Computing term
POPULARITY
Categories
Hacker After Dark 8-18-25 by 1010 XL Jax Sports Radio
The Monday Microsegment for the week of August 18th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.Windows admins, start your updates — the latest Patch Tuesday is a doozy.Hackers are packing RomCom exploits into a popular file-archiving app, but no one's laughing.And phishers are turning stolen logins into stock pump-and-dump scams.And Christer Swartz joins us for an "Ask the Expert" segment. Head to The Zero Trust Hub: hub.illumio.comRegister to attend The Illumio World Tour: https://www.illumio.com/illumio-world-tour
Hacker After Dark 8-14-25 by 1010 XL Jax Sports Radio
Jennifer Pattison Tuohy of The Verge joins Mikah Sargent on this episode of Tech News Weekly! Apple is rumored to launch a series of AI-powered devices, the upcoming Pebble Time 2's design is shown off, a look into a global SMS phishing scam ring, and the blood oxygen feature is returning to Apple Watches? Apple is seeking to expand its product offerings into AI-powered robots, home security, and smart displays, according to a report from Bloomberg's Mark Gurman. Eric Migicovsky, founder of Pebble smartwatches, unveils the design of the company's Pebble Time 2* watch. Harrison Sand, Senior Security Consultant for mnemonic, unveils Darcula. This global SMS phishing-as-a-scam ring sends SMS messages hoping to steal credentials from those who click on the links in the messages. And Apple announces that it's bringing back the Blood Oyxgen feature for Apple Watches, which was a clever workaround following a recent U.S. Customs ruling against Masimo. Hosts: Mikah Sargent and Jennifer Pattison Tuohy Guest: Harrison Sand Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zocdoc.com/tnw cachefly.com/twit
Jennifer Pattison Tuohy of The Verge joins Mikah Sargent on this episode of Tech News Weekly! Apple is rumored to launch a series of AI-powered devices, the upcoming Pebble Time 2's design is shown off, a look into a global SMS phishing scam ring, and the blood oxygen feature is returning to Apple Watches? Apple is seeking to expand its product offerings into AI-powered robots, home security, and smart displays, according to a report from Bloomberg's Mark Gurman. Eric Migicovsky, founder of Pebble smartwatches, unveils the design of the company's Pebble Time 2* watch. Harrison Sand, Senior Security Consultant for mnemonic, unveils Darcula. This global SMS phishing-as-a-scam ring sends SMS messages hoping to steal credentials from those who click on the links in the messages. And Apple announces that it's bringing back the Blood Oyxgen feature for Apple Watches, which was a clever workaround following a recent U.S. Customs ruling against Masimo. Hosts: Mikah Sargent and Jennifer Pattison Tuohy Guest: Harrison Sand Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zocdoc.com/tnw cachefly.com/twit
Jennifer Pattison Tuohy of The Verge joins Mikah Sargent on this episode of Tech News Weekly! Apple is rumored to launch a series of AI-powered devices, the upcoming Pebble Time 2's design is shown off, a look into a global SMS phishing scam ring, and the blood oxygen feature is returning to Apple Watches? Apple is seeking to expand its product offerings into AI-powered robots, home security, and smart displays, according to a report from Bloomberg's Mark Gurman. Eric Migicovsky, founder of Pebble smartwatches, unveils the design of the company's Pebble Time 2* watch. Harrison Sand, Senior Security Consultant for mnemonic, unveils Darcula. This global SMS phishing-as-a-scam ring sends SMS messages hoping to steal credentials from those who click on the links in the messages. And Apple announces that it's bringing back the Blood Oyxgen feature for Apple Watches, which was a clever workaround following a recent U.S. Customs ruling against Masimo. Hosts: Mikah Sargent and Jennifer Pattison Tuohy Guest: Harrison Sand Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zocdoc.com/tnw cachefly.com/twit
Stop leaving yourself vulnerable to data breaches. Go to my sponsor https://aura.com/matt to get a 14-day free trial and see if any of your data has been exposed Get 10% sitewide for a limited time. Just visit https://GhostBed.com/cox and use code COX at checkout. Matt Cox interviews Rob Yeager, who recounts his wild journey from teenage dealing and club promotion to elaborate prison scams—including a $260,000 Starbucks gift card scheme—surviving Alabama's violent prison system, and ultimately rebuilding his life into a legitimate business career. Rob's links https://fusiondataco.com https://www.instagram.com/robyeager1105/ https://www.facebook.com/robert.yeager.1105/ Do you want to be a guest? Fill out the form https://forms.gle/5H7FnhvMHKtUnq7k7 Send me an email here: insidetruecrime@gmail.com Do you extra clips and behind the scenes content? Subscribe to my Patreon: https://patreon.com/InsideTrueCrime Follow me on all socials! Instagram: https://www.instagram.com/insidetruecrime/ TikTok: https://www.tiktok.com/@matthewcoxtruecrime Do you want a custom painting done by me? Check out my Etsy Store: https://www.etsy.com/shop/coxpopart Listen to my True Crime Podcasts anywhere: https://anchor.fm/mattcox Check out my true crime books! Shark in the Housing Pool: https://www.amazon.com/dp/B0851KBYCF Bent: https://www.amazon.com/dp/B0BV4GC7TM It's Insanity: https://www.amazon.com/dp/B08KFYXKK8 Devil Exposed: https://www.amazon.com/dp/B08TH1WT5G Devil Exposed (The Abridgment): https://www.amazon.com/dp/1070682438 The Program: https://www.amazon.com/dp/B0858W4G3K Bailout: https://www.barnesandnoble.com/w/bailout-matthew-cox/1142275402 Dude, Where's My Hand-Grenade?: https://www.amazon.com/dp/B0BXNFHBDF/ref=tmm_pap_swatch_0?_encoding=UTF8&qid=1678623676&sr=1-1 Checkout my disturbingly twisted satiric novel! Stranger Danger: https://www.amazon.com/dp/B0BSWQP3WX If you would like to support me directly, I accept donations here: Paypal: https://www.paypal.me/MattCox69 Cashapp: $coxcon69 Learn more about your ad choices. Visit megaphone.fm/adchoices
We kick things off with a deep dive into the Hackberry PI and how to build one. Then in the security news: Will Perplexity buy Chrome? ESP32 Bus Pirates Poisoned telemetry Docker image security Fully Open Source Quantum Sensors Securing your car, Flippers, and show me the money Bringing your printer and desktop to Starbucks Paying a ransom? You need approval AI: Shield or Spear? No authentication? That's a problem Transient Bugs: A realistic threat? You can run Linux And who still uses AOL dial-up? Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-887
Hacker After Dark 8-13-25 by 1010 XL Jax Sports Radio
Jennifer Pattison Tuohy of The Verge joins Mikah Sargent on this episode of Tech News Weekly! Apple is rumored to launch a series of AI-powered devices, the upcoming Pebble Time 2's design is shown off, a look into a global SMS phishing scam ring, and the blood oxygen feature is returning to Apple Watches? Apple is seeking to expand its product offerings into AI-powered robots, home security, and smart displays, according to a report from Bloomberg's Mark Gurman. Eric Migicovsky, founder of Pebble smartwatches, unveils the design of the company's Pebble Time 2* watch. Harrison Sand, Senior Security Consultant for mnemonic, unveils Darcula. This global SMS phishing-as-a-scam ring sends SMS messages hoping to steal credentials from those who click on the links in the messages. And Apple announces that it's bringing back the Blood Oyxgen feature for Apple Watches, which was a clever workaround following a recent U.S. Customs ruling against Masimo. Hosts: Mikah Sargent and Jennifer Pattison Tuohy Guest: Harrison Sand Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zocdoc.com/tnw cachefly.com/twit
Join Snaxton & Goose for another episode of Snax Pax! In this weeks episode they discuss, more AI, their luscious facial hair, this weeks cult classic "Hackers", and read your messages! Don't forget to rate, review, and subscribe!
Your social media platforms = your storefront! If you're a creator or influencer, your Instagram isn't just for posting pretty pictures. It's your business, your livelihood, your INCOME STREAM. Which means… you need to protect it like you would a physical shop, right? In this episode, I'm walking you through simple, easy-to-implement strategies to keep your Instagram safe from hackers, scams, and sneaky security breaches — so your content (and income) stays in your hands. I'm talking about: ➜ How to create strong, unique passwords (and test their strength)➜ The non-negotiable security setting every creator should turn on ASAP➜ Tools to manage your passwords without losing your mind➜ How to spot and remove shady third-party apps linked to your account➜ Extra tips for travel creators & public Wi-Fi usersLet's keep your platform safe (and "horror" stories free) so you can focus on creating what you love!
Jennifer Pattison Tuohy of The Verge joins Mikah Sargent on this episode of Tech News Weekly! Apple is rumored to launch a series of AI-powered devices, the upcoming Pebble Time 2's design is shown off, a look into a global SMS phishing scam ring, and the blood oxygen feature is returning to Apple Watches? Apple is seeking to expand its product offerings into AI-powered robots, home security, and smart displays, according to a report from Bloomberg's Mark Gurman. Eric Migicovsky, founder of Pebble smartwatches, unveils the design of the company's Pebble Time 2* watch. Harrison Sand, Senior Security Consultant for mnemonic, unveils Darcula. This global SMS phishing-as-a-scam ring sends SMS messages hoping to steal credentials from those who click on the links in the messages. And Apple announces that it's bringing back the Blood Oyxgen feature for Apple Watches, which was a clever workaround following a recent U.S. Customs ruling against Masimo. Hosts: Mikah Sargent and Jennifer Pattison Tuohy Guest: Harrison Sand Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zocdoc.com/tnw cachefly.com/twit
We kick things off with a deep dive into the Hackberry PI and how to build one. Then in the security news: Will Perplexity buy Chrome? ESP32 Bus Pirates Poisoned telemetry Docker image security Fully Open Source Quantum Sensors Securing your car, Flippers, and show me the money Bringing your printer and desktop to Starbucks Paying a ransom? You need approval AI: Shield or Spear? No authentication? That's a problem Transient Bugs: A realistic threat? You can run Linux And who still uses AOL dial-up? Show Notes: https://securityweekly.com/psw-887
Join Automox CISO and SVP of Product Jason Kikta for a recap of Black Hat and DEF CON 2025. In this episode, Jason shares his take on the conversation around AI in cybersecurity shifting from hype to practical tools for defenders. Hear why integrating AI into your CI/CD pipeline, alert triage, and vulnerability management could be a game changer, plus thoughts on choosing the right security events for your personality and goals. Whether you're a conference veteran or a curious first-timer, this episode offers insights, humor, and encouragement to get more involved in the security community.
Jennifer Pattison Tuohy of The Verge joins Mikah Sargent on this episode of Tech News Weekly! Apple is rumored to launch a series of AI-powered devices, the upcoming Pebble Time 2's design is shown off, a look into a global SMS phishing scam ring, and the blood oxygen feature is returning to Apple Watches? Apple is seeking to expand its product offerings into AI-powered robots, home security, and smart displays, according to a report from Bloomberg's Mark Gurman. Eric Migicovsky, founder of Pebble smartwatches, unveils the design of the company's Pebble Time 2* watch. Harrison Sand, Senior Security Consultant for mnemonic, unveils Darcula. This global SMS phishing-as-a-scam ring sends SMS messages hoping to steal credentials from those who click on the links in the messages. And Apple announces that it's bringing back the Blood Oyxgen feature for Apple Watches, which was a clever workaround following a recent U.S. Customs ruling against Masimo. Hosts: Mikah Sargent and Jennifer Pattison Tuohy Guest: Harrison Sand Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zocdoc.com/tnw cachefly.com/twit
We kick things off with a deep dive into the Hackberry PI and how to build one. Then in the security news: Will Perplexity buy Chrome? ESP32 Bus Pirates Poisoned telemetry Docker image security Fully Open Source Quantum Sensors Securing your car, Flippers, and show me the money Bringing your printer and desktop to Starbucks Paying a ransom? You need approval AI: Shield or Spear? No authentication? That's a problem Transient Bugs: A realistic threat? You can run Linux And who still uses AOL dial-up? Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-887
Hacker After Dark 8-12-25 by 1010 XL Jax Sports Radio
Está no ar, o Data Hackers News !! Os assuntos mais quentes da semana, com as principais notícias da área de Dados, IA e Tecnologia, que você também encontra na nossa Newsletter semanal, agora no Podcast do Data Hackers !!Aperte o play e ouça agora, o Data Hackers News dessa semana !Para saber tudo sobre o que está acontecendo na área de dados, se inscreva na Newsletter semanal:https://www.datahackers.news/Acesse os links:Inscrições do Data Hackers Challenge 2025Live Zoho: Decisões Baseadas em Dados: Aplicando Machine Learning com o Zoho AnalyticsConheça nossos comentaristas do Data Hackers News:Monique FemmeMatérias/assuntos comentados:Live finalistas do Data Hackers Challenge 2025;Evento Mettup ItaúMatéria lançamento ChatGpt5;Matéria Elon Musk libera Grok grátis nos EUA. Demais canais do Data Hackers:SiteLinkedinInstagramTik TokYou Tube
Hackers leak backend data from the North Korean state-sponsored hacking group Kimsuky. A ransomware attack on a Dutch clinical diagnostics lab exposes medical data of nearly half a million women. One of the world's largest staffing firms suffers a data breach. Saint Paul, Minnesota, confirms the Interlock ransomware gang was behind a July cyberattack. Researchers jailbreak ChatGPT-5. A cyber incident takes the Pennsylvania Attorney General's Office entirely offline. A new report quantifies global financial exposure from Operational Technology (OT) cyber incidents. Finnish prosecutors charge a Russian captain for allegedly damaging five critical subsea cables in the Baltic Sea. On our Industry Voices segment, we are joined by Sean Deuby, Semperis' Principal Technologist, with insights on the global state of ransomware. Hackers take smart buses for a virtual joyride. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Industry Voices segment, we are joined by Sean Deuby, Semperis' Principal Technologist, who is sharing insights and observations on the state of ransomware around the globe. If you want to hear the full conversation, check it out here. Selected Reading Kimsuky APT Hackers Exposed in Alleged Breach Revealing Phishing Tools and Operational Data (TechNadu) Ransomware attack on dutch medical lab exposes cancer screening data of almost 500K women (Beyond Machines) Manpower discloses data breach affecting nearly 145,000 people (Bleeping Computer) Saint Paul cyberattack linked to Interlock ransomware gang (Bleeping Computer) Tenable Jailbreaks GPT-5, Gets It To Generate Dangerous Info Despite OpenAI's New Safety Tech (Tenable) Pennsylvania Attorney General's Office hit by cybersecurity incident, shuts down digital infrastructure (Beyond Machines) New Dragos Report Estimates Over $300 Billion in Potential Global OT Cyber Risk Exposure (Business Wire) The 2025 OT Security Financial Risk Report (Dragos) Finland charges captain of suspected Russian ‘shadow fleet' tanker for subsea cable damage (The Record) Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking (SecurityWeek) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Hacker After Dark 8-11-25 by 1010 XL Jax Sports Radio
Stellar Cyber Revolutionizes SOC Cybersecurity Operations with Human-Augmented Autonomous Platform at Black Hat 2025 A Stellar Cyber Event Coverage of Black Hat USA 2025 Las VegasAn ITSPmagazine Brand Story with Subo Guha, Senior Vice President Product, Stellar Cyber____________________________Security operations centers face an unprecedented challenge: thousands of daily alerts overwhelming analyst teams while sophisticated threats demand immediate response. At Black Hat USA 2025 in Las Vegas, Stellar Cyber presented a revolutionary approach that fundamentally reimagines how SOCs operate in the age of AI-driven threats.Speaking with ITSPmagazine's Sean Martin, Subo Guha, Senior Vice President of Products at Stellar Cyber, outlined the company's vision for transforming security operations through their human-augmented autonomous SOC platform. Unlike traditional approaches that simply pile on more automation, Stellar Cyber recognizes that effective security requires intelligent collaboration between AI and human expertise.The platform's three-layer architecture ingests data from any source – network devices, applications, identities, and endpoints – while maintaining vendor neutrality through open EDR integration. Organizations can seamlessly work with CrowdStrike, SentinelOne, Sophos, or other preferred solutions without vendor lock-in. This flexibility proves crucial for enterprises navigating complex security ecosystems where different departments may have invested in various endpoint protection solutions.What sets Stellar Cyber apart is their autonomous SOC concept, which dramatically reduces alert volume from hundreds of thousands to manageable numbers within days rather than weeks. The platform's AI-driven auto-triage capability identifies true positives among thousands of false alarms, presenting analysts with prioritized "verdicts" that demand attention. This transformation addresses one of security operations' most persistent challenges: alert fatigue that leads to missed threats and burned-out analysts.The revolutionary AI Investigator copilot enables natural language interaction, allowing analysts to query the system conversationally. An analyst can simply ask, "Show me all impossible travel incidents between midnight and 4 AM," and receive actionable intelligence immediately. This democratization of security operations means junior analysts can perform at senior levels without extensive coding knowledge or years of experience navigating complex query languages.Identity threat detection and response (ITDR) emerged as another critical focus area during the Black Hat presentation. With identity becoming the new perimeter, Stellar Cyber integrated sophisticated user and entity behavior analytics (UEBA) directly into the platform. The system detects impossible travel scenarios, credential attacks, and lateral movement patterns that indicate compromise. For instance, when a user logs in from Portland at 11 PM and then appears in Moscow 30 minutes later, the platform immediately flags this physical impossibility.The identity protection extends beyond human users to encompass non-human identities, addressing the growing threat of automated attacks powered by large language models. Hackers now leverage generative AI to create credential attacks at unprecedented scale and sophistication, making robust identity security more critical than ever.Guha emphasized that AI augmentation doesn't displace security professionals but elevates them. By automating mundane tasks, analysts focus on strategic decision-making and complex threat hunting. MSSPs report dramatic efficiency gains, scaling operations without proportionally increasing headcount. Where previously a hundred thousand alerts might take weeks to process, requiring extensive junior analyst teams, the platform now delivers actionable insights within days with smaller, more focused teams.The platform's unified approach eliminates tool sprawl, providing CISOs with real-time visualization of their security posture. Executive reporting becomes instantaneous, with high-priority verdicts clearly displayed for rapid decision-making. This visualization capability transforms how security teams communicate with leadership, replacing lengthy reports with dynamic dashboards that convey risk and response status at a glance.Real-world deployments demonstrate significant operational improvements. Organizations report faster mean time to detection and response, reduced false positive rates, and improved analyst satisfaction. The platform's learning capabilities mean it becomes more intelligent over time, adapting to each organization's unique threat landscape and operational patterns.As organizations face increasingly sophisticated threats powered by generative AI, Stellar Cyber's human-augmented approach represents a paradigm shift. By combining AI intelligence with human intuition, the platform delivers faster threat detection, reduced false positives, and empowered security teams ready for tomorrow's challenges. The company's commitment to continuous innovation, evidenced by rapid feature releases between RSA and Black Hat, positions them at the forefront of next-generation security operations. Learn more about Stellar Cyber: https://itspm.ag/stellar-cyber--inc--357947Note: This story contains promotional content. Learn more.Guest: Subo Guha, Senior Vice President Product, Stellar Cyber | https://www.linkedin.com/in/suboguha/ResourcesLearn more and catch more stories from Stellar Cyber: https://www.itspmagazine.com/directory/stellarcyberLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25Learn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
Eric Ebner with 360Security Service joins Adam and Jordana to talk about the cyber attack against the city of St Paul.
Title: Dream Hackers & Draco: Indigo Angel Exposes the Reptilian Nightmare Agenda
Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcastDavid Close, Chief Solutions Architect at Futurex, discusses the reality facing our digital world: quantum computing will soon break the encryption protecting everything from mobile banking to satellite communications. But here's the twist — hackers aren't waiting. They're harvesting encrypted data now, betting that quantum computers will eventually crack today's "unbreakable" codes in a strategy called "harvest now, decrypt later." David explains how NIST's new post-quantum cryptography standards are already being deployed by companies like Google and CloudFlare, why crypto agility is essential for future-proofing your security infrastructure, and how you can break into the exciting field of cryptography — even without a PhD in mathematics.0:00 - Intro 1:00 - Cybersecurity Salary Guide3:06 - Meet David Close from Futurex3:52 - David's journey from embedded systems to cryptography5:05 - What Futurex does and 40 years of crypto innovation6:39 - The role of Chief Solutions Architect8:21 - Evolution of cryptography from payments to enterprise10:13 - How David discovered his passion for cryptography13:23 - Post-quantum cryptography explained15:16 - Why quantum computers break current encryption16:05 - The "harvest now, decrypt later" threat18:19 - NIST's new quantum-resistant algorithms20:02 - Real-world quantum threats to satellites and IP22:43 - What organizations can do now25:25 - Crypto agility and future-proofing systems28:41 - Resources for staying current on cryptography30:45 - Career paths in cryptography beyond algorithm development32:18 - Getting started in cryptography careers34:26 - The cryptography landscape in 15 years37:34 - Regulatory enforcement of new crypto standards39:43 - Best career advice: Finding the right vehicle41:29 - David's current reading and recommendations42:35 - Where to find David and Futurex onlineView Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcastAbout InfosecInfosec's mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ's security awareness training. Learn more at infosecinstitute.com.
In today's episode of Cybersecurity Today, host David Shipley covers critical updates on recent cyber attacks and breaches impacting the US Federal judiciary's case management systems, and SonicWall firewall compromises. He also discusses researchers' new jailbreak method against GPT-5, which bypasses ethical guardrails to produce harmful instructions. Shipley shares insights and standout sessions from Hacker Summer Camp 2025, including BSides Las Vegas, the I Am the Cavalry track, and Defcon, highlighting ongoing efforts and challenges in the cybersecurity landscape. Stay informed, stay secure, and join the conversation in this detailed overview of current cybersecurity issues and innovations. 00:00 Introduction and Headlines 00:31 US Federal Judiciary Cyber Attack 02:29 SonicWall Ransomware Attacks 04:14 AI Jailbreak Techniques 07:44 Hacker Summer Camp 2025 Highlights 08:10 BSides Las Vegas and Community Insights 09:29 Healthcare Cybersecurity and Crash Cart Project 12:11 Defcon Reflections and Final Thoughts 13:45 Conclusion and Listener Engagement
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecurity awareness, as he shares knowledge through LinkedIn, YouTube, and personal mentoring 00:00 Intro02:14 All hackers aren't bad?04:38 How is cybersecurity in the Middle East 06:03 To become an Ethical hacker, should you focus on penetration testing first?07:14 How does a hackers mind work?12:04 How do you not get discovered in the scanning phase?14:16 Hackers prefer to work alone15:10 Hackers aren't using the same tools19:05 If you want in, you could get in28:57 Any companies that are well defended? 30:45 Air gapping correctly39:10 More about Husam------------------------------------------------------------To learn more about Husam visit https://www.linkedin.com/in/husamshbib/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com
In this episode I address listener feedback and questions, from clarifying my stance on the “Tea” controversy to sharing practical tips from the community about Privacy.com workarounds. This episode covers some loose ends before I take a brief hiatus. I also discuss why I won't be at Black Hat this year, share thoughts on minimalism versus practicality in privacy, and reveal my favorite Indian restaurant in Vegas for those attending Black Hat!In this week's episode:Addressing the “Tea” controversy and clarifying my positions on doxingCommunity solution for Privacy.com and Plaid privacy concernsContact information protection strategies when family uses social mediaFuture of capture-the-flag challenges and OSINT considerationsConference attendance updates and travelMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-general:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-intro:matrix.orgShow Links:Tea app leak article - https://www.bleepingcomputer.com/news/security/tea-app-leak-worsens-with-second-database-exposing-user-chats/OSMOSIS Institute - https://osmosisinstitute.org/events/Privacy.com - https://privacy.com“There are no facts, only interpretations.”- Friedrich Nietzsche ★ Support this podcast on Patreon ★
Ce lundi 11 août, la cyberguerre qui se poursuit actuellement entre l'Iran et Israël a été abordée par Caroline Loyer dans sa chronique, dans l'émission Good Morning Business, présentée par Erwan Morice, sur BFM Business. Retrouvez l'émission du lundi au vendredi et réécoutez la en podcast.
Hacker After Dark 8-8-25 by 1010 XL Jax Sports Radio
Hacker After Dark 8-7-25 by 1010 XL Jax Sports Radio
Kaipara farmer Stephen Newman is intent on improving soils and pasture in low cost, natural ways. He's now helping others too and hopes these methods will become even more useful as the country experiences more and more intense weather events like flooding, heavy rainfall and drought. You can find photos and read more about the stories in this episode on our webpage, here.You can find our previous episode on City to Farm, here, or learn more on their website.With thanks to:Stephen NewmanGo to this episode on rnz.co.nz for more details
Luka Ivezic is the Advisory Services Lead Cybersecurity Regulations and Emerging Technologies at the Information Security Forum (ISF). In this episode, he joins host Charlie Osborne to discuss the latest on a $243 million bitcoin theft by a teenage hacker, highlighting how advanced attacks often begin with simple vulnerabilities. This episode is sponsored by Cryptosec, a leading cybersecurity firm specializing in the protection of the decentralized future of finance, governance, and more. To learn more, visit https://cryptosec.com.
Problemas antigos. Novas Ferramentas.Neste episódio, vamos mostrar como você pode utilizar a Inteligência Artificial Generativa (GenAI) para te auxiliar na análise dados não-estruturados e aumentar sua produtividade. Reunimos Felipe Fiamozzini e Lara Marinelli, especialistas da Bain & Company que vivem o dia a dia da área, para explorar os desafios que existiam antes da chegada da GenAI, os métodos e frameworks recomendados e como o ciclo da análise de dados está sendo adaptado com essas novas tecnologias.Também discutimos o papel das lideranças nesse cenário de transformação e damos dicas práticas para quem está começando na área de dados e quer desenvolver habilidades em GenAI.Vem com a gente entender como extrair valor de dados não-estruturados com o apoio da GenAI!Lembrando que você pode encontrar todos os podcasts da comunidade Data Hackers no Spotify, iTunes, Google Podcast, Castbox e muitas outras plataformas.Convidados:Felipe Fiamozzini - Sócio na Bain Company focado em dados e IALara Marinelli - Gerente de Machine Learning EngineeringNossa Bancada Data Hackers:Paulo Vasconcellos — Co-founder da Data Hackers e Principal Data Scientist na Hotmart.Gabriel Lages - Co-founder da Data Hackers e Data & Analytics Sr. Director na Hotmart.
This show has been flagged as Clean by the host. Hackers on Planet Earth Now an annual conference Inspired by 2600 magazine, a creative and diverse event. You'll see villages, live performances, demonstrations, vintage computers, ham radio, lockpicking, learn to solder. Too much to see. It's reasonably priced, always fun. August 15-17th in Queens New York. More details at https://hope.net If you're in the area, try to make it!Provide feedback on this episode.
Hacker After Dark 8-6-25 by 1010 XL Jax Sports Radio
Welcome to episode 315 of The Cloud Pod, where the forecast is always cloudy! Your hosts, Justin and Matt, are here to bring you the latest in cloud and AI news, including news about AI from the White House, the newest hacker exploits, and news from CloudWatch, CrowdStrike, and GKE – plus so much more. Let's get into it! Titles we almost went with this week: SharePoint and Tell: Government Secrets at Risk Zero-Day Hero: How Hackers Found SharePoint’s Achilles’ Heel Amazon Q Gets an F in Security Class Spark Joy: GitHub’s Marie Kondo Approach to App Development No Code? No Problem! GitHub Lights a Spark Under App Creation GKE Turns 10: Still Not Old Enough to Deploy Itself A Decade of Containers: Pokémon GO Caught Them All Kubernetes Engine Hits Double Digits, Still Can’t Count Past 9 Pods Account Names: The Missing Link in AWS Cost Optimization Flash Gordon Saves Your VMs from the Azure-verse The Flash: Fastest VM Monitor in the Multiverse Ctrl+AI+Delete: Rebooting America’s Artificial Intelligence Strategy The AImerican Dream: White House Plots Path to Silicon Supremacy CrowdStrike’s Year of Living Resiliently Kernel Panic at the Disco: A Recovery Story The Search is Over (But Your Copilot License Isn’t) Ground Control to Major Tom: You’re Fired GPU Booking.com: Reserve Your Neural Network’s Next Vacation Calendar Man Strikes Again: This Time He’s Scheduling Your TPUs AirBnB for AI: Short-Term Rentals for Your Machine Learning Models Claude’s World Tour: Now Playing in Every Region Going Global: Claude Gets Its Passport Stamped on Vertex AI SQS Finally Learns to Share: No More Queue Hogging The Noisy Neighbor Gets Shushed: Amazon’s Fair Play for Queues CloudWatch Gets Its AI Degree in Observability Teaching Old Logs New Tricks: CloudWatch Goes GenAI The Agent Whisperer: CloudWatch’s New AI Monitoring Powers NotebookLM Gets Its PowerPoint License Slides, Camera, AI-ction: NotebookLM Goes Visual The SSL-ippery Slope: Azure’s Managed Certs Go Public or Go Home Breaking Bad Certificates: DigiCert’s New Rules Leave Some Apps High and Dry Firewall Rules: Now with a Rough Draft Feature Azure’s New Policy: Think Before You Deploy General News 00:50 Hackers exploiting a SharePoint zero-day are seen targeting government agencies | TechCrunch Microsoft SharePoint servers are being actively exploited through a zero-day vulnerability (CVE-2025-53770), with initial attacks primarily targeting government agencies, universities, and energy companies, according to security researchers. The vulnerability affects on-premises SharePoint installations only, not cloud versions, with researchers identifying 9,000-10,000 vulnerable instances accessible from the internet that require immediate patching or disconnection. Initial exploitation appears t
In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Aarti Borkar, Simeon Kakpovi, and Andrew Rapp for a behind-the-scenes look at how Microsoft Threat Intelligence and Microsoft Incident Response teams collaborate as part of a closed-loop system, the emotional toll of breaches, and how organizations of any size can build resilience through preparation and psychological safety. By listening to this segment, you'll get a preview of what this group brought to the main stage of Black Hat this year. Later, Sherrod chats with Snow, co-founder of the Social Engineering Community Village at DEF CON, about her journey from special effects makeup to elite social engineer, and how empathy, creativity, and even a ladder can be powerful tools in physical security testing. In this episode you'll learn: How Microsoft's Digital Crimes Unit uses legal tactics to disrupt threat actors Why rehearsing your incident response plan can save weeks of recovery time How AI is being trained to make social engineering phone calls on its own Some questions we ask: How would you describe the overall health of the global cybersecurity landscape? Why does tailoring AI prompts sometimes feel like social engineering? What is the feedback loop between incident response, intelligence, and product protections? Resources: View Aarti Borkar on LinkedIn View Simeon Kakpovi on LinkedIn View Andrew Rapp on LinkedIn View Sherrod DeGrippo on LinkedIn Microsoft at Black Hat USA 2025 Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Uncovering Hidden Risks Discover and follow other Microsoft podcasts at microsoft.com/podcasts Get the latest threat intelligence insights and guidance at Microsoft Security Insider The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.
Hackers hijacked Google's Gemini AI with a poisoned calendar invite to take over a smart home Nvidia rejects US demand for backdoors in AI chips Google says hackers stole its customers' data by breaching its Salesforce database Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO.
Hacker After Dark 8-5-25 by 1010 XL Jax Sports Radio
This episode covers three critical cybersecurity developments affecting healthcare organizations. First, FBI warnings about Scattered Spider ransomware group targeting employees through Slack and Microsoft Teams, including their alarming tactic of creating fake identities to join incident response calls and monitor remediation efforts. Second, leaked chat logs from the Conti ransomware group reveal these criminal organizations operate like structured tech startups with HR policies, management layers, and performance reviews - highlighting the sophisticated nature of modern cyber threats. Finally, CrowdStrike intelligence reveals over 900 North Korean operatives have quietly embedded themselves in US companies using deepfakes and fake identities, wiring paychecks back to the regime. The episode also mentions CISA's new free Thorium tool for malware analysis and forensic investigations.X: This Week Health LinkedIn: This Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer
Ein österreichischer Botschafter in Brüssel soll jahrelang einen Blog betrieben haben, der voll von sexistischen und frauenfeindlichen Postings war. Dieser Blog könnte jetzt zum Einfallstor für Hacker geworden sein. Im Außenministerium steht die Welt derzeit Kopf. Wie sicher das Außenministerium noch ist und wie verheerend der IT-Angriff sein könnte, darüber sprechen Fabian Schmid, leitender Redakteur Investigativ beim STANDARD, und Thomas Mayer, Europakorrespondent beim STANDARD. **Hat Ihnen dieser Podcast gefallen?** Mit einem STANDARD-Abonnement können Sie unsere Arbeit unterstützen und mithelfen, Journalismus mit Haltung auch in Zukunft sicherzustellen. Alle Infos und Angebote gibt es hier: [abo.derstandard.at](https://abo.derstandard.at/?ref=Podcast&utm_source=derstandard&utm_medium=podcast&utm_campaign=podcast&utm_content=podcast)
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecurity awareness, as he shares knowledge through LinkedIn, YouTube, and personal mentoring 00:00 Intro02:14 All hackers aren't bad?04:38 How is cybersecurity in the Middle East 06:03 To become an Ethical hacker, should you focus on penetration testing first?07:14 How does a hackers mind work?12:04 How do you not get discovered in the scanning phase?14:16 Hackers prefer to work alone15:10 Hackers aren't using the same tools19:05 If you want in, you could get in28:57 Any companies that are well defended? 30:45 Air gapping correctly39:10 More about Husam
Cisco reveals a phishing related data breach. SonicWall warns users to disable SSLVPN services after reports of ransomware gangs exploiting a likely zero-day. Researchers uncover a stealthy Linux backdoor and new vulnerabilities in Nvidia's Triton Inference Server. A new malware campaign targets Microsoft 365 users with fake OneDrive emails. The U.S. Treasury warns of rising criminal activity involving cryptocurrency ATMs. Cloudflare accuses an AI startup of using stealthy methods to bypass restrictions on web scraping. A global infostealer campaign compromises over 4,000 victims across 62 countries. Marty Momdjian, General Manager of Ready1 by Semperis, tells us about Operation Blindspot, a tabletop exercise taking place this week at Black Hat. On this week's Threat Vector segment, host David Moulton speaks with Nigel Hedges from Sigma Healthcare about how CISOs can shift cybersecurity from a technical problem to a business priority. One hospital's data ends up in the snack aisle. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest We are joined by Marty Momdjian, General Manager of Ready1 by Semperis, who is talking about Operation Blindspot, a tabletop exercise simulating a cyberattack against a rural water utility based in Nevada taking place this week at Black Hat USA 2025. Threat Vector Segment On this week's Threat Vector segment, host David Moulton speaks with Nigel Hedges, Executive General Manager of Cyber & Risk at Chemist Warehouse and Sigma Healthcare. Nigel shares how CISOs can shift cybersecurity from a technical problem to a business priority. You can listen to the full discussion on Threat Vector here and catch new episodes every Thursday on your favorite podcast app. Selected Reading Cisco discloses data breach impacting Cisco.com user accounts (Bleeping Computer) SonicWall urges admins to disable SSLVPN amid rising attacks (Bleeping Computer) Antivirus vendors fail to spot persistent, nasty, stealthy Linux backdoor (The Register) Nvidia Triton Vulnerabilities Pose Big Risk to AI Models (SecurityWeek) Discord CDN Link Abused to Deliver RAT Disguised as OneDrive File (Hackread) Crypto ATMs fueling criminal activity, Treasury warns (The Record) AI company Perplexity is sneaking to get around blocks on crawlers, Cloudflare alleges (CyberScoop) Python-powered malware grabs 200K passwords, credit cards (The Register) Thai hospital fined 1.2 million baht for data breach via snack bags (DataBreaches.Net) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Learn how Ethical Hackers think Cisco's new Certificate in Ethical Hacking is designed to teach just that, combining offensive security techniques with immersive Capture the Flag challenges that help learners validate their knowledge in real-world scenarios. In this episode, Jozef Janitor, Product Manager with Cisco Networking Academy, joins Business Architecture Manager Garrett Marling and Cisco U. Product Manager Kate Dignan to discuss the Ethical Hacker program with Cisco Learning Network Community Manager Tanner Swift. Together, they break down how this certificate fits into a learner's cybersecurity journey, what to expect from Cisco U., and how hands-on challenges like Capture the Flag: Operation SMB Exploit can help prepare you for a career in offensive security. • Cisco Certificate in Ethical Hacking: https://www.netacad.com/courses/ethical-hacker?courseLang=en-US • Capture the Flag: Operation SMB Exploit: https://u.cisco.com/challenges/capture-flag-operation-smb-exploit-26593 • Cisco Learning Network: https://learningnetwork.cisco.com/s/certification/ethical-hacker
Ethical hacker Rachel Tobac joins us to answer a juicy question: How would she hack someone reasonably security savvy like Matt?
Hacker After Dark 8-4-25 by 1010 XL Jax Sports Radio
(August 04,2025)‘Quishing' scams dupe millions of Americans as hackers turn QR codes into traps. Las Vegas is down on its luck as tourism drops… why it's kind of California's fault. American consumers are getting thrifty again. How flying on a private jet became the #1 marker of real wealth.
At Black Hat USA 2025, Jennifer Granick—Surveillance and Cybersecurity Counsel at the American Civil Liberties Union—takes the keynote stage to make a bold case: we are long overdue for a new threat model, one that sees government surveillance not as a background risk, but as a primary threat to constitutional privacy.Granick draws from decades of experience defending hackers, fighting surveillance overreach, and engaging with the security community since DEFCON 3. She challenges the audience to reconsider outdated assumptions about how the Fourth Amendment is interpreted and applied. While technology has made it easier than ever for governments to collect data, the legal system hasn't kept pace—and in many cases, fails to recognize the sheer scope and sensitivity of personal information exposed through modern services.Her talk doesn't just raise alarm; it calls for action. Granick suggests that while legal reform is sluggish—stymied by a lack of political will and lobbying power—there's an urgent opportunity for the technical community to step up. From encryption to data minimization and anonymization, technologists have the tools to protect civil liberties even when the law falls short.The session promises to be a wake-up call for engineers, designers, policymakers, and privacy advocates. Granick wants attendees to leave not only more informed, but motivated to build systems that limit the unnecessary collection, retention, and exposure of personal data.Her keynote also surfaces a critical cultural shift: from the “Spot the Fed” days of DEFCON to a more nuanced understanding of government roles—welcoming collaboration where it serves the public good, but not at the expense of unchecked surveillance.This conversation reframes privacy as a design problem as much as a legal one—and one that requires collective effort to address. If the law can't fix it, the question becomes: will the technology community rise to the challenge?___________Guest:Jennifer Granick, Surveillance and Cybersecurity Counsel at American Civil Liberties Union | On LinkedIn: https://www.linkedin.com/in/jennifergranick/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesKeynote: Threat Modeling and Constitutional Law: https://www.blackhat.com/us-25/briefings/schedule/index.html#keynote-threat-modeling-and-constitutional-law-48276Learn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Stop leaving yourself vulnerable to data breaches. Go to my sponsor https://aura.com/matt to get a 14-day free trial and see if any of your data has been exposed Get 10% sitewide for a limited time. Just visit https://GhostBed.com/cox and use code COX at checkout. Ricoh Danielson, a cybersecurity incident responder recounts how unsecured devices and vulnerable networks—particularly in hospitals—are easily exploited by organized ransomware gangs that infiltrate systems through credential theft or phishing, often remain undetected for months, and then demand millions in ransom based on the value of stolen data. Ricoh's links https://www.ricohd.us/about https://www.instagram.com/ricoh_danielson_/?hl=en https://www.youtube.com/user/dricoh22/videos Do you want to be a guest? Fill out the form https://forms.gle/5H7FnhvMHKtUnq7k7 Send me an email here: insidetruecrime@gmail.com Do you extra clips and behind the scenes content? Subscribe to my Patreon: https://patreon.com/InsideTrueCrime Follow me on all socials! Instagram: https://www.instagram.com/insidetruecrime/ TikTok: https://www.tiktok.com/@matthewcoxtruecrime Do you want a custom painting done by me? Check out my Etsy Store: https://www.etsy.com/shop/coxpopart Listen to my True Crime Podcasts anywhere: https://anchor.fm/mattcox Check out my true crime books! Shark in the Housing Pool: https://www.amazon.com/dp/B0851KBYCF Bent: https://www.amazon.com/dp/B0BV4GC7TM It's Insanity: https://www.amazon.com/dp/B08KFYXKK8 Devil Exposed: https://www.amazon.com/dp/B08TH1WT5G Devil Exposed (The Abridgment): https://www.amazon.com/dp/1070682438 The Program: https://www.amazon.com/dp/B0858W4G3K Bailout: https://www.barnesandnoble.com/w/bailout-matthew-cox/1142275402 Dude, Where's My Hand-Grenade?: https://www.amazon.com/dp/B0BXNFHBDF/ref=tmm_pap_swatch_0?_encoding=UTF8&qid=1678623676&sr=1-1 Checkout my disturbingly twisted satiric novel! Stranger Danger: https://www.amazon.com/dp/B0BSWQP3WX If you would like to support me directly, I accept donations here: Paypal: https://www.paypal.me/MattCox69 Cashapp: $coxcon69 Learn more about your ad choices. Visit megaphone.fm/adchoices