POPULARITY
Categories
Major federal cybersecurity programs expire amidst the government shutdown. Global leaders and experts convene in Riyadh for the Global Cybersecurity Forum. NIST tackles removable media. ICE buys vast troves of smartphone location data. Researchers claim a newly patched VMware vulnerability has been a zero-day for nearly a year. ClickFix-style attacks surge and spread across platforms. Battering RAM defeats memory encryption and boot-time defenses. A new phishing toolkit converts ordinary PDFs into interactive lures. A trio of breaches exposes data of 3.7 million across North America. Tim Starks from CyberScoop unpacks a report from Senate Democrats on DOGE. The Lone Star State proves even the internet isn't bulletproof. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Tim Starks, Senior Reporter from CyberScoop, is back and joins Dave to discuss a report from Senate Democrats on the Department of Government Efficiency (DOGE). You can read Tim's article on the subject here. Selected Reading Cyber information-sharing law and state grants set to go dark as Congress stalls over funding (The Record) Live - Global Cybersecurity Forum in Riyadh tackles how technology can shape future of cyberspace (Euronews) NIST Publishes Guide for Protecting ICS Against USB-Borne Threats (SecurityWeek) ICE to Buy Tool that Tracks Locations of Hundreds of Millions of Phones Every Day (404 Media) Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability (SecurityWeek) Don't Sweat the ClickFix Techniques: Variants & Detection Evolution (Huntress) Battering RAM Attack Breaks Intel and AMD Security Tech With $50 Device (SecurityWeek) New MatrixPDF toolkit turns PDFs into phishing and malware lures (Bleeping Computer) 3.7M breach notification letters set to flood North America's mailboxes (The Register) A Bullet Crashed the Internet in Texas (404 Media) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Critical Vulnerabilities and AI Voice Cloning Risks in Cybersecurity In this episode of Cybersecurity Today, host Jim Love discusses key cybersecurity threats, including critical vulnerabilities in Sudo and Cisco firewalls, and a remote command flaw in Western Digital MyCloud devices. The show highlights efforts by national security agencies in the US, Canada, France, Netherlands, and the UK to address these risks, urging immediate patching and system updates. Additionally, the episode covers the emerging threat of real-time AI voice cloning, stressing the need for stricter security measures to prevent social engineering attacks. Listeners are encouraged to implement robust verification processes to secure their organizations and personal communications. 00:00 Critical Sudo Flaw Warning 00:21 Cisco Firewalls Vulnerabilities 02:34 Western Digital MyCloud Devices at Risk 03:48 AI Voice Cloning Threat 05:16 Conclusion and Contact Information
There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall and threat defense products. On the news front, the vulnerability spotlight stays on Cisco as the US Cybersecurity and Infrastructure Security Agency (CISA) issues an emergency directive to all federal... Read more »
There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall and threat defense products. On the news front, the vulnerability spotlight stays on Cisco as the US Cybersecurity and Infrastructure Security Agency (CISA) issues an emergency directive to all federal... Read more »
There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall and threat defense products. On the news front, the vulnerability spotlight stays on Cisco as the US Cybersecurity and Infrastructure Security Agency (CISA) issues an emergency directive to all federal... Read more »
Referências do EpisódioWEBINAR Black Friday: Cibersegurança pra além do básico, sem esquecer o básicoPointer leaks through pointer-keyed data structuresNCSC warns of persistent malware campaign targeting Cisco devicesRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Parce que… c'est l'épisode 0x635! Shameless plug 12 au 17 octobre 2025 - Objective by the sea v8 14 et 15 octobre 2025 - ATT&CKcon 6.0 14 et 15 octobre 2025 - Forum inCyber Canada Code rabais de 30% - CA25KDUX92 4 et 5 novembre 2025 - FAIRCON 2025 8 et 9 novembre 2025 - DEATHcon 17 au 20 novembre 2025 - European Cyber Week 25 et 26 février 2026 - SéQCure 2026 Notes Jaguar UK government will underwrite £1.5bn loan guarantee to Jaguar Land Rover after cyber-attack Politicos: ‘There is a good strong case for government intervention' on JLR cyberattack Jaguar Lan Rover failed to secure cyber insurance deal ahead of incidents, sources say Tata-Owned Jaguar Land Rover Delays Factory Reopening Following Major Cyber Attack Supply chain Volvo North America disclosed a data breach following a ransomware attack on it provider Miljödata Tech troubles create aviation chaos on both sides of the Atlantic European Airport Disruptions Caused by Sophisticated Ransomware Attack UK agency makes arrest in airport cyberattack investigation SIM ou trop vite sur la nouvelle The SIM Farm Hardware Seized by the Secret Service Is Also Popular With Ticket Scalpers That Secret Service SIM farm story is bogus U.S. Secret Service Dismantles 300 SIM Servers and 100,000 SIM Cards Disabling Cell Phone Towers Trump signs executive order supporting proposed deal to put TikTok under US ownership Privacy Europe's cookie law messed up the internet. Brussels wants to fix it. Bientôt la fin des bandeaux RGPD ? Comment les scammeurs exploitent vos données… via une simple recherche ChatGPT Microsoft hides key data flow information in plain sight Salesforce facing multiple lawsuits after Salesloft breach Numerous Applications Using Google's Firebase Platform Leaking Highly Sensitive Data Bouygues Telecom Edge Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability CISA says it observed nearly year-old activity tied to Cisco zero-day attacks SonicWall releases rootkit-busting firmware update following wave of attacks Offensif New Inboxfuscation Tool That Bypasses Microsoft Exchange Inbox Rules and Evade Detection LastPass: Fake password managers infect Mac users with malware Why attackers are moving beyond email-based phishing attacks Hackers Can Bypass EDR by Downloading a Malicious File as an In-Memory PE Loader Hackers Exploit WerFaultSecure.exe Tool to Steal Cached Passwords From LSASS on Windows 11 24H2 Kali Linux 2025.3 Released With New Features and 10 New Hacking Tools New LNK Malware Uses Windows Binaries to Bypass Security Tools and Execute Malware Russia steps up disinformation efforts to sway Moldova's parliamentary vote Malicious SVGs in Phishing Campaigns: How to Detect Hidden Redirects and Payloads First-Ever Malicious MCP Server Found in the Wild Steals Emails via AI Agents Hackers Leverage AI-Generated Code to Obfuscate Its Payload and Evade Traditional Defenses Défensif Zero Trust: Strengths and Limitations in the AI Attack Era Microsoft, SentinelOne, and Palo Alto Networks Withdraw from 2026 MITRE ATT&CK Evaluations GitHub moves to tighten npm security amid phishing, malware plague Canada dismantles TradeOgre exchange, seizes $40 million in crypto Microsoft Edge to block malicious sideloaded extensions Microsoft offers no-cost Windows 10 lifeline How secure are passkeys, really? Here's what you need to know Divers et inclassable Cyber threat-sharing law set to shut down, along with US government Firewall upgrade linked to three deaths after Australian telco cut off emergency calls Collaborateurs Nicolas-Loïc Fortin Crédits Montage par Intrasecure inc Locaux réels par Intrasecure inc
Three Buddy Problem - Episode 65: We zero in on one of the biggest security stories of the year: the discovery of a persistent multi-stage bootkit implanting malware on Cisco ASA firewalls. Details on a new campaign, tied to the same threat actors behind ArcaneDoor, exploiting zero-days in Cisco's 5500-X series appliances, devices that sit at the heart of government and enterprise networks worldwide. Plus, Cisco's controversial handling of these disclosures, CISA's emergency deadlines for patching, the absence of IOCs and samples, and China's long-term positioning. Plus, thoughts on the Secret Service SIM farm discovery in New York and evidence of Russians APTs Turla and Gamaredon collaborating to hit Ukraine targets. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).
In this episode of Ask a CISSP, the Thursday episode of the Other Side of the Firewall podcast, Ryan Williams Sr. interviews Tim Tipton Jr., a cybersecurity architect, author, and Grammy-winning music producer. They discuss Tim's journey into cybersecurity, his military background, and the importance of making the field accessible to all. Tim shares insights on mentorship, community outreach, and his creative pursuits in writing and music. The conversation highlights the challenges and opportunities in cybersecurity, as well as Tim's aspirations to empower the next generation through education and support. Buy the guide: www.theothersideofthefirewall.com Please LISTEN
How do we get from today's AI copilots to true human-level intelligence? In this episode of Eye on AI, Craig Smith sits down with Eiso Kant, Co-Founder of Poolside, to explore why reinforcement learning + software development might be the fastest path to human-level AI. Eiso shares Poolside's mission to build AI that doesn't just autocomplete code — but learns like a real developer. You'll hear how Poolside uses reinforcement learning from code execution (RLCF), why software development is the perfect training ground for intelligence, and how agentic AI systems are about to transform the way we build and ship software. If you want to understand the future of AI, software engineering, and AGI, this conversation is packed with insights you won't want to miss. Stay Updated: Craig Smith on X:https://x.com/craigss Eye on A.I. on X: https://x.com/EyeOn_AI (00:00) The Missing Ingredient for Human-Level AI(01:02) Eiso Kant's Journey(05:30) Using Software Development to Reach AGI(07:48) Why Coding Is the Perfect Training Ground for Intelligence(10:11) Reinforcement Learning from Code Execution (RLCF) Explained(13:14) How Poolside Builds and Trains Its Foundation Models(17:35) The Rise of Agentic AI(21:08) Making Software Creation Accessible to Everyone(26:03) Overcoming Model Limitations(32:08) Training Models to Think(37:24) Building the Future of AI Agents(42:11) Poolside's Full-Stack Approach to AI Deployment(46:28) Enterprise Partnerships, Security & Customization Behind the Firewall(50:48) Giving Enterprises Transparency to Drive Adoption
Cutting Through the Matrix with Alan Watt Podcast (.xml Format)
--{ "Put a Firewall Around Your Mind"}-- Adam Curtis documentary, Can't Get You Out of My Head - What we're told and shown from talking heads about Charlie Kirk, Israel - Constant Conflict - CFR/RIIA and New American Century's Agenda - Psychological Operations, You are the Target - Microwave and Frequency Weapons, Psychotronic Technology - The Mind has No Firewall - Information Warfare, disabling and destruction of "Data Processors" (including human) - All Mass Media/Internet used for PsyOps - Information Noise - Weapons to induce emotional changes, nausea, epilepsy, cardiac arrest - Remote Brain-Wave Reading and "Correction" - Use of ultrasound and acoustic signals - Subliminal messaging in audio and video - HAARP/ELF - Brave New World - Predictive Programming.
Jan Marsalek – einer der meistgesuchten Männer Europas. Mutmaßlicher Betrüger in einem milliardenschweren Finanzskandal. Seit mehr als fünf Jahren ist er untergetaucht. Jetzt ist klar: Marsalek lebt in Moskau – scheinbar unauffällig. Tatsächlich aber: im Dienst des russischen Geheimdienstes. Reporter:innen vom SPIEGEL und vom STANDARD haben seine Spuren verfolgt. Sie führten zu Agentennetzwerken, bis ins ukrainische Kriegsgebiet – und zu Handys aus dem österreichischen Innenministerium. Die ganze Geschichte – wie Marsalek vom Wirecard-Wunderkind zu einem russischen Agenten wurde – erzählen Sandra Sperber und Roman Lehberger im SPIEGEL-Recherchepodcast Firewall. Fall ihr mehr Folgen von Firewall hören wollt: Den Podcast findet ihr bei Spotify, Applepodcasts und auf allen gängigen Podcast-Plattformen. In der Podcast-Serie Inside Austria rekonstruieren der SPIEGEL und der österreichische STANDARD gemeinsam Fälle, Skandale und politische Abgründe in Österreich. Wenn euch unser Podcast gefällt, folgt uns gerne und lasst uns ein paar Sterne da. Kritik, Feedback oder Themenideen gerne an insideaustria@spiegel.de oder an podcast@derstandard.at Den Inside Austria Newsletter findet ihr hier: https://www.spiegel.de/thema/die-lage-inside-austria/+++ Alle Infos zu unseren Werbepartnern finden Sie hier. Die SPIEGEL-Gruppe ist nicht für den Inhalt dieser Seite verantwortlich. +++ Den SPIEGEL-WhatsApp-Kanal finden Sie hier. Alle SPIEGEL Podcasts finden Sie hier. Mehr Hintergründe zum Thema erhalten Sie mit SPIEGEL+. Entdecken Sie die digitale Welt des SPIEGEL, unter spiegel.de/abonnieren finden Sie das passende Angebot. Informationen zu unserer Datenschutzerklärung.
A Power Trip Press Conference returns, Tom Pelissero joins with the latest Vikings injury news and other happenings around the NFL
A Power Trip Press Conference returns, Tom Pelissero joins with the latest Vikings injury news and other happenings around the NFLSee omnystudio.com/listener for privacy information.
When Danny Kim was nearly crushed by the 4,000-pound chassis of a truck he was working on, he had an epiphany. What if he could make an entirely new kind of car that combined the efficiency of a motorcycle with the safety of a regular car? Lit Motors was born. Bradley talks to Danny about his vision for a two-wheel vehicle with the soul of a spaceship.Join Bradley this Saturday, Sept. 20 at P&T Knitwear as we celebrate Russ & Daughters Day to mark the legendary shop's first-ever cookbook in their 111 years on the Lower East Side. We'll be hosting a live Firewall recording at 3PM where Bradley will interview Russ & Daughters' fourth generation co-owners, Niki Russ Federman and Josh Russ Tupper. For more details and to RSVP, visit https://www.russanddaughtersday.com/This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
The killing of Charlie Kirk has kicked the forces of political polarization into high gear. But it's worth taking a step back, says Bradley, to consider the degradation of everyday life that gives rise to such tragedies and think about what each one of us can do to ease the chaos. More locally, Bradley also discusses the data that proves that the ban on forced brokers fees is working, the race to replace Congressman Jerry Nadler, and the very un-Christian move by a local church to kick out a longtime soup kitchen. Discussed on today's episode:Indoor Ban Shuts Down Soup Kitchen at Downtown Manhattan Church, by Jonathan Custodio, The City, (09/15/25)Join Bradley on Sept. 20 at P&T Knitwear as we celebrate Russ & Daughters Day to mark the legendary shop's first-ever cookbook in their 111 years on the Lower East Side. We'll be hosting a live Firewall recording at 3PM where Bradley will interview Russ & Daughters' fourth generation co-owners, Niki Russ Federman and Josh Russ Tupper. For more details and to RSVP, visit https://www.russanddaughtersday.com/This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
In this week's episode of China Insider, Miles Yu covers the recent anti-corruption movement and Gen Z protests that ousted former Prime Minister Oli and government officials, and examine China's role in the transition to the new interim government. Next, Miles breaks down the latest from US-China trade talks in Madrid, as the US seeks to advance the TikTok divestiture and framework for a bilateral trade deal, while China seeks to avoid further tariffs related to purchases of Russian oil. Lastly, Miles unpacks the historical data breach from China's Great Firewall that compromised highly confidential and protected information regarding the CCP's extensive exports of censorship and surveillance technology to foreign countries. China Insider is a weekly podcast project from Hudson Institute's China Center, hosted by China Center Director and Senior Fellow, Dr. Miles Yu, who provides weekly news that mainstream American outlets often miss, as well as in-depth commentary and analysis on the China challenge and the free world's future.
Jenny Montgomery is a New Yorker on a mission — scouring galleries for art she loves and can afford to buy. Bradley talks to her about the city's art scene, where to see great work right now, and how to think about starting your own collection. Get rich quick? Forget about it. But live a richer cultural life? That's well within your reach.Discussed on today's episode:Printed Matter's NY Art Book Fair at MoMA PS1: https://printedmatterartbookfairs.org/Join Bradley on Sept. 20 at P&T Knitwear as we celebrate Russ & Daughters Day to mark the legendary shop's first-ever cookbook in their 111 years on the Lower East Side. We'll be hosting a live Firewall recording at 3PM where Bradley will interview Russ & Daughters' fourth generation co-owners, Niki Russ Federman and Josh Russ Tupper. For more details and to RSVP, visit https://www.russanddaughtersday.com/This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
Listen to 129 Future Now Apple Helio Ah yes, it’s that time of year when Apple Computer announces their latest offerings, the iPhone 17 series, the Apple Watch 11, Airpods Pro 3 and the iPhone Air. Sadly our Apple buddy, Taylor Barcroft, had a recent stroke and is currently recovering in a rehab center in nearby Capitola. But given the significance of this massive Apple event and Taylor deep love of their products, he rose to the occasion to give us his take on the near gear. Of special interests are the potential health benefits of the new devices, including 24/7 monitoring of biosignals like heart rate variability and blood pressure. We then branch into broader topics, such as the implications of AI on creativity and careers, discoveries in space exploration including the Voyager discovery of a solar system firewall surrounding us, and the latest with I3/ATLAS, our latest interstellar object passing by us. We then get a bit philosophical on time, reality, and human imagination, interspersed with our lighthearted banter, personal anecdotes, and insights. Enjoy!
Now that Trump has decided to restore the throwback name of the Department of Defense (now the Department of War), maybe it's time we started calling all federal agencies according to what they really do — so Bradley plays an epic name game. Plus, he assesses the looming real-world conditions that will test Zohran Mamdani's commitment to his progressive agenda, throws a flag on football's talking heads, and divulges his personal Emmy picks.Discussed on today's episode:Zohran Mamdani's Year One: A Time for Testing, by Bradley Tusk, Vital City, (09/04/25)Join Bradley on September 20 at P&T Knitwear as we celebrate Russ & Daughters Day to mark the legendary shop's first-ever cookbook in their 111 years on the Lower East Side. We'll be hosting a live Firewall recording at 3PM where Bradley will interview Russ & Daughters' fourth generation co-owners, Niki Russ Federman and Josh Russ Tupper. For more details and to RSVP, visit https://www.russanddaughtersday.com/This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
**Please subscribe to Matt's Substack at https://worthknowing.substack.com/*** The Judicial Branch Is Our Last Line of Defense Against Trump. Is It Holding?Join Matt Robison and legal expert Kim Wehle as they explore the judiciary's role in countering the unprecedented consolidation of power and abuse of the law by the Trump administration. Amid the collapse of checks from the executive and legislative branches, the conversation delves into whether the judicial branch can stand firm or if it's on the brink of collapse. This episode is a deep-dive into recent rulings, constitutional law, and the imperative for collective civic engagement to uphold democracy.00:00 Introduction and Overview06:26 The Supreme Court's Abdication of Duty18:25 Emergency Powers and Presidential Overreach26:34 The Role of Lower Courts32:53 The Importance of Rule of Law38:31 Supreme Court Rulings and Their Implications44:47 The Need for Constitutional Protections49:20 Engaging in Constructive Dialogue54:33 Final Thoughts and Call to Unity
Here's one thing we know about the Democratic Party right now — they are practically in a death spiral and must do something heroic to have any shot at the White House in 2028. If they think they can go about picking a candidate the regular, super-boring way, they're toast. So Bradley has a plan to bring fun and genuine excitement into the process, based on, yes, Battle of the Network Stars. Plus, he delivers a sharp verdict on the question of whether business school is worth it, and analyzes what the slowing growth of millionaires in New York City means for the next mayor.Join Bradley on Sept. 20 at P&T Knitwear as we celebrate Russ & Daughters Day to mark the legendary shop's first-ever cookbook in their 111 years on the Lower East Side. We'll be hosting a live Firewall recording at 3PM where Bradley will interview Russ & Daughters' fourth generation co-owners, Niki Russ Federman and Josh Russ Tupper. For more details and to RSVP, visit https://www.russanddaughtersday.com/.This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
We often think of censorship as governments removing material or harshly punishing people who spread or access information. But Margaret E. Roberts' new book Censored: Distraction and Diversion Inside China's Great Firewall (Princeton University Press, 2020) reveals the nuances of censorship in the age of the internet. She identifies 3 types of censorship: fear (threatening punishment to deter the spread or access of information); friction (increasing the time or money necessary to access information); and flooding (publishing information to distract, confuse, or dilute). Roberts shows how China customizes repression by using friction and flooding (censorship that is porous) to deter the majority of citizens whose busy schedules and general lack of interest in politics make it difficult to spend extra time and money accessing information. Highly motivated elites (e.g. journalists, activists) who are willing to spend the extra time and money to overcome the boundaries of both friction and flooding meanwhile may face fear and punishment. The two groups end up with very different information – complicating political coordination between the majority and elites. Roberts's highly accessible book negotiates two extreme positions (the internet will bring government accountability v. extreme censorship) to provide a more nuanced understanding of digital politics, the politics of repression, and political communication. Even if there is better information available, governments can create friction on distribution or flood the internet with propaganda. Looking at how China manages censorship provides insights not only for other authoritarian governments but also democratic governments. Liberal democracies might not use fear but they can affect access and availability – and they may find themselves (as the United States did in the 2016 presidential election) subject to flooding from external sources. The podcast includes Roberts' insights on how the Chinese censored information on COVID-19 and the effect that had on the public. Foreign Affairs named Censored one of its Best Books of 2018 and it was also honored with the Goldsmith Award and the Best Book in Human Rights Section and Information Technology and Politics section of the American Political Science Association. Susan Liebell is associate professor of political science at Saint Joseph's University in Philadelphia. She is the author of Democracy, Intelligent Design, and Evolution: Science for Citizenship (Routledge, 2013). Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/east-asian-studies
We often think of censorship as governments removing material or harshly punishing people who spread or access information. But Margaret E. Roberts' new book Censored: Distraction and Diversion Inside China's Great Firewall (Princeton University Press, 2020) reveals the nuances of censorship in the age of the internet. She identifies 3 types of censorship: fear (threatening punishment to deter the spread or access of information); friction (increasing the time or money necessary to access information); and flooding (publishing information to distract, confuse, or dilute). Roberts shows how China customizes repression by using friction and flooding (censorship that is porous) to deter the majority of citizens whose busy schedules and general lack of interest in politics make it difficult to spend extra time and money accessing information. Highly motivated elites (e.g. journalists, activists) who are willing to spend the extra time and money to overcome the boundaries of both friction and flooding meanwhile may face fear and punishment. The two groups end up with very different information – complicating political coordination between the majority and elites. Roberts's highly accessible book negotiates two extreme positions (the internet will bring government accountability v. extreme censorship) to provide a more nuanced understanding of digital politics, the politics of repression, and political communication. Even if there is better information available, governments can create friction on distribution or flood the internet with propaganda. Looking at how China manages censorship provides insights not only for other authoritarian governments but also democratic governments. Liberal democracies might not use fear but they can affect access and availability – and they may find themselves (as the United States did in the 2016 presidential election) subject to flooding from external sources. The podcast includes Roberts' insights on how the Chinese censored information on COVID-19 and the effect that had on the public. Foreign Affairs named Censored one of its Best Books of 2018 and it was also honored with the Goldsmith Award and the Best Book in Human Rights Section and Information Technology and Politics section of the American Political Science Association. Susan Liebell is associate professor of political science at Saint Joseph's University in Philadelphia. She is the author of Democracy, Intelligent Design, and Evolution: Science for Citizenship (Routledge, 2013). Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/new-books-network
We often think of censorship as governments removing material or harshly punishing people who spread or access information. But Margaret E. Roberts' new book Censored: Distraction and Diversion Inside China's Great Firewall (Princeton University Press, 2020) reveals the nuances of censorship in the age of the internet. She identifies 3 types of censorship: fear (threatening punishment to deter the spread or access of information); friction (increasing the time or money necessary to access information); and flooding (publishing information to distract, confuse, or dilute). Roberts shows how China customizes repression by using friction and flooding (censorship that is porous) to deter the majority of citizens whose busy schedules and general lack of interest in politics make it difficult to spend extra time and money accessing information. Highly motivated elites (e.g. journalists, activists) who are willing to spend the extra time and money to overcome the boundaries of both friction and flooding meanwhile may face fear and punishment. The two groups end up with very different information – complicating political coordination between the majority and elites. Roberts's highly accessible book negotiates two extreme positions (the internet will bring government accountability v. extreme censorship) to provide a more nuanced understanding of digital politics, the politics of repression, and political communication. Even if there is better information available, governments can create friction on distribution or flood the internet with propaganda. Looking at how China manages censorship provides insights not only for other authoritarian governments but also democratic governments. Liberal democracies might not use fear but they can affect access and availability – and they may find themselves (as the United States did in the 2016 presidential election) subject to flooding from external sources. The podcast includes Roberts' insights on how the Chinese censored information on COVID-19 and the effect that had on the public. Foreign Affairs named Censored one of its Best Books of 2018 and it was also honored with the Goldsmith Award and the Best Book in Human Rights Section and Information Technology and Politics section of the American Political Science Association. Susan Liebell is associate professor of political science at Saint Joseph's University in Philadelphia. She is the author of Democracy, Intelligent Design, and Evolution: Science for Citizenship (Routledge, 2013). Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/chinese-studies
We often think of censorship as governments removing material or harshly punishing people who spread or access information. But Margaret E. Roberts' new book Censored: Distraction and Diversion Inside China's Great Firewall (Princeton University Press, 2020) reveals the nuances of censorship in the age of the internet. She identifies 3 types of censorship: fear (threatening punishment to deter the spread or access of information); friction (increasing the time or money necessary to access information); and flooding (publishing information to distract, confuse, or dilute). Roberts shows how China customizes repression by using friction and flooding (censorship that is porous) to deter the majority of citizens whose busy schedules and general lack of interest in politics make it difficult to spend extra time and money accessing information. Highly motivated elites (e.g. journalists, activists) who are willing to spend the extra time and money to overcome the boundaries of both friction and flooding meanwhile may face fear and punishment. The two groups end up with very different information – complicating political coordination between the majority and elites. Roberts's highly accessible book negotiates two extreme positions (the internet will bring government accountability v. extreme censorship) to provide a more nuanced understanding of digital politics, the politics of repression, and political communication. Even if there is better information available, governments can create friction on distribution or flood the internet with propaganda. Looking at how China manages censorship provides insights not only for other authoritarian governments but also democratic governments. Liberal democracies might not use fear but they can affect access and availability – and they may find themselves (as the United States did in the 2016 presidential election) subject to flooding from external sources. The podcast includes Roberts' insights on how the Chinese censored information on COVID-19 and the effect that had on the public. Foreign Affairs named Censored one of its Best Books of 2018 and it was also honored with the Goldsmith Award and the Best Book in Human Rights Section and Information Technology and Politics section of the American Political Science Association. Susan Liebell is associate professor of political science at Saint Joseph's University in Philadelphia. She is the author of Democracy, Intelligent Design, and Evolution: Science for Citizenship (Routledge, 2013).
We often think of censorship as governments removing material or harshly punishing people who spread or access information. But Margaret E. Roberts' new book Censored: Distraction and Diversion Inside China's Great Firewall (Princeton University Press, 2020) reveals the nuances of censorship in the age of the internet. She identifies 3 types of censorship: fear (threatening punishment to deter the spread or access of information); friction (increasing the time or money necessary to access information); and flooding (publishing information to distract, confuse, or dilute). Roberts shows how China customizes repression by using friction and flooding (censorship that is porous) to deter the majority of citizens whose busy schedules and general lack of interest in politics make it difficult to spend extra time and money accessing information. Highly motivated elites (e.g. journalists, activists) who are willing to spend the extra time and money to overcome the boundaries of both friction and flooding meanwhile may face fear and punishment. The two groups end up with very different information – complicating political coordination between the majority and elites. Roberts's highly accessible book negotiates two extreme positions (the internet will bring government accountability v. extreme censorship) to provide a more nuanced understanding of digital politics, the politics of repression, and political communication. Even if there is better information available, governments can create friction on distribution or flood the internet with propaganda. Looking at how China manages censorship provides insights not only for other authoritarian governments but also democratic governments. Liberal democracies might not use fear but they can affect access and availability – and they may find themselves (as the United States did in the 2016 presidential election) subject to flooding from external sources. The podcast includes Roberts' insights on how the Chinese censored information on COVID-19 and the effect that had on the public. Foreign Affairs named Censored one of its Best Books of 2018 and it was also honored with the Goldsmith Award and the Best Book in Human Rights Section and Information Technology and Politics section of the American Political Science Association. Susan Liebell is associate professor of political science at Saint Joseph's University in Philadelphia. She is the author of Democracy, Intelligent Design, and Evolution: Science for Citizenship (Routledge, 2013). Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/communications
We often think of censorship as governments removing material or harshly punishing people who spread or access information. But Margaret E. Roberts' new book Censored: Distraction and Diversion Inside China's Great Firewall (Princeton University Press, 2020) reveals the nuances of censorship in the age of the internet. She identifies 3 types of censorship: fear (threatening punishment to deter the spread or access of information); friction (increasing the time or money necessary to access information); and flooding (publishing information to distract, confuse, or dilute). Roberts shows how China customizes repression by using friction and flooding (censorship that is porous) to deter the majority of citizens whose busy schedules and general lack of interest in politics make it difficult to spend extra time and money accessing information. Highly motivated elites (e.g. journalists, activists) who are willing to spend the extra time and money to overcome the boundaries of both friction and flooding meanwhile may face fear and punishment. The two groups end up with very different information – complicating political coordination between the majority and elites. Roberts's highly accessible book negotiates two extreme positions (the internet will bring government accountability v. extreme censorship) to provide a more nuanced understanding of digital politics, the politics of repression, and political communication. Even if there is better information available, governments can create friction on distribution or flood the internet with propaganda. Looking at how China manages censorship provides insights not only for other authoritarian governments but also democratic governments. Liberal democracies might not use fear but they can affect access and availability – and they may find themselves (as the United States did in the 2016 presidential election) subject to flooding from external sources. The podcast includes Roberts' insights on how the Chinese censored information on COVID-19 and the effect that had on the public. Foreign Affairs named Censored one of its Best Books of 2018 and it was also honored with the Goldsmith Award and the Best Book in Human Rights Section and Information Technology and Politics section of the American Political Science Association. Susan Liebell is associate professor of political science at Saint Joseph's University in Philadelphia. She is the author of Democracy, Intelligent Design, and Evolution: Science for Citizenship (Routledge, 2013). Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/law
What if you could eat at a place where the food was fresh and healthy, prices were geared to what customers could afford and the staff was treated equitably? Legendary food writer Mark Bittman joins Firewall to discuss the imminent launch of Community Kitchen, his nonprofit corrective to a food world gone awry.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Join Bradley at P&T Knitwear as we celebrate Russ & Daughters Day on September 20, to mark the legendary shop's first-ever cookbook in their 111 years on the Lower East Side. For more details and to RSVP, visit https://www.russanddaughtersday.com/.
Microsoft has launched Project IR, an advanced AI capable of reverse-engineering malware with a remarkable 90% accuracy rate. This autonomous agent utilizes a combination of large language models and specialized cybersecurity tools to identify threats effectively, achieving a low false positive rate of just 2%. Recent tests demonstrated its capability to analyze thousands of unclassified files and accurately flag a significant majority as malicious. However, as cybersecurity technology advances, so do the tactics of cybercriminals, with a notable increase in phishing attacks targeting managed service providers (MSPs), which now account for over half of all phishing incidents.The rise of AI-powered phishing and social engineering tactics has been highlighted in a recent Acronis report, revealing that 52% of phishing attacks are aimed at MSPs. Additionally, new research indicates that AI browsers may inadvertently assist scammers, as they can overlook red flags that human users would typically catch. A survey from One Password further emphasizes the challenges organizations face with the rapid adoption of AI tools, with many lacking visibility and control over these applications, leading to potential security vulnerabilities.Gartner has issued a warning to corporate leaders, stating that they have a limited timeframe to integrate AI agents into their operations or risk falling behind competitors. Despite the urgency, Gartner also acknowledges that a significant percentage of AI projects fail, raising concerns about the pressure vendors may place on businesses to adopt these technologies hastily. Meanwhile, XAI's claims regarding its Grok 2.5 model being open-sourced have been criticized as misleading, as the licensing terms impose restrictions that contradict open-source principles.In the realm of cybersecurity solutions, companies like SonicWall and VMware are introducing new tools and technologies to enhance security and operational efficiency. SonicWall has launched a new generation of firewalls with a unique cyber warranty, while VMware is focusing on ARM architecture to meet the growing demand for energy-efficient servers. However, the podcast emphasizes the importance of cutting through vendor noise and focusing on solutions that genuinely improve business operations, rather than getting caught up in marketing hype.Three things to know today 00:00 Microsoft's Project Ire Shows AI Can Catch Malware, But Attacks on MSPs Are Rising Faster06:36 AI Urgency, Open-Washing, and Federal Adoption: Sorting Hype From Reality10:09 From Billing Fixes to Firewalls and VMware's Arm Gamble: What Really Matters for MSPs Supported by: https://getnerdio.com/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
While all of you were enjoying a Firewall-free week, Bradley was undergoing Transcranial Magnetic Stimulation, a therapy designed to mitigate obsessive-compulsive disorder. "They put this thing over your head, and effectively, every two seconds, you get 30 pulses or shocks," he says. "They call them pulses because shock sounds bad. If you are a listener and you really do suffer from OCD or depression, this is a tool that I had not been aware of before that I'm very glad I tried." Plus, Bradley dissects the incentives for peace in Ukraine, explains why Democrats still haven't found a message to counter Trump, and floats a plan to make life better for baseball fans.Discussed on today's episode:How to Be a Good Intelligence AnalystThis episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
In this episode of Reboot IT, host Dave Coriale, President of DelCor, sits down with Adam Kuhn, IT Director and DelCor alum, to discuss the evolving role of IT in associations. From foundational infrastructure to advanced cybersecurity strategies, Adam shares lessons learned from both sides of the fence—being an internal influencer and a business partner. The conversation explores how IT leaders can move beyond “keeping the lights on” to proactively shaping organizational maturity, especially in the face of overwhelming system data and increasing security demands.Summary:Cybersecurity as a Strategic InvestmentCybersecurity tools like Arctic Wolf elevate IT maturity beyond basic infrastructure.Associations must move from reactive to proactive security strategies.Cyber insurance requirements are evolving and often unclear, requiring IT guidance.IT Maturity: From Core Requirements to ElectivesAdam compares IT infrastructure to college coursework—core requirements vs. electives.Core includes cloud migration, Microsoft 365, and basic security tools.Electives like threat detection systems represent strategic growth and investment.Information Overload & the Need for SynthesisDevices generate massive amounts of data that are impossible to interpret manually.Security operations centers help synthesize logs and alerts across systems.IT teams need tools to manage and interpret this data effectively.IT's Role in Business Decision-MakingIT should be a trusted advisor, not a gatekeeper or veto power.Excluding IT from technology selection leads to costly integration surprises.IT's involvement ensures better alignment, risk mitigation, and long-term success.Building Cross-Departmental PartnershipsIT needs access to systems it doesn't own to ensure full security coverage.Business units must understand their role in cybersecurity and collaborate with IT.Partnership is essential—not optional—for organizational safety and resilience.Influencing Leadership & Budget DecisionsIT leaders must make cogent cases for investment in security and infrastructure.Budget support depends on trust and clear communication with leadership.Adam emphasizes gratitude for working in a supportive environment that values IT input.
Diese Folge des SPIEGEL-Podcasts »Firewall« ist ursprünglich am 24. Juli 2025 erschienen. Im Rahmen des aktuellen Highlight-Programms während der Sommerpause von »Acht Milliarden« veröffentlichen wir sie hier noch einmal. Andreas Scheuer steht für einen der größten Polit-Skandale der letzten Jahre: das Debakel um die PKW-Maut. Trotzdem stand er bei Wahlkampf-Spendern hoch im Kurs. Mindestens 132.000 Euro flossen 2021 in die Kampagne des damaligen Bundesverkehrsministers. Das geht aus einer geheimen Liste hervor, die dem SPIEGEL vorliegt. Viele der Geldgeber waren, ausgerechnet, im Verkehrssektor tätig. Die Unterlagen zeigen, wie deutsche Unternehmer und ihre Vertreter einen Bundesminister umgarnten. Hat sich Scheuer von den Zahlungen beeinflussen lassen? Er selbst sagt zu einzelnen Spenden nichts. Sein Anwalt wirft dem SPIEGEL eine „Skandalisierung von Sachverhalten“ vor, die »mit der Rechtsordnung und dem Parteiengesetz im völligen Einklang stehen und von der Rechtsordnung sogar gewünscht sind«. Der SPIEGEL-Podcast »Firewall« erzählt, wie Wahlkampf-Spender sich offensiv mit ihren Anliegen in Scheuers Ministerium meldeten. Und er rekonstruiert, wie Scheuer mit der PKW-Maut scheiterte, zum unbeliebtesten Minister des Landes wurde. Heute baut er sich eine zweite Karriere in der Wirtschaft auf. Und wieder unterstützen unterstützen ihn einige seiner damaligen Gönner. Auszüge aus der Spenderliste und noch mehr Details lest ihr hier (S+) und unsere große Recherche zum Maut-Debakel findet ihr hier.+++ Alle Infos zu unseren Werbepartnern finden Sie hier. Die SPIEGEL-Gruppe ist nicht für den Inhalt dieser Seite verantwortlich. +++ Den SPIEGEL-WhatsApp-Kanal finden Sie hier. Alle SPIEGEL Podcasts finden Sie hier. Mehr Hintergründe zum Thema erhalten Sie mit SPIEGEL+. Entdecken Sie die digitale Welt des SPIEGEL, unter spiegel.de/abonnieren finden Sie das passende Angebot. Informationen zu unserer Datenschutzerklärung.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by bombing users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosystem. https://isc.sans.edu/diary/Keeping+an+Eye+on+MFABombing+Attacks/32208 Critical Cisco Secure Firewall Management Center Software RADIUS Remote Code Execution Vulnerability An OS command injection vulnerability may be abused to gain access to the Cisco Secure Firewall Management Center software. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79 F5 Access for Android vulnerability An attacker with a network position that allows them to intercept network traffic may be able to read and/or modify data in transit. The attacker would need to intercept vulnerable clients specifically, since other clients would detect the man-in-the-middle (MITM) attack. https://my.f5.com/manage/s/article/K000152049
Take a Network Break! We start with critical vulnerabilities in Cisco Secure Firewall Management Center and Fortinet’s FortiSIEM. On the news front, SonicWall announces Gen8 firewalls plus a $200,000 warranty for customers that sign on to SonicWall’s Managed Protection Security Suite. IBM Cloud suffers its fourth major outage since May of this year, SASE vendor... Read more »
Take a Network Break! We start with critical vulnerabilities in Cisco Secure Firewall Management Center and Fortinet’s FortiSIEM. On the news front, SonicWall announces Gen8 firewalls plus a $200,000 warranty for customers that sign on to SonicWall’s Managed Protection Security Suite. IBM Cloud suffers its fourth major outage since May of this year, SASE vendor... Read more »
Take a Network Break! We start with critical vulnerabilities in Cisco Secure Firewall Management Center and Fortinet’s FortiSIEM. On the news front, SonicWall announces Gen8 firewalls plus a $200,000 warranty for customers that sign on to SonicWall’s Managed Protection Security Suite. IBM Cloud suffers its fourth major outage since May of this year, SASE vendor... Read more »
Cisco warns of maximum-severity defect in firewall software UK's Colt Telecom suffers cyberattack CISA implores OT environments to lock down critical infrastructure Huge thanks to our sponsor, Conveyor Have you been personally victimized by portal security questionnaires? Conveyor is here to help. Endless clicks, bad navigation, and expanding questions stacked like Russian nesting dolls, all add up to hours of your life you'll never get back. With Conveyor's AI-powered browser extension, you can open a portal questionnaire, scan for questions, and watch it auto-populate your answers back into the portal without the copy and paste. See how at www.conveyor.com Find the stories behind the headlines at CISOseries.com.
At Black Hat USA 2025, Rupesh Chokshi, Senior Vice President and General Manager at Akamai Technologies, connected with ITSPmagazine's Sean Martin to discuss the dual realities shaping enterprise AI adoption—tremendous opportunity and significant risk.AI is driving a seismic transformation in business operations, with executive teams rapidly deploying proof-of-concept projects to capture competitive advantage. Yet, as Chokshi notes, many of these initiatives race ahead without fully integrating security teams into the process. While budgets for AI are expanding, funding for AI-specific security measures often lags behind, leaving organizations exposed.One of the most pressing concerns is the rise of AI bots—Akamai observes 150 billion such bots traversing networks daily. These bots scrape valuable digital content, train models on it, and, in some cases, replace direct customer interactions with summarized answers. The result? Lost marketing leads, disrupted sales funnels, and even manipulated product recommendations—all without traditional “breach” indicators.This is not just a security problem; it's a business continuity challenge. Organizations must develop strategies to block or manage scraping, including commercial agreements for content usage. Beyond this, the proliferation of conversational AI agents—whether for booking tickets, providing mortgage information, or recommending products—introduces new attack surfaces. Threat actors exploit prompt injections, jailbreaks, and code execution vulnerabilities to compromise these interfaces, risking both customer trust and brand reputation.Akamai's response includes capabilities such as Firewall for AI, providing in-line visibility and control over AI-driven sessions, and bot mitigation technologies that protect high-value content. By offering real-time threat intelligence tailored to customer environments, Akamai helps enterprises maintain agility without sacrificing protection.Chokshi's call to action is clear: every company is now an AI company, and security must be embedded from the outset. Boards should view security not as a budget line item, but as the foundation for innovation velocity, brand integrity, and long-term competitiveness.Learn more about Akamai: https://itspm.ag/akamailbwcNote: This story contains promotional content. Learn more.Guests:Rupesh Chokshi, SVP & General Manager, Application Security, Akamai | https://www.linkedin.com/in/rupeshchokshi/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from Akamai: https://www.itspmagazine.com/directory/akamaiLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
While most people ignore the Ninth Amendment, those who don't usually get it completely wrong. It isn't a grant of additional federal power; it's a rule of construction designed to explain its limits. On this episode, we'll uncover the forgotten history behind the ignored 9th Amendment. The post The 9th Amendment Wasn't an Afterthought. It Was a Firewall first appeared on Tenth Amendment Center.