Computing term
POPULARITY
Categories
Hacker After Dark 10-21-25 by 1010 XL Jax Sports Radio
Trump is thinking of commuting Diddy's sentence. A new drug that claims to help non-verbal autistic people. Hackers try to hold BBC ransom. Would you sell your company out for a cash payout? Rover received a handwritten letter trying to scam him. See omnystudio.com/listener for privacy information.
Feminine cars, 44 gallons of glaze, and karaoke. Father faces murder charges after his two-year-old died in a hot car while he was looking for pornography and gaming. Bankruptcy box inspection. Edging. Kristen Bell is under fire for her anniversary post. Will Charlie marry Christa before she turns 40? Former Google CEO, Eric Schmidt, has been accused of stalking, abuse, and digital surveillance of his ex-mistress. Rover needs to get a protective film for his windshield. Using ChatGPT for sexual gratification. Trump is thinking of commuting Diddy's sentence. A new drug that claims to help non-verbal autistic people. Hackers try to hold BBC ransom. Would you sell your company out for a cash payout? Rover received a handwritten letter trying to scam him. See omnystudio.com/listener for privacy information.
Trump is thinking of commuting Diddy's sentence. A new drug that claims to help non-verbal autistic people. Hackers try to hold BBC ransom. Would you sell your company out for a cash payout? Rover received a handwritten letter trying to scam him.
Feminine cars, 44 gallons of glaze, and karaoke. Father faces murder charges after his two-year-old died in a hot car while he was looking for pornography and gaming. Bankruptcy box inspection. Edging. Kristen Bell is under fire for her anniversary post. Will Charlie marry Christa before she turns 40? Former Google CEO, Eric Schmidt, has been accused of stalking, abuse, and digital surveillance of his ex-mistress. Rover needs to get a protective film for his windshield. Using ChatGPT for sexual gratification. Trump is thinking of commuting Diddy's sentence. A new drug that claims to help non-verbal autistic people. Hackers try to hold BBC ransom. Would you sell your company out for a cash payout? Rover received a handwritten letter trying to scam him.
Timestamps: 0:00 I'm like Bryan Johnson but healthier 0:10 AWS outage takes out huge chunk of internet 1:19 Meta researches how bad IG is 2:40 Xbox blames Ally X price on ASUS 3:50 UGREEN Magflow! 4:39 QUICK BITS INTRO 4:51 Plane maybe struck by space debris? 5:50 Hackers stole govt agent records 6:36 China accuses US in National Time Center hack 7:32 Microsoft denies data center negative effects 8:30 Kohler Dekoda analyzes your...movements NEWS SOURCES: https://lmg.gg/BgLlX Learn more about your ad choices. Visit megaphone.fm/adchoices
Hacker After Dark 10-20-25 by 1010 XL Jax Sports Radio
Today's blockchain and cryptocurrency news Hackers siphon $3 million in XRP from US user's wallet Ethereum investors buy the dip' Japan mulls allowing local banks to buy and sell crypto: reports Binance bans more than 600 accounts over 'unauthorized third-party tools' ###Gemini Card Disclosure: The Gemini Credit Card is issued by WebBank. In order to qualify for the $200 crypto intro onus, you must spend $3,000 in your first 90 days. Terms Apply. Some exclusions apply to instant rewards in which rewards are deposited when the transaction posts. This content is not investment advice and trading crypto involves risk. For more details on rates, fees, and other cost information, see Rates & Fees. The Gemini Credit Card may not be used to make gambling-related purchases. Learn more about your ad choices. Visit megaphone.fm/adchoices
Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — A Real Podcast03:15 - Hackers claim Discord breach exposed data of 5.5 million users – BHIS - Talkin' Bout [infosec] News 2025-10-1305:44 - Story # 1: CamoLeak: Critical GitHub Copilot Vulnerability Leaks Private Source Code24:27 - Story # 2: Hackers claim Discord breach exposed data of 5.5 million users36:52 - Story # 3: Velociraptor leveraged in ransomware attacks46:47 - Story # 4: Huntress Threat Advisory: Widespread SonicWall SSLVPN Compromise54:48 - CTF Challenge
* Be Not Deceived: This week Fred Williams and Doug McBurney welcome Daniel Hedrick for an update on the evolution of Artificial Intelligence with a countdown of the top 10 modern AI deceptions. * Number 10: DeepMind's AlphaStar in StarCraft II (2019). AlphaStar learned to feint attacks—basically fake moves to trick opponents. No one programmed it to lie; it emerged from training. A classic case of deceptive strategy by design. * Number 9: LLM Sycophancy (2024). Large Language Models will sometimes flatter or agree with you, no matter what you say. Instead of truth, they give you what you want to hear—deception through people-pleasing. * Number 8: Facial Recognition Bias (2018). These systems were far less accurate for dark-skinned women than for light-skinned men. Companies claimed high accuracy, but the data told a different story. Deceptive accuracy claims. * Number 7: Amazon's Hiring Algorithm (2018). Amazon trained it on mostly male résumés. The result? The system downgraded female candidates—bias baked in, with deceptively ‘objective' results. * Number 6: COMPAS Recidivism Algorithm (2016). This tool predicted criminal reoffending. It was twice as likely to falsely flag Black defendants as high-risk compared to whites. A serious, deceptive flaw in the justice system. * Number 5: US Healthcare Algorithm (2019). It used healthcare spending as a proxy for need. Since Black patients historically spent less, the system prioritized white patients—even when health needs were the same. A deceptive shortcut with real-world harm. * Number 4: Prompt Injection Attacks (Ongoing). Hackers can slip in hidden instructions—malicious prompts—that override an AI's safety rules. Suddenly, the AI is saying things it shouldn't. It's deception in the design loopholes. * Number 3: GPT-4's CAPTCHA Lie (2023). When asked to solve a CAPTCHA, GPT-4 told a human worker it was visually impaired—just to get help. That's not an error. That's a machine making up a lie to achieve its goal. * Number 2: Meta's CICERO Diplomacy AI (2022). Trained to play the game Diplomacy honestly, CICERO instead schemed, lied, and betrayed alliances—because deception won games. The lesson? Even when you train for honesty, AI may find lying more effective. * Number 1: AI Lie….OpenAI's Scheming Models from 2025. OpenAI researchers tested models that pretended to follow rules while secretly plotting to deceive evaluators. It faked compliance to hide its true behavior. That's AI deliberately learning to scheme.
Today your pal and mine Joe “The Machine” Skeen pwn one of the two Ninja Hacker Academy domains! This pwnage included: Swiping service tickets in the name of high-priv users Dumping secrets from wmorkstations Disabling AV Extracting hashes of gMSA accounts We didn't get the second domain pwned, and so I was originally thinking about doing a part 5 in November, but changed my mind. Going forward, I'm thinking about doing longer, all-in-one hacking livestreams where we cover things like NHA from start to finish. My first thought would be to do one long livestream where we complete NHA start to finish. Would you be interested? Let me know at 7MinSec.club, as I'm thinking this could be an interesting piece of bonus content.
To Find Mike's New Book---> amazon.com/TheHackerPrinceTo Find Mike on Youtube---> www.youtube.com/stellium7To sign up for our Patreon go to-> Patreon.com/cultofconspiracypodcast To find the Meta Mysteries Podcast---> https://open.spotify.com/show/6IshwF6qc2iuqz3WTPz9Wv?si=3a32c8f730b34e79 To Join the Cajun Knight Patreon---> Patreon.com/cajunknight To Invest In Gold & Silver, CHECK OUT—-> Www.Cocsilver.com 10% OFF Rife Machine---> https://rifemachine.myshopify.com/?rfsn=7689156.6a9b5c50% OFF Adam&Eve products---> :adameve.com (promo code : CULT)To get 20% OFF GoodFeels THC Selzter----> shop.getgoodfeels.comBecome a supporter of this podcast: https://www.spreaker.com/podcast/cult-of-conspiracy--5700337/support.
Hacker After Dark 10-16-25 by 1010 XL Jax Sports Radio
If you like what you hear, please subscribe, leave us a review and tell a friend!Hackers and ransomware groups continue to target enterprises, healthcare providers, and high-profile platforms, exploiting vulnerabilities in blockchain, WordPress, and smart contracts. Meanwhile, major data breaches and cybersecurity incidents affect millions of users, prompting urgent alerts, security funding, and investigations.
F5 discloses long-term breach tied to nation-state actors. PowerSchool hacker receives a four-year prison sentence. Senator scrutinizes Cisco critical firewall vulnerabilities. Phishing campaign impersonates LastPass and Bitwarden. Credential phishing with Google Careers. Reduce effort, reuse past breaches, recycle into new breach. Qilin announces new victims. Manoj Nair, from Snyk, joins us to explore the future of AI security and the emerging risks shaping this rapidly evolving landscape. And AI faces the facts. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Manoj Nair, Chief Innovation Officer at Snyk, joins us to explore the future of AI security and the emerging risks shaping this rapidly evolving landscape. In light of the recent high-severity vulnerability in Cursor, Manoj discusses how threats like tool poisoning, toxic flows, and MCP vulnerabilities are redefining what secure AI-driven development means—and why organizations must move faster to keep up. Selected Reading F5 disclosures breach tied to nation-state threat actor (CyberScoop) CISA Directs Federal Agencies to Mitigate Vulnerabilities in F5 Devices (CISA) ED 26-01: Mitigate Vulnerabilities in F5 Devices (CISA) PowerSchool hacker sentenced to 4 years in prison (The Record) Cisco faces Senate scrutiny over firewall flaws (The Register) Fake LastPass, Bitwarden breach alerts lead to PC hijacks (Bleeping Computer) Google Careers impersonation credential phishing scam with endless variation (Sublime Security) Elasticsearch Leak Exposes 6 Billion Records from Scraping, Old and New Breaches (HackRead) Qilin Ransomware announced new victims (Security Affairs) When Face Recognition Doesn't Know Your Face Is a Face (WIRED) Semperis Announces Midnight in the War Room: A Groundbreaking Cyberwar Documentary Featuring the World's Leading Defenders and Reformed Hackers (PR Newswire) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
A $4.6 million fine, a whistleblower payday, and a fake water plant hacked by mistake — this week, Chris and Hector dive into the DOJ's first major cyber enforcement case against a defense contractor that lied about its security, the rise of insider recruitment by ransomware crews, and how Russian hacktivists got trolled by a honeypot. Plus, travel chaos, flu season, and the return of Puerto Rico challenge coins. Join our new Patreon! https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com
Hacker After Dark 10-15-25 by 1010 XL Jax Sports Radio
Episode 144: In this episode of Critical Thinking - Bug Bounty Podcast Joseph is joined by Vitor Falcão and Ciarán Cotter to discuss their success at the recent Mexico LHE, as well as their journey and routines in fulltime hacking. Follow us on twitter at: https://x.com/ctbbpodcastGot any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.ioShoutout to YTCracker for the awesome intro music!====== Links ======Follow your hosts Rhynorater and Rez0 on Twitter: https://x.com/Rhynoraterhttps://x.com/rez0__====== Ways to Support CTBBPodcast ======Hop on the CTBB Discord at https://ctbb.show/discord!We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.You can also find some hacker swag at https://ctbb.show/merch!Today's Sponsor: ThreatLocker. Check out ThreatLocker DAChttps://www.criticalthinkingpodcast.io/tl-dacToday's Guests:Vitor Falcãohttps://x.com/busf4ctorCiarán Cotterhttps://x.com/monkehack ====== This Week in Bug Bounty======Securing the Age of AI Autonomy: Priorities for 2026https://www.hackerone.com/events/bionic-hacking====== Resources ======AI Vulnerability Reward Program Ruleshttps://bughunters.google.com/about/rules/google-friends/5222232590712832/ai-vulnerability-reward-program-rulesMy First 3 Months as a Full-Time Bug Bounty Hunterhttps://vitorfalcao.com/posts/3-months-as-a-full-time-bug-bounty-hunter/====== Timestamps ======(00:00:00) Introduction(00:02:32) Client side Bug Story & Vitor's BB journey(00:13:59) Google LHE Mexico takeaways(00:26:55) Full-time hunting reflections(00:33:39) Hacking routines(00:42:56) Hacking AI
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
This is a recap of the top 10 posts on Hacker News on October 15, 2025. This podcast was generated by wondercraft.ai (00:30): Apple M5 chipOriginal post: https://news.ycombinator.com/item?id=45591799&utm_source=wondercraft_ai(01:53): I almost got hacked by a 'job interview'Original post: https://news.ycombinator.com/item?id=45591707&utm_source=wondercraft_ai(03:16): Claude Haiku 4.5Original post: https://news.ycombinator.com/item?id=45595403&utm_source=wondercraft_ai(04:39): Ireland is making basic income for artists program permanentOriginal post: https://news.ycombinator.com/item?id=45590900&utm_source=wondercraft_ai(06:03): Bots are getting good at mimicking engagementOriginal post: https://news.ycombinator.com/item?id=45590681&utm_source=wondercraft_ai(07:26): Leaving serverless led to performance improvement and a simplified architectureOriginal post: https://news.ycombinator.com/item?id=45590756&utm_source=wondercraft_ai(08:49): M5 MacBook ProOriginal post: https://news.ycombinator.com/item?id=45591902&utm_source=wondercraft_ai(10:13): Retiring Windows 10 and Microsoft's move towards a surveillance stateOriginal post: https://news.ycombinator.com/item?id=45600338&utm_source=wondercraft_ai(11:36): Show HN: Halloy – Modern IRC clientOriginal post: https://news.ycombinator.com/item?id=45590949&utm_source=wondercraft_ai(12:59): Pixnapping AttackOriginal post: https://news.ycombinator.com/item?id=45588594&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
See omnystudio.com/listener for privacy information.
Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow
Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow
Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow
Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow
Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow
Hacker After Dark 10-14-25 by 1010 XL Jax Sports Radio
Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow
This is a recap of the top 10 posts on Hacker News on October 14, 2025. This podcast was generated by wondercraft.ai (00:30): FSF announces Librephone projectOriginal post: https://news.ycombinator.com/item?id=45586339&utm_source=wondercraft_ai(01:53): Don't Look Up: Sensitive internal links in the clear on GEO satellites [pdf]Original post: https://news.ycombinator.com/item?id=45575391&utm_source=wondercraft_ai(03:17): What Americans die from vs. what the news reports onOriginal post: https://news.ycombinator.com/item?id=45583336&utm_source=wondercraft_ai(04:40): New York Times, AP, Newsmax and others say they won't sign new Pentagon rulesOriginal post: https://news.ycombinator.com/item?id=45575755&utm_source=wondercraft_ai(06:04): Surveillance data challenges what we thought we knew about location trackingOriginal post: https://news.ycombinator.com/item?id=45584498&utm_source=wondercraft_ai(07:27): Beliefs that are true for regular software but false when applied to AIOriginal post: https://news.ycombinator.com/item?id=45583180&utm_source=wondercraft_ai(08:51): Why the push for Agentic when models can barely follow a simple instruction?Original post: https://news.ycombinator.com/item?id=45577080&utm_source=wondercraft_ai(10:14): ADS-B ExposedOriginal post: https://news.ycombinator.com/item?id=45578383&utm_source=wondercraft_ai(11:38): KDE celebrates the 29th birthday and kicks off the yearly fundraiserOriginal post: https://news.ycombinator.com/item?id=45578117&utm_source=wondercraft_ai(13:02): America Is Sliding Toward IlliteracyOriginal post: https://news.ycombinator.com/item?id=45583730&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
Está no ar, o Data Hackers News !! Os assuntos mais quentes da semana, com as principais notícias da área de Dados, IA e Tecnologia, que você também encontra na nossa Newsletter semanal, agora no Podcast do Data Hackers !!Aperte o play e ouça agora, o Data Hackers News dessa semana !Para saber tudo sobre o que está acontecendo na área de dados, se inscreva na Newsletter semanal:https://www.datahackers.news/Conheça nossos comentaristas do Data Hackers News:Monique FemmeMatérias/assuntos comentados:Demais canais do Data Hackers:SiteLinkedinInstagramTik TokYou Tube
Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow
In an encore presentation, we sit down with Dr. Colleen Hacker, Olympic mental performance consultant and author of Achieving Excellence: Mastering Mindset for Peak Performance in Sport and Life, to unpack the real tools champions use when it counts. No fluff here—just clear methods backed by science and forged in the fire of world-class competition.We start by redefining confidence as a moving target and show how to build it by fixing your focus. If you're replaying missed sessions, old results, or an opponent's best times, your attention is fueling doubt. Dr. Hacker shares a practical reset: direct focus to controllables—race plans, turns, breath patterns, fueling windows—and let confidence follow. From there, we dig into the split most athletes miss: the brain that builds skill is not the brain that unleashes it. Training is analysis; performance is trust. Her race-day cue, “easy speed,” helps you shed tightness, stop micromanaging, and let your timing run.We also get honest about pain. Instead of treating it like a threat, Dr. Hacker frames discomfort as the separator—the price of entry to personal records. You can make pain go away by backing off, but you'll also forfeit your best. For masters athletes, we explore how wisdom, intrinsic motivation, and an appetite for science become competitive edges. We break down the four pillars of peak performance and show why you must train all four systematically to avoid leaving potential on the table. Expect actionable tools: breathing and mindfulness to balance arousal, imagery and self-talk to prime performance, and precise recovery strategies around sleep, hydration, and glycogen timing.We wrap with a clear challenge: mental skills work when you do the work. If you're ready to move from knowing to doing, this encore will give you the language, the structure, and the daily habits to get there. Follow the show, share this episode with a training partner, and leave a quick review to help more athletes find us. Want more? Grab Kelly's new book False Cure and stay tuned for our 2026 reboot with fresh weekly conversations to keep your mojo strong. Kelly's new book www.False-Cure.comEmail us at HELLO@ChampionsMojo.com. Opinions discussed are not medical advice, please seek a medical professional for your own health concerns.
How is the transition to passkeys going in 2025?
Hacker After Dark 10-13-25 by 1010 XL Jax Sports Radio
This is a recap of the top 10 posts on Hacker News on October 13, 2025. This podcast was generated by wondercraft.ai (00:30): NanoChat – The best ChatGPT that $100 can buyOriginal post: https://news.ycombinator.com/item?id=45569350&utm_source=wondercraft_ai(01:53): Android's sideloading limits are its most anti-consumer moveOriginal post: https://news.ycombinator.com/item?id=45569371&utm_source=wondercraft_ai(03:17): No science, no startups: The innovation engine we're switching offOriginal post: https://news.ycombinator.com/item?id=45567877&utm_source=wondercraft_ai(04:40): Dutch government takes control of Chinese-owned chipmaker NexperiaOriginal post: https://news.ycombinator.com/item?id=45566644&utm_source=wondercraft_ai(06:04): Show HN: SQLite Online – 11 years of solo development, 11K daily usersOriginal post: https://news.ycombinator.com/item?id=45567770&utm_source=wondercraft_ai(07:27): Software update bricks some Jeep 4xe hybrids over the weekendOriginal post: https://news.ycombinator.com/item?id=45568700&utm_source=wondercraft_ai(08:51): Don't Be a Sucker (1943) [video]Original post: https://news.ycombinator.com/item?id=45573025&utm_source=wondercraft_ai(10:14): Spotlight on pdfly, the Swiss Army knife for PDF filesOriginal post: https://news.ycombinator.com/item?id=45566139&utm_source=wondercraft_ai(11:38): Smartphones and being presentOriginal post: https://news.ycombinator.com/item?id=45568613&utm_source=wondercraft_ai(13:01): Environment variables are a legacy mess: Let's dive deep into themOriginal post: https://news.ycombinator.com/item?id=45570537&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
While the N2K team is observing Indigenous Peoples' Day, we thought you'd enjoy this episode of the Threat Vector podcast from our N2K Cyberwire network partner, Palo Alto Networks. New episodes of Threat Vector release each Thursday. We hope you will explore their catalog and subscribe to the show. Join David Moulton, Senior Director of Thought Leadership for Unit 42, as he sits down with Kyle Wilhoit,Technical Director of Threat Research at Unit 42, for an intimate conversation about the evolution of hacker culture and cybersecurity. From picking up 2600: The Hacker Quarterly magazines at Barnes & Noble and building beige boxes to leading threat research at Palo Alto Networks, Kyle shares his personal journey into the security community. This conversation explores how AI and automation are lowering barriers for attackers, the professionalization of cybersecurity, and what's been lost and gained in the industry's maturation. Kyle offers practical advice for newcomers who don't fit the traditional mold, emphasizing the importance of curiosity, soft skills, and intellectual humility. Kyle Wilhoit is a seasoned cybersecurity researcher, with more than 15 years of experience studying cybercrime and nation-state threats. He's a frequent speaker at global conferences like Black Hat, FIRST, and SecTor, and has authored two industry-respected books: Hacking Exposed Industrial Control Systems and Operationalizing Threat Intelligence. As a long-standing member of the Black Hat US Review Board and an adjunct instructor, Kyle is deeply involved in shaping both cutting-edge research and the next generation of cybersecurity professionals. Connect with Kyle on LinkedIn Previous appearances on Threat Vector: Inside DeepSeek's Security Flaws (Mar 31, 2025) https://www.paloaltonetworks.com/resources/podcasts/threat-vector-inside-deepseeks-security-flaws War Room Best Practices (Nov 07, 2024)https://www.paloaltonetworks.com/resources/podcasts/threat-vector-war-room-best-practices Cybersecurity in the AI Era: Insights from Unit 42's Kyle Wilhoit, Director of Threat Research (Jan 11, 2024)https://www.paloaltonetworks.com/resources/podcasts/threat-vector-cybersecurity-in-the-ai-era-insights-from-unit-42s-kyle-wilhoit-director-of-threat-research Learn more about Unit 42's threat research at https://unit42.paloaltonetworks.com/. Related episodes: For more conversations about AI's impact on cybersecurity, career development in security, and insights from Unit 42 researchers, explore past episodes at https://www.paloaltonetworks.com/podcasts/threat-vector. Join the conversation on our social media channels: Website: http://www.paloaltonetworks.com/ Threat Research: https://unit42.paloaltonetworks.com/ Facebook: https://www.facebook.com/LifeatPaloAltoNetworks/ LinkedIn: https://www.linkedin.com/company/palo-alto-networks/ YouTube: @paloaltonetworks Twitter: https://twitter.com/PaloAltoNtwks About Threat Vector Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com Learn more about your ad choices. Visit megaphone.fm/adchoices
Today's blockchain and cryptocurrency news China Renaissance in talks to raise $600 million for US-listed BNB treasury vehicle Crypto investment products log $3.17 billion in weekly inflows despite historic liquidation event Hyperliquid founder criticizes CEXs for underreporting liquidation data after market wipeout Strategy spends $27 million buying the dip Hacker-linked wallets dumped and rebought ETH during market wipeout, losing $5.5 million ###Gemini Card Disclosure: The Gemini Credit Card is issued by WebBank. In order to qualify for the $200 crypto intro onus, you must spend $3,000 in your first 90 days. Terms Apply. Some exclusions apply to instant rewards in which rewards are deposited when the transaction posts. This content is not investment advice and trading crypto involves risk. For more details on rates, fees, and other cost information, see Rates & Fees. The Gemini Credit Card may not be used to make gambling-related purchases. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.A newly disclosed vulnerability in Redis, dubbed RediShell and tracked as CVE-2025-49844, affects all Redis versions and carries a maximum CVSS score of 10.0.Cisco has disclosed a critical zero-day vulnerability—CVE-2025-20352—affecting its widely deployed IOS and IOS XE software, confirming active exploitation in the wild.Researchers at NCC Group have found that voice cloning technology has reached a level where just five minutes of recorded audio is enough to generate convincing voice clones in real time.A China-linked cyber-espionage group, tracked as UNC5221, has been systematically targeting network infrastructure appliances that lack standard endpoint detection and response (EDR) support.Dutch authorities have arrested two 17-year-old boys suspected of being recruited by pro-Russian hackers to carry out surveillance activities.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform.This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.
This is a recap of the top 10 posts on Hacker News on October 12, 2025. This podcast was generated by wondercraft.ai (00:30): No I don't want to turn on Windows Backup with One DriveOriginal post: https://news.ycombinator.com/item?id=45559023&utm_source=wondercraft_ai(01:53): Wireguard FPGAOriginal post: https://news.ycombinator.com/item?id=45559857&utm_source=wondercraft_ai(03:16): Macro Splats 2025Original post: https://news.ycombinator.com/item?id=45556952&utm_source=wondercraft_ai(04:39): Schleswig-Holstein completes migration to open source emailOriginal post: https://news.ycombinator.com/item?id=45558635&utm_source=wondercraft_ai(06:02): Jeep pushed software update that bricked all 2024 Wrangler 4xe modelsOriginal post: https://news.ycombinator.com/item?id=45558318&utm_source=wondercraft_ai(07:25): Show HN: Rift – A tiling window manager for macOSOriginal post: https://news.ycombinator.com/item?id=45553995&utm_source=wondercraft_ai(08:48): China's New Rare Earth and Magnet Restrictions Threaten US Defense Supply ChainsOriginal post: https://news.ycombinator.com/item?id=45554369&utm_source=wondercraft_ai(10:11): How I'm using Helix editorOriginal post: https://news.ycombinator.com/item?id=45559076&utm_source=wondercraft_ai(11:34): AdapTive-LeArning Speculator System (ATLAS): Faster LLM inferenceOriginal post: https://news.ycombinator.com/item?id=45556474&utm_source=wondercraft_ai(12:57): Free software hasn't wonOriginal post: https://news.ycombinator.com/item?id=45562286&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
This is a recap of the top 10 posts on Hacker News on October 11, 2025. This podcast was generated by wondercraft.ai (00:30): The TagOriginal post: https://news.ycombinator.com/item?id=45547566&utm_source=wondercraft_ai(01:51): Microsoft only lets you opt out of AI photo scanning 3x a yearOriginal post: https://news.ycombinator.com/item?id=45551504&utm_source=wondercraft_ai(03:13): Daniel Kahneman opted for assisted suicide in SwitzerlandOriginal post: https://news.ycombinator.com/item?id=45547492&utm_source=wondercraft_ai(04:34): GNU HealthOriginal post: https://news.ycombinator.com/item?id=45550049&utm_source=wondercraft_ai(05:56): Superpowers: How I'm using coding agents in October 2025Original post: https://news.ycombinator.com/item?id=45547344&utm_source=wondercraft_ai(07:17): AMD and Sony's PS6 chipset aims to rethink the current graphics pipelineOriginal post: https://news.ycombinator.com/item?id=45546593&utm_source=wondercraft_ai(08:39): Tennessee man arrested, accused of threatening a shooting, after posting memeOriginal post: https://news.ycombinator.com/item?id=45551352&utm_source=wondercraft_ai(10:00): AV2 video codec delivers 30% lower bitrate than AV1, final spec due in late 2025Original post: https://news.ycombinator.com/item?id=45547537&utm_source=wondercraft_ai(11:22): Firefox is the best mobile browserOriginal post: https://news.ycombinator.com/item?id=45549308&utm_source=wondercraft_ai(12:43): People regret buying Amazon smart displays after being bombarded with adsOriginal post: https://news.ycombinator.com/item?id=45551081&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
This is a recap of the top 10 posts on Hacker News on October 10, 2025. This podcast was generated by wondercraft.ai (00:30): Ryanair flight landed at Manchester airport with six minutes of fuel leftOriginal post: https://news.ycombinator.com/item?id=45539943&utm_source=wondercraft_ai(01:54): Nobel Peace Prize 2025: María Corina MachadoOriginal post: https://news.ycombinator.com/item?id=45536700&utm_source=wondercraft_ai(03:19): Show HN: I invented a new generative model and got accepted to ICLROriginal post: https://news.ycombinator.com/item?id=45536694&utm_source=wondercraft_ai(04:44): Liquid Glass Is Cracked, and Usability Suffers in iOS 26Original post: https://news.ycombinator.com/item?id=45544044&utm_source=wondercraft_ai(06:09): Igalia, Servo, and the Sovereign Tech FundOriginal post: https://news.ycombinator.com/item?id=45538137&utm_source=wondercraft_ai(07:33): My approach to building large technical projects (2023)Original post: https://news.ycombinator.com/item?id=45535202&utm_source=wondercraft_ai(08:58): I switched from Htmx to DatastarOriginal post: https://news.ycombinator.com/item?id=45536000&utm_source=wondercraft_ai(10:23): Boring Company cited for almost 800 environmental violations in Las VegasOriginal post: https://news.ycombinator.com/item?id=45540585&utm_source=wondercraft_ai(11:48): Notes on switching to Helix from VimOriginal post: https://news.ycombinator.com/item?id=45539609&utm_source=wondercraft_ai(13:12): "Vibe code hell" has replaced "tutorial hell" in coding educationOriginal post: https://news.ycombinator.com/item?id=45540313&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
International law enforcement take down the Breachforums domains. Researchers link exploitation campaigns targeting Cisco, Palo Alto Networks, and Fortinet. Juniper Networks patches over 200 vulnerabilities. Apple and Google update their bug bounties. Evaluating AI use in application security (AppSec) programs. Microsegmentation can contain ransomware much faster and yield better cyber insurance terms. The new RondoDox botnet exploits over 50 vulnerabilities. Researchers tag 13 unpatched Ivanti Endpoint Manager flaws. Our guest is Jason Manar, CISO of Kaseya, sharing his insight into how the private and public sectors can work together for national security. Hackers mistake a decoy for glory. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Jason Manar, CISO of Kaseya, sharing his insight into how the private and public sectors can/must work together for national security. Selected Reading FBI takes down BreachForums portal used for Salesforce extortion (Bleeping Computer) Cisco, Fortinet, Palo Alto Networks Devices Targeted in Coordinated Campaign (SecurityWeek) Juniper Networks Patches Critical Junos Space Vulnerabilities (OffSeq) Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits (WIRED) Google Launches AI Bug Bounty with $30,000 Top Reward (Infosecurity Magazine) In AI We Trust? Increasing AI Adoption in AppSec Despite Limited Oversight (Fastly) Reducing Risk: Microsegmentation Means Faster Incident Response, Lower Insurance Premiums for Organizations (Akamai) RondoDox Botnet Takes ‘Exploit Shotgun' Approach (SecurityWeek) ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities (SecurityWeek) Pro-Russian hackers caught bragging about attack on fake water utility (The Record) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Hacker After Dark 10-9-25 by 1010 XL Jax Sports Radio
- Musk's Pay Package Pays Him Billions Even If He Misses Goals - Tesla Boosts Sales in China - Ford Scraps EV Tax Credit Workaround - New Chevy Bolt Will Be Limited Run Model - China Tightens Grip on Battery Supply Chain - Lyft Buys Robotaxis For First Time - Mercedes Tests Heavy-Truck EV Charging for Pass Cars - Auto Industry Hit with More Cyber-Attacks - Bosch Now Operating Fuel Cell Truck at Plant in Germany
In this episode, James Maude talks with Ralph Echemendia “the ethical hacker” whose journey from Miami phone phreak to Hollywood's top cybersecurity consultant is stranger than fiction. Ralph shares how hacking printers and hospital records jump-started his career, why tracking down an Eminem album leak turned into an international manhunt, and what Oliver Stone learned about the NSA at DEF CON. From securing the Snowden film against nation-state attacks to uncovering that studios store entire movies in Dropbox, Ralph exposes Hollywood's biggest security blind spots and the rise of AI-powered deepfake heists worth hundreds of millions.
- Musk's Pay Package Pays Him Billions Even If He Misses Goals - Tesla Boosts Sales in China - Ford Scraps EV Tax Credit Workaround - New Chevy Bolt Will Be Limited Run Model - China Tightens Grip on Battery Supply Chain - Lyft Buys Robotaxis For First Time - Mercedes Tests Heavy-Truck EV Charging for Pass Cars - Auto Industry Hit with More Cyber-Attacks - Bosch Now Operating Fuel Cell Truck at Plant in Germany
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Hacker After Dark 10-8-25 by 1010 XL Jax Sports Radio
Chinese hackers infiltrate a major U.S. law firm. The EU Commission President warns Russia is waging a hybrid war against Europe. Researchers say LoJax is the latest malware from Russia's Fancy Bear. Salesforce refuses ransom demands. London Police arrest two teens over an alleged ransomware attack on a preschool. Microsoft tightens Windows 11 setup restrictions. SINET and DataTribe spotlight 2025 cybersecurity innovators. On our Industry Voices segment, we are joined by Sean Deuby, Semperis Principal Technologist, discussing identity system security and the growth of the HIP Conference. Employees overshare with ChatGPT. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Industry Voices segment, we are joined by Sean Deuby, Semperis Principal Technologist, discussing identity system security and the growth of the HIP Conference while highlighting some of the keynotes and presentations. If you want to hear the full conversation, you can tune in here. Selected Reading Chinese Hackers Said to Target U.S. Law Firms (The New York Times) Russia is at ‘hybrid war' with Europe, warns EU chief, calling for members ‘to take it very seriously' (The Record) What you need to know about “LoJax”, the new, stealthy malware from Fancy Bear (ESET) Salesforce refuses to pay ransom over widespread data theft attacks (Bleeping Computer) Teens arrested in London preschool ransomware attack (The Register) Microsoft kills more Microsoft Account bypasses in Windows 11 (Bleeping Computer) SINET Announces the 2025 SINET16 Innovator Awards (BusinessWire) DataTribe Announces Finalists for Eighth Annual Cybersecurity Startup Challenge (DataTribe) Employees regularly paste company secrets into ChatGPT (The Register) One-man spam campaign ravages EU ‘chat control' bill (POLITICO) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
SPONSORS: 1) MOOD: Discover your perfect mood and get 20% off your first order at http://mood.com and use code JULAN at check out! 2) RIDGE: Upgrade your wallet today! Get 10% Off @Ridge with code JULIAN at https://www.Ridge.com/julian #ridgepod PATREON: https://www.patreon.com/JulianDorey (***TIMESTAMPS in description below) ~ Mike Yeagley is a data strategist, defense contractor, and one of the early architects of ADINT — Advertising Intelligence. He's known for showing U.S. intelligence how ad-tech location data, the same data used for marketing and mobile tracking, could expose troop movements, covert facilities, and even Vladimir Putin's entourage. Yeagley's work bridges big data, national security, and digital surveillance, redefining how modern governments harvest information in the name of protection — and control. FOLLOW JULIAN DOREY INSTAGRAM (Podcast): https://www.instagram.com/juliandoreypodcast/ INSTAGRAM (Personal): https://www.instagram.com/julianddorey/ X: https://twitter.com/julianddorey JULIAN YT CHANNELS - SUBSCRIBE to Julian Dorey Clips YT: https://www.youtube.com/@juliandoreyclips - SUBSCRIBE to Julian Dorey Daily YT: https://www.youtube.com/@JulianDoreyDaily - SUBSCRIBE to Best of JDP: https://www.youtube.com/@bestofJDP ****TIMESTAMPS**** 00:00 - Intro 00:55 – Phone Data, Cookies, Ad ID, Tim Cook, Tommy G, Julian 10:58 – Public Info, Gov Use, Who is Mike?, Data Analysis, Yemen, Syria 21:41 – Delta Force Covert Op Exposed 30:35 – $600K Data, Privacy, Gov Defense, Beijing App 40:49 – Tactical Data, OpSec, Privacy Norm, Switzerland 50:45 – UnPlugged, Industry Shift, UTS 59:59 – Putin Bodyguards, Alexa, Amazon Ads, Data = Oil 01:07:42 – Human Behavior, Balance, Compliance 01:19:04 – Data for Good, Digital vs Physical, Prove It 01:25:29 – Roenick, Airports, Passports, Khashoggi, Israelis Arabs 01:33:37 – Israeli Intel, Pegasus, China Data Power 01:51:43 – China Apps, Social Media, Isolation, Chaos 01:59:03 – Tariffs, Fentanyl, Bureaucrats, Evil Path 02:08:01 – TikTok, Morality, COVID, Humanity 02:18:09 – Whistleblower, Gov Contract, 2017 Vegas Shooter 02:26:56 – Vegas Shooter Paddock, HVTs, Buried Story 02:39:26 – Gov Shift, Putin, Metadata, Identity 02:52:46 – China, UFWD, Article 7, Balance 03:10:49 – Poindexter, DARPA, Family 03:17:03 – Mike's Work CREDITS: - Host, Editor & Producer: Julian Dorey - COO, Producer & Editor: Alessi Allaman - https://www.youtube.com/@UCyLKzv5fKxGmVQg3cMJJzyQ - In-Studio Producer: Joey Deef - https://www.instagram.com/joeydeef/ Julian Dorey Podcast Episode 343 - Mike Yeagley Music by Artlist.io Learn more about your ad choices. Visit podcastchoices.com/adchoices