Podcasts about Malware

  • 1,758PODCASTS
  • 6,949EPISODES
  • 38mAVG DURATION
  • 1DAILY NEW EPISODE
  • Nov 8, 2025LATEST
Malware

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Malware

Show all podcasts related to malware

Latest podcast episodes about Malware

INSiDER - Dentro la Tecnologia
La battaglia tra adblocker e pubblicità sta per finire?

INSiDER - Dentro la Tecnologia

Play Episode Listen Later Nov 8, 2025 16:25 Transcription Available


Chiunque ha provato frustrazione navigando in rete, guardando un video, leggendo una notizia, o utilizzando un'applicazione. La causa? Un eccesso sempre più invasivo di pubblicità, pop-up e banner che distolgono l'attenzione e degradano significativamente l'esperienza utente. Su mobile la situazione è ancora peggiore, con siti web talmente pieni di annunci che lo spazio dedicato ai contenuti è ridotto al minimo. Quali sono le soluzioni per conciliare la necessità degli editori di guadagnare con il diritto degli utenti a un'esperienza meno invasiva? In questa puntata approfondiamo cosa sono gli adblocker, come funzionano e quali strategie si stanno sviluppando per trovare un equilibrio tra esigenze commerciali e benessere dell'utente.Nella sezione delle notizie parliamo delle falle di sicurezza informatica scoperte al museo del Louvre, dei progressi di SpaceX per il ritorno sulla Luna e infine della crescita massiccia degli investimenti in data center per l'intelligenza artificiale negli Stati Uniti.--Indice--00:00 - Introduzione00:59 - Le falle nella sicurezza informatica del Louvre (CNET.com, Luca Martinelli)02:18 - I progressi di SpaceX per il ritorno sulla Luna (DDay.it, Matteo Gallo)03:29 - La crescita dei Data Center in USA (Wired.com, Davide Fasoli)04:51 - La battaglia tra adblocker e pubblicità sta per finire? (Luca Martinelli)15:33 - Conclusione--Testo--Leggi la trascrizione: https://www.dentrolatecnologia.it/S7E45#testo--Contatti--• www.dentrolatecnologia.it• Instagram (@dentrolatecnologia)• Telegram (@dentrolatecnologia)• YouTube (@dentrolatecnologia)• redazione@dentrolatecnologia.it--Immagini--• Foto copertina: xvector su Freepik--Brani--• Ecstasy by Rabbit Theft• Omen by Cartoon x Time To Talk (Ft. Asena)

Paul's Security Weekly
AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune and Jason Wood - SWN #527

Paul's Security Weekly

Play Episode Listen Later Nov 7, 2025 44:40


This week we have AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune, Jason Wood, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-527

Paul's Security Weekly TV
AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune and Jason Wood - SWN #527

Paul's Security Weekly TV

Play Episode Listen Later Nov 7, 2025 44:40


This week we have AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune, Jason Wood, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-527

Hack Naked News (Audio)
AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune and Jason Wood - SWN #527

Hack Naked News (Audio)

Play Episode Listen Later Nov 7, 2025 44:40


This week we have AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune, Jason Wood, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-527

Hack Naked News (Video)
AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune and Jason Wood - SWN #527

Hack Naked News (Video)

Play Episode Listen Later Nov 7, 2025 44:40


This week we have AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune, Jason Wood, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-527

The 'X' Zone Radio Show
Rob McConnell Interviews - COREY KNOETTGEN - Cyber Security Expert

The 'X' Zone Radio Show

Play Episode Listen Later Nov 7, 2025 39:00 Transcription Available


Cybersecurity is an essential aspect of our increasingly digital world, focusing on the protection of information systems and networks from unauthorized access, data breaches, and cyber threats. With the rapid advancement of technology, the need for robust cybersecurity measures has become paramount. It involves a combination of proactive measures like implementing firewalls, encryption techniques, and access controls, as well as reactive measures such as incident response and threat intelligence analysis. Cybersecurity professionals work diligently to identify vulnerabilities, develop safeguards, and stay one step ahead of malicious actors, helping to ensure the integrity, confidentiality, and availability of digital assets. As our reliance on technology grows, cybersecurity plays a crucial role in preserving the trust and security of individuals, organizations, and society as a whole.Become a supporter of this podcast: https://www.spreaker.com/podcast/the-x-zone-radio-tv-show--1078348/support.Please note that all XZBN radio and/or television shows are Copyright © REL-MAR McConnell Meda Company, Niagara, Ontario, Canada – www.rel-mar.com. For more Episodes of this show and all shows produced, broadcasted and syndicated from REL-MAR McConell Media Company and The 'X' Zone Broadcast Network and the 'X' Zone TV Channell, visit www.xzbn.net. For programming, distribution, and syndication inquiries, email programming@xzbn.net.We are proud to announce the we have launched TWATNews.com, launched in August 2025.TWATNews.com is an independent online news platform dedicated to uncovering the truth about Donald Trump and his ongoing influence in politics, business, and society. Unlike mainstream outlets that often sanitize, soften, or ignore stories that challenge Trump and his allies, TWATNews digs deeper to deliver hard-hitting articles, investigative features, and sharp commentary that mainstream media won't touch.These are stories and articles that you will not read anywhere else.Our mission is simple: to expose corruption, lies, and authoritarian tendencies while giving voice to the perspectives and evidence that are often marginalized or buried by corporate-controlled media

Cybercrime Magazine Podcast
Cybercrime News For Nov. 6, 2025. Google Reports First AI-Powered Malware Attack. WCYB Digital Radio

Cybercrime Magazine Podcast

Play Episode Listen Later Nov 6, 2025 3:31


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

SECURE AF
Atroposia RAT: The Malware That Scans for Its Own Exploits

SECURE AF

Play Episode Listen Later Nov 5, 2025 6:11


Got a question or comment? Message us here!

Passwort - der Podcast von heise security
News mit Serialisierungsproblemen, AWS-Fail und PKI-Extra

Passwort - der Podcast von heise security

Play Episode Listen Later Nov 5, 2025 133:58 Transcription Available


Es näselt leicht im Podcast - die herbstliche Erkältungswelle macht auch vor "Passwort" nicht halt. Trotzdem haben sich Sylvester und Christopher einiges vorgenommen. Sie sprechen über den AWS- und Azure-Ausfall der letzten Wochen, denn auch Verfügbarkeit ist Teil der IT-Sicherheit. Die kritische Sicherheitslücke im Windows-Updateserver WSUS kommt ebenso zur Sprache wie eine trickreiche Malware, die eine wenig bekannte UTF8-Funktion zu ihrem Vorteil nutzt. Und endlich gibt es wieder ein PKI-Thema: Wie eine kroatische CA widerrechtlich Zertifikate für Cloudflare ausstellte, erzählt Christopher dem Publikum und seinem Co-Host. - Online Themenabend: https://aktionen.heise.de/heise-themenabend - AWS' Ausfallanalyse: https://aws.amazon.com/de/message/101925/ - Meredith Whittaker von Signal zur Notwendigkeit der Hyperscaler: https://mastodon.world/@Mer__edith/115445701583902092 - SAP spielt CVSS-Würfeln: https://services.nvd.nist.gov/rest/json/cvehistory/2.0?cveId=CVE-2025-30012 - Microsoft warnt Entwickler vor SoapFormatter: https://learn.microsoft.com/en-us/dotnet/standard/serialization/binaryformatter-security-guide - Koi über GlassWorm: https://www.koi.ai/blog/glassworm-first-self-propagating-worm-using-invisible-code-hits-openvsx-marketplace - QWAC mit Soße (+): https://www.heise.de/select/ct/2023/29/2332409110101310744 - Diskussion um FINA im Bugzilla: https://bugzilla.mozilla.org/show_bug.cgi?id=1986968 - Folgt uns im Fediverse: * @christopherkunz@chaos.social * @syt@social.heise.de

The CyberWire
The Malware Mash!

The CyberWire

Play Episode Listen Later Oct 31, 2025 3:06


Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video ⁠here⁠. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight  for my malware threat score began to rise  and suddenly to my surprise... It did the Mash  It did the Malware Mash  The Malware Mash  It was a botnet smash  It did the Mash  It caught on 'cause of Flash  The Malware Mash  It did the Malware Mash From the Stuxnet worm squirming toward the near east  to the dark web souqs where the script kiddies feast  the APTs left their humble abodes  to get installed from rootkit payloads.  They did the Mash  They did the Malware Mash  The Malware Mash  It was an adware smash  They did the Mash  It caught on 'cause of Flash  The Malware Mash  They did the Malware Mash The botnets were having fun  The DDoS had just begun  The viruses hit the darknet,  with ransomware yet to come.  The keys were logging, phishing emails abound,  Snowden on chains, backed by his Russian hounds.  The Shadow Brokers were about to arrive  with their vocal group, "The NotPetya Five." They did the Mash  They played the Malware Mash The Malware Mash  It was a botnet smash  They did the Mash  It caught on 'cause of Flash  The Malware Mash  They played the Malware Mash Somewhere in Moscow Vlad's voice did ring  Seems he was troubled by just one thing.  He opened a shell then shook his fist  and said, "Whatever happened to my Turla Trojan twist."  It's now the Mash  It's now the Malware Mash  The Malware Mash  And it's a botnet smash  It's now the Mash  It caught on 'cause of Flash  The Malware Mash  It's now the Malware Mash Now everything's cool, Vlad's a part of the band  And the Malware Mash is the hit of the land.  For you, defenders, this mash was meant to  when you get to my door, tell them Creeper sent you. Then you can Mash  Then you can Malware Mash  The Malware Mash  And be a botnet smash  It is the Mash  Don't you dare download Flash  The Malware Mash  Just do the Malware Mash Learn more about your ad choices. Visit megaphone.fm/adchoices

Hacking Humans
The Malware Mash!

Hacking Humans

Play Episode Listen Later Oct 31, 2025 3:06


Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video ⁠here⁠. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight  for my malware threat score began to rise  and suddenly to my surprise... It did the Mash  It did the Malware Mash  The Malware Mash  It was a botnet smash  It did the Mash  It caught on 'cause of Flash  The Malware Mash  It did the Malware Mash From the Stuxnet worm squirming toward the near east  to the dark web souqs where the script kiddies feast  the APTs left their humble abodes  to get installed from rootkit payloads.  They did the Mash  They did the Malware Mash  The Malware Mash  It was an adware smash  They did the Mash  It caught on 'cause of Flash  The Malware Mash  They did the Malware Mash The botnets were having fun  The DDoS had just begun  The viruses hit the darknet,  with ransomware yet to come.  The keys were logging, phishing emails abound,  Snowden on chains, backed by his Russian hounds.  The Shadow Brokers were about to arrive  with their vocal group, "The NotPetya Five." They did the Mash  They played the Malware Mash The Malware Mash  It was a botnet smash  They did the Mash  It caught on 'cause of Flash  The Malware Mash  They played the Malware Mash Somewhere in Moscow Vlad's voice did ring  Seems he was troubled by just one thing.  He opened a shell then shook his fist  and said, "Whatever happened to my Turla Trojan twist."  It's now the Mash  It's now the Malware Mash  The Malware Mash  And it's a botnet smash  It's now the Mash  It caught on 'cause of Flash  The Malware Mash  It's now the Malware Mash Now everything's cool, Vlad's a part of the band  And the Malware Mash is the hit of the land.  For you, defenders, this mash was meant to  when you get to my door, tell them Creeper sent you. Then you can Mash  Then you can Malware Mash  The Malware Mash  And be a botnet smash  It is the Mash  Don't you dare download Flash  The Malware Mash  Just do the Malware Mash

The CyberWire
Dial M for malware.

The CyberWire

Play Episode Listen Later Oct 30, 2025 26:19


A Texas telecom confirms a nation-state attack. A global outage disrupts Azure and Microsoft 365 services.  Malicious npm packages steal sensitive data from Windows, Linux, and macOS systems.  Hacktivists have breached multiple critical infrastructure systems across Canada. Major chipmakers spill the TEE. TP-Link home routers fall under federal scrutiny. Cloud Atlas targets Russia's agricultural sector. Israel's cloud computing deal with Google and Amazon allegedly includes a secret “winking mechanism.”The FCC tamps down on overseas robocalls. Mike Anderson, from Netskope, discusses why CIOs should think like HR leaders when considering Agentic AI. Danes Draw the line at digital doppelgängers.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Mike Anderson, Netskope's Chief Digital and Information Officer, to discuss why CIOs must think like HR leaders when considering Agentic AI. Selected Reading US company with access to biggest telecom firms uncovers breach by nation-state hackers (Reuters) Huge Microsoft outage hit 365, Xbox, and beyond — deployment of fix for Azure breakdown rolled out (Tom's Hardware) Malicious NPM packages fetch infostealer for Windows, Linux, macOS (Bleeping Computer) Canada says hacktivists breached water and energy facilities (Bleeping Computer) New physical attacks are quickly diluting secure enclave defenses from Nvidia, AMD, and Intel (Ars Technica) U.S. agencies back banning top-selling home routers on security grounds (The Washington Post) Cloud Atlas hackers target Russian agriculture sector ahead of industry forum (The Record) Revealed: Israel demanded Google and Amazon use secret ‘wink' to sidestep legal orders (The Guardian) FCC adopts new rule targeting robocalls (The Record) Denmark to tackle deepfakes by giving people copyright to their own features (The Guardian) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Hacker And The Fed
YouTube Tutorials or Malware Traps? Don't Click That Link”

Hacker And The Fed

Play Episode Listen Later Oct 30, 2025 49:11


This week, Chris and Hector dive into a wild mix of cyber chaos — from 3,000 malware-laced YouTube videos to a former L3 Harris exec accused of selling U.S. cyber weapons to Russia for crypto. They break down the “YouTube Ghost Network,” insider espionage, and why agentic AI browsers might be your next biggest threat. Join our new Patreon! ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.patreon.com/c/hackerandthefed⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Send HATF your questions at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠questions@hackerandthefed.com

Unspoken Security
Bringing Humanity to Security (Rerun of Episode 22)

Unspoken Security

Play Episode Listen Later Oct 30, 2025 43:41 Transcription Available


In this episode of Unspoken Security, host A.J. Nash sits down with Dominic Vogel, founder of Vogel Leadership & Coaching, to discuss the importance of bringing humanity back into the cybersecurity field. Dominic shares his journey from corporate burnout to becoming an advocate for kindness and authenticity in an industry often focused on metrics and technology.Dominic explains how leading with empathy and building real, human connections can transform the workplace. He emphasizes that in a high-stress field like cybersecurity, creating positive environments is crucial for maintaining mental well-being and productivity. The conversation also touches on Dominic's leadership approach, where he prioritizes relationships and kindness over traditional, rigid business strategies. Tune in to learn how Dominic is reshaping cybersecurity leadership by focusing on people first, showing that a human-centered approach can lead to long-term success in both business and personal life.Send us a textSupport the show

Cyber Morning Call
896 - PhantomRaven: campanha de malware explora falha nas dependências remotas do npm

Cyber Morning Call

Play Episode Listen Later Oct 30, 2025 4:20


Referências do EpisódioPhantomRaven: NPM Malware Hidden in Invisible DependenciesFrom Scripts to Systems: A Comprehensive Look at Tangerine Turkey OperationsSuspected Nation-State Threat Actor Uses New Airstalk Malware in a Supply Chain AttackRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia

Cybersecurity Where You Are
Episode 159: The Scariest Malware of 2025

Cybersecurity Where You Are

Play Episode Listen Later Oct 29, 2025 34:48


In episode 159 of Cybersecurity Where You Are, Sean Atkinson is joined by Joshua Palsgraf, Sr. Cyber Threat Intelligence Analyst at the Center for Internet Security® (CIS®), and Randy Rose, Vice President of Security Operations & Intelligence at CIS. Together, they dive into the scariest malware of 2025 in this special Halloween edition.The conversation explores what makes today's malware truly terrifying, from stealthy threats that hide in plain sight to modular malware that evolves faster than defenses can adapt. The trio also discusses the corporatization of cybercrime, the rise of Malware as a Service, and how generative artificial intelligence (GenAI) is lowering the barrier to entry for cybercriminals.Here are some highlights from our episode:00:42. Introductions to Josh and Randy02:21. What makes the scariest malware of 2025 truly "scary"05:42. Evolution of malware: people, process, and technology09:33. How the corporatization of malware helps to democratize cybercrime11:25. The most "terrifying" malware strains of 202515:49. Malware reincarnation: Old threats with new masks17:20. GenAI as the great equalizer for cybercriminals, especially social engineers23:32. Defense-in-depth and threat-informed strategies24:45. Why incident response playbooks must evolve and become living documents27:02. What incident response looks like for cloud assets in the Fourth Industrial Revolution29:27. Naming malware after horror movie iconsResourcesMulti-State Information Sharing and Analysis Center®Episode 144: Carrying on the MS-ISAC's Character and CultureEpisode 126: A Day in the Life of a CTI AnalystA Short Guide for Spotting Phishing AttemptsThe CIS Security Operations Center (SOC): The Key to Growing Your SLTT's Cyber MaturityEpisode 157: How a Modern, Mission-Driven CIRT OperatesLiving Off the Land: Scheduled TasksCyber defenders sound the alarm as F5 hack exposes broad risksEpisode 134: How GenAI Lowers Bar for Cyber Threat ActorsActive Lumma Stealer Campaign Impacting U.S. SLTTsMS-ISAC Member-Reported Phishing Likely from Tycoon2FA PhaaSClickFix: An Adaptive Social Engineering TechniqueTop 10 Malware Q1 2025CTAs Leveraging Fake Browser Updates in Malware CampaignsItalian police freeze cash from AI-voice scam that targeted business leadersCornCon Cybersecurity ConferenceIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

Reimagining Cyber
The Nastiest Malware of 2025 - Ep 173

Reimagining Cyber

Play Episode Listen Later Oct 29, 2025 19:16


In this chilling Halloween special of Reimagining Cyber, cybersecurity expert Tyler Moffitt counts down the nastiest pieces of malware that defined 2025 — and the identity-driven attacks reshaping the threat landscape.From AI-powered social engineering to ransomware “lawyer buttons”, this year's cybercriminals blurred the line between hacking networks and hacking people. Tyler breaks down how attacks moved inside the perimeter — exploiting trust, voice, and identity — and what that means for businesses of every size.Plus, Tyler shares a realistic survival playbook for modern threats — from identity hardening and privilege reduction to tabletop drills against voice scams and “click-fix” lures.“The perimeter is now your people,” Tyler warns — and AI is supercharging the threat.This episode drops ahead of Tyler's live webinar on October 30, where he'll go even deeper into the 2025 malware report.Link to the webinar:https://www.brighttalk.com/webcast/8241/646661?q=smb-cyber-securityFollow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70 Chief Information Security Officer CISO Podcasts rankings.

SECURE AF
CAPTCHA Con: Hackers' Evolving ClickFix Malware Trap

SECURE AF

Play Episode Listen Later Oct 29, 2025 7:50


Got a question or comment? Message us here!“I'm not a robot.”

Cyber Security Headlines
Android malware types like a human, sanctions weaken cyber ecosystems, side-channel extracts Intel, AMD secrets

Cyber Security Headlines

Play Episode Listen Later Oct 29, 2025 7:41


New Android malware types like a human Sanctions weaken nation-state cyber ecosystems Side-channel attack extracts Intel, AMD secrets Huge thanks to our sponsor, Conveyor Have you been personally victimized by a questionnaire this week? The queue never ends. But Conveyor can change that story. With AI that answers questionnaires of any format, and a trust center that handles document sharing, security reviews get done without the stress. Feel calm in the chaos with Conveyor. Learn more at www.conveyor.com.

The Other Side Of The Firewall
Malware, Misdirection, and Missed Paychecks

The Other Side Of The Firewall

Play Episode Listen Later Oct 29, 2025 57:56


In this episode, Ryan Williams Sr. and Shannon Tynes discuss the latest cybersecurity threats, including the YouTube Ghost Network, which has over 3000 malicious videos designed to trap users into downloading malware. They also explore the rise of fake job postings used by cybercriminals to steal credentials, particularly during the current government shutdown, which has led to an 85% increase in cyberattacks against U.S. agencies. The hosts share personal experiences with phishing scams and emphasize the importance of vigilance in the digital age. Article: 3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation https://thehackernews.com/2025/10/3000-youtube-videos-exposed-as-malware.html?m=1 Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials https://cybersecuritynews.com/google-warns-of-threat-actors-using-fake-job-posting/amp/ Shutdown Sparks 85% Increase in US Government Cyberattacks https://www.darkreading.com/cybersecurity-operations/shutdown-increase-us-government-cyberattacks Buy the guide: https://www.theothersideofthefirewall.com/ Please LISTEN

CERIAS Security Seminar Podcast
Marcus Botacin, Malware Detection under Concept Drift: Science and Engineering

CERIAS Security Seminar Podcast

Play Episode Listen Later Oct 29, 2025 52:13


The current largest challenge in ML-based malware detection is maintaining high detection rates while samples evolve, causing classifiers to drift. What is the best way to solve this problem? In this talk, Dr. Botacin presents two views on the problem: the scientific and the engineering. In the first part of the talk, Dr. Botacin discusses how to make ML-based drift detectors explainable. The talk discusses how one can split the classifier knowledge into two: (1) the knowledge about the frontier between Malware (M) and Goodware (G); and (2) the knowledge about the concept of the (M and G) classes, to understand whether the concept or the classification frontier changed. The second part of the talk discusses how the experimental conditions in which the drift handling approaches are developed often mismatch the real deployment settings, causing the solutions to fail to achieve the desired results. Dr Botacin points out ideal assumptions that do not hold in reality, such as: (1) the amount of drifted data a system can handle, and (2) the immediate availability of oracle data for drift detection, when in practice, a scenario of label delays is much more frequent. The talk demonstrates a solution for these problems via a 5K+ experiment, which illustrates (1) how to explain every drift point in a malware detection pipeline and (2) how an explainable drift detector also makes online retraining to achieve higher detection rates and requires fewer retraining points than traditional approaches. About the speaker: Dr. Botacin is a Computer Science Assistant Professor at Texas A&M University (TAMU, USA) since 2022. Ph.D. in Computer Science (UFPR, Brazil), Master's in Computer Science and Computer Engineering (UNICAMP, Brazil). Malware Analyst since 2012. Specialist in AV engines and Sandbox Development. Dr. Botacin published research papers at major academic conferences and journals. Dr. Botacin also presented his work at major industry and hacking conferences, such as HackInTheBox and Hou.Sec.Con.Page: https://marcusbotacin.github.io/

TechTimeRadio
273: TechTime Radio: Tech turns terrifying: cloud crashes, robot takeovers, satellite leaks, AI love, ghost-seeing Teslas, doorbell surveillance, and blockchain malware. One failure can haunt everything. Tune in—if you dare. | Air Date: 10/28 - 11/3/25

TechTimeRadio

Play Episode Listen Later Oct 28, 2025 61:53 Transcription Available


Want a Halloween scare that sticks with you after the candy's gone? We're pouring a glass and pulling back the curtain on the creepiest corners of everyday tech: a cloud outage that toppled major apps and smart beds, a Prime refund saga with fine-print timelines, and Amazon's bold plan to swap 600,000 human jobs for robots by 2033. The number that matters isn't the 30 cents shaved off a product; it's the blast radius when a single point of failure hits everything from payments to sleep pods.We go deeper with cybersecurity expert Nick Espinosa to map the new threat surface. He breaks down a jaw-dropping study showing unencrypted geostationary satellite traffic—airline passenger data, critical infrastructure chatter, even U.S. and Mexican military communications—floating for the taking. Then we connect the surveillance dots: Ring's partnership with Flock could feed millions of doorbells into a searchable police network. With Ring's track record, do you want your front porch in a national database accessible by natural-language prompts?The uncanny valley gets crowded too. A widower claims an AI replica of Suzanne Somers “feels indistinguishable,” while OpenAI prepares to allow “mature” content for verified adults. We weigh the supposed benefits against the hard psychology: isolation, distorted attachment, and empathy atrophy. For a lighter fright, we test the viral claim that Teslas see “ghosts” in cemeteries—spoiler: that's what a cautious perception model looks like when tombstones confuse it. The real nightmare? Attackers hiding malware inside blockchain smart contracts, using decentralization to dodge takedowns and $2 fees to keep it cheap.From airline IT meltdowns to smart contract exploits, the pattern is clear: concentration of power and data magnifies risk. Redundancy, privacy-by-design, and failure-aware engineering aren't nice-to-haves—they're the only way through. Grab your headphones and your favorite pour, then join us for a tour of the haunted infrastructure underneath daily life.Enjoyed the ride? Follow, share with a friend, and leave a quick review so more curious listeners can find the show. What scared you most—and what would you fix first?Support the show

TechTimeRadio
Radio Edit: 273: TechTime Radio: Tech turns terrifying: cloud crashes, robot takeovers, satellite leaks, AI love, ghost-seeing Teslas, doorbell surveillance, and blockchain malware. One failure can haunt everything. Tune in—if you dare. | Air Date: 10/2

TechTimeRadio

Play Episode Listen Later Oct 28, 2025 55:42 Transcription Available


A Halloween hour of tech that blurs the line between glitch and ghost, convenience and control, comfort and consequence. We move from Amazon's outages and automation plans to AI intimacy, leaky satellites, doorbell surveillance, and malware hidden in blockchains.• AWS outage root cause and ripple effects• Amazon automation projections and workforce impact• Prime settlement refunds and consumer friction• AI cloning of public figures and grief displacement• Mature AI chat, isolation risks and mental health• Satellite comms exposure across aviation and utilities• Ring and Flock integration expanding police access• Blockchain-enabled “etherhiding” for malware delivery• Airline IT grounding and operations fragility• Whiskey tasting notes and pairing with chocolateBecome a Patreon supporter at patreon.com/techtimeradioVisit TechTimeRadio.com and click on the contact page to submit your answer to our Secret SoundSupport the show

Irish Tech News Audio Articles
Cultivating a strong cybersecurity culture

Irish Tech News Audio Articles

Play Episode Listen Later Oct 28, 2025 3:56


Guest post by Cillian McCarthy, CEO, Paradyn More often than not, the weakest link in any organisation's defences is its people. Evolving social engineering tactics such as deepfakes, an ever-increasing volume of cyberattacks, and the growing sophistication of threats from would-be hackers combine to make a perfect cybersecurity storm which can confuse and overwhelm employees. A key reason for this is a lack of cybersecurity awareness, and that's why building a strong cybersecurity culture is paramount. Transforming employees into active defenders Cultivating a culture of cyber awareness is about transforming employees from potential vulnerabilities into active defenders. However, this doesn't happen overnight or during a single training session - it's a continuous process which must be evolved in line with changing risks. It also must start from the top down, and business leaders should set the example for the rest of the organisation and demonstrate their commitment by actively driving increased cyber awareness. Communication is key and when it comes to an organisation's security policies, it's crucial to explain the "why" behind the "what". Demonstrating the real-world impacts will help to cement the vital importance of adhering to security protocols. Knowledge is power This is where cybersecurity awareness training comes in. The threat landscape is constantly changing, and employees must be kept up to date on emerging threats and best practices. It's a good idea to run regular penetration tests - simulated phishing attacks - to assess vigilance and identify vulnerability gaps in your defences. Businesses should take the time to develop and enforce clear, concise cybersecurity policies that are based on their individual needs and easy to follow. The final step is to have an incident response plan in place and ensure that employees know what to do - and how fast they need to do it - in the event of a cyber incident. Perhaps most importantly, employees need to be encouraged to report potential breaches or suspicious activity without fear of repercussions. Malware can go undetected within systems for significant periods of time, so it's crucial to get out in front of any potential threats. Fostering a culture of shared responsibility will ensure that employees feel supported and empowered. Tools of the trade The right toolkit will enable an organisation to create a powerful line of defence against cyber threats. Solutions might even need to be tailored to different roles or departments, depending on the specific threats they are likely to face. Multi-factor authentication (MFA) makes it harder for malicious actors to gain access to your systems as it requires several steps to verify the user's identity. Password managers, meanwhile, can securely store login details for company accounts and even suggest strong, unique passwords. And, while it may seem simple, ensuring that all devices and software are regularly updated and patched will go a long way to protecting your business against emerging risks. In addition, compliance with new and changing cybersecurity regulations such as NIS2 is becoming necessary for a growing number of businesses. Non-compliance can not only leave your organisation vulnerable to cyber threats, but can also have financial ramifications and create lasting reputational damage. Effective cybersecurity goes beyond ensuring that systems are protected. It can also boost employee engagement, enhance customer trust, and increase productivity and efficiency within the business. Cybersecurity is constantly evolving and we will see a continuous flow of new threats to be grappled with - underscoring the importance of a security-first mindset for businesses. Ultimately, building a strong cybersecurity culture is all about the journey - not the destination. See more stories here.

Hoje no TecMundo Podcast
VAZOU! 183 MILHÕES de contas do GMAIL; Seu GALAXY S25 pode EXPLODIR e têm MALWARE no DISCORD!

Hoje no TecMundo Podcast

Play Episode Listen Later Oct 27, 2025 11:29


Cerca de 183 milhões de contas do Gmail foram parar na internet, e dados brasileiros estão confirmados. Descubra a arma secreta dos golpistas: o "SMS Blaster" que simula torres de celular e dispara 100 mil golpes por hora. Se você usa Discord, CUIDADO! Uma ferramenta de teste de segurança virou a arma mais perigosa para roubar suas senhas, dados de cartão e até carteiras de criptomoedas. Revelamos como se proteger antes que seja tarde. E o pesadelo da Samsung voltou? Um Galaxy S25 Plus explode na mão de um usuário. E qual o risco que você corre com o celular que está no seu bolso? 

WCCO Tech Talk
Protecting Your Computer From Malicious Forces

WCCO Tech Talk

Play Episode Listen Later Oct 26, 2025 38:33


Doug Swinhart and Steve Thomson take your calls on those nagging computer problems. Several questions ask how to protect your tech from malware and other malicious actors. Also, they tackle the latest on some widespread breaches and discuss what to look for when buying a printer.

Cyber Security Headlines
Russian hackers replace malware with new tools, Windows updates cause login issues, campaign targets high-profile servers

Cyber Security Headlines

Play Episode Listen Later Oct 22, 2025 8:03


Russian state hackers replace burned malware with new tools Recent Windows updates cause login issues on some PCs Sophisticated campaign targets servers of high-profile organizations Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero-trust endpoint protection platform, ThreatLocker fills the gaps traditional solutions leave behind, giving your business stronger security and control. Don't just react to threats — stop them with ThreatLocker.

Hoje no TecMundo Podcast
Usa EXTENSÕES no CHROME? CUIDADO! Tem Malware RUSSO e Whatsapp vulnerável! Meteoros no Brasil e mais!

Hoje no TecMundo Podcast

Play Episode Listen Later Oct 21, 2025 12:16


Você usa extensões no Chrome? CUIDADO! Mais de 130 delas estão deixando o WhatsApp vulnerável; Google identificou três novas famílias de malware russo criadas por hackers, quais são e como se proteger? Atualização de emergência do Windows 11 corrige problemas de recuperação; Que horas será a chuva de meteoros no Brasil? Veja horário e como assistir! O Pix travou, GPT-6 vai chegar logo? o Brasil estreitou laços com a Índia e a Netflix perdeu ações, será que ela vai de arrasta? Vem com a gente que aqui damos notícias de tecnologia 24h!

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Tuesday, October 21st, 2025: Syscall() Obfuscation; AWS down; Beijing Time Attack

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Oct 20, 2025 9:17


Using Syscall() for Obfuscation/Fileless Activity Fileless malware written in Python can uses syscall() to create file descriptors in memory, evading signatures. https://isc.sans.edu/diary/Using%20Syscall%28%29%20for%20Obfuscation%20Fileless%20Activity/32384 AWS Outages AWS has had issues most of the day on Monday, affecting numerous services. https://health.aws.amazon.com/health/status Time Server Hack China reports a compromise of its time standard servers. https://thehackernews.com/2025/10/mss-claims-nsa-used-42-cyber-tools-in.html

Cyber Security Today
Critical Security Alerts: TikTok Malware & Europol's SIM Farm Takedown

Cyber Security Today

Play Episode Listen Later Oct 20, 2025 14:42 Transcription Available


In this episode of Cybersecurity Today, host David Shipley covers the latest developments in cyber threats and law enforcement victories. Topics include: cybercriminals using TikTok videos to disseminate malware through click-fix attacks, Europol shutting down a massive SIM farm powering 49 million fake online accounts, and Microsoft's emergency patch release for a critical ASP.NET Core vulnerability rated 9.9 in severity. The episode also highlights community efforts in raising cybersecurity awareness. 00:00 Introduction and Headlines 00:23 TikTok Malware Campaign 03:43 Europol's Major SIM Farm Bust 07:45 Microsoft's Critical ASP.NET Core Vulnerability 11:55 Community Shoutouts and Conclusion

Backup Central's Restore it All
The ArcGIS Hack That Turned Backups Into a Malware Repository

Backup Central's Restore it All

Play Episode Listen Later Oct 20, 2025 25:18 Transcription Available


This episode examines a sophisticated ArcGIS hack that remained undetected for 12 months. The threat group Flax Typhoon compromised an ArcGIS server by exploiting weak credentials and deploying a malicious Java extension that functioned as a web shell. The attack highlights critical failures in traditional security approaches: the malware was backed up along with legitimate data, signature-based detection tools completely missed the custom code, and the lack of multi-factor authentication made the initial breach possible. Curtis and Prasanna discuss why behavioral detection is now mandatory, how password length trumps complexity, and the importance of cyber hygiene practices like regular system audits and extension management. They also cover ReliaQuest's recommendations for preventing similar attacks, including automated response playbooks and monitoring for anomalous behavior. If you're running public-facing applications or managing any IT infrastructure, this episode provides actionable lessons you can't afford to ignore.https://reliaquest.com/blog/threat-spotlight-inside-flax-typhoons-arcgis-compromise

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Monday, October 20th, 2025: Malicious Tiktok; More Google Ad Problems; Satellite Insecurity

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Oct 19, 2025 6:14


TikTok Videos Promoting Malware InstallationTikTok Videos Promoting Malware Installation Tiktok videos advertising ways to obtain software like Photoshop for free will instead trick users into downloading https://isc.sans.edu/diary/TikTok%20Videos%20Promoting%20Malware%20Installation/32380 Google Ads Advertise Malware Targeting MacOS Developers Hunt.io discovered Google ads that pretend to advertise tools like Homebrew and password managers to spread malware https://hunt.io/blog/macos-odyssey-amos-malware-campaign Satellite Transmissions are often unencrypted A large amount of satellite traffic is unencrypted and easily accessible to eavesdropping https://satcom.sysnet.ucsd.edu

The CyberWire
Smile for the malware. [Research Saturday]

The CyberWire

Play Episode Listen Later Oct 18, 2025 28:12


Eclypsium researchers Jesse Michael and Mickey Shkatov to share their work on "BadCam - Now Weaponizing Linux Webcams." Eclypsium researchers disclosed “BadCam,” a set of vulnerabilities in certain Lenovo USB webcams that run Linux and do not validate firmware signatures, allowing attackers to reflash the devices and turn them into BadUSB-style tools. An adversary who supplies a backdoored camera or who gains remote code execution on a host can weaponize the webcam to emulate human-interface devices, inject keystrokes, deliver payloads, and maintain persistence — even re-infecting systems after OS reinstalls. The findings were presented at DEF CON 2025, Lenovo issued updated firmware/tools in coordination with SigmaStar, and researchers warn the same vector could affect other Linux-based USB peripherals, underscoring the need for firmware signing and stronger device attestation. The research can be found here: BadCam: Now Weaponizing Linux Webcams Learn more about your ad choices. Visit megaphone.fm/adchoices

Research Saturday
Smile for the malware.

Research Saturday

Play Episode Listen Later Oct 18, 2025 28:12


Eclypsium researchers Jesse Michael and Mickey Shkatov to share their work on "BadCam - Now Weaponizing Linux Webcams." Eclypsium researchers disclosed “BadCam,” a set of vulnerabilities in certain Lenovo USB webcams that run Linux and do not validate firmware signatures, allowing attackers to reflash the devices and turn them into BadUSB-style tools. An adversary who supplies a backdoored camera or who gains remote code execution on a host can weaponize the webcam to emulate human-interface devices, inject keystrokes, deliver payloads, and maintain persistence — even re-infecting systems after OS reinstalls. The findings were presented at DEF CON 2025, Lenovo issued updated firmware/tools in coordination with SigmaStar, and researchers warn the same vector could affect other Linux-based USB peripherals, underscoring the need for firmware signing and stronger device attestation. The research can be found here: BadCam: Now Weaponizing Linux Webcams Learn more about your ad choices. Visit megaphone.fm/adchoices

DailyCyber The Truth About Cyber Security with Brandon Krieger
Reverse Engineering, AI, and the Economics of Malware with Danny Quist| DailyCyber 277 ~Watch Now ~

DailyCyber The Truth About Cyber Security with Brandon Krieger

Play Episode Listen Later Oct 18, 2025 65:22


AI, Reverse Engineering & the Economics of Malware | Danny Quist | DailyCyber 277 ~ Watch Now ~In this episode of DailyCyber, I sit down with Danny Quist, Chief Technology Officer at PolySwarm, to unpack the intersection of AI, reverse engineering, and cybersecurity economics.Danny brings nearly two decades of experience leading research and analysis teams at Redacted, Bechtel, MIT Lincoln Laboratory, and Los Alamos National Laboratory. As a Ph.D. in Computer Science and educator at New Mexico Tech, he bridges deep technical expertise with practical guidance for cybersecurity professionals. 

Unspoken Security
Redefining National Security

Unspoken Security

Play Episode Listen Later Oct 16, 2025 56:14


In this episode of Unspoken Security, host A.J. Nash sits down with LaurenZabierek, Senior Vice President for the Future of Digital Security at theInstitute for Security and Technology. Together, they examine how thetraditional view of national security often overlooks the people it seeks toprotect. Lauren shares why national security must move beyond militaryand government, and instead focus on the everyday risks that affecteveryone—whether that's cybersecurity, healthcare, or even climate safety.Lauren makes a strong case for widening the lens on security. She explainswhy protecting people requires new thinking and fresh policies, not justmore funding for defense. She also describes the need for face-to-faceconnections and open dialogue to rebuild trust and unity in a fracturedworld.The conversation turns to software and the Secure by Design movement.Lauren outlines how changing incentives for software companies can leadto safer products. She draws on lessons from automotive and aviationsafety to show paths forward, and encourages listeners to help drivedemand for secure technology across all industries.Send us a textSupport the show

Engadget
Malware apps posing as free VPNs are on the rise

Engadget

Play Episode Listen Later Oct 13, 2025 6:11


A recent report on the Klopatra malware operation shows hackers taking advantage of a surge in VPN use. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Microsoft Threat Intelligence Podcast
Threat Landscape Update: Ransomware-as-a-Service and Advanced Modular Malware

Microsoft Threat Intelligence Podcast

Play Episode Listen Later Oct 8, 2025 30:31


In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠Sherrod DeGrippo is joined by Tori Murphy, Anna Seitz, and Chuong Dong to break down two threats: the modular backdoor PipeMagic and Medusa ransomware. They discuss how PipeMagic disguises itself as a ChatGPT desktop app to deliver malware, its sophisticated modular design, and what defenders can do to detect it.   The team also explores Medusa's evolution into a ransomware-as-a-service model, its use of double extortion tactics, and the broader threat landscape shaped by ransomware groups, social engineering, and the abuse of legitimate tools.   In this episode you'll learn:       Why modular malware is harder to detect and defend against  How attackers abuse vulnerable drivers to disable security tools  Why leak sites play a central role in ransomware operations  Some questions we ask:      How did Microsoft researchers uncover PipeMagic in the wild?  Why do ransomware groups often borrow names and themes from mythology?  What initial access techniques are commonly associated with Medusa attacks?    Resources:   View Anna Seitz on LinkedIn  View Chuong Dong on LinkedIn    View Sherrod DeGrippo on LinkedIn     Related Microsoft Podcasts:                    Afternoon Cyber Tea with Ann Johnson  The BlueHat Podcast  Uncovering Hidden Risks        Discover and follow other Microsoft podcasts at microsoft.com/podcasts     Get the latest threat intelligence insights and guidance at Microsoft Security Insider    The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.  

Hacking Humans
When malware goes bump in the night.

Hacking Humans

Play Episode Listen Later Oct 7, 2025 49:38


Welcome in! You've entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today's most interesting threats. Your host is ⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠, ⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠. Inspired by the residents of a building in New York's exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠ ⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠ and ⁠⁠⁠Keith Mularski⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠Qintel⁠⁠⁠. Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this spooky special episode, our hosts ponder which threat actor, malware, or campaign name would be the most terrifying — from the spectral stealth of GhostRAT silently haunting your systems, to the deceptively sweet lure of ILoveYou that once spread chaos across the globe. Along the way, they share some of their favorite “ghost stories” from the cyber underworld — legendary incidents and infamous operations that still haunt defenders today — and explore why these names and their real-world impacts have left such lasting scars on the digital landscape. Plus, we've cooked up a fun, mystery-solving video to accompany this episode — complete with spooky clues, masked sleuths, and a few laugh-out-loud moments that fans of classic cartoon detectives will appreciate. Check it out on YouTube and see if you can unmask the culprit!

Only Malware in the Building
When malware goes bump in the night.

Only Malware in the Building

Play Episode Listen Later Oct 7, 2025 49:38


Welcome in! You've entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today's most interesting threats. Your host is ⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠, ⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠. Inspired by the residents of a building in New York's exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠ ⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠ and ⁠⁠⁠Keith Mularski⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠Qintel⁠⁠⁠. Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this spooky special episode, our hosts ponder which threat actor, malware, or campaign name would be the most terrifying — from the spectral stealth of GhostRAT silently haunting your systems, to the deceptively sweet lure of ILoveYou that once spread chaos across the globe. Along the way, they share some of their favorite “ghost stories” from the cyber underworld — legendary incidents and infamous operations that still haunt defenders today — and explore why these names and their real-world impacts have left such lasting scars on the digital landscape. Plus, we've cooked up a fun, mystery-solving video to accompany this episode — complete with spooky clues, masked sleuths, and a few laugh-out-loud moments that fans of classic cartoon detectives will appreciate. Check it out on YouTube and see if you can unmask the culprit!

LINUX Unplugged
635: The Texas Linux Fest Special

LINUX Unplugged

Play Episode Listen Later Oct 6, 2025 90:03 Transcription Available


Our cross-continent race to Texas Linux Fest culminates into fantastic meat, meetups, and more.Sponsored By:Managed Nebula: Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love. 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps. Unraid: A powerful, easy operating system for servers and storage. Maximize your hardware with unmatched flexibility. Support LINUX UnpluggedLinks:

Legacy
Fraud Detection and Digital Marketing In the age of AI

Legacy

Play Episode Listen Later Oct 6, 2025 20:46


Ready to shield your digital marketing efforts from the pervasive threat of ad fraud? Join us as we sit down with Rich Kahn, the visionary co-founder and CEO of Anura. With over two decades of expertise, Rich takes us through his journey of identifying a critical gap in the market and developing a robust ad fraud solution. From bots to malware, discover how Anura innovatively tackles fraudulent activities, significantly safeguarding advertisers' investments. Rich unpacks the sophisticated nature of ad fraud, especially with the rise of AI, and highlights the staggering financial implications that call for urgent attention. This episode promises to equip you with the knowledge to better understand and combat ad fraud, enhancing your ROI in the competitive landscape of digital marketing. Moreover, we navigate the complexities of pricing SaaS solutions, shedding light on the balance between development costs and competitive pricing. Rich shares invaluable insights into the strategic pricing journey, from establishing credibility with initial low prices to the importance of ROI in setting rates. As we explore the ever-evolving fraud detection landscape, Rich emphasizes the necessity of standardized approaches and the potential industry growth. With only a fraction of websites employing fraud detection solutions, we delve into the future risks that digital marketing expenditures face. Tune in to learn more about Anura's groundbreaking work and its pivotal role in the ongoing battle against ad fraud. Don't miss this opportunity to stay ahead of the curve in effectively managing your digital marketing investments. Timestamps 00:00:01 - Introduction and Welcome to Business Legacy Podcast   00:00:45 - Introduction to Rich Kahn and Anura's Origins   00:02:15 - Rich Kahn's Early Days and the Genesis of Anura   00:03:30 - Understanding Ad Fraud: Bots, Malware, and Human Actors   00:05:10 - The Role of AI in Fraud Detection and Challenges Faced   00:06:45 - Financial Impacts of Ad Fraud on Digital Marketing   00:09:03 - Introduction to Pricing Strategies for SaaS Solutions   00:10:00 - Balancing Development Costs and Competitive Pricing   00:11:30 - Importance of ROI in SaaS Pricing Models   00:12:45 - Grassroots Approach to Building an Initial Client Base   00:14:15 - Enhancing Fraud Detection Accuracy and Industry Challenges   00:15:30 - Importance of Standardization in Fraud Detection   00:16:45 - Anura's Commitment to Accuracy and Reliability   00:18:00 - Growth Potential in Fraud Detection and Industry Insights   00:19:30 - Parallels Between Digital Marketing Expenditure and the Dot-Com Bubble   00:20:45 - Conclusion and Final Thoughts from Rich Kahn   00:21:30 - Where to Find More Information About Anura   Episode Resources: Connect with Rich here and find more out about fraud with an ebook and guides:  https://www.anura.io/ Legacy Podcast: For more information about the Legacy Podcast and its co-hosts, visit businesslegacypodcast.com. Leave a Review: If you enjoyed the episode, leave a review and rating on your preferred podcast platform. For more information: Visit businesslegacypodcast.com to access the shownotes and additional resources on the episode.

Unspoken Security
Security Awareness for the Connected Generation

Unspoken Security

Play Episode Listen Later Oct 2, 2025 62:07


In this episode of Unspoken Security, host A.J. Nash sits down with Marley Salveter, Director of Marketing at Unspoken Security. They explore how digital privacy and security awareness look different for younger generations who have grown up in a world where sharing personal data is routine, not a choice. Marley shares her perspective on adapting to life online, where building a personal brand and protecting personal information often overlap for today's professionals.Marley explains how her generation views data privacy as an accepted tradeoff, not a conscious decision, and why traditional corporate security training rarely feels relevant. She discusses the real risks of living in public—how threats feel less urgent until they get personal and why the rapid response of tech platforms can mask the lasting impact of breaches. She and A.J. dig into the challenge of communicating security risks to a connected generation that rarely sees tangible consequences.Together, they reflect on how open conversations bridge generational gaps and why storytelling and relatable dialogue help people internalize security lessons. Marley argues that making security personal is key to lasting change—especially for those building their careers and brands in the public eye.Send us a textSupport the show

Cyber Security Headlines
China-linked group linked to new malware, 2024 VMware zero-day still exploited, iOS fixes a bevy of glitches

Cyber Security Headlines

Play Episode Listen Later Oct 1, 2025 8:28


China-Linked Group Hits Governments With Stealth Malware Chinese hackers exploit VMware zero-day since October 2024 Apple's iOS fixes a bevy of glitches Huge thanks to our sponsor, Nudge Security The SaaS supply chain is a hot mesh. As your workforce introduces new SaaS apps and integrations, hidden pathways are created that attackers can exploit to gain access to core business systems. That's exactly what happened in the Drift breach, and it will happen again. But, all is not lost. Nudge Security gives you the visibility and control you need to stop these attacks. Within minutes of starting a free trial, you'll discover every SaaS app and integration in your environment, map your SaaS supply chain, and identify risky OAuth grants that could be exploited.  The best part? Nudge Security alerts you of breaches impacting your 3rd and 4th party SaaS providers. That's right, even 4th party! So, you can take action quickly to limit the ripple effects. Learn how Nudge can help you secure your entire SaaS ecosystem at nudgesecurity.com/supplychain  

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Tuesday, September 30th, 2025: Apple Patch; PAN Global Protect Scans; SSL.com signed malware

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Sep 30, 2025 5:06


Apple Patches Apple released patches for iOS, macOS, and visionOS, fixing a single font parsing vulnerability https://isc.sans.edu/diary/Apple%20Patches%20Single%20Vulnerability%20CVE-2025-43400/32330 Increase in Scans for Palo Alto Global Protect Vulnerability (CVE-2024-3400). Our honeypots detected an increase in scans for a Palo Alto Global Protect vulnerability. https://isc.sans.edu/diary/Increase%20in%20Scans%20for%20Palo%20Alto%20Global%20Protect%20Vulnerability%20%28CVE-2024-3400%29/32328 Nimbus Manticore / Charming Kitten Malware update Checkpoint released a report with details regarding a new Nimbus Manticore exploit kit. The malware in this case uses valid SSL.com-issued certificates. https://research.checkpoint.com/2025/nimbus-manticore-deploys-new-malware-targeting-europe/

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Monday, September 29th, 2025: Convert Timestamps; Cisco Compromises; GitHub Notification Phishing

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Sep 29, 2025 8:36


Converting Timestamps in .bash_history Unix shells offer the ability to add timestamps to commands in the .bash_history file. This is often done in the form of Unix timestamps. This new tool converts these timestamps into a more readable format. https://isc.sans.edu/diary/New%20tool%3A%20convert-ts-bash-history.py/32324 Cisco ASA/FRD Compromises Exploitation of the vulnerabilities Cisco patched last week may have bone back about a year. Cisco and CISA have released advisories with help identifying affected devices. https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks https://www.cisa.gov/news-events/directives/ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices Github Notification Phishing Github notifications are used to impersonate YCombinator and trick victims into installing a crypto drainer. https://www.bleepingcomputer.com/news/security/github-notifications-abused-to-impersonate-y-combinator-for-crypto-theft/

The Cliff Ravenscraft Show - Mindset Answer Man
794 - Can You Still Get Paid to Blog in 2025? With Megan Porta of Eat Blog Talk

The Cliff Ravenscraft Show - Mindset Answer Man

Play Episode Listen Later Sep 29, 2025 45:14


Over the past few years, I've heard several people suggest that "blogging is dead." However, one of my favorite coaching clients earns her primary income from her blog and also hosts retreats and an annual conference for an entire community of food bloggers who earn an income from their blogging efforts. So I invited my client, Megan Porta, and asked her the question, "Can you still make money blogging in 2025?" Short answer: Yes. It's doable. It looks different than it did a decade ago. It requires real passion, patience, and a focus on what serves readers right now. Below are thorough show notes to meet you exactly where you are. If you want to start or revive a blog as a real income stream, these notes double as a step-by-step primer. What This Episode Covers Why blogging still pays when you pair patience with passion Megan has seen brand-new bloggers “crushing it.” The difference now is you cannot fake it. Your readers and Google both know when you do. Authenticity wins. The fastest realistic path to first income Join a quality ad network once your traffic qualifies. We name the two big players and their current thresholds. We also discuss why Google SEO and Pinterest are still the two traffic pillars that move the needle. Niching way down to win Broad “everything” blogs struggle today. Specific sub-niches serve specific people and get rewarded. Think “vegan cakes” instead of “vegan.” The love for your topic has to show up in every post. The collaboration playbook for early momentum Smart email list swaps. Contributing value inside the right Facebook groups without spamming. How one helpful post can put a niche creator “on the map” in months. Income beyond ads Digital products. Memberships. Sponsorships. How to think about affiliate income post-HCU and what still works if you are selective. Platform and tech choices that save you pain Why WordPress.org with solid hosting is still the move. Why a VPS and proactive security matter. Real-world cautionary tales about updates, backups, and malware. Key Takeaways and Insights 1) Yes, you can still get paid to blog. The bar is higher. If you bring patience and genuine expertise, you can absolutely build an income today. People starting in the last year or two are succeeding. The difference is the landscape. Authenticity and user value must drive your strategy. 2) Niche inside the niche Winning examples are laser-specific. Pick a tight segment of a larger category, then become unmistakably helpful to that reader. This is how you break through and build trust. 3) Traffic plan: SEO and Pinterest first To qualify for premium ad networks, prioritize traffic that comes from search and Pinterest. Current thresholds discussed in the episode: Mediavine at roughly 50,000 sessions per month and Raptive at roughly 100,000 pageviews per month. Build to those numbers, then let ad RPMs start compounding. 4) Collaboration without spam Use email list collaborations. Show up consistently inside large, topic-relevant Facebook groups. Earn trust by answering questions with real substance. This moves traffic quickly when your niche is dialed in. 5) Create on-topic, helpful content Google's Helpful Content updates pushed bloggers to stay tightly aligned with user intent. Keep posts on point for your niche. Tangential personal stories and off-topic content dilute perceived expertise and can hurt discoverability. 6) Monetization mix that works in 2025 Display Ads once you hit network thresholds. This becomes semi-passive as your library grows. Digital Products as quick wins: ebooks, guides, weekly prep plans. These are simple to produce and match your audience's immediate needs. Memberships if your audience is invested. Price points in food niches commonly range from about 5 to 20 dollars per month, often for ad-free experiences or exclusive content. Tech options include WordPress setups and hosted communities such as Circle, Skool, Slack, Discord, Mighty Networks, and niche tools like Member Kitchens. Sponsorships when you can articulate your audience's value. Niche reach can beat raw follower counts if you understand a sponsor's acquisition economics and lifetime value. Affiliate Income is trickier after recent updates. It can still work at higher commissions or with premium offers. Treat it as a supplemental play, not your core plan. 7) Stack the tech in your favor Choose WordPress.org for full control, proven SEO flexibility, and extensibility. Invest in good hosting. A VPS with strong uptime guarantees is worth it. Expect to pay roughly 89 to 150 dollars per month for reliability that protects your revenue. Treat security and backups as non-negotiables. Plugins and themes require regular updates. Malware exploits often come from simple neglect. Have a pro who can restore fast. This avoids losing days or weeks or years of content. Practical Playbook Phase 1. Choose a narrow niche and validate demand List ten posts your ideal reader would save today. Ensure all are tightly aligned with one outcome your niche cares about. Keep stories and extras on-topic so Google sees topical authority. Phase 2. Protect the asset Run WordPress.org on a reliable VPS and keep everything updated. Assign backups and security to a pro so you do not risk outages or data loss. Phase 3. Build a traffic engine Publish high-quality posts that answer exact questions your audience asks. Optimize for search and create Pinterest assets for each post. Aim for Mediavine or Raptive thresholds to unlock ad revenue. Phase 4. Accelerate through collaboration Join large, relevant Facebook groups. Contribute substantial answers that stand on their own. Start tasteful email list collaborations for quick, qualified traffic. Phase 5. Layer monetization Add an easy digital product that solves a specific use case. Test a simple membership once engagement is strong. Pitch sponsors when you can quantify your audience's fit and value. About My Guest Megan Porta has been blogging since 2010 and runs Eat Blog Talk, a podcast and community that supports food bloggers who want to grow and monetize. She is a strong voice for focus, patience, and authenticity in a space that has evolved dramatically. Resources Mentioned Megan's sites: PipAndEbby.com and EatBlogTalk.com. Megan welcomes follow-up questions at megan@eatblogtalk.com. Ad networks: Mediavine, Raptive, once you meet their traffic thresholds. Community and membership tools: Circle, Skool, Slack, Discord, Mighty Networks, Member Kitchens. Platform: WordPress.org with quality hosting and a VPS. I'm Here To Help! If you want help in building your own online business, send me a short note about your business dream and where you feel stuck. I will point you to the most useful next step, whether that is a free resource, a workshop, or coaching with me. My email is cliff@cliffravenscraft.com.

Destination Linux
437: NVIDIA & Intel's AI Alliance, Steam Malware, and Linux CUDA

Destination Linux

Play Episode Listen Later Sep 29, 2025 73:02


Destination Linux, DL 437, Linux Podcast, Open Source, Linux News, NVIDIA, Intel, AI Alliance, CUDA on Linux, Ubuntu CUDA, Steam Malware, Gaming Security, Trojan Virus, Vivaldi AI, Privacy Concerns, Scapy, Network Tool, Linux Community, Open Source

TechLinked
Android for PC, Snapdragon X2 Elite EXTREME, Steam malware + more!

TechLinked

Play Episode Listen Later Sep 25, 2025 10:02


Timestamps: 0:00 Tune in to CakeLinked 0:18 Android on PC confirmed 1:29 Snapdragon X2 Elite, X2 Elite Extreme 2:17 Steam distributed malware 3:28 Nvidia and OpenAI investment, Stargate data centers 5:18 CookUnity! 6:28 QUICK BITS INTRO 6:42 Microsoft's microfluidic chip cooling 7:11 Vehicle-to-grid pilot program 7:55 Logitech K980 solar-powered keyboard 8:37 Origin Code fan-cooled DDR5 kits NEWS SOURCES: https://linustechtips.com/topic/1623492-android-for-pc-snapdragon-x2-elite-extreme-steam-malware-more-techlinked-september-24-2025/ Learn more about your ad choices. Visit megaphone.fm/adchoices