American technology company
POPULARITY
Categories
Take a Network Break! We start with some educational content on Small Modular Nuclear Reactors, and sound the alarm about a sandbox escape affecting the Firefox browser. On the news front, a DNS issue triggers a major Azure outage that affected numerous services and caused problems around the globe, Palo Alto Networks announces enhancements to... Read more »
Take a Network Break! We start with some educational content on Small Modular Nuclear Reactors, and sound the alarm about a sandbox escape affecting the Firefox browser. On the news front, a DNS issue triggers a major Azure outage that affected numerous services and caused problems around the globe, Palo Alto Networks announces enhancements to... Read more »
Take a Network Break! We start with some educational content on Small Modular Nuclear Reactors, and sound the alarm about a sandbox escape affecting the Firefox browser. On the news front, a DNS issue triggers a major Azure outage that affected numerous services and caused problems around the globe, Palo Alto Networks announces enhancements to... Read more »
Recent advancements in quantum computing are pushing the technology closer to practical application, with companies like Google, IBM, and ICONIC making significant strides in stabilizing quantum systems. This progress poses risks to current encryption methods, as traditional security measures may become obsolete due to quantum capabilities. The National Institute of Standards and Technology (NIST) is advocating for the adoption of post-quantum cryptography (PQC) to protect sensitive data, emphasizing the urgency for organizations to reassess their security protocols. Failure to act could result in severe repercussions, including data breaches and regulatory noncompliance.Google's quantum computing division has published research demonstrating practical applications for quantum computers, such as using quantum technology for nuclear magnetic resonance to estimate atomic structures. The company is shifting its focus from merely proving quantum feasibility to making the technology cost-effective. Sundar Pichai, CEO of Alphabet, expressed optimism about the timeline for commercially viable quantum computing, while industry opinions vary, with some experts suggesting practical applications may still be decades away. This divergence highlights the uncertainty surrounding the timeline for widespread quantum adoption.In addition to quantum computing advancements, the episode discusses the integration of PQC into mainstream technology. Microsoft Windows 11 has begun incorporating PQC algorithms into its cryptographic APIs, allowing for the generation of PQC key pairs and hybrid TLS handshakes. Meanwhile, companies like Palo Alto Networks are updating their software to support quantum-resistant encryption. These developments indicate a growing recognition of the need for quantum-safe security measures as organizations prepare for the potential threats posed by quantum computing.For Managed Service Providers (MSPs) and IT decision-makers, the implications are clear: proactive measures are necessary to prepare for the quantum computing era. MSPs should assist clients in inventorying their cryptographic systems and developing a roadmap for adopting PQC. As the U.S. government urges organizations to transition to quantum-safe encryption by 2035, MSPs must prioritize updating protocols and exploring quantum-resistant solutions. The transition to quantum-safe encryption is a multi-year effort, and early preparation will help mitigate future risks associated with quantum advancements. One thing to know today00:00 All About Quantum Computing This is the Business of Tech. Supported by:
In this episode of The Segment, host Raghu Nandakumara sits down with Carl Froggett, Chief Information Officer at Deep Instinct, the first company to apply end-to-end deep learning to cybersecurity.With nearly three decades of experience — including over 20 years at Citi leading global infrastructure defense and cybersecurity services — Carl brings a rare, full-circle perspective on how the cyber landscape, leadership, and culture have evolved from the early 2000s to today's AI-driven world.You'll learn:How Carl “accidentally” fell into cybersecurity — and what the early days of firewalls and compliance-driven security looked like What it was like to pioneer one of Citi's first dedicated cyber teams Lessons in leadership from iconic figures like Charles Blauner, Greg Lavender, and John Miller How Citi became an early adopter of technologies like Palo Alto Networks, Splunk, CrowdStrike, and Illumio Why building business alignment and trust matters more than ever for CISOs How to frame security risks in business terms — and where many leaders go wrong The massive shift from machine learning to deep learning in cybersecurity How generative AI and “dark AI” are redefining the threat landscape — and why the next era of defense demands a mindset change Packed with nostalgia, hard-won wisdom, and forward-looking insight, this episode bridges cybersecurity history, human leadership, and the AI-powered future ahead.Stay Connected with our host, Raghu on LinkedInFor more information about Illumio, check out our website at illumio.com
Parce que… c'est l'épisode 0x650! Shameless plug 4 et 5 novembre 2025 - FAIRCON 2025 8 et 9 novembre 2025 - DEATHcon 17 au 20 novembre 2025 - European Cyber Week 25 et 26 février 2026 - SéQCure 2026 Description Introduction Dans cet épisode du podcast Police Secure, Clément Cruchet présente une analyse approfondie de la surface d'attaque de Google Cloud Platform (GCP), un sujet souvent négligé dans la communauté de la cybersécurité. Contrairement à Azure et AWS qui bénéficient d'une documentation abondante sur leurs vulnérabilités et vecteurs d'attaque, GCP reste le “petit frère oublié” du cloud computing. Cette présentation, donnée lors de la conférence Bide, vise à combler cette lacune en explorant les chemins qu'un attaquant pourrait emprunter dans un environnement GCP. Le contexte : pourquoi GCP est moins documenté Clément observe qu'il y a trois ou quatre ans, la documentation sur les vulnérabilités GCP était quasi inexistante. Cette absence de contenu a même conduit certains utilisateurs sur des forums comme Reddit à affirmer de manière erronée que GCP était plus sûr ou exempt de mauvaises configurations. En réalité, ces failles existent bel et bien, mais elles n'avaient simplement pas été explorées en profondeur. Bien que la situation se soit améliorée depuis trois ans avec l'apparition de formations et de certifications, GCP demeure significativement moins couvert que ses concurrents. L'importance de l'IAM (Identity and Access Management) Le cœur de la sécurité dans tous les environnements cloud réside dans la gestion des identités et des accès. Que ce soit Azure, AWS, GCP ou d'autres fournisseurs comme Oracle Cloud ou Alibaba Cloud, chacun possède son propre modèle IAM distinct. Ces modèles constituent la base de toute gestion des permissions, rôles et autorisations dans les environnements cloud. Le paradoxe est clair : sans permissions IAM, on ne peut rien faire, mais avec trop de permissions, on ouvre la porte à des abus et des défauts de configuration. La majorité des vulnérabilités dans les environnements cloud proviennent justement de ces mauvaises configurations au sein de l'IAM. La hiérarchie unique de GCP GCP se distingue par sa structure hiérarchique particulière. Contrairement à AWS qui fonctionne avec des comptes, ou à Azure qui utilise des tenants, des subscriptions et des groupes de ressources, GCP adopte une approche top-down très structurée. Au sommet se trouve l'organisation, généralement liée au nom de domaine de l'entreprise (par exemple company.com). Sous l'organisation, on trouve des folders, comparables aux unités organisationnelles (OU) d'Active Directory. Ces folders contiennent ensuite des projets, qui constituent l'unité administrative la plus importante. Les projets dans GCP peuvent être comparés aux comptes AWS et c'est principalement à ce niveau que se fait la facturation. Pour beaucoup d'utilisateurs, seule la vue du projet est accessible, sans nécessairement avoir besoin d'une organisation complète. Cette flexibilité permet de commencer à travailler directement avec un projet sans passer par la création d'une infrastructure organisationnelle complète. Les rôles et leurs dangers Un point crucial soulevé par Clément concerne les rôles primitifs dans GCP : éditeur, viewer, owner et browser. Ces rôles sont extrêmement dangereux car ils accordent des permissions bien trop larges. Par exemple, un rôle d'éditeur peut avoir accès à 800 permissions différentes, ce qui viole complètement le principe du moindre privilège. Le message clé est de ne jamais utiliser ces rôles primitifs dans une infrastructure GCP. Même les rôles prédéfinis, pourtant plus granulaires, peuvent présenter des risques. Un rôle comme “compute admin”, qui devrait théoriquement se limiter à l'administration des ressources compute, peut en réalité inclure 800 permissions, dont certaines touchent à des services non liés comme BigQuery. La recommandation fondamentale est de créer des rôles personnalisés aussi granulaires que possible et d'appliquer systématiquement le principe du moindre privilège. Domain wide delegation : un vecteur d'exfiltration méconnu L'une des contributions majeures de cette présentation concerne le domain wide delegation, une technique d'exfiltration peu documentée. Cette fonctionnalité permet à un compte de service dans GCP d'interagir avec Google Workspace : accéder à Drive, Gmail, envoyer des emails au nom d'utilisateurs, récupérer des pièces jointes, etc. Clément a développé un outil Python appelé “Delegate” pour démontrer et tester cette technique. Lorsqu'il a écrit son article de blog sur le sujet début 2023, il n'existait pratiquement aucune documentation sur cette vulnérabilité. Ironiquement, Palo Alto Networks a publié un article similaire plusieurs mois après, ce qui témoigne du caractère précurseur de ses recherches. Le scénario d'attaque typique implique un attaquant qui compromet une machine virtuelle possédant un compte de service capable d'effectuer du domain wide delegation. Cette technique peut également servir de mécanisme de persistance, permettant à un attaquant de configurer sa propre délégation pour exfiltrer des données de manière discrète. L'outil Delegate permet de lire des emails, télécharger et uploader des fichiers sur Drive, offrant ainsi une capacité d'exfiltration complète. La matrice d'attaque GCP Pour synthétiser ses recherches, Clément propose une kill chain communautaire spécifique à GCP, disponible sur GitHub (github.com/otendfreed/GCP-attack-matrix). Cette matrice d'attaque représente l'ensemble des tactiques, techniques et procédures (TTP) depuis la reconnaissance jusqu'à l'exfiltration et l'impact. L'objectif est de fournir un outil pour les équipes de sécurité souhaitant effectuer du purple teaming dans des environnements GCP, leur permettant d'évaluer leurs contrôles de sécurité et leur capacité de détection. Conclusion Ce podcast souligne l'importance de ne pas négliger GCP dans les stratégies de sécurité cloud. Bien que moins documenté, ce fournisseur présente des vecteurs d'attaque tout aussi critiques que ses concurrents. La recherche communautaire et le partage de connaissances sont essentiels pour identifier et corriger les vulnérabilités avant que des attaquants malveillants ne les exploitent. Comme le souligne Clément, pour attaquer un système, il faut d'abord le comprendre, et c'est précisément cette compréhension qu'il cherche à transmettre à la communauté de la cybersécurité. Notes À venir Collaborateurs Nicolas-Loïc Fortin Clément Cruchet Crédits Montage par Intrasecure inc Locaux réels par Bsides Montréal
In this episode of the Changemakers, Dave sits down with David Moulton, Senior Director, Content Marketing & Thought Leadership at Palo Alto Networks, to explore the art and the impact of storytelling in B2B marketing and cybersecurity. David shares why emotive storytelling is often overlooked in B2B, how it can cut through complexity, and why it's the ultimate driver of trust, attention, and decision-making. From translating technical topics into human stories to building authentic brand narratives, this conversation dives deep into how emotion and creativity can transform even the most tech-heavy, data-driven industries.If you're interested in elevating your brand's storytelling, or simply love hearing about how the best are doing it, then this episode is a must-listen.
Episode 263 of The Smart Agents Podcast features Aidan Brannigan, founder of No Boring Brands, to share how he's redefining social media marketing through humor, memes, and creative storytelling — helping even the most traditional industries break through online.From building one of the largest marketing meme pages on Instagram to leading campaigns for companies like Apollo and Palo Alto Networks, Aidan has proven that humor isn't just for entertainment — it's one of the most powerful tools for brand connection and audience growth.In this episode, Aidan shares:✅ How real estate agents can use humor to stand out without losing professionalism✅ Why niche, authentic content outperforms generic marketing every time✅ Simple tools and strategies for creating engaging memes and short-form videos✅ How consistency and creativity lead to long-term brand authorityLearn More From Aidan
In this episode, Dr. Dave Chatterjee speaks with Anupam Upadhyay, Senior Vice President, Product Management, Palo Alto Networks, a seasoned product and cybersecurity leader, to unpack the “new browser wars” and why enterprise browsers are fast becoming a core battleground in the fight for digital trust. Drawing on over two decades of experience spanning Cisco, startups, and Palo Alto, Upadhyay traces the evolution of the humble browser from a passive content viewer into the primary interface for cloud applications, collaboration tools, and sensitive business data.The conversation examines the browser's expanding role as both a productivity hub and a primary attack vector—accounting for over 90 percent of initial intrusions via phishing, malicious extensions, or session hijacking. Through the lens of the Commitment-Preparedness-Discipline (CPD) Framework, Dr. Chatterjee and Anupam Upadhyay emphasize that securing the enterprise browser is not merely a technical exercise but a governance imperative: leadership commitment to zero-trust principles, preparedness through hardened configurations and employee training, and disciplined enforcement of consistent controls across devices and partners.Time Stamps• 00:49 — Dave's introduction and guest overview.• 03:00 — Anupam Upadhyay's career journey and reinvention at Palo Alto Networks.• 05:00 — Historical context: how browsers stayed outside the security spotlight.• 08:40 — Cloud and SaaS migration shifting business to the browser.• 11:20 — Emerging browser threats and data sanctity concerns.• 14:30 — Malicious extensions and the limits of traditional EDR.• 16:07 — Browser security as part of Zero Trust architecture.• 18:30 — Balancing security and user experience.• 22:10 — Operating in hostile environments and credential revocation.• 25:00 — Dr. Chatterjee introduces the CPD framework for governance.• 28:45 — Implementation and user adoption challenges.• 30:00 — Continuous testing and discipline in browser security.• 33:05 — Closing takeaways on Zero Trust mindset and defense-in-depth.Podcast summary with discussion highlights - https://www.dchatte.com/episode-93-the-new-browser-wars-why-the-enterprise-browser-has-become-cybersecuritys-next-battleground/Connect with Host Dr. Dave Chatterjee LinkedIn: https://www.linkedin.com/in/dchatte/ Website: https://dchatte.com/Books PublishedThe DeepFake ConspiracyCybersecurity Readiness: A Holistic and High-Performance ApproachArticles PublishedRamasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A...
Multi-cloud, automation, and AI are changing how modern networks operate and how firewalls and security policies are administered. In today’s sponsored episode with Palo Alto Networks, we dig into offerings such as CLARA (Cloud and AI Risk Assessment) that help ops teams gain more visibility into the structure and workflows of their multi-cloud networks. We... Read more »
Multi-cloud, automation, and AI are changing how modern networks operate and how firewalls and security policies are administered. In today’s sponsored episode with Palo Alto Networks, we dig into offerings such as CLARA (Cloud and AI Risk Assessment) that help ops teams gain more visibility into the structure and workflows of their multi-cloud networks. We... Read more »
You've likely heard of Pareto's Principle or the 80/20 rule. Is there a way to achieve most of the benefits of crypto-agility with minimal effort? Palo Alto Networks has undoubtedly made its mark with firewalls and security detection and response offerings. We learn how they can also provide a rapid head start to PQC migration, covering everything from cryptographic inventory to creating wrappers for legacy app communications that need to remain secure against quantum computing threats. Even the latest version of their PAN-OS is PQC enabled. And you won't believe what they're seeing in network traffic: PQC used to hide hacking attacks? Join host Konstantinos Karagiannis for a wide-ranging chat with Rich Campagna from Palo Alto Networks where they cover practical ways to get your company ready for tomorrow. For more information on Palo Alto Networks, visit https://www.paloaltonetworks.com/. Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021. The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries. None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.
Topping interview Will Thomas who is a professor of cybersecurity and networking at Collin College; Tune in to learn Will's unique story from working at some of the largest tech companies in the world including Cisco and Palo Alto Networks to building a schools entire cybersecurity course from ground up at Oklahoma State university. The Topping Show is sponsored by Topping Technologies & ExpressVPN. Protect your online privacy https://www.xvuslink.com/?a_fid=toppi... also if your business needs IT assistance you can reach Topping Technologies at sales@toppingtechnologies.comFor all your business IT needs www.toppingtechnologies.comFree Flamethrower with every IT purchase https://toppingtechnologies.com/flamethrower
While the N2K team is observing Indigenous Peoples' Day, we thought you'd enjoy this episode of the Threat Vector podcast from our N2K Cyberwire network partner, Palo Alto Networks. New episodes of Threat Vector release each Thursday. We hope you will explore their catalog and subscribe to the show. Join David Moulton, Senior Director of Thought Leadership for Unit 42, as he sits down with Kyle Wilhoit,Technical Director of Threat Research at Unit 42, for an intimate conversation about the evolution of hacker culture and cybersecurity. From picking up 2600: The Hacker Quarterly magazines at Barnes & Noble and building beige boxes to leading threat research at Palo Alto Networks, Kyle shares his personal journey into the security community. This conversation explores how AI and automation are lowering barriers for attackers, the professionalization of cybersecurity, and what's been lost and gained in the industry's maturation. Kyle offers practical advice for newcomers who don't fit the traditional mold, emphasizing the importance of curiosity, soft skills, and intellectual humility. Kyle Wilhoit is a seasoned cybersecurity researcher, with more than 15 years of experience studying cybercrime and nation-state threats. He's a frequent speaker at global conferences like Black Hat, FIRST, and SecTor, and has authored two industry-respected books: Hacking Exposed Industrial Control Systems and Operationalizing Threat Intelligence. As a long-standing member of the Black Hat US Review Board and an adjunct instructor, Kyle is deeply involved in shaping both cutting-edge research and the next generation of cybersecurity professionals. Connect with Kyle on LinkedIn Previous appearances on Threat Vector: Inside DeepSeek's Security Flaws (Mar 31, 2025) https://www.paloaltonetworks.com/resources/podcasts/threat-vector-inside-deepseeks-security-flaws War Room Best Practices (Nov 07, 2024)https://www.paloaltonetworks.com/resources/podcasts/threat-vector-war-room-best-practices Cybersecurity in the AI Era: Insights from Unit 42's Kyle Wilhoit, Director of Threat Research (Jan 11, 2024)https://www.paloaltonetworks.com/resources/podcasts/threat-vector-cybersecurity-in-the-ai-era-insights-from-unit-42s-kyle-wilhoit-director-of-threat-research Learn more about Unit 42's threat research at https://unit42.paloaltonetworks.com/. Related episodes: For more conversations about AI's impact on cybersecurity, career development in security, and insights from Unit 42 researchers, explore past episodes at https://www.paloaltonetworks.com/podcasts/threat-vector. Join the conversation on our social media channels: Website: http://www.paloaltonetworks.com/ Threat Research: https://unit42.paloaltonetworks.com/ Facebook: https://www.facebook.com/LifeatPaloAltoNetworks/ LinkedIn: https://www.linkedin.com/company/palo-alto-networks/ YouTube: @paloaltonetworks Twitter: https://twitter.com/PaloAltoNtwks About Threat Vector Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com Learn more about your ad choices. Visit megaphone.fm/adchoices
Cybersecurity, automation, and PowerShell advocate Adil Leghari returns to The PowerShell Podcast to kick off Cybersecurity Month. Adil shares insights from his career journey: from PowerShell and automation to identity and now cloud security at Palo Alto Networks. He discusses creating tools like Cyberdle and QR Check, how AI is reshaping cybersecurity, and the importance of empathy, authenticity, and mentorship in tech and community life. Key Takeaways: AI in cybersecurity – Adil explains how organizations can protect sensitive data and combat threats using AI Security Posture Management and why we must “fight AI with AI.” Personal projects with purpose – Tools like Cyberdle and QR Check show how small, open-source projects can educate users and strengthen security awareness. Human connection in tech – Adil emphasizes empathy, authenticity, and community as keys to building better workplaces, stronger teams, and more fulfilling careers. Guest Bio: Adil Leghari is a Cloud Solutions Architect at Palo Alto Networks, where he works on the Cortex Cloud platform. With over twenty years of IT experience, Adil's career spans PowerShell automation, identity management, repositories + packaging, and cloud security. A passionate community contributor and speaker, he is known for his open-source projects, approachable teaching style, and advocacy for authenticity and mentorship in the tech industry. He is a speaker, author, and a really kind human that I like a lot (Andrew wrote this)Resource Links: Cyberdle (Cybersecurity Wordle Game) – https://cyberdle.adilio.ca QR Check (QR Code Security Tool) – https://qrcheck.ca GitHub Spec Kit: https://github.com/github/spec-kit Adil's GitHub – https://github.com/adilio Adil's Website – https://adilio.ca Adil on X/Twitter – https://twitter.com/adilio Adil on BlueSky – https://bsky.app/profile/adilio.ca Find Andrew: https://andrewpla.tech/links PDQ Discord – https://discord.gg/PDQ PowerShell Wednesdays – https://www.youtube.com/watch?v=uWfSbuYnpFA&list=PL1mL90yFExsix-L0havb8SbZXoYRPol0B The PowerShell Podcast on YouTube: https://youtu.be/HpOeZ4LBq9s
Prodcast: ПоиÑк работы в IT и переезд в СШÐ
Пару лет назад Андрей написал пост «Как я был гопником». Пост был откровенный и очень точный. Особенно для тех, кто строит карьеру менеджера в США. Он — Technical Program Manager, я — Technical Product Marketing Manager. И мы оба пришли сюда из постсоветской культуры.Всё, что вы раньше знали про «главное — быть экспертом» — работает, но только до определённого уровня. Если хотите расти, управлять, влиять — без софтов не вытащить.Soft skill #1: Active Listening & Stakeholder Alignment— Умение слушать не чтобы перебить, а чтобы услышать— Понимание мотиваций других людей, даже если они не озвучены напрямую— Согласование интересов без пассивной агрессии и ультиматумовМы выходим на звонки не чтобы доказать, что кто-то не прав.Мы выходим, чтобы сдвинуть проект с мёртвой точки.В СНГ часто говорят: «Я же прав, почему меня не слушают?»В США чаще спросят: «Как мы можем вместе решить проблему, чтобы всем было ок?»Что дальше?Я хочу собрать подборку софтов, которые реально помогают строить карьеру. От общения с менеджером до презентации идей на уровне VP. Особенно — когда ты иммигрант и вырос в другой культуре.
International law enforcement take down the Breachforums domains. Researchers link exploitation campaigns targeting Cisco, Palo Alto Networks, and Fortinet. Juniper Networks patches over 200 vulnerabilities. Apple and Google update their bug bounties. Evaluating AI use in application security (AppSec) programs. Microsegmentation can contain ransomware much faster and yield better cyber insurance terms. The new RondoDox botnet exploits over 50 vulnerabilities. Researchers tag 13 unpatched Ivanti Endpoint Manager flaws. Our guest is Jason Manar, CISO of Kaseya, sharing his insight into how the private and public sectors can work together for national security. Hackers mistake a decoy for glory. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Jason Manar, CISO of Kaseya, sharing his insight into how the private and public sectors can/must work together for national security. Selected Reading FBI takes down BreachForums portal used for Salesforce extortion (Bleeping Computer) Cisco, Fortinet, Palo Alto Networks Devices Targeted in Coordinated Campaign (SecurityWeek) Juniper Networks Patches Critical Junos Space Vulnerabilities (OffSeq) Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits (WIRED) Google Launches AI Bug Bounty with $30,000 Top Reward (Infosecurity Magazine) In AI We Trust? Increasing AI Adoption in AppSec Despite Limited Oversight (Fastly) Reducing Risk: Microsegmentation Means Faster Incident Response, Lower Insurance Premiums for Organizations (Akamai) RondoDox Botnet Takes ‘Exploit Shotgun' Approach (SecurityWeek) ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities (SecurityWeek) Pro-Russian hackers caught bragging about attack on fake water utility (The Record) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Matt, Chief Strategy Officer at Cerby, discusses how the autonomous AI agents create a demand for a fresh approach to identity security and shares practical insights on navigating these new challenges.Join the Defender Fridays community, live every Friday, to discuss the dynamic world of information security in a collaborative space with seasoned professionals.Matt has spent 20+ years at the intersection of cybersecurity, strategy, and company building. His career began in the trenches as a practitioner and architect, grew into CISO and CSO roles, and today he helps scale Cerby as Chief Strategy Officer.At Cerby, Matt has been part of the journey from pre-launch through significant enterprise adoption, serving first as Founding Advisor, then Chief Trust Officer, COO, and now CSO. Each role reflected a different stage of building the company: establishing trust and market credibility, creating the operations foundation, and shaping long-term strategy and growth.Before Cerby, as part of the early RedLock team, Matt helped scale Prisma Cloud (formerly RedLock) from $4M to $500M+ ARR after Palo Alto Networks' $235M acquisition. That experience taught him how to scale security businesses from the ground up while staying connected to practitioner needs.Matt believes the best security leaders shouldn't have to choose between protecting and growing the business; his work is helping organizations achieve both.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastruture for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.
With over 30 years in wireless—from helping pioneer intercarrier SMS to running mobile identity operations across Americas and Asia Pacific — Eddie DeCurtis saw what others missed: 967 of 1,000 global mobile network operators lack the infrastructure to monetize CPNI data while protecting customers from fraud. The technical challenge isn't building APIs. It's that operators spent billions on 5G infrastructure and now lack capital, internal expertise, and operational frameworks to launch authentication services. In 18 months, Shush went from PowerPoint to 30 employees, supporting 47 network APIs with full GSMA Open Gateway compliance. Eddie shares how understanding regulatory frameworks by jurisdiction, not just deploying technology, became their competitive moat—and why hiring the executive who built T-Mobile USA's authentication platform gave them credibility no competitor could match. Topics Discussed: Why operators repeatedly said "we want to do it, we have no idea how, we have no money, we don't have a platform" Validating the thesis with former AT&T Communications CEO John Donovan before launching Securing a POC with a major operator pre-incorporation—with only a PowerPoint deck The three-legged stool: technology, network integration, and business operations (where competitors fail) Why knowing privacy regulations for CPNI data sharing by country became a deal-closer Reducing network integration from dozens of touchpoints to three specific network elements Supporting 8 Linux Foundation Camara APIs and TS.43 GBA AKA authentication standard Going from 3 to 30 employees and launching at Mobile World Congress on a $75/night Airbnb budget GTM Lessons For B2B Founders: Validate with the person most likely to kill your idea: Eddie deliberately chose John Donovan—former CEO of AT&T Communications, board member at Lockheed and Palo Alto Networks—specifically because "he's going to be rough, he's going to totally ask the really hard questions." When Donovan's response was "go raise $40 million and own this space...you're not going to be alone for long," the validation carried weight because it came from someone incentivized to find fatal flaws. Most founders validate with friendly audiences or investors looking for deals. Find the battle-tested executive who has nothing to gain from being kind. Convert pre-product conviction into design partner commitments: Eddie secured a POC agreement with a major operator before Shush incorporated. "I had nothing. I didn't have software. We had an idea, we had a PowerPoint presentation." This only works when you've spent decades building domain expertise and relationships. The lesson isn't "sell vaporware"—it's that deep industry knowledge lets you articulate problem-solution fit so precisely that sophisticated buyers commit before seeing code. Infrastructure founders with 10+ years in-market can accelerate 12-18 months of product-market fit by converting expertise into early design partnerships. The enterprise moat is operational knowledge, not technical capability: Eddie's thesis: "Anybody can come up with the technology. You walk down the street in the Bay Area, 10 developers will develop it for you." Shush differentiated by answering questions competitors couldn't: How do you price SIM swap detection per query? What are CPNI data sharing regulations in Indonesia versus Brazil? How do you navigate internal stakeholder alignment across legal, privacy, and regulatory teams at a tier-one operator? When Eddie told an operator "here's the privacy rules for your country" after they admitted "I have no idea," he closed a knowledge gap that pure technology vendors can't fill. In regulated infrastructure markets, execution expertise beats technical superiority. Target the ambition-capability gap in capital-constrained buyers: Operators told Eddie the same story: eager to launch authentication services, zero clarity on execution, budgets decimated by 5G spending. This created perfect conditions for a full-stack solution. "Mid-market is hard because you have a buyer with problems that are not basic anymore, but they lack the ability to execute." Shush didn't sell point solutions—they delivered technology, integration, and business operations as a turnkey package. Identify buyers with sophisticated needs, strong intent, and constrained internal resources. That's where full-stack platforms win over point tools. Hire the operator who ran your exact use case at scale: Eddie cold-called John Morrowton, who "built this actual product and service offering at T-Mobile USA, from its inception to its execution and ran it for four years." His pitch: "I'm Eddie DeCurtis, how are you? You want a job? You're Chief Product Officer." Hiring someone who'd operationalized authentication services at a tier-one carrier gave Shush instant credibility with operator buyers and compressed years of trial-and-error into institutional knowledge. In infrastructure sales, hiring executives from reference customers eliminates "can you actually do this" objections before they surface. Minimize integration surface area to accelerate deployment: Mobile operators run highly secure networks with limited external access points. Shush "narrowed it down to three network elements that we can communicate with to provide all 47 APIs." Fewer integration points means faster deployment, lower implementation risk, and reduced operator IT overhead. This architectural decision became a sales accelerator. Infrastructure founders: identify the minimal viable integration that unlocks maximum API coverage, then make that your differentiated deployment story. // Sponsors: Front Lines — We help B2B tech companies launch, manage, and grow podcasts that drive demand, awareness, and thought leadership. www.FrontLines.io The Global Talent Co. — We help tech startups find, vet, hire, pay, and retain amazing marketing talent that costs 50-70% less than the US & Europe. www.GlobalTalent.co // Don't Miss: New Podcast Series — How I Hire Senior GTM leaders share the tactical hiring frameworks they use to build winning revenue teams. Hosted by Andy Mowat, who scaled 4 unicorns from $10M to $100M+ ARR and launched Whispered to help executives find their next role. Subscribe here: https://open.spotify.com/show/53yCHlPfLSMFimtv0riPyM
A critical zero-day in Oracle E-Business Suite is under active exploitation. ICE plans a major expansion of its social media surveillance operations. Discord confirms a third-party data breach. A critical vulnerability in the Unity game engine could allow arbitrary code execution. New variants of the XWorm remote access trojan spread through phishing campaigns. Researchers uncover a critical command injection flaw in Dell UnityVSA storage appliances. There's been a sharp surge in reconnaissance scans targeting Palo Alto Networks login portals. A new hacking competition offers $4.5 million in prizes for exploits targeting major cloud and AI software. Monday Business Brief. On our Afternoon Cyber Tea segment with Microsoft's Ann Johnson, Ann and guest Volker Wagner, Chief Information Security Officer at BASF, share some Lessons from the Frontlines of Industrial Security. Don't spend that ParkMobile settlement all in one place. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Afternoon Cyber Tea Segment Today we are highlighting Afternoon Cyber Tea with Ann Johnson. Ann and guest Volker Wagner, Chief Information Security Officer at BASF, share some Lessons from the Frontlines of Industrial Security. You can listen to Ann and Volker's full conversation here and catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app. Selected Reading PoC Exploit Released for Remotely Exploitable Oracle E-Business Suite 0-Day Vulnerability (Cyber Security News) ICE Wants to Build Out a 24/7 Social Media Surveillance Team (WIRED) Discord blames third-party support outfit for data breach (The Register) Android and Windows gamers worldwide potentially affected by bug in Unity game engine (The Record) XWorm malware resurfaces with ransomware module, over 35 plugins (Bleeping Computer) Patch Now: Dell UnityVSA Flaw Allows Command Execution Without Login (HackRead) Scanning of Palo Alto Portals Surges 500% (Infosecurity Magazine) $4.5 Million Offered in New Cloud Hacking Competition (SecurityWeek) Accenture acquires Japanese AI and DX provider, Aidemy Inc. (N2K Pro Business Briefing) ParkMobile pays... $1 each for 2021 data breach that hit 22 million (Bleeping Computer) Vote for Dave! Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Assaf Dahan, Director of Threat Research, Cortex XDR, at Palo Alto Networks, discussing Phantom Taurus, a new China APT uncovered by Unit 42. Unit 42 researchers have identified Phantom Taurus, a newly designated Chinese state-aligned APT conducting long-term espionage against government and telecommunications organizations across Africa, the Middle East, and Asia. Distinguished by its stealth, persistence, and rare tactics, the group has recently shifted from email-focused data theft to directly targeting databases and deploying a powerful new malware suite called NET-STAR, designed to compromise IIS web servers and evade detection. This suite, featuring modular, fileless backdoors and advanced evasion capabilities, marks a significant evolution in Phantom Taurus' operations and underscores the group's strategic intelligence-gathering objectives. The research can be found here: Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite Learn more about your ad choices. Visit megaphone.fm/adchoices
Assaf Dahan, Director of Threat Research, Cortex XDR, at Palo Alto Networks, discussing Phantom Taurus, a new China APT uncovered by Unit 42. Unit 42 researchers have identified Phantom Taurus, a newly designated Chinese state-aligned APT conducting long-term espionage against government and telecommunications organizations across Africa, the Middle East, and Asia. Distinguished by its stealth, persistence, and rare tactics, the group has recently shifted from email-focused data theft to directly targeting databases and deploying a powerful new malware suite called NET-STAR, designed to compromise IIS web servers and evade detection. This suite, featuring modular, fileless backdoors and advanced evasion capabilities, marks a significant evolution in Phantom Taurus' operations and underscores the group's strategic intelligence-gathering objectives. The research can be found here: Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite Learn more about your ad choices. Visit megaphone.fm/adchoices
No Priors: Artificial Intelligence | Machine Learning | Technology | Startups
Between the future of search, the biggest threats in cybersecurity, and the jobs and platforms of tomorrow, Nikesh Arora sees one common thread connecting and transforming them all—AI. Sarah Guo and Elad Gil sit down with Nikesh Arora, CEO of cybersecurity giant Palo Alto Networks, to talk about a wide array of topics from agentic AI to leadership. Nikesh dives into the future of search, the disruptive potential of AI agents for existing business models, and how AI has both compressed the timeline for cyberattacks as well as fundamentally shifted defense strategies in cybersecurity. Plus, Nikesh shares his leadership philosophy, and why he's so optimistic about AI. Sign up for new podcasts every week. Email feedback to show@no-priors.com Follow us on Twitter: @NoPriorsPod | @Saranormous | @EladGil | @nikesharora | @PaloAltoNtwks Chapters: 00:00 – Nikesh Arora Introduction 00:39 – Nikesh on the Future of Search 04:46 – Shifting to an Agentic Model of Search 08:12 – AI-as-a-Service 16:55 – State of Enterprise Adoption 20:15 – Gen AI and Cybersecurity 27:35 – New Problems in Cybersecurity in the AI Age 29:53 – Deepfakes, Spearfishing, and Other Attacks 32:56 – Expanding Products at Palo Alto 35:49 – AI Agents and Human Replaceability 44:28 – Nikesh's Thoughts on Growth at Scale 46:52 – Nikesh's Leadership Tips 51:14 – Nikesh on Ambition 54:18 – Nikesh's Thoughts on AI 58:21 – Conclusion
Netskope, a competitor in cloud security and SASE, has just hit the public market with its new IPO (NTSK). While the company operates in the booming cybersecurity industry and is growing revenue at over 30%, there are several critical risks potential investors must consider.In this analysis, we run Netskope through our investing framework to uncover the opportunities and the red flags. We'll explore its innovative SASE platform, the ongoing "Browser Wars" in the AI era, and the complicated legal battles and shareholder structure lurking beneath the surface. Is this a top cybersecurity stock to buy now, or a high-risk bet for your portfolio?In this video, we cover:[00:00:00] A Hot New Cybersecurity IPO: Introducing Netskope and its role in the emerging "Enterprise Browser Wars".[00:01:00] The Venture Capital Connection: Examining the role of top shareholder Lightspeed Ventures and its connection to another recent IPO, Rubrik[00:03:00] The SASE Market Opportunity: A breakdown of Netskope's focus on the Secure Access Service Edge (SASE) market and how its platform unifies cloud security.[00:05:00] Patent Battles & Legal Risks: Netskope's ongoing legal proceedings with competitor Fortinet over patent infringement claims.[00:06:00] Complex Shareholder Structure: Unpacking the risks of the dual-class share structure, where Class B shares get 20 votes each, concentrating control among insiders and VCs.[00:08:00] The Financial Red Flags: Netskope's GAAP net losses and negative free cash flow, despite impressive revenue growth.[00:10:00] Balance Sheet Concerns: A look at potential burdens on common shareholders from convertible debt and preferred stock.[00:11:00] Our Final Takeaway: Why we are still interested in Netskope as a potential small bet and a hedge against SASE leaders like Palo Alto Networks and Fortinet.What are your thoughts on the Netskope IPO? Let us know in the comments below!
Discover how AI agents are reshaping B2B marketing in this episode of Tomorrow's Best Practices Today with guest Erin Cresta, Global VP of Digital and Demand at Sema4.ai. Erin shares what it's like to join a startup from day one, build a marketing engine from scratch, and apply agentic AI to real-world business challenges.With a career spanning leadership roles at Palo Alto Networks, Docker, Armis, Couchbase, and now Sema4, Erin brings a unique perspective on scaling teams, crafting go-to-market strategies, and staying ahead in a competitive market. She dives into how marketing leaders can:-Build foundational brand identity and messaging at early-stage companies- Apply AI agents to content creation, research, operations, and sales enablement- Align with sales through account-based strategies instead of lead-based metrics- Balance speed, experimentation, and customer feedback in startup growth-Think differently about hiring, operations, and organizational design in AI-driven environmentsWe also explore the “work room” model Erin's team uses to collaborate with AI agents, how generative AI supports digital ad copy and campaign prep, and why account engagement is becoming more important than traditional lead counts.-----CONNECT with us at:Website: https://leadtail.com/Leadtail TV: https://www.leadtailtv.com/LinkedIn: https://www.linkedin.com/company/lead...Twitter: https://twitter.com/leadtailFacebook: https://www.facebook.com/Leadtail/Instagram: https://www.instagram.com/leadtail/----0:00 – Why Enterprise Sales Depend on Accounts, Not Just Leads0:53 – Welcome & Guest Introduction: Erin Cresta and Semaphore.ai3:16 – Returning to Startup Life: Building from the Ground Up6:41 – Early Marketing Priorities: Brand, Content, and SEO9:17 – Hiring Strategy and Using AI Agents in Daily Work11:23 – Inside the “Work Room”: How Teams Collaborate with Agents13:40 – Rethinking Funnels: From Leads to Account-Based Strategies18:01 – Sharing Signals with Sales and Building Alignment20:32 – The Semaphore Platform: Runbooks, Outcomes, and Security25:15 – Startup Lessons, Personal Insights & Closing Thoughts#b2bmarketing #b2b
Owning too many overlapping investments can water down returns, so we will explain how spreading your portfolio too thin may create more risk than protection. Today's Stocks & Topics: XPO, Inc. (XPO), Market Wrap, Tax Lost Harvesting, Infosys Limited (INFY), Palo Alto Networks, Inc. (PANW), Top 4 Signs You've Over-Diversified Your Portfolio, Newmont Corporation (NEM), Barrick Mining Corporation (B), Dollar Cost Average, Invesco S&P SmallCap Energy ETF (PSCE), Vanguard Total World Stock Index Fund ETF Shares (VT), Rates and Inflation.Our Sponsors:* Check out Anthropic: https://claude.ai/INVEST* Check out Gusto: https://gusto.com/investtalk* Check out TruDiagnostic and use my code INVEST for a great deal: https://www.trudiagnostic.comAdvertising Inquiries: https://redcircle.com/brands
Israel is often in the headlines for conflict—but there's another story you need to hear.Beyond the headlines, Israel has emerged as a global innovation hub and a rising player in international markets. Today, Brian Mumbert joins us to share why investing in Israel could be a strategic opportunity worth considering.Brian Mumbert is Vice President and Regional Sales Executive at Timothy Plan, an underwriter of Faith & Finance.Why Invest in Israel?At first glance, investing in a nation experiencing conflict may seem counterintuitive. But economies often demonstrate resilience in times of war. Israel is no exception. With robust defense spending, a thriving entrepreneurial spirit, and a deeply ingrained culture of saving and financial discipline, the nation continues to grow.In fact, one of Israel's largest banks gave out piggy banks to families nationwide to encourage saving—a small example of the country's ingrained culture of stewardship and fiscal responsibility.For those wondering about safety, Israel offers a surprisingly secure environment for investment. The Tel Aviv 125 Index, which tracks the nation's 125 largest companies, operates much like the U.S. stock exchanges. Israel has transitioned from an emerging to a developed economy, putting it in the same global category as many European nations. Its GDP is forecasted to grow by 3.3% in 2025 and 4.6% in 2026, with inflation targeted at a steady 2%—numbers comparable to the U.S. outlook.The “Startup Nation” AdvantageIsrael's reputation as a hub of innovation is well-earned. In 2024 alone, U.S. giants invested billions in Israeli startups. Google acquired cloud security firm Wiz for $32 billion, while Palo Alto Networks purchased CyberArk, an identity management leader, for $25 billion. Everyday technologies like Apple's Face ID and SodaStream also trace their roots back to Israel.Large U.S. companies buying small Israeli firms is common since it's part of the fabric of their economy.While technology dominates headlines, Israel's economy is diverse. Financials, industrials, and defense sectors have also posted strong returns. In fact, nearly every sector reported double-digit growth in 2025. The Israeli shekel has also appreciated, further boosting investor confidence.International ties enhance Israel's economic opportunities. The Abraham Accords have opened new trade relationships across the Middle East, while defense partnerships with Europe have surged amid global conflicts. Recent agreements, such as a $35 billion natural gas export deal with Egypt, demonstrate the nation's expanding role in global energy markets.The Timothy Plan Israel Common Values FundFor investors who want exposure to Israel's growth while remaining true to their faith, Timothy Plan offers the Israel Common Values Fund. This actively managed fund holds 58 companies, giving broad diversification within the Israeli market.True to Timothy Plan's mission, the fund excludes companies that profit from abortion, pornography, or other activities inconsistent with biblical values. Even in Israel, they carefully screen companies to ensure they align with Christian principles.Faith-based investors increasingly want their portfolios to reflect their values. Advances in technology have made it easier to screen companies for alignment, though Timothy Plan has been doing it faithfully since 1994. They're not just avoiding harmful investments, they're enabling believers to steward their resources in ways that honor God.”Practical Advice for InvestorsIf you've never seen faith-based options in your portfolio, start by talking to your advisor. Share what you're passionate about—your church involvement, your giving priorities, your desire for biblical stewardship. When advisors know your values, they can help you align your investments with them.The Timothy Plan Israel Common Values Fund provides a practical way to support Israel and benefit from its dynamic economy—all while investing according to biblical principles. To explore this opportunity, visit TimothyPlan.com.On Today's Program, Rob Answers Listener Questions:I'd like some biblical insight on the power of tithing. I've even heard of people practicing ‘reverse tithing,' living on 10% and giving away 90%. What benefits might there be if we increased our giving to 15% or even 20%?My grandfather has invested in a commemorative coin collection for years. He's asked me and my aunt to handle it before he passes—determine the value and then sell it. Where can I turn to find out what it's worth and get the best price for his investment?Resources Mentioned:Faithful Steward: FaithFi's New Quarterly Magazine (Become a FaithFi Partner)Timothy PlanTimothy Plan's Israel Common Values FundWisdom Over Wealth: 12 Lessons from Ecclesiastes on MoneyLook At The Sparrows: A 21-Day Devotional on Financial Fear and AnxietyRich Toward God: A Study on the Parable of the Rich FoolFind a Certified Kingdom Advisor (CKA) or Certified Christian Financial Counselor (CertCFC)FaithFi App Remember, you can call in to ask your questions most days at (800) 525-7000. Faith & Finance is also available on the Moody Radio Network and American Family Radio. Visit our website at FaithFi.com where you can join the FaithFi Community and give as we expand our outreach. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
As enterprises embrace agentic AI, the cybersecurity challenges are multiplying. In this episode of Today in Tech, host Keith Shaw sits down with Lee Klarich, Chief Product Officer at Palo Alto Networks, to explore the growing concerns around AI security — from prompt injection and rogue agents to emerging attack vectors enabled by autonomous AI systems. Lee breaks down the three core risk categories facing companies in 2025: Misuse and lack of visibility into generative AI tools New attack surfaces opened by copilots and embedded agents The looming threat of AI-powered attackers and autonomous red teaming tools They also cover: The evolution of security from generative AI to agentic AI Real-world vulnerabilities already observed in agent communication protocols (MCP) Why discovery and control are the first steps in protecting AI deployments How security teams can evolve their playbooks without slowing down innovation The optimistic case for AI as a force multiplier for defenders—not just attackers Will the defenders stay one step ahead, or are we building systems we can't control? This episode delivers must-watch insights for CISOs, security engineers, and tech leaders navigating the next phase of AI adoption.
בפרק זה נסקור את ההצלחות הבולטות של חברי הקהילה במסחר סווינג בשנת 2025 – שנה יוצאת דופן עם תשואות חריגות. נעמיק במניית Oklo (OKLO) שטסה ביותר מ־2,000% מאז ההנפקה, ובמניית OKLL הממונפת שצברה נפח מסחר אדיר. בנוסף, נבחן את Nano Nuclear Energy Inc (NNE) שזינקה מעל 50% בעקבות באז סקטוריאלי.נמשיך עם סקטור הקוואנטום, שבו IONQ מובילה עם פוטנציאל ארוך טווח, לצד QBTS, RGTI ו-QUBT שממשיכות למשוך עניין ולסמן עוצמה. מניות הטכנולוגיה הגדולות מציגות מגמות חזקות – Palo Alto Networks, CrowdStrike, Wix ו-Apple ממשיכות לרוץ קדימה.במקביל, Google חוצה את רף ה־3 טריליון דולר ועוקפת את Amazon בשווי שוק, ומחזקת את מעמדה כעוגן מרכזי להשקעות ארוכות טווח. ננתח גם את התפתחויות הריבית והאג"ח בארה"ב, ואת מגמות הנדל"ן בישראל – שם מתחילים לראות ירידות מחירים וקיטון משמעותי בהיקף המשקיעים.
A controversial Trump administration deal gives the U.A.E. access to cutting-edge U.S. AI chips. FlowiseAI warns of a critical account takeover vulnerability. A new social engineering campaign impersonates Meta account suspension notices. A macOS Spotlight 0-day flaw bypasses Apple's Transparency, Consent, and Control (TCC) protections. Are cost saving from outsourced IT services worth the risk? Poland boosts its cybersecurity budget after a surge in Russian-backed attacks. NTT Group joins the Comm-ISAC. Jaguar Land Rover's global shutdown continues. A data breach affects millions of customers of top luxury brands. On today's Threat Vector segment, David Moulton speaks with Palo Alto Networks' Spencer Thellmann about the dual challenges of securing employee use of generative AI tools and defending internally built AI models and agents. AI chatbots hustle seniors for science. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment On today's segment of Threat Vector, host David Moulton, Director of Thought Leadership for Unit 42, speaks with Spencer Thellmann, Principal Product Manager at Palo Alto Networks. David and Spencer explore the dual challenges of securing employee use of generative AI tools and defending internally built AI models and agents. You can listen to the full conversation here, and catch new episodes of Threat Vector each Thursday in your podcast app of choice. Selected Reading In Giant Deals, U.A.E. Got Chips, and Trump Team Got Crypto Riches (The New York Times) Critical FlowiseAI password reset flaw exposes accounts to complete takeover (Beyond Machines) New FileFix attack uses steganography to drop StealC malware (Bleeping Computer) From Spotlight to Apple Intelligence (Objective- See) The Elephant in The Biz: outsourcing of critical IT and cybersecurity functions risks UK economic security | by Kevin Beaumont | Sep, 2025 (DoublePulsar) Russian hackers target Polish hospitals and city water supply (The Financial Times) NTT Group Joins the U.S. Communications-ISAC (Topics) Jaguar Land Rover says cyberattack shutdown to last 'at least' another week (The Record) Bags of info stolen from multiple top luxury brands - double check your data now (TechRadar) We wanted to craft a perfect phishing scam. AI bots were happy to help (Reuters) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
This episode will hit you where it hurts, but leaders need to hear this. Today, we're talking to Nick Calver, VP of Financial Services at Palo Alto Networks. We discuss the importance of overcoming adversity in leadership, how understanding core values can guide career decisions, and why balancing work and family life is crucial for long-term success. All of this right here, right now, on the Modern CTO Podcast! Thanks to Fin for sponsoring this episode. To learn more about the #1 AI agent for customer support, go to fin.ai/cto To learn more about Palo Alto Networks, visit their website here.
In this episode, we discuss a recent significant cyber attack where Palo Alto Networks experienced a data breach through their Salesforce environment due to a compromised SalesLoft drift integration. Throughout the discussion, we highlight why Salesforce, a crucial CRM platform for many businesses, is becoming a prime target for supply chain attackers. The hosts discuss […] The post Salesforce Under Fire: The Salesloft Drift Supply-Chain Breach appeared first on Shared Security Podcast.
Prodcast: ПоиÑк работы в IT и переезд в СШÐ
Мне и моему другу Андрею Микитюку в этом году стукнуло 40. Решили честно поговорить о том, что происходит с нами на этом рубеже - с головой, телом, планами и мечтами. Как изменилось отношение к работе, семье, здоровью? Правда ли, что жизнь после сорока только начинается, или это просто красивые слова для самоуспокоения? Разбираемся без розовых очков, но с юмором.Андрей Микитюк (Andrei Mikitiuk) - Sr Technical Program Manager at Palo Alto Networks, ex Credit Suisse, Citibank, Motorola, выпускник Гарварда.https://www.facebook.com/andreimikitiukhttps://www.linkedin.com/in/amikitiuk/***Записаться на карьерную консультацию (резюме, LinkedIn, карьерная стратегия, поиск работы в США) https://annanaumova.comКоучинг (синдром самозванца, прокрастинация, неуверенность в себе, страхи, лень) https://annanaumova.notion.site/3f6ea5ce89694c93afb1156df3c903abВидео курс по составлению резюме для международных компаний "Идеальное американское резюме": https://go.mbastrategy.com/resumecoursemainГайд "Идеальное американское резюме" https://go.mbastrategy.com/usresumeПодписывайтесь на мой Телеграм канал: https://t.me/prodcastUSAПодписывайтесь на мой Инстаграм https://www.instagram.com/prodcast.us Гайд "Как оформить профиль в LinkedIn, чтобы рекрутеры не смогли пройти мимо" https://go.mbastrategy.com/linkedinguide⏰ Timecodes ⏰00:00 Начало16:53 Есть ли сложности с одеждой после 40 лет?19:28 Как после 40 лет выглядеть хорошо?24:44 Что бы посоветовал себе в 33 года?35:41 Транзит в предпринимательство51:30 Есть ли дискриминация в IT по возрасту?1:06:09 Жизненные этапы после 40 лет1:14:46 Популярно ли в США замораживать яйцеклетки?1:24:02 Влияет ли возраст на иммиграцию?1:32:20 Можно ли найти себе партнера в 70 лет?
Palo Alto Networks, Zscaler, Cloudflare, Navy Fed, AT&T, more Salesforce fallout and now these segments are officially open bar...
In this episode of Cybersecurity Today, host Jim Love covers the latest and most critical stories in the world of cyber threats and digital defense: • Cloudflare fends off a record-breaking 11.5 Tbps DDoS attack, highlighting the relentless scale and sophistication of modern cyber assaults. • WhatsApp patches a dangerous zero-click exploit targeting Apple users, with advice for high-risk individuals to stay protected. • Frostbite 10: Ten critical vulnerabilities in supermarket refrigeration systems could threaten food safety nationwide. • Over 1,100 Ollama AI servers found exposed online, raising alarms about the risks of self-hosted AI and poor security practices. • Hacker group issues an ultimatum to Google, but so far, no evidence of a breach—reminding us to stay vigilant against social engineering. • Palo Alto Networks becomes the latest victim in a supply chain breach involving stolen OAuth tokens, with lessons for all organizations on token hygiene and monitoring. Stay informed, stay secure! For tips, feedback, or more info, visit technewsday.com or .ca. Cybersecurity #DDoS #ZeroClick #AI #DataBreach #Infosec
Jaguar Land Rover suffers a major cyberattack. ICE gains access to a powerful spyware tool. Researchers find Fancy Bear snuffling around a new Outlook backdoor. Cloudflare and Palo Alto Networks confirm compromised Salesforce data. A researcher discovers an unsecured Navy Federal Credit Union (NFCU) server. A new ClickFix scam spreads MetaStealer malware. Specialty healthcare providers struggle to protect sensitive patient data. CISA appoints a new Executive Assistant Director for Cybersecurity. On Afternoon Cyber Tea, Ann Johnson and Harvard's Amy Edmondson discuss how psychological safety helps cybersecurity teams speak up, spot risks, and learn from failure. Our guest today is Tim Starks from CyberScoop discussing China's reliance on domestic firms for hacking. Hackers threaten to feed stolen art to the machines. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Afternoon Cyber Tea On our Afternoon Cyber Tea segment, host Ann Johnson is joined by Amy Edmondson, Harvard Business School professor and psychological safety pioneer. Together they discuss how creating psychologically safe environments allows teams, especially in high-pressure fields like cybersecurity, to speak up about early warnings, embrace the red, and learn from failure. You can listen to Ann and Amy's full conversation here and don't miss new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app. CyberWire Guest Our guest today is Tim Starks from CyberScoop discussing Top FBI official says Chinese reliance on domestic firms for hacking is a weakness. Selected Reading Jaguar Land Rover Operations ‘Severely Disrupted' by Cyberattack (Security Week) Ice obtains access to Israeli-made spyware that can hack phones and encrypted apps (The Guardian) Russian APT28 Expands Arsenal with 'NotDoor' Outlook Backdoor (Infosecurity Magazine) Cloudflare and Palo Alto Networks Victimized in Salesloft Drift Breach (Infosecurity Magazine) Misconfigured Server Leaks 378GB of Navy Federal Credit Union Files (Hack Read) Fake AnyDesk Installer Spreads MetaStealer Through ClickFix Scam (Hack Read) Hacks on Specialty Health Entities Affect Nearly 900,000 (Bank Infosecurity) Python-based infostealer ‘Inf0s3c' combines stealth with broad data theft (SC Media) CISA Names Nicholas Andersen as Executive Assistant Director for Cybersecurity (The Cyber Express) Hackers Threaten to Submit Artists' Data to AI Models If Art Site Doesn't Pay Up (404 Media) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)
1: Where is software value heading in the age of AI? In the premiere episode of Technoventure, host Peter High speaks with Asheem Chandna, General Partner at Greylock Partners, one of Silicon Valley's most storied venture firms. Asheem has led early investments in industry-defining companies such as Palo Alto Networks, AppDynamics, Rubrik, and Abnormal Security. With over 20 years at Greylock and a background in product management and cybersecurity, Asheem offers a masterclass on how he assesses founders, identifies breakout potential, and mitigates risk—often before a single line of code is written. He also explores the evolving dynamics of enterprise software, the impact of agentic AI, and how cybersecurity must adapt to combat both bad and good AI. Key themes include: Assessing founders in a world of younger AI entrepreneurs The changing nature of enterprise software and data platforms The immigrant's mindset and risk tolerance in venture The venture capitalist's evolving toolkit in the AI era
Episode SummaryKevin Dunbar joins Maribel Lopez to discuss how AI is revolutionizing commercial fleet management through Ford Pro Intelligence. With nearly two decades of experience at companies like Cisco and Palo Alto Networks, Kevin shares insights on how Ford's commercial division is processing over a billion data points daily to help fleet operators optimize operations, reduce costs, and improve safety.AI with Maribel Lopez: Transforming Fleet Management with Kevin DunbarGuest: Kevin Dunbar, General Manager of Ford Pro IntelligenceHost: Maribel Lopez, Founder of the Data for Betterment Foundation and Lopez ResearchKey Topics CoveredFord Pro Intelligence PlatformCommercial division serving business and government customersComprehensive ecosystem from vehicle upfitting to fleet managementData services, telematics software, and fleet controlsUpdated from last earnings to 757,000 and 24% yoy growth. (vs. 675,000+ subscribers with 20% growth rate.)Data at ScaleProcessing over 1 billion connected vehicle data points dailySensor data ranging from tire pressure and GPS to seatbelt activity and driver behaviorClean, structured data transformation into actionable insightsAI Applications in ActionDigital vehicle walkarounds replacing 20-minute manual processesPredictive maintenance moving customers from reactive to proactive serviceE-switch assist tool using machine learning for electrification decisionsConnected uptime system achieving 98% vehicle availabilityTangible Business Impact10% reduction in insurance costs through safer driving coaching20% improvement in driver safety metrics25% reduction in speeding incidents80% reduction in cost downtime10-20% total cost of ownership reductionNotable Quotes"We want to make sure that their Ford vehicle works as hard for their business digitally as it does mechanically." - Kevin Dunbar"It's not just about having data. It's about having clean, structured data." - Kevin DunbarFor more episodes of "AI with Maribel Lopez," visit Lopez Research and follow our latest insights on AI transformation across industries.About Ford Pro and Ford Pro IntelligenceFord Pro is helping commercial customers transform and expand their businesses with vehicles and services tailored to their needs. Ford Pro Intelligence is Ford's comprehensive solution for fleet digitalization and operational efficiency, combining connected vehicle data, telematics tools, and smart management software under one platformFollow Kevin at https://www.linkedin.com/in/kevin-dunbar-78343558/Follow Maribel at https://www.linkedin.com/in/maribellopez/#FordProIntelligence #FordPro #FleetManagement #Fleets #DataSecurity
Moinul Khan, co-founder and CEO of Aurascape, joins the show to unpack what it takes to build a cybersecurity startup in the age of AI. With decades of experience at companies like Zscaler, Palo Alto Networks, and FireEye, Moinul shares why AI demands an entirely new security stack, how agentic AI is changing the game, and why prevention—not dashboards—must be at the heart of real solutions. If you're a tech leader navigating the future of AI and security, this is a conversation you won't want to miss.Key Takeaways• Traditional security stacks can't keep up with dynamic, evolving AI tools• Prevention-focused solutions matter more than dashboards or API visibility• Agentic AI is both an opportunity and a security challenge that startups must address• CISOs are rethinking consolidation and becoming more open to best-of-breed solutions in AI security• Building with a long-term prevention mindset creates stronger, more resilient startupsTimestamped Highlights00:37 — Aurascape's mission to deliver an all-encompassing AI security solution02:27 — The “aha” moment: why legacy firewalls and proxies can't secure AI08:23 — How Aurascape's vision has evolved from public AI tools to securing private and third-party applications13:17 — Agentic AI, MCP protocols, and why startups need to secure the next wave of AI agents16:44 — Best-of-breed vs consolidation: where the security market is really heading20:37 — Advice for founders: why prevention-first is the only real path to solving security problemsA standout moment“If you try to patch what you have built in the last 20 years, you will fail. If you want to secure AI, you have to build your entire stack from the ground up.” — Moinul KhanResources MentionedAurascape.aiPro TipDon't build for a quick exit. Focus on prevention, even if it's the harder road—it's what truly solves customer problems in cybersecurity.Call to ActionIf you enjoyed this episode, share it with someone exploring AI security. Subscribe or follow the show for more conversations with the builders shaping the future of tech.
DNS security is our topic on today's Tech Bytes podcast, sponsored by Palo Alto Networks. Specifically, Palo Alto Networks is here to talk about its Advanced DNS Resolver, or ADNSR, which provides a security-centric, cloud-delivered DNS resolution service. We talk about how ADNSR works, its features and capabilities, and how it differs from other DNS... Read more »
Take a Network Break! We double-dip on red alerts as the FBI warns that Russian state hackers are targeting a seven-year-old vulnerability on Cisco IOS and IOS-XE devices (a patch has been available for seven years), and a compromised XZ Utils backdoor is still lurking in some Docker images. Palo Alto Networks has added support... Read more »
Take a Network Break! We double-dip on red alerts as the FBI warns that Russian state hackers are targeting a seven-year-old vulnerability on Cisco IOS and IOS-XE devices (a patch has been available for seven years), and a compromised XZ Utils backdoor is still lurking in some Docker images. Palo Alto Networks has added support... Read more »
Take a Network Break! We double-dip on red alerts as the FBI warns that Russian state hackers are targeting a seven-year-old vulnerability on Cisco IOS and IOS-XE devices (a patch has been available for seven years), and a compromised XZ Utils backdoor is still lurking in some Docker images. Palo Alto Networks has added support... Read more »
¡Emprendeduros! En este episodio Rodrigo nos da una actualización de mercado donde habla del estatus del mercado, de las ordenes del PMI, de las minutas del FED y de la junta en Jacksonhole. Nos da los reportes de ingresos de Palo Alto Networks, Home Depot, Lowe's, Target, Walmart y Estee Lauder. Después habla de las inversiones de Trump en los microchips y de la estafa de la semana antes de la actualizacion de crypto donde habla de un par de noticias de monedas estables. ¡Síguenos en Instagram! Alejandro: https://www.instagram.com/salomondrin Rodrigo: https://www.instagram.com/rodnavarro Emprendeduros: https://www.instagram.com/losemprendeduros
Palo Alto Networks is bracing investors with its latest earnings, homebuilders are sweetening deals to attract strapped buyers, and footwear brands are rewriting the playbook. Today on Motley Fool Money, analysts Emily Flippen, Sanmeet Deo, and David Meier evaluate how industries and businesses adapt even when the landscape changes. They debate: - Palo Alto's strong fourth quarter report - How the landscape of shoe fashion has changed -Housing headwinds Companies discussed: PANW, FTNT, CROX, ONON, NKE, FL Host: Emily Flippen Guests: Sanmeet Deo, David Meier Producer: Anand Chokkavelu Engineer: Dan Boyd Disclosure: Advertisements are sponsored content and provided for informational purposes only. The Motley Fool and its affiliates (collectively, “TMF”) do not endorse, recommend, or verify the accuracy or completeness of the statements made within advertisements. TMF is not involved in the offer, sale, or solicitation of any securities advertised herein and makes no representations regarding the suitability, or risks associated with any investment opportunity presented. Investors should conduct their own due diligence and consult with legal, tax, and financial advisors before making any investment decisions. TMF assumes no responsibility for any losses or damages arising from this advertisement. We're committed to transparency: All personal opinions in advertisements from Fools are their own. The product advertised in this episode was loaned to TMF and was returned after a test period or the product advertised in this episode was purchased by TMF. Advertiser has paid for the sponsorship of this episode. Learn more about your ad choices. Visit megaphone.fm/adchoices Learn more about your ad choices. Visit megaphone.fm/adchoices
A researcher uncovers vulnerabilities across Intel's internal websites that exposed sensitive employee and supplier data. The Kimsuky group (APT43) targets South Korean diplomatic missions. A new DDoS vulnerability bypasses the 2023 “Rapid Reset” fix. Drug development firm Inotiv reports a ransomware attack to the SEC. The UK drops their demand that Apple provide access to encrypted iCloud accounts. Hackers disguise the PipeMagic backdoor as a fake ChatGPT desktop app. The source code for a powerful Android banking trojan was leaked online. A Nebraska man is sentenced to prison for defrauding cloud providers to mine nearly $1 million in cryptocurrency. On this week's Threat Vector, David Moulton speaks with Liz Pinder and Patrick Bayle for a no holds barred look at context switching in the SOC. A UK police force fails to call for backup. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Security analysts are drowning in tools, alerts, and tabs. On today's Threat Vector segment from Palo Alto Networks, we offer a snapshot from host David Moulton's conversation with Liz Pinder and Patrick Bayle. Together they take a no holds barred look at context switching in the SOC, what it costs, why it's getting worse, and how smarter design can fix it. You can listen to David, Patrick, and Liz's conversation here. It's a must-listen for anyone building or managing a modern SOC. New episodes of Threat Vector drop each Thursday on the N2K CyberWire network and in your favorite podcast app. Selected Reading Intel data breach: employee data could be accessed via API (Techzine Global) North Korean Kimsuky Hackers Use GitHub to Target Foreign Embassies with XenoRAT Malware (GB Hackers) Internet-wide Vulnerability Enables Giant DDoS Attacks (Dark Reading) Drug development company Inotiv reports ransomware attack to SEC (The Record) UK ‘agrees to drop' demand over Apple iCloud encryption, US intelligence head claims (The Record) Ransomware gang masking PipeMagic backdoor as ChatGPT desktop app: Microsoft (The Record) ERMAC Android malware source code leak exposes banking trojan infrastructure (Bleeping Computer) Nebraska man gets 1 year in prison for $3.5M cryptojacking scheme (Bleeping Computer) South Yorkshire Police Deletes 96,000 Pieces of Digital Evidence (Infosecurity Magazine) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Carl Quintanilla, David Faber and Mike Santoli led off the show with developments regarding Intel: Softbank investing $2 billion in the company, as the Trump Administration reportedly weighs taking a 10% stake in the chipmaker. Commerce Secretary Howard Lutnick joined the program and discussed a potential government investment in Intel. Also in focus: Home Depot's quarterly miss, Palo Alto Networks sharesjump on earnings, Nexstar to buy rival TV stations operator Tegna, the "SPAC king," Medtronic and activism, why one particular stock is plummeting 40%. Squawk on the Street Disclaimer
Carl Quintanilla, Sara Eisen, and David Faber broke down the latest consumer reads out of earnings – as Home Depot kicks off a make-or-break week of retail results. Executives calling out strong momentum… But former Chief Investment Strategist for Bridgewater Rebecca Patterson says demand risks remain, breaking down her playbook for volatility. Plus: one of the street's top retail analysts gave his key stocks to buy – and avoid – in the space… and the CEO of Palo Alto Networks joined the team to discuss new numbers from his company. Also in focus: Intel gaining as Softbank invests $2 billion and reports grow around a possible government stake – what Commerce Secretary Howard Lutnick told the team about that news, and possible rails M&A.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed. https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/ WinRAR Exploited WinRAR vulnerabilities are actively being exploited by a number of threat actors. The vulnerability allows for the creation of arbitrary files as the archive is extracted. https://thehackernews.com/2025/08/winrar-zero-day-under-active.html Citrix Netscaler Exploit Updates The Dutch Center for Cyber Security is updating its guidance on recent Citrix Netscaler attacks. Note that the attacks started before a patch became available, and attackers are actively hiding their tracks to make it more difficult to detect a compromise. https://www.ncsc.nl/actueel/nieuws/2025/07/22/casus-citrix-kwetsbaarheid https://www.bleepingcomputer.com/news/security/netherlands-citrix-netscaler-flaw-cve-2025-6543-exploited-to-breach-orgs/ OpenSSH Post Quantum Encryption Starting in version 10.1, OpenSSH will warn users if they are using quantum-unsafe algorithms https://www.openssh.com/pq.html
Allegations by Donald Trump: Former President Donald Trump is quoted calling for an investigation into Nancy Pelosi, accusing her of using insider information to amass wealth through stock trading. He claims Pelosi has achieved returns “practically in the history of Wall Street” and suggests this is due to her access to non-public information. Financial Discrepancies Highlighted: Pelosi’s government salary is cited as $174,000/year, yet her net worth is reported to have grown from $114.7 million in 2018 to potentially $413 million by 2024. The file references sources like OpenSecrets, Investopedia, and The Times to support these figures. Paul Pelosi reportedly earned between $7.8 million and $42.5 million in 2024 from stock trades. Stock Performance: The Pelosi portfolio allegedly returned 54% in 2024, outperforming the S&P 500’s 25% gain. Notable trades included early investments in Nvidia and Palo Alto Networks, and timely sales of Microsoft and Visa. Pelosi’s Response: In a CNN interview with Jake Tapper, Pelosi deflects the insider trading question, emphasizing her focus on the 60th anniversary of Medicaid. She denies wrongdoing, stating: “I’m not into it. My husband is,” and accuses Trump of “projecting.” Please Hit Subscribe to this podcast Right Now. Also Please Subscribe to the Ben Ferguson Show Podcast and Verdict with Ted Cruz Wherever You get You're Podcasts. Thanks for Listening #seanhannity #hannity #marklevin #levin #charliekirk #megynkelly #tucker #tuckercarlson #glennbeck #benshapiro #shapiro #trump #sexton #bucksexton#rushlimbaugh #limbaugh #whitehouse #senate #congress #thehouse #democrats#republicans #conservative #senator #congressman #congressmen #congresswoman #capitol #president #vicepresident #POTUS #presidentoftheunitedstatesofamerica#SCOTUS #Supremecourt #DonaldTrump #PresidentDonaldTrump #DT #TedCruz #Benferguson #Verdict #maga #presidenttrump #47 #the47morningupdate #donaldtrump #trump #news #trumpnews #Benferguson #breaking #breakingnews #morningupdateYouTube: https://www.youtube.com/@VerdictwithTedCruzSee omnystudio.com/listener for privacy information.