Podcasts about Malware

  • 1,761PODCASTS
  • 6,979EPISODES
  • 38mAVG DURATION
  • 1DAILY NEW EPISODE
  • Dec 5, 2025LATEST
Malware

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Malware

Show all podcasts related to malware

Latest podcast episodes about Malware

Engadget
Netflix says it's buying Warner Brothers, Chinese hackers may be targeting government entities using 'Brickstorm' malware, and Russia reportedly bans Snapchat and FaceTime

Engadget

Play Episode Listen Later Dec 5, 2025 7:42


-Shortly after rumors of a deal between the two media giants broke, Netflix has announced it is buying Warner Bros., HBO and HBO Max for approximately $82.7 billion. If approved, the deal will take place after Warner Bros. has disentangled itself from both its legacy cable -Hackers with links to China reportedly successfully infiltrated a number of unnamed government and tech entities using advanced malware. As reported by Reuters, cybersecurity agencies from the US and Canada confirmed the attack, which used a backdoor known as “Brickstorm” to target organizations using the VMware vSphere cloud computing platform -Russia's federal agency for monitoring and censoring mass media, has blocked access to Snapchat and FaceTime in the country, Bloomberg reports, citing Russian news service Interfax. The bans were reportedly put in place because the platforms were used "to organize and carry out terrorist acts,” and commit fraud Learn more about your ad choices. Visit podcastchoices.com/adchoices

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Wednesday, December 3rd, 2025: SmartTube Compromise; NPM Malware Prompt Injection Attempt; Angular XSS Vulnerability

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Dec 3, 2025 6:06


SmartTube Android App Compromise The key a developer used to sign the Android YouTube player SmartTube was compromised and used to publish a malicious version. https://github.com/yuliskov/SmartTube/issues/5131#issue-3670629826 https://github.com/yuliskov/SmartTube/releases/tag/notification Two Years, 17K Downloads: The NPM Malware That Tried to Gaslight Security Scanners Over the course of two years, a malicious NPM package was updated to evade detection and has now been identified, in part, due to its attempt to bypass AI scanners through prompt injection. https://www.koi.ai/blog/two-years-17k-downloads-the-npm-malware-that-tried-to-gaslight-security-scanners Stored XSS Vulnerability via SVG Animation, SVG URL, and MathML Attributes Angular fixed a store XSS vulnerability. https://github.com/angular/angular/security/advisories/GHSA-v4hv-rgfq-gp49

No Password Required
No Password Required Podcast Episode 66 — Danny Jenkins

No Password Required

Play Episode Listen Later Dec 3, 2025 36:58


Danny Jenkins — Founder of ThreatLocker and the Zero-Trust RevolutionDanny Jenkins is the CEO of ThreatLocker, the leading cybersecurity company that he built alongside his wife. Hosts Jack Clabby of Carlton Fields, P.A., and Kayley Melton of the Cognitive Security Institute follow Danny's journey from a scrappy IT consultant to leading one of the fastest-growing cybersecurity companies in the world.Danny shares the moment everything changed: watching a small business nearly collapse after a catastrophic ransomware attack. That experience reshaped his mission and ultimately sparked the creation of ThreatLocker. He also reflects on the gritty early days—cold-calling from his living room, coding through the night, and taking on debt before finally landing their first $5,000 customer.Danny explains the origins of Zero Trust World, his passion for educating IT teams, and why adopting a hacker mindset is essential for modern defenders.In the Lifestyle Polygraph, Danny relates his early “revenge tech” against school bullies, the place he escapes to when celebrating big wins, and the movie franchise he insists is absolutely a Christmas classic.Follow Danny on LinkedIn: https://www.linkedin.com/in/dannyjenkins/ 00:00 Introduction to Cybersecurity and ThreatLocker02:26 The Birth of ThreatLocker: A Personal Journey05:42 The Evolution of Zero Trust Security08:35 Real-World Impact of Cyber Attacks11:25 The Importance of a Hacker Mindset14:46 The Role of SOC Teams in Cybersecurity17:34 Building a Culture of Security20:23 Hiring for Passion and Skill in Cybersecurity23:44 Understanding Zero Trust: Trust No One26:32 Lifestyle Polygraph: Personal Insights and Fun29:41 Conclusion and Future of ThreatLocker

Passwort - der Podcast von heise security
Von Würmer, Viren, Schluckauf und Husten

Passwort - der Podcast von heise security

Play Episode Listen Later Dec 3, 2025 98:16 Transcription Available


Im Podcast kränkelt's: Bei Cloudflare gab es einen dreistündigen Schluckauf, der Co-Host hat Hustenanfälle und Würmer befielen mal wieder NPM. Christopher und Sylvester schauen sich ausgiebig an, was die zweite Ausgabe der Javascript-Schadsoftware "Sha1-Hulud" anders macht als die erste und befassen sich auch noch einmal mit "Glassworm", einem Thema der letzten Folgen. Dort ist im Nachhinein unklar, ob es sich tatsächlich um einen Wurm handelt oder vielleicht eher ein Botnet, wie Christopher mutmaßt. Doch auch der dreistündige Ausfall bei Cloudflare steht auf der Tagesordnung - mit ungewohnt viel Lob der Hosts! - und ob Whatsapp wirklich das größte Datenleck der Geschichte hatte, ergründen die beiden heise-Redakteure ebenfalls. - Cloudflare zum Ausfall am 18. November: https://blog.cloudflare.com/18-november-2025-outage/ - Threema zum WhatsApp-Scraping: https://threema.com/de/blog/whatsapp-datenleck-2025 - Trend Micros technische Analyse von Shai Hulud 2.0: https://www.trendmicro.com/en_us/research/25/k/shai-hulud-2-0-targets-cloud-and-developer-systems.html - Expel zu Cache Smuggling: https://expel.com/blog/cache-smuggling-when-a-picture-isnt-a-thousand-words/ - Folgt uns im Fediverse: - @christopherkunz@chaos.social - @syt@social.heise.de

Debut Buddies
First Gmail (1997)

Debut Buddies

Play Episode Listen Later Dec 1, 2025 100:25


It's time to dive into the history of Gmail... but it didn't start with Google at all... In fact, it started very differently... Purrfectly, some might say. On this episode we discuss the strange phenomenon of Garfield Mail, the original Gmail. Then we pitch some ideas for making email better, reminisce about products from Google's past, get into movies in the MouthGarf Report, and play a rousing game of I See What You Did There.Sources:https://gizmodo.com/the-original-gmail-was-garfield-mail-1822970617https://historyandmystery.org/interesting-history/the-first-gmail-was-associated-with-garfield-the-cat/https://www.cracked.com/article_28656_4-wtf-tales-from-early-days-internet.htmlPlease give us a 5 star rating on Apple Podcasts! Want to ask us a question? Talk to us! Email debutbuddies@gmail.comListen to the archives of Kelly and Chelsea's awesome horror movie podcast, Never Show the Monster.Get some sci-fi from Spaceboy Books.Get down with Michael J. O'Connor and the Cold Family and check out his new compilation The Best of the Bad Years 2005 - 2025Next time: First Presidential Convention in Arkansas 

PolySécure Podcast
Actu - 30 novembre 2025 - Parce que... c'est l'épisode 0x671!

PolySécure Podcast

Play Episode Listen Later Dec 1, 2025 56:35


Parce que… c'est l'épisode 0x671! Shameless plug 25 et 26 février 2026 - SéQCure 2026 CfP 27 février 2026 - Blackout 14 au 17 avril 2026 - Botconf 2026 28 et 29 avril 2026 - Cybereco Cyberconférence 2026 9 au 17 mai 2026 - NorthSec 2026 3 au 5 juin 2026 - SSTIC 2026 juin 2026 - leHACK Notes IA Vibe coding: What is it good for? Absolutely nothing The slow rise of SBOMs meets the rapid advance of AI Malveillant How Malware Authors Incorporate LLMs to Evade Detection KawaiiGPT - Free WormGPT Variant Leveraging DeepSeek, Gemini, and Kimi-K2 AI Models LLMs Tools Like GPT-3.5-Turbo and GPT-4 Fuels the Development of Fully Autonomous Malware Amazon Is Using Specialized AI Agents for Deep Bug Hunting OpenAI dumps Mixpanel after analytics breach hits API users Gibberifier Souveraineté Europe Is Bending the Knee to the US on Tech Policy NATO taps Google for air-gapped sovereign cloud Canadian data order risks blowing a hole in EU sovereignty Underwater Cables That Carry the Internet Are in Trouble Social media giants liable for financial scams under new EU law Switzerland: Data Protection Officers Recommend Broad Cloud Ban for Authorities Pluralistic: (Digital) Elbows Up (28 Nov 2025) – Pluralistic: Daily links from Cory Doctorow Red Threats Actors Leverage Python-based Malware to Inject Process into a Legitimate Windows Binary New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions ClickFix Hackers Tricks macOS Users to Execute Command in Terminal to Deliver FlexibleFerret Malware Beware of Weaponized Google Meet page that uses ClickFix to deliver Malicious Payload ClickFix attack uses fake Windows Update screen to push malware Malicious Blender model files deliver StealC infostealing malware HashiCorp Vault Vulnerability Allow Attackers to Authenticate to Vault Without Valid Credentials Cheap Device Bypasses AMD, Intel Memory Encryption Advanced Security Isn't Stopping Old Phishing Tactics Des outils de formatage de code ont exposé des milliers de mots de passe Over 390 Abandoned iCalendar Sync Domains Could Expose ~4 Million Devices to Security Risks Public GitLab repositories exposed more than 17,000 secrets Blue Leonardo unveils ‘Michelangelo Dome' AI-powered shield system Ex-CISA officials, CISOs aim to stop the spread of hacklore Mobile phones : Threat landscape since 2015 Air Force practices operating from cut-off bases in fierce future war Airbus: We were hours from pausing production in Spain Microsoft to secure Entra ID sign-ins from script injection attacks Privacy Mind-reading devices can now predict preconscious thoughts: is it time to worry? One Tech Tip: Modern cars are spying on you. Here's what you can do about it Proton Meet: Secure, end-to-end encrypted video conferencing Chat Control - 3 ans de débats pour accoucher d'un truc qui ne sert à rien GrapheneOS: “We no longer have any active s…” - GrapheneOS Mastodon GrapheneOS bails on OVHcloud over France's privacy stance European Parliament for mandatory age verification for social media Collaborateurs Nicolas-Loïc Fortin Crédits Montage par Intrasecure inc Locaux réels par Intrasecure inc

Thinking Crypto Interviews & News
Halborn is Helping to Protect Crypto from Bad Actors! with Jacques Boschung

Thinking Crypto Interviews & News

Play Episode Listen Later Nov 29, 2025 15:53 Transcription Available


The CyberWire
Pass the intel, please. [Only Malware in the Building]

The CyberWire

Play Episode Listen Later Nov 28, 2025 38:06


Please enjoy this encore of Only Malware in the Building. Welcome in! You've entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today's most interesting threats. Your host is ⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠. Inspired by the residents of a building in New York's exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠Qintel⁠⁠⁠⁠. Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we explore what makes information sharing actually work. From public-private partnerships to actionable intelligence, our guests discuss how organizations can prioritize, process, and operationalize shared cyber threat data to stay ahead of emerging risks. Plus, catch Dave, Selena, and Keith on their road trip adventure in our video on ⁠⁠YouTube⁠⁠ — full of laughs, unexpected detours, and plenty of sleuthing! Learn more about your ad choices. Visit megaphone.fm/adchoices

The Healthier Tech Podcast
Promptflux: A Malware That Rewrites Itself Using Gemini AI

The Healthier Tech Podcast

Play Episode Listen Later Nov 27, 2025 5:04


What happens when malware stops behaving like malware and starts behaving more like a living digital organism. In this episode of The Healthier Tech Podcast, we break down Google's latest discovery: malicious software that can rewrite its own code using artificial intelligence while it is already running on your device. This one shift turns a predictable threat into something far more flexible and far harder to detect. We walk through how traditional malware works and why this new generation breaks every rule cybersecurity has relied on for decades. You will learn what makes self-modifying code so disruptive and why Google calls this a new phase of artificial intelligence abuse. You will hear about Promptflux, the first known malware that asks an artificial intelligence model to rewrite it in real time. We also explore four other experimental malware families highlighted in Google's report, including versions designed to steal files, open backdoors, gather system data, and search for passwords. Each one shows how hackers are beginning to use artificial intelligence to scale their attacks. This episode explains, in simple language, how these threats operate and why they matter for everyday users who want healthier, safer relationships with their devices. We cover how Google and DeepMind are trying to counter this trend and what this new category of evolving malware means for digital wellness, privacy, and personal tech hygiene. If you care about digital safety, tech balance, or keeping your devices healthy, this is a must-listen. This episode connects the dots between cybersecurity and wellness in a way that is clear, practical, and relevant for anyone who uses technology daily. For more episodes on digital wellness, healthy tech habits, and staying informed in a fast moving tech world, make sure to subscribe and tune in. This episode is brought to you by Shield Your Body—a global leader in EMF protection and digital wellness. Because real wellness means protecting your body, not just optimizing it. If you found this episode eye-opening, leave a review, share it with someone tech-curious, and don't forget to subscribe to Shield Your Body on YouTube for more insights on living healthier with technology.

Cyber Security Today
Cybersecurity Update: Incorrect Company Naming, Major Breaches, and New Malware Campaigns

Cyber Security Today

Play Episode Listen Later Nov 27, 2025 12:58


In this episode, the host addresses a previous mistake in naming a company involved in a breach, correcting SitusAMC for Ascensus, and extends apologies. Key topics include US banks assessing a breach fallout from financial tech vendor SitusAMC, ransomware group CioP targeting Broadcom through Oracle's vulnerabilities, a new malware campaign hiding in Blender 3D models named SteelC, supply chain attacks in the JavaScript ecosystem through NPM packages with Shai-Hulud malware, and a phishing scam using lookalike domains to deceive Microsoft account holders. Listeners are reminded to manually type URLs to avoid phishing scams, and are informed about the Thanksgiving weekend schedule change. 00:00 Introduction and Apology 01:26 Cybersecurity Headlines 02:13 US Banks Data Theft Incident 03:44 Broadcom and Oracle ERP Breach 05:29 Blender Malware Campaign 07:45 Shai-Hulud NPM Package Attack 09:41 Phishing Campaign Targeting Microsoft Accounts 11:39 Final Thoughts and Thanksgiving Wishes

Unspoken Security
The Future of Cyber Threat Intelligence

Unspoken Security

Play Episode Listen Later Nov 27, 2025 49:27


In this episode of Unspoken Security, host AJ Nash sits down with CharlotteGuiney, Cyber Threat Intelligence Manager at Toyota Financial Services. Theyexplore what it takes to build threat intelligence programs that work for bothsecurity teams and the wider business. Charlotte cuts through the noise,stressing that buy-in is step one—and that it's often the hardest step. Sheshares how understanding internal customers and their priorities leads toearly wins, which are key to building trust and showing the value ofintelligence.Charlotte explains that not every organization needs the same level ofmaturity. Small companies might only need basic monitoring, while largerenterprises face more complex challenges. She notes that successfulprograms link intelligence to business needs, not just security threats. Thisapproach helps teams prioritize what matters most and communicate risk inways business leaders understand.The conversation also dives into the future of threat intelligence. Charlottesees a growing role for automation and AI, especially for basic tasks, butbelieves people are still needed to bridge gaps and build relationships acrossthe business. She closes with a reminder to keep things in perspective,echoing a lesson from her childhood at clown camp: sometimes you need tostep back and find humor, even in serious work.Send us a textSupport the show

Cyber Security Headlines
AWS outage botnet smacks 28 countries, LLMs help malware authors evade detection, Anthropic pressed over Claude espionage

Cyber Security Headlines

Play Episode Listen Later Nov 27, 2025 7:02


AWS outage botnet smacks 28 countries LLMs help malware authors evade detection Anthropic questioned over Claude espionage Huge thanks to our episode sponsor, KnowBe4 Cybersecurity isn't just a tech problem—it's a human one.   That's why KnowBe4's Human Risk Management platform allows you to measure, quantify and actually reduce human risk across your organization.   With AI-powered risk scoring, automated coaching and reporting, HRM+ helps you surface your highest risk users and reduce the risk of data breaches and cyberattacks proactively. Ready to move from awareness to action? Request a demo of HRM+ today at knowbe4.com.

Black Hills Information Security
Shai-Hulud malware leaks secrets on GitHub – 2025-17-24

Black Hills Information Security

Play Episode Listen Later Nov 26, 2025 65:00


???? Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — Stressed about lithium batteries04:59 - Shai-Hulud malware leaks secrets on GitHub – BHIS - Talkin' Bout [infosec] News 2025-17-2405:57 - Story # 1: Shai-Hulud malware infects 500 npm packages, leaks secrets on GitHub11:19 - Story # 2: CrowdStrike catches insider feeding information to hackers15:50 - Story # 3: Fidelity sues Broadcom over access to key software to avoid outages22:17 - Story # 4: NetApp sues former CTO for alleged data breach26:49 - Story # 5: CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers36:05 - Story # 6: A major Cloudflare outage took down large parts of the internet - X, ChatGPT and more were affected, but all recovered now37:11 - Story # 6b: Cloudflare outage on November 18, 202541:43 - Story # 7: Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt46:35 - Story # 8: This Hacker Conference Installed a Literal Antivirus Monitoring System51:10 - Story # 10: Microsoft to integrate Sysmon directly into Windows 11, Server 202556:41 - Story # 9: Crypto and Carcasses: Undercover Sting Recovers $700K in Bitcoin Miners, Foils $75K Frozen Turkey Heist

The CyberWire
Message in the malware.

The CyberWire

Play Episode Listen Later Nov 25, 2025 23:50


CISA warns of spyware targeting messaging apps. CodeRED, this is not a test. Infostealer campaign spreads via malicious Blender files. Shai-Hulud's second coming. Real estate finance firm SitusAMC investigates breach. Dartmouth College discloses Oracle EBS breach. Dave Bittner is joined by Tim Starks, Senior reporter from CyberScoop, to discuss the Trump administration's upcoming cyber strategy. And tis the season for deals — and digital deception. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Dave Bittner is joined by Tim Starks, Senior reporter from CyberScoop, to discuss the Trump administration's upcoming cyber strategy. Read Tim's piece on the topic “Completed draft of cyber strategy emphasizes imposing costs, industry partnership”. Selected Reading ​​Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications​ (CISA) CodeRED cyber attack leaves emergency notification system down, exposes user data (First Alert 4) Morphisec Thwarts Russian-Linked StealC V2 Campaign Targeting Blender Users via Malicious .blend Files (Morphisec) Shai-Hulud's Second Coming: NPM Malware Attack Evolved (Checkmarx) SitusAMC confirms breach of client data after cyberattack (The Register) Clop's Oracle EBS rampage reaches Dartmouth College (The Register) 2025 Retail Holiday Threat Report: Scams and Impersonation Attacks Targeting Retailers (BforeAI) The data privacy costs of Black Friday bargains: 100 Black Friday apps analyzed (Comparitech) 2025 Ransomware Holiday Risk Report (Semperis) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Hacking Humans
Pseudoransomware (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Nov 25, 2025 7:27


Please enjoy this encore of Word Notes. Malware, in the guise of ransomware, that destroys data rather than encrypts. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pseudoransomware⁠ Audio reference link: “⁠Some Men Just Want to Watch the World Burn | the Dark Knight⁠,” by YouTube, 2 November 2019.

Word Notes
Pseudoransomware (noun)

Word Notes

Play Episode Listen Later Nov 25, 2025 7:27


Please enjoy this encore of Word Notes. Malware, in the guise of ransomware, that destroys data rather than encrypts. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pseudoransomware⁠ Audio reference link: “⁠Some Men Just Want to Watch the World Burn | the Dark Knight⁠,” by YouTube, 2 November 2019. Learn more about your ad choices. Visit megaphone.fm/adchoices

ALEF SecurityCast
Ep#306 - Jediná chyba. Globální výpadek služeb. Co se stalo?

ALEF SecurityCast

Play Episode Listen Later Nov 24, 2025 10:30


V dnešním SecurityCastu se podíváme na jeden z největších technologických incidentů roku – jediná konfigurační chyba v Cloudflare dokázala shodit světové služby včetně ChatGPT nebo X a ukázala, jak křehká dokáže být globální infrastruktura. Probereme také zásadní soudní spor mezi NSO Group a WhatsAppem, který může ovlivnit budoucnost komerčního spywaru, a rychle projdeme kritiku návrhu Digital Omnibus, jenž podle mnoha expertů oslabuje GDPR a otevírá cestu k rozsáhlejšímu využívání dat pro trénování AI. Podíváme se také na nejnovější malware statistiky za Q3 2025 nebo na insider incident v CrowdStrike, kde zaměstnanec sdílel interní informace útočníkům.

Business of Tech
AI-Driven Cyber Threats Surge: SMBs Embrace MDR, Shadow AI, and Evolving Malware Tactics

Business of Tech

Play Episode Listen Later Nov 18, 2025 14:56


The rise of artificial intelligence (AI) in cyber attacks is prompting small and medium-sized businesses (SMBs) to adopt managed detection and response (MDR) services and explore autonomous security operations centers (SOCs). Research from TechAisle indicates that awareness of MDR among SMBs increased from 39% in 2023 to 61% in 2025, with 89% of mid-market firms prioritizing cyber resilience. This shift is driven by the need for effective security operations that do not rely on in-house expertise, as AI-driven threats evolve faster than traditional defenses can respond.A report from UpGuard highlights the prevalence of shadow AI, revealing that 68% of security leaders use unauthorized AI tools, with 90% of them bypassing corporate governance. This disconnect between security protocols and employee behavior underscores the need for organizations to adapt their governance strategies. Additionally, a significant cyber attack attributed to a Chinese state-sponsored group demonstrated AI's capability to autonomously conduct reconnaissance and data exfiltration, marking a shift in threat actor tactics.Retail executives are increasingly concerned about their employees' ability to identify genuine cyber threats, with 44% reporting a rise in cyber attacks. Despite this awareness, only 25% feel prepared for AI-driven incidents. The report emphasizes the necessity for retailers to adopt a resilience-focused approach, including improved application security and identity controls, to mitigate risks associated with sophisticated cyber threats. This highlights a broader trend across industries where reliance on employee training alone is insufficient to combat evolving threats.For Managed Service Providers (MSPs), these developments present both challenges and opportunities. The increasing complexity of cyber threats necessitates a shift towards operational models that prioritize continuous verification and behavioral analysis over traditional detection methods. MSPs can leverage this moment to guide organizations in developing effective cybersecurity strategies that address the preparedness gap, ensuring that clients are equipped to handle the evolving landscape of AI-driven attacks. Four things to know today00:00 AI-Powered Attacks Accelerate as SMB Security Transitions Toward Autonomous SOC Models, Exposing a Governance Gap Around Shadow AI06:43 Retail Executives Report Rising AI-Driven Threats and Low Preparedness, Underscoring the Shift from User Training to Resilience08:50 Stealthier North Korean Campaigns and a Fragmented Ransomware Ecosystem Signal Rising Detection Challenges for MSPs11:49 Cork's New Vantage Platform Targets Unified MSP Risk Validation — But Its Visibility Metrics Demand Scrutiny This is the Business of Tech.     Supported by:  https://mailprotector.com/mspradio/

The Cybersecurity Defenders Podcast
#268 - Intel Chat: LLM integration in malware, Android spyware family LandFall, Windows kernel zero-day flaw & Ex-L3Harris executive sells trade secrets

The Cybersecurity Defenders Podcast

Play Episode Listen Later Nov 17, 2025 42:06


In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.Google's Threat Intelligence Group has observed a significant shift in 2025, threat actors are no longer using AI to just speed up operations, they are now integrating LLMs directly into the malware.Unit 42 has identified a previously undocumented Android spyware family, named LandFall, discovered during an investigation into iOS exploit chains involving malicious DNG images.Microsoft's November Patch Tuesday rollout includes fixes for over 60 vulnerabilities, one of which is a zero-day privilege escalation flaw in the Windows kernel that has already been exploited in the wild.Former executive at L3Harris Trenchant, Peter Williams, has pleaded guilty in U.S. federal court to selling 8 trade secrets valued at over 1.3 million to a Russian-based software broker involved in the zero-day exploit market.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform.This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.

Cybercrime Magazine Podcast
Cybercrime News For Nov. 17, 2025. Europol Takes Down 1,000+ Malware Servers. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Nov 17, 2025 2:45


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

Cyber Crime Junkies
BEHIND SCENES of REAL Data Breach Response

Cyber Crime Junkies

Play Episode Listen Later Nov 13, 2025 60:09 Transcription Available


What really happens during a cyber attack? Not the Hollywood version — the real one. The kind businesses experience every single day when a single compromised password, phishing email, or zero-day vulnerability ignites a full-scale crisis.In this full episode, we take you inside the anatomy of a real data breach with digital first responders from NetGain Technologies — the cybersecurity professionals who live inside ransomware events, Business Email Compromise (BEC) incidents, and wire-fraud attacks every week.You'll see how attacks start, how fast they spread, what attackers do once they're inside your email, and the exact steps that decide whether a company recovers… or collapses.What You'll Learn: • How a phishing email turns into credential theft and internal compromise • Why Business Email Compromise (BEC) is now the #2 most expensive breach type • The tricks attackers use to hide inside inboxes and impersonate executives • How wire transfer fraud really happens — and how the 2-person rule stops it • What zero-days look like in the wild (and why patches aren't enough) • The role of MFA, phishing-resistant MFA, email controls, and layered security • Why backups must be immutable, air-gapped, and isolated • How incident response teams contain malware without destroying evidence • When to call cyber insurance, law enforcement, and breach counsel • The IR playbook: detection → containment → communication → forensics → recovery • Why every business — no matter how small — IS a target⌚ CHAPTERS 00:00 – Intro: What BEC Really Looks Like Today 03:42 – How One Email Starts the Attack Chain 11:20 – Why Finance Teams Are Target #1 19:05 – The Social Engineering Playbook 27:48 – Live Breakdown of a Real BEC Incident 38:22 – What Happens During Wire Fraud Recovery 46:10 – Technical Controls That Actually Work 55:36 – How to Build a No-NonsSend us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show

New Money Review podcast
Unseen Money 14—the AI malware threat

New Money Review podcast

Play Episode Listen Later Nov 13, 2025 28:50


Last week, Google's threat intelligence group warned that artificial intelligence (AI) is making malware attacks more dangerous. [Malware is malicious software—programmes designed to disrupt, damage or gain unauthorised access to computer systems—usually delivered via phishing emails, compromised websites or infected downloads]“Adversaries are no longer leveraging artificial intelligence (AI) just for productivity gains, they are deploying novel AI-enabled malware in active operations,” Google said in a 5000-word blog.Are malware programmes using Large Language Models (LLMs) to dynamically generate malicious scripts, obfuscate their own code to evade detection, and leverage AI models to create malicious functions on demand, as Google warns? Or it this yet another case of tech firms selling solutions to a problem they have created themselves?Listen to the latest episode of Unseen Money from New Money Review, featuring co-hosts Timur Yunusov and Paul Amery, to hear more about the effect of AI malware.In the podcast, we cover:Google's warning about the rise of AI malware – reality or hype? (2' 35”)Why LLMs were originally protected from harmful behaviour (4' 10”)How criminals learned to develop LLMs without guardrails (4' 55”)Model context protocols (MCPs) and AI agents as offensive tools (5' 30”)Malicious payloads and web application firewalls (7' 35”)Tricking LLMs by exploiting the wide range of input variables (8' 30”)The state of the art for fraudsters when using LLMs (10' 10”)Timur used AI to learn how to drain funds from a stolen phone (11' 05”)How worried is Timur about the rise of AI malware? (14' 20”)AI has dramatically reduced the cost and increased the speed of producing malware (15')AI, teenage suicides and protecting users (16' 50”)AI for good: using AI to combat AI malware (19')How a Russian bank used AI chatbots to divert fraudsters (19' 40”)Data poisoning—manipulating the training data for AI models (22' 10”)Techniques for tricking LLMs (23')Only state actors can manipulate AI models at scale (25' 40”)The use of SMS blasters by fraudsters is exploding! (27')

Metaverse Marketing
AI Does its Own Reputation Spin, Google's AI Data Edge, The AI Slop Crisis, Self-Coding Malware, TED Next, Cathy Headlines Female Quotient's AI Summit and interview on Cuffing Season 2.0 & Dating Tech with Myles Slayton of Cerca

Metaverse Marketing

Play Episode Listen Later Nov 12, 2025 62:41


As AI systems start rewriting their own code and sanitising negative news about themselves, the line between control and autonomy is blurring. In this episode of TechMagic, hosts Cathy Hackl and Lee Kebler explore the unsettling rise of AI self-management, Google's growing edge over OpenAI through real-world data, and the “AI slop spiral” threatening to degrade the entire internet. They also examine malware that now uses AI to rewrite its own code, an alarming glimpse into adversarial AI. The episode also includes Cathy's exciting interview with Myles Slayton, CEO of Cerca Dating, to explore how mutual-based dating is redefining online connections through trust and community. From Gen Z's new dating habits to the irreplaceable value of human imperfection, this episode dives deep into what's next for both AI and authenticity.Come for the tech, and stay for the magic!Myles Slayton BioMyles Slayton is the 23-year-old Co-founder and CEO of Cerca Dating, a mutuals-based dating app revolutionizing how Gen Z approaches online dating. A Georgetown University graduate, Miles founded Circa to address the fatigue and safety concerns plaguing traditional dating applications. With a mission to connect users through trusted friend networks rather than algorithms, Cerca has rapidly scaled to approximately 100,000 users while maintaining a healthy 60%+ female user base.Myles Slayton on LinkedInKey Discussion Topics: 00:00:00 Intro00:06:09 ChatGPT's Automatic Headline Sanitization Exposed00:14:32 The "Dog Eating Its Own Barf" Problem in AI Training00:18:02 Google Wins the AI War with Real-World Data Access00:24:23 OnlyFans Monetization Model & Vylit App Launch00:26:19 The Death of Traditional Dating Apps00:32:02 Circa: The Mutuals-Based Dating App Revolution00:33:21 Cuffing Season 2.0 and Gen Z Dating Trends00:39:15 Trust, Safety & Reputation-Based Dating00:43:50 Why AI Cannot Replicate Human Chemistry00:49:06 Roblox Abuse Lawsuit and Platform Safety Issues00:53:33 AI-Powered Malware Rewriting Its Own Code00:55:03 TEDx Atlanta and the Future of Creativity00:57:50 "Humanity is the Moat Around the Machines"00:58:50 Cathy's Gulf States Roadshow & CES 2025 Plans01:01:4 What We're Watching: Pluribus & The Spatial Race01:02:16 Key Takeaways & Final Thoughts Hosted on Acast. See acast.com/privacy for more information.

Risky Business News
Between Two Nerds: Why AI in malware is lame

Risky Business News

Play Episode Listen Later Nov 10, 2025 29:54


In this edition of Between Two Nerds Tom Uren and The Grugq discuss how cyber criminals and even state actors are being dumb about using AI. This episode is also available on Youtube. Show notes Google's AI Threat Tracker Script framework

Paul's Security Weekly
AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune and Jason Wood - SWN #527

Paul's Security Weekly

Play Episode Listen Later Nov 7, 2025 44:40


This week we have AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune, Jason Wood, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-527

Paul's Security Weekly TV
AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune and Jason Wood - SWN #527

Paul's Security Weekly TV

Play Episode Listen Later Nov 7, 2025 44:40


This week we have AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune, Jason Wood, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-527

Hack Naked News (Audio)
AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune and Jason Wood - SWN #527

Hack Naked News (Audio)

Play Episode Listen Later Nov 7, 2025 44:40


This week we have AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune, Jason Wood, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-527

Hack Naked News (Video)
AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune and Jason Wood - SWN #527

Hack Naked News (Video)

Play Episode Listen Later Nov 7, 2025 44:40


This week we have AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune, Jason Wood, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-527

Cybercrime Magazine Podcast
Cybercrime News For Nov. 6, 2025. Google Reports First AI-Powered Malware Attack. WCYB Digital Radio

Cybercrime Magazine Podcast

Play Episode Listen Later Nov 6, 2025 3:31


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

SECURE AF
Atroposia RAT: The Malware That Scans for Its Own Exploits

SECURE AF

Play Episode Listen Later Nov 5, 2025 6:11


Got a question or comment? Message us here!

Passwort - der Podcast von heise security
News mit Serialisierungsproblemen, AWS-Fail und PKI-Extra

Passwort - der Podcast von heise security

Play Episode Listen Later Nov 5, 2025 133:58 Transcription Available


Es näselt leicht im Podcast - die herbstliche Erkältungswelle macht auch vor "Passwort" nicht halt. Trotzdem haben sich Sylvester und Christopher einiges vorgenommen. Sie sprechen über den AWS- und Azure-Ausfall der letzten Wochen, denn auch Verfügbarkeit ist Teil der IT-Sicherheit. Die kritische Sicherheitslücke im Windows-Updateserver WSUS kommt ebenso zur Sprache wie eine trickreiche Malware, die eine wenig bekannte UTF8-Funktion zu ihrem Vorteil nutzt. Und endlich gibt es wieder ein PKI-Thema: Wie eine kroatische CA widerrechtlich Zertifikate für Cloudflare ausstellte, erzählt Christopher dem Publikum und seinem Co-Host. - Online Themenabend: https://aktionen.heise.de/heise-themenabend - AWS' Ausfallanalyse: https://aws.amazon.com/de/message/101925/ - Meredith Whittaker von Signal zur Notwendigkeit der Hyperscaler: https://mastodon.world/@Mer__edith/115445701583902092 - SAP spielt CVSS-Würfeln: https://services.nvd.nist.gov/rest/json/cvehistory/2.0?cveId=CVE-2025-30012 - Microsoft warnt Entwickler vor SoapFormatter: https://learn.microsoft.com/en-us/dotnet/standard/serialization/binaryformatter-security-guide - Koi über GlassWorm: https://www.koi.ai/blog/glassworm-first-self-propagating-worm-using-invisible-code-hits-openvsx-marketplace - QWAC mit Soße (+): https://www.heise.de/select/ct/2023/29/2332409110101310744 - Diskussion um FINA im Bugzilla: https://bugzilla.mozilla.org/show_bug.cgi?id=1986968 - Folgt uns im Fediverse: * @christopherkunz@chaos.social * @syt@social.heise.de

The CyberWire
The Malware Mash!

The CyberWire

Play Episode Listen Later Oct 31, 2025 3:06


Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video ⁠here⁠. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight  for my malware threat score began to rise  and suddenly to my surprise... It did the Mash  It did the Malware Mash  The Malware Mash  It was a botnet smash  It did the Mash  It caught on 'cause of Flash  The Malware Mash  It did the Malware Mash From the Stuxnet worm squirming toward the near east  to the dark web souqs where the script kiddies feast  the APTs left their humble abodes  to get installed from rootkit payloads.  They did the Mash  They did the Malware Mash  The Malware Mash  It was an adware smash  They did the Mash  It caught on 'cause of Flash  The Malware Mash  They did the Malware Mash The botnets were having fun  The DDoS had just begun  The viruses hit the darknet,  with ransomware yet to come.  The keys were logging, phishing emails abound,  Snowden on chains, backed by his Russian hounds.  The Shadow Brokers were about to arrive  with their vocal group, "The NotPetya Five." They did the Mash  They played the Malware Mash The Malware Mash  It was a botnet smash  They did the Mash  It caught on 'cause of Flash  The Malware Mash  They played the Malware Mash Somewhere in Moscow Vlad's voice did ring  Seems he was troubled by just one thing.  He opened a shell then shook his fist  and said, "Whatever happened to my Turla Trojan twist."  It's now the Mash  It's now the Malware Mash  The Malware Mash  And it's a botnet smash  It's now the Mash  It caught on 'cause of Flash  The Malware Mash  It's now the Malware Mash Now everything's cool, Vlad's a part of the band  And the Malware Mash is the hit of the land.  For you, defenders, this mash was meant to  when you get to my door, tell them Creeper sent you. Then you can Mash  Then you can Malware Mash  The Malware Mash  And be a botnet smash  It is the Mash  Don't you dare download Flash  The Malware Mash  Just do the Malware Mash Learn more about your ad choices. Visit megaphone.fm/adchoices

Hacking Humans
The Malware Mash!

Hacking Humans

Play Episode Listen Later Oct 31, 2025 3:06


Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video ⁠here⁠. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight  for my malware threat score began to rise  and suddenly to my surprise... It did the Mash  It did the Malware Mash  The Malware Mash  It was a botnet smash  It did the Mash  It caught on 'cause of Flash  The Malware Mash  It did the Malware Mash From the Stuxnet worm squirming toward the near east  to the dark web souqs where the script kiddies feast  the APTs left their humble abodes  to get installed from rootkit payloads.  They did the Mash  They did the Malware Mash  The Malware Mash  It was an adware smash  They did the Mash  It caught on 'cause of Flash  The Malware Mash  They did the Malware Mash The botnets were having fun  The DDoS had just begun  The viruses hit the darknet,  with ransomware yet to come.  The keys were logging, phishing emails abound,  Snowden on chains, backed by his Russian hounds.  The Shadow Brokers were about to arrive  with their vocal group, "The NotPetya Five." They did the Mash  They played the Malware Mash The Malware Mash  It was a botnet smash  They did the Mash  It caught on 'cause of Flash  The Malware Mash  They played the Malware Mash Somewhere in Moscow Vlad's voice did ring  Seems he was troubled by just one thing.  He opened a shell then shook his fist  and said, "Whatever happened to my Turla Trojan twist."  It's now the Mash  It's now the Malware Mash  The Malware Mash  And it's a botnet smash  It's now the Mash  It caught on 'cause of Flash  The Malware Mash  It's now the Malware Mash Now everything's cool, Vlad's a part of the band  And the Malware Mash is the hit of the land.  For you, defenders, this mash was meant to  when you get to my door, tell them Creeper sent you. Then you can Mash  Then you can Malware Mash  The Malware Mash  And be a botnet smash  It is the Mash  Don't you dare download Flash  The Malware Mash  Just do the Malware Mash

The CyberWire
Dial M for malware.

The CyberWire

Play Episode Listen Later Oct 30, 2025 26:19


A Texas telecom confirms a nation-state attack. A global outage disrupts Azure and Microsoft 365 services.  Malicious npm packages steal sensitive data from Windows, Linux, and macOS systems.  Hacktivists have breached multiple critical infrastructure systems across Canada. Major chipmakers spill the TEE. TP-Link home routers fall under federal scrutiny. Cloud Atlas targets Russia's agricultural sector. Israel's cloud computing deal with Google and Amazon allegedly includes a secret “winking mechanism.”The FCC tamps down on overseas robocalls. Mike Anderson, from Netskope, discusses why CIOs should think like HR leaders when considering Agentic AI. Danes Draw the line at digital doppelgängers.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Mike Anderson, Netskope's Chief Digital and Information Officer, to discuss why CIOs must think like HR leaders when considering Agentic AI. Selected Reading US company with access to biggest telecom firms uncovers breach by nation-state hackers (Reuters) Huge Microsoft outage hit 365, Xbox, and beyond — deployment of fix for Azure breakdown rolled out (Tom's Hardware) Malicious NPM packages fetch infostealer for Windows, Linux, macOS (Bleeping Computer) Canada says hacktivists breached water and energy facilities (Bleeping Computer) New physical attacks are quickly diluting secure enclave defenses from Nvidia, AMD, and Intel (Ars Technica) U.S. agencies back banning top-selling home routers on security grounds (The Washington Post) Cloud Atlas hackers target Russian agriculture sector ahead of industry forum (The Record) Revealed: Israel demanded Google and Amazon use secret ‘wink' to sidestep legal orders (The Guardian) FCC adopts new rule targeting robocalls (The Record) Denmark to tackle deepfakes by giving people copyright to their own features (The Guardian) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Hacker And The Fed
YouTube Tutorials or Malware Traps? Don't Click That Link”

Hacker And The Fed

Play Episode Listen Later Oct 30, 2025 49:11


This week, Chris and Hector dive into a wild mix of cyber chaos — from 3,000 malware-laced YouTube videos to a former L3 Harris exec accused of selling U.S. cyber weapons to Russia for crypto. They break down the “YouTube Ghost Network,” insider espionage, and why agentic AI browsers might be your next biggest threat. Join our new Patreon! ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.patreon.com/c/hackerandthefed⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Send HATF your questions at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠questions@hackerandthefed.com

Unspoken Security
Bringing Humanity to Security (Rerun of Episode 22)

Unspoken Security

Play Episode Listen Later Oct 30, 2025 43:41 Transcription Available


In this episode of Unspoken Security, host A.J. Nash sits down with Dominic Vogel, founder of Vogel Leadership & Coaching, to discuss the importance of bringing humanity back into the cybersecurity field. Dominic shares his journey from corporate burnout to becoming an advocate for kindness and authenticity in an industry often focused on metrics and technology.Dominic explains how leading with empathy and building real, human connections can transform the workplace. He emphasizes that in a high-stress field like cybersecurity, creating positive environments is crucial for maintaining mental well-being and productivity. The conversation also touches on Dominic's leadership approach, where he prioritizes relationships and kindness over traditional, rigid business strategies. Tune in to learn how Dominic is reshaping cybersecurity leadership by focusing on people first, showing that a human-centered approach can lead to long-term success in both business and personal life.Send us a textSupport the show

Cybersecurity Where You Are
Episode 159: The Scariest Malware of 2025

Cybersecurity Where You Are

Play Episode Listen Later Oct 29, 2025 34:48


In episode 159 of Cybersecurity Where You Are, Sean Atkinson is joined by Joshua Palsgraf, Sr. Cyber Threat Intelligence Analyst at the Center for Internet Security® (CIS®), and Randy Rose, Vice President of Security Operations & Intelligence at CIS. Together, they dive into the scariest malware of 2025 in this special Halloween edition.The conversation explores what makes today's malware truly terrifying, from stealthy threats that hide in plain sight to modular malware that evolves faster than defenses can adapt. The trio also discusses the corporatization of cybercrime, the rise of Malware as a Service, and how generative artificial intelligence (GenAI) is lowering the barrier to entry for cybercriminals.Here are some highlights from our episode:00:42. Introductions to Josh and Randy02:21. What makes the scariest malware of 2025 truly "scary"05:42. Evolution of malware: people, process, and technology09:33. How the corporatization of malware helps to democratize cybercrime11:25. The most "terrifying" malware strains of 202515:49. Malware reincarnation: Old threats with new masks17:20. GenAI as the great equalizer for cybercriminals, especially social engineers23:32. Defense-in-depth and threat-informed strategies24:45. Why incident response playbooks must evolve and become living documents27:02. What incident response looks like for cloud assets in the Fourth Industrial Revolution29:27. Naming malware after horror movie iconsResourcesMulti-State Information Sharing and Analysis Center®Episode 144: Carrying on the MS-ISAC's Character and CultureEpisode 126: A Day in the Life of a CTI AnalystA Short Guide for Spotting Phishing AttemptsThe CIS Security Operations Center (SOC): The Key to Growing Your SLTT's Cyber MaturityEpisode 157: How a Modern, Mission-Driven CIRT OperatesLiving Off the Land: Scheduled TasksCyber defenders sound the alarm as F5 hack exposes broad risksEpisode 134: How GenAI Lowers Bar for Cyber Threat ActorsActive Lumma Stealer Campaign Impacting U.S. SLTTsMS-ISAC Member-Reported Phishing Likely from Tycoon2FA PhaaSClickFix: An Adaptive Social Engineering TechniqueTop 10 Malware Q1 2025CTAs Leveraging Fake Browser Updates in Malware CampaignsItalian police freeze cash from AI-voice scam that targeted business leadersCornCon Cybersecurity ConferenceIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

Reimagining Cyber
The Nastiest Malware of 2025 - Ep 173

Reimagining Cyber

Play Episode Listen Later Oct 29, 2025 19:16


In this chilling Halloween special of Reimagining Cyber, cybersecurity expert Tyler Moffitt counts down the nastiest pieces of malware that defined 2025 — and the identity-driven attacks reshaping the threat landscape.From AI-powered social engineering to ransomware “lawyer buttons”, this year's cybercriminals blurred the line between hacking networks and hacking people. Tyler breaks down how attacks moved inside the perimeter — exploiting trust, voice, and identity — and what that means for businesses of every size.Plus, Tyler shares a realistic survival playbook for modern threats — from identity hardening and privilege reduction to tabletop drills against voice scams and “click-fix” lures.“The perimeter is now your people,” Tyler warns — and AI is supercharging the threat.This episode drops ahead of Tyler's live webinar on October 30, where he'll go even deeper into the 2025 malware report.Link to the webinar:https://www.brighttalk.com/webcast/8241/646661?q=smb-cyber-securityFollow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70 Chief Information Security Officer CISO Podcasts rankings.

SECURE AF
CAPTCHA Con: Hackers' Evolving ClickFix Malware Trap

SECURE AF

Play Episode Listen Later Oct 29, 2025 7:50


Got a question or comment? Message us here!“I'm not a robot.”

Cyber Security Headlines
Android malware types like a human, sanctions weaken cyber ecosystems, side-channel extracts Intel, AMD secrets

Cyber Security Headlines

Play Episode Listen Later Oct 29, 2025 7:41


New Android malware types like a human Sanctions weaken nation-state cyber ecosystems Side-channel attack extracts Intel, AMD secrets Huge thanks to our sponsor, Conveyor Have you been personally victimized by a questionnaire this week? The queue never ends. But Conveyor can change that story. With AI that answers questionnaires of any format, and a trust center that handles document sharing, security reviews get done without the stress. Feel calm in the chaos with Conveyor. Learn more at www.conveyor.com.

The Other Side Of The Firewall
Malware, Misdirection, and Missed Paychecks

The Other Side Of The Firewall

Play Episode Listen Later Oct 29, 2025 57:56


In this episode, Ryan Williams Sr. and Shannon Tynes discuss the latest cybersecurity threats, including the YouTube Ghost Network, which has over 3000 malicious videos designed to trap users into downloading malware. They also explore the rise of fake job postings used by cybercriminals to steal credentials, particularly during the current government shutdown, which has led to an 85% increase in cyberattacks against U.S. agencies. The hosts share personal experiences with phishing scams and emphasize the importance of vigilance in the digital age. Article: 3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation https://thehackernews.com/2025/10/3000-youtube-videos-exposed-as-malware.html?m=1 Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials https://cybersecuritynews.com/google-warns-of-threat-actors-using-fake-job-posting/amp/ Shutdown Sparks 85% Increase in US Government Cyberattacks https://www.darkreading.com/cybersecurity-operations/shutdown-increase-us-government-cyberattacks Buy the guide: https://www.theothersideofthefirewall.com/ Please LISTEN

TechTimeRadio
Radio Edit: 273: TechTime Radio: Tech turns terrifying: cloud crashes, robot takeovers, satellite leaks, AI love, ghost-seeing Teslas, doorbell surveillance, and blockchain malware. One failure can haunt everything. Tune in—if you dare. | Air Date: 10/2

TechTimeRadio

Play Episode Listen Later Oct 28, 2025 55:42 Transcription Available


A Halloween hour of tech that blurs the line between glitch and ghost, convenience and control, comfort and consequence. We move from Amazon's outages and automation plans to AI intimacy, leaky satellites, doorbell surveillance, and malware hidden in blockchains.• AWS outage root cause and ripple effects• Amazon automation projections and workforce impact• Prime settlement refunds and consumer friction• AI cloning of public figures and grief displacement• Mature AI chat, isolation risks and mental health• Satellite comms exposure across aviation and utilities• Ring and Flock integration expanding police access• Blockchain-enabled “etherhiding” for malware delivery• Airline IT grounding and operations fragility• Whiskey tasting notes and pairing with chocolateBecome a Patreon supporter at patreon.com/techtimeradioVisit TechTimeRadio.com and click on the contact page to submit your answer to our Secret SoundSupport the show

TechTimeRadio
273: TechTime Radio: Tech turns terrifying: cloud crashes, robot takeovers, satellite leaks, AI love, ghost-seeing Teslas, doorbell surveillance, and blockchain malware. One failure can haunt everything. Tune in—if you dare. | Air Date: 10/28 - 11/3/25

TechTimeRadio

Play Episode Listen Later Oct 28, 2025 61:53 Transcription Available


Want a Halloween scare that sticks with you after the candy's gone? We're pouring a glass and pulling back the curtain on the creepiest corners of everyday tech: a cloud outage that toppled major apps and smart beds, a Prime refund saga with fine-print timelines, and Amazon's bold plan to swap 600,000 human jobs for robots by 2033. The number that matters isn't the 30 cents shaved off a product; it's the blast radius when a single point of failure hits everything from payments to sleep pods.We go deeper with cybersecurity expert Nick Espinosa to map the new threat surface. He breaks down a jaw-dropping study showing unencrypted geostationary satellite traffic—airline passenger data, critical infrastructure chatter, even U.S. and Mexican military communications—floating for the taking. Then we connect the surveillance dots: Ring's partnership with Flock could feed millions of doorbells into a searchable police network. With Ring's track record, do you want your front porch in a national database accessible by natural-language prompts?The uncanny valley gets crowded too. A widower claims an AI replica of Suzanne Somers “feels indistinguishable,” while OpenAI prepares to allow “mature” content for verified adults. We weigh the supposed benefits against the hard psychology: isolation, distorted attachment, and empathy atrophy. For a lighter fright, we test the viral claim that Teslas see “ghosts” in cemeteries—spoiler: that's what a cautious perception model looks like when tombstones confuse it. The real nightmare? Attackers hiding malware inside blockchain smart contracts, using decentralization to dodge takedowns and $2 fees to keep it cheap.From airline IT meltdowns to smart contract exploits, the pattern is clear: concentration of power and data magnifies risk. Redundancy, privacy-by-design, and failure-aware engineering aren't nice-to-haves—they're the only way through. Grab your headphones and your favorite pour, then join us for a tour of the haunted infrastructure underneath daily life.Enjoyed the ride? Follow, share with a friend, and leave a quick review so more curious listeners can find the show. What scared you most—and what would you fix first?Support the show

WCCO Tech Talk
Protecting Your Computer From Malicious Forces

WCCO Tech Talk

Play Episode Listen Later Oct 26, 2025 38:33


Doug Swinhart and Steve Thomson take your calls on those nagging computer problems. Several questions ask how to protect your tech from malware and other malicious actors. Also, they tackle the latest on some widespread breaches and discuss what to look for when buying a printer.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Tuesday, October 21st, 2025: Syscall() Obfuscation; AWS down; Beijing Time Attack

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Oct 20, 2025 9:17


Using Syscall() for Obfuscation/Fileless Activity Fileless malware written in Python can uses syscall() to create file descriptors in memory, evading signatures. https://isc.sans.edu/diary/Using%20Syscall%28%29%20for%20Obfuscation%20Fileless%20Activity/32384 AWS Outages AWS has had issues most of the day on Monday, affecting numerous services. https://health.aws.amazon.com/health/status Time Server Hack China reports a compromise of its time standard servers. https://thehackernews.com/2025/10/mss-claims-nsa-used-42-cyber-tools-in.html

Cyber Security Today
Critical Security Alerts: TikTok Malware & Europol's SIM Farm Takedown

Cyber Security Today

Play Episode Listen Later Oct 20, 2025 14:42 Transcription Available


In this episode of Cybersecurity Today, host David Shipley covers the latest developments in cyber threats and law enforcement victories. Topics include: cybercriminals using TikTok videos to disseminate malware through click-fix attacks, Europol shutting down a massive SIM farm powering 49 million fake online accounts, and Microsoft's emergency patch release for a critical ASP.NET Core vulnerability rated 9.9 in severity. The episode also highlights community efforts in raising cybersecurity awareness. 00:00 Introduction and Headlines 00:23 TikTok Malware Campaign 03:43 Europol's Major SIM Farm Bust 07:45 Microsoft's Critical ASP.NET Core Vulnerability 11:55 Community Shoutouts and Conclusion

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Monday, October 20th, 2025: Malicious Tiktok; More Google Ad Problems; Satellite Insecurity

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Oct 19, 2025 6:14


TikTok Videos Promoting Malware InstallationTikTok Videos Promoting Malware Installation Tiktok videos advertising ways to obtain software like Photoshop for free will instead trick users into downloading https://isc.sans.edu/diary/TikTok%20Videos%20Promoting%20Malware%20Installation/32380 Google Ads Advertise Malware Targeting MacOS Developers Hunt.io discovered Google ads that pretend to advertise tools like Homebrew and password managers to spread malware https://hunt.io/blog/macos-odyssey-amos-malware-campaign Satellite Transmissions are often unencrypted A large amount of satellite traffic is unencrypted and easily accessible to eavesdropping https://satcom.sysnet.ucsd.edu

The CyberWire
Smile for the malware. [Research Saturday]

The CyberWire

Play Episode Listen Later Oct 18, 2025 28:12


Eclypsium researchers Jesse Michael and Mickey Shkatov to share their work on "BadCam - Now Weaponizing Linux Webcams." Eclypsium researchers disclosed “BadCam,” a set of vulnerabilities in certain Lenovo USB webcams that run Linux and do not validate firmware signatures, allowing attackers to reflash the devices and turn them into BadUSB-style tools. An adversary who supplies a backdoored camera or who gains remote code execution on a host can weaponize the webcam to emulate human-interface devices, inject keystrokes, deliver payloads, and maintain persistence — even re-infecting systems after OS reinstalls. The findings were presented at DEF CON 2025, Lenovo issued updated firmware/tools in coordination with SigmaStar, and researchers warn the same vector could affect other Linux-based USB peripherals, underscoring the need for firmware signing and stronger device attestation. The research can be found here: BadCam: Now Weaponizing Linux Webcams Learn more about your ad choices. Visit megaphone.fm/adchoices