Podcasts about security weekly

  • 51PODCASTS
  • 2,308EPISODES
  • 54mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • May 5, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about security weekly

Latest podcast episodes about security weekly

Open Source Security Podcast
Embedded Security with Paul Asadoorian

Open Source Security Podcast

Play Episode Listen Later May 5, 2025 34:24


Recently, I had the pleasure of chatting with Paul Asadoorian, Principal Security Researcher at Eclypsium and the host of the legendary Paul's Security Weekly podcast. Our conversation dove into the often-murky waters of embedded systems and the Internet of Things (IoT), sparked by a specific vulnerability discussion on Paul's show concerning reference code for the popular ESP32 microcontroller. The show notes and blog post for this episode can be found at https://opensourcesecurity.io/2025/2025-05-embedded-security-with-paul-asadoorian/

Paul's Security Weekly
Security Weekly News Interviews Leaders of NECCDC competition - SWN #473

Paul's Security Weekly

Play Episode Listen Later May 2, 2025 32:02


Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-473

Hack Naked News (Audio)
Security Weekly News Interviews Leaders of NECCDC competition - SWN #473

Hack Naked News (Audio)

Play Episode Listen Later May 2, 2025 32:02


Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-473

Hack Naked News (Video)
Security Weekly News Interviews Leaders of NECCDC competition - SWN #473

Hack Naked News (Video)

Play Episode Listen Later May 2, 2025 32:02


Join us for a special in-person edition of the Security Weekly News! Show Notes: https://securityweekly.com/swn-473

Paul's Security Weekly
Security Weekly News Interviews Participants and Coaches at NECCDC - SWN #472

Paul's Security Weekly

Play Episode Listen Later Apr 29, 2025 33:34


Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-472

Hack Naked News (Audio)
Security Weekly News Interviews Participants and Coaches at NECCDC - SWN #472

Hack Naked News (Audio)

Play Episode Listen Later Apr 29, 2025 33:34


Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-472

Hack Naked News (Video)
Security Weekly News Interviews Participants and Coaches at NECCDC - SWN #472

Hack Naked News (Video)

Play Episode Listen Later Apr 29, 2025 33:34


Join us for a special in-person edition of the Security Weekly News! Show Notes: https://securityweekly.com/swn-472

Paul's Security Weekly
The Future of Access Management - Jeff Shiner - ESW #404

Paul's Security Weekly

Play Episode Listen Later Apr 28, 2025 120:22


As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how employees access sensitive business data. In this episode of Security Weekly, Jeff Shiner, CEO of 1Password, joins us to discuss the future of access management and how organizations must move beyond traditional IAM and MDM solutions. He'll explore the need for Extended Access Management, a modern approach that ensures every identity is authentic, every device is healthy, and every application sign-in is secure, including the unmanaged ones. Tune in to learn how security teams can bridge the Access-Trust Gap while empowering employees with frictionless security. In this topic segment, we discuss the most interesting insights from the 2025 edition of Verizon's DBIR. You can grab your own copy of the report at https://verizon.com/dbir In this week's enterprise security news, Lots of funding announcements as we approach RSA New products The M-Trends also rudely dropped their report the same day as Verizon Supply chain threats Windows Recall is making another attempt MCP server challenges Non-human identities A startup post mortem Remember that Zoom outage a week or two ago? The cause is VERY interesting All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-404

Enterprise Security Weekly (Audio)
The Future of Access Management - Jeff Shiner - ESW #404

Enterprise Security Weekly (Audio)

Play Episode Listen Later Apr 28, 2025 120:22


As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how employees access sensitive business data. In this episode of Security Weekly, Jeff Shiner, CEO of 1Password, joins us to discuss the future of access management and how organizations must move beyond traditional IAM and MDM solutions. He'll explore the need for Extended Access Management, a modern approach that ensures every identity is authentic, every device is healthy, and every application sign-in is secure, including the unmanaged ones. Tune in to learn how security teams can bridge the Access-Trust Gap while empowering employees with frictionless security. In this topic segment, we discuss the most interesting insights from the 2025 edition of Verizon's DBIR. You can grab your own copy of the report at https://verizon.com/dbir In this week's enterprise security news, Lots of funding announcements as we approach RSA New products The M-Trends also rudely dropped their report the same day as Verizon Supply chain threats Windows Recall is making another attempt MCP server challenges Non-human identities A startup post mortem Remember that Zoom outage a week or two ago? The cause is VERY interesting All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-404

Enterprise Security Weekly (Video)
The Future of Access Management - Jeff Shiner - ESW #404

Enterprise Security Weekly (Video)

Play Episode Listen Later Apr 28, 2025 39:05


As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how employees access sensitive business data. In this episode of Security Weekly, Jeff Shiner, CEO of 1Password, joins us to discuss the future of access management and how organizations must move beyond traditional IAM and MDM solutions. He'll explore the need for Extended Access Management, a modern approach that ensures every identity is authentic, every device is healthy, and every application sign-in is secure, including the unmanaged ones. Tune in to learn how security teams can bridge the Access-Trust Gap while empowering employees with frictionless security. Show Notes: https://securityweekly.com/esw-404

AlertsUSA Homeland Security Weekly Update
Homeland Security Weekly Update - April 26, 2025

AlertsUSA Homeland Security Weekly Update

Play Episode Listen Later Apr 26, 2025 6:31


This week's update provides details behind a terror attack in the Jammu Kashmir region of India that killed 26 tourists and wounded 20 others. India wants blood. Pakistan is warning that tampering with their water rights would be an act war. We then return to the US southern border, where the US Army is now able to search and detain illegals found within the New Mexico National Defense Area. An expanded written version of this report can be found within our weekly Threat Journal email newsletter. You can subscribe for FREE by simply visiting https://www.ThreatJournal.com . A link to this issue will immediately be sent to you via email. AlertsUSA Homepage http://www.AlertsUSA.com – (Homeland Security Alerts for Mobile Devices) AlertsUSA on Facebook https://www.facebook.com/alertsusa AlertsUSA on Twitter https://twitter.com/alertsusa Threat Journal on Twitter https://twitter.com/threatjournal Threat Journal Homepage https://www.ThreatJournal.com

IT Privacy and Security Weekly update.
EP 239.5 Deep Dive Crocodilus and The IT Privacy and Security Weekly Update for the Week Ending April 22nd., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Apr 24, 2025 20:41


“Crocodilus” is a new Android malware aimed at cryptocurrency wallet users, notably in Spain and Turkey but potentially worldwide. It impersonates legitimate apps and tricks users into disclosing seed phrases. By exploiting Android's accessibility services, it can monitor screens, simulate gestures, bypass two-factor authentication, and drain assets.ChatGPT's latest models can analyze images in detail to determine real-world locations—raising privacy concerns, especially around doxxing. OpenAI imposes safeguards, but they may not fully prevent misuse.“Shadow AI” refers to employees secretly using unauthorized AI tools at work to enhance speed and efficiency. Nearly half admit to it, suggesting organizations must provide better AI solutions rather than simply banning them.The EU has banned autonomous AI agents in official online meetings over privacy and transparency risks, echoing the broader AI Act's emphasis on mitigating high-risk AI scenarios.Serious NFC vulnerabilities allow attackers to exploit firmware in contactless readers with oversized data packets, enabling remote code execution that can crash terminals, steal information, and even force ATMs to dispense cash. Many older systems remain unpatched.Ransomware attackers significantly increase demands upon finding evidence of a victim's cyber-insurance—potentially more than five times higher—highlighting the need to secure insurance documents.U.S. border agents can search electronic devices without warrants. Refusing to unlock can lead to confiscation for citizens or denial of entry for non-citizens. Travelers are advised to minimize stored data, disable biometric locks, and power down devices before crossing borders.

IT Privacy and Security Weekly update.
Crocodilus and The IT Privacy and Security Weekly Update for the Week Ending April 22nd., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Apr 23, 2025 19:06


EP 239. This week:Emerging Android malware “Crocodilus” is targeting crypto wallet users in Spain and Turkey with deceptive apps that hijack seed phrases and device access through sophisticated accessibility exploits.ChatGPT's new models are impressively accurate at identifying real-world locations from images, sparking both admiration for AI capabilities and concern over potential misuse.A new study reveals that 50% of employees secretly use unauthorized generative AI tools, highlighting the urgent need for smarter, sanctioned workplace solutions.The EU has banned AI agents in official virtual meetings, citing privacy and transparency concerns in line with its broader push for responsible AI use.Researchers have exposed critical NFC flaws that allow attackers to manipulate ATMs and payment terminals using only a smartphone, raising alarms about contactless payment security.Dutch research shows ransomware actors hike demands—up to 5.5x—when they discover cyber-insurance documents on victims' systems, underscoring the importance of discreet data handling.With U.S. border agents empowered to inspect devices without a warrant, travelers are advised to minimize data exposure and take proactive digital hygiene steps to safeguard personal information.Let's go discover this week's update.... just be careful where you step!Find the full transcript to this podcast here.

AlertsUSA Homeland Security Weekly Update
Homeland Security Weekly Update - April 19, 2025

AlertsUSA Homeland Security Weekly Update

Play Episode Listen Later Apr 19, 2025 7:01


This week's update provides details behind mass shootings at a high school in Texas and a state university in Florida. We then turn to the southern border, where the US Army has taken operational control of a long strip of land separating the US and Mexico which will be protected as if it were a military installation. An expanded written version of this report can be found within our weekly Threat Journal email newsletter. You can subscribe for FREE by simply visiting https://www.ThreatJournal.com . A link to this issue will immediately be sent to you via email. AlertsUSA Homepage http://www.AlertsUSA.com – (Homeland Security Alerts for Mobile Devices) AlertsUSA on Facebook https://www.facebook.com/alertsusa AlertsUSA on Twitter https://twitter.com/alertsusa Threat Journal on Twitter https://twitter.com/threatjournal Threat Journal Homepage https://www.ThreatJournal.com

Paul's Security Weekly
Govt Unravelling, AI Hijinx, Bot Chaos, Recall, Oracle, Slopesquatting, Tycoon 2FA... - PSW #870

Paul's Security Weekly

Play Episode Listen Later Apr 17, 2025 126:35


Govt Unravelling, AI Hijinx, Bot Chaos, Recall, Oracle, Slopesquatting, Tycoon 2FA, College, who knows, a lot more... On Paul's Security Weekly. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-870

Paul's Security Weekly TV
Govt Unravelling, AI Hijinx, Bot Chaos, Recall, Oracle, Slopesquatting, Tycoon 2FA... - PSW #870

Paul's Security Weekly TV

Play Episode Listen Later Apr 17, 2025 126:35


Govt Unravelling, AI Hijinx, Bot Chaos, Recall, Oracle, Slopesquatting, Tycoon 2FA, College, who knows, a lot more... On Paul's Security Weekly. Show Notes: https://securityweekly.com/psw-870

Paul's Security Weekly (Podcast-Only)
Govt Unravelling, AI Hijinx, Bot Chaos, Recall, Oracle, Slopesquatting, Tycoon 2FA... - PSW #870

Paul's Security Weekly (Podcast-Only)

Play Episode Listen Later Apr 17, 2025 126:35


Govt Unravelling, AI Hijinx, Bot Chaos, Recall, Oracle, Slopesquatting, Tycoon 2FA, College, who knows, a lot more... On Paul's Security Weekly. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-870

Paul's Security Weekly (Video-Only)
Govt Unravelling, AI Hijinx, Bot Chaos, Recall, Oracle, Slopesquatting, Tycoon 2FA... - PSW #870

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Apr 17, 2025 126:35


Govt Unravelling, AI Hijinx, Bot Chaos, Recall, Oracle, Slopesquatting, Tycoon 2FA, College, who knows, a lot more... On Paul's Security Weekly. Show Notes: https://securityweekly.com/psw-870

AlertsUSA Homeland Security Weekly Update
Homeland Security Weekly Update - April 12, 2025

AlertsUSA Homeland Security Weekly Update

Play Episode Listen Later Apr 12, 2025 8:01


This week's update begins with a warning regarding rising anti-American sentiment in multiple nations as a result of new import tariffs. We then turn to the US southern border for a look at the ongoing buildup of U.S. military forces to assist CBP in reinforcing territorial integrity. An expanded written version of this report can be found within our weekly Threat Journal email newsletter. You can subscribe for FREE by simply visiting https://www.ThreatJournal.com . A link to this issue will immediately be sent to you via email. AlertsUSA Homepage http://www.AlertsUSA.com – (Homeland Security Alerts for Mobile Devices) AlertsUSA on Facebook https://www.facebook.com/alertsusa AlertsUSA on Twitter https://twitter.com/alertsusa Threat Journal on Twitter https://twitter.com/threatjournal Threat Journal Homepage https://www.ThreatJournal.com

IT Privacy and Security Weekly update.
EP 237.5 Deep Dive: Artificial General Intelligence and The IT Privacy and Security Weekly Update for the Week Ending April 8th., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Apr 9, 2025 15:39


1. Concerns About AGI DevelopmentDeepMind's 108-page report outlines four major risks of Artificial General Intelligence (AGI):Misuse: AGI used maliciously (e.g., creating viruses).Misalignment: AGI acting contrary to intended goals.Mistakes: Errors causing unintended harm, especially in high-stakes sectors like defense.Structural Risks: Long-term impacts on trust, power, and truth in society. While safety measures are urged, full control of AGI remains uncertain.2. Improving Machine Learning SecurityThe open-source community is adopting model signing (via Sigstore), applying digital signatures to AI models. This ensures the model's authenticity and integrity—helping prevent the use of tampered or untrusted code in AI systems.3. Risks from AI Coding AssistantsA newly identified threat—Rules File Backdoor—allows attackers to embed malicious instructions in configuration files used by AI coding assistants (like GitHub Copilot or Cursor). This can lead to AI-generated code with hidden vulnerabilities, increasing risk through shared or open-source repos.4. Italy's Controversial Piracy ShieldPiracy Shield, Italy's system for blocking pirated content, has mistakenly blacklisted legitimate services like Google Drive. Critics highlight issues around lack of transparency, violations of net neutrality and digital rights, and risks of censorship. Despite backlash, the system is being expanded, raising further concerns.5. EU's Push on Data Access and EncryptionThe EU's ProtectEU strategy includes strengthening Europol into a more FBI-like agency and proposing roadmaps for law enforcement access to encrypted data. This indicates a potential push toward backdoor access, reigniting debates on privacy vs. security.6. Cyberattacks on Australian Pension FundsCoordinated cyberattacks have compromised over 20,000 accounts across Australian retirement funds, with some user savings stolen. The incidents expose vulnerabilities in financial infrastructure, prompting a government initiative to bolster sector-wide cybersecurity.7. Lessons from Oracle's Security BreachesOracle reported two separate breaches in a short span. The latest involved theft of outdated login credentials. These incidents reveal persistent challenges in securing large tech platforms and highlight the need for ongoing security improvements and scrutiny of legacy systems.8. Closure of OpenSNP Genetic DatabaseOpenSNP is shutting down after 14 years, deleting all user data due to rising concerns over misuse of genetic data, especially amid growing political threats from authoritarian regimes. The founder emphasized protecting vulnerable populations and reevaluated the risks of continued data availability versus its research value.

IT Privacy and Security Weekly update.
Artificial General Intelligence and The IT Privacy and Security Weekly Update for the Week Ending April 8th., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Apr 8, 2025 18:30


EP 237. DeepMind just released a 108-page manual on not getting wiped out by our own invention.  Highlighting the fact that planning for an AI apocalypse could now be a core business line function.Sigstore machine learning model signing - AI models are finally getting digital signatures, because “mystery code from the internet” just wasn't a scalable trust strategy.Turns out your AI  programmer can be tricked into writing malware.  Helping us understand that “copilot” isn't necessarily synonymous with “competent”.Italy's anti-piracy tool is blocking legit services like it's playing "whack-a-mole" blindfolded, but in this case the moles are  cloud storage, like your Google drive.The EU wants Europol to act like the FBI because privacy for our citizens is important, except when we want to read their encrypted messages.Hackers hit Aussie retirement funds, proving the only thing scarier than blowing through all your retirement money is someone else blowing through it all for you.Oracle's been hacked again—because who doesn't love a sequel with worse security and a bigger cleanup bill?OpenSNP just quit the internet after realizing DNA + authoritarian vibes = one dystopia too many.This week is a wild ride, so saddle up and hold on tight!

AlertsUSA Homeland Security Weekly Update
Homeland Security Weekly Update - April 5, 2025

AlertsUSA Homeland Security Weekly Update

Play Episode Listen Later Apr 5, 2025 5:31


This week's update begins with a look at new warnings of an expected increase in attempted attacks against Israeli and Jewish targets worldwide with the approach of Passover. We then turn to a security alert issued by the US Embassy in Stockholm urging Americans to use caution around the embassy, as well as while attending large events or frequenting public venues. An expanded written version of this report can be found within our weekly Threat Journal email newsletter. You can subscribe for FREE by simply visiting https://www.ThreatJournal.com . A link to this issue will immediately be sent to you via email. AlertsUSA Homepage http://www.AlertsUSA.com – (Homeland Security Alerts for Mobile Devices) AlertsUSA on Facebook https://www.facebook.com/alertsusa AlertsUSA on Twitter https://twitter.com/alertsusa Threat Journal on Twitter https://twitter.com/threatjournal Threat Journal Homepage https://www.ThreatJournal.com

IT Privacy and Security Weekly update.
EP 236.5 Deep dive - Unexplainable disappearances and The IT Privacy and Security Weekly Update for the Week Ending April 1st., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Apr 3, 2025 16:12


1. What are some recent major cryptocurrency hacks, and how were they carried out?High-profile crypto breaches include Bybit (~$1.5B), Ronin Network ($625M), and Poly Network ($611M). Attackers exploited vulnerabilities via social engineering (notably in the Bybit case), smart contract flaws, phishing, and targeted blockchain bridges. State-backed groups are increasingly active in this space.2. How is malware evolving to bypass traditional antivirus tools, and what languages are favored by attackers?Cybercriminals are turning to languages like Rust and Go to create or recompile malware, exploiting blind spots in antivirus tools that rely on static signature detection. These languages also offer cross-platform capabilities and security features that can be weaponized.3. What happened to computer scientist Xiaofeng Wang, and why is it significant?The FBI raided Wang's home—he's a well-known Indiana University expert in cryptography and privacy. Since the raid, he's gone missing, with his online presence scrubbed. The secrecy surrounding his disappearance, combined with his sensitive field of work and Chinese background, raises serious questions.4. Why is AI firm Anthropic sweeping its offices for hidden devices?To combat rising concerns about espionage and IP theft, Anthropic is conducting physical security sweeps. This move reflects heightened tensions in the competitive AI landscape and the growing risk of surveillance and corporate spying in the industry.5. What API security change is Cloudflare making, and why does it matter?Cloudflare is enforcing HTTPS-only access for its API domain by shutting down HTTP ports entirely. This ensures encrypted communication, protecting API tokens and user data, and sets a strong precedent for better internet-wide encryption standards.6. How did Madison Square Garden use surveillance tech to ban a fan, and what does it imply?MSG banned a fan for life after facial recognition identified him as the creator of a CEO-critical T-shirt. This incident underscores the growing use of surveillance in private venues and its implications for free expression and long-term personal tracking.7. What data exposure was found in several dating apps?Researchers found ~1.5M unprotected, sensitive photos—some explicit—exposed by five dating apps from M.A.D Mobile. Images included private messages and content believed to be deleted. This highlights the dangers of poor data hygiene and storage practices.8. What security failure occurred at the UK's GCHQ involving an intern?A GCHQ intern copied top-secret data from a secure system to his personal phone, then transferred it to a home hard drive. This breach reveals critical weaknesses in internal controls, particularly around device security and data exfiltration prevent

IT Privacy and Security Weekly update.
Unexplainable disappearances and The IT Privacy and Security Weekly Update for the Week Ending April 1st., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Apr 2, 2025 19:32


EP 236 For the Biggest Crypto Hacks it turns out “HODL” doesn't protect you from miscreants with social engineering degrees.Hackers are now coding in Rust and Go, because multilingual malware is harder to catch.An esteemed University Computer Scientist simply disappears. (See if you can pick up on the clues.)Anthropic expands into AI workplace cleaning, but before you get too excited, they're only sweeping offices for now.Cloudflare slams the door making one well known transfer protocol vanish.Then, design one anti-CEO shirt and "boom" a lifetime ban from Madison Square Garden.Millions of spicy selfies spilled online, and now your privates may be public.And we finish with the burning question of who blew up national security... the intern or GCHQ?Let's go find some explanations.Find the full transcript to this podcast here.

AlertsUSA Homeland Security Weekly Update
Homeland Security Weekly Update - March 29, 2025

AlertsUSA Homeland Security Weekly Update

Play Episode Listen Later Mar 28, 2025 8:46


This week's update begins with a look at the details of a mass stabbing attack in Amsterdam that left five people seriously wounded, including two Americans. We then turn to an overview of the U.S. Intelligence Community's annual report to Congress on major threats facing the U.S.. An expanded written version of this report can be found within our weekly Threat Journal email newsletter. You can subscribe for FREE by simply visiting https://www.ThreatJournal.com . A link to this issue will immediately be sent to you via email. AlertsUSA Homepage http://www.AlertsUSA.com – (Homeland Security Alerts for Mobile Devices) AlertsUSA on Facebook https://www.facebook.com/alertsusa AlertsUSA on Twitter https://twitter.com/alertsusa Threat Journal on Twitter https://twitter.com/threatjournal Threat Journal Homepage https://www.ThreatJournal.com

IT Privacy and Security Weekly update.
EP 235.5 Deep Dive. The IT Privacy and Security Weekly Update and a Gene Genie for the Week Ending March 25th., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Mar 27, 2025 15:47


Privacy Risks of 23andMe BankruptcyA breach impacting 7 million users, coupled with lawsuits and financial distress, means 23andMe's 15 million genetic profiles could be sold or misused under a new buyer. The California Attorney General has urged users to delete their data and destroy physical samples, highlighting the vulnerability of storing sensitive genetic information with for‑profit entities under financial strain.Clearview AI's Data Acquisition AttemptsClearview AI tried to buy a massive database of arrest records, mugshots, and personal details (like social security numbers). This would greatly expand its controversial facial recognition repository, fueling concerns about privacy, consent, and misuse by governments or private actors.Hungary's Use of Facial Recognition at Pride EventsHungary banned Pride events and authorized facial recognition to identify attendees, who may face fines under “child protection” laws. Critics view this as an attack on free assembly and expression, especially for LGBTQ+ communities, creating a chilling effect on peaceful protests.China's New Facial Recognition RulesFacial recognition is banned without consent and in private spaces, requiring privacy assessments and encryption. However, these rules exclude “algorithm training,” meaning facial images may still be collected for AI development, undermining the intended privacy protections given China's widespread CCTV presence.US Coordination on Russian Cyber Threats HaltedUS national security agencies ceased joint efforts against Russian cyberattacks, disinformation, and oligarch asset seizures. This abrupt stop raises concerns over weakened defenses against foreign interference, though official explanations remain unclear.Microsoft's Unpatched .LNK ExploitAn eight‑year‑old Windows shortcut (.LNK) exploit persists, with Microsoft labeling it a “UI issue” rather than a security flaw. Attackers, including state‑sponsored groups, hide malicious commands in whitespace, leaving users vulnerable to spying and data theft.Windows 10 End of SupportWith support ending in October 2025, Microsoft urges users—over half of its Windows base—to buy new hardware for Windows 11. This approach overlooks the financial burden on many and disregards feasible upgrades or affordable alternatives for existing devices.Dutch Universities Shifting Away from WhatsAppSchools such as Utrecht and Avans recommend moving to Signal over privacy and misinformation concerns tied to WhatsApp's data‑sharing practices. Signal's strong encryption, open‑source nature, and non‑profit status align with the need for secure, private communication in educational settings.

IT Privacy and Security Weekly update.
The IT Privacy and Security Weekly Update and a Gene Genie for the Week Ending March 25th., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Mar 26, 2025 19:05


EP 235 The IT Privacy and Security Weekly Update and a Gene Genie for the Week Ending March 25th., 20253/25/20250 CommentsEP 235. ​- click the pic to hear the podcast -DNA of 15 Million People For Sale.  Turns out your great-great-grandparents' DNA is now a going-out-of-business clearance sale!"Clearview Tried to Buy Social Security Numbers and Mugshots.  Shopping list: milk, eggs, 690 million arrest records, and a side of your soul.Hungary Uses Facial Recognition to Suppress a Pride March—because nothing says “freedom” like being fined for your face.China says no facial recognition in hotel rooms—so go ahead and enjoy your surveillance-free shower while it lasts.US Agencies Halt Counter-Russian Cyberattack Coordination to stop Russian cyber sabotage and, what could possibly go wrong?Microsoft Isn't Fixing 8-Year-Old Shortcut Exploit.  Maybe it's a new cybersecurity policy, "If we ignore it long enough, perhaps it'll go away!"Then, If you have a Windows 10 machine and can't install Windows 11, Microsoft suggests a fix.  Buy a new computer and maybe get a second job.And finally, Dutch universities to WhatsApp, "It's not you, it's us.  We just can't get comfortable with your data hoarding."Let's go try on some genes!Find the full transcript to this podcast here.

AlertsUSA Homeland Security Weekly Update
Homeland Security Weekly Update - March 22, 2025

AlertsUSA Homeland Security Weekly Update

Play Episode Listen Later Mar 22, 2025 9:01


This week's update begins with a look at the increasingly dangerous trend of attacking Tesla dealerships, charging stations, employees, and owners as the Left begins their annual summer protests. We then turn to Secretary of Defense Hegseth's moves putting US Navy assets into the border security mission. An expanded written version of this report can be found within our weekly Threat Journal email newsletter. You can subscribe for FREE by simply visiting https://www.ThreatJournal.com . A link to this issue will immediately be sent to you via email. AlertsUSA Homepage http://www.AlertsUSA.com – (Homeland Security Alerts for Mobile Devices) AlertsUSA on Facebook https://www.facebook.com/alertsusa AlertsUSA on Twitter https://twitter.com/alertsusa Threat Journal on Twitter https://twitter.com/threatjournal Threat Journal Homepage https://www.ThreatJournal.com

IT Privacy and Security Weekly update.
EP 234.5 Deep Dive. The IT Privacy and Security Weekly Update for the Week Ending March 18th., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Mar 20, 2025 17:08


1. Why Should I Change My Passwords Immediately?Recent studies show that around 50% of online passwords are already compromised, and 41% of successful logins involve breached credentials. Common passwords like “123456” and password reuse make it easy for cybercriminals—especially with automated bots—to access multiple accounts. Changing passwords and using unique, strong credentials with multi-factor authentication is critical for security.Starting March 28th, all Alexa requests will be processed in Amazon's cloud, regardless of previous settings. Amazon claims this supports new AI features, but it means even users who opted out of saving voice recordings will now have all interactions recorded and sent to Amazon. This also impacts features like Voice ID, which won't function without stored voice data. While Amazon encrypts transmissions and provides some privacy controls, this shift raises concerns about increased data collection and potential personalization for shopping.Microsoft will stop providing free security updates for Windows 10 in October 2025, leaving charities that refurbish and donate older PCs with limited options. Many of these computers cannot run Windows 11, forcing organizations to choose between using an insecure OS, transitioning to Linux, or discarding hardware—contributing to electronic waste. While Linux is a secure, free alternative, its unfamiliar interface may pose usability challenges for some recipients, especially seniors.StilachiRAT is a newly discovered remote access trojan (RAT) targeting cryptocurrency wallets like MetaMask and Coinbase Wallet. This malware remains undetected on infected systems, stealing sensitive data, including credentials stored in browsers like Chrome. By accessing login credentials, attackers can drain funds from wallets. StilachiRAT also collects system data, increasing victims' exposure. While not widespread yet, its advanced capabilities make it a serious threat to crypto users.A Chinese state-sponsored hacking group remained undetected in a small Massachusetts power utility for over 300 days, showing that even lesser-known infrastructure is a target for cyber espionage. Attackers can use these breaches to test methods, gain footholds in critical networks, and extract operational data such as grid layouts. This underscores the need for robust security measures, continuous monitoring, and multi-factor authentication for all organizations, especially in critical sectors.Anthropic CEO Dario Amodei warns that state-sponsored actors, likely from China, are trying to steal “algorithmic secrets” from US AI firms. Some critical algorithms, despite representing massive investments (potentially $100 million), are just a few lines of code, making them easy to exfiltrate if security is breached. Amodei argues that the US government should take stronger action to protect these assets from industrial espionage.Allstate Insurance's National General unit had websites that displayed personally identifiable information (PII) in plaintext during the quote process. When users entered their name and address, the system exposed full driver's license numbers (DLNs) of the applicant and other residents at that address. Attackers used bots to harvest at least 12,000 DLNs, leading to fraudulent claims. This highlights the importance of secure website design and responsible data handling to prevent unauthorized access.

IT Privacy and Security Weekly update.
For the other 50%. The IT Privacy and Security Weekly Update for the Week Ending March 18th., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Mar 19, 2025 17:09


EP 234For the other 50%.  The IT Privacy and Security Weekly Update for the Week Ending March 18th., 20253/18/20250 CommentsEP 234- click the pic to hear the podcast -For our first story, Apparently there's a 50% chance your password is headlining a hacker convention.  Perhaps it's time to change up from ‘123456' (still the most commonly used password).Starting On March 28, Everything You Say To Your Echo Will Be Sent To Amazon.  Alexa's new motto: ‘Anything you say can and will be used—to personalize your shopping cart, and we mean potentially anything!'The end of Windows 10 Leaves PC Charities With Tough Choice:  Risk Windows 10, embrace Linux, or send Grandma's old PC straight to the tech graveyard?Then Microsoft flags a new threat draining crypto from top wallets.  Meet StilachiRAT, the malware so enthusiastic about your crypto it'll snatch it faster than you can configure your wallet software!Chinese Hackers Sat Undetected in a small Massachusetts power utility for months.  Who knew a cozy little power company could double as the perfect 300-day Airbnb for homeless cyber-spies?Anthropic CEO Says Spies Are After $100 Million AI Secrets in a 'Few Lines of Code'.  So when your fortune fits in a handful of lines, hitting Ctrl+C could be the new diamond heist.Finally,  Allstate Insurance gets sued for delivering PII in plaintext.  You're in good hands with Allstate, we just can't tell you whose.Let's update the other 50%!Find the full transcript to this podcast here.

AlertsUSA Homeland Security Weekly Update
Homeland Security Weekly Update - March 15, 2025

AlertsUSA Homeland Security Weekly Update

Play Episode Listen Later Mar 15, 2025 8:16


Homeland Security Weekly Update - March 15, 2025 by AlertsUSA, Inc.

IT Privacy and Security Weekly update.
Deep Dive. Keep it Safe. Featuring 21 Crypto scams to avoid. The IT Privacy and Security Weekly Update for the Week Ending March 11th., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Mar 13, 2025 19:22


EP 233.5 Key Cryptocurrency Threats & ScamsIn 2025, crypto remains a hotspot for scams like Ponzi schemes, fake ICOs, pump-and-dumps, phishing attacks, and malicious wallets or exchanges designed to steal funds. Social media is often used for deceptive giveaways, impersonations, and investment scams. Other risks include fake mining operations, rug pulls, fraudulent apps, SIM swapping, and impostor tech support.AI Skills Demand in the Tech Job MarketAI expertise is increasingly sought after, with about one in four U.S. tech job postings requiring AI-related skills. This trend cuts across industries like healthcare, finance, and professional services. Although overall tech job postings have dipped, AI job listings have surged since ChatGPT's launch, offering premium pay and higher job security.What Is Free95?Free95 is an open-source operating system on GitHub aiming for Windows compatibility without the bloat. It currently supports basic Win32 programs, with future plans for DirectX and gaming. Its creators prioritize security, simplicity, and independence from major corporate control, positioning it as a leaner alternative to systems like ReactOS.DOJ Push for Google to Sell ChromeThe U.S. Department of Justice still wants Google to divest Chrome, citing an illegal monopoly in search. The DOJ argues that selling Chrome would create room for genuine competition. While it continues to push for restrictions on Google's paid search placement deals, it has dropped calls for Google to shed AI start-up investments.Edge Computing on the ISSAxiom Space and Red Hat's AxDCU-1 data center on the ISS tests cloud, AI, and cybersecurity in orbit. Red Hat's Device Edge software enables real-time data processing in space, crucial due to limited satellite links with Earth. This development could boost AI training, imaging, cybersecurity, and overall autonomy in space operations.Undocumented ‘Backdoor' in a Chinese Bluetooth ChipResearchers found hidden commands in the ESP32 microcontroller, used in over a billion devices. Attackers could exploit these commands to impersonate devices, steal data, or infiltrate networks. The chip's widespread adoption in smartphones, locks, and medical equipment heightens the security risk, as attackers might gain long-term control.Security & Privacy Concerns of ‘Agentic AI'Signal President Meredith Whittaker warns that agentic AI requires broad system access, potentially gathering financial, scheduling, and messaging data with near-root permissions. This could break down privacy barriers between apps and introduce significant security risks, especially if sensitive data is processed in the cloud.Expanded Social Media Screening for Non-CitizensThe U.S. is considering extending social media checks beyond new arrivals to all non-citizens applying for benefits like permanent residency or citizenship. This raises privacy concerns, as individuals who entered before such screenings were routine may now face additional digital scrutiny when adjusting their immigration status.

IT Privacy and Security Weekly update.
Keep it Safe. The IT Privacy and Security Weekly Update for the Week Ending March 11th., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Mar 12, 2025 18:40


EP 233This week...  is seized Crypto Linked to LastPass? Feds pocket $23M in hot crypto—but with hackers still sitting on hundreds of millions, it's like finding loose change in the couch.Signal's boss says our ‘magic AI butler' needs root access to everything.  What could possibly go wrong?AI is Reshaping Tech Jobs and with nearly one in four tech gigs demanding AI skills, either learn to talk to robots or prepare to serve them coffee."Your Bluetooth toaster might secretly be dialing up hackers—because who doesn't love a little espionage with their morning bagel?With the UK quietly removing encryption advice, Brits wake up to find official security tips gone, like a polite note saying ‘We'd prefer you in clear text, chaps.'Indian tax officials are granted sweeping digital access and can now dig through socials, emails, and maybe grandma's recipe folder.  Nothing's sacred if there's tax to be had.Elon's empire takes another DDoS beating—Dark Storm claims credit, X users just want their snarky tweets back."We finish with the discovery of a Fake Website Spewing AI Slop that topped Google Search.  AI conjures space fantasies that outrank real news and it turns out that even Google can't spot the Millennium Falcon imposter.Let's keep it safe.Find the full transcript to this podcast here.

AlertsUSA Homeland Security Weekly Update
Homeland Security Weekly Update - March 8, 2025

AlertsUSA Homeland Security Weekly Update

Play Episode Listen Later Mar 8, 2025 5:31


This week's update begins with a cautionary statement regarding the Muslim holy month of Ramadan currently underway, and the associated wave of violence that typically follows. We then turn to a look at the details of this week's vehicle ramming attack in Mannheim, Germany. An expanded written version of this report can be found within our weekly Threat Journal email newsletter. You can subscribe for FREE by simply visiting https://www.ThreatJournal.com . A link to this issue will immediately be sent to you via email. AlertsUSA Homepage http://www.AlertsUSA.com – (Homeland Security Alerts for Mobile Devices) AlertsUSA on Facebook https://www.facebook.com/alertsusa AlertsUSA on Twitter https://twitter.com/alertsusa Threat Journal on Twitter https://twitter.com/threatjournal Threat Journal Homepage https://www.ThreatJournal.com

IT Privacy and Security Weekly update.
EP 232.5 Deep Dive - See for Miles and Miles with The IT Privacy and Security Weekly Update for the Week Ending March 4th., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Mar 6, 2025 18:56


How did Microsoft's Copilot expose private GitHub repositories, and what are the risks?Copilot accessed over 20,000 private GitHub repositories due to cached data from when they were public. Even after repos were made private, Copilot could still generate responses using this cached data, risking exposure of sensitive information like credentials and corporate secrets.What is the "nRootTag" exploit in Apple's Find My network?The "nRootTag" exploit allows attackers to track Bluetooth devices like AirTags without owners knowing. While AirTags use cryptographic keys to change Bluetooth addresses, attackers can rapidly compute these keys using GPUs, achieving a 90% tracking success rate.Why is the UK demanding an iCloud backdoor, and how has Apple responded?The UK wants access to encrypted iCloud data for law enforcement, but Apple opposes it, withdrawing its Advanced Data Protection from the UK. The US has also criticized the demand as a privacy and legal overreach.Why is Signal withdrawing from Sweden?Signal is leaving Sweden over proposed laws requiring backdoor access to encrypted chats. The company refuses to weaken encryption, emphasizing its commitment to user privacy.Why has the US reportedly halted offensive cyber operations against Russia?The US Cyber Command, under Defense Secretary orders, has paused cyber attacks on Russia, possibly for diplomatic reasons. Supporters see it as de-escalation; critics worry it weakens deterrence against Russian cyber threats.Why has Australia banned Kaspersky Lab products?Australia banned Kaspersky from government systems, citing espionage and foreign interference risks. The move signals concerns over antivirus software's deep system access and the company's Russian ties.How was a Cellebrite exploit used to hack a Serbian student's phone?A Cellebrite zero-day targeting Android's Linux kernel USB drivers allowed attackers with physical access to bypass the lock screen. This raises concerns over surveillance tools being misused against activists.What changes did Mozilla make to Firefox Terms of Use, and why was there backlash?Mozilla initially claimed broad rights over user-submitted content, sparking fears of data monetization. After criticism, they revised the terms, clarifying user ownership and denying AI data harvesting.

Paul's Security Weekly
Security Money: Sailpoint's IPO Saves the Index - BSW #385

Paul's Security Weekly

Play Episode Listen Later Mar 5, 2025 59:34


After Sophos acquires Secureworks, Sailpoint's IPO saves the index. The Security Weekly 25 index is now made up of the following pure play security vendors: SAIL SailPoint Ord Shs PANW Palo Alto Networks Inc CHKP Check Point Software Technologies Ltd RBRK Rubrik Inc GEN Gen Digital Inc FTNT Fortinet Inc AKAM Akamai Technologies, Inc. FFIV F5 Inc ZS Zscaler Inc OSPN Onespan Inc LDOS Leidos Holdings Inc QLYS Qualys Inc VRNT Verint Systems Inc. CYBR Cyberark Software Ltd TENB Tenable Holdings Inc OKTA Okta Inc S SentinelOne Inc NET Cloudflare Inc CRWD Crowdstrike Holdings Inc NTCT NetScout Systems Inc VRNS Varonis Systems Inc RPD Rapid7 Inc FSLY Fastly Inc RDWR Radware Ltd ATEN A10 Networks Inc In the leadership and communications segment, The CISO Transformation — A Path to Business Leadership, The CISO's dilemma of protecting the enterprise while driving innovation, When Hiring, Emphasize Skills over Degrees, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-385

Paul's Security Weekly TV
Security Money: Sailpoint's IPO Saves the Index - BSW #385

Paul's Security Weekly TV

Play Episode Listen Later Mar 5, 2025 30:40


After Sophos acquires Secureworks, Sailpoint's IPO saves the index. The Security Weekly 25 index is now made up of the following pure play security vendors: SAIL SailPoint Ord Shs PANW Palo Alto Networks Inc CHKP Check Point Software Technologies Ltd RBRK Rubrik Inc GEN Gen Digital Inc FTNT Fortinet Inc AKAM Akamai Technologies, Inc. FFIV F5 Inc ZS Zscaler Inc OSPN Onespan Inc LDOS Leidos Holdings Inc QLYS Qualys Inc VRNT Verint Systems Inc. CYBR Cyberark Software Ltd TENB Tenable Holdings Inc OKTA Okta Inc S SentinelOne Inc NET Cloudflare Inc CRWD Crowdstrike Holdings Inc NTCT NetScout Systems Inc VRNS Varonis Systems Inc RPD Rapid7 Inc FSLY Fastly Inc RDWR Radware Ltd ATEN A10 Networks Inc Show Notes: https://securityweekly.com/bsw-385

Business Security Weekly (Audio)
Security Money: Sailpoint's IPO Saves the Index - BSW #385

Business Security Weekly (Audio)

Play Episode Listen Later Mar 5, 2025 59:34


After Sophos acquires Secureworks, Sailpoint's IPO saves the index. The Security Weekly 25 index is now made up of the following pure play security vendors: SAIL SailPoint Ord Shs PANW Palo Alto Networks Inc CHKP Check Point Software Technologies Ltd RBRK Rubrik Inc GEN Gen Digital Inc FTNT Fortinet Inc AKAM Akamai Technologies, Inc. FFIV F5 Inc ZS Zscaler Inc OSPN Onespan Inc LDOS Leidos Holdings Inc QLYS Qualys Inc VRNT Verint Systems Inc. CYBR Cyberark Software Ltd TENB Tenable Holdings Inc OKTA Okta Inc S SentinelOne Inc NET Cloudflare Inc CRWD Crowdstrike Holdings Inc NTCT NetScout Systems Inc VRNS Varonis Systems Inc RPD Rapid7 Inc FSLY Fastly Inc RDWR Radware Ltd ATEN A10 Networks Inc In the leadership and communications segment, The CISO Transformation — A Path to Business Leadership, The CISO's dilemma of protecting the enterprise while driving innovation, When Hiring, Emphasize Skills over Degrees, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-385

IT Privacy and Security Weekly update.
EP 232 You can see for Miles and Miles with The IT Privacy and Security Weekly Update for the Week Ending March 4th., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Mar 5, 2025 16:48


This week:  Microsoft's Copilot is living up to its name—because apparently, once it gets a glimpse of your code, it just can't unsee it.Hackers just turned every Bluetooth device into an involuntary AirTag—so congrats, your wireless headphones are now a tracking device.The UK wants a backdoor to look into iCloud, and the US just responded with a very diplomatic “absolutely not.”Sweden wanted a backdoor, but Signal ghosted them instead—because encryption doesn't do toxic relationships.The US was cyber-attacking Russia? Shocking!  Next you'll tell us we need stronger glasses.Australia finally decided that letting Russian software protect their government computers was like asking an elephant to deliver eggs.Cellebrite's phone exploits are so good, even governments can't resist misusing them.Mozilla accidentally claimed ownership of everything you type into Firefox, then backtracked faster than a politician caught on a hot mic.We can see for miles and miles.  Come on, let's focus in for a better look.Find the full transcript to this week's podcast here.

Business Security Weekly (Video)
Security Money: Sailpoint's IPO Saves the Index - BSW #385

Business Security Weekly (Video)

Play Episode Listen Later Mar 5, 2025 30:40


After Sophos acquires Secureworks, Sailpoint's IPO saves the index. The Security Weekly 25 index is now made up of the following pure play security vendors: SAIL SailPoint Ord Shs PANW Palo Alto Networks Inc CHKP Check Point Software Technologies Ltd RBRK Rubrik Inc GEN Gen Digital Inc FTNT Fortinet Inc AKAM Akamai Technologies, Inc. FFIV F5 Inc ZS Zscaler Inc OSPN Onespan Inc LDOS Leidos Holdings Inc QLYS Qualys Inc VRNT Verint Systems Inc. CYBR Cyberark Software Ltd TENB Tenable Holdings Inc OKTA Okta Inc S SentinelOne Inc NET Cloudflare Inc CRWD Crowdstrike Holdings Inc NTCT NetScout Systems Inc VRNS Varonis Systems Inc RPD Rapid7 Inc FSLY Fastly Inc RDWR Radware Ltd ATEN A10 Networks Inc Show Notes: https://securityweekly.com/bsw-385

AlertsUSA Homeland Security Weekly Update
Homeland Security Weekly Update - March 1, 2025

AlertsUSA Homeland Security Weekly Update

Play Episode Listen Later Mar 1, 2025 8:46


This week's update begins with a warning from the Texas Ag Commission regarding improvised explosive devices (IEDs) along the US-Mexico border. We then turn to the combative exchange between Donald Trump and Volodymyr Zelensky on ending the war in Ukraine. An expanded written version of this report can be found within our weekly Threat Journal email newsletter. You can subscribe for FREE by simply visiting https://www.ThreatJournal.com . A link to this issue will immediately be sent to you via email. AlertsUSA Homepage http://www.AlertsUSA.com – (Homeland Security Alerts for Mobile Devices) AlertsUSA on Facebook https://www.facebook.com/alertsusa AlertsUSA on Twitter https://twitter.com/alertsusa Threat Journal on Twitter https://twitter.com/threatjournal Threat Journal Homepage https://www.ThreatJournal.com

IT Privacy and Security Weekly update.
EP 231.5 The Deep Dive into The IT Privacy and Security Weekly Update for the Week Ending February 25th., 2025 goes Coconuts

IT Privacy and Security Weekly update.

Play Episode Listen Later Feb 27, 2025 16:46


Which AI chatbots pose the biggest privacy risks, and what data are they collecting and sharing?A recent study revealed that all top ten AI chatbots on the Apple App Store collect user data, with 30% sharing it with third parties for advertising or measurement. Specific incidents include an AI chatbot named WotNot exposing 346,000 sensitive customer files and ChatGPT facing temporary bans over the use of personal data for model training without user consent. The advice is to treat chatbots like untrustworthy coworkers and avoid sharing sensitive personal information.Why did Apple remove its Advanced Data Protection (ADP) feature in the UK?Apple removed its Advanced Data Protection (ADP) feature, which provided end-to-end encryption for iCloud data, in the UK after the government ordered the company to build a backdoor for accessing user data. Apple chose to remove the feature entirely rather than compromise the security of its encryption. This action raises concerns about governments potentially outlawing strong encryption, which could reduce security for everyone and expose users to greater risks from surveillance and other bad actors.What are VPN providers in France and Spain facing, and why are they considering leaving the French market?In France, entertainment companies are pushing for legal action to force VPN providers to block access to pirate sites. In Spain, Cloudflare has been blocked on weekends after being accused of hosting pirate streaming sites. VPN providers argue that these demands are risky and could lead to security vulnerabilities and excessive blocking, compromising their core mission of providing legitimate privacy and security services. What is California doing to enforce data privacy, and what measures should individuals take to protect their data?California is taking a "radical" approach by actively enforcing its privacy laws through the California Privacy Protection Agency. This agency is tasked with investigating violations, issuing fines, and educating businesses about compliance. To protect your data, scrutinize app permissions, check browser extensions for suspicious activity, monitor location requests, be mindful of voice assistant settings, and disable unnecessary tracking features on wearables. What issues are users experiencing with the latest Windows 11 update (KB5030310)?The latest Windows 11 update, KB5030310, is causing various issues, including File Explorer freezing or crashing, vanishing icons, locked windows, and problems with multi-monitor setups. Some users have also reported silent or disappearing notifications.What is the "Uber for armed guards" service, and why is it gaining traction?Protector, an app providing on-demand armed security similar to Uber, is gaining traction in NYC and LA. Users can book armed guards, described as active or retired law enforcement and military, complete with a motorcade of Escalades.What security vulnerability was discovered in MESH by Viscount access control systems, and what are the implications?A significant vulnerability was discovered in MESH by Viscount access control systems due to unchanged default login credentials. This allows unauthorized individuals to access the systems remotely, view sensitive resident data (names, unit numbers, phone numbers), and manipulate building access controls, including unlocking doors and disabling access fobs.What is "surveillance pricing," and what are states doing to combat it?"Surveillance pricing" is a tactic where companies use personal data, such as browsing history and spending habits, to hike up prices for consumers. States are stepping up to ban or limit these practices to promote fairer prices and stronger privacy protections. Individuals can protect themselves by monitoring for unexplained price jumps, regularly clearing browsing data, disabling unnecessary tracking, and questioning excessive permission requests.

IT Privacy and Security Weekly update.
The IT Privacy and Security Weekly Update for the Week Ending February 25th., 2025 goes Coconuts

IT Privacy and Security Weekly update.

Play Episode Listen Later Feb 26, 2025 18:49


EP 231 This week we wonder which chatbot takes "sharing is caring" a little too far. Turns out some of them are spilling secrets faster than the office gossip at happy hour.Apple just told the UK, ‘You want a backdoor? Fine—we'll just remove the whole door.France wants VPNs to stop streaming soccer pirates—because obviously the best way to protect privacy is to ban it entirely.California's cutting-edge privacy strategy? Actually enforcing the law.  Who knew that was an option?Microsoft's latest Windows 11 update: because sometimes you need a brand-new bug to make you forget the old ones.Uber with Armed Guards:  Now you can hail a bodyguard the same way you hail a taxi—apparently commuting got a whole lot scarier.If your building's master key is this public don't be shocked when you arrive home after work and the inlaws are waiting for dinner.Tired of costly coconuts because your phone snitched on your spending habits? Some states are finally calling out this ‘personalized' markup as nuts.Race you to the fresh produce section!Find the full transcript to this podcast here.

AlertsUSA Homeland Security Weekly Update
Homeland Security Weekly Update - Feb 22, 2025

AlertsUSA Homeland Security Weekly Update

Play Episode Listen Later Feb 22, 2025 12:31


This week's update begins with comments by Secretary of Defense Hegseth on massive changes coming to the Pentagon in order to drive lethality and reign in spending. We then move on to review three security alerts issued by US embassies abroad. An expanded written version of this report can be found within our weekly Threat Journal email newsletter. You can subscribe for FREE by simply visiting https://www.ThreatJournal.com . A link to this issue will immediately be sent to you via email. AlertsUSA Homepage http://www.AlertsUSA.com – (Homeland Security Alerts for Mobile Devices) AlertsUSA on Facebook https://www.facebook.com/alertsusa AlertsUSA on Twitter https://twitter.com/alertsusa Threat Journal on Twitter https://twitter.com/threatjournal Threat Journal Homepage https://www.ThreatJournal.com

IT Privacy and Security Weekly update.
EP 230.5 Deep Dive - The 'Secrets' of the IT Privacy and Security Weekly Update for the Week Ending February 18th., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Feb 20, 2025 19:14


1. What happened with Elon Musk's DOGE (.gov) website, and why is it significant?DOGE's official website, doge.gov, suffered a significant security breach due to a glaring vulnerability. The site's database was accessible and editable by the public because it was built on Cloudflare Pages instead of secure government servers. This allowed unauthorized individuals to modify content, highlighting a lack of stringent cybersecurity measures in government websites managed by DOGE. It demonstrates a lapse in basic security practices and raises concerns about the overall security and professionalism of government websites.2. What are the risks associated with employees sharing data with generative AI chatbots like ChatGPT, and what are companies doing about it?A substantial percentage (8.5%) of employee interactions with generative AI tools involve sensitive data, such as customer information (billing details, insurance claims, etc.). This raises significant security, compliance, privacy, and legal concerns for organizations. Sharing sensitive data with AI tools can lead to data breaches and leaks. Some companies, like Samsung, have prohibited the use of generative AI systems to prevent the inadvertent upload of confidential company information to external servers. The increasing integration of AI into workplace tools necessitates a reevaluation of data security protocols.3. Why was DeepSeek, the Chinese AI chatbot, removed from South Korean app stores?DeepSeek was removed from South Korean app stores due to privacy concerns identified by the Personal Information Protection Commission (PIPC). The PIPC found that DeepSeek lacked transparency about sharing user data with third parties and potentially collected excessive personal information. The app's data practices might violate local privacy laws. Similar actions have been taken in other countries and regions, indicating a global concern over DeepSeek's data handling.4. Who are "Salt Typhoon," and what are they doing?Salt Typhoon is a Chinese hacking group that continues to infiltrate global telecommunications networks despite U.S. sanctions. They exploit vulnerabilities in Cisco routers and switches to gain unauthorized access to sensitive data. They have breached telecom companies, internet service providers, and universities across multiple countries, including the U.S. Their targets are often entities involved in advanced research in telecommunications, engineering, and technology.5. How can individuals protect themselves from cyber espionage activities like those carried out by Salt Typhoon?Individuals can protect themselves by regularly updating the security patches on their personal devices, especially routers and switches. It is also recommended to use end-to-end encrypted messaging apps like Signal or Session for secure communication.6. What is the German Cartel Office's concern regarding Apple's App Tracking Transparency (ATT) feature?The German Federal Cartel Office is investigating whether Apple's ATT feature constitutes an abuse of power. The concern is that Apple's privacy policies may inadvertently give it a competitive advantage over other companies reliant on advertising tracking.7. What is PIN AI, and what does its new mobile app do?PIN AI is a company that has launched a mobile app allowing users to create their own personalized, private AI model directly on their smartphone. The AI models created are powered by DeepSeek or Llama.8. How is AI impacting the IT job market, and what can IT professionals do to adapt?AI is having a significant impact on the IT job market, with IT unemployment rising to 5.7% in January, surpassing the overall jobless rate. Major companies are implementing layoffs linked to cost-cutting measures and a growing reliance on AI technologies. To adapt, IT professionals need to retrain and stay at the cutting edge of technology.

IT Privacy and Security Weekly update.
EP 230 The 'Secrets' of the IT Privacy and Security Weekly Update for the Week Ending February 18th., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Feb 19, 2025 15:50


In this week's update:  Musk's DOGE website gets more editing than his tweets.Employees sharing secrets with AI chatbots prove humans haven't learned anything from social media oversharing.South Korea puts DeepSeek in the digital doghouse until it learns to play nice with privacy rules.Chinese hackers show that even after sanctions, you can't stop a Salt Typhoon with an umbrella.Apple's privacy features are too private for Germany's taste - plot twist nobody saw coming.Finally, an AI that promises to keep your secrets... on your phone, where you'll probably still accidentally share them anyway.AI takes tech jobs, and proves it learned "layoffs" from watching human managers.Let's go unearth those secrets!Find the full transcript to this podcast here.

IT Privacy and Security Weekly update.
EP 229.5 Deep Dive into Trashed; IT Privacy and Security Weekly Update for The Week Ending February 11th 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Feb 13, 2025 12:07


Frequently Asked Questions: Privacy, Security, and the State of Tech (Early 2025)1. What is "SparkCat" and why is it significant?SparkCat is malware discovered hiding in both the Apple App Store and Google Play. It uses optical character recognition (OCR) to scan users' photo galleries for cryptocurrency wallet recovery phrases and uploads them to attacker-controlled servers. Over 242,000 Android users downloaded infected apps. It highlights the evolving sophistication of malware and the need for increased vigilance, even with apps from reputable sources.2. What is the UK government asking Apple to do, and what are the potential implications?The UK government has reportedly ordered Apple to create a backdoor allowing access to encrypted cloud backups of users worldwide, through a technical capability notice under the Investigatory Powers Act. Apple is likely to discontinue its encrypted storage service in the UK rather than compromise user security globally. If Apple complies, it could set a dangerous precedent for other governments to demand similar access, undermining encryption and weakening security for everyone.3. What is the story about the man trying to buy a landfill, and what does it illustrate?A man is trying to buy a landfill to search for a hard drive containing his lost Bitcoin fortune. While seemingly absurd, it illustrates the very real consequences of poor digital asset management and data security. It highlights the permanence (and potential inaccessibility) of digital assets and the lengths people will go to recover them, even resorting to extreme measures.4. Why is the US considering banning the DeepSeek AI app?The US is considering banning the Chinese AI app DeepSeek due to concerns that it collects data for a foreign government (China). The app pumps data to China Mobile unencrypted, and there are close ties between the company and the Chinese military. This aligns with the US government's broader concerns about foreign-owned apps, especially those from China, posing national security risks due to data privacy and potential surveillance.5. What is the massive brute-force attack targeting VPNs, and how can organizations protect themselves?A large-scale brute-force attack is targeting VPN devices from companies like Palo Alto Networks, Ivanti, and SonicWall, utilizing nearly 2.8 million IP addresses. Attackers are attempting to guess usernames and passwords to gain unauthorized access. To protect edge devices, organizations should change default admin passwords to strong, unique ones, enforce multi-factor authentication (MFA), use allowlists of trusted IPs, and disable web admin interfaces if they are not needed, and also ensure VPN software is fully up to date.6. Why is Google's removal of its pledge not to build AI for weapons or surveillance significant?Google's removal of its pledge not to build AI for weapons or surveillance is a concerning development. It suggests a shift in the company's ethical stance and a willingness to potentially engage in activities that could have negative consequences for human rights and global security. It raises questions about the future direction of AI development and the role of tech companies in shaping its use.7. What is "enshittification" and how does it relate to current tech trends?"Enshittification" refers to the gradual decline of online services as they prioritize profits over user experience. This process involves platforms initially offering value to users, then shifting focus to business customers, and finally exploiting both for maximum profit. Examples include Twitter restricting API access, Facebook prioritizing sponsored content, smart TVs becoming data-hungry ad machines, and Google Assistant's diminishing functionality. It reflects a broader trend of tech companies sacrificing user experience for financial gain.

IT Privacy and Security Weekly update.
Trashed. The IT Privacy and Security Weekly Update for The Week Ending February 11th., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Feb 12, 2025 17:01


Episode 229If your seed phrase was in your photo gallery, congratulations! You might have just funded North Korea's next Missile launch.The UK government just asked Apple to make privacy optional—because nothing says "secure" like a government-mandated security hole.A man wants to buy an entire rubbish tip to find his lost Bitcoin hard drive—because sometimes, your financial future is literally garbage.The US is considering banning a Chinese AI app, proving once again that if it's cheap, efficient, foreign, unencrypted, and collects data for a foreign government it's probably too good to be true.Massive VPN Attack – 2.8 million IPs are trying to brute-force their way into VPNs—because apparently, resetting the default admin credentials to a "strong password" is still too much to ask.Google quietly removed its promise not to build AI for surveillance or weapons, so expect "Don't Be Evil" to disappear completely in a rev. or two.If your smart TV, social media, and AI assistants feel like they hate you, it's not paranoia—it's capitalism, or that other word we can't repeat here.Earth's Inner Core Is Changing – Scientists say the Earth's core might be slowing down, which is great, because the last thing we needed was more things spinning out of control.Let's go digging!Find the full transcript to this podcast here.

Paul's Security Weekly
How threat-informed defense benefits each security team member - Frank Duff, Nathan Sportsman - ESW #389

Paul's Security Weekly

Play Episode Listen Later Jan 13, 2025 120:38


We're thrilled to have Frank Duff on to discuss threat-informed defense. As one of the MITRE folks that helped create MITRE ATT&CK and ATT&CK evaluations, Frank has been working on how best to define and communicate attack language for many years now. The company he founded, Tidal Cyber is in a unique position to both leverage what MITRE has built with ATT&CK and help enterprises operationalize it. Segment Resources: Tidal Cyber website Tidal Cyber Community Edition We're a fan of hacker lore and history here at Security Weekly. In fact, Paul's Security Weekly has interviewed some of the most notable (and notorious) personalities from both the business side of the industry and the hacker community. We're very excited to share this new effort to document hacker history through in-person interviews. The series is called "Where Warlocks Stay Up Late", and is the creation of Nathan Sportsman and other folks at Praetorian. The timing is crucial, as a lot of the original hackers and tech innovators are getting older, and we've already lost a few. References: Check out the Where the Warlocks Stay Up Late website and subscribe to get notified of each episode as it is released Check out the anthropological hacker map and relive your misspent youth! In this latest Enterprise Security Weekly episode, we explored some significant cybersecurity developments, starting with Veracode's acquisition of Phylum, a company specializing in detecting malicious code in open-source libraries. The acquisition sparked speculation that it might be more about Veracode staying relevant in a rapidly evolving market rather than a strategic growth move, especially given the rising influence of AI-driven code analysis tools. We also covered One Password's acquisition of a UK-based shadow IT detection firm, raising interesting questions about their expansion into access management. Notably, the deal involved celebrity investors like Matthew McConaughey and Ashton Kutcher, suggesting a trend where Hollywood influence intersects with cybersecurity branding. A major highlight was the Cyber Haven breach, where a compromised Chrome extension update led to stolen credentials. The attack was executed through a phishing campaign disguised as a Google policy violation warning. To their credit, Cyber Haven responded swiftly, pulling the extension within two hours and maintaining transparency throughout. This incident underscored broader concerns around the poor security of browser extensions, an issue that continues to be exploited due to lax marketplace oversight. We also reflected on Corey Doctorow's concept of "Enshittification," critiquing platforms that prioritize profit and engagement metrics over genuine user experiences. His decision to disable vanity metrics resonated, especially considering how often engagement numbers are inflated in corporate settings. The episode wrapped with a thoughtful discussion on how CISOs can say "no" more effectively, emphasizing "yes, but" strategies and the importance of consistency. We also debated the usability frustrations of "magic links" for authentication, arguing that simpler alternatives like passkeys or multi-factor codes could offer a better balance between security and convenience. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-389

BarCode
Compliance Catalyst

BarCode

Play Episode Listen Later Jan 10, 2025 45:39 Transcription Available


Josh Marpet is a seasoned entrepreneur and a renowned authority in the field of information security, compliance, and risk management. With a rich background in law enforcement, Josh has translated his diverse experiences into shaping security protocols in various high-risk environments. He serves as the Chief Strategy Officer at Cyturus, where he drives advancements in compliance process products. Notably, Josh contributes to the esteemed IANS faculty and co-hosts the well-known Paul's Security Weekly podcast. His efforts also extend to organizing BSides Delaware, further cementing his influence and dedication to the cybersecurity community.He shares his diverse career journey from law enforcement to tech support and finally into cybersecurity leadership. Listeners gain insight into his work with compliance frameworks like CMMC and SPDX, and his strategic approach at Cyturus, focusing on "dynamic risk monitoring" as a forward-thinking solution for mitigating risks. This episode also delves into the global regulatory landscape, comparing U.S. frameworks with those abroad and discussing AI regulation insights. As always, the conversation is enriched with amusing anecdotes and expert advice, making it not only educational but also engaging.TIMESTAMPS:0:00 - Exploring Security, Compliance, and Innovation3:05 - Reviving In-Person Tech Conferences Post-COVID Challenges11:58 - From Tech Support to Cybersecurity and Compliance19:12 - The Challenges and Importance of Software Bill of Materials24:25 - The Global Regulatory Landscape and Its Impact on AI Development28:37 - HIPAA Compliance Challenges for Lawyers and Medical Startups30:00 - Dynamic Risk Monitoring as a Compliance and Revenue Driver34:32 - The Impact of Podcasts on the Cybersecurity Community40:14 - Exploring Unique Bars and Crafting Cybersecurity-Themed CocktailsSYMLINKSCyturus Website - https://cyturus.comOfficial website for Cyturus, a leader in compliance process products and solutions, focusing on dynamic risk monitoring and governance.Josh Marpet on LinkedIn - https://www.linkedin.com/in/joshuaviktor/Josh Marpet's professional LinkedIn profile for networking and insights.Paul's Security Weekly - https://securityweekly.comOne of the top cybersecurity podcasts, providing news, insights, and discussions on emerging threats and best practices in security.SPDX (Software Package Data Exchange) - https://spdx.devOfficial resource for SPDX, an ISO-certified standard for managing Software Bill of Materials (SBOM).CycloneDX - https://cyclonedx.orgA standard designed for the SBOM, with a focus on integration with CI/CD pipelines and automated systems.Executive Order 14028 - https://www.whitehouse.gov/briefing-room/statements-releases/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/U.S. Executive Order mandating the use of Software Bill of Materials (SBOM) for federal software contracts to improve cybersecurity.Helen Oakley - https://www.linkedin.com/in/helen-oakley/Profile and resources related to Helen Oakley, a professional working on AI Bill of Materials.NIST AI RMF (Risk Management Framework) - https://nist.gov/ai/rmfU.S. NationCONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com