Podcasts about Malware

  • 1,737PODCASTS
  • 6,529EPISODES
  • 38mAVG DURATION
  • 1DAILY NEW EPISODE
  • Jul 17, 2025LATEST
Malware

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Malware

Show all podcasts related to malware

Latest podcast episodes about Malware

The Hacked Life
This CIA Hacker Knows All Your Secrets—Here's How to Protect Yourself - Dr.Eric Cole

The Hacked Life

Play Episode Listen Later Jul 17, 2025 52:08


In this engaging conversation, Dr. Eric Cole, a former CIA hacker, shares his unique journey from cybersecurity to personal growth. He discusses the importance of mindset, the realities of privacy in the digital age, and how to make informed decisions. Dr. Cole emphasizes the need for awareness in cybersecurity, especially with the rise of AI, and offers practical advice for individuals to protect themselves. He also explores the parallels between technology and human behavior, advocating for a more mindful approach to both. The discussion culminates in Dr. Cole's vision for the future of cybersecurity and humanity, highlighting the importance of merging these two realms for a safer world.Chapters00:00 From Hacking to Healing: Dr. Eric Cole's Journey02:52 The Cybersecurity Landscape: Risks and Realities05:55 Privacy in the Digital Age: What You Need to Know11:59 Navigating Technology: Tips for Staying Secure18:03 AI: A Double-Edged Sword for Humanity23:53 Breaking Through Limiting Beliefs: The Human Element27:54 Empowering Technical Minds29:07 The Malware of Self-Awareness32:28 The Power of Reflection and Listening33:56 Setting Long-Term Goals for Success37:20 Lessons from High Performers40:22 Teaching Responsibility to the Next Generation47:03 Vision for Cybersecurity and Humanity

Cyber Security Headlines
Chinese engineers at Pentagon, HazyBeacon malware, MITRE framework: AADAPT

Cyber Security Headlines

Play Episode Listen Later Jul 16, 2025 8:06


Pentagon welcomes Chinese engineers into its environment HazyBeacon: It's not a beer, but it leaves a bitter aftertaste What the world needs now is another framework Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO.

Versicherungsfunk
Versicherungsfunk Update 16.07.2025

Versicherungsfunk

Play Episode Listen Later Jul 16, 2025 3:00


Die Themen im heutigen Versicherungsfunk Update sind: KI in der Versicherung: Viele wünschen sich Hilfe beim Antrag Fast jeder Zweite in Deutschland wünscht sich beim Ausfüllen von Versicherungsanträgen Unterstützung durch Künstliche Intelligenz – vor allem jüngere Befragte sind offen dafür. 47 % der Deutschen würden KI für diese Aufgabe nutzen, in der Altersgruppe bis 49 Jahre sogar über die Hälfte. Auch bei der Analyse des Versicherungsbedarfs sehen viele Potenzial – doch KI bei Schadenschätzungen oder Gesundheitsdaten bleibt umstritten. Das zeigt eine repräsentative Bitkom-Umfrage unter 1.003 Personen. Cloud-Strategie im Spannungsfeld: GDV-Studie zeigt Wege zu digitaler Souveränität Wie gelingt der Spagat zwischen IT-Leistungsfähigkeit und Kontrolle? Die neue GDV-Studie zur digitalen Souveränität liefert praxisnahe Entscheidungshilfen für Cloud-Strategien unter geopolitischem Druck – inklusive Kriterienkatalog und Szenarien von „Erholung“ bis „Eskalation“. Ziel: weniger Abhängigkeit, mehr Resilienz. HDI überarbeitet BU-Tarif „EGO Top“ – Fokus auf junge Zielgruppen Mit neuen Features wie UpgradeJoker und KarrierePlus richtet sich die HDI Lebensversicherung gezielt an Schüler, Studenten und Berufseinsteiger. Die Optionen ermöglichen flexible Anpassungen ohne erneute Gesundheitsprüfung. Zudem verzichtet HDI seit Anfang 2024 vollständig auf abstrakte und konkrete Verweisung. Auch die Gesundheitsprüfung wurde vereinfacht – speziell für unter 30-Jährige mit nur fünf Fragen. Gewalt am Arbeitsplatz: Jeder zehnte Unfall in Verkehrsunternehmen durch Übergriffe Rund 9,5 % aller meldepflichtigen Arbeitsunfälle im öffentlichen Verkehr gehen auf Gewalt oder Bedrohung zurück – das zeigen aktuelle Zahlen der gesetzlichen Unfallversicherung (DGUV). Besonders betroffen sind Beschäftigte in Bussen, Bahnen und Taxen. Die DGUV startet deshalb zum Ferienbeginn einen Appell zu mehr Respekt im Umgang mit Fahrpersonal. Mit der Kampagne #GewaltAngehen informiert sie über Prävention und Hilfeangebote. Hagelgefahr für Windschutzscheiben steigt – Carglass warnt Mit dem Sommer steigt die Gefahr von Hagelstürmen – und damit das Risiko für Glasschäden am Auto. Carglass warnt: Schon kleine Eiskörner können Windschutzscheiben beschädigen, besonders bei starkem Temperaturgefälle zwischen innen und außen. Die Teilkaskoversicherung übernimmt Hagelschäden – vorausgesetzt, die Reparatur wird korrekt gemeldet. Systemische Cyberrisiken: Munich Re und CyberCube veröffentlichen neue Studie Ein Viertel aller IT-Systeme weltweit könnte von schwerwiegender Malware betroffen sein – so das Ergebnis einer gemeinsamen Studie von Munich Re und CyberCube. Auch massive Cloud-Ausfälle gelten laut 93 befragten Experten als reale Bedrohung. Die Studie zeigt: Mit Maßnahmen wie Patch-Management, Netzwerksegmentierung und überregionaler Cloud-Architektur lassen sich Schäden signifikant reduzieren. Ziel der Analyse ist es, das Verständnis für Kumulrisiken zu stärken und Versicherern bessere Modellierungsgrundlagen zu liefern.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Monday, July 14th, 2025: Web Honeypot Log Volume; Browser Extension Malware; RDP Forensics

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Jul 15, 2025 6:10


DShield Honeypot Log Volume Increase Within the last few months, there has been a dramatic increase in honeypot log volumes and how often these high volumes are seen. This has not just been from Jesse s residential honeypot, which has historically seen higher log volumes, but from all of the honeypots that Jesse runs. https://isc.sans.edu/diary/DShield+Honeypot+Log+Volume+Increase/32100 Google and Microsoft Trusted Them. 2.3 Million Users Installed Them. They Were Malware. Koi Security s investigation of a single verified color picker exposed a coordinated campaign of 18 malicious extensions that infected a massive 2.3 million users across Chrome and Edge. https://blog.koi.security/google-and-microsoft-trusted-them-2-3-million-users-installed-them-they-were-malware-fb4ed4f40ff5 RDP Forensics Comprehensive overview of Windows RDP Forensics https://medium.com/@mathias.fuchs/chasing-ghosts-over-rdp-lateral-movement-in-tiny-bitmaps-328d2babd8ec

PSU Radio Podcast
ชุมชนศูนย์คอม : รู้ทัน Malware-as-a-Service ภัยเงียบที่โจมตีง่ายแต่ร้ายแรง

PSU Radio Podcast

Play Episode Listen Later Jul 15, 2025 15:14


ชุมชนศูนย์คอม : รู้ทัน Malware-as-a-Service ภัยเงียบที่โจมตีง่ายแต่ร้ายแรง by PSU Broadcast FM88 MHz

WillPower | Mind Growth
Exposing Digital Fraud: How Rich Kahn Built Anura & Fought Back Against Malware

WillPower | Mind Growth

Play Episode Listen Later Jul 14, 2025 26:43


In this episode of The WillPower Podcast, I sit down with Rich Kahn, the CEO and co-founder of Anura, a leading fraud detection platform designed to eliminate ad fraud and expose malware before it wreaks havoc. Rich shares how his entrepreneurial journey led him to operate an Inc. 5000 company for five consecutive years, and what it takes to build trust and transparency in a world increasingly dominated by digital deception.We dive deep into how Anura helps companies protect their marketing spend, the hidden costs of fraud most businesses don't realize, and what Rich believes every entrepreneur should know about cybersecurity today.If you're building online, running ads, or just want to safeguard your business, this episode is a must-listen.

IJIS Sounds of Safety Podcast
Malware 101: Introducing the Big 5 Threats You Need to Know

IJIS Sounds of Safety Podcast

Play Episode Listen Later Jul 14, 2025 28:37


In this episode, we're diving into a new topic from the IJIS Institute's Cybersecurity Working Group and their JusticeGuardian series that affects nearly everyone in today's digital world: malware. To help us unpack this ever-evolving threat, we're joined once again by Larry Zorio, Chair of the Cybersecurity Working Group, along with returning member Jeramy Cooper-Leavitt. Together, they explore the five most common sources of malware and share practical advice on how both individuals and organizations can stay protected. From malicious email attachments to compromised websites, we'll break down how these threats infiltrate our lives, and more importantly, what you can do to defend against them.

INSiDER - Dentro la Tecnologia
Insta360: reinventare i video da ogni angolo e in ogni formato

INSiDER - Dentro la Tecnologia

Play Episode Listen Later Jul 12, 2025 43:16 Transcription Available


Il mondo della ripresa video e fotografica sta vivendo una trasformazione profonda: dispositivi sempre più compatti e intelligenti stanno ridefinendo il modo in cui catturiamo e raccontiamo la realtà. Dalla visione immersiva a 360° all'inquadratura tradizionale, oggi abbiamo strumenti versatili che mettono al centro la creatività dell'utente. Tra le aziende che più hanno contribuito a rivoluzionare questo settore c'è Insta360, che ha saputo unire innovazione hardware e software per creare videocamere capaci di adattarsi a ogni esigenza. Per scoprire di più sulle tecnologie dietro questi prodotti e sulle nuove frontiere della ripresa, abbiamo invitato Giulia Sabato, Marketing Manager per l'Italia di Insta360. Nell'ultima parte della puntata condividiamo la nostra esperienza diretta con Insta360 X5.Nella sezione delle notizie parliamo di YouTube che aggiorna le sue politiche contro lo spam generato dall'IA e infine di Microsoft che ha ritirato Call of Duty: World War II dal suo store a causa di una grave vulnerabilità di sicurezza.--Indice--00:00 - Introduzione01:36 - YouTube contro lo spam generato dall'IA (TheVerge.com, Luca Martinelli)03:13 - Microsoft ritira il videogioco COD WW II (DDay.it, Matteo Gallo)04:39 - Insta360: reinventare i video da ogni angolo e in ogni formato (Giulia Sabato, Davide Fasoli, Matteo Gallo)28:44 - La nostra esperienza con Insta360 X5 (Matteo Gallo, Davide Fasoli)42:24 - Conclusione--Testo--Leggi la trascrizione: https://www.dentrolatecnologia.it/S7E28#testo--Contatti--• www.dentrolatecnologia.it• Instagram (@dentrolatecnologia)• Telegram (@dentrolatecnologia)• YouTube (@dentrolatecnologia)• redazione@dentrolatecnologia.it--Sponsor--• Puntata realizzata in collaborazione con Insta360--Brani--• Ecstasy by Rabbit Theft• Whatever by Cartoon & Andromedik

Business of Tech
Political Hack at Columbia University, Malware Surge, and Microsoft Authenticator's New Direction

Business of Tech

Play Episode Listen Later Jul 11, 2025 13:48


Columbia University has recently suffered a significant data breach, compromising the personal information of 1.8 million individuals, including social security numbers and financial aid details. The hacker, motivated by political opposition to affirmative action policies, claims to have stolen 460 gigabytes of sensitive data. This incident is part of a troubling trend of politically motivated cyber attacks targeting higher education institutions, particularly following the Supreme Court's decision to bar affirmative action practices in 2023. The limited media coverage of this breach raises concerns about data security and the integrity of academic institutions.In a related development, malware detection has surged by 171% in the first quarter of 2025, according to a report from WatchGuard Technologies. This increase highlights the growing sophistication of cyber threats that are outpacing traditional defenses. The report indicates a staggering 712% rise in new malware threats on endpoints, with the LSASS dumper identified as a leading threat. This trend underscores the need for organizations, especially universities and small businesses, to recognize the escalating risks and adapt their security strategies accordingly.Huntress has announced a collaboration with Microsoft to enhance cybersecurity for businesses, integrating its enterprise-grade solutions with Microsoft environments. This partnership aims to provide essential protections for endpoints and identities, allowing organizations to respond more effectively to cyber threats. Meanwhile, Microsoft is discontinuing the use of its Authenticator app for password storage, prompting users to transition to alternative solutions. This shift emphasizes the need for users to rethink their credential management strategies in light of evolving security practices.The podcast also touches on the implications of recent incidents involving major IT service providers, such as Ingram Micro's ransomware attack, which has raised concerns about vendor trust and supply chain fragility. As vendors face scrutiny following security breaches, the erosion of trust in their products becomes a significant issue for managed service providers (MSPs). Additionally, the discussion includes emerging concepts in artificial intelligence, such as context engineering, and the growing prevalence of AI note-takers in meetings, which raises questions about the balance between technological efficiency and human interaction in the workplace. Four things to know today 00:00 Columbia Breach and Malware Surge Show Why Compliance Alone Fails in Today's Threat Landscape04:19 Huntress and Microsoft Join Forces to Bring Enterprise-Grade Security to SMBs and MSPs07:18 Palo Alto Networks Denies Involvement in Ingram Micro Ransomware Attack08:53 MCP's Universal Plugin Model Could Transform MSP Integration and Governance This is the Business of Tech.    Supported by: https://mspradio.com/engage/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

Canaltech Podcast
Malware tenta enganar IA e acende alerta na cibersegurança global

Canaltech Podcast

Play Episode Listen Later Jul 11, 2025 18:42


O alvo agora é a Inteligência Artificial. Pesquisadores identificaram um dos primeiros casos conhecidos de um malware criado para enganar sistemas de segurança baseados em IA, usando mensagens em linguagem natural para tentar parecer inofensivo. No episódio de hoje do Podcast Canaltech, conversamos com Fernando de Falchi, gerente de engenharia de segurança da Check Point Software e especialista em segurança cibernética, sobre essa tentativa inédita, o conceito de evasão por IA e os impactos para empresas, profissionais de TI e usuários de tecnologia. O ataque não teve sucesso, mas acendeu um alerta: estamos entrando em uma nova etapa na evolução das ameaças digitais, onde a própria Inteligência Artificial passa a ser explorada por cibercriminosos. Você também vai conferir: Trump nomeia ex-reality show como chefe interino da NASA, YouTube vai cortar a grana de vídeos repetitivos feitos com IA, Samsung confirma: dobrável com três telas chega ainda em 2025, CEO do X sai do cargo e Musk muda os rumos da plataforma mais uma vez e Terra gira mais rápido e dias ficam milissegundos mais curtos em julho e agosto. Este podcast foi roteirizado e apresentado por Fernanda Santos e contou com reportagens de João Melo, André Lourenti, Vinicius Moschen, Marcelo Fischer e João Melo. A trilha sonora é de Guilherme Zomer, a edição de Jully Cruz e a arte da capa é de Erick Teixeira.See omnystudio.com/listener for privacy information.

Unspoken Security
The Human Side of Cyber

Unspoken Security

Play Episode Listen Later Jul 10, 2025 61:26


Why does security awareness training so often fail? In this episode of Unspoken Security, host AJ Nash welcomes Living Security CEO Ashley M. Rose to discuss this common issue. They explore how compliance-driven, "check-the-box" training creates a false sense of security. This old model relies on vanity metrics and rituals instead of reducing actual human risk.Ashley presents a better way forward through human risk management. This modern strategy moves beyond simple phishing tests and integrates data from your existing security tools. It provides a full view of employee behavior to identify and address risks proactively. The goal is to make security training engaging and effective, not just another task to ignore.The conversation also covers the nuanced relationship between human risk management and insider threat programs. AJ and Ashley discuss how to empower employees and transform them from a potential liability into an organization's greatest security asset, creating a stronger, more resilient workforce.Send us a textSupport the show

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Tuesday, July 8th, 2025: Detecting Filename (Windows); Atomic Stealer now with Backdoor; SEO Scams

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Jul 8, 2025 5:29


What s My File Name Malware may use the GetModuleFileName API to detect if it was renamed to a name typical for analysis, like sample.exe or malware.exe https://isc.sans.edu/diary/What%27s%20My%20%28File%29Name%3F/32084 Atomic macOS infostealer adds backdoor for persistent attacks Malware analyst discovered a new version of the Atomic macOS info-stealer (also known as 'AMOS') that comes with a backdoor, to attackers persistent access to compromised systems. https://moonlock.com/amos-backdoor-persistent-access HOUKEN SEEKING A PATH BY LIVING ON THE EDGE WITH ZERO-DAYS At the beginning of September 2024, an attacker repeatedly exploited vulnerabilities CVE-2024- 8190, CVE-2024-8963, and CVE-2024-9380 vulnerabilities to remotely execute arbitrary code on vulnerable Ivanti Cloud Service Appliance devices. https://www.cert.ssi.gouv.fr/uploads/CERTFR-2025-CTI-009.pdf SEO Scams Targeting Putty, WinSCP, and AI Tools Paid Google ads are advertising trojaned versions of popuplar tools like ssh and winscp https://arcticwolf.com/resources/blog-uk/malvertising-campaign-delivers-oyster-broomstick-backdoor-via-seo-poisoning-and-trojanized-tools/

Computer Corner (5DRadio.com)
Computer Corner July 5, 2025

Computer Corner (5DRadio.com)

Play Episode Listen Later Jul 5, 2025


Hosts: Gene Mitchell and Joe Myshko Air date: July 5, 2025 Topic: Don't Trust that email, Paypal scams, Facebook wants your Photos, SparkKitty mobile Malware Special Guest(s):

In Touch with iOS
366 - Spaced Out with Vision Pro, Mirrored iPhones, and Mac Malware Madness

In Touch with iOS

Play Episode Listen Later Jul 4, 2025 90:00


The latest In Touch With iOS with Dave he is joined by Jill McKinley, Eric Bolden, Marty Jencius, Jeff Gamet, The panel honors the late Tim Robertson and shares heartfelt stories from the Apple podcasting community. The conversation then shifts to Apple news including Vision Pro's legal troubles, new immersive apps, and the Bezel app's iPhone mirroring capabilities. The crew also discusses Apple's iOS and macOS beta updates, a surge in Mac shipments, malware alerts, AI developments in Siri, and Apple Music's 10-year milestone. The episode closes with excitement for the upcoming Macstock Conference. The show notes are at InTouchwithiOS.com  Direct Link to Audio  Links to our Show Give us a review on Apple Podcasts! CLICK HERE we would really appreciate it! Click this link Buy me a Coffee to support the show we would really appreciate it. intouchwithios.com/coffee  Another way to support the show is to become a Patreon member patreon.com/intouchwithios Website: In Touch With iOS YouTube Channel In Touch with iOS Magazine on Flipboard Facebook Page BlueSky Mastodon X Instagram Threads Spoutible Summary Episode 366 of In Touch With iOS opens with lighthearted summer vibes and warm panel intros before turning reflective as the group honors Tim Robertson, a well-known figure in the Apple podcasting community. Panelists share their memories and impact stories, setting a heartfelt tone for the episode. The conversation soon pivots to Apple's Vision Pro, beginning with legal headlines surrounding a former employee accused of leaking trade secrets to Snap. This segues into a discussion about a new app designed to explore Haven One, a future space station. The panel describes their mixed experiences with the immersive app, including moments of awe and literal dizziness. Dave and guests then focus on the Bezel app, a tool that enables iPhone screen mirroring within the Vision Pro environment. From demo hiccups to moments of smooth integration, the team shares honest thoughts on its usefulness and limitations. Attention turns to Apple's beta software rollout for iOS and macOS. The panel weighs the quality of new features and what they hope to see as the betas progress. A jump in Mac shipments prompts discussion of Apple's momentum in the hardware market, and speculation rises around rumors of a budget MacBook to rival Chromebooks. The panel briefly covers a macOS malware warning before getting into Apple's push into generative AI with Siri, and then celebrating Apple Music's 10th anniversary. The show wraps with a preview of Macstock 9 and what attendees can look forward to. Topics and Links In Touch With Vision Pro this week.  Apple sues former Vision Pro employee for allegedly stealing 'thousands of documents' before joining Snap Fly around Vast's Haven-1 space station using the Apple Vision Pro Vast Haven-1 VR on the App Store Dave discovered that you can share your iPhone on the Vision Pro using Bezel app,  Bezel app - Show your iPhone inside Apple Vision Pro r/VisionPro on Reddit: Bezel app - Show your iPhone inside Apple Vision Pro  Show your iPhone inside Apple Vision Pro iPhone mirroring for Vision Pro - Bezel  Bezel: Spatial Phone Mirroring Bezel: Spatial Phone Mirroring on the App Store Bezel • Mirror any iPhone on your Mac   Beta this week. iOS 26 Beta 2 continues.  Apple Releases Second iOS 18.6 Public Beta In Touch With Mac this week Apple's Mac Shipments Are Soaring, Here's Why High-tech Mac malware hides itself in fake Zoom update Thoughts on a Possible Low-End MacBook Powered by the A18 Pro Apple reportedly considers letting Anthropic and OpenAI power Siri Apple Weighs Replacing Siri's AI, LLMs With Anthropic Claude or OpenAI ChatGPT - Bloomberg From last week: iOS 26 Brings New Functionality to HomePod We need Jeff's insights.  CarPlay Jill talks to ChatGPT in her car with CarPlay CarPlay is getting its biggest update in years, here's what's coming in iOS 26 News Apple's Satellite Messaging Saves Colorado Mountain Climber's Life 'F1' is Apple's biggest hit with $55M+ opening weekend Wanna see your all-time most-played songs on Apple Music? Here's how  Announcements Macstock 9 is here for 3 Days on July 11, 12, and 13th, 2025. We have an exclusive coupon code use INTOUCH50 at checkout and save $50..Click here to Register | Macstock Conference & Expo Book your room with a Macstock discount here. Location | Macstock Conference & Expo I hope to see you there! Our Host Dave Ginsburg is an IT professional supporting Mac, iOS and Windows users and shares his wealth of knowledge of iPhone, iPad, Apple Watch, Apple TV and related technologies. Visit the YouTube channel https://youtube.com/intouchwithios follow him on Mastadon @daveg65, and the show @intouchwithios   Our Regular Contributors Jeff Gamet is a podcaster, technology blogger, artist, and author. Previously, he was The Mac Observer's managing editor, and Smile's TextExpander Evangelist. You can find him on Mastadon @jgamet as well as Twitter and Instagram as @jgamet  His YouTube channel https://youtube.com/jgamet Marty Jencius, Ph.D., is a professor of counselor education at Kent State University, where he researches, writes, and trains about using technology in teaching and mental health practice. His podcasts include Vision Pro Files, The Tech Savvy Professor and Circular Firing Squad Podcast. Find him at jencius@mastodon.social  https://thepodtalk.net  Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him by email at eabolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast.   About our Guest Jill McKinley works in enterprise software, server administration, and IT. A lifelong tech enthusiast, she started her career with Windows but is now an avid Apple fan. Beyond technology, she shares her insights on nature, faith, and personal growth through her podcasts—Buzz Blossom & Squeak, Start with Small Steps, and The Bible in Small Steps. Watch her content on YouTube at @startwithsmallsteps and follow her on X @schmern.   Guy Serle is the host of the MyMac Podcast and the (hopefully) reconstituted Guy's Daily Drive…which isn't daily, but is done by driving so half accurate. email Guy@mymac.com @MacParrot and @VertShark on Twitter Vertshark.com,  Vertshark on YouTube, Skype +1 Area code  703-828-4677

WeTalkSecurity
Sicher durchstarten: MDR und die nächste Generation der Managed Services | Folge 34

WeTalkSecurity

Play Episode Listen Later Jul 4, 2025 26:35


In der aktuellen Folge von „WeTalkSecurity“ dreht sich alles um die Transformation klassischer IT-Dienstleister hin zu modernen Managed Service Providern – und die Herausforderungen, die damit für Unternehmen im Zeitalter wachsender Cyber-Bedrohungen einhergehen. Christian Lueg spricht dazu mit Patrick Binner, Geschäftsführer der SysTec Computer GmbH in Ingolstadt. Im Mittelpunkt stehen die veränderten Anforderungen an IT-Dienstleistungen, der wachsende Stellenwert von IT-Security, die Rolle europäischer Anbieter, neue regulatorische Vorgaben sowie der akute Fachkräftemangel in der Branche. Hierbei wird auch der der neue Trend in der IT-Sicherheit "Managed Detection and Response" (MDR) beleuchtet und wie es die IT-Dienstleistungen auf ein neues Level heben kann.

MacVoices Audio
MacVoices #25184: Live! - Apple's AI Future: Buy or Build?

MacVoices Audio

Play Episode Listen Later Jul 3, 2025 38:20


The debate over whether Apple should acquire an AI company to stay competitive, with Perplexity as a leading candidate, is a hot topic. Chuck Joiner, David Ginsburg, Web Bixby, Eric Bolden, Marty Jencius, Jim Rea, and Brian Flanigan-Arthurs explore past acquisitions, Apple's AI strategy, and the challenges of merging company cultures. PSAs about malware from screenshots and fake CAPTCHAs are discussed, along with the growing risks of AI litigation and the hype vs. reality of AI's future.  Today's MacVoices is supported by Bzigo. Don't wait until the next bite—protect your home with Bzigo. Go to bzigo.com/discount/BUZZ10 to save 10% off. Show Notes: Chapters: 00:07 Introduction to Apple and AI 01:45 Panel Introductions 06:51 Public Service Announcements 07:50 Apple's AI Acquisition Debate 20:56 Mark Fuccio's Departure 21:15 Bzigo Sponsorship Announcement 22:42 Marty Gensius on AI Perspectives 28:21 The Future of AI and Apple 31:24 Closing Thoughts on Apple and Acquisitions 36:38 AI Singularity vs. Limitations Links: There's New Reason to Never Keep Screenshots of Private Information on Your Phone https://lifehacker.com/tech/never-keep-private-information-screenshots-on-phone Watch Out for Fake CAPTCHAs That Spread Malware
https://lifehacker.com/tech/captcha-malware-warning Apple Will Need to Leave Its M&A Comfort Zone to Succeed in AI https://archive.is/Z2ULZ Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support:      Become a MacVoices Patron on Patreon      http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:      http://macvoices.com      Twitter:      http://www.twitter.com/chuckjoiner      http://www.twitter.com/macvoices      Mastodon:      https://mastodon.cloud/@chuckjoiner      Facebook:      http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:      http://www.facebook.com/macvoices/      MacVoices Group on Facebook:      http://www.facebook.com/groups/macvoice      LinkedIn:      https://www.linkedin.com/in/chuckjoiner/      Instagram:      https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes      Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

Hacking Humans
The RMM protocol: Remote, risky, and ready to strike. [Only Malware in the Building]

Hacking Humans

Play Episode Listen Later Jul 1, 2025 41:25


Please enjoy this encore of Only Malware in the Building. Welcome in! You've entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today's most interesting threats. Your host is ⁠⁠Selena Larson⁠⁠, ⁠⁠Proofpoint⁠⁠ intelligence analyst and host of their podcast ⁠⁠DISCARDED⁠⁠. Inspired by the residents of a building in New York's exclusive upper west side, Selena is joined by ⁠⁠N2K Networks⁠⁠ ⁠⁠Dave Bittner⁠⁠ and our newest co-host, ⁠Keith Mularski⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠Qintel⁠. Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our hosts discuss the growing trend of cybercriminals using legitimate remote monitoring and management (RMM) tools in email campaigns as a first-stage payload. They explore how these tools are being leveraged for data theft, financial fraud, and lateral movement within networks. With the decline of traditional malware delivery methods, including loaders and botnets, the shift toward RMMs marks a significant change in attack strategies. Tune in to learn more about this evolving threat landscape and how to stay ahead of these tactics.

Points of Articulation
POA 025 — Malware

Points of Articulation

Play Episode Listen Later Jul 1, 2025 23:41


Chapter 39. You remind 4024 of our past. Content warnings: Violence, injuries, blood, eye trauma. Vote, for free, on our Patreon. If you'd like to financially support the project, you can also do so on our Patreon. Wanna chat? Join our Discord server or Email us.Show transcripts can be found in this Dropbox. Points of Articulation is… Written by Hannah SemmelhackProduced by Hannah Semmelhack and Fiona Clare, in collaboration with Three Fates.With sound design and dialogue editing by Hannah SemmelhackOriginal music by Rheanne KlineAnd original artwork by Hibah HassanThis episode featuredCheyenne Barton as The Narrator (and the characters in their story)Hannah Semmelhack as the Hive Mind Hosted on Acast. See acast.com/privacy for more information.

ESET Research podcast
APT Activity Report Q1 2025: Malware sharing, data wiping and exploits

ESET Research podcast

Play Episode Listen Later Jul 1, 2025 34:06


In the latest ESET Research Podcast, Aryeh Goretsky and Rene Holt dive into key findings from the APT Activity Report. UnsolicitedBooker, a China-aligned group, showcased relentless persistence by repeatedly attempting to compromise the same organization for several years with its MarsSnake backdoor. Meanwhile, tool-sharing among China-aligned actors like Worok continues to blur attribution, with overlapping activities involving groups such as LuckyMouse and TA428. On the Russia-aligned front, Sednit expanded Operation RoundPress to exploit multiple webmail platforms, Gamaredon kept up its relentless obfuscation efforts in Ukraine, and Sandworm unleashed its ZEROLOT wiper again, erasing critical files of its victims. Aryeh and Rene also discuss the financial schemes of North Korea-aligned groups and the noisy yet coordinated efforts of Iran-aligned actors. Listen to the full episode or download the report on WeLiveSecurity.com. Host: Aryeh Goretsky, ESET Distinguished Researcher Guest: René Holt, Security Awareness Specialist Read more at WeLiveSecurity.com and @ESETresearch on Twitter APT Activity Report Q1 2025

The CyberWire
Turbulence in the cloud.

The CyberWire

Play Episode Listen Later Jun 27, 2025 37:13


Hawaiian Airlines reports a cybersecurity incident. Microsoft updates its Windows Resiliency Initiative after the 2024 CrowdStrike crash. CitrixBleed 2 is under active exploitation in the wild. Researchers disclose a critical vulnerability in Open VSX. Malware uses prompt injection to evade AI analysis. A new report claims Cambodia turns a blind eye to scam compounds. Senators propose a ban on AI tools from foreign adversaries. An NSA veteran is named top civilian at U.S. Cyber Command. Maria Varmazis speaks with Ian Itz from Iridium Communications on allowing IoT devices to communicate directly with satellites. One Kansas City hacker's bold marketing campaign ends with a guilty plea. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is Ian Itz, Executive Director at the IoT Line of Business at Iridium Communications. Ian spoke with T-Minus Space Daily host Maria Varmazis on their Deep Space weekend show about how Iridium allows IoT devices, like sensors and trackers, to communicate directly with satellites, bypassing terrestrial infrastructure. We share an excerpt of their conversation on our show today. You can listen to the full conversation on Deep Space. And, be sure to check out T-Minus Space Daily brought to you by N2K CyberWire each weekday on your favorite podcast app. Selected Reading Hawaiian Airlines Hit by Cybersecurity Incident (Infosecurity Magazine) Microsoft to Preview New Windows Endpoint Security Platform After CrowdStrike Outage (SecurityWeek) CitrixBleed 2 Vulnerability Exploited (Infosecurity Magazine) Vulnerability Exposed All Open VSX Repositories to Takeover (SecurityWeek) Prompt injection in malware sample targets AI code analysis tools (SC Media) Scam compounds labeled a 'living nightmare' as Cambodian government accused of turning a blind eye (The Record) Bipartisan bill seeks to ban federal agencies from using DeepSeek, AI tools from ‘foreign adversaries' (The Record) NSA's Patrick Ware takes over as top civilian at U.S. Cyber Command (The Record) Man Who Hacked Organizations to Advertise Security Services Pleads Guilty (SecurityWeek) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Unsupervised Learning
UL NO. 486 STANDARD EDITION: Fully Automated AI Malware (Binary and Web), My Debate with Marcus Hutchins on AI and more

Unsupervised Learning

Play Episode Listen Later Jun 26, 2025 55:03 Transcription Available


UL NO. 486: STANDARD EDITION: Fully Automated AI Malware (Binary and Web), My Debate with Marcus Hutchins on AI, The 'Did You Notice?' Psyop, The METR AI Metric for Longterm Tasks, and more... You are currently listening to the Standard version of the podcast, consider upgrading and becoming a member to unlock the full version and many other exclusive benefits here: https://newsletter.danielmiessler.com/upgrade Read this episode online: https://newsletter.danielmiessler.com/p/ul-486 Subscribe to the newsletter at:https://danielmiessler.com/subscribe Join the UL community at:https://danielmiessler.com/upgrade Follow on X:https://x.com/danielmiessler Follow on LinkedIn:https://www.linkedin.com/in/danielmiesslerBecome a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

Unspoken Security
Why is Fighting Cybercrime Worth the Effort?

Unspoken Security

Play Episode Listen Later Jun 26, 2025 45:52


Cyber crime continues to grow each year, but should organizations give up fighting it? On this episode of Unspoken Security, host AJ Nash speaks with Robert Duncan from Netcraft, who argues the answer is absolutely not. Robert makes the case that fighting cyber crime is worth the effort, even when it feels like an endless battle.Robert challenges the common view that "whack-a-mole" tactics are pointless. He believes the key is changing the game from single-player to multiplayer whack-a-mole. By working with domain registrars, hosting providers, and government agencies, defenders can hit criminals at multiple points in their attack chain. This coordinated response makes cyber crime more expensive and less profitable for attackers.The conversation covers everything from traditional phishing to sophisticated pig butchering scams. Robert shares how Netcraft uses AI to engage with scammers and gather intelligence at scale. He also discusses the national security implications of cyber crime and why whole-of-government responses in countries like Australia and the UK show promise for reducing fraud rates.Send us a textSupport the show

Dr Marketing Tips Podcast
Malware Attack Case Study: How One Plugin Nearly Took Down a Medical Website

Dr Marketing Tips Podcast

Play Episode Listen Later Jun 26, 2025 18:09


In this episode of the DrMarketingTips Show, Jennifer and Corey share a real-world cautionary tale about a malware attack on a client's medical practice website, where Google search results started redirecting patients to a sketchy pharmaceutical site.Listen in as they walk through what happened, how they uncovered the problem, what steps were taken to fix it, and how you can prevent it from happening to your practice.This episode is a must-listen for practice administrators, marketing managers, and business owners who rely on their websites to generate appointments, build patient trust, and maintain SEO rankings.Tune in to Discover:The sneaky signs of a malware attack that aren't always obviousHow a single outdated WordPress plugin created a dangerous redirectActionable steps to safeguard your website from future threatsHow to handle a hack like a pro and keep your team in the loopOur go-to security checklist and plugin tools for prevention

Business of Tech
Malware in ConnectWise, Telecom Hacks, and MSPs' False Confidence in Cybersecurity

Business of Tech

Play Episode Listen Later Jun 25, 2025 14:43


ConnectWise is currently facing a significant crisis of trust as attackers exploit its signed software to distribute malware. This alarming trend has seen a notable increase in infections since March 2025, primarily due to poor signing practices that allow malicious users to embed harmful code within legitimate applications. Reports indicate that the ConnectWise ScreenConnect remote access tool was the most commonly abused legitimate tool in 2024, with a staggering 56% of all active threat reports involving remote access tools. The rise in phishing schemes utilizing ConnectWise samples has raised concerns about the security measures in place and the implications for managed service providers (MSPs).Despite the increasing number of breaches, a recent survey revealed that 76% of MSP leaders remain confident in their cybersecurity efforts, even as nearly 70% reported experiencing multiple cyber breaches in the past year. This disconnect between confidence and reality poses a significant problem, as many MSPs recognize the need to improve their defenses but feel ill-equipped to guide customers through complex regulatory changes. The situation is further complicated by sensationalized reports of massive data breaches, which can divert attention from verified security threats and contribute to a false sense of security.The podcast also highlights the ongoing Salt Typhoon hack, which has reportedly led to major U.S. telecommunications companies instructing their incident response teams not to seek evidence of the intrusion. This directive raises concerns about the scale of the breach and the lack of accountability within the telecom sector, where deregulation has diminished incentives for companies to invest in security measures. Experts warn that this willful ignorance sets a dangerous precedent, particularly in critical infrastructure, and emphasizes the need for a reevaluation of vendor liability in the face of such breaches.In response to the evolving challenges faced by MSPs, several vendors have introduced new tools and features aimed at improving operational efficiency and security. Synchro's Universal Billing feature aims to streamline billing processes, while Manage Engine's MSP Central platform seeks to enhance service delivery and device management. Additionally, Hornet Security has launched an AI Cyber Assistant to bolster cybersecurity for Microsoft 365 users. These developments indicate that while vendors are recognizing the challenges MSPs face, they often lag behind in providing the necessary solutions, underscoring the importance of selecting platforms that prioritize practical integration and real-world impact. Three things to know today 00:00 Legit Tools, Real Breaches: ConnectWise Malware Surge and Telecom Hacks Highlight Systemic Security Failures06:54 MSP Tools Evolve as Syncro, ManageEngine, and Hornetsecurity Target Profitability, Consolidation, and AI Security09:47 Bitdefender, Pia and Nexus IT Signal Strategic Evolution in the MSP and Security Landscape This is the Business of Tech.    Supported by:  https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

Paul's Security Weekly
The Rise of Malware: Salt Typhoon and Spark Kitty - SWN #488

Paul's Security Weekly

Play Episode Listen Later Jun 24, 2025 35:37


In this episode of Security Weekly News, Doug White discusses various cybersecurity threats, including the Salt Typhoon and Spark Kitty malware, the implications of Microsoft's decision to drop support for old hardware drivers, and the potential increase in cyber threats from Iran. The conversation also covers the alarming 16 billion password leak and the evolving landscape of password security, including the rise of passkeys and the challenges posed by AI in misinformation and social engineering. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-488

Hack Naked News (Audio)
The Rise of Malware: Salt Typhoon and Spark Kitty - SWN #488

Hack Naked News (Audio)

Play Episode Listen Later Jun 24, 2025 35:37


In this episode of Security Weekly News, Doug White discusses various cybersecurity threats, including the Salt Typhoon and Spark Kitty malware, the implications of Microsoft's decision to drop support for old hardware drivers, and the potential increase in cyber threats from Iran. The conversation also covers the alarming 16 billion password leak and the evolving landscape of password security, including the rise of passkeys and the challenges posed by AI in misinformation and social engineering. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-488

Hack Naked News (Video)
The Rise of Malware: Salt Typhoon and Spark Kitty - SWN #488

Hack Naked News (Video)

Play Episode Listen Later Jun 24, 2025 35:37


In this episode of Security Weekly News, Doug White discusses various cybersecurity threats, including the Salt Typhoon and Spark Kitty malware, the implications of Microsoft's decision to drop support for old hardware drivers, and the potential increase in cyber threats from Iran. The conversation also covers the alarming 16 billion password leak and the evolving landscape of password security, including the rise of passkeys and the challenges posed by AI in misinformation and social engineering. Show Notes: https://securityweekly.com/swn-488

Cyber Security Today
Exposing Cybersecurity Threats: Breaches, Vulnerabilities, and Evolving Malware

Cyber Security Today

Play Episode Listen Later Jun 20, 2025 14:28 Transcription Available


In this episode of 'Cybersecurity Today,' host Jim Love discusses several alarming cybersecurity developments. A recent Washington Post breach raises critical questions about Microsoft 365's enterprise security as foreign government hackers compromised the email accounts of journalists.  Additionally, a critical Linux flaw allows attackers to gain root access, making millions of systems vulnerable. Upgraded Godfather malware now creates virtual banking apps on infected Android devices to steal credentials in real-time. Moreover, a record-breaking data breach has exposed 16 billion logins, including Apple accounts, underscoring the fundamental flaws of password-based security. Finally, the episode addresses the systemic vulnerabilities of SMS-based two-factor authentication, advocating for a transition to app-based or hardware key solutions. 00:00 Introduction and Major Headlines 00:24 Microsoft 365 Security Breach 03:19 Critical Linux Vulnerabilities 05:59 Godfather Malware Evolution 08:18 Massive Data Breach Exposed 11:30 The Fall of SMS Two-Factor Authentication 13:21 Conclusion and Final Thoughts

Cyber Security Headlines
Hackers exploit Langflow flaw, TP-Link routers still vulnerable, Russia detects SuperCard malware attacks

Cyber Security Headlines

Play Episode Listen Later Jun 18, 2025 8:52


Hackers exploit critical Langflow flaw to unleash Flodrix botnet Organizations warned of vulnerability exploited against discontinued TP-Link routers Russia detects first SuperCard malware attacks skimming bank data via NFC Huge thanks to our sponsor, Adaptive Security — OpenAI's first cybersecurity investment As deepfake scams and GenAI phishing evolve, Adaptive equips security teams with AI-powered phishing simulations featuring realistic personalized deepfakes and engaging security awareness training. Their new AI Content Creator turns threat intel and policy updates into interactive, multilingual training — instantly. Trusted by Fortune 500s and backed by Andreessen Horowitz and OpenAI, Adaptive helps you stay ahead of AI-driven threats. Learn more at adaptivesecurity.com.

Passwort - der Podcast von heise security
Lokale Sauereien von Meta und Yandex

Passwort - der Podcast von heise security

Play Episode Listen Later Jun 18, 2025 115:35


Meta und Yandex sind bei Trackingmethoden erwischt worden, die weit über das Übliche hinausgehen. Christopher und Sylvester sehen sich die Publikation "Local Mess" an. Darin dokumentieren Forscher Tracking-Tricks dieser Firmen, die den Nutzerwünschen explizit zuwiderlaufen, Securitymaßnahmen untergraben und Kommunikation verschleiern. Die Hosts haben Mühe, noch einen Unterschied zum Vorgehen typischer Malware zu sehen. - Publikation "Local Mess": https://localmess.github.io - Ars Technica zu LocalMess: https://arstechnica.com/security/2025/06/meta-and-yandex-are-de-anonymizing-android-users-web-browsing-identifiers/ - Pläne zu "Local Networt Access": https://github.com/explainers-by-googlers/local-network-access Mitglieder unserer Security Community auf heise security PRO hören alle Folgen bereits zwei Tage früher. Mehr Infos: https://pro.heise.de/passwort

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Monday, June 16th, 2025: Katz Stealer in JPG; JavaScript Attacks; Reviving expired Discord Invites for Evil

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Jun 16, 2025 6:44


Katz Stealer in JPG Xavier found some multistage malware that uses an Excel Spreadsheet and an HTA file to load an image that includes embeded a copy of Katz stealer. https://isc.sans.edu/diary/More+Steganography/32044 https://unit42.paloaltonetworks.com/malicious-javascript-using-jsfiretruck-as-obfuscation/ JavaScript obfuscated with JSF*CK is being used on over 200,000 websites to direct victims to malware Expired Discord Invite Links Used for Malware Distribution Expired discord invite links are revived as vanity links to direct victims to malware sites https://research.checkpoint.com/2025/from-trust-to-threat-hijacked-discord-invites-used-for-multi-stage-malware-delivery/

Hacked
Danabot: The Malware Operation That infected Itself

Hacked

Play Episode Listen Later Jun 16, 2025 90:37


In this episode: the inside story of Danabot, the malware-as-a-service platform that thrived in the shadows for nearly a decade—until a critical mistake exposed its creators. Just last week, U.S. prosecutors unsealed charges against sixteen alleged operators, using evidence pulled not from a takedown, but from Danabot's own infection logs. Plus: a roundup of other top stories. Last week was a rerun—life got a little hectic—so we kept the mic hot and recorded a 90-minute marathon episode to make up for it. Let us know if you're intro it. Hacked is brought to you by Push Security Check them out at pushsecurity.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Topic Lords
295. Fantasy Malware

Topic Lords

Play Episode Listen Later Jun 16, 2025 64:47


Lords: * Andrew * Andrew Topics: * Finally making a 3D game after using only PICO-8 for 10 years * PICO-8 screen carts * Picotron Viruses * Quest by kittenmaster * https://media24.fireside.fm/file/fireside-uploads-2024/images/3/3597ddeb-e52e-4cda-a59c-c64600489fea/Kvg10u32.png Microtopics: * Professional software developers trying to figure out a terrible UI. * The Real Andrew – it says so on my computer screen. * Make 10 Deluxe. * Double Mustache's Lizard Multiplication, now available in a cardboard box in Staples. * Lizard Multiplication Tables. * Total Toads. * Pizza Panda vs. Pizza Possum. * Children's Allegra, on Nick, Jr. * Eugene, Oregon, the grass seed capital of the world. * Scientists discovering an exciting new antihistamine in the medicine aisle. * Working on whatever feature strikes your fancy for a year and ending up with an undirected project that's nowhere near shipping. * Using the lessons you've learned making small games to make a bigger game. * Making an N64 game for modern PCs. * Two people with the same name, the same headphones, and the same back story. * 3D cameras: a huge pain in the ass. * What makes San Francisco Rush different from Mario Kart. * Getting Keys in Rush 2. * How to collect keys in the middle of the air. * Yellow Taxi Goes Vroom and other car platformers. * Extending the lifetime of an arcade game by adding weird secrets. * Arcade games with a save system. * Feeding Smash Tokens into the gacha system. * Super Mario Bros.: The Movie: The Game. * Looking at Picotron and thinking "I don't have time to draw that many pixels." * The Tweet Jam Andrews. * Is this really that interesting, Andrew? * Foreshadowing the poem. * How much game can you fit on one screen? * Code golfing and limiting yourself to typeable characters. * Reading a David Ahl book and realizing you want to tell the sand how to think. * Playing music on the PC speaker and printing funny phrases on the screen. * Writing a series of text mode animations in C in 1992 and then losing them all. * STDIO jam. * Dig World and Dig World Realms. * Typing in 6 pages of ROT13 text. * Writing an adventure game with a novel-length source code listing and demanding that players type it in. * Accidentally reading ROT13 spoilers. * The people who memorize the eye exam chart. * Rotting ROT13 a different amount. * Running ROT13 multiple times for extra security. * Competing ROT13 implementations that rotate in different directions. * Games in which the game state includes what line of code is currently executing. * How beginners expect game programming to work. * Deliberately contracting the Picotron virus where the characters fall to the bottom of your screen. * A monster that runs around on your desktop and eats your icons. * Turning off networking features for individual programs. * Writing a keylogger to read people's email and it turns out people's email is incredibly boring. * Writing a keylogger by hooking the keyboard interrupt and not bothering to log the state of the shift key. * Capturing the handshake and brute forcing it. * The first S is for Secure. * Screen carts vs. tweet carts. * Colon colon home colon colon. * Question mark? Puzzlescript man. (Or weird asterisk.) * The new default Pico-8 code editor background color. * Forgetting to screen shot the pixels so you open the image in Photoshop and add the pixels back. * Alfonzo's Bowling Challengs. * Unlocking HD streaming at level 2.

Insights Into Things
Insights Into Technology: Episode 29 "Executive Disorder, Now with Extra Malware!" (AUDIO)

Insights Into Things

Play Episode Listen Later Jun 15, 2025 30:59


In this episode of Insights into Technology, we dive deep into the dark web of cybersecurity as a new hacker collective takes a surprising aim at Russia in retaliation for geopolitical tensions. Discover how Microsoft is tightening its security belts by blocking over 120 risky email attachments in Outlook, aiming to shield users from malicious threats. We also explore a privacy oversight that left Google scrambling when their 'Find My Device' feature inadvertently became a tool for hackers to reverse-engineer user phone numbers. Join us as we unravel these digital dramas and their profound implications on global cyber landscapes.

Insights Into Things
Insights Into Technology: Episode 29 "Executive Disorder, Now with Extra Malware!" (VIDEO)

Insights Into Things

Play Episode Listen Later Jun 15, 2025 30:59


In this episode of Insights into Technology, we dive deep into the dark web of cybersecurity as a new hacker collective takes a surprising aim at Russia in retaliation for geopolitical tensions. Discover how Microsoft is tightening its security belts by blocking over 120 risky email attachments in Outlook, aiming to shield users from malicious threats. We also explore a privacy oversight that left Google scrambling when their 'Find My Device' feature inadvertently became a tool for hackers to reverse-engineer user phone numbers. Join us as we unravel these digital dramas and their profound implications on global cyber landscapes.

Unspoken Security
Is Your Ego Impeding Your Career Fulfillment?

Unspoken Security

Play Episode Listen Later Jun 12, 2025 62:21


In this episode of Unspoken Security, host AJ Nash sits down with Jennifer Leggio, Chief Strategy Officer of W2 Communications, to discuss the unspoken challenges impacting career fulfillment. Jennifer shares her personal experiences with toxic work environments, imposter syndrome, and the struggle to balance ego and self-awareness. She highlights the importance of advocating for yourself while remaining empathetic to others' struggles.Jennifer introduces the concept of "self-energy," emphasizing the need to prioritize what's best for everyone, not just yourself. She also explores the impact of personal trauma on professional life and offers practical advice for building resilience. Jennifer emphasizes the value of self-care, including meditation and affirmations. She shares her personal "courage plan" framework to help listeners overcome obstacles and create a more fulfilling life.This episode challenges listeners to examine their behaviors and create a path toward greater self-awareness and personal growth, both personally and professionally.Send us a textSupport the show

PEBCAK Podcast: Information Security News by Some All Around Good People
Episode 211 - Hospital Employee Implanted Malware, SentinelOne Outage, Evil VirusTotal Takedown, Airport Overnight Stay Tips

PEBCAK Podcast: Information Security News by Some All Around Good People

Play Episode Listen Later Jun 9, 2025 50:27


Welcome to this week's episode of the PEBCAK Podcast!  We've got four amazing stories this week so sit back, relax, and keep being awesome!  Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast   Please share this podcast with someone you know!  It helps us grow the podcast and we really appreciate it!   Hospital employee installs malware on coworkers' computers https://www.thebaltimorebanner.com/community/criminal-justice/matthew-bathula-umd-hospital-hack-32KWAHLG2RBNLFFVX5BAFILRCM/   SentinelOne outage https://www.bleepingcomputer.com/news/technology/sentinelone-last-weeks-7-hour-outage-caused-by-software-flaw/   AVCheck taken down https://www.bleepingcomputer.com/news/security/police-takes-down-avcheck-antivirus-site-used-by-cybercriminals/   Airport stay tips https://www.wsj.com/lifestyle/travel/what-you-can-learn-from-my-miserable-night-stranded-at-the-airport-f6a8a94a   Dad Joke of the Week (DJOW)   Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Glenn - https://www.linkedin.com/in/glennmedina/ Koby - https://www.linkedin.com/in/koby-caputo-117358145/

Complex Systems with Patrick McKenzie (patio11)
Machine learning meets malware, with Caleb Fenton

Complex Systems with Patrick McKenzie (patio11)

Play Episode Listen Later Jun 5, 2025 81:16


Patrick McKenzie (patio11) discusses software reversing and AI's transformative impact on cybersecurity with Caleb Fenton, co-founder of Delphos Labs. They explore how LLMs are revolutionizing the traditionally tedious work of analyzing compiled binaries, the nation-state cyber warfare landscape, and how AI is shifting security from reactive to proactive defense. They cover the technical details of malware analysis, the economics of vulnerability detection, and the broader implications as both defenders and attackers gain access to increasingly powerful AI tools. –Full transcript available here: https://www.complexsystemspodcast.com/machine-learning-meets-malware-with-caleb-fenton/–Sponsor:  MercuryThis episode is brought to you by Mercury, the fintech trusted by 200K+ companies — from first milestones to running complex systems. Mercury offers banking that truly understands startups and scales with them. Start today at Mercury.com Mercury is a financial technology company, not a bank. Banking services provided by Choice Financial Group, Column N.A., and Evolve Bank & Trust; Members FDIC.–Links:Delphos Labs: https://delphoslabs.com/ Virus Total: https://www.virustotal.com/gui/home/upload “Thel fraud supply chain”, Bits about Money https://www.bitsaboutmoney.com/archive/the-fraud-supply-chain/ –Timestamps:(00:00) Intro(01:20) Understanding software reversing(03:52) The role of AI in software security(06:12) Nation-state cyber warfare(09:33) The future of digital warfare(16:45) Sponsor: Mercury(17:49) Reverse engineering techniques(30:15) AI's impact on reverse engineering(41:45) The importance of urgency in security alerts(42:47) The future of reverse engineering(43:21) Challenges in security product development(44:46) AI in vulnerability detection(46:09) The evolution of AI models(48:06) Reasoning models and their impact(49:06) AI in software security(49:49) The role of linters in security(57:38) AI's impact on various fields(01:02:42) AI in education and skill acquisition(01:08:51) The future of AI in security and beyond(01:12:43) The adversarial nature of AI in security(01:19:46) Wrap

Cyber Security Headlines
Meta, Yandex take heat on browsing identifiers, Acreed malware makes gains, HPE warns of critical auth bypass

Cyber Security Headlines

Play Episode Listen Later Jun 4, 2025 7:52


Meta and Yandex are de-anonymizing Android users' web browsing identifiers LummaC2 fractures as Acreed malware becomes top dog Hewlett Packard Enterprise warns of critical StoreOnce auth bypass Huge thanks to our sponsor, Conveyor Tired of herding cats to complete customer security questionnaires?  Your team probably spends hours daily juggling the back and forth of completing these security requests. That's why Conveyor created Sue, the first AI Agent for Customer Trust. Sue doesn't just handle completing security questionnaires and sending SOC 2 to prospects – she manages all the communication and follow-up too.  You simply get notified when everything's done so you can do a quick review.  Stop wrangling cats and see what Sue can do for you at www.conveyor.com.  

Storm⚡️Watch by GreyNoise Intelligence
Cyber Threat Showdown: TikTok Malware, Exploit Scoring Wars & Real-World Attacks

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Jun 3, 2025 50:03


Forecast = Stormy with a chance of TikTok malware showers—exploit scoring systems hot, but patch management outlook remains partly cloudy. Welcome to Storm⚡️Watch! In this episode, we're diving into the current state of cyber weather with a mix of news, analysis, and practical insights. This week, we tackle a fundamental question: are all exploit scoring systems bad, or are some actually useful? We break down the major frameworks: **CVSS (Common Vulnerability Scoring System):** The industry standard for assessing vulnerability severity, CVSS uses base, temporal, and environmental metrics to give a comprehensive score. It's widely used but has limitations—especially since it doesn't always reflect real-world exploitability. **Coalition Exploit Scoring System (ESS):** This system uses AI and large language models to predict the likelihood that a CVE will be exploited in the wild. ESS goes beyond technical severity, focusing on exploit availability and usage probabilities, helping organizations prioritize patching with better accuracy than CVSS alone. **EPSS (Exploit Prediction Scoring System):** EPSS is a data-driven approach that estimates the probability of a vulnerability being exploited, using real-world data from honeypots, IDS/IPS, and more. It updates daily and helps teams focus on the most urgent risks. **VEDAS (Vulnerability & Exploit Data Aggregation System):** VEDAS aggregates data from over 50 sources and clusters vulnerabilities, providing a score based on exploit prevalence and maturity. It's designed to help teams understand which vulnerabilities are most likely to be actively exploited. **LEV/LEV2 (Likely Exploited Vulnerabilities):** Proposed by NIST, this metric uses historical EPSS data to probabilistically assess exploitation, helping organizations identify high-risk vulnerabilities that might otherwise be missed. **CVSS BT:** This project enriches CVSS scores with real-world threat intelligence, including data from CISA KEV, ExploitDB, and more. It's designed to help organizations make better patching decisions by adding context about exploitability. Next, we turn our attention to a troubling trend: malware distribution via TikTok. Attackers are using AI-generated videos, disguised as helpful software activation tutorials, to trick users into running malicious PowerShell commands. This “ClickFix” technique has already reached nearly half a million views. The malware, including Vidar and StealC, runs entirely in memory, bypassing traditional security tools and targeting credentials, wallets, and financial data. State-sponsored groups from Iran, North Korea, and Russia have adopted these tactics, making it a global concern. For employees, the takeaway is clear: never run PowerShell commands from video tutorials, and always report suspicious requests to IT. For IT teams, consider disabling the Windows+R shortcut for standard users, restrict PowerShell execution, and update security awareness training to include social media threats. We also highlight the latest from Censys, VulnCheck, runZero, and GreyNoise—industry leaders providing cutting-edge research and tools for vulnerability management and threat intelligence. Don't miss GreyNoise's upcoming webinar on resurgent vulnerabilities and their impact on organizational security. And that's a wrap for this episode! We will be taking a short break from Storm Watch for the summer. We look forward to bringing more episodes to you in the fall! Storm Watch Homepage >> Learn more about GreyNoise >>  

Cyber Security Today
Cybersecurity Incidents: Eddie Steeler Malware, ConnectWise Breach, and Nova Scotia Power Data Theft

Cyber Security Today

Play Episode Listen Later Jun 2, 2025 8:27 Transcription Available


  In this episode of Cybersecurity Today, host David Shipley discusses several key cyber incidents affecting organizations and individuals. A new rust-based information stealer, known as Eddie Steeler, is being distributed via deceptive CAPTCHA verification pages. ConnectWise, a management software firm, has been breached in an attack suspected to be linked to a nation-state actor, affecting a limited number of its ScreenConnect customers. Additionally, threat actors are now abusing Google App Script to bypass phishing defenses, exploiting the trusted Google brand to trick users. Lastly, a significant data breach at Nova Scotia Power has exposed the social insurance numbers of up to 140,000 customers, making it one of the largest utility data breaches in North America. 00:00 Introduction to Today's Cybersecurity News 00:31 Eddie Steeler Malware Campaign 02:32 ConnectWise Cyber Attack 04:49 Google App Script Phishing Attacks 06:50 Nova Scotia Power Data Breach 08:02 Conclusion and Listener Engagement

Hacked
Throwback: The Malware Historian

Hacked

Play Episode Listen Later Jun 2, 2025 47:18


Today malware is all nation state actors and organized crime, but in the beginning it was more about making a statement. Dan is a malware historian. He finds old hardware and viruses, runs them, and sees what happens. So we sat down to discuss the history of malware, where it's come from, and where he thinks it's going next. Check out his amazing YouTube channel at ⁠https://www.youtube.com/user/danooct1 Hacked is brought to you by PushSecurity.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Tech Gumbo
Netflix YouTube And AI Ads, TikTok Freebies Causing Malware, Texas Social Media Laws And Age Verification, Baby Saved By DNA Gene-Editing

Tech Gumbo

Play Episode Listen Later Jun 2, 2025 22:06


News and Updates: Netflix and YouTube will use AI Gen ads for cheaper plans TikTok videos to get free software result in malware Texas bans social media for those under 18 Texas creates age-verification laws despite privacy concerns Baby gets lifesaving Personalized Gene-Editing cure

Unspoken Security
How Post-Quantum Computing (PQC) Will Save the Internet

Unspoken Security

Play Episode Listen Later May 29, 2025 63:40 Transcription Available


In this unfiltered episode of Unspoken Security, host A. J. Nash explores the looming threat quantum computing poses to our digital infrastructure with experts Robert Clyde, Managing Director of Clyde Consulting and Chair of crypto-security firm CryptoQuanti, and Jamie Norton, a Board Director at ISACA with extensive cybersecurity credentials. They cut through the technical jargon to explain how quantum computing fundamentally differs from classical computing and why its exponential processing power threatens to break current encryption standards."While current quantum computers operate at around 150 qubits, once they reach sufficient power, everything from banking transactions to secure communications could be compromised instantly," warns Robert during the discussion of "Q Day" — the moment when quantum computers become powerful enough to defeat public-key cryptography underpinning internet security.Despite the alarming scenario, the experts offer practical guidance on preparing for this threat. They outline how organizations should begin implementing post-quantum cryptography solutions developed by NIST, emphasizing that proactive preparation, not panic, is the critical response security professionals should adopt today. Listen to the full episode to understand the quantum threat and learn the concrete steps your organization should take now before Q Day arrives.Send us a textSupport the show

Smashing Security
Star Wars, the CIA, and a WhatsApp malware mirage

Smashing Security

Play Episode Listen Later May 28, 2025 47:44


Why is a cute Star Wars fan website now redirecting to the CIA? How come Cambodia has become the world's hotspot for scam call centres? And can a WhatsApp image really drain your bank account with a single download, or is it just a load of hacker hokum?All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Allan Liska.Warning: This podcast may contain nuts, adult themes, and rude language.Episode links:How I found a Star Wars website made by the CIA - Ciro Santilli on YouTube.How the CIA failed Iranian informants in its secret war with Tehran - Reuters.Isis and al-Qaeda sending coded messages through eBay, pornography and Reddit - Independent.Games Without Frontiers: Investigating Video Games as a Covert Channel - IEEE.General David Petraeus used clever Gmail trick during affair - Network World.Cambodia is home to world's most powerful criminal network: report - SCMP.How to protect yourself from suspicious messages and scams- WhatsApp.Is WhatsApp Safe? Tips for Staying Secure - WhatsApp.Hacked on WhatsApp – how to stay safe when using the messaging app - BBC.Just a GIF Image Could Have Hacked Your Android Phone Using WhatsApp - The Hacker News.Kon-Tiki: The Epic Raft Journey Across the Pacific - YouTube.Still Standing with Jonny Harris - CBC.Niki de Saint Phalle & Jean Tinguely - Myths & Machines - Hauser & Wirth.Smashing Security merchandise (t-shirts, mugs, stickers and stuff)Sponsored by:Vanta– Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!

Brad & Will Made a Tech Pod.
288: High Quackuracy

Brad & Will Made a Tech Pod.

Play Episode Listen Later May 25, 2025 83:55


That Q&A time is here again, and this month we field emails and Discord Qs about such things as the hopeful return of the webring, what to do with the hardware if your PC is compromised by a bad actor, Nvidia cards in Linux, using game consoles as streaming media boxes, human stenography in courtrooms being replaced by recordings (and maybe AI), an extremely ambitious plan to stream some ducks, and perhaps the best pirate radio station idea we've ever heard. Support the Pod! Contribute to the Tech Pod Patreon and get access to our booming Discord, a monthly bonus episode, your name in the credits, and other great benefits! You can support the show at: https://patreon.com/techpod

The CyberWire
When malware masters meet their match.

The CyberWire

Play Episode Listen Later May 23, 2025 39:41


Operation Endgame dismantles cybercriminal infrastructure. DOGE's use of the Grok AI chatbot raises ethical and privacy concerns. Malware on the npm registry uses malicious packages to quietly gather intelligence on developer environments. Researchers link Careto malware to the Spanish government. Exploring proactive operations via letters of marque. Hackers hesitate to attend the HOPE conference over travel concerns. Our guest is Jeffrey Wheatman, Cyber Risk Expert at Black Kite, warning us to "Beware the silent breach." AI threatens to spill secrets to save itself. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On today's Industry Voices, we were joined at the RSAC Conference by Jeffrey Wheatman, Cyber Risk Expert at Black Kite, as he is sharing his thoughts on "Beware the silent breach." Listen to Jeffery's interview here.Selected Reading Operation ENDGAME strikes again: the ransomware kill chain broken at its source (Europol) Russian developer of Qakbot malware indicted by US for global ransomware campaign (CNews) Russian hackers target US and allies to disrupt Ukraine aid, warns NSA (CNews) Exclusive: Musk's DOGE expanding his Grok AI in U.S. government, raising conflict concerns (Reuters) 60 malicious npm packages caught mapping developer networks (Developer Tech) Mysterious hacking group Careto was run by the Spanish government, sources say (TechCrunch) An 18th-century war power resurfaces in cyber policy talks (Next Gov) Hacker Conference HOPE Says U.S. Immigration Crackdown Caused Massive Crash in Ticket Sales (404 Media) Anthropic's new AI model turns to blackmail when engineers try to take it offline (TechCrunch) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Paul's Security Weekly
Malware Laced Printer Drivers - PSW #875

Paul's Security Weekly

Play Episode Listen Later May 22, 2025 121:59


This week in the security news: Malware-laced printer drivers Unicode steganography Rhode Island may sue Deloitte for breach. They may even win. Japan's active cyber defense law Stop with the ping LLMs replace Stack Overflow - ya don't say? Aggravated identity theft is aggravating Ivanti DSM and why you shouldn't use it EDR is still playing cat and mouse with malware There's a cellular modem in your solar gear Don't slack on securing Slack XSS in your mail SIM swapping and the SEC Ivanti and libraries Supercomputers in space! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-875

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Thursday, May 8th: Modular Malware; Sysaid Vuln; Cisco Wireless Controller Patch; Unifi Protect Camera Patch

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later May 8, 2025 5:41


Example of Modular Malware Xavier analyzes modular malware that downloads DLLs from GitHub if specific features are required. In particular, the webcam module is inspected in detail. https://isc.sans.edu/diary/Example%20of%20%22Modular%22%20Malware/31928 Sysaid XXE Vulnerabilities IT Service Management Software Sysaid patched a number of XXE vulnerabilities. Without authentication, an attacker is able to obtain confidential data and completely compromise the system. watchTowr published a detailed analysis of the flaws including exploit code. https://labs.watchtowr.com/sysowned-your-friendly-rce-support-ticket/ Cisco IOS XE Wireless Controller Software Arbitrary File Upload Vulnerability Cisco Patched a vulnerability in its wireless controller software that may be used to not only upload files but also execute code as root without authentication. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-file-uplpd-rHZG9UfC Unifi Protect Camera Vulnerability Ubiquity patched a vulnerability in its Protect camera firmware fixing a buffer overflow flaw. https://community.ui.com/releases/Security-Advisory-Bulletin-047-047/cef86c37-7421-44fd-b251-84e76475a5bc

The CyberWire
No hocus pocus—MagicINFO flaw is the real threat.

The CyberWire

Play Episode Listen Later May 6, 2025 37:01


A critical flaw in a Samsung's CMS is being actively exploited. President Trump's proposed 2026 budget aims to slash funding for CISA. “ClickFix” malware targets both Windows and Linux systems through advanced social engineering. CISA warns of a critical Langflow vulnerability actively exploited in the wild. A new supply-chain attack targets Linux servers using malicious Go modules found on GitHub. The Venom Spider threat group targets HR professionals with fake resume submissions. The Luna Moth group escalates phishing attacks on U.S. legal and financial institutions. The U.S. Treasury aims to cut off a Cambodia-based money laundering operation. Our guest is  Monzy Merza, Co-Founder and CEO of Crogl, discussing the CISO's conundrum in the face of AI. Malware, mouse ears, and mayhem: Disney hacker pleads guilty. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Industry Voices segment, we are joined by Monzy Merza, Co-Founder and CEO of Crogl, who is discussing the CISO's conundrum—the growing challenge of securing organizations in a world where AI rapidly expands both the number of users and potential adversaries.Selected Reading Samsung MagicINFO Vulnerability Exploited Days After PoC Publication (SecurityWeek) Trump would cut CISA budget by $491M amid ‘censorship' claim  (The Register) New ClickFix Attack Mimics Ministry of Defense Website to Attack Windows & Linux Machines (Cyber Security News) Critical Vulnerability in AI Builder Langflow Under Attack (SecurityWeek) Linux wiper malware hidden in malicious Go modules on GitHub (Bleeping Computer) Malware scammers target HR professionals with Venom Spider malware (SC Media) Luna Moth extortion hackers pose as IT help desks to breach US firms (Bleeping Computer) US Readies Huione Group Ban Over Cybercrime Links (GovInfo Security) Hacker 'NullBulge' pleads guilty to stealing Disney's Slack data (Bleeping Computer) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices