powered threats and what this means for cybersecurity on a global scale.Rob also touches on how The U.S. is facing challenges in defending against AI-driven disinformation, as key institutions are shut down. This reduction in information validation and support makes it harder to track and counter adversarial efforts. Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com

Financial Crime Weekly Podcast
Financial Crime Weekly Episode 149

Financial Crime Weekly Podcast

Play Episode Listen Later Mar 23, 2025 19:15


Hello, and welcome to episode 149 of the Financial Crime Weekly Podcast, I'm Chris Kirkbride. The sanctions news this week probably accounts for the bulk of the news. New sanctions from the EU, UK, and US, as well as the monthly report from the Centre for Research on Energy and Clear Air. In the UK, the National Crime Agency has published its SARs Reporter Booklet for March, and on bribery news, more on the corruption investigation relating to people connected to the European Parliament, and the UK, France, and Switzerland launch a new anti-corruption taskforce. On fraud news, the UK has published the Independent Review of Disclosure and Fraud Offences, and the International Organization of Securities Commissions (‘IOSCO') has announced a new investors alerts portal. In terms of the major news this week, it is undoubtedly the publication of Europol's EU Serious and Organised Crime Threat Assessment (EU-SOCTA) 2025.A transcript of this podcast, with links to the stories, will be available by Monday at www.crimes.financial.

Dagens Juridik
Avklädda advokater, Europol & friad fotograf

Dagens Juridik

Play Episode Listen Later Mar 21, 2025 48:33


I veckans avsnitt välkomnar vi en ny deltagare i podden och pratar om: Advokater som tvingas klä av sig Påstådda Lundin-hoten Fotografering i rättssalen Och Europols SOCTA-rapport - där det slås fast att den organiserade brottsligheten i Europa både ökar och muterar. Hosted on Acast. See acast.com/privacy for more information.

Improve the News
Istanbul mayor detention, USAID shutdown ruling and AI-catalyzed organized crime

Improve the News

Play Episode Listen Later Mar 20, 2025 32:34


Istanbul's mayor is detained over investigations into alleged corruption and terrorism support, Canada inks a $4.2B Arctic radar deal with Australia, Ukraine reports Russian strikes after Putin agreed to a partial truce in consultation with the Trump admin., Germany breaks its debt rules to finance its defense spending boost, the UK's Kemi Badenoch drops her net zero emissions support, Jair Bolsonaro's son takes leave from Brazil's Congress and seeks US political asylum, a US federal judge blocks the Trump admin.'s USAID shutdown, while a US federal judge moves Mahmoud Khalil's deportation case to New Jersey, the US Federal Reserve holds interest rates steady, and a Europol report claims that AI is becoming a powerful catalyst for organized crime. Sources: www.verity.news

The CyberWire
Remote hijacking at your fingertips.

The CyberWire

Play Episode Listen Later Mar 19, 2025 32:03


A critical vulnerability could let attackers hijack and potentially disable vulnerable servers. Europol warns of a “shadow alliance” between state-backed threat actors and cybercriminals. Sekoia examines ClearFake. A critical PHP vulnerability is under active exploitation. A sophisticated scareware phishing campaign has shifted its focus to macOS users. Phishing as a service attacks are on the rise. A new jailbreak technique bypasses security controls in popular LLMs. Microsoft has uncovered StilachiRAT. CISA confirms active exploitation of a critical Fortinet vulnerability. On our CertByte segment, Chris Hare is joined by Troy McMillan to break down a question targeting the ISACA® Certified Information Security Manager® (CISM®) exam. AI coding assistants get all judgy.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CertByte Segment Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from N2K's suite of industry-leading certification resources. This week, Chris is joined by Troy McMillan to break down a question targeting the ISACA® Certified Information Security Manager® (CISM®) exam. Today's question comes from N2K's ISACA® Certified Information Security Manager® (CISM®) Practice Test. The CISM exam helps to affirm your ability to assess risks, implement effective governance, proactively respond to incidents and is the preferred credential for IT managers, according to ISACA.To learn more about this and other related topics under this objective, please refer to the following resource: CISM Review Manual, 15th Edition, 1.0, Information Security Governance, Introduction. Have a question that you'd like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K's full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers. Additional source: https://www.isaca.org/credentialing/cism#1 Selected Reading Critical AMI MegaRAC bug can let attackers hijack, brick servers (bleepingcomputer) Europol Warns of “Shadow Alliance” Between States and Criminals (Infosecurity Magazine) ClearFake's New Widespread Variant: Increased Web3 Exploitation for Malware Delivery (Sekoia.io Blog) PHP RCE Vulnerability Actively Exploited in Wild to Attack Windows-based Systems (cybersecuritynews) Scareware Combined With Phishing in Attacks Targeting macOS Users (securityweek) Sneaky 2FA Joins Tycoon 2FA and EvilProxy in 2025 Phishing Surge (Infosecurity Magazine) New Jailbreak Technique Bypasses DeepSeek, Copilot, and ChatGPT to Generate Chrome Malware (gbhackers) Microsoft Warns of New StilachiRAT Malware (SecurityWeek) Fortinet Vulnerability Exploited in Ransomware Attack, CISA Warns (Infosecurity Magazine) AI coding assistant Cursor reportedly tells a 'vibe coder' to write his own damn code (TechCrunch) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Radio Schuman
Threats on EU Stability- AI-Powered Crime and Foreign Influence

Radio Schuman

Play Episode Listen Later Mar 19, 2025 13:36


Destabilisation is not only about getting money anymore. It's also about helping ideologically oriented states to reach their goals, Europol Director Catherine De Bolle tells Radio SchumanEuropol new study finds the latest trends in organised crime, revealing an increase in the use of AI tools in criminal activities including money laundering, fraud, and scams. “In fact, the system is training itself and you don't need 200 people anymore to send all the mails,” says Europol's Executive Director Catherine De Bolle, regarding the adoption of AI in organized criminal activities, “The AI system is even more accurate than the human letter, so you do not really find the mistakes anymore.” Europol also noted a growing cooperation between organised crime groups and foreign actors aiming to destabilise the EU. As a result, monetary gains from the crimes are no longer their only incentive. Radio Schuman also features discussions on the European Union's response to growing security concerns at its eastern borders and the uncertain US involvement in European defence, as well as this year's recipient of the Hunyadi János Award. Hosted on Acast. See acast.com/privacy for more information.

Das war der Tag - Deutschlandfunk
Europol-Bericht: Organisierte Kriminalität nutzt KI

Das war der Tag - Deutschlandfunk

Play Episode Listen Later Mar 18, 2025 2:33


Brockhues, Annabell www.deutschlandfunk.de, Das war der Tag

Informationen am Abend - Deutschlandfunk
Europol-Bericht: Organisierte Kriminalität nutzt KI

Informationen am Abend - Deutschlandfunk

Play Episode Listen Later Mar 18, 2025 2:33


Brockhues, Annabell www.deutschlandfunk.de, Informationen am Abend

Presa internaţională
„Coliva" lui Georgescu și bătălia lui Simion (SpotMedia)

Presa internaţională

Play Episode Listen Later Mar 17, 2025 5:06


Vicepreședinte român al Parlamentului European: „Dacă România nu se schimbă, la putere va veni „tatăl” lui Georgescu” (Adevărul) - Un important sociolog oferă o explicație pentru apariția „poporului lui Georgescu” (HotNews) - România online | Ce se ascunde în spatele războiului pentru atenție de pe rețelele de socializare (Europa Liberă) - Joaca de-a naziștii în România. Amenințări cu pistolul la tâmplă sau cu decapitarea, ignorate de autorități pe motiv că anchetele costă prea mult (Libertatea) „Coliva" lui Georgescu și bătălia lui Simion (SpotMedia)Odată cu validarea de către CCR a candidaturii lui George Simion se schimbă paradigma electorală.O certitudine este că marea majoritate a voturilor lui Călin Georgescu se vor diviza între George Simion și Victor Ponta, care este de așteptat să preia masiv din pesediștii captați de Georgescu și care nu au niciun interes pentru Crin Antonescu.Cine cât va lua depinde în linii mari de două întrebări-cheie ale zilelor viitoare1.Ce va face Călin Georgescu? Singurul mesaj pe care aceasta l-a transmis după invalidarea de către CCR este că și-a încheiat misiunea și fiecare să facă ce și cum îl duce capul la alegerile din mai...Lipsa susținerii ar putea să-l coste pe Simion câteva procente decisive pentru intrarea în turul al doilea. Este probabil ceea ce vrea și Calin Georgescu, pentru că odată intrat Simion în finală, Georgescu va dispărea cu totul.2.Ce va face Anamaria Gavrilă?Înțelegerea era că se vor înscrie și Simion și Gavrilă, ca plasă de siguranță, însă dacă vor fi validați se va retrage cel mai post clasat. Dacă dna Gavrilă nu se retrage sau nu o face înainte de fi tipărite buletinele de vot, va ciupi câteva mii de voturi de la Simion. Și cum lupta pentru turul al doilea se anunță teribilă, fiecare vot contează.Nu aș exclude, scrie jurnalista Ioana Ene Dogioiu pe pagina SpotMedia, ca însuși Călin Georgescu să o țină acolo tocmai pentru ca Simion să rateze turul al doilea și el să poată redeveni liderul izolaționiștilor.Vicepreședinte român al Parlamentului European: „Dacă România nu se schimbă, la putere va veni „tatăl” lui Georgescu” (Adevărul)Nicu Ștefănuță, vicepreședinte român al Parlamentului European, susține că România nu are o infrastructură industrială care să-i permită obținerea de fonduri europene masive pentru producția de armament, dar poate să se pregătească pentru război construindu-și o „infrastructură beton”.Independentul Nicu Ștefănuță, al doilea vicepreședinte român al Parlamentului European, a explicat pentru „Adevărul” că în situațiile de criză, cum a fost pandemia și cum este acum războiul din Ucraina, banii necesari pentru gestionarea problemelor sunt luați de la țările care nu au reușit să acceseze fondurile.În acest context, România stă foarte prost, în condițiile în care timp de un an și jumătate politicienii s-au concentrat doar pe alegeri și nu pe atragerea și ducerea la finalizare a proiectelor finanțate din fonduri europene.Ștefănuță avertizează că „dacă România nu se schimbă și mergem la fel ca până acum, peste patru ani nu va veni un Georgescu, ci va veni „tatăl” lui Georgescu”.INTERVIU. Teoria restanțelor la plata facturilor. Un important sociolog oferă o explicație pentru apariția „poporului lui Georgescu” (HotNews)“Poporul român” a renăscut în noiembrie 2024 pentru că un anume Călin Georgescu l-a făcut vizibil. Același “popor român” este dorit la vot, în mai 2025, pentru a alege, printre alții, pe succesorii lui Georgescu: George Simion sau Ana Maria Gavrilă.. Cine este acest “popor român”? L-am întrebat pe sociologul Dumitru Sandu, unul dintre cei mai respectați sociologi români.În interviul pentru Hotnews, Dumitru Sandu analizează ultimul sondaj Europol care relevă două tendințe clare:“Miscările sociale de protest și nemulțumire din România par să fi fost stimulate, în principal, de proasta funcțonare a instituțiilor, de corupția instituțională care a dus la această situație.” Sănătatea este, din acest punct de vedere, pe primul loc.Preocuparea privind Sănătatea este cea a bărbaților care nu mai sunt așa tineri și au dificultăți în plata facturilor lunare. Ei se întreabă: în situația dată de vârsta mea, de perpetuarea datoriilor mele, mă pot baza pe Spital, doctori? Răspunsul este Nu!”România online | Ce se ascunde în spatele războiului pentru atenție de pe rețelele de socializare (Europa Liberă)În România, 13 milioane de oameni folosesc rețele sociale la nivelul anului 2025, arată ultimele date de la DataReportal. Asta înseamnă că 68,6% din populația totală a României e conectată la social media.Cât de mult influențează informația primită de algoritmii social media deciziile din viața reală? Cum arată România online? Cum poate fi depistat un fake news?Europa Liberă a stat de vorbă cu oameni obișnuiți - utilizatori de social media, experți media, profesori care se ocupă de combaterea dezinformării și psihologi. Încercăm să explicăm mecanismele prin care suntem sau devenim victime ale manipulării pe internet.România preia în 2025 măsuri dure de protecție adoptate de Uniunea Europeană încă din 2022În pragul alegerilor prezidențiale programate pe 4 mai, Guvernul și Autoritatea Naţională pentru Administrare şi Reglementare în Comunicaţii (ANCOM) pregătesc o ordonanță de urgență împotriva campaniilor de fake-news din online.Măsurile ar trebui să intre în vigoare înainte de începerea campaniei electorale, adică înainte de 4 aprilie.Joaca de-a naziștii în România. Amenințări cu pistolul la tâmplă sau cu decapitarea, ignorate de autorități pe motiv că anchetele costă prea mult (Libertatea)Valul de neonazism promovat intens în ultimele luni de mișcările de extremă dreaptă se manifesta violent în România de cel puțin doi ani. Derapajele adepților acestui curent, care a ajuns să pună în pericol securitatea națională, au fost tratate însă cu indulgență de autorități. Adepții care au amenințat oameni nevinovați cu pistolul la tâmplă, cu moartea prin decapitare sau aruncatul cadavrelor în gropi comune au primit pedepse cu suspendare sau amânare.  Au fost inclusiv cazuri când procurorii au renunțat la anchetă, invocând un efort financiar și uman mult prea mare în raport cu gravitatea faptelor, iar infractorii au rămas neidentificați.Exemple concrete în ziarul Libertatea.

Financial Crime Weekly Podcast
Financial Crime Weekly Episode 148

Financial Crime Weekly Podcast

Play Episode Listen Later Mar 16, 2025 17:07


Hello, and welcome to episode 148 of the Financial Crime Weekly Podcast, I'm Chris Kirkbride. On sanctions, threats to Russia from the US, minor changes to the UK sanctions regime, and a couple of pieces of reading I wanted to share. On money laundering, a crypto exchange take-down in the US, while on bribery and corruption, activity in the EU against alleged corruption. On fraud, interesting stories from the US with warnings of fraud and the scale of fraud committed against citizens. On other financial crime news, Europol has announced that its EU Serious and Organised Crime Threat Assessment 2025, and we end this week with a round-up of cybercrime news.A transcript of this podcast, with links to the stories, will be available by Monday at www.crimes.financial.

The Garda Podcast
Repost: Dismantling organised crime groups in Ireland. Ten years of the GNDOCB.

The Garda Podcast

Play Episode Listen Later Mar 14, 2025 34:57


Our Garda National Drugs and Organised Crime Bureau (GNDOCB) was established ten years ago this month, in March 2015. Last year, Detective Chief Superintendent Séamus Boland spoke to the Garda Podcast about the history of the bureau and its determination to disrupt, dismantle and prosecute those taking part in organised crime in Ireland.Over the last ten years, the GNDOCB has seized:• €627 million in illicit drugs• 171 firearms and 6,586 rounds of ammunition• cash €33,284,931, £385,591 GBP, $59,721 USD and• €20,103,030 forfeited to the state• 1,722 arrests for drug trafficking, money laundering, possession of firearms and other offences.The GNDOCB has interdicted in numerous ‘threat to life' operations where individuals were being targeted by criminal gangs.The GNDOCB leads on Operation Tara, to disrupt, dismantle and prosecute drug trafficking networks, at all levels - international, national, local - involved in the importation, distribution, cultivation, production, local sale and supply of controlled drugs. Under Operation Tara, individuals and groups involved in the drug trade are the target of enforcement activity based on intelligence and the latest crime trends.The GNDOCB co-ordinates and supports Divisional Drugs Units with a strong focus on tackling street-level dealing in cities, towns and villages across the country.The GNDOCB also supports An Garda Síochána's well-established Drug Related Intimidation Reporting Programme and supports the Government-led health approach to drug addiction.Under Operation Thor, the GNDOCB co-ordinates and supports Divisional resources actively targeting organised crime gangs and repeat offenders, particularly involved in rural burglaries and crimes, through enforcement activity based on intelligence and the latest burglary trends.The GNDOCB actively works with other state agencies including Revenue Customs, and the Irish Naval Service through the Joint Task Force on Drug Interdiction, Criminal Assets Bureau, across the island of Ireland through the Cross-Border Joint Agency Task Force and internationally with INTERPOL, Europol, MAOC (N), and wider through the network of Garda Liaison Officers and contacts in the Americas, Europe and Middle East.

Programa del Motor: AutoFM
Ciberseguridad en la automoción con Guardia Civil y Policía Nacional

Programa del Motor: AutoFM

Play Episode Listen Later Mar 11, 2025 48:55


Dentro del Congreso Faconauto 2025 rescatamos una charla muy interesante sobre Ciberseguridad Cibercriminalidad: soluciones y retos en la era digital Participantes: • Patricia Rodríguez Fiscal de la Sala de Cibercriminalidad de la Fiscalía General del Estado. • Roberto Cuesta Comandante de la Unidad de Coordinación de Ciberseguridad de la Guardia Civil. • Víctor Calleja Inspector de la Unidad Central de Ciberdelincuencia de la Policía Nacional. Moderador: • Juan José Matías González Responsable de prevención del fraude y del blanqueo de capitales de ASNEF. En la ponencia sobre ciberseguridad celebrada en el marco del congreso de Faconauto, se abordó la creciente preocupación ante el incremento exponencial de la cibercriminalidad en España. Según el último informe del Ministerio del Interior de 2023, se denunciaron más de 470.000 delitos informáticos, destacando que el 90% fueron fraudes online. Esta cifra representa un alarmante aumento del 600% respecto al año 2016, subrayando la necesidad urgente de abordar este fenómeno con medidas eficaces y actualizadas. Patricia Rodríguez, fiscal especializada en cibercriminalidad informática, destacó que los datos conocidos son solo la punta del iceberg, dado que muchas empresas no denuncian las brechas de seguridad que sufren, lo que genera una cifra oculta muy elevada de ciberdelitos. Cada filtración de datos permite a grupos organizados de ciberdelincuentes aprovechar esta información para cometer múltiples delitos, desde estafas y extorsiones hasta delitos contra menores. Según la fiscal, este escenario se ha visto agravado por el rápido aumento del uso de tecnologías digitales durante la pandemia, situación para la cual la sociedad no estaba preparada. Rodríguez hizo énfasis en los esfuerzos internacionales por armonizar legislaciones, mencionando directivas europeas como la NIS2 y la directiva sobre lucha contra el fraude y la falsificación de medios de pago. Aunque estas normativas ayudan, reconoció que suelen llegar con retraso frente al ritmo acelerado de innovación tecnológica y criminal. No obstante, resaltó la esperanza que representan la cooperación internacional, la convención de Budapest, y la creación de equipos conjuntos de investigación. Víctor Calleja, inspector de la Policía Nacional especializado en cibercriminalidad, explicó que la globalidad y anonimato inherentes a internet son aspectos clave que hacen atractivo el ámbito de la ciberdelincuencia para los criminales. Señaló que estos delincuentes aprovechan tecnologías como VPN o la dark web para suplantar identidades y cometer fraudes, aumentando así la dificultad para las fuerzas de seguridad al momento de realizar investigaciones eficaces y rápidas. Calleja destacó la necesidad de una estrecha cooperación entre el sector público y privado, indicando que la colaboración eficaz entre departamentos de seguridad empresarial y cuerpos policiales acelera enormemente la respuesta frente a ataques informáticos y fraudes digitales. Mencionó además la importancia de la coordinación internacional mediante organismos como Europol e Interpol para enfrentar delitos que trascienden fronteras y afectan múltiples jurisdicciones. Por último, Calleja subrayó la importancia de desarrollar investigaciones judiciales sólidas, ágiles y bien estructuradas para garantizar resultados efectivos y facilitar el trabajo tanto a la fiscalía como a las autoridades judiciales. Aseguró que, a pesar de los desafíos técnicos y la creciente sofisticación de los ciberdelincuentes, el trabajo coordinado entre fiscales, jueces y cuerpos de seguridad está logrando casos de éxito que permiten identificar y sancionar a los responsables, generando un impacto positivo en la lucha contra este tipo de criminalidad. Producción: Fernando Rivas San Julián José Lagunar Herranz Todos los podcast: https://www.podcastmotor.es Twitter: @AutoFmRadio Instagram: https://www.instagram.com/autofmradio/ YouTube: https://www.youtube.com/@AutoFM Contacto: info@autofm.es

Leste Oeste de Nuno Rogeiro
O que explica a ambiguidade de Trump em relação à Ucrânia e à Rússia?

Leste Oeste de Nuno Rogeiro

Play Episode Listen Later Mar 9, 2025 50:03


O sítio eletrónico russo VchGPU, próximo de algumas altas figuras dos serviços secretos militares, publicou há dois meses uma série de relatos – vindos do interior – da situação real da economia russa. A sua deterioração total em 2025 poderia levar alguns generais a aconselhar ao uso de armas nucleares para resolver am «questão ucraniana», ou até global. Trump foi informado disso. Entretanto, os EUA continuam operações contra grupos criminosos russos. A última envolveu o FBI e a Europol, no desmantelamento da empresa de criptomoeda GARANTEX. See omnystudio.com/listener for privacy information.

De kracht van sensitieve leiders
Mens blijven in de wereld van georganiseerde misdaad met Catherine De Bolle uitvoerend directeur van Europol

De kracht van sensitieve leiders

Play Episode Listen Later Mar 8, 2025 56:51


"Wanneer je dagelijks geconfronteerd wordt met de gruwel van georganiseerde misdaad, is het gemakkelijk om jezelf af te sluiten. Maar écht leiderschap betekent menselijk blijven – tussen de mensen," deelt Catherine De Bolle in ons gesprek voor de podcast.Op het eerste gezicht lijkt Europol misschien niet de plek waar sensitiviteit een rol speelt. Maar wie beter luistert, hoort een ander verhaal. Catherine De Bolle, uitvoerend directeur van Europol, ziet sensitiviteit juist als een cruciaal onderdeel van sterk leiderschap. In deze aflevering ontdek je:

Caffe 2.0
3484 Chat Control continua - Uk, Europol e adesso la Svezia

Caffe 2.0

Play Episode Listen Later Mar 6, 2025 7:04


Continuano le segnalazioni di controllare di fatto le comunicazioni.E aumentano.Qualcuno propone il diritto alla crittografia in Costituzione ... magari ...

KI-Update – ein Heise-Podcast
KI-Update kompakt: KI auf dem MWC, Europol, Intel Foundry, 60-Stunden-Woche

KI-Update – ein Heise-Podcast

Play Episode Listen Later Mar 4, 2025 16:57


Das ist das KI-Update vom 04.03.2025 unter anderem mit diesen Themen: Künstliche Intelligenz auf dem Mobile World Congress Europol gelingt Schlag gegen KI-generierte Kinderpornographie Intel testet Foundry-Prozess mit Nvidia und Broadcom und Google-Gründer fordert 60 Stunden Arbeitswoche Links zu allen Themen der heutigen Folge findet Ihr hier: https://heise.de/-10303374 https://www.heise.de/thema/KI-Update https://pro.heise.de/ki/ https://www.heise.de/newsletter/anmeldung.html?id=ki-update https://www.heise.de/thema/Kuenstliche-Intelligenz https://the-decoder.de/ https://www.heiseplus.de/podcast https://www.ct.de/ki

Más de uno
Edu García: "Tebas ha sellado alianza con Europol para cerrar persianas virtuales"

Más de uno

Play Episode Listen Later Feb 28, 2025 2:04


Edu García hace un repaso por las novedades del mundo del deporte. 

4x4 Podcast
Apple investiert in den USA - wegen Zöllen?

4x4 Podcast

Play Episode Listen Later Feb 25, 2025 25:59


Das Tech-Unternehmen Apple will in den USA investieren. 500 Milliarden Dollar will Apple in den USA investieren und damit 20.000 Jobs schaffen. Das hat Apple-CEO Tim Cook nach einem Treffen mit US-Präsident Donald Trump angekündigt. Weitere Themen in dieser Sendung: 82,5% der stimmberechtigten Personen in Deutschland sind am Sonntag wählen gegangen. Damit war die Wahlbeteiligung bei den Bundestagswahlen so hoch wie seit Jahrzehnten nicht mehr. Warum? Sektenähnliche Gruppen sollen online gezielt Kinder kontaktieren, um sie zu manipulieren. So sollen sie Minderjährige zur Selbstverletzung anstiften oder sogar in den Suizid treiben. Das schreibt die Europäische Polizeibehörde Europol in einer Warnung. Aber Belege, dass dies ein weitverbreitetes Problem ist, sind dürftig. In Europa Fussball spielen, das ist für viele ghanaische Fussballerinnen und Fussballer der grosse Traum. Und schaffen es auch - zum Teil auch in die Schweiz. Nebst viel Talent braucht es dafür auch das Glück, von einem Fussballscout entdeckt zu werden. Wir sind mit einem unterwegs.

Digitalia
Digitalia #762 - Vaselinact

Digitalia

Play Episode Listen Later Feb 24, 2025 100:55 Transcription Available


Apple ritira Advanced Data Protection nel Regno Unito. Il cambio di gestionale di Vodafone. La Challenge del Paracetamolo. La tirannia delle app. Queste e molte altre le notizie tech commentate nella puntata di questa settimana.Dallo studio distribuito di digitalia:Franco Solerio, Michele Di Maio, Giulio CupiniProduttori esecutivi:Fabio Brunelli, Giuseppe Marino, Fabio Zappa, @Akagrinta, Justindipendent, Giuliano Arcinotti, Massimo Pollastri, Andrea Bottaro, Filippo Brancaleoni, Andrea Delise, Davide Bellia, Manuel Zavatta, Alessandro Lago, Alessandro Blasi, @Jh4Ckal, Christian Schwarz, Antonio Manna, Fabrizio Mele, Idle Fellow, Simon, Btcismy401K, Simone Magnaschi, Alessandro Grossi, Michele Bordoni, W1Nch3Ster - Alex, Edoardo Volpi Kellerman, Fiorenzo Pilla, Valerio Bendotti, Arzigogolo, Ligea Technology Di D'esposito Antonio, Fabrizio Reina, Nunnj, Paola Bellini, Cristian Pastori, Fabio Filisetti, Enrico De Anna, Hybridsarcasm, Cristian De Solda, Alberto Cuffaro, Angelo Travaglione, Luca Ongaro, Marcello Marigliano, @Ppogo, Nicola Gabriele Del Popolo, Andrea Malesani, Maurizio Faggian, Antonio Gargiulo, @Lucatax, Roberto BasileSponsor:Links:Apple Pulls Advanced Data Protection From the UKApple pulls data protection tool after UK government security rowOpenAI Uncovers Evidence of A.I.-Powered Chinese Surveillance ToolWhy the new Europol regulation is a Trojan Horse for surveillanceVodafone il cambio gestionale è da incuboHP is buying Humane and shutting down the AI PinTruly a middle finger: Humane bricking $700 AI PinsRabbit shows off the AI agent it should have launched withUn'overdose di farmaci vince chi fa il ricovero in ospedale più lungoRemoving Jeff Bezos From My Bed Truffle Security Co.The Floppotron 3.0 Silent's Homepagecalculator-app - Chad Nauseam HomeTheres no stress: gamers go offline in retro console revivalDOGE Has God Mode Access to Government DataElon Musk vuole correggere Community NotesElon's xAI Game Studio will revolutionize gaming.Is tracking everything actually good for us?Tyranny of apps: those without smartphones are unfairly penalisedHome | Mastercard NewsroomI libri scritti da esseri umani avranno un bollinoOnlyFans Star Announces She's PregnantAlmanacco Digitaliano 2024 su LedizioniAlmanacco Digitaliano su AmazonGingilli del giorno:NeoDB - gestione di collezioni multimediali attraverso il FediversoNominate - rinomina i PDF in base al contenutoNotebookLM - Il tuo assistente di ricerca AI personalizzatoSupporta Digitalia, diventa produttore esecutivo.

SBS Croatian - SBS na hrvatskom
Ukratko iz Hrvatske, 17.2.2025.

SBS Croatian - SBS na hrvatskom

Play Episode Listen Later Feb 17, 2025 8:30


Nakon Vanceovog govora u Münchenu, i Hrvatska analizira američki reset odnosa s Europom. Plenković mora naći novog ministra nakon što je Šime Erlić objavio kandidaturu za zadarskog gradonačelnika. Zločinačko udruženje i ekološki kriminal: Europol je otkrio veliki biznis s uvozom otpada i njegovim nezakonitim zakapanjem u Gospiću, Varaždinu i Benkovcu.

AML Conversations
Corruption, AI-based Fraud, Cybercrime, and Changing Priorities

AML Conversations

Play Episode Listen Later Feb 14, 2025 14:29


This week, John and Elliot discuss corruption, including the dropping of charges against New York Mayor Eric Adams, the Basel Institute on Governance's new quick guide on strategic corruption, and the DOJ's pausing enforcement of the Foreign Corrupt Practices Act. They also discuss issues raised by BaFin about AI-based fraud, actions by Europol on cybercrime, and other items impacting the financial crime prevention community.

ABC Noticias
Asesinan a Marco Ebben, narcotraficante holandés ligado a "El Mayo" y buscado por Europol

ABC Noticias

Play Episode Listen Later Feb 14, 2025 6:41


Por otra parte, Yunes Márquez es nombrado presidente de la Comisión de Hacienda y Crédito Público, en más notas, México podría demandar a Google por cambio de nombre del Golfo de México: Sheinbaum, en otras cosas, Senado aprueba reforma al Infonavit para usar ahorros de trabajadores en viviendas Hosted on Acast. See acast.com/privacy for more information.

The CyberWire
Read all about it—or maybe not.

The CyberWire

Play Episode Listen Later Feb 10, 2025 31:27


A cyberattack disrupts newspaper publishing. A major AI summit takes place in Paris this week. A federal judge restricts DOGE from accessing Treasury Department systems. Cybersecurity cooperation between Canada and the U.S. remains strong. The Kraken ransomware group leaks credentials allegedly linked to Cisco. Europol urges banks to start preparing for quantum-safe cryptography. Microsoft expands its Copilot bug bounty program. The PlayStation Network (PSN) experienced a major outage over the weekend. Indiana man sentenced to 20 years for $37m cryptocurrency fraud. Our guest is Mike Woodard, VP of Product Management for App Security at Digital.ai, sharing strategies to minimize risk when implementing AI. Hunting for length and complexity in WiFi passwords.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest is Mike Woodard, VP of Product Management for App Security at Digital.ai, sharing strategies to minimize risk when implementing AI to enhance security. Selected Reading Cyberattack Disrupts Publication of Lee Newspapers Across the U.S. (New York Times) Trump's AI Ambition and China's DeepSeek Overshadow an AI Summit in Paris (SecurityWeek) Musk Team's Treasury Access Raises Security Fears, Despite Judge's Ordered Halt (New York Times) In Breaking USAID, the Trump Administration May Have Broken the Law (ProPublica) Judge: DOGE made US Treasury ‘more vulnerable to hacking' (The Register) Cisco Data Breach – Ransomware Group Allegedly Breached Internal Network (GB Hackers) Europol Warns Financial Sector of “Imminent” Quantum Threat (Infosecurity Magazine) Trade war or not, Canada will keep working with the U.S. on cybersecurity (The Logic) Microsoft Expands Copilot Bug Bounty Program, Increases Payouts (SecurityWeek) PlayStation Network Down; Outage Leaves Gamers Frustrated (Updated) (HackRead) Indiana Man Sentenced to 20 Years in Federal Prison for Conspiracies Involving Cyber Intrusion and a Massive $37 Million Cryptocurrency Theft (DataBreaches.Net) The World's Longest and Strongest WiFi Passwords (InfoSec Write-ups)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Crypto Hipster Podcast
The Future of Decentralized Finance is Here; It's Time for Regulators to Get on Board, with Hedi Navazan @ 1inch Group (Video)

Crypto Hipster Podcast

Play Episode Listen Later Feb 9, 2025 37:09


 Hedi Navazan is the Chief Compliance Officer of 1inch Group, to your podcast. Hedi brings over a decade of expertise in regulatory compliance, financial crime prevention, and governance. With a distinguished career spanning both traditional finance and digital assets, Hedi is a pivotal figure in navigating the intersection of decentralized finance (DeFi) and global regulatory landscapes.Prior to joining 1inch, Hedi managed financial crime and regulatory teams across Europe at HSBC, where she gained extensive experience in banking and compliance. Her global perspective is further enhanced by her work with prominent organizations such as Europol, Interpol, and the United Nations Office on Drugs and Crime (UNODC), where she has advised and educated policymakers on creating robust regulatory frameworks for the digital asset sector.

Crypto Hipster Podcast
The Future of Decentralized Finance is Here; It's Time for Regulators to Get on Board, with Hedi Navazan @ 1inch Group (Audio)

Crypto Hipster Podcast

Play Episode Listen Later Feb 9, 2025 37:09


 Hedi Navazan, the Chief Compliance Officer of 1inch Group, to your podcast. Hedi brings over a decade of expertise in regulatory compliance, financial crime prevention, and governance. With a distinguished career spanning both traditional finance and digital assets, Hedi is a pivotal figure in navigating the intersection of decentralized finance (DeFi) and global regulatory landscapes.Prior to joining 1inch, Hedi managed financial crime and regulatory teams across Europe at HSBC, where she gained extensive experience in banking and compliance. Her global perspective is further enhanced by her work with prominent organizations such as Europol, Interpol, and the United Nations Office on Drugs and Crime (UNODC), where she has advised and educated policymakers on creating robust regulatory frameworks for the digital asset sector.

The Gate 15 Podcast Channel
Weekly Security Sprint EP 97. DeepSeek AI, Ransomware report, and more

The Gate 15 Podcast Channel

Play Episode Listen Later Feb 5, 2025 19:21


In this week's Security Sprint, Dave and Andy covered the following topics. Warm Start:   (TLP:CLEAR) WaterISAC – EPA: National Security Information Sharing Bulletin - Q1 2025. WaterISAC and EPA just published the latest quarterly edition of the National Security Information Sharing Bulletin. The Information Sharing Bulletin (ISB) is intended for water and wastewater utility owners and operators to provide information on priority security and resilience topics, including cybersecurity, physical security, and natural disasters.   Main Topics: Ransomware & Data Breaches: NCC Group releases Annual Cyber Threat Monitor Report 2024. LockBit‘s empire crumbles in the great ransomware reshuffle of 2024. When ransomware kills: Attacks on healthcare facilities New York Blood Center Enterprises Ransomware Attack Update Halcyon - Arcus Media Ransomware Displays Novel Process Targeting, Selective Encryption and Recovery Disruption. LockBit - Persistent TTPs in the Larger Ecosystem;   DeepSeek:  Pentagon scrambles to block DeepSeek after employees connect to Chinese servers Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information, Including Chat History.  Satellite images reveal China building war command center in Beijing. Meta's WhatsApp says Israeli spyware company Paragon targeted scores of users. Common Challenges in Cybercrime: 2024 Review by Eurojust and Europol. Cybercrime websites selling hacking tools to transnational organized crime groups seized. Europol: Law enforcement takes down two largest cybercrime forums in the world; The platforms combined had over 10 million users worldwide. Man Arrested On Capitol Hill Said He Wanted To Kill Trump Cabinet Officials, House Speaker: Police. Drones over NJ: Why didn't the FAA admit they authorized the flights? Here's what we know FBI Springfield Advises Caution in Online Relationships. MGM Agrees to Pay $45 Million to Settle Data-Breach Lawsuit.   Quick Hits: The ‘murder gang' of computer whizzkids linked to the killings of a Border Patrol agent and a landlord 3,000 miles apart. The Nashville Attack Displayed Several Hallmarks of Modern Terrorism  FBI PSA - Mail Theft-Related Check Fraud is on the Rise. The FBI and USPIS are warning that check fraud is on the rise, with a significant volume enabled through mail theft. X Phishing | Campaign Targeting High Profile Accounts Returns, Promoting Crypto Scams.  Risky Biz News - Twitter account hacks: Multiple high-profile accounts have been hacked over the past week to promote various memecoins. Chinese and Iranian Hackers Are Using U.S. AI Products to Bolster Cyberattacks. CISA employees told they are exempt from federal worker resignation program⁠. ⁠Alarmed by Chinese hacks, Republicans mute attacks on cybersecurity agency⁠ ⁠Top F.B.I. Agent in New York Vows to ‘Dig In' After Removals at Agency⁠ ⁠Wyden Demands Answers Following Report of Musk Personnel Seeking Access to Highly Sensitive U.S. Treasury Payments System⁠ ⁠Videos Show Massive Anti-ICE Protest Erupt As Demonstrators Take Over LA Highway⁠ ⁠Texas Man Admits to Making Violent Threats Against Sikh Nonprofit Organization⁠. ⁠Watch What You Say: SEC Enforcement Scrutinizes Cybersecurity Incident Disclosures⁠. ⁠Bird flu crisis enters new phase⁠.

La Ventana
El Club de la Escucha | Camioneros

La Ventana

Play Episode Listen Later Feb 5, 2025 16:51


Hablamos con Manu Tomillo, director y narrador de 'Camioneros', un podcast que pertenece a una coproducción internacional entre SER Podcast y Europol, en la alianza internacional con fondos europeos llamada WEPOD. 'Camioneros' aborda la importancia de uno de los trabajos más imprescindibles para nuestra sociedad: el de los camioneros. Se necesitan al menos 230.000 camioneros, según datos de la Asociación Internacional de Transportes por Carretera. Y, si nada cambia, las previsiones son preocupantes: en 4 años faltarán más de 740.000.

TechLinked
TikTok shut down, then came back. What's next?

TechLinked

Play Episode Listen Later Jan 21, 2025 7:36


Timestamps: 0:00 AI is on the fritz again 0:11 TikTok ban, un-ban, and fallout 4:05 QUICK BITS INTRO 4:14 Fake Ryzen X3Ds + robot marathons 5:02 Bambu Lab update 5:37 Europol comments on encryption 6:10 Doom in a Word doc News Sources: https://lmg.gg/P8Gsn Learn more about your ad choices. Visit megaphone.fm/adchoices

RIMScast
Cyberrisk Trends in 2025 with Tod Eberle of Shadowserver

RIMScast

Play Episode Listen Later Jan 21, 2025 35:23


Welcome to RIMScast. Your host is Justin Smulison, Business Content Manager at RIMS, the Risk and Insurance Management Society.   In this episode, Justin interviews Shadowserver Foundation Alliance Director Tod Eberle about cybersecurity. Tod tells how his background as a prosecutor led to his interest in cybersecurity, how he encountered the non-profit Shadowserver Foundation, and how he left the public sector to work with them. He explains how Shadowserver provides actionable data to alert network owners and law enforcement of network vulnerabilities that need to be mitigated. He discusses trends in malware attacks, especially in ransomware. He shares his thoughts on ransomware threats of 2025 and the years to come. He provides tips on preparing your network against ransomware.   Listen to how you can harden your organization's network against malware attacks. Key Takeaways: [:01] About RIMS and RIMScast. [:14] Public registration is open for RISKWORLD 2025! RIMS wants you to Engage Today and Embrace Tomorrow in Chicago from May 4th through May 7th. Register at RIMS.org/RISKWORLD and the link in this episode's show notes. [:33] About this episode. We will discuss cybersecurity with Tod Eberle, the Alliance Director of the Shadowserver Foundation. [:55] RIMS-CRMP Workshops! On February 19th and 20th, there will be a two-day virtual workshop for the RIMS-CRMP led by former RIMS President Chris Mandel and presented by the RIMS Greater Bluegrass Chapter, the 2024 RIMS Chapter of the Year. [1:18] The next RIMS-CRMP-FED exam course will be held from February 4th through the 6th, 2025. Links to these courses can be found through the Certification page of RIMS.org and this episode's show notes. [1:34] Virtual Workshops! Chris Hansen will return on February 11th and 12th to lead the two-day course “Claims Management”. Gail Kiyomura of The Art of Risk Consulting will host the “Fundamentals of Insurance” virtual workshop on February 19th and 20th, 2025. [1:58] On February 26th and 27th, Elise Farnham of Illumine Consulting will lead “Applying and Integrating ERM”. “Managing Data for ERM” will be hosted by Pat Saporito. That course starts on March 12th, 2025. [2:20] A link to the full schedule of virtual workshops can be found on the RIMS.org/education and RIMS.org/education/online-learning pages. A link is also in this episode's show notes. [2:31] The RIMS Legislative Summit 2025 is back! It will be held on March 19th and 20th in Washington, D.C. Join RIMS for two days of Congressional meetings, networking, and advocating on behalf of the risk management community. [2:49] This event is open for RIMS members only so if you're not a member, join now! Visit RIMS.org/advocacy for registration details. [3:02] Interview! Our guest Tod Eberle is the Alliance Director of the Shadowserver Foundation, a non-profit security organization working altruistically behind the scenes to make the internet more secure for everyone. [3:15] Tod Eberle is with us to discuss the cybersecurity trends on his risk radar and the threats he wants risk professionals to be aware of as 2025 kicks into high gear. Shadowserver Alliance Director, Tod Eberle, welcome to RIMScast! [3:41] Justin saw that Shadowserver Foundation was promoted by the National Cybersecurity Alliance and he thought it would be great to have a follow-up on his appearance there. [3:54] Tod says the National Cybersecurity Alliance is a great organization. After working together with them for a year, they invited Tod to do a webinar. It was a great experience. [4:28] Tod's background is as a career prosecutor, starting as a county prosecutor in Western Pennsylvania in 1997. In 2004, Tod became a Federal Prosecutor in Pittsburgh for the U.S. Department of Justice. [5:00] In 2014, He transitioned over to the National Security and Cybercrime section in Pittsburgh. Pittsburgh was at the forefront of cyber investigations by both the U.S. Attorney's Office and the FBI. Tod wanted to be a part of that. [5:34] The Pittsburgh office has run investigations and issued indictments against Chinese Military Intelligence officers and Russian GRU officers for hacking. In 2014, Pittsburgh had the first criminal indictment of nation-state threat actors. [6:00] In that case, Chinese Military Intelligence PLA officers hacked into Pittsburgh companies Westinghouse, ALCOA, U.S. Steel, and United Steel Workers. Some forward-thinking folks at the FBI and the U.S. Attorney's Office, particularly U.S. Attorney David Hickton, focused on cyber. [6:29] That continued over the years until the present. [6:46] To begin an investigation, the FBI and U.S. Attorney's Office in Pittsburgh, need to have some aspect of an organization's criminal activity touch that district, the Western District of Pennsylvania. A national ransomware case with one victim in Pittsburgh can be investigated. [7:16] In the investigation of Russian GRU actors responsible for the destructive NotPetya malware attack, a district hospital's network was attacked and destroyed. They expanded the investigation and charging documents to include other attacks around the country. [7:58] In 2015 Tod was a prosecutor working with the FBI on an investigation. He was at Europol at the Hague in the Netherlands, a center that brings together investigators and prosecutors from different countries who investigate the same threat group through Europol and Eurojust. [8:33] Tod met the Shadowserver Foundation non-profit group at the Hague in 2015. They were helping, through free technical support to the takedown operation, to dismantle the infrastructure of a crime group, using sinkholing and other security measures. [9:08] Tod Joined the Shadowserver Foundation in January of 2023. He is the Shadowserver Alliance Director. As a small non-profit, everyone wears many hats. The Shadowserver Foundation is a 501(c)(3) in the U.S. and a separate non-profit legal entity in the Netherlands. [9:47] The Shadowserver Foundation started about 2004. It celebrated its 20th anniversary in 2024. It began as a loose group of volunteers made up of cybersecurity researchers and technical experts who came together to help network owners and law enforcement. [10:15] Over the years they became more structured and became a non-profit organization. It's an unusual non-profit organization working 100% in operations. It works in three core areas. First, it's the world's largest provider of free, actionable cyber threat intelligence. [10:45] Second, the Shadowserver Foundation does cybersecurity capacity-building around the world. Third, it also provides free support to law enforcement investigations and disruption operations with technical support and expertise. Those three things are its core mission. [11:07] Justin notes commonalities between RIMS cyber risk reporting and the Shadowserver Foundation's work. Shadowserver collects a vast amount of threat data daily. What are the patterns it sees for 2025? [11:29] Shadowserver Foundation can help organizations mitigate risks. It collects cyber threat data at its data center in California through internet-wide scanning, honeypot sensors, sinkholing operations, and collecting and analyzing malware samples. [11:57] Every day for free the Shadowserver Foundation takes that data and provides it to over 9,000 organizations around the world and to 201 National C-CERTs that cover about 176 countries. [12:13] These reports identify exposed, misconfigured, vulnerable, compromised instances or devices on networks that need patching. [12:25] The organizations that get Shadowserver's data can be anything from banks to hospitals, universities, K-12 school districts, ISPs, local, state, and federal governments, small, medium, and large businesses, Fortune 500s, and NGOs; just about anyone can sign up. [12:46] The idea behind this is that cyber security should be available to everyone, regardless of the ability to pay. Organizations can sign up at the Shadowserver Foundation website, and provide their contact information and network information with IP ranges and ASNs. [13:12] The Shadowserver Foundation does its due diligence and if everything checks out, it automates those reports to go out to the organization daily. About 9,000 organizations sign up directly to receive daily reports. [13:22] The Shadowserver Foundation also sends out data for entire countries to the national C-CERT designated to handle that in those countries. In the U.S., CISA gets hundreds of millions of events from them every day for all the U.S. It is the same around the world. [13:52] Tod says that some things never change. Networks are breached primarily through phishing attacks, malicious links or attachments, and social engineering. [14:09] One trend is a focus on vulnerabilities. Criminals exploit vulnerabilities in the network that aren't timely patched and before they are patched. Shadowserver gives organizations an external snapshot view of their networks just as criminals are scanning for themselves. [14:52] Cybercriminal groups increasingly leverage zero-day vulnerabilities to breach a network. A zero-day vulnerability is a flaw in software or hardware that's unknown to the vendor and has no patch. The vendor has had zero days to fix the vulnerability after it has been discovered. [15:16] That was the case with the Clop ransomware gang. In 2024, they started exploiting zero-day vulnerabilities in Fortra's GoAnywhere software. That continued in May, with them exploiting Progress Software's MOVEit file transfer application. [15:38] Very recently, in December, the Clop Ransomware group claimed responsibility for using a zero-day vulnerability in Clio's file transfer platform that breached victims' networks. [15:49] Cyber criminals extort victims and steal data with ransomware attacks. Risk managers in cybersecurity need to stay on top of critical vulnerabilities that often go unpatched. Those are often the easiest gateway into a network. [16:26] Plug Time! RIMS Webinars! Resolver will be joining us on February 6th to discuss “4 Themes Shaping the Future of GRC in 2025”. [16:38] HUB International continues its Ready for Tomorrow Series with RIMS. On February 20th, they will host “Ready for the Unexpected? Strategies for Property Valuation, Disaster Recovery and Business Continuity in 2025”. [16:54] More webinars will be announced soon and added to the RIMS.org/webinars page. Go there to register. Registration is complimentary for RIMS members. [17:06] Nominations are also open for the Donald M. Stuart Award which recognizes excellence in risk management in Canada. Links are in this episode's show notes. [17:17] The Spencer Educational Foundation's goal to help build a talent pipeline of risk management and insurance professionals is achieved in part by its collaboration with risk management and insurance educators across the U.S. and Canada. [17:35] Since 2010, Spencer has awarded over $3.3 million in general grants to support over 130 student-centered experiential learning initiatives at universities and RMI non-profits. Spencer's 2026 application process will open on May 1st, 2025, and close on July 30th, 2025. [17:58] General grant awardees are typically notified at the end of October. Learn more about Spencer's general grants through the Programs tab at SpencerEd.org. [18:08] Let's Return to the Conclusion of My Interview with Tod Eberle of Shadowserver! [18:49] Justin notes that In December of 2024, China attackers breached the Committee on Foreign Investment in the U.S. That is the government office that assesses foreign investments for national security risks. [18:58] China also targeted the Treasury's Sanctions Office after it sanctioned a Chinese company for its alleged role in cyberattacks. [19:14] Tod thinks we should acknowledge that this is nothing new and nothing we should be surprised about. It's been going on for many years and it's going to continue. Justin was in the Federal government in 2013 and 2014. [19:32] In 2015, it was announced that the U.S. Office of Personnel Management had been breached. Personal sensitive data for 42 million people were stolen. [19:44] In May 2014, five Chinese military officers were indicted for computer hacking and economic espionage against companies based in Pittsburgh. This is nothing out of the ordinary. Unfortunately, indictments don't seem to have a deterrent effect. [20:21] Countries can deny the charges of hacking even with strong evidence of their involvement. [20:37] There are different types of hacking, with different types of motivation. There is traditional espionage against U.S. government agencies. There is theft of intellectual property with nation-states trying to gain a commercial advantage in business. [21:23] There are destructive hacks by nation-state actors, like the NotPetya attack, or attacks on the Ukrainian power grid and banking systems in 2015 and 2016. [21:36] The Volt Typhoon threat actor group and its access to the U.S. critical infrastructure is one of the greatest national security concerns because of its potential to disrupt everything from water to power, to food, to transportation. [22:10] The ripple effect that can come from those disruptions would be enormous. The Colonial Pipeline ransomware attack of a few years ago affected fuel supplies, commerce, and the prices of goods. [22:31] Nation-state hacking is no longer just a concern for government agencies and companies that do business internationally, but it's now a concern for all of society. There's the potential to affect the daily lives of innocent civilians through attacks on critical infrastructure. [23:16] Tod mentions another 2014 indictment out of Pittsburgh, on the GameOver Zeus Botnet takedown. Part of that was a crypto locker ransomware disruption. This was in the infancy of ransomware, for $300 ransoms. Now ransom demands are in the tens of millions of dollars. [23:53] We have seen a huge evolution in ransomware. It's not going away. One thing we're seeing is bypassing data encryption and focusing on data theft. It's easier and less time-consuming for the threat actors because they don't have to map out the network. [24:41] If a victim company had good backups and easy restoration, that was an issue ransomware actors had to deal with, so why would the threat actors bother with that? They just focus on easy data theft and extortion of ransom for the data. [25:04] Tod thinks we will continue to see extortion. Ransomware continues to be the greatest concern for companies. The use of AI has been increasing both for defenders and attackers.  [25:14] A new ransomware group, FunkSec, is claiming large numbers of victims of extortion, encryption, and data theft. They seem to have ransom demands of less than $10,000. They have sold stolen data. Researchers think this is a less experienced group using AI to write code. [27:22] Shadowserver's very talented team collects the data. It's free. They want to get it into the hands of those who can use it. The reports identify things that are seen to be misconfigured or unnecessarily exposed to the internet. Sometimes they can show if something is compromised. [28:12] Shadowserver designates the events by severity level so the end user can prioritize their patching and address first the ones that are most critical and severe. The reports act both as an early warning system and a victim notification system if a device is seen to be compromised. [28:59] The network owner needs to remediate that and patch it before further exploitation like a ransomware attack can occur. [29:07] Shadowserver has two ways to detect that a device is compromised. The first is if they have indicators that tell them a device on the network is compromised. The second is with their support for law enforcement, law enforcement may share sensitive data with Shadowserve. [29:32] When law enforcement does a takedown and they get victim identification data like IP addresses, they must do victim notification. Law enforcement isn't scaled to do victim notification for hundreds of thousands of users. Shadowserver helps them with notifications. [30:48] Shadowserver is very careful to share data responsibly. Company A will get the data they have for Company A and it won't be shared with Company B and vice versa. Shadowserver views the data as belonging to that network owner. [31:08] If a company authorizes Shadowserver and wants them to share their data with a third party, Shadowserver will happily do it. There are several companies with MSSPs to manage their security. If the company asks, Shadowserver will send the data to their MSSP. [31:43] As a small, non-profit organization, not everyone has heard of the Shadowserver Foundation. They want people to know they have this data and they want to share it. It could be relevant for cyber insurance companies' due diligence, with the insurance applicant's consent. [32:20] It's important because those reports can show whether a network has remained healthy and secure over time. Tod would love to see Shadowserver be able to help more in the risk mitigation areas. [32:56] Special thanks again to Shadowserver Foundation's Tod Eberle for joining us here on RIMScast! Check out this episode's show notes for links to the Shadowserver reports we mentioned. [33:07] Be sure to tune in next week for Data Privacy Day! We've got a special episode with James Burd, Chief Privacy Officer of the Cybersecurity and Infrastructure Security Agency (CISA). That's going to be a good one! [33:22] More RIMS Plugs! You can sponsor a RIMScast episode for this, our weekly show, or a dedicated episode. Links to sponsored episodes are in our show notes. [33:50] RIMScast has a global audience of risk and insurance professionals, legal professionals, students, business leaders, C-Suite executives, and more. Let's collaborate and help you reach them! Contact pd@rims.org for more information. [34:07] Become a RIMS member and get access to the tools, thought leadership, and network you need to succeed. Visit RIMS.org/membership or email membershipdept@RIMS.org for more information. [34:25] Risk Knowledge is the RIMS searchable content library that provides relevant information for today's risk professionals. Materials include RIMS executive reports, survey findings, contributed articles, industry research, benchmarking data, and more.  [34:41] For the best reporting on the profession of risk management, read Risk Management Magazine at RMMagazine.com. It is written and published by the best minds in risk management. [34:55] Justin Smulison is the Business Content Manager at RIMS. You can email Justin at Content@RIMS.org. [35:03] Thank you all for your continued support and engagement on social media channels! We appreciate all your kind words. Listen every week! Stay safe!   Mentioned in this Episode: RIMS Risk Management magazine RISKWORLD 2025 — May 4‒7 | Register today! RIMS Legislative Summit — March 19‒20, 2025 Nominations for the Donald M. Stuart Award Spencer Educational Foundation — General Grants 2026 — Application Dates RIMS-Certified Risk Management Professional (RIMS-CRMP) RISK PAC | RIMS Advocacy Shadowserver Foundation National Cybersecurity Alliance RIMS Webinars: RIMS.org/Webinars “4 Themes Shaping the Future of GRC in 2025” | Sponsored by Resolver | Feb. 6, 2025 “Ready for the Unexpected? Strategies for Property Valuation, Disaster Recovery and Business Continuity in 2025” | Sponsored by Hub International | Feb. 20, 2025 Upcoming Virtual Workshops: “Claims Management” | February 11‒12, 2025 | Instructor: Chris Hansen “Fundamentals of Insurance” | Feb. 19‒20, 2025 “Applying and Integrating ERM” | Feb. 26‒27 “Managing Data for ERM” | March 12, 2025 See the full calendar of RIMS Virtual Workshops RIMS-CRMP Prep Workshops   Upcoming RIMS-CRMP Prep Virtual Workshops: “Stay Competitive with the RIMS-CRMP | Presented by the RIMS Greater Bluegrass Chapter” February 19‒20, 2025 | Instructor: Chris Mandel Full RIMS-CRMP Prep Course Schedule Full RIMS-CRMP Prep Course Schedule   Related RIMScast Episodes: “Kicking off 2025 with RIMS CEO Gary LaBranche” “Year In Risk 2024 with Morgan O'Rourke and Hilary Tuttle” “AI and Regulatory Risk Trends with Caroline Shleifer” “Cybersecurity Awareness and Risk Frameworks with Daniel Eliot of NIST” (2024)   Sponsored RIMScast Episodes: “Simplifying the Challenges of OSHA Recordkeeping” | Sponsored by Medcor “Risk Management in a Changing World: A Deep Dive into AXA's 2024 Future Risks Report” | Sponsored by AXA XL “How Insurance Builds Resilience Against An Active Assailant Attack” | Sponsored by Merrill Herzog “Third-Party and Cyber Risk Management Tips” | Sponsored by Alliant “RMIS Innovation with Archer” | Sponsored by Archer “Navigating Commercial Property Risks with Captives” | Sponsored by Zurich “Breaking Down Silos: AXA XL's New Approach to Casualty Insurance” | Sponsored by AXA XL “Weathering Today's Property Claims Management Challenges” | Sponsored by AXA XL “Storm Prep 2024: The Growing Impact of Convective Storms and Hail' | Sponsored by Global Risk Consultants, a TÜV SÜD Company “Partnering Against Cyberrisk” | Sponsored by AXA XL “Harnessing the Power of Data and Analytics for Effective Risk Management” | Sponsored by Marsh “Accident Prevention — The Winning Formula For Construction and Insurance” | Sponsored by Otoos “Platinum Protection: Underwriting and Risk Engineering's Role in Protecting Commercial Properties” | Sponsored by AXA XL “Elevating RMIS — The Archer Way” | Sponsored by Archer “Alliant's P&C Outlook For 2024” | Sponsored by Alliant “Why Subrogation is the New Arbitration” | Sponsored by Fleet Response “Cyclone Season: Proactive Preparation for Loss Minimization” | Sponsored by Prudent Insurance Brokers Ltd. “Subrogation and the Competitive Advantage” | Sponsored by Fleet Response   RIMS Publications, Content, and Links: RIMS Membership — Whether you are a new member or need to transition, be a part of the global risk management community! RIMS Virtual Workshops On-Demand Webinars RIMS-Certified Risk Management Professional (RIMS-CRMP) RISK PAC | RIMS Advocacy RIMS Strategic & Enterprise Risk Center RIMS-CRMP Stories — Featuring RIMS Vice President Manny Padilla!   RIMS Events, Education, and Services: RIMS Risk Maturity Model®   Sponsor RIMScast: Contact sales@rims.org or pd@rims.org for more information.   Want to Learn More? Keep up with the podcast on RIMS.org, and listen on Spotify and Apple Podcasts.   Have a question or suggestion? Email: Content@rims.org.   Join the Conversation! Follow @RIMSorg on Facebook, Twitter, and LinkedIn.   About our guest: Tod Eberle, Shadowserver Foundation   Production and engineering provided by Podfly.  

AML Conversations
Foreign Investment in the US, Fentanyl Sanctions, A Europol Report on Trafficking (Archive Edition)

AML Conversations

Play Episode Listen Later Jan 3, 2025 16:02


This episode originally aired on July 26, 2024 John and Elliot discuss several developments impacting the financial crime community this week. These include a report on foreign investment in the US, the interagency statement on the AML/CFT program proposal, and the regulatory agenda for the Treasury Department. They also talk about the report from the House Financial Services Committee working group on AI, new sanctions on fentanyl producers, and a Europol report on migrant smuggling.

YIRA YIRA
Los héroes de la juventud

YIRA YIRA

Play Episode Listen Later Dec 19, 2024 53:48


por Yaiza Santos Le leyó Santos: el 41% de los jóvenes votantes estadounidenses considera aceptable el asesinato del CEO de UnitedHealthcare. Ya escribió sobre el tema, aun sin haber salido esas encuestas. Esa acceptabilidad –compartida por otros muchos no tan jóvenes, como esa Belarra– proyecta sobre el asesino una imagen de persona consciente, racional, sensata, que en nada se parece a lo que parece ser en realidad, un perturbado más. El prestigio social, en este caso, recae en un enfermo. En el mundo de los jóvenes, observó, el psicópata se convierte en héroe. Hablando de enfermos, trató el terrible y extraño caso de los Pélicot, puro hombre muerde al perro, y opinó: puesto que el bien jurídico máximo es la vida, la pena máxima aquí no debería proceder. Tuvo que detenerse, a su pesar, en la letanía de hitos que muestran la mediocridad de la conversación española. Los premios de las cronistas parlamentarias ¡a Rufián!, las andanzas del aristócrata De Aldama, ese Bigotes vitaminado, Feijóo brindando por un acercamiento a Junts, sin recordar quién es el máximo líder de Junts, dónde está y qué relación tiene con España y con la justicia, ¡y ese delirio de una ley contra los bulos y las bulerías en redes sociales! Mire, explicó, cuando se publica algo ya tiene consecuencias, el derecho a la rectificación no ha funcionado nunca, y es solamente una tirita sobre una herida cicatrizada. Cada vez más convencido de que lo que tiene que hacer un periodista es mostrarse útil, comentó la información magra que trae Florencio Domínguez: de los 120 los atentados registrados por Europol en 2023, la mayoría fueron de nacionalistas y solamente dos, frustrados, de derechas. ¡He ahí el peligro que anuncian los apocalípticos! Celebra, por otro lado, que los apocalípticos no hayan dicho ni una palabra sobre la violación de la privacidad, ahora que han detenido a un presunto asesino gracias a Google Street View. Tus datos, chico, no sirven para nada en tus propias manos, y en las de Google, no más que tu culo para Levi’s. Concluyó, gracias a un nuevo burning paper, que el discurso igualitario encierra pura mentira –¡lo que queremos es el privilegio!– y deseó, con alegría, feliz navidad. Y fue así que Espada yiró. Bibliografía: La analogía, de Douglas R. Hofstadter y Emmanuel Sander Sobre la desigualdad, de Harry G. Frankfurt Contra el feminismo, de Teresa Giménez Barbat Burning paper: «Status and subjective well-being: A conceptual replication and extension of Anderson et al. (2012)», en Plos One, 18 de septiembre de 2024. Banda SonoraSee omnystudio.com/listener for privacy information.

Black Hills Information Security
2024-12-16 - ChickenSec News Part 3

Black Hills Information Security

Play Episode Listen Later Dec 18, 2024 70:35


00:00 - PreShow Banter™ — ChickenSec News Part 312:23 - BHIS - Talkin' Bout [infosec] News 2024-12-1614:48 - Story # 1: $50 Million Radiant Capital Heist Blamed on North Korean Hackers20:30 - Story # 2: Trump administration wants to go on cyber offensive against China32:53 - Story # 3: Krispy Kreme cyberattack impacts online orders and operations43:02 - Story # 4: Arctic Wolf and BlackBerry Announce Acquisition Agreement for Cylance52:02 - Story # 5: Europol announces takedown of major DDoS-for-hire network56:50 - Story # 6: Data breach at Senior Dating website spills info of 765,000 users58:46 - Story # 7: US sanctions Chinese firm for hacking firewalls in ransomware attacks

The CyberWire
Dismantling the Manson cybercrime market.

The CyberWire

Play Episode Listen Later Dec 5, 2024 35:35


Europol dismantles the Manson cybercrime market. Operation Destabilise stops two major Russian-speaking money laundering networks. New details emerge on China's attacks on U.S. telecoms. Black Lotus Labs uncovers a covert campaign by the Russian-based threat actor “Secret Blizzard”. Cisco issues patches for a high impact bootloader vulnerability. Trend Micro researchers uncovered Earth Minotaur targeting Tibetan and Uyghur communities. Payroll Pirates target HR payroll systems to redirect employee funds .Pegasus spyware may be more prevalent than previously believed. Our guest today is Jon France, CISO at ISC2, with insights from the ISC2 2024 Workforce Study. How businesses can lose customers one tip at a time.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is Jon France, CISO at ISC2, sharing the ISC2 2024 Workforce Study. You can read the press release about the report here and dig into the details of the report itself here.  Selected Reading 50 Servers Linked to Cybercrime Marketplace and Phishing Sites Seized by Law Enforcement (SecurityWeek) UK's NCA Disrupts Multibillion-Dollar Russian Money Launderers (Infosecurity Magazine) The White House reveals at least 8 U.S. telecom firms impacted by China's Salt Typhoon cyberattack (Fast Company) Senators implore Department of Defense to expand the use of Matrix (Element) Snowblind: The Invisible Hand of Secret Blizzard (Lumen) Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage (Microsoft Security) Russian Hackers Exploit Rival Attackers' Infrastructure for Espionage (Infosecurity Magazine) Bootloader Vulnerability Impacts Over 100 Cisco Switches (SecurityWeek) MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur's Multi-Platform Attacks (Trend Micro) Hunting Payroll Pirates: Silent Push Tracks HR Redirect Phishing Scam (Silent Push) iVerify Mobile Threat Investigation Uncovers New Pegasus Samples (iVerify) How a Russian man's harrowing tale shows the physical dangers of spyware (CyberScoop) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

nova.rs
Radar Forum, Bojan Pajtić i Goran Ješić: Više ne vidimo gde se završava mafija, a gde počinje država

nova.rs

Play Episode Listen Later Nov 29, 2024 45:12


Bojan Pajtić, profesor na Pravnom fakultetu u Novom Sadu, ugostio je u devetnaestoj epizodi Radar Foruma Gorana Ješića, nekadašnjeg potpredsednika pokrajinske Vlade, koji je nedavno pušten iz pritvora zbog učešća na demonstracijama 5. novembra u Novom Sadu organizovanih zbog pogibije 15 ljudi u padu nadstrešnice na Železničkoj stanici. Pajtić je nastojao na početku razgovora da od Ješića dobije konkretnije odgovore kako će izgledati njegov najavljeni povratak u politiku. "Kakav će biti format to sad zavisi od dosta ljudi sa kojima treba da se razgovara, između ostalih ja mislim da si ti jedan od prvih sa kojim treba da se razgovara, i ekipu negde znamo i mislim da bi to trebalo da bude ideološka organizacija za razliku od svih ostalih, negde leva, socijal-demokratska, ali to sad treba da ostavimo na stranu. Glavna tema su ova deca koja su i dalje u pritvoru. A uz to imamo Vesića koji se dobrovoljno predaje dramatičnom izjavom policiji i pravosuđu, a posle četiri sata ide u štrajk glađu", rekao je Ješić. Sagovornici su se dotakli i slučaja Ilije Kostića kojeg su policajci brutalno pretukli zbog čega je morao da bude i operisan. "BIA se znači bavi organizatorom studentskih protesta koji šetaju i farbaju asfalt, policija se bavi time da tuče čoveka od 74 godine sa demonstracija, Tužilaštvo u Novom Sadu se bavi time da vrati Ješića, Bačulova i Relju nazad u pritvor, a onda im pod nosom dođe Europol policija i uhapsi najvažnijeg direktora preduzeća sa osam kilograma kokaina. To je poraz ove države", dodao je Ješić. Domaćin Radar Foruma nadovezao se da su informacije počele da cure iz same policije navodeći da ljudi u raznim službama ne žele da učestvuju u prikrivanju bilo čije krivice. "Ja kada sam javio na Tviteru lokacije pred najveći protest u Novom Sadu nekoliko sati ranije, to su sve policijski izvori. Dakle, ono što je problem je to što je i policajcima, velikom broju njih, muka, bljuje im se od ideje da ti ne vidiš gde se završava mafija, a gde počinje država", kaže Pajtić. U nastavku razgovora Goran Ješić opisivao je i kako su izgledali pritvorski dani, a sagovornici su razložili i na koji način funkcioniše korupcija u velikim infrastrukturnim projektima, kako su u sve umešana braća Vučić, kao i da se mora aktivirati finansijska inspekcija kako bi se kroz tokove novca razotkrila pljačka naroda.

The CyberWire
Key player unmasked in global ransomware takedown.

The CyberWire

Play Episode Listen Later Oct 8, 2024 34:02


Western authorities I.D. a key member of Evil Corp. A major U.S. water utility suffers a cyberattack. ODNI warns of influence campaigns targeting presidential and congressional races. A California deepfakes law gets blocked. Europol leads a global effort against human trafficking. Trinity ransomware targets the healthcare industry. Qualcomm patches a critical zero-day in its DSP service. ADT discloses a breach of encrypted employee data. North Korean hackers use stealthy Powershell exploits. On our Threat Vector segment, David Moulton and his guests tackle the pressing challenges of securing Operational Technology (OT) environments.  Machine Learning pioneers win the Nobel Prize.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment In this segment of Threat Vector, David Moulton, Director of Thought Leadership at Palo Alto Networks, hosts cybersecurity experts Qiang Huang Chung hwang, Palo Alto Networks VP of Product Management for Cloud Delivered Security Services, and Michela Menting, Senior Research Director in Digital Security at ABI Research, discuss the pressing challenges of securing Operational Technology (OT) environments.  Join us each Thursday for a new episode of Threat Vector on the N2K CyberWire network. To hear David, Michela and Qiang's full discussion, check it out here.  Selected Reading Police unmask Aleksandr Ryzhenkov as Evil Corp member and LockBit affiliate (The Record) American Water, the largest water utility in US, is targeted by a cyberattack (Associated Press) US Warns of Foreign Interference in Congressional Races (Infosecurity Magazine) US Judge Blocks California's Law Curbing Election Deepfakes (BankInfo Security) Global Police Track Human Traffickers in Online Crackdown (Infosecurity Magazine) Recently spotted Trinity ransomware spurs federal warning to healthcare industry (The Record) Qualcomm patches high-severity zero-day exploited in attacks (Bleeping Computer) ADT says hacker stole encrypted internal employee data after compromising business partner (The Record) North Korean Hackers Employ PowerShell-Based Malware With Serious Evasion Techniques (Cyber Security News) ‘Godfather of AI' shares Nobel Prize in physics for work on machine learning (CNN) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

X22 Report
[DS] Prepares Iranian Narrative, Trump Hints At Change Of Batter, Sum Of All Fears – Ep. 3455

X22 Report

Play Episode Listen Later Sep 19, 2024 83:14


Watch The X22 Report On Video No videos found Click On Picture To See Larger PictureGermany's green new scam failed, companies are realizing that this was the wrong move, layoffs have begun. The [CB] has now cut the rate, history shows that when this is done the market comes down, it's only a matter of time. Trump pays using Bitcoin. The [DS] is now prepping the election interference narrative. It's the Iran, Iran, Iran narrative. Trump hints at change of batter, will they remove [KH] her poll numbers are dropping like a rock. The [DS] has two plans for the election, one before the election and one after. They need to stop Trump at all costs. Expect a cyber attack, chaos and war. We might have an event similar to the movie Sum of All Fears. Trump sent a message to the [DS], he played Nessun Dorma at the end of his rally, at dawn I win.   (function(w,d,s,i){w.ldAdInit=w.ldAdInit||[];w.ldAdInit.push({slot:13499335648425062,size:[0, 0],id:"ld-7164-1323"});if(!d.getElementById(i)){var j=d.createElement(s),p=d.getElementsByTagName(s)[0];j.async=true;j.src="//cdn2.customads.co/_js/ajs.js";j.id=i;p.parentNode.insertBefore(j,p);}})(window,document,"script","ld-ajs"); Economy https://twitter.com/disclosetv/status/1836751092165562698 https://twitter.com/DougAMacgregor/status/1836574128964333726 state-of-the art food processing plants? For more than three decades Washington has engaged in a series of open-ended conflicts with unattainable political-military objectives; armed struggles disguised as crusades for democracy that were designed to achieve American military hegemony. Thirty years later, the outcome is a world full of nations brimming with hatred for the American People, a ruined economy and a military establishment that American men refuse to join. Former President Donald Trump recognizes the tragedy of the warfare state said so quite clearly: “The United States should not reject cooperating with Russia and China, Republican Presidential Candidate Donald Trump said. "Doing business with China is a good thing, but you need a fair deal. Doing business with Russia - they have so much raw minerals... We can do great business and keep everybody happy," Trump said during a rally in Flint, Michigan. He reiterated that he had good relations with Russian President Vladimir Putin and Chinese leader Xi Jinping. On September 16, Trump said in an interview that he does not consider Russia and China enemies of the United States. He promised to get along with these countries if he gets elected as a president.” If President Trump pursues this path he will save America and win the Nobel Peace Prize! https://twitter.com/KobeissiLetter/status/1836752544640475193   https://twitter.com/KobeissiLetter/status/1836552447768301648   https://twitter.com/KobeissiLetter/status/1836552451685519474   https://twitter.com/KobeissiLetter/status/1836552456479584563 https://twitter.com/BehizyTweets/status/1836565850687406158 TAKE A LISTEN https://twitter.com/KanekoaTheGreat/status/1836561599794168152   building in the USA. One way you do that is through tariffs." "You say, if you're going to manufacture all your stuff in China, we will penalize you for trying to access American markets with goods made in China or some other country." "Finally, you unleash America's energy markets because that drives down the cost of goods. You do all those things in tandem, and you actually get America into a much more sustainable fiscal situation."  Political/Rights 'Ghost' cybercrime platform dismantled in global operation, 51 arrested  An international law enforcement operation has dismantled an encrypted communication platform, known as Ghost, notorious for enabling large-scale drug trafficking and money laundering, Europol said on Wednesday. The investigation led to the arrest of 51 suspects from multiple countries,

The CyberWire
High-stakes sabotage.

The CyberWire

Play Episode Listen Later Sep 18, 2024 30:27


Exploding pagers in Lebanon are not a cyberattack. Europol leads an international effort to shut down the encrypted communications app Ghost. Microsoft IDs Russian propaganda groups' disinformation campaigns. California's Governor signs bills regulating AI in political ads. A multi-step zero-click macOS Calendar vulnerability is documented. A new phishing campaign targets Apple ID credentials.The US Cyber Ambassador emphasizes deterrence. Our guest is Linda Betz, Executive Vice President of Global Community Engagement at the FS-ISAC, sharing their work on maintaining security support at all levels of cyber maturity. AI tries to out-Buffett Warren Buffett. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest is Linda Betz, Executive Vice President of Global Community Engagement at the FS-ISAC, sharing their work and the recently-published guide on maintaining security support at all levels of cyber maturity. You can check out their guide “Cyber Fundamentals: Critical baseline security practices for today's threat landscape” here.  Selected Reading Israel Planted Explosives in Pagers Sold to Hezbollah, Officials Say (The New York Times) Criminal-favored Ghost messaging app busted, owners arrested (Cybernews) Russians made videos falsely accusing Harris of hit-and-run, Microsoft says (The Washington Post) California governor signs laws to crack down on election deepfakes created by AI (Associated Press) Researcher chains multiple old macOS flaws to compromise iCloud with no user interaction (Beyond Machines) iPhone Users Warned As New Email Password-Stealing Attacks Reported (Forbes) Deterrence in cyberspace is possible — and ‘urgent' — amid ‘alarming' hybrid attacks, State cyber ambassador says (CyberScoop) New Chatbot ETF Promises to Mimic Warren Buffett, David Tepper (Bloomberg) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices