Podcasts about Ransomware

Malicious software used in ransom demands

  • 2,986PODCASTS
  • 13,873EPISODES
  • 38mAVG DURATION
  • 2DAILY NEW EPISODES
  • Oct 16, 2025LATEST
Ransomware

POPULARITY

20172018201920202021202220232024

Categories




Best podcasts about Ransomware

Show all podcasts related to ransomware

Latest podcast episodes about Ransomware

Adversary Universe Podcast
A Brief History of Ransomware

Adversary Universe Podcast

Play Episode Listen Later Oct 16, 2025 38:48


Ransomware is not new, but the ransomware of today is very different from the ransomware of 1989. Today's episode doubles as a history lesson, as Adam and Cristian look back at how a prolific global threat has evolved over the decades.   Gone are the days of malware arriving on floppy disks and victims waiting weeks to restore their systems in exchange for $200 ransom payments. “The early days of viruses were weird,” Adam points out. But much has changed since then. Several factors — the advent of cryptocurrency, the rise of enterprise targeting, and the shift to ransomware as a service — have caused the threat to transform. Today's adversaries run ransomware like a business and collect hundreds of millions of dollars in payments.   The hosts reflect on the first ransomware to hit a business, the first to make news headlines, and the first major botnet operator to deploy ransomware, among other key events. Tune in for a discussion that spans years of ransomware evolution, highlights the key adversaries involved, and explains how businesses can defend themselves as the threat landscape continues to change.

Unspoken Security
Redefining National Security

Unspoken Security

Play Episode Listen Later Oct 16, 2025 56:14


In this episode of Unspoken Security, host A.J. Nash sits down with LaurenZabierek, Senior Vice President for the Future of Digital Security at theInstitute for Security and Technology. Together, they examine how thetraditional view of national security often overlooks the people it seeks toprotect. Lauren shares why national security must move beyond militaryand government, and instead focus on the everyday risks that affecteveryone—whether that's cybersecurity, healthcare, or even climate safety.Lauren makes a strong case for widening the lens on security. She explainswhy protecting people requires new thinking and fresh policies, not justmore funding for defense. She also describes the need for face-to-faceconnections and open dialogue to rebuild trust and unity in a fracturedworld.The conversation turns to software and the Secure by Design movement.Lauren outlines how changing incentives for software companies can leadto safer products. She draws on lessons from automotive and aviationsafety to show paths forward, and encourages listeners to help drivedemand for secure technology across all industries.Send us a textSupport the show

Cybercrime Magazine Podcast
Ransomware Minute. Obscura Hits Michigan City with Ransomware. Scott Schober, WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Oct 16, 2025 2:32


The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.

Joey Pinz Discipline Conversations
#758 David Setzer: ✈️ From Aviation Dreams to Cybersecurity Realities

Joey Pinz Discipline Conversations

Play Episode Listen Later Oct 15, 2025 95:01 Transcription Available


Send us a textWhat connects aviation, law, and cybersecurity? In this powerful episode, Joey Pinz uncovers the journey of building resilience and innovation through unlikely intersections.David Setzer shares his early passion for flying, reflecting on family ties to aviation and the lessons of safety and precision. He then takes us through his fascination with law and philosophy, connecting ancient principles of due process to modern justice.But the heart of the conversation lies in the creation of Mailprotector—a company born from humble beginnings that became a leader in email security. David reveals the early days of battling spam and viruses, the rise of ransomware, and why email remains the number one entry point for cyberattacks. He explains how AI and behavioral analysis are reshaping defenses, and why small businesses and MSPs must rethink security as foundational, not optional.

Cybercrime Magazine Podcast
Cybercrime Wire For Oct. 15, 2025. Ransomware Strikes Michigan City In Indiana. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Oct 15, 2025 1:18


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Reimagining Cyber
LockBit 5.0: Return of the Ransomware Giants - Ep 171

Reimagining Cyber

Play Episode Listen Later Oct 15, 2025 16:09


LockBit is back—and stronger than ever. After multiple takedowns and sanctions, the ransomware-as-a-service giant has resurfaced with LockBit 5.0, a version designed to hit harder, spread faster, and target virtualization at scale.In this episode of Reimagining Cyber, Tyler Moffitt unpacks what's changed, why LockBit 5.0 matters, and what organizations should be doing now to reduce risk. From hypervisor attacks and cross-platform payloads to cartel-style alliances among cybercriminal crews, we explore how ransomware continues to evolve—and what defenders can learn from it.Whether you're an enterprise IT leader, MSP, or simply tracking the ransomware economy, this episode offers practical actions and strategic insights you can put to work this week.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70 Chief Information Security Officer CISO Podcasts rankings.

SECURE AF
Obscura Ransomware: Unmasking a Stealthy New Threat ⚠️

SECURE AF

Play Episode Listen Later Oct 15, 2025 12:25


Got a question or comment? Message us here!In this week's #SOCBrief, Hickman and Peters break down Obscura ... a new ransomware variant making waves with aggressive evasion tactics, process terminations, and domain controller targeting. We cover what's known so far, the risks it poses to businesses, and the key defenses every SOC should prioritize.Support the showWatch full episodes at youtube.com/@aliascybersecurity.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

The Gate 15 Podcast Channel
Weekly Security Sprint EP 131. Threat use of AI, ransomware reports and cyber insurance, weather, protests, and more

The Gate 15 Podcast Channel

Play Episode Listen Later Oct 14, 2025 22:53


In this week's Security Sprint, Dave and Andy covered the following topics:Main Topics:Russia, China and North Korea are using ChatGPT to influence you — here's how. A new report from OpenAI found foreign adversaries are increasingly using artificial intelligence to power hacking and influencing operations. The report found they were using OpenAI's popular tool ChatGPT. The report showed those adversaries include Russia, China and North Korea. “AI-enabled attacks are becoming more capable and harder to detect,” Daryl Lim, affiliate at the Center for Socially Responsible Artificial Intelligence at Penn State University, told Straight Arrow News. “Adversaries can personalize attacks, evade filters and iterate faster than before.”• The Case for AI Loss of Control Response Planning and an Outline to Get Started• Can Humans Devise Practical Safeguards That Are Reliable Against an Artificial Superintelligent Agent?The true cost of cyber attacks - and the business weak spots that allow them to happen. What makes companies like Jaguar Land Rover and Marks & Spencer particularly vulnerable is the way in which their supply chains work.• UK NCSC: UK experiencing four 'nationally significant' cyber attacks every week• Cyber attack contingency plans should be put on paper, firms told• Policyholder Plot Twist: Cyber Insurer Sues Policyholder's Cyber Pros• The Ransomware Pricing Paradox: An Empirical Study of the Six Stages of Ransomware Negotiations. PDF• Paying off cyber criminals no guarantee stolen data won't be published – studySevere Weather: Hurricane Season continues18 Oct: No Kings nationwide protestsQuick Hits:• Peace in Israel and Gaza?• Sen. Peters tries another approach to extend expired cyber threat information-sharing law & Peters & Rounds Introduce Bipartisan Bill to Restore Critical Cybersecurity Protections• Yet another shutdown and its impact on cybersecurity professionals• Experts: Shutdown Strains Healthcare Cyber Defenses• Is the government shutdown impacting info sharing for healthcare cyber threats? • ICYMI! Gate 15 Weekly Security Sprint EP 130. The Evangelist has returned! Cybersecurity Awareness Month and more! • Poland says cyberattacks on critical infrastructure rising, blames Russia• Anatomy of a Hacktivist Attack: Russian-Aligned Group Targets OT/ICS• Critical networks face unprecedented threat as DDoS attacks are getting shorter and more intense• Belgian PM reported to be among targets of ‘jihad-inspired' drone plot• Oracle E-Business Suite Zero-Day Exploited in Widespread Extortion Campaign

PEBCAK Podcast: Information Security News by Some All Around Good People
Episode 229 - The Evolution of Ransomware: From Spray-and-Pray to Sophisticated Cybercrime

PEBCAK Podcast: Information Security News by Some All Around Good People

Play Episode Listen Later Oct 13, 2025 52:26


Welcome to this week's episode of the PEBCAK Podcast!  We've got four amazing stories this week so sit back, relax, and keep being awesome!  Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast   Please share this podcast with someone you know!  It helps us grow the podcast and we really appreciate it!   2016: The Dawn of Modern Ransomware The debut of Petya and Russian-affiliated groups like CryptoWall, TeslaCrypt, and Locky. Attacks were largely indiscriminate, targeting anyone from Fortune 500 companies to "Grandma's laptop." Early mitigation tactics, like installing Russian language packs to avoid infection, highlighted the state-tolerated nature of these groups.   2017: Ransomware Goes Mainstream A pivotal year with the WannaCry attack (attributed to North Korea's Lazarus Group) and NotPetya (Russian-backed), causing billions in damages to companies in multiple verticals. The SAMSAM attacks hit U.S. cities like Baltimore and Atlanta, marking Iran's brief foray into ransomware. Ransomware became a household name, sparking executive-level discussions in boardrooms.   2020: The Rise of Ransomware-as-a-Service Groups like Ryuk, REvil, and Conti refined ransomware into a business model, outsourcing tasks like initial access and money laundering. Double extortion emerged, with attackers stealing data and threatening to leak it, even if backups were restored. Some groups introduced “terms of service,” avoiding hospitals and schools to dodge law enforcement scrutiny.   2021: Critical Infrastructure in the Crosshairs High-profile attacks on Colonial Pipeline, JBS Foods, and Ireland's National Health Service disrupted daily life, from gas shortages to meat supply issues. These incidents underscored ransomware's real-world impact, elevating cybersecurity to a boardroom priority.   2022: Geopolitical Shifts and New Players Russian-backed groups like Conti and LockBit shifted focus to Ukraine amid the Russia-Ukraine conflict. The rise of Scattered Spider, a Western-based group excelling at social engineering and SIM swapping, marked a shift from Eastern state-tolerated actors.   2023: Trust Breaks Down The ALFV/BlackCat group's $22 million rug pull against affiliates signaled the decline of Russian-backed ransomware dominance. Scattered Spider solidified its reputation, targeting major hospitality and cleaning companies with sophisticated social engineering tactics.   2025: The Western Cybercrime Surge Scattered Spider and affiliates like DragonForce dominate, hitting retailers, insurance, aviation, and automotive sectors. The shift to Western-based actors, often young and operating in Five Eyes nations, makes them more vulnerable to law enforcement.   Trends and Takeaways The move from expensive zero-day exploits to cheaper n-day exploits and social engineering highlights attackers' adaptability. Double extortion and even “double dipping” (demanding additional ransoms months later) have become standard tactics. The accessibility of AI tools and open-source platforms like Venice AI has lowered the barrier for creating ransomware, even for non-programmers. Law enforcement's increasing success in arrests and Bitcoin recovery (e.g., DarkSide's downfall) offers hope for curbing cybercrime.       Dad Joke of the Week (DJOW)   Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Ben - https://www.linkedin.com/in/benjamincorll/

The CyberWire
No honor among thieves. [Research Saturday]

The CyberWire

Play Episode Listen Later Oct 11, 2025 25:03


John Fokker, Head of Threat Intelligence at Trellix is discussing "Gang Wars: Breaking Trust Among Cyber Criminals." Trellix researchers reveal how the once-organized ransomware underworld is collapsing under its own paranoia. Once united through Ransomware-as-a-Service programs, gangs are now turning on each other — staging hacks, public feuds, and exit scams as trust evaporates. With affiliates jumping ship and rival crews sabotaging each other, the RaaS model is fracturing fast, signaling the beginning of the end for ransomware's criminal empires. The research can be found here: ⁠⁠⁠⁠Gang Wars: Breaking Trust Among Cyber Criminals Learn more about your ad choices. Visit megaphone.fm/adchoices

Research Saturday
No honor among thieves.

Research Saturday

Play Episode Listen Later Oct 11, 2025 25:03


John Fokker, Head of Threat Intelligence at Trellix is discussing "Gang Wars: Breaking Trust Among Cyber Criminals." Trellix researchers reveal how the once-organized ransomware underworld is collapsing under its own paranoia. Once united through Ransomware-as-a-Service programs, gangs are now turning on each other — staging hacks, public feuds, and exit scams as trust evaporates. With affiliates jumping ship and rival crews sabotaging each other, the RaaS model is fracturing fast, signaling the beginning of the end for ransomware's criminal empires. The research can be found here: ⁠⁠⁠⁠Gang Wars: Breaking Trust Among Cyber Criminals Learn more about your ad choices. Visit megaphone.fm/adchoices

Cyber Security Today
Teenage Ransomware Arrest In Day Care Ransom

Cyber Security Today

Play Episode Listen Later Oct 10, 2025 7:03 Transcription Available


Cybersecurity Today: Teenage Ransomware Arrests, GoAnywhere Critical Flaw, and Google AI Vulnerability In this episode of Cybersecurity Today, hosted by Jim Love, two teenagers were arrested in London for a ransomware attack on Kiddo International preschools, involving child data extortion. The show discusses a critical vulnerability in GoAnywhere MFT servers actively exploited by ransomware operators, emphasizing the need for immediate patching. It also highlights an urgent warning from CSA about a 2021 Windows flaw now under active attack. Additionally, researchers have found a new method to exploit Google's Gemini AI through invisible unicode characters, with Google declining to patch the issue. The episode concludes with security recommendations and a note on the show's upcoming special weekend edition for Canadian Thanksgiving. 00:00 Introduction and Headlines 00:28 Teenagers Arrested for Preschool Ransomware Attack 01:57 Critical Vulnerability in Go Anywhere MFT Servers 03:21 Urgent Alert for 2021 Windows Flaw 04:32 Google Gemini AI's Invisible Prompt Flaw 06:16 Conclusion and Sign-Off

Cybercrime Magazine Podcast
Ransomware Minute. Job Shop Data Breach Exposes Sensitive Info. Scott Schober, WCYB Digital Radio

Cybercrime Magazine Podcast

Play Episode Listen Later Oct 10, 2025 2:54


The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.

Cyber Security Headlines
Week in Review: Crowdsourced ransomware campaign, Windows 10 woes, California opts out

Cyber Security Headlines

Play Episode Listen Later Oct 10, 2025 38:50


Link to episode page This week's Cyber Security Headlines - Week in Review is hosted by Rich Stroffolino with guests Mike Lockhart, CISO Eagleview, and Dustin Sachs, chief technologist at CyberRisk collaborative, and author of Behavioral Insights in Cybersecurity Thanks to our show sponsor, ThreatLocker Cybercriminals don't knock — they sneak in through the cracks other tools miss. That's why organizations are turning to ThreatLocker. As a zero-trust endpoint protection platform, ThreatLocker puts you back in control, blocking what doesn't belong and stopping attacks before they spread. Zero Trust security starts here — with ThreatLocker” All links and the video of this episode can be found on CISO Series.com      

Microsoft Threat Intelligence Podcast
Threat Landscape Update: Ransomware-as-a-Service and Advanced Modular Malware

Microsoft Threat Intelligence Podcast

Play Episode Listen Later Oct 8, 2025 30:31


In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠Sherrod DeGrippo is joined by Tori Murphy, Anna Seitz, and Chuong Dong to break down two threats: the modular backdoor PipeMagic and Medusa ransomware. They discuss how PipeMagic disguises itself as a ChatGPT desktop app to deliver malware, its sophisticated modular design, and what defenders can do to detect it.   The team also explores Medusa's evolution into a ransomware-as-a-service model, its use of double extortion tactics, and the broader threat landscape shaped by ransomware groups, social engineering, and the abuse of legitimate tools.   In this episode you'll learn:       Why modular malware is harder to detect and defend against  How attackers abuse vulnerable drivers to disable security tools  Why leak sites play a central role in ransomware operations  Some questions we ask:      How did Microsoft researchers uncover PipeMagic in the wild?  Why do ransomware groups often borrow names and themes from mythology?  What initial access techniques are commonly associated with Medusa attacks?    Resources:   View Anna Seitz on LinkedIn  View Chuong Dong on LinkedIn    View Sherrod DeGrippo on LinkedIn     Related Microsoft Podcasts:                    Afternoon Cyber Tea with Ann Johnson  The BlueHat Podcast  Uncovering Hidden Risks        Discover and follow other Microsoft podcasts at microsoft.com/podcasts     Get the latest threat intelligence insights and guidance at Microsoft Security Insider    The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.  

The CyberWire
Critical GoAnywhere bug fuels ransomware wave.

The CyberWire

Play Episode Listen Later Oct 7, 2025 32:23


Microsoft tags a critical vulnerability in Fortra's GoAnywhere software. A critical Redis vulnerability could allow remote code execution. Researchers tie BIETA to China's MSS technology enablement. Competing narratives cloud the Oracle E-Business Suite breach. An Ohio-based vision care firm will pay $5 million to settle phishing-related data breach claims. “Trinity of Chaos” claims to be a new ransomware collective. LinkedIn files a lawsuit against an alleged data scraper. This year's Nobel Prize in Physics recognizes pioneering research into quantum mechanical tunneling. On today's Industry Voices segment, we are joined by Alastair Paterson from Harmonic Security, discussing shadow AI and the new era of work. Australia's AI-authored report gets a human rewrite. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On today's Industry Voices segment, we are joined by Alastair Paterson, CEO and Co-Founder of Harmonic Security, discussing shadow AI and the new era of work. You can hear the full conversation with Alastair here. Selected Reading Microsoft: Critical GoAnywhere Bug Exploited in Medusa Ransomware Camp (Infosecurity Magazine) Redis warns of critical flaw impacting thousaRends of instances (Bleeping Computer) BIETA: A Technology Enablement Front for China's MSS (Recorded Future) Well, Well, Well. It's Another Day. (Oracle E-Business Suite Pre-Auth RCE Chain - CVE-2025-61882) (Labs) EyeMed Agrees to Pay $5M to Settle Email Breach Litigation (Govinfo Security) Ransomware Group “Trinity of Chaos” Launches Data Leak Site  (Infosecurity Magazine) LinkedIn sues ProAPIs for using 1M fake accounts to scrape user data (Bleeping Computer) The Nobel Prize for physics is awarded for discoveries in quantum mechanical tunneling (NPR) Deloitte refunds Australian government over AI in report (The Register) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire Daily podcast is a production of N2K Networks, your source for critical industry insights, strategic intelligence, and performance-driven learning products. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Braintrust
The A.I. Rebel Protecting Humanity with Christopher Brock

The Braintrust "Driving Change" Podcast

Play Episode Listen Later Oct 7, 2025 41:56


Christopher Brock, founder of Primary Hosting and Quantum Proof, joins Jeff Bloomfield for a mind-bending conversation on the rise of sovereign AI, post-quantum encryption, and how generative AI is reshaping both business and personal life. As Chief Information Security Officer for the Piqua Shawnee Tribe of Alabama and creator of the 300,000+ member Facebook group AI for Business and Life, Brock bridges ancient wisdom, advanced math, and cutting-edge tech to explore how AI can protect—not exploit—human identity, culture, and data. AI isn't just changing business—it's redefining the boundaries of human intelligence, creativity, and security. Christopher Brock shows us the future where AI meets quantum computing, tribal sovereignty meets technology, and cybersecurity meets consciousness. Whether you're a CEO, creator, or just curious about the next tech revolution, this episode will change how you see data, privacy, and possibility itself. Sovereign AI is about protection—of identity, culture, and innovation, not just efficiency. Quantum computing could crack modern encryption in seconds, forcing an urgent rethinking of cybersecurity. Quantum Proof aims to make data “unhackable” using a new mathematical model that predicts prime numbers. AI and quantum together are “steroids on steroids”—powerful but potentially perilous if not ethically guided. Ransomware-as-a-Service (RaaS) has become an organized dark-web industry with customer support desks. Data harvesting is happening now—hackers store encrypted data today, waiting for quantum tools to unlock it later. The AI learning curve starts with usage—use the tools yourself before delegating to a tech team. LLMs (like ChatGPT, Claude, Grok, Gemini) are modern-day PhDs in your pocket—only valuable if you engage them daily. SEO is dead—AI ranking is here. Businesses must adapt to “AI discoverability” instead of traditional Google search. If you ignore AI, you'll be left behind. Brock says plainly: “Use it—or miss where the world's going.” Time Topic 00:00 Opening banter: building AI platforms and UX importance 03:36 Introduction: Christopher Brock and his work 07:41 Speaking at MIT, launching Quantum Proof 09:21 The rise of AI for Business and Life community (300k+ members) 17:09 Brock's background: from student government to tech startups 23:50 COVID pivot, tribal leadership, and founding Primary Hosting 25:47 The birth of Quantum Proof and post-quantum encryption 28:06 Quantum computing explained (for humans!) 34:58 The math and philosophy behind Brock's new algorithms 35:53 Why today's encryption—and even blockchain—isn't safe 41:19 Ransomware-as-a-Service: the digital mob economy 45:51 How everyday people should start using AI 49:03 Building personalized AI agents and data ecosystems 52:24 The death of SEO and the rise of AI discoverability 54:31 Where to find Chris and what's next in AI & Quantum tech

Unexplored Territory
#104 - Exploring recent Ransomware Recovery and Data Recovery announcements with Jatin Jindal

Unexplored Territory

Play Episode Listen Later Oct 6, 2025 32:36


For episode #104 I invited Jatin Jindal to talk us through the recent Ransomware Recovery and Data Recovery announcements. Jatin discusses what the VMware Ransomware Recovery entails, what the differences are between a ransomware recovery process and a disaster recovery scenario, and he talks about various roadmap items like tag-based selection, seeding, QLC support, and vSAN Cyber ReadyNodes. Interested in participating in the upcoming Storage, Data Protection, and Data Beta Programs? Sign up now by filling out this form: https://docs.google.com/forms/d/e/1FAIpQLSeXBC6_oAnkS8vCFztuLQFHx0qZ5xxJSmxbMkyPBvDFM0lHLg/viewformWatch Jatin's Explore sessions now:10 Amazing New Things with VMware Live RecoveryThe Isolated Clean Room Blueprint for On-Premises Based Cyber Recoveries

Security Conversations
Oracle cl0p ransomware crisis, EU drone sightings, Cisco bootkit fallout

Security Conversations

Play Episode Listen Later Oct 3, 2025 123:28


Three Buddy Problem - Episode 66: We discuss drone sightings that shut down airports across Europe and what they reveal about hybrid warfare and the changing nature of conflict; Oracle ransomware/extortion campaign tied to unpatched E-Business Suite vulnerabilities and the company's muted response. Plus, the TikTok–Oracle deal and the strange role Oracle now plays in U.S. national security; OpenAI's Sora 2 launch and its implications for social media and human expression; Palo Alto's “Phantom Taurus” APT report, a follow-up on Cisco's ArcaneDoor disclosures, and the impact of the U.S. government shutdown on CISA. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).

The Lockdown - Practical Privacy & Security

In this final episode of The Lockdown, I reflect on the journey of the podcast, and explaining why I'm redirecting my energy to other projects. I discuss the importance of practical privacy measures, measures over an ‘all-or-nothing' approach, as well as sharing my thoughts on threat modeling, and address several listener questions about privacy tools and self-hosting. I also introduce a new concept from my recent blog post about the “space between” in cybersecurity, examining how compartmentalization of identities can serve as an early warning system against social engineering attacks.In this week's episode:Why this is the final episodeThe all-or-nothing fallacyAirport facial recognition and the Clearview AI threatThreat modeling for different life situationsThe CIA triad and why 100% security doesn't existUK and Swiss digital ID systems and their privacy implicationsNPM breach case study and the psychology of social engineeringWhy organizations should compartmentalize communication channelsListener Q&A: MySudo virtual cards, self-hosting setup, and mobile hotspotsThe new Privacy Tools page on PsySecure.comMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-intro:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-general:matrix.orgShow Links:Privacy Tools Page - https://psysecure.com/privacytools/PsySecure ODSF Framework - https://odsf.psysecure.com"The Space Between" Blog Post - https://psysecure.com/ma-the-space-between-breachesSwiss E-ID System Information - https://www.bk.admin.chCyber Kill Chain (Lockheed Martin) - https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.htmlRobert Cialdini's Principles of Persuasion - https://www.influenceatwork.comDaniel Kahneman's Thinking, Fast and Slow - https://www.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555“Nothing in life is as important as you think it is when you are thinking about it.”- Daniel Kahneman, Thinking, Fast and Slow  ★ Support this podcast on Patreon ★

Unspoken Security
Security Awareness for the Connected Generation

Unspoken Security

Play Episode Listen Later Oct 2, 2025 62:07


In this episode of Unspoken Security, host A.J. Nash sits down with Marley Salveter, Director of Marketing at Unspoken Security. They explore how digital privacy and security awareness look different for younger generations who have grown up in a world where sharing personal data is routine, not a choice. Marley shares her perspective on adapting to life online, where building a personal brand and protecting personal information often overlap for today's professionals.Marley explains how her generation views data privacy as an accepted tradeoff, not a conscious decision, and why traditional corporate security training rarely feels relevant. She discusses the real risks of living in public—how threats feel less urgent until they get personal and why the rapid response of tech platforms can mask the lasting impact of breaches. She and A.J. dig into the challenge of communicating security risks to a connected generation that rarely sees tangible consequences.Together, they reflect on how open conversations bridge generational gaps and why storytelling and relatable dialogue help people internalize security lessons. Marley argues that making security personal is key to lasting change—especially for those building their careers and brands in the public eye.Send us a textSupport the show

The Produce Industry Podcast w/ Patrick Kelly
Guarding the Harvest: Cybersecurity & Ransomware Risks in Fresh Produce - Global Fresh Series

The Produce Industry Podcast w/ Patrick Kelly

Play Episode Listen Later Oct 1, 2025 33:17


In this episode of the Global Fresh Series, we sit down with Dave McCary of ZAG Technical Services to explore how cybersecurity and ransomware are reshaping the fresh produce industry. From recent high-profile attacks on produce companies to the hidden vulnerabilities in supply chains, Dave shares why protecting data and operations is just as critical as protecting the crops themselves. We discuss the real costs of downtime, how hackers exploit weaknesses, and the steps growers, shippers, and distributors can take today to safeguard their businesses — and the global food supply — from digital threats.First Class Sponsor: Peak of the Market: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://peakofthemarket.com/⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Premium Sponsor: Zag Technological Services, Inc.: https://www.zagtech.com/ Premium Sponsor: Avocados from Colombia: https://avocadoscolombia.com/ Premium Sponsor: The Fruit & Vegetable Dispute Resolution Corporation: https://fvdrc.com/ Global Women Fresh: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://globalwomenfresh.com/⁠⁠⁠⁠⁠⁠⁠

SECURE AF

Got a question or comment? Message us here!Ransomware is evolving faster than ever, from double extortion tactics to lightning-fast attack chains. In this episode, we break down how these threats work, why every organization is a target, and the layered defenses SOCs can use to detect and stop attacks early. Support the showWatch full episodes at youtube.com/@aliascybersecurity.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

Random but Memorable
How to protect yourself from digital identity theft with Eva Velasquez | VOICE CLONE IDENTITY THEFT

Random but Memorable

Play Episode Listen Later Sep 30, 2025 63:03


Identity theft affects millions of people every year — but do you really know how it works, or how to protect yourself? This week, we're joined by Eva Velasquez, CEO of the Identity Theft Resource Center, who shares the latest trends in identity crime and what steps you can take if it ever happens to you.

Risk Management and Insurance Podcast
Strengthening resilience through effective cyber threat management

Risk Management and Insurance Podcast

Play Episode Listen Later Sep 30, 2025 55:44


Organizations continue to face an increasingly complex cyber threat landscape. Amid ongoing geopolitical and geoeconomic tensions and supply chain disruptions, a robust and comprehensive cyber risk management strategy can help businesses mitigate risks and improve resiliency. In this episode of Risk in Context, Marsh McLennan's Dan Bowden speaks with Marsh's Helen Nuttall and Matt Berninger about the importance of reviewing and reinforcing cyber controls to help minimize cyber exposures and uncertainty and better protecting their people, finances, and operations from cyber threats. You can access a transcript of the episode here. Read Cybersecurity Signals, Connecting Controls and Incident Outcomes and The 2025 OT Security Financial Risk Report. For more insights and insurance and risk management solutions, follow Marsh on LinkedIn and X and visit marsh.com.

Security Squawk
Ransomware Evolves: From Volvo's Supply Chain to Your Own IT Tools

Security Squawk

Play Episode Listen Later Sep 30, 2025 37:42


In this episode of the Security Squawk Podcast, Bryan Hornung and Randy Bryan break down how ransomware keeps evolving and why businesses can't afford to let their guard down. Bryan covers three major stories: a ransomware attack on Volvo's supplier that exposed sensitive employee data, new research showing that 80% of ransomware victims get hit again, and how the Akira ransomware gang is flipping remote management tools against their victims. Randy dives into cyberattacks on global manufacturing, including production halts at Asahi and fallout from the Jaguar Land Rover ransomware incident. We'll unpack what these attacks mean for supply chains, IT teams, and everyday businesses—and why persistence is the new weapon of choice for cybercriminals. Tune in for sharp insights, real-world advice, and a little bit of sarcasm to keep it interesting. ️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! https://streamyard.com/pal/d/65161790...

Cybercrime Magazine Podcast
Cybercrime Wire For Sep. 29, 2025. Ransomware Attack Hits Union County In Ohio. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Sep 29, 2025 1:16


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

Security Conversations
Cisco firewall zero-days and bootkits in the wild

Security Conversations

Play Episode Listen Later Sep 27, 2025 114:49


Three Buddy Problem - Episode 65: We zero in on one of the biggest security stories of the year: the discovery of a persistent multi-stage bootkit implanting malware on Cisco ASA firewalls. Details on a new campaign, tied to the same threat actors behind ArcaneDoor, exploiting zero-days in Cisco's 5500-X series appliances, devices that sit at the heart of government and enterprise networks worldwide. Plus, Cisco's controversial handling of these disclosures, CISA's emergency deadlines for patching, the absence of IOCs and samples, and China's long-term positioning. Plus, thoughts on the Secret Service SIM farm discovery in New York and evidence of Russians APTs Turla and Gamaredon collaborating to hit Ukraine targets. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).

The Checklist by SecureMac
Checklist 442 - Ransomware Rodeo

The Checklist by SecureMac

Play Episode Listen Later Sep 26, 2025 18:12


Whether trying to hit the road or soar through the skies - ransomware is providing speed bumps and delays. We'll talk about a couple of huge ongoing ransomware attacks. Plus - how does ransomware happen, and how are organizations dealing? Believe it or not there's some survey data that's kind of encouraging. We'll hit that on this edition of The Checklist, brought to you by SecureMac. Check out our show notes: SecureMac.com/Checklist And get in touch with us: Checklist@Securemac.com

Cybercrime Magazine Podcast
Ransomware Minute. Jaguar Land Rover lacked cyberattack insurance. Scott Schober, WCYB Digital Radio

Cybercrime Magazine Podcast

Play Episode Listen Later Sep 26, 2025 2:22


The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.

KMJ's Afternoon Drive
Hackers shut down U.K. Air Travel with Ransomware

KMJ's Afternoon Drive

Play Episode Listen Later Sep 25, 2025 12:51


United Airlines grounds ALL flights for second time in a month amid growing safety concerns Please Subscribe + Rate & Review Philip Teresi on KMJ wherever you listen! --- KMJ’s Philip Teresi is available on the KMJNOW app, Apple Podcasts, Spotify, Amazon Music or wherever else you listen. --- Philip Teresi, Weekdays 2-6 PM Pacific News/Talk 580 & 105.9 KMJ DriveKMJ.com | Podcast | Facebook | X | Instagram --- Everything KMJ: kmjnow.com | Streaming | Podcasts | Facebook | X | Instagram See omnystudio.com/listener for privacy information.

Philip Teresi Podcasts
Hackers shut down U.K. Air Travel with Ransomware

Philip Teresi Podcasts

Play Episode Listen Later Sep 25, 2025 12:51


United Airlines grounds ALL flights for second time in a month amid growing safety concerns Please Subscribe + Rate & Review Philip Teresi on KMJ wherever you listen! --- KMJ’s Philip Teresi is available on the KMJNOW app, Apple Podcasts, Spotify, Amazon Music or wherever else you listen. --- Philip Teresi, Weekdays 2-6 PM Pacific News/Talk 580 & 105.9 KMJ DriveKMJ.com | Podcast | Facebook | X | Instagram --- Everything KMJ: kmjnow.com | Streaming | Podcasts | Facebook | X | Instagram See omnystudio.com/listener for privacy information.

Risky Business
Risky Business #808 -- Insane megabug in Entra left all tenants exposed

Risky Business

Play Episode Listen Later Sep 24, 2025 52:37


On this week's show Patrick Gray and special guest Rob Joyce discuss the week's cybersecurity news, including: Secret Service raids a SIM farm in New York MI6 launches a dark web portal Are the 2023 Scattered Spider kids finally getting their comeuppance? Production halt continues for Jaguar Land Rover GitHub tightens its security after Shai-Hulud worm This week's episode is sponsored by Sublime Security. In this week's sponsor interview, Sublime founder and CEO Josh Kamdjou joins host Patrick Gray to chat about the pros and cons of using agentic AI in an email security platform. This episode is also available on YouTube Show notes U.S. Secret Service disrupts telecom network that threatened NYC during U.N. General Assembly MI6 launches darkweb portal to recruit foreign spies | The Record from Recorded Future News One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens | dirkjanm.io Github npm changes Flights across Europe delayed after cyberattack targets third-party vendor | Cybersecurity Dive Major European airports work to restore services after cyberattack on check-in systems | The Record from Recorded Future News When “Goodbye” isn't the end: Scattered LAPSUS$ Hunters hack on | DataBreaches.Net UK arrests 2 more alleged Scattered Spider hackers over London transit system breach | Cybersecurity Dive Alleged Scattered Spider member turns self in to Las Vegas police | The Record from Recorded Future News Las Vegas police arrest minor accused of high-profile 2023 casino attacks | CyberScoop DOJ: Scattered Spider took $115 million in ransoms, breached a US court system | The Record from Recorded Future News vx-underground on X: "Scattered Spider ransoms company for 964BTC - wtf_thats_alot.jpeg - Document says "Cost of BTC at time was $36M" - $36M / 964BTC = $37.5K - BTC value was $37.5K in November, 2023 - Google "Ransomware, November, 2023" - omfg.exe https://t.co/uv2EzbL5HT" | X JLR ‘cyber shockwave ripping through UK industry' as supplier share price plummets by 55% | The Record from Recorded Future News Jaguar Land Rover to extend production pause into October following cyberattack | Cybersecurity Dive New plan would give Congress another 18 months to revisit Section 702 surveillance powers | The Record from Recorded Future News AI-powered vulnerability detection will make things worse, not better, former US cyber official warns | Cybersecurity Dive

Interviews: Tech and Business
RSA Security CEO: Dangers of Weak Identity Security | CXOTalk #89

Interviews: Tech and Business

Play Episode Listen Later Sep 24, 2025 53:38


In cybersecurity, identity has become the primary attack vector. We explore identity in CXOTalk 892, with the CEO of RSA Security, Rohit Ghai, who explains how stolen credentials, social engineering, and AI-enabled impersonation break defenses. And what boards, CISOs, and executives must do now.What you'll learn:-- Why credential theft remains the #1 initial access vector and what “phishing resistant” MFA actually requires-- How attackers bypass MFA via help desk social engineering and voice impersonation, and how to stop it-- Managing identity across the joiner–mover–leaver lifecycle to close high-risk gaps-- The “assume breach” mindset: zero trust, least privilege, and blast radius reduction-- The CISO's evolving mandate: business vs. technology, board communication, and risk quantification-- AI in cyber: sword, shield, and attack surface, and the changing economics of attack vs. defense-- Ransomware beyond backups: data theft, response playbooks, and legal/PR readinessWho should watch:Board members, CEOs, CISOs, CIOs, and security leaders who seek clear actions to improve resilience without slowing the business.

Cyber Crime Junkies
Shadow AI & Ransomware--Agentic AI EXPOSED

Cyber Crime Junkies

Play Episode Listen Later Sep 24, 2025 60:57 Transcription Available


New Episode! Tell us your feedback! Is Your Company Safe From AI Attacks?This episode covers the intersection of artificial intelligence and cybersecurity, exploring how AI can be used for both protection and malicious purposes. We examine how AI is used to create advanced ai cybercrime and deep fakes, and the rising threat of social engineering attacks. Learn how ai cybersecurity can help defend against ai hackers and other emerging threats. Feeling Kind? Consider Supporting Our Channel by subscribing! Over 84% of viewers do not subscribe to our channel! 

The Gate 15 Podcast Channel
Weekly Security Sprint EP 128. Telecom risk, Ransomware, Cybersecurity legislation, and physical security threats

The Gate 15 Podcast Channel

Play Episode Listen Later Sep 23, 2025 20:09


In this week's Security Sprint, Dave and Andy covered the following topics:Warm Open:• TribalNet: Casino-systems suppliers protecting operations from cyberattacks • TribalNet: AI main focus of tribal technology conference• TribalNet 2025: Cybersecurity Is Central to IT Modernization for Tribes• The Gate 15 Interview EP 62: Justine Bone, Executive Director, Crypto ISACMain Topics:U.S. Secret Service dismantles imminent telecommunications threat in New York tristate area. The U.S. Secret Service dismantled a network of electronic devices located throughout the New York tristate area that were used to conduct multiple telecommunications-related threats directed towards senior U.S. government officials, which represented an imminent threat to the agency's protective operations. This protective intelligence investigation led to the discovery of more than 300 co-located SIM servers and 100,000 SIM cards across multiple sites. In addition to carrying out anonymous telephonic threats, these devices could be used to conduct a wide range of telecommunications attacks. This includes disabling cell phone towers, enabling denial of services attacks and facilitating anonymous, encrypted communication between potential threat actors and criminal enterprises. While forensic examination of these devices is ongoing, early analysis indicates cellular communications between nation-state threat actors and individuals that are known to federal law enforcement.Ransomware!• EU cyber agency says airport software held to ransom by criminals • A Cyberattack on Jaguar Land Rover Is Causing a Supply Chain Disaster • Rising cyberattacks on K-12 schools prompt concern as Uvalde CISD grapples with ransomwareCyber threat information law hurtles toward expiration, with poor prospects for renewal• Rand Paul's last-minute demands push key cybersecurity law to the brink• Peters Urges Senate to Quickly Extend Critical Cybersecurity Protections That Expire on October 1st• Health-ISAC CSO: A Looming Deadline: The Cybersecurity Information Sharing Act of 2015• RER and Coalition Urges TRIA Reauthorization• Commentary: Shrinking cyber budgets and rising threats: Why public-private partnerships are now mission-criticalUS threats and violence• MN man threatened people via email as retaliation for Charlie Kirk's death: Charges• NH Man Arrested for Allegedly Plotting to Kill Republican Governor Kelly Ayotte With Pipe Bombs• NCTC Supports U.S. Law Enforcement, First Responders by Sharing Intel Product Aimed at Deterring Attacks by Al-Qa'ida• ISIS calls for slaughter of Christians and Jews in UK attacks – 'shoot, stab, and ram' Quick Hits:• FBI PSA: Threat Actors Spoofing the FBI IC3 Website for Possible Malicious Activity• NHC issuing advisories for the Atlantic on Hurricane Gabrielle• UK NPSA: Vehicle Security Barriers at Event Venues • TikTok: Statement from ByteDanceo Deal to Keep TikTok in U.S. Is Near. These Are the Details.o Trump expected to approve TikTok deal via executive order later this week, WSJ reports• OpenAI admits AI hallucinations are mathematically inevitable, not just engineering flaws

The CyberWire
Grounded by ransomware.

The CyberWire

Play Episode Listen Later Sep 22, 2025 28:57


A major ransomware attack disrupts airport operations across Europe. Congress is on the verge of letting major cyber legislation expire. A critical flaw nearly allowed total compromise of every Entra ID tenant. Automaker Stellantis confirms a data breach. Fortra patches a critical flaw in its GoAnywhere MFT software. Europol leads a major operation against online child sexual exploitation. Three of the cybersecurity industry's biggest players opt out of MITRE's 2025 ATT&CK Evaluations. A compromised Steam game drains a cancer patient's donations. Business Breakdown. Andrzej Olchawa and Milenko Starcik from VisionSpace join Maria Varmazis, host of T-Minus Space on hacking satellites. How one kid got tangled in Scattered Spider's web. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Andrzej Olchawa and Milenko Starcik from VisionSpace are speaking with Maria Varmazis, host of T-Minus Space on hacking satellites. Selected Reading EU cyber agency says airport software held to ransom by criminals (BBC News) Cyber threat information law hurtles toward expiration, with poor prospects for renewal (CyberScoop) Microsoft Entra ID flaw allowed hijacking any company's tenant (Bleeping Computer) Stellantis says a third-party vendor spilled customer data (The Register) Fortra Patches Critical GoAnywhere MFT Vulnerability (SecurityWeek) AI Forensics Help Europol Track 51 Children in Global Online Abuse Case (HackRead) Cyber Threat Detection Vendors Pull Out of MITRE Evaluations Test (Infosecurity Magazine) Verified Steam game steals streamer's cancer treatment donations (Bleeping Computer) CrowdStrike and Check Point intend to acquire AI security firms. (N2K CyberWire Business Briefing)  ‘I Was a Weird Kid': Jailhouse Confessions of a Teen Hacker (Bloomberg) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Cyber Security Headlines
European airport cyberattack, SMS celltower scam, GPT4-powered ransomware

Cyber Security Headlines

Play Episode Listen Later Sep 22, 2025 8:26


European airport disruption due to cyberattack check-in and baggage software SMS scammers now using mobile fake cell towers GPT-4-powered MalTerminal malware creates ransomware and Reverse Shell Huge thanks to our sponsor, Conveyor  If security questionnaires make you feel like you're drowning in chaos, you're not alone. Endless spreadsheets, portals, and questions—always when you least expect them. Conveyor brings calm to the storm. With AI that auto-fills questionnaires and a trust center that shares all your docs in one place, you'll feel peace where there used to be panic. Find your security review zen at www.conveyor.com. Find the stories behind the headlines at CISOseries.com.

Cyber Security Today
CST Replay: The Ransomware Ecosystem with Tammy Harper

Cyber Security Today

Play Episode Listen Later Sep 20, 2025 74:24 Transcription Available


Unveiling the Ransomware Ecosystem with Tammy Harper In this compelling episode, Jim is joined by Tammy Harper from Flair.io to re-air one of their most popular and insightful episodes. Dive into the intricate world of ransomware as Tammy, a seasoned threat intelligence researcher, provides an in-depth introduction to the ransomware ecosystem. Explore the basics and nuances of ransomware, from its origins to its modern-day complexities. Tammy discusses not only the operational structures and notable ransomware groups like Conti, LockBit, and Scattered Spider, but also the impact and evolution of ransomware as a service. She also elaborates on ransomware negotiation tactics and how initial access brokers operate. This episode is packed with invaluable information for anyone looking to understand the cybercrime underground economy. Don't forget to leave your questions in the comments, and they might be addressed in future episodes! 00:00 Introduction and Episode Re-Run Announcement 00:29 Guest Introduction: Tammy Harper from Flair io 00:41 Exploring the Dark Web and Ransomware 02:21 Tammy Harper's Background and Expertise 03:40 Understanding the Ransomware Ecosystem 04:02 Ransomware Business Models and Initial Access Brokers 07:08 Double and Triple Extortion Tactics 11:23 History of Ransomware: From AIDS Trojan to WannaCry 13:02 The Rise of Ransomware as a Service (RaaS) 19:41 Conti: The Ransomware Giant 26:17 Conti's Tools of the Trade: EMOTET, ICEDID, and TrickBot 32:05 The Conti Leaks and Their Impact 34:04 LockBit and the Ransomware Cartel 37:07 National Hazard Agency: A Subgroup of LockBit 38:17 Release of Volume Two and Its Impact 39:08 Details of the Training Manual 40:52 Ransomware Negotiations 41:28 Ransom Chat Project 42:27 Conti vs. LockBit Negotiation Tactics 43:30 Professionalism in Ransomware Operations 47:07 Ransomware Chat Simulation 48:03 Ransom Look Project 49:11 Current Ransomware Landscape 50:32 Infiltration and Research Methods 51:47 Profiles of Emerging Ransomware Groups 01:05:21 Initial Access Market 01:10:26 Future of Ransomware and Law Enforcement Efforts 01:13:14 Conclusion and Final Thoughts

Security Now (MP3)
SN 1043: Memory Integrity Enforcement - Crypto ATM Scam Epidemic

Security Now (MP3)

Play Episode Listen Later Sep 17, 2025 171:36 Transcription Available


Apple just rewrote the rules of device security with a chip-level upgrade that could wipe out most iPhone vulnerabilities overnight. Find out how "memory integrity enforcement" aims to make exploits a thing of the past—and why it took half a decade to pull off. Are Bitcoin ATMs anything more than scamming terminals. Ransomware hits the Uvalde school district and Jaguar. Did "Scattered LapSus Hunters" just throw in the towel. Germany, for one, to vote "no" on Chat Control. Russia's new MAX messenger has startup troubles. Samsung follows Apple's WhatsApp patch chain. Shocker: UK school hacks are mostly by students. HackerOne was hacked. Connected washing machines in Amsterdam hacked. DDoS breaks another record. Bluesky to implement conditional age verification. Enforcement actions for Global Privacy Control. Might Apple have finally beaten vulnerabilities Show Notes - https://www.grc.com/sn/SN-1043-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: joindeleteme.com/twit promo code TWIT vanta.com/SECURITYNOW threatlocker.com for Security Now bitwarden.com/twit Melissa.com/twit

All TWiT.tv Shows (MP3)
Security Now 1043: Memory Integrity Enforcement

All TWiT.tv Shows (MP3)

Play Episode Listen Later Sep 17, 2025 171:51


Apple just rewrote the rules of device security with a chip-level upgrade that could wipe out most iPhone vulnerabilities overnight. Find out how "memory integrity enforcement" aims to make exploits a thing of the past—and why it took half a decade to pull off. Are Bitcoin ATMs anything more than scamming terminals. Ransomware hits the Uvalde school district and Jaguar. Did "Scattered LapSus Hunters" just throw in the towel. Germany, for one, to vote "no" on Chat Control. Russia's new MAX messenger has startup troubles. Samsung follows Apple's WhatsApp patch chain. Shocker: UK school hacks are mostly by students. HackerOne was hacked. Connected washing machines in Amsterdam hacked. DDoS breaks another record. Bluesky to implement conditional age verification. Enforcement actions for Global Privacy Control. Might Apple have finally beaten vulnerabilities Show Notes - https://www.grc.com/sn/SN-1043-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: joindeleteme.com/twit promo code TWIT vanta.com/SECURITYNOW threatlocker.com for Security Now bitwarden.com/twit Melissa.com/twit

Security Now (Video HD)
SN 1043: Memory Integrity Enforcement - Crypto ATM Scam Epidemic

Security Now (Video HD)

Play Episode Listen Later Sep 17, 2025 171:21 Transcription Available


Apple just rewrote the rules of device security with a chip-level upgrade that could wipe out most iPhone vulnerabilities overnight. Find out how "memory integrity enforcement" aims to make exploits a thing of the past—and why it took half a decade to pull off. Are Bitcoin ATMs anything more than scamming terminals. Ransomware hits the Uvalde school district and Jaguar. Did "Scattered LapSus Hunters" just throw in the towel. Germany, for one, to vote "no" on Chat Control. Russia's new MAX messenger has startup troubles. Samsung follows Apple's WhatsApp patch chain. Shocker: UK school hacks are mostly by students. HackerOne was hacked. Connected washing machines in Amsterdam hacked. DDoS breaks another record. Bluesky to implement conditional age verification. Enforcement actions for Global Privacy Control. Might Apple have finally beaten vulnerabilities Show Notes - https://www.grc.com/sn/SN-1043-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: joindeleteme.com/twit promo code TWIT vanta.com/SECURITYNOW threatlocker.com for Security Now bitwarden.com/twit Melissa.com/twit

Security Now (Video HI)
SN 1043: Memory Integrity Enforcement - Crypto ATM Scam Epidemic

Security Now (Video HI)

Play Episode Listen Later Sep 17, 2025 171:21 Transcription Available


Apple just rewrote the rules of device security with a chip-level upgrade that could wipe out most iPhone vulnerabilities overnight. Find out how "memory integrity enforcement" aims to make exploits a thing of the past—and why it took half a decade to pull off. Are Bitcoin ATMs anything more than scamming terminals. Ransomware hits the Uvalde school district and Jaguar. Did "Scattered LapSus Hunters" just throw in the towel. Germany, for one, to vote "no" on Chat Control. Russia's new MAX messenger has startup troubles. Samsung follows Apple's WhatsApp patch chain. Shocker: UK school hacks are mostly by students. HackerOne was hacked. Connected washing machines in Amsterdam hacked. DDoS breaks another record. Bluesky to implement conditional age verification. Enforcement actions for Global Privacy Control. Might Apple have finally beaten vulnerabilities Show Notes - https://www.grc.com/sn/SN-1043-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: joindeleteme.com/twit promo code TWIT vanta.com/SECURITYNOW threatlocker.com for Security Now bitwarden.com/twit Melissa.com/twit

Paul's Security Weekly
Board Priority But Lack of Access & CISO Pressure, 360 Privacy and Pentera Interviews - Chuck Randolph, Tom Pore - BSW #413

Paul's Security Weekly

Play Episode Listen Later Sep 17, 2025 70:10


In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more! Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a gripping conversation about the evolution of executive protection in the digital age. With over 30 years of experience, Chuck shares how targeted violence has shifted from physical threats to online ideation—and why it now starts with a click. From PII abuse to unregulated data brokers, generative AI manipulation, and real-world convergence of cyber and physical risks—this is a must-watch for CISOs, CSOs, CEOs, and anyone navigating modern threat landscapes. Hear real-world examples, including shocking stories of doxxing, AI-fueled radicalization, and the hidden dangers of digital exhaust. Whether you're in cyber, physical security, or executive leadership, this interview lays out the urgent need for converged risk strategies, narrative control, and a new approach to duty of care in a remote-first world. Learn what every security leader needs to do now to protect key personnel, prevent exploitation, and build a unified, proactive risk posture. This segment is sponsored by 360 Privacy. Learn how to integrate privacy and protective intelligence to get ahead of the next threat vector at https://securityweekly.com/360privacybh! In this exclusive Black Hat 2025 interview, CyberRisk TV host Matt Alderman sits down with Tom Pore, AVP of Sales Engineering at Pentera, to dive into the rapidly evolving world of AI-driven cyberattacks. What's happening? Attackers are already using AI and LLMs to launch thousands of attacks per second—targeting modern web apps, exploiting PII, and bypassing traditional testing methods. Tom explains how automated AI payload generation, context-aware red teaming, and language/system-aware attack modeling are reshaping the security landscape. The twist? Pentera flips the script by empowering security teams to think like an attacker—using continuous, AI-powered penetration testing to uncover hidden risks before threat actors do. This includes finding hardcoded credentials, leveraging leaked identities, and pivoting across systems just like real adversaries. To learn more about Pentera's proactive Ransomware testing please visit: https://securityweekly.com/penterabh Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-413

Radio Leo (Audio)
Security Now 1043: Memory Integrity Enforcement

Radio Leo (Audio)

Play Episode Listen Later Sep 17, 2025 171:36


Apple just rewrote the rules of device security with a chip-level upgrade that could wipe out most iPhone vulnerabilities overnight. Find out how "memory integrity enforcement" aims to make exploits a thing of the past—and why it took half a decade to pull off. Are Bitcoin ATMs anything more than scamming terminals. Ransomware hits the Uvalde school district and Jaguar. Did "Scattered LapSus Hunters" just throw in the towel. Germany, for one, to vote "no" on Chat Control. Russia's new MAX messenger has startup troubles. Samsung follows Apple's WhatsApp patch chain. Shocker: UK school hacks are mostly by students. HackerOne was hacked. Connected washing machines in Amsterdam hacked. DDoS breaks another record. Bluesky to implement conditional age verification. Enforcement actions for Global Privacy Control. Might Apple have finally beaten vulnerabilities Show Notes - https://www.grc.com/sn/SN-1043-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: joindeleteme.com/twit promo code TWIT vanta.com/SECURITYNOW threatlocker.com for Security Now bitwarden.com/twit Melissa.com/twit

Security Now (Video LO)
SN 1043: Memory Integrity Enforcement - Crypto ATM Scam Epidemic

Security Now (Video LO)

Play Episode Listen Later Sep 17, 2025 171:21 Transcription Available


Apple just rewrote the rules of device security with a chip-level upgrade that could wipe out most iPhone vulnerabilities overnight. Find out how "memory integrity enforcement" aims to make exploits a thing of the past—and why it took half a decade to pull off. Are Bitcoin ATMs anything more than scamming terminals. Ransomware hits the Uvalde school district and Jaguar. Did "Scattered LapSus Hunters" just throw in the towel. Germany, for one, to vote "no" on Chat Control. Russia's new MAX messenger has startup troubles. Samsung follows Apple's WhatsApp patch chain. Shocker: UK school hacks are mostly by students. HackerOne was hacked. Connected washing machines in Amsterdam hacked. DDoS breaks another record. Bluesky to implement conditional age verification. Enforcement actions for Global Privacy Control. Might Apple have finally beaten vulnerabilities Show Notes - https://www.grc.com/sn/SN-1043-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: joindeleteme.com/twit promo code TWIT vanta.com/SECURITYNOW threatlocker.com for Security Now bitwarden.com/twit Melissa.com/twit

Random but Memorable
How cyber warfare really works with Hayley Benedict | DISRUPT CONFLICT RISK SYSTEM

Random but Memorable

Play Episode Listen Later Sep 16, 2025 69:41


What does cyberwarfare really look like behind the headlines? This week, Roo sits down with Hayley Benedict, a cyber intelligence analyst at RANE, to explore the evolving world of digital conflict. From hacktivists to disinformation specialists, Hayley shares how nation states, criminals, and ideologically driven groups are blurring lines — and why data theft, disruption, and doubt remain the weapons of choice.

Security Now (MP3)
SN 1042: Letters of Marque - 1.1.1.1 Certificate Snafu

Security Now (MP3)

Play Episode Listen Later Sep 10, 2025 176:10


Is the U.S. on the verge of legalizing "hack back" missions, turning private companies into sanctioned cyber warriors? Steve and Leo unpack Google's plan for a cyber disruption unit and why the lines between defense and digital retaliation are suddenly blurring. My experience with 'X' vs email. Google TIG blackmailed to fire two security researchers. 1.1.1.1 DNS TLS certificate mis-issued. Artists blackmailed with threats of training AI on their art. Firefox extended end-of-life for Windows 7 to next March. Is the renewal of cybersecurity info sharing coming soon. Should security analysis be censored due to vibe-coding. UK versus Apple may not be settled after all. Another very serious supply chain attack. Can the software supply-chain ever be trustworthy. Why did BYTE Magazine die. What happens if Google and others go on the attack Show Notes - https://www.grc.com/sn/SN-1042-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: uscloud.com canary.tools/twit - use code: TWIT bigid.com/securitynow zscaler.com/security expressvpn.com/securitynow

The CyberWire
86 reasons to update.

The CyberWire

Play Episode Listen Later Sep 10, 2025 27:59


Patch Tuesday. A data leak sheds light on North Korean APT Kimsuky. Apple introduces Memory Integrity Enforcement. Ransomware payments have dropped sharply in the education sector in 2025. A top NCS official warns ICS security lags behind, and a senator calls U.S. cybersecurity a “hellscape”. A Ukrainian national faces federal charges and an $11 million bounty for allegedly running multiple ransomware operations. Our guest is Jake Braun sharing the latest on Project Franklin. WhoFi makes WiFi a new spy. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Jake Braun, longtime DEF CON organizer, former White House official, and lead on DEF CON Franklin, sharing the latest on Project Franklin. Selected Reading Two Zero-Days Among Patch Tuesday CVEs This Month (Infosecurity Magazine) Fortinet, Ivanti, Nvidia Release Security Updates (SecurityWeek) ICS Patch Tuesday: Rockwell Automation Leads With 8 Security Advisories (SecurityWeek) SAP 'wins' Patch Tuesday with worse flaws than Microsoft  (The Register) Adobe Patches Critical ColdFusion and Commerce Vulnerabilities (SecurityWeek) Data leak sheds light on Kimsuky operations (SC Media) Apple Unveils iPhone Memory Protections to Combat Sophisticated Attacks (SecurityWeek) Learn about ChillyHell, a modular Mac backdoor (jamf) Ransomware Payments Plummet in Education Amid Enhanced Resiliency (Infosecurity Magazine) Critical infrastructure security tech needs to be as good as our smartphones, top NSC cyber official says (CyberScoop) Sen. King: Cyber domain is a ‘hellscape' that will be made worse by cuts (The Record) US indicts alleged ransomware boss tied to $18B in damages (The Register)Jeremy Clarkson's pub has been 'swindled' out of £27,000 by hackers (Manchester Evening News) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices