Subculture of individuals
POPULARITY
Timestamps: 0:00 quick li'l scream here one sec 0:07 Win11 26H1 for Snapdragon X2 only 2:20 Meta, Google addiction trial 5:53 QUICK BITS INTRO 6:05 Discord clarifies age verification 7:15 Google updates 'Results About You' 7:58 Threads 'Dear Algo' feature 8:49 Hacktivist breaches stalkerware 9:47 MrBeast buys finance app NEWS SOURCES: https://lmg.gg/Ejony Learn more about your ad choices. Visit megaphone.fm/adchoices
Lingering cold has many a podcast host needing a week off, but Rob Long and Steve Hayward reconvene to enjoy some juicy stories and just desserts: The "Democracy Dies in Darkness" crowd got cut up in broad daylight, Jeffrey Epstein's pals are paying their due for dealing with the devil, and a $2 million verdict was awarded to a minor in a suit against the medical professionals who deformed her.
Lingering cold has many a podcast host needing a week off, but Rob Long and Steve Hayward reconvene to enjoy some juicy stories and just desserts: The “Democracy Dies in Darkness” crowd got cut up in broad daylight, Jeffrey Epstein's pals are paying for their dealings with the devil, and a $2 million verdict was […]
Higinio Ochoa is a a former hacktivist turned seasoned cybersecurity professional with 20 years of experience in tech. Also known as w0rmer, Higinio was arrested by the US Federal Bureau of Investigation in 2012 and ultimately served two years in federal prison for hacking due to his association with the hacker group CabinCr3w, part of Anonymous. Today, is a member of the white-hat hacker group Sakura Samurai. In this episode, Ochoa joins host Heather Engel to discuss his experience, including the transition from being a high-profile target of the FBI to a white-hat professional, the culture of hacktivism, and more. • For more on cybersecurity, visit us at https://cybersecurityventures.com.
Season 20, Episode 12 of The Adventures of Pipeman.Chapter 1:KID BOOKIE - Rose McGowan (feat. Rose McGowan) released on 20th Jan * (early hrs of Tuesday morning)Rose has said…. "I chose Kid Bookie because the moment I heard him, I knew our collaboration would be electric. His DM to me in 2024 was direct and real, but hearing the track sealed it. His ability to go from melody to a full-throttle roar over a propulsive beat had purpose and fire. After years of silence, I arrived in South London with no lyrics and no idea if creativity was still in me. In the studio, I tore a page from an engineer's manual and wrote my first lyrics in six years. Bookie called it Rose McGowan ft. Rose McGowan. And it was an honor that he named the track after the essence of me before I'd even written a word. Bookie reached across an ocean. I reached back. The rest is this track; this cultural moment. I hope it resonates with all needing a release with a dose of ascension. I'm mad for it”.Kid BookieTwo-time MOBO AWARD nominated alternative artist & Heavy Music Awards nominated (Best Breakthrough Live Artist) artist.Kid Bookie has carved out a unique lane in the UK music scene through a blend of genre-bending ambition and high-profile collaborations.Bookie has earnt recognition across both rap and rock circles, highlighted by his acclaimed feature on Hacktivist's “Armoured Core” and his collaboration “Game” with Slipknot's Corey Taylor.Rose McGowanPlayed Tatum Riley in the horror classic Scream but arguably best known for playing Paige Matthews on Charmed.Time magazine named her one of the “Silence Breakers” (Person of the Year) in 2017.Published a memoir called Brave (2018), where she talks about her life, trauma, and work. - Rose is both a pop culture figure (through acting) and a social voice: her speaking out on abuse and power. Her work spans many mediums: acting, writing, music, and art.Her life story is compelling: from a very unconventional childhood to Hollywood success and then activism.Chapter 2:Ryan Roxie Guests on Rocky's Rock and Roll Symphony; New Song & Video Premiere on YouTubeFight Another Day the brand-new single and official videoRyan Roxie, longtime guitarist for rock legend Alice Cooper, was the featured guest on Rocky's Rock and Roll Symphony, which aired on Christmas Day on the Music From The 412 platform and is now available On Demand via https://musicfromthe412.com/ryan-roxie/ and Roku.Recorded on the eve of Alice Cooper and Judas Priest's Pittsburgh concert, the intimate appearance featured an acoustic performance, audience Q&A, and meet-and-greet. Roxie performed selections from his solo catalog including “Second Chances,” “When You See God,” “The Risk,” “36 Hours,” and “The Question,” while sharing personal stories and insights into his career.Known for his deep connection with fans, Roxie often bypasses backstage downtime in favor of spontaneous meet-and-greets, record store visits, and impromptu performances—what he affectionately calls the “Rock 'n' Roll Parking Lot.” Pittsburgh has hosted many of his most memorable fan-first appearances.Fight Another Day, the brand-new single and official video by Ryan Roxie, blending indie rock energy with a retro 8-bit video game aesthetic inspired by the classic arcade worlds. Released on Boxing Day, Fight Another Day is about resilience, appreciation for where you've come from, and finding the strength to keep going, one more level at a time. https://youtu.be/2VE9X1PdU7UThe track features guest contributions from Keith Weir (The Quireboys) on piano and keyboards and Brijitte West (NY Loose) on background vocals. West is best known for the band's 1990s hit “Spit,” featured on The Crow: City of Angels soundtrack.Platform: Music From The 412 / RokuWebsite: https://musicfromthe412.com/ryan-roxie/Status: On Demand NowConcert Photo Credit: Bill DomianoClick Here to Subscribe to The Adventures of Pipeman for PERKS, BONUS Content & FREE GIVEWAYS! Take some zany and serious journeys with The Pipeman aka Dean K. Piper, CST on The Adventures of Pipeman also known as Pipeman Radio syndicated globally “Where Who Knows And Anything Goes.” Would you like to be a sponsor of the show?Would you like to have your business, products, services, merch, programs, books, music or any other professional or artistic endeavors promoted on the show?Would you like interviewed as a professional or music guest on The Adventures of Pipeman, Positively Pipeman and/or Pipeman in the Pit?Would you like to host your own Radio Show, Streaming TV Show, or Podcast? PipemanRadio Podcasts are heard on Pipeman Radio, Talk 4 Media, iHeartRadio, Pandora, Amazon Music, Audible, Spotify, Apple Podcasts, and over 100 other podcast outlets where you listen to Podcasts.The following are the different podcasts to Follow, Listen, Download, Subscribe:The Adventures of PipemanPipeman RadioPipeman in the Pit – Music Interviews & FestivalsPositively Pipeman – Empowerment, Inspiration, Motivation, Self-Help, Business, Spiritual & Health & WellnessClick Here to Subscribe for PERKS, BONUS Content & FREE GIVEWAYS!Follow @pipemanradio on all socials & Pipeman Radio Requests & Info at www.linktr.ee/pipemanradioStream The Adventures of Pipeman daily & live Mondays, Tuesdays, Wednesdays at 1PM ET on W4CY Radio & Talk 4 TV. Download, Rate & Review the Podcast at The Adventures of Pipeman, Pipeman Radio, Talk 4 Media, iHeartRadio, Apple Podcasts, YouTube & All Podcast Apps.
In the latest Episode of Nerd Out, Dave and Alec talked about the following topics:Trends in Terrorism: What's on the Horizon in 2026?https://thesoufancenter.org/intelbrief-2026-january-8/Critical Infrastructure Attacks Became Routine for Hacktivists in 2025https://cyble.com/blog/hacktivists-critical-infrastructure-attacks-2025/Severe Winter Weather Forecast to Impact Large Portions of the U.S.https://www.wpc.ncep.noaa.gov/#page=ovwhttps://www.ready.gov/winter-weatherhttps://www.cbsnews.com/news/maps-winter-storm-snow-cold-weekend/Talking Nerd Movies and our excitement level, plus a review of A Knight in the Seven Kingdoms.
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Kid Bookie Announces Powerful New Single ‘Rose McGowan' Featuring Rose McGowan Out January 20th 2026. Watch The Video. An anthem of resilience, conviction, and creative rebirth marks a bold new chapter for the acclaimed artist.Kid Bookie is a boundary-pushing artist celebrated for his genre-blurring sound, raw lyricism, and relentless authenticity. Known for his bold collaborations and fearless voice, Bookie continues to redefine the landscape of alternative and contemporary music. His latest release, ‘Rose McGowan', is a striking and emotionally charged collaboration with internationally renowned performer, music artist and best-selling author, Rose McGowan. The track delivers a message that resonates deeply in today's cultural landscape—one of inner strength, unwavering conviction, and the courage to stand firmly in one's truth.The single first took shape when Bookie penned the song during a period of intense creative clarity. Drawn to its message, he shared early fragments of the idea on social media. In a moment of serendipity, Rose McGowan responded. What began as a simple online exchange quickly evolved into a genuine connection grounded in mutual respect, artistic alignment, and shared life philosophies.“In music culture, using a person's name of relevance as a title track seems to be a prospect that garners attention or a marketing move to turn heads,” says Bookie. “I enjoy being the antithesis of what people do and wanted to bring light to a special name, Rose McGowan. In history, I feel linear to people who have had to destroy and rebuild—not just themselves but the industries we were created in—to make things flow in different ways. Rose was a muse in that regard. I wanted to make a song about someone who isn't just a buzzword for attention but who deserves to be highlighted as a potential beacon of changing the world to a large or small degree.” He continues, “We must follow the trail of the mavericks, the transgressors, because being too safe in an industry that prides itself on rebellion and using art to change the world. What better way than to highlight someone of the zeitgeist who did that, for their people and those who feel aligned with the dismantling of the industry bullshit. Salute to the fucking world.”Their creative partnership grew naturally, and Rose—moved by the song's purpose and emotional weight—committed to lending her voice and presence to the track. The result is an electrifying blend of Bookie's dynamic sonic style and McGowan's unmistakable tone and spirit. This brilliant collaboration stands not only as a testament to artistic synergy but also as a reminder that when creators stand by their convictions, powerful work emerges—work that challenges, heals, and inspires."I chose Kid Bookie because the moment I heard him, I knew our collaboration would be electric,” said Rose. “His DM to me in 2024 was direct and real, but hearing the track sealed it. His ability to go from melody to a full-throttle roar over a propulsive beat had purpose and fire.After years of silence, I arrived in South London with no lyrics and no idea if creativity was still in me. In the studio, I tore a page from an engineer's manual and wrote my first lyrics in six years. Bookie called it ‘Rose McGowan ft. Rose McGowan'. It was an honour that he named the track after the essence of me before I'd even written a word. Bookie reached across an ocean. I reached back. The rest is this track; this cultural moment. I hope it resonates with all those needing a release with a dose of ascension. I'm mad for it”. ‘Rose McGowan' marks a new era for Kid Bookie—one rooted in confidence, collaboration, and fearless self-expression. With a new album currently in the works, this innovative artist is entering one of the most expansive and creatively adventurous phases of his career.For further information on Kid Bookie, please contact:Press: Emma Van Duyts at Public City on evd@publiccitypr.comRadio & TV: Hayley Codd at Public City on hayley@publiccitypr.comRose McGowan www.rosemcg.comKid Bookie - Two-time MOBO AWARD nominated alternative artist & Heavy Music Awards nominated (Best Breakthrough Live Artist) artist.- Kid Bookie has carved out a unique lane in the UK music scene through a blend of genre-bending ambition and high-profile collaborations.- Bookie has earnt recognition across both rap and rock circles, highlighted by his acclaimed feature on Hacktivist's “Armoured Core” and his collaboration “Game” with Slipknot's Corey Taylor. Rose McGowan - Played Tatum Riley in the horror classic Scream but arguably best known for playing Paige Matthews on Charmed.- Time magazine named her one of the “Silence Breakers” (Person of the Year) in 2017.- Published a memoir called Brave (2018), where she talks about her life, trauma, and work.- Rose is both a pop culture figure (through acting) and a social voice: her speaking out on abuse and power. Her work spans many mediums: acting, writing, music, and art.- Her life story is compelling: from a very unconventional childhood to Hollywood success and then activism.Click Here to Subscribe to The Adventures of Pipeman for PERKS, BONUS Content & FREE GIVEWAYS! Take some zany and serious journeys with The Pipeman aka Dean K. Piper, CST on The Adventures of Pipeman also known as Pipeman Radio syndicated globally “Where Who Knows And Anything Goes.” Would you like to be a sponsor of the show?Would you like to have your business, products, services, merch, programs, books, music or any other professional or artistic endeavors promoted on the show?Would you like interviewed as a professional or music guest on The Adventures of Pipeman, Positively Pipeman and/or Pipeman in the Pit?Would you like to host your own Radio Show, Streaming TV Show, or Podcast? PipemanRadio Podcasts are heard on Pipeman Radio, Talk 4 Media, iHeartRadio, Pandora, Amazon Music, Audible, Spotify, Apple Podcasts, and over 100 other podcast outlets where you listen to Podcasts.The following are the different podcasts to Follow, Listen, Download, Subscribe:The Adventures of PipemanPipeman RadioPipeman in the Pit – Music Interviews & FestivalsPositively Pipeman – Empowerment, Inspiration, Motivation, Self-Help, Business, Spiritual & Health & WellnessClick Here to Subscribe for PERKS, BONUS Content & FREE GIVEWAYS!Follow @pipemanradio on all socials & Pipeman Radio Requests & Info at www.linktr.ee/pipemanradioStream The Adventures of Pipeman daily & live Mondays, Tuesdays, Wednesdays at 1PM ET on W4CY Radio & Talk 4 TV. Download, Rate & Review the Podcast at The Adventures of Pipeman, Pipeman Radio, Talk 4 Media, iHeartRadio, Apple Podcasts, YouTube & All Podcast Apps.
Kid Bookie Announces Powerful New Single ‘Rose McGowan' Featuring Rose McGowan Out January 20th 2026. Watch The Video. An anthem of resilience, conviction, and creative rebirth marks a bold new chapter for the acclaimed artist.Kid Bookie is a boundary-pushing artist celebrated for his genre-blurring sound, raw lyricism, and relentless authenticity. Known for his bold collaborations and fearless voice, Bookie continues to redefine the landscape of alternative and contemporary music. His latest release, ‘Rose McGowan', is a striking and emotionally charged collaboration with internationally renowned performer, music artist and best-selling author, Rose McGowan. The track delivers a message that resonates deeply in today's cultural landscape—one of inner strength, unwavering conviction, and the courage to stand firmly in one's truth.The single first took shape when Bookie penned the song during a period of intense creative clarity. Drawn to its message, he shared early fragments of the idea on social media. In a moment of serendipity, Rose McGowan responded. What began as a simple online exchange quickly evolved into a genuine connection grounded in mutual respect, artistic alignment, and shared life philosophies.“In music culture, using a person's name of relevance as a title track seems to be a prospect that garners attention or a marketing move to turn heads,” says Bookie. “I enjoy being the antithesis of what people do and wanted to bring light to a special name, Rose McGowan. In history, I feel linear to people who have had to destroy and rebuild—not just themselves but the industries we were created in—to make things flow in different ways. Rose was a muse in that regard. I wanted to make a song about someone who isn't just a buzzword for attention but who deserves to be highlighted as a potential beacon of changing the world to a large or small degree.” He continues, “We must follow the trail of the mavericks, the transgressors, because being too safe in an industry that prides itself on rebellion and using art to change the world. What better way than to highlight someone of the zeitgeist who did that, for their people and those who feel aligned with the dismantling of the industry bullshit. Salute to the fucking world.”Their creative partnership grew naturally, and Rose—moved by the song's purpose and emotional weight—committed to lending her voice and presence to the track. The result is an electrifying blend of Bookie's dynamic sonic style and McGowan's unmistakable tone and spirit. This brilliant collaboration stands not only as a testament to artistic synergy but also as a reminder that when creators stand by their convictions, powerful work emerges—work that challenges, heals, and inspires."I chose Kid Bookie because the moment I heard him, I knew our collaboration would be electric,” said Rose. “His DM to me in 2024 was direct and real, but hearing the track sealed it. His ability to go from melody to a full-throttle roar over a propulsive beat had purpose and fire.After years of silence, I arrived in South London with no lyrics and no idea if creativity was still in me. In the studio, I tore a page from an engineer's manual and wrote my first lyrics in six years. Bookie called it ‘Rose McGowan ft. Rose McGowan'. It was an honour that he named the track after the essence of me before I'd even written a word. Bookie reached across an ocean. I reached back. The rest is this track; this cultural moment. I hope it resonates with all those needing a release with a dose of ascension. I'm mad for it”. ‘Rose McGowan' marks a new era for Kid Bookie—one rooted in confidence, collaboration, and fearless self-expression. With a new album currently in the works, this innovative artist is entering one of the most expansive and creatively adventurous phases of his career.For further information on Kid Bookie, please contact:Press: Emma Van Duyts at Public City on evd@publiccitypr.comRadio & TV: Hayley Codd at Public City on hayley@publiccitypr.comRose McGowan www.rosemcg.comKid Bookie - Two-time MOBO AWARD nominated alternative artist & Heavy Music Awards nominated (Best Breakthrough Live Artist) artist.- Kid Bookie has carved out a unique lane in the UK music scene through a blend of genre-bending ambition and high-profile collaborations.- Bookie has earnt recognition across both rap and rock circles, highlighted by his acclaimed feature on Hacktivist's “Armoured Core” and his collaboration “Game” with Slipknot's Corey Taylor. Rose McGowan - Played Tatum Riley in the horror classic Scream but arguably best known for playing Paige Matthews on Charmed.- Time magazine named her one of the “Silence Breakers” (Person of the Year) in 2017.- Published a memoir called Brave (2018), where she talks about her life, trauma, and work.- Rose is both a pop culture figure (through acting) and a social voice: her speaking out on abuse and power. Her work spans many mediums: acting, writing, music, and art.- Her life story is compelling: from a very unconventional childhood to Hollywood success and then activism.Click Here to Subscribe to Pipeman in the Pit for PERKS, BONUS Content & FREE GIVEWAYS! Pipeman in the Pit is a music, festival, and interview segment of The Adventures of Pipeman Radio Show (#pipemanradio) and from The King of All Festivals while on The Pipeman Radio Tour. Pipeman in the Pit features all kinds of music and interviews with bands & music artists especially in the genres of Heavy Metal, Rock, Hard Rock, Classic Rock, Punk Rock, Goth, Industrial, Alternative, Thrash Metal & Indie Music. Pipeman in the Pit also features press coverage of events, concerts, & music festivals. Pipeman Productions is an artist management company that sponsors the show introducing new local & national talent showcasing new artists & indie artists.Then there is The Pipeman Radio Tour where Pipeman travels the country and world doing press coverage for Major Business Events, Conferences, Conventions, Music Festivals, Concerts, Award Shows, and Red Carpets. One of the top publicists in music has named Pipeman the “King of All Festivals.” So join the Pipeman as he brings “The Pipeman Radio Tour” to life right before your ears and eyes.Would you like to be a sponsor of the show?Would you like to have your business, products, services, merch, programs, books, music or any other professional or artistic endeavors promoted on the show?Would you like interviewed as a professional or music guest on The Adventures of Pipeman, Positively Pipeman and/or Pipeman in the Pit?Would you like to host your own Radio Show, Streaming TV Show, or Podcast? PipemanRadio Podcasts are heard on Pipeman Radio, Talk 4 Media, iHeartRadio, Pandora, Amazon Music, Audible, Spotify, Apple Podcasts, and over 100 other podcast outlets where you listen to Podcasts.The following are the different podcasts to Follow, Listen, Download, Subscribe:•The Adventures of Pipeman•Pipeman Radio•Pipeman in the Pit – Music Interviews & Festivals•Positively Pipeman – Empowerment, Inspiration, Motivation, Self-Help, Business, Spiritual & Health & WellnessBecome a supporter of this podcast: https://www.spreaker.com/podcast/pipeman-in-the-pit--2287932/support.Click Here to Subscribe for PERKS, BONUS Content & FREE GIVEWAYS!Follow @pipemanradio on all socials & Pipeman Radio Requests & Info at www.linktr.ee/pipemanradioStream The Adventures of Pipeman daily & live Mondays, Tuesdays, Wednesdays at 1PM ET on W4CY Radio & Talk 4 TV. Download, Rate & Review the Podcast at The Adventures of Pipeman, Pipeman Radio, Talk 4 Media, iHeartRadio, Apple Podcasts, YouTube & All Podcast Apps.
In this week's Security Sprint, Dave and Andy covered the following topics:Opening:• Cyber Insights 2026: Information Sharing (SecurityWeek, 16 Jan 2026)• ICYMI: Homeland Republicans underscore importance of strong public-private sector partnerships to deter cyber threats — House Homeland Security Committee (Majority) | Jan 17, 2026 Main Topics:Pro-Russia hacktivist activity continues to target UK organisations & NCSC warns of hacktivist groups disrupting UK online services (UK National Cyber Security Centre, Jan 2026). The NCSC reports sustained, low-sophistication but high-volume hacktivist campaigns—primarily DDoS and website defacements—linked to pro-Russia narratives and opportunistic targeting of UK public- and private-sector organizations. While technically unsophisticated, the activity is persistent, media-aware, and designed to generate disruption, reputational harm, and psychological impact rather than deep network compromise. The NCSC emphasizes preparedness measures including DDoS resilience, clear incident communications, and executive awareness that “noise” activity can still impose real operational cost. • Russia-linked APT28 targets energy and defense groups tied to NATO • UAT-8837 targets critical infrastructure sectors in North America • A Day Without ICS: The real impact of ICS/OT security threats Ransomware• Worldwide ransomware roundup: 2025 end-of-year report • Global ransomware attacks rose 32% in 2025, as manufacturers emerged as top target• 2025 Shattered Records: Key takeaways from the GRIT 2026 Ransomware & Cyber Threat Report• DeadLock Ransomware: Smart Contracts for Malicious Purposes Domestic Operations: Joint Interagency Task Force-Counter Cartel (JIATF-CC) established & US Northern Command establishes JTF-GOLD Quick Hits:• (TLP:CLEAR) Assessing Terrorism Trends on the Horizon in 2026 — WaterISAC — Jan 15, 2026 • UK NCSC: Designing safer links: secure connectivity for operational technology• NCSC UK: Secure connectivity principles for OT (collection) • FBI: Secure Connectivity Principles for Operational Technology (OT) (PDF)• ACSC (Australia): New publication for small businesses managing cyber risks from AI • Artificial intelligence for small business: Managing cyber security risks• Developing your IT recovery plan (Canadian Centre for Cyber Security, Jan 2026)• Improving cyber security resilience through emergency preparedness planning (Canadian Centre for Cyber Security, Jan 2026)• Developing your incident response plan (Canadian Centre for Cyber Security, Jan 2026)• Developing your business continuity plan (Canadian Centre for Cyber Security, Jan 2026)
Risky Business returns for 2026! Patrick Gray and Adam Boileau talk through the week's cybersecurity news, including: Santa brings hackers MongoDB memory leaks for Christmas Vercel pays out a million bucks to improve its React2Shell WAF defences 39C3 delivers; the pink Power Ranger deletes nazis, while a catgirl ruins GnuPG Cambodian scam compound kingpin gets extradited to China, and we don't think it'll go well for him Krebs picks apart the Kimwolf botnet and residential proxy networks So many healthcare data leaks that we have a roundup section This week's episode is sponsored by Airlock Digital. The founders of the application allow-listing vendor, David Cottingham and Daniel Schell, discuss Microsoft's ClickOnce .NET app packaging, and how attackers have been abusing it to load code. Airlock hates it when you load code! This episode is also available on Youtube. Show notes US, Australia say ‘MongoBleed' bug being exploited | The Record from Recorded Future News Merry Christmas Day! Have a MongoDB security incident. | by Kevin Beaumont | Dec, 2025 | DoublePulsar Inside Vercel's sleep-deprived race to contain React2Shell | CyberScoop gpg.fail Hacktivist deletes white supremacist websites live onstage during hacker conference | TechCrunch Chinese attackers exploiting zero-day to target Cisco email security products | The Record from Recorded Future News Ni8mare - Unauthenticated Remote Code Execution in n8n (CVE-2026-21858) | Cyera Research Labs ServiceNow patches critical AI platform flaw that could allow user impersonation | CyberScoop Alleged cyber scam kingpin arrested, extradited to China | The Record from Recorded Future News FCC IoT labeling program loses lead company after China probe | Cybersecurity Dive Trump picks Lt. Gen. Joshua Rudd to lead NSA spy agency - The Washington Post NSA cyber directorate gets new acting leadership | The Record from Recorded Future News Dutch court sentences hacker who used port systems to smuggle cocaine to 7 years | The Record from Recorded Future News ECLI:NL:GHAMS:2026:22, Amsterdam Court of Appeal, 23-003218-22 The Kimwolf Botnet is Stalking Your Local Network – Krebs on Security Who Benefited from the Aisuru and Kimwolf Botnets? – Krebs on Security Coupang recovers smashed laptop that alleged data leaker threw into river | The Record from Recorded Future News Ransomware responders plead guilty to using ALPHV in attacks on US organizations | The Record from Recorded Future News Nearly 480,000 impacted by Covenant Health data breach | The Record from Recorded Future News Illinois health department exposed over 700,000 residents' personal data for years | TechCrunch Tech provider for NHS England confirms data breach | TechCrunch Hacker claiming to be behind ManageMyHealth breach: ‘I do it for the money and I'm in negotiations to get it' - NZ Herald
A hacker known as Martha Root broke in and deleted three white supremacists websites at the end of a talk during the annual hacker conference Chaos Communication Congress in Germany. Also, developers of off shore wind projects seek to reverse the Department of the Interior's stop-work order which affected five offshore wind projects off the Eastern Seaboard. Learn more about your ad choices. Visit podcastchoices.com/adchoices
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.For for more information about Cybersecurity Cares, visit cybersecurity-cares.comReact2Shell is the latest high-profile vulnerability in the web application landscape, scoring a critical CVSS 10.0 and drawing immediate comparisons to Log4Shell.Researchers at Noma Labs disclosed a critical vulnerability in Google's Gemini Enterprise AI assistant, dubbed GeminiJack, that allowed attackers to stealthily exfiltrate sensitive enterprise data.U.S. prosecutors have charged Victoria Eduardovna Dubranova, a 33‑year‑old Ukrainian woman, in two separate indictments for her alleged involvement with pro‑Russia hacktivist groups CyberArmyofRussia_Reborn and NoName057(16).A China-aligned threat actor identified as Warp Panda has been linked to recent compromises of VMware vCenter environments at U.S.-based organizations, according to a new report from CrowdStrike. Original CrowdStrike article. CISA BRICKSTORM Backdoor breakdown. Analysis report.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform.This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.
Report sheds light on cyber activity targeting space-related organizations during the Gaza War. Russian threat actor targets US civil engineering firm. FBI says $262 million has been stolen in account takeover scams this year. HashJack attack tricks AI browser assistants. London councils disrupted by cyberattacks. Russia's Gamaredon and North Korea's Lazarus Group appear to be sharing infrastructure. Canon says subsidiary was breached by Oracle EBS flaw. Dave Bittner was joined by Cynthia Kaiser, SVP of the Ransomware Research Center at Halcyon, sharing a deep dive on Akira ransomware. And Campbell's Soup CISO placed on leave following lawsuit. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Dave Bittner was joined by Cynthia Kaiser, SVP of the Ransomware Research Center at Halcyon, sharing a deep dive on Akira ransomware. Learn more on Halcyon's threat actor profile of Akira, and how they fit into their latest Malicious Quartile Report. Selected Reading New Report Warns Space Sector Faces Rising Cyber Threats Amid Modern Conflicts (Orbital Today) Russian RomCom Utilizing SocGholish to Deliver Mythic Agent to U.S. Companies Supporting Ukraine (Arctic Wolf) FBI says $262 million has been stolen in account takeover scams this year (IC3) HashJack – Novel Indirect Prompt Injection Against AI Browser Assistants (Cato Networks) Multiple London councils 'hit by cyber-attacks' (BBC) London Cyberattacks Confirmed — Security Experts Issue Multiple Warnings (Forbes) Russian and North Korean Hackers Forge Global Cyberattack Alliance (GB Hackers) Canon Allegedly Breached by Clop Ransomware via Oracle E-Business Suite 0-Day Hack (Cyber Security News) A Campbell Soup VP is on leave after secret recording appears to show him mocking 'poor' customers, '3D-printed chicken' (Business Insider) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of the Contested Ground podcast, hosts Phil Tarrant, Liam Garman, and Major General (Ret'd) Dr Marcus Thompson unpack two unfolding challenges shaping Australia's strategic outlook, an Iran-linked cyber breach exposing sensitive defence data, and China's latest move to outmanoeuvre Canberra in the Pacific. The discussion opens with the major cyber breach linked to Iran-aligned actors, exposing sensitive information from Australian defence programs through vulnerabilities in overseas contractors. Thompson warns that modern military platforms are now fully digital extensions of the network, and that the Australian Defence Force risks becoming collateral damage without stronger supply-chain defence. The hosts then turn to the Pacific, where China has unveiled a record $86 million aid package to Vanuatu, a direct counter to the Albanese government's stalled security pact. Garman notes the diplomatic setback highlights the limits of Australia's traditional leverage, with Port Vila reluctant to jeopardise its economic ties with Beijing. The conversation also covers China's commissioning of its first fully indigenous aircraft carrier, signalling a major step in Beijing's push for blue-water naval capability. Enjoy the podcast, The Contested Ground team
In this episode of the Contested Ground podcast, hosts Phil Tarrant, Liam Garman, and Major General (Ret'd) Dr Marcus Thompson unpack two unfolding challenges shaping Australia's strategic outlook, an Iran-linked cyber breach exposing sensitive defence data, and China's latest move to outmanoeuvre Canberra in the Pacific. The discussion opens with the major cyber breach linked to Iran-aligned actors, exposing sensitive information from Australian defence programs through vulnerabilities in overseas contractors. Thompson warns that modern military platforms are now fully digital extensions of the network, and that the Australian Defence Force risks becoming collateral damage without stronger supply-chain defence. The hosts then turn to the Pacific, where China has unveiled a record $86 million aid package to Vanuatu, a direct counter to the Albanese government's stalled security pact. Garman notes the diplomatic setback highlights the limits of Australia's traditional leverage, with Port Vila reluctant to jeopardise its economic ties with Beijing. The conversation also covers China's commissioning of its first fully indigenous aircraft carrier, signalling a major step in Beijing's push for blue-water naval capability. Enjoy the podcast, The Contested Ground team
A Texas telecom confirms a nation-state attack. A global outage disrupts Azure and Microsoft 365 services. Malicious npm packages steal sensitive data from Windows, Linux, and macOS systems. Hacktivists have breached multiple critical infrastructure systems across Canada. Major chipmakers spill the TEE. TP-Link home routers fall under federal scrutiny. Cloud Atlas targets Russia's agricultural sector. Israel's cloud computing deal with Google and Amazon allegedly includes a secret “winking mechanism.”The FCC tamps down on overseas robocalls. Mike Anderson, from Netskope, discusses why CIOs should think like HR leaders when considering Agentic AI. Danes Draw the line at digital doppelgängers. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Mike Anderson, Netskope's Chief Digital and Information Officer, to discuss why CIOs must think like HR leaders when considering Agentic AI. Selected Reading US company with access to biggest telecom firms uncovers breach by nation-state hackers (Reuters) Huge Microsoft outage hit 365, Xbox, and beyond — deployment of fix for Azure breakdown rolled out (Tom's Hardware) Malicious NPM packages fetch infostealer for Windows, Linux, macOS (Bleeping Computer) Canada says hacktivists breached water and energy facilities (Bleeping Computer) New physical attacks are quickly diluting secure enclave defenses from Nvidia, AMD, and Intel (Ars Technica) U.S. agencies back banning top-selling home routers on security grounds (The Washington Post) Cloud Atlas hackers target Russian agriculture sector ahead of industry forum (The Record) Revealed: Israel demanded Google and Amazon use secret ‘wink' to sidestep legal orders (The Guardian) FCC adopts new rule targeting robocalls (The Record) Denmark to tackle deepfakes by giving people copyright to their own features (The Guardian) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Azure outage blocks access to Microsoft 365 services and admin portals Major U.S. law firm suffers cyberattack Hacktivists aiming for critical infrastructure get pwned Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero-trust endpoint protection platform, ThreatLocker fills the gaps traditional solutions leave behind, giving your business stronger security and control. Don't just react to threats — stop them with ThreatLocker. Learn more at ThreatLocker.com. Find the stories behind the headlines at CISOseries.com.
Hacktivists don't need zero-days to hurt you—they weaponize people. Host Lieuwe Jan Koning sits down with Yuri Wit (SOC analyst) and Rob Maas (Field CTO) to dissect APT Handala: how they hunt targets, deliver wipers, and brag about leaks. We map their moves to the Lockheed Martin Kill Chain and turn it into a Zero Trust defense playbook you can actually use—today.(00:00) - - 01:40 - Introduction (01:40) - - 02:27 - What is APT Handala? (02:27) - - 05:27 - Kill Chain Step 1: Reconnaissance (05:27) - - 06:43 - Kill Chain Step 2: Weaponization (06:43) - - 10:39 - Kill Chain Step 3: Delivery (10:39) - - 14:37 - Kill Chain Step 4: Exploitation (14:37) - - 17:34 - Kill Chain Step 5: Installation (17:34) - - 23:39 - Kill Chain Step 6: Command and control (23:39) - - 26:40 - Kill Chain Step 7: Act on objectives (26:40) - - 29:35 - How to respond to being hacked (29:25) - - 30:22 - Closing notes Key Topics Covered• Handala's playbook: people-centric recon, phishing kits, wipers, boast-and-leak ops.• Zero Trust counters: deny-by-default egress, newly-registered-domain blocks, hard EDR, passkeys.• SOC tells: DNS DGA spikes, encrypted C2 on common apps, “human error” as the biggest CVE.• Comms reality: when openness helps—and when strategic silence limits amplification.Additional Resources• ON2IT Zero Trust: https://on2it.net/zero-trust/• Lockheed Martin Cyber Kill Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html• Tor Project (onion services): https://www.torproject.org/• Threat Talks hub: https://threat-talks.com/Click here to view the episode transcript.
FBI botnet disruption leaves cybercriminals scrambling to pick up the pieces. Notorious ransomware gangs announce their retirement, but don't hold your breath. Hacktivists leak data tied to China's Great Firewall. A new report says DHS mishandled a key program designed to retain cyber talent at CISA. GPUGate malware cleverly evades analysis. WhiteCobra targets developers with malicious extensions. North Korea's Kimsuky group uses AI to generate fake South Korean military IDs. My guest is Tim Starks from CyberScoop, discussing offensive cyber operations. A cyberattack leaves students hung out to dry. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined once again by Tim Starks from CyberScoop discussing offensive cyber operations. You can read Tim's article Google previews cyber ‘disruption unit' as U.S. government, industry weigh going heavier on offense for more background. Selected Reading The FBI Destroyed an Internet Weapon, but Criminals Picked Up the Pieces (Wall Street Journal) 15 ransomware gangs ‘go dark' to enjoy 'golden parachutes' (The Register) 600 GB of Alleged Great Firewall of China Data Published in Largest Leak Yet (HackRead) China Enforces 1-Hour Cybersecurity Incident Reporting (The Cyber Express) DHS watchdog finds mismanagement in critical cyber talent program (FedScoop) GPUGate Malware: Malicious GitHub Desktop Implants Use Hardware-Specific Decryption, Abuse Google Ads to Target Western Europe (Arctic Wolf) 'WhiteCobra' floods VSCode market with crypto-stealing extensions (Bleeping Computer) AI-Forged Military IDs Used in North Korean Phishing Attack (Infosecurity Magazine) Mitsubishi to acquire Nozomi Networks for nearly $1 billion. (N2K CyberWire Business Briefing) Dutch students denied access to jailbroken laundry machines (The Register) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Episode NotesAbout our guest:Dr. Francesco Carlo CampisiPhD in Criminology, Université de MontréalResearcher, International Centre for Comparative Criminology
Hacktivist attack grounds Russian flights Naval group denies breach, hackers beg to differ Dating app breach exposes thousands of women's pictures Huge thanks to our sponsor, Dropzone AI Let me tell you about Dropzone AI—they're revolutionizing how security teams work. Companies like CBTS and Zapier use their AI to investigate alerts automatically, freeing up analysts for the work that really matters. We're talking 40-minute investigations done in 3 minutes. You can meet the Dropzone team at BlackHat in Startup City, or just head to dropzone.ai for a self-guided demo. Trust me, this is the future of security operations.
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Google says ‘Big Sleep' AI tool found bug hackers planned to use Google fixes actively exploited sandbox escape zero day in Chrome China's cyber sector amplifies Beijing's hacking of U.S. targets Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO.
#archmage #godmachine #demonthedescentA Mage Oneshot with the Awkward GM Corbin as a... DEMON! The Fools don't know what they're in for. Come meet the God-Machine face to many faces.Watch Corbin's top tier Chronicles of Darkness Lore guides here @AwkwardGMCorbinPlease support our art: https://www.patreon.com/WardsandWitchcraft !!!0:00 Intro2:35 Welcome the Awkward GM9:11 Hacktivist v the Citadel15:21 Cat Party in the Cosmographicum21:50 Everything is on Fire34:01 Subterfuge50:57 Angel Chase58:22 Fool Off (Falafel)1:14:54 Death, Demons, and Downtime1:41:58 Epic Conclusion1:52:37 Mona makes a choice1:57:33 God-Machines and Demons2:04:48 CreditsStarringCorbin as the Hacktivist Marcus SmallCharlotte as Mona Archmage of PrimeIsmail as displaced Uratha Rides-the-StormVictoria as Ethyl/Bernice Archmage of Deathand Rudy as the STFeaturing the The Mona Machine Soundtrack Composed by PsnaylLink to a discord where we have cats and magic! https://discord.gg/z8qaxRGDd5We also have a guide if you like our content and want to discover how we ended up outside of time https://docs.google.com/document/d/1K-cLIlrHj_rA4COISfy3NKYZS1eFptgSzYtPxPDdH0g/edit?usp=sharingIf you want to go beyond Mastery consider buying the Archmastery Rules for Mage the Awakening from DrivethriougRPG: https://www.drivethrurpg.com/en/product/97925/imperial-mysteries?affiliate_id=3139789We have a season of quality time traveling content we would love to share with you and your investment now if our team will help us bring the best mage content around!
Bo and Beth welcome Cyber Security Expert Theresa Payton to discuss how the initial ceasefire between Israel and Iran could lead to more cyber attacks in the region. Also, Theresa shares her thoughts on the future of A.I. in education. See omnystudio.com/listener for privacy information.
The messaging app used by CBP and the White House faces continued security scrutiny. Hacktivists breach the airline used for U.S. deportation flights. The FBI warns that threat actors are exploiting outdated, unsupported routers. Education giant Pearson confirms a cyberattack. Researchers report exploitation of Windows Remote Management (WinRM) for stealthy lateral movement in Active Directory (AD) environments. A sophisticated email attack campaign uses malicious PDF invoices to deliver a cross-platform RAT. A zero-day vulnerability in SAP NetWeaver enables remote code execution. An Indiana health system reports a data breach affecting nearly 263,000 individuals. Our guest is Alex Cox, Director of Information Security at LastPass, discussing tax-related lures targeting refunds. AI empowers a murder victim to speak from beyond the grave. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Alex Cox, Director of Information Security at LastPass, to discuss tax-related lures facing both tax preparation agencies and filers expecting refunds. Selected Reading On the state of modern Web Application Security (BrightTalk) Customs and Border Protection Confirms Its Use of Hacked Signal Clone TeleMessage (Wired) Hackers hit deportation airline GlobalX, leak flight manifests, and leave an unsubtle message for "Donnie" Trump (Bitdefender) FBI Sounds Alarm on Rogue Cybercrime Services Targeting Obsolete Routers (infosecurity magazine) Education giant Pearson hit by cyberattack exposing customer data (Bleeping Computer) Hackers Using Windows Remote Management to Stealthily Navigate Active Directory Network (Cybersecurity News) Hackers Weaponizing PDF Invoices to Attack Windows, Linux & macOS Systems (Cybersecurity News) SAP Zero-Day Targeted Since January, Many Sectors Impacted (Security Week) Indiana Health System Notifies 263,000 of Oracle Hack (Bank of Infosecurity) A Judge Accepted AI Video Testimony From a Dead Man (404 Media) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
In May 2025, Ryan Mitchell Kramer, a 25-year-old from Santa Clarita, California, pleaded guilty to hacking a Disney employee's computer and stealing 1.1 terabytes of confidential data from Disney's internal Slack channels. Posing as the Russian hacktivist group "NullBulge," Kramer used malware disguised as an AI art generator to access the employee's credentials, downloading sensitive data like project details and employee records. After attempting to extort the employee and leaking the data online, he faced two felony charges—accessing a computer to obtain information and threatening to damage a protected computer—potentially facing up to 10 years in prison. The breach prompted Disney to ditch Slack for Microsoft Teams. Watch this podcast episode on YouTube and all major podcast hosts including Spotify. CLOWNFISH TV is an independent, opinionated news and commentary podcast that covers Entertainment and Tech from a consumer's point of view. We talk about Gaming, Comics, Anime, TV, Movies, Animation and more. Hosted by Kneon and Geeky Sparkles. D/REZZED News covers Pixels, Pop Culture, and the Paranormal! We're an independent, opinionated entertainment news blog covering Video Games, Tech, Comics, Movies, Anime, High Strangeness, and more. As part of Clownfish TV, we strive to be balanced, based, and apolitical. Get more news, views and reviews on Clownfish TV News - https://news.clownfishtv.com/ On YouTube - https://www.youtube.com/c/ClownfishTV On Spotify - https://open.spotify.com/show/4Tu83D1NcCmh7K1zHIedvg On Apple Podcasts - https://podcasts.apple.com/us/podcast/clownfish-tv-audio-edition/id1726838629
Big thanks to Radware for sponsoring this video and sharing technical insights with us! // Radware reports REFERENCE // Executive Summary: https://davidbombal.wiki/2025threats 2025 Global Threat Analysis Report: https://davidbombal.wiki/2025threatsu... // Pascal Geenens' SOCIAL // LinkedIn: / geenensp Website: https://www.radware.com/ // Radware SOCIAL // YouTube: / radwareinc Webinars: https://www.radware.com/newsroom/events/ LinkedIn / radware // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 01:03 - Intro 01:40 - What are the Reports About? 06:59 - Hacktivists (Dark Storm Team) 10:19 - DDos For Hire (Telegram) 13:24 - Check-Host.net 14:27 - Dienet 19:44 - How to Bring Down a Website 21:46 - DNS DDoS Attacks 26:28 - HTTP/2 29:22 - Botnet Capability 31:51 - Noname057 35:09 - Home Routers (TRS-069) 39:05 - Bullet Proof Cloud Services 45:13 - Vulnerable IoT 49:04 - Shodan (IoT Search Engine) 50:07 - Downloading Threats 52:45 - Application Programming Interfaces (APIs) 57:15 - Artificial Intelligence (AI) 01:06:49 - The Fight Against Bad AI 01:08:49 - How to Protect Yourself 01:14:52 - What is Radware? 01:16:00 - The Struggle of Downloading Models 01:20:06 - Should AI Keep your Data? 01:22:01 Connect with Pascal 01:22:36 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Hacktivists sabotage over 100 Iranian ships, Iran calls out China for hacking, six new Paragon customers come to light, and North Korea creates a new cyber unit. Show notes
A Pro Palestinian group claims credit for the X DDoS, CISA gets a new director as DOGE fires its red teams, and Asian scam compounds keep growing. Show notes
In today's podcast we cover four crucial cyber and technology topics, including: 1. Researchers disclose fixed flaw in Apple devices 2. Bumblebee and Latrodectus malware return 3. Cypress pressed by wave of hacktivist attacks 4. SolarWinds 2020 hack generates millions in fines via SEC I'd love feedback, feel free to send your comments and feedback to | cyberandtechwithmike@gmail.com
Hacktivists Escalate Sophisticated, Multi-Vector Assaults on Banking and Financial Services, Government, and Utilities In this podcast episode, we will explore the evolving threat of distributed denial-of-service (DDoS) attacks targeting telecom carriers, as revealed in NETSCOUT's latest DDoS Threat Intelligence Report. With 5G connectivity rapidly expanding—from 12.6 million subscriptions in 2019 to an anticipated 2.8 billion by the end of 2024—cybercriminals are exploiting the increased attack surface presented by 5G-connected devices. Join us as we dive into the report's findings and discuss the implications of this alarming trend with Richard Hummel, NETSCOUT's director of threat intelligence. About NETSCOUT NETSCOUT is a leading provider of performance management, cybersecurity, and DDoS attack protection solutions. The company helps organizations monitor, analyze, and protect their digital infrastructure. Focusing on safeguarding critical networks, NETSCOUT's solutions are widely used across industries, including telecom, finance, and government, to ensure the reliability and security of their operations. Learn more at www.netscout.com or follow @NETSCOUT on LinkedIn, X, or Facebook.
Video Episode: https://www.youtube.com/watch?v=-sAsXlXZixs In today’s episode, we discuss critical updates affecting cybersecurity and networking, including significant issues with macOS 15 ‘Sequoia’ impacting VPN and antivirus functionalities such as CrowdStrike Falcon and ESET Endpoint Security. We also cover Microsoft’s new Hotpatching feature in Windows Server 2025, enabling seamless security updates without restarts, and LinkedIn’s halting of AI data processing in the U.K. due to privacy concerns. Additionally, we delve into the hacktivist group Twelve’s destructive cyber attacks targeting Russian entities, highlighting their methods and tools. Timestamps 00:00 – Introduction 01:14 – MacOS Sequoia Upgrade Bugs 02:45 – Windows Server 2025 Hot Patching 04:06 – LinkedIn AI Privacy Violations 05:53 – Hacktivists attack Russian infrastructure Links to articles discussed: 1. https://www.bleepingcomputer.com/news/apple/macos-sequoia-change-breaks-networking-for-vpn-antivirus-software/ 2. https://www.bleepingcomputer.com/news/microsoft/windows-server-2025-hotpatching-in-public-preview-installs-security-updates-without-restarts/ 3. https://thehackernews.com/2024/09/linkedin-halts-ai-data-processing-in-uk.html 4. https://thehackernews.com/2024/09/hacktivist-group-twelve-targets-russian.html 1. What are today’s top cybersecurity news stories? 2. How does macOS 15 Sequoia impact VPN and antivirus software? 3. What are the issues reported with CrowdStrike Falcon on macOS Sequoia? 4. Why did LinkedIn halt AI data processing in the UK? 5. What is Microsoft’s Hotpatching feature for Windows Server 2025? 6. How does the hacktivist group Twelve conduct cyber attacks on Russian entities? 7. What problems are users experiencing with Mullvad VPN after upgrading to macOS Sequoia? 8. What changes in macOS Sequoia are affecting network connections for security tools? 9. How has the ICO responded to LinkedIn’s use of user data for AI training? 10. What security vulnerabilities did the group Twelve exploit for their attacks? macOS Sequoia, VPN, antivirus, compatibility, Hotpatching, Microsoft, security updates, compatibility, LinkedIn, AI, privacy, data, Twelve, DARKSTAR, cyber operations, encrypting,
In this compelling episode of our podcast, we delve into the intriguing world of Anonymous, the infamous hacktivist collective that has left a significant mark on internet culture and activism. The discussion begins with a gripping account of an early morning raid by law enforcement, highlighting how "ten thousand angry kids" challenged the established order and shook the foundations of institutions like PayPal and WikiLeaks. We explore the rise of Anonymous as a chaotic yet powerful force, characterized by a lack of formal leadership but a strong commitment to freedom of expression. The conversation takes a deeper dive into the roots of hacktivism, tracing its origins back to playful pranks at MIT and the motivations of various hacker groups, including the influential "Cult of the Dead Cow." The impact of Anonymous on global movements, particularly during the Arab Spring, is examined, showcasing how their actions supported activists fighting against government censorship and repression. Finally, we reflect on the personal consequences of being involved in Anonymous, discussing the ethical implications of hacktivism and the ongoing struggle against censorship. This episode is not just a narrative of rebellion; it's a powerful exploration of the meaning of freedom in the digital age. Join us for an enlightening discussion that reveals the complexities of activism in our interconnected world.Here's a summary of the documentary in five bullet points with timestamps:- **Introduction to Anonymous** (00:14 - 01:42): The documentary opens with a personal account of an early morning raid by law enforcement. The speaker reflects on how the actions of "ten thousand angry kids" challenged governmental authority and perceptions surrounding organizations like PayPal and WikiLeaks.- **The Rise of Anonymous and Its Activities** (02:20 - 05:36): Anonymous is described as a chaotic force in activism, with no formal leadership but a strong collective ethos focused on freedom of expression. The group claims various high-profile attacks, including on government and corporate websites, positioning themselves as defenders of internet freedom.- **Hacktivism and Cultural Origins** (06:56 - 08:06): The concept of hacktivism is explored, detailing its roots in playful pranks at MIT and the subsequent political motivations of hackers. Key figures and groups, such as the "Cult of the Dead Cow," are mentioned in relation to the development of hacktivism as a political movement.- **Impact of Anonymous on Global Movements** (01:01:15 - 01:03:53): The documentary highlights Anonymous's involvement in significant global events, including the Arab Spring, where they provided support to activists facing government censorship and violence, demonstrating the power of online activism in real-world protests.- **Consequences and Reflections on Activism** (01:30:12 - 01:33:35): The speaker discusses the personal repercussions of their involvement with Anonymous, reflecting on the ethical dilemmas of hacking as activism. The closing thoughts emphasize the ongoing struggle against censorship and oppression, asserting that everyone's opinion matters in the fight for freedom.
Barrett Brown is the author of the memoir, "My Glorious Defeats: Hacktivist, Narcissist, Anonymous," in which he discusses his experiences – both online and off – that resulted in a prison sentence for his part an attempt to catalog, interpret, and disseminate top-secret documents exposed in a security lapse by the intelligence contractor Stratfor in 2011. In this episode, Brown joins host David Braue to discuss his story in further detail, including what inspired him to write the memoir, and more. For more about Brown's memoir, visit https://www.amazon.com/My-Glorious-Defeats-Hacktivist-Narcissist/dp/B097V3WYGS. • For more on cybersecurity, visit us at https://cybersecurityventures.com
Hacktivists respond to the arrest of Telegram's CEO in France. Stealthy Linux malware stayed undetected for two years. Versa Networks patches a zero-day vulnerability. Google has patched its tenth zero-day vulnerability of 2024. Researchers at Arkose labs document Greasy Opal. A flaw in Microsoft 365 Copilot allowed attackers to exfiltrate sensitive user data. Gafgyt targets crypto mining in cloud native environments. Microsoft investigates an Exchange Online message quarantine issue. Our guest is Bar Kaduri, research team leader at Orca Security talking about AI Goat, the first open source AI security learning environment based on the OWASP top 10 ML risks. Kentucky Prisoners Trick Tablets to Generate Fake Money. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest is Bar Kaduri, research team leader at Orca Security talking about AI Goat, the first open source AI security learning environment based on the OWASP top 10 ML risks. Available on GitHub, AI Goat is an intentionally vulnerable AI environment built in Terraform that includes numerous threats and vulnerabilities for testing and learning purposes. Learn more. Selected Reading Arrest of Telegram CEO sparks cyberattacks against French websites (SC Media) Unveiling sedexp: A Stealthy Linux Malware Exploiting udev Rules (AON) Stealthy 'sedexp' Linux malware evaded detection for two years (Bleeping Computer) Google tags a tenth Chrome zero-day as exploited this year (Bleeping Computer) Versa fixes Director zero-day vulnerability exploited in attacks (Bleeping Computer) Greasy Opal: Greasing the Skids for Cybercrime (Arkose Labs) Microsoft Copilot Prompt Injection Vulnerability Let Hackers Exfiltrate Personal Data (Cyber Security News) Gafgyt Botnet: Weak SSH Passwords Targeted For GPU Mining (Security Boulevard) Microsoft: Exchange Online mistakenly tags emails as malware (Bleeping Computer) Kentucky prisoners hack state-issued computer tablets to digitally create $1M. How'd they do it? (Union Bulletin) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Barrett Brown - My Glorious Defeats: Hacktivist, Narcissist, Anonymous: A Memoir4 days agoBarrett Brown is an American journalist, essayist, activist and former associate of Anonymous. In 2010, he founded Project PM, a group that used a wiki to analyze leaks concerning the military-industrial complex. It was classified a "criminal organization" by the Department of Justice. In late 2020, Brown restarted Project PM.After a series of escapades both online and off that brought him in and out of 4chan forums, the halls of power, heroin addiction, and federal prison, Barrett Brown is a free man. He was arrested for his part in an attempt to catalog, interpret, and disseminate top-secret documents exposed in a security lapse by the intelligence contractor Stratfor in 2011. An influential journalist who is also active in the hacktivist collective Anonymous, Brown recounts exploits from a life shaped by an often self-destructive drive to speak truth to power. With inimitable wit and style, palpable anger and conviction, he exposes the incompetence and injustices that plague media and politics, reflects on the successes and failures of the transparency movement, and shows the way forward in harnessing digital communication tools for collective action.But My Glorious Defeats is more than just the tale of the clever and hilarious Brown; it's also a rigorously researched dissection of our decaying institutions and of human nature itself. As Brown makes clear, institutions are made of people—people with personal ambitions and personal vices—and it is people, just like him, just like us, who hold power. As optimistic as it is heartbreaking, My Glorious Defeats is an entertaining and illuminating manual for insurgency in the information age.Become a supporter of this podcast: https://www.spreaker.com/podcast/the-opperman-report--1198501/support.
In today's episode, we discuss a 20% rise in ransomware activity in Q2 2023, driven primarily by the ransomware group LockBit and impacting U.S.-based businesses most heavily, as reported by Reliaquest. We also explore Void Banshee APT's exploitation of CVE-2024-38112 to spread Atlantida malware via spear-phishing campaigns, and the NullBulge group's data breach of Disney in protest against AI-generated artwork. Finally, we cover Microsoft's announcement of new checkpoint cumulative updates for Windows to improve update efficiency. URLs: https://www.cybersecuritydive.com/news/ransomware-leak-site-increase/721480/ https://www.helpnetsecurity.com/2024/07/16/cve-2024-38112-void-banshee/ https://www.bleepingcomputer.com/news/microsoft/microsoft-announces-new-windows-checkpoint-cumulative-updates/ https://www.theguardian.com/technology/article/2024/jul/16/hackers-claim-disney-data-theft-in-protest-against-ai-generated-artwork 00:00 - Intro 01:14 - Hackers Leak Disney Data Over AI Art 02:58 - Microsoft Unveils Efficient 'Checkpoint' Updates 04:18 - Void Banshee Exploits Windows Flaw, Microsoft Fumbles 06:05 - LockBit Surge Drives 20% Ransomware Spike Video Episode: https://youtu.be/lRuQiv-KWnQ Sign up for digestible cyber news delivered to your inbox: https://news.thedailydecrypt.com Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/ Logo Design by https://www.zackgraber.com/ Tags: Ransomware, attacks, LockBit, organizations, Void Banshee, APT, MSHTML vulnerability, Trend Micro, Microsoft, Checkpoint, cumulative updates, bandwidth, NullBulge, hacktivists, Disney, AI-generated artwork Search Phrases: What are today's top cybersecurity news stories? How did ransomware group LockBit contribute to the spike in ransomware attacks during May? Ransomware attacks on organizations in Q2 Void Banshee APT exploits CVE-2024-38112 vulnerability Trend Micro's Zero Day Initiative findings on MSHTML vulnerability Microsoft checkpoint cumulative updates for Windows Benefits of Microsoft's new cumulative updates NullBulge hacktivists' breach of Disney's network AI-generated artwork controversy in cybersecurity Latest trends in hacktivism and digital protests
Guests: ✨ Dr. Melanie Garson, Cyber Policy & Tech Geopolitics Lead, Tony Blair Institute for Global Change [@InstituteGC]On LinkedIn | https://www.linkedin.com/in/melaniegarson/Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martin____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli_____________________________This Episode's SponsorsBlackCloak
Recorded Future - Inside Threat Intelligence for Cyber Security
A hacktivist group called the Belarusian Cyber Partisans rocked Belarus when it hacked into government servers and released secret police files and government wiretaps – the kinds of hacks we're used to seeing by nation-states. They represent the changing face of hacktivism. Some hacktivists are becoming more professional, while others are falling prey to darker forces.
Hello, cybersecurity enthusiasts! Welcome to a brand-new episode of "On Location with Sean Martin and Marco Ciappelli" at InfoSecurity Europe 2024 in London. Today, Sean hosts a very special guest, Richard Meeus, Director of Security Technology and Strategy, EMEA at Akamai, who will provide us with valuable insights into cybersecurity resilience and the evolving landscape of distributed denial of service (DDoS) attacks.The High Energy at InfoSecurity Europe 2024Sean Martin kicks off the conversation by highlighting the vibrant atmosphere at InfoSecurity Europe. With a bustling crowd and high energy, it's the perfect setting to look and discuss pressing cybersecurity topics. Richard Meeus appreciates the opportunity to be part of this lively event and shares his excitement for the discussions ahead.The Importance of ResilienceIn recent months, Sean has noticed a growing emphasis on the concept of resilience in cybersecurity conversations. Notably, both Chief Information Security Officers (CISOs) and Chief Information Officers (CIOs) are prioritizing resilience to safeguard their organizations. Richard shares his perspective, emphasizing the critical importance of resilience, especially in Europe. He points out that new legislations like NIST 2 and DORA are driving organizations to focus on maintaining the availability of their systems.The Rise in DDoS AttacksTransitioning to the main topic, Sean and Richard discuss the alarming increase in DDoS attacks observed in EMEA (Europe, the Middle East, and Africa). Over the past few years, there has been a significant surge in such attacks, with notable activity driven by hacktivists rather than traditional criminal actors. Richard explains that hacktivists use DDoS attacks to make a statement, often targeting high-profile organizations to maximize their impact.The Role of Akamai in Protecting Against DDoSRichard explains Akamai's pivotal role in defending against DDoS attacks. He highlights Akamai's extensive cloud protection service, boasting a global network with 2,400 points of presence (POPs). This vast infrastructure allows Akamai to protect some of the world's largest and most prominent brands.Richard explains the importance of shifting the burden of DDoS defense to the cloud to handle the massive attack traffic. Akamai's scrubbing centers, strategically located worldwide, meticulously clean the incoming traffic, ensuring only legitimate requests reach the client's systems.Evolution of DDoS AttacksSean invites Richard to provide an overview of how DDoS attacks have evolved over the years. While some traditional tactics like sin floods remain prevalent, there has been a resurgence of older techniques like water torture attacks targeting DNS. Richard emphasizes that organizations must protect their entire infrastructure, including APIs, which are increasingly becoming the target of such attacks.The Financial Sector: A Prime TargetThe financial sector is frequently targeted by DDoS attacks, according to Richard. He stresses that the trust customers place in financial institutions is heavily reliant on the availability of their digital services. Any disruption can erode this trust and have a significant material impact on the organization's reputation and customer confidence.Comprehensive Protection StrategyRichard underscores the importance of a comprehensive protection strategy for organizations facing the threat of DDoS attacks. By leveraging Akamai's global network and sophisticated scrubbing techniques, organizations can effectively mitigate the impact of these attacks. The combination of automated defenses and skilled SOC teams ensures real-time protection and rapid response to evolving threats.In this conversation, Sean and Richard reiterate the significance of maintaining trust and resilience in the face of growing cyber threats. With the right strategies, partnerships, and technologies, organizations can safeguard their digital presence and continue to deliver reliable services to their customers.For more in-depth insights, be sure to check out Akamai's latest report and explore their extensive back catalog of valuable cybersecurity resourcesLearn more about Akamai: https://www.akamai.com/Note: This story contains promotional content. Learn more.Guest: Richard Meeus, Director, Security Technology and Strategy, Akamai [@Akamai]On LinkedIn | https://www.linkedin.com/in/richard-meeus/ResourcesFighting the Heat: EMEA's Rising DDoS Threats: https://itspm.ag/akamaievkiLearn more and catch more stories from Akamai: https://www.itspmagazine.com/directory/akamaiView all of our InfoSecurity Europe 2024 coverage: https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
This week's episode was recorded in front of a live audience at AusCERT's 2024 conference. Pat and Adam talked through: Google starts using security as a marketing tool against Microsoft, along with steep discounts Microsoft announces a creepy desktop recording AI UK govt proposes ransom payment controls Arizona woman runs a laptop farm for North Korea Julian Assange just keeps on with his malarky And much, much more This week's episode is sponsored by Tines. Its CEO Eoin Hinchy joins the show to talk about how AI can be genuinely useful in automation. Show notes (1) Dina Bass on X: "Google is offering deep discounts to government and corporate customers to entice them to switch from Microsoft Office as it attacks Microsoft's cybersecurity over recent breaches, citing US gov't cybersecurity review board report https://t.co/43sIJmBWi5" / X Microsoft president set to testify before Congress on ‘security shortcomings' | Cybersecurity Dive Chairman Green, Ranking Member Thompson Announce Microsoft President Will Testify on Company's Security Shortcomings Following Hack of Government Accounts – Committee on Homeland Security Google leverages Microsoft's cyber gaps to woo Workspace customers | Cybersecurity Dive CSRB report highlights the need for a new approach to security (1) vx-underground on X: "tl;dr Microsoft introduces 24/7 surveillance functionality for the NSA and/or CIA but markets it as a feature that you'll like" / X Everything You Need to Know About Windows 11's Recall Feature Australian government warns of 'large-scale ransomware data breach' (1) National Cyber Security Coordinator on X: "The Australian Government continues to assist MediSecure, an electronic prescriptions provider, respond to a cyber incident. We are still working to build a picture of the size and nature of the data that has been impacted by this data breach impacting MediSecure. This https://t.co/oyNeRonurZ" / X HHS offering $50 million for proposals to improve hospital cybersecurity Remote-access tools the intrusion point to blame for most ransomware attacks | Cybersecurity Dive UK insurance industry begins to acknowledge role in tackling ransomware Exclusive: UK to propose mandatory reporting for ransomware attacks and licensing regime for all payments Hacktivists turn to ransomware in attacks on Philippines government Arizona woman accused of helping North Koreans get remote IT jobs at 300 companies | Ars Technica US offers $5 million for info on North Korean IT workers involved in job fraud FCC might require telecoms to report on securing internet's BGP technology FCC to probe ‘grave' weaknesses in phone network infrastructure EPA says it will step up enforcement to address ‘critical' vulnerabilities within water sector EPA takes steps to address cybersecurity weaknesses at water utilities British signals agency to protect election candidates' phones from cyberattacks Feds seize BreachForums platform, Telegram page Dark web narcotics market's alleged leader arrested and charged in New York WikiLeaks' Julian Assange Can Appeal His Extradition to the US, British Court Says | WIRED
In this Tech Talks Daily Podcast episode, I sit down with Richard Hummel from NETSCOUT to delve into the ever-evolving DDoS threat landscape. Why has there been an explosion in hacktivist groups and DDoS attack activity this year, and what does this mean for organizations across all sectors? With over 1,200 hacktivist groups active in 2023 alone, the threat landscape is more challenging than ever. We explore how geopolitical tensions are directly influencing attack strategies and targets, resulting in a continuous onslaught of sophisticated attacks that challenge traditional defense mechanisms. Critical infrastructure, particularly DNS servers, is being targeted with unprecedented frequency, posing significant risks to the stability of the internet itself. Richard provides valuable insights into how attackers are employing more advanced tactics, including leveraging public cloud hosting to evade defenses and utilizing AI to generate potent attacks. He also highlights how global conflicts, elections, and political unrest directly trigger hacktivist activity, with adversaries often striking both sides of a conflict. To help organizations defend themselves, Richard shares the importance of adopting a predictive defense strategy based on real-time threat intelligence, stressing that visibility into network traffic is critical. With proactive blocking of known adversary infrastructure and AI chatbots identifying new attack vectors, Richard outlines practical recommendations for staying ahead of the curve. Tune in to understand the risks, challenges, and the strategies organizations can implement to bolster their defenses. Do you feel adequately prepared for this evolving threat landscape, or is your organization vulnerable to these increasingly sophisticated attacks? Listen and share your thoughts!
Google Maps adds more charging features for EV drivers, Snap plans to watermark AI images made with its tools, Take-Two halts some projects to cut costs. MP3 Please SUBSCRIBE HERE. You can get an ad-free feed of Daily Tech Headlines for $3 a month here. A special thanks to all our supporters–without you, none ofContinue reading "Mandian Links Hacktivist Group Cyber Army of Russia To Sandworm – DTH"
BGP attack disrupts Internet service. Data breach law firm breached. Remcos RAT returns. Poison packages in the PyPI repository. Hacktivist personae and GRU fronts. BreachForums impresario re-arrested. Cyber National Mission Force gets a new leader. On our Solution Spotlight, Simone Petrella talks with ISC2 CEO Clar Rosso about putting a dent in the cybersecurity workforce gap. LinkedIn as a dating platform? Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Solution Spotlight, N2K President Simone Petrella talks with ISC2 CEO Clar Rosso about putting a dent in the cybersecurity workforce gap through empowerment, breaking down barriers and expanding Diversity, Equity and Inclusion (DE&I) initiatives. Selected Reading BGP attack disrupts Internet service. Pirated Zeppelin ransomware source code for sale in a C2C souk. BreachForums impresario re-arrested. (CyberWire) Hacker hijacks Orange Spain RIPE account to cause BGP havoc (Bleeping Computer) RIPE Account Hacking Leads to Major Internet Outage at Orange Spain (SecurityWeek) Law firm that handles data breaches was hit by data breach (TechCrunch) UAC-0050 Group Using New Phishing Tactics to Distribute Remcos RAT (The Hacker News) EXPERTS FOUND 3 MALICIOUS PACKAGES HIDING CRYPTO MINERS IN PYPI REPOSITORY (SecurityAffairs) BreachForums administrator detained after violating parole (The Record) Russian hackers wiped thousands of systems in KyivStar attack (Bleeping Computer) US military's Cyber National Mission Force gets a new chief (The Record) The Hottest New Dating Site: LinkedIn (Business Insider) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Iran-linked hackers claim responsibility for a cyber attack on a small town's water supply. Sources describe Mike Pence's conversations with federal investigators. And a deep-pocketed donor group backs Nikki Haley over Donald Trump. Learn more about your ad choices. Visit megaphone.fm/adchoices
Iranian hacktivists claim an attack on a Pennsylvania water utility. North Korea's increased attention to supply-chains. Rhysida's action against British and Chinese targets. Sandworm activity puts European power utilities on alert. Neanderthals and the Telekopye bot. Mirai-based botnet activity. Our guest is Chris Betz, the new CISO of AWS Security, with insights on the upcoming AWS re:Invent conference. And just how easy is it to track the comings and goings at Mar-a-Lago? CyberWire Guest Our guest today is Chris Betz, the new CISO of AWS Security giving us some insight into what to expect at the AWS re:Invent conference. You can connect with Chris on LinkedIn and find out more about AWS re:Invent on the event website. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/224 Selected Reading Municipal Water Authority of Aliquippa hacked by Iranian-backed cyber group (KDKA News) Iranian-linked cyber army had partial control of Aliquippa water system (Beaver Countian) Cyber Av3ngers Claim Israeli MEKOROT National Water Company Hack (Cyberwarzone) A hack in hand is worth two in the bush (Securelist by Kaspersky) Diamond Sleet supply chain compromise distributes a modified CyberLink installer (Microsoft) UK and Republic of Korea issue warning about DPRK state-linked cyber actors attacking software supply chains (National Cyber Security Centre) Rhysida (SentinelOne) Rhysida, the new ransomware gang behind British Library cyber-attack (The Guardian) RHYSIDA RANSOMWARE GANG CLAIMED CHINA ENERGY HACK (Security Affairs) #StopRansomware: Rhysida Ransomware (CISA) Russia continuing cyberthreats against NATO countries (Defence Industry Europe) Europe's grid is under a cyberattack deluge, industry warns (Politico) Telekopye: Chamber of Neanderthals' secrets (ESET) InfectedSlurs Botnet Spreads Mirai via Zero-Days (Akamai) We Spied on Trump's ‘Southern White House' From Our Couches (Rolling Stone)
The Hamas-Israel war continues to be marked by hacktivism. Arid Viper's exploitation of Arabic speaker's Android devices. Iran shows improved cyberespionage capabilities. A URL shortener in the C2C market. Taking down the Mozi botnet. Ransomware in healthcare. Two are Russians arrested on treason charges, accused of hacking for Ukraine. In our sponsored Industry Voices segment, Anna Belak from Sysdig shares a new threat framework for the cloud. Rick Howard previews his new online course on cyber security first principles. And no, Russia hasn't really replaced its currency with Arctic Ocean gastropods. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/209 Selected reading. ‘Hacktivists' join the front lines in Israel-Hamas war (C4ISRNet) The global cyber divide between Gaza and Israel - IT-Online (IT-Online) Arid Viper disguising mobile spyware as updates for non-malicious Android applications (Cisco Talos Blog) In Cyberattacks, Iran Shows Signs of Improved Hacking Capabilities (New York Times) FBI ‘keeping a close eye' on Iranian hackers as Israel-Hamas war intensifies (Record) Why Iran Is Gambling on Hamas (Foreign Affairs) To Aid and Abet: Prolific Puma Helps Cybercriminals Evade Detection (Infoblox Blog) Who killed Mozi? Finally putting the IoT zombie botnet in its grave (ESET) The State of Ransomware in Healthcare 2023 (Sophos) Russian security service detains two hackers allegedly working for Ukraine (Record) Pro-Ukraine group says it breached Russian card payment system (Record) Learn more about your ad choices. Visit megaphone.fm/adchoices