Podcasts about Spyware

  • 744PODCASTS
  • 1,361EPISODES
  • 34mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jul 26, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Spyware

Show all podcasts related to spyware

Latest podcast episodes about Spyware

Computer Talk with TAB
Computer Talk 7-26-25 HR 1

Computer Talk with TAB

Play Episode Listen Later Jul 26, 2025 42:32


Sharepoint Server vulnerability looks a lot like Hafnium to us. Microsoft has stopped using China based engineers to work on DoD cloud systems. Older CD-ROM not working on new PC, Spyware developer used Google Servers as repository but never secured it. Took Google a month to remove it. Cognizant just gave away passwords and now is getting sued! My USB ports are flaky, Google email summary bothers me, MS Office 2021 having issues Launching Outlook should I replace my backup media?

The Daily Crunch – Spoken Edition
Serial spyware founder Scott Zuckerman wants the FTC to unban him from the surveillance industry

The Daily Crunch – Spoken Edition

Play Episode Listen Later Jul 23, 2025 4:39


The spyware maker was banned from the surveillance industry in 2021, but was caught flouting the ban less than a year later. Now the founder wants the ban lifted altogether. Learn more about your ad choices. Visit podcastchoices.com/adchoices

The CyberWire
The SharePoint siege goes strategic.

The CyberWire

Play Episode Listen Later Jul 22, 2025 33:17


Confusion persists over the Microsoft Sharepoint zero-days. CrushFTP confirms a zero-day under active exploitation. The UK government proposes a public sector ban on ransomware payments. A new ransomware group is using an AI chatbot to handle victim negotiations. Australia's financial regulator accuses a wealth management firm of failing to manage cybersecurity risks. Researchers uncover a WordPress attack that abuses Google Tag Manager. Arizona election officials question CISA following a state portal cyberattack.  Hungarian police arrest a man accused of launching DDoS attacks on independent media outlets. On our Threat Vector segment guest host ⁠Michael Sikorski⁠ ⁠and Michael Daniel⁠ of the Cyber Threat Alliance (CTA) explore cybersecurity collaboration. A Spyware kingpin wants back in. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment On our Threat Vector segment, host David Moulton turns the mic over to guest host ⁠Michael Sikorski⁠ and his guest ⁠Michael Daniel⁠ of the Cyber Threat Alliance (CTA) for a deep dive into cybersecurity collaboration. You can hear Michael and Michael's full discussion on Threat Vector ⁠⁠⁠here⁠⁠⁠ and catch new episodes every Thursday on your favorite podcast app. Selected Reading ToolShell Zero-Day Attacks on SharePoint: First Wave Linked to China, Hit High-Value Targets (SecurityWeek) Microsoft: Windows Server KB5062557 causes cluster, VM issues (Bleeping Computer)  File transfer company CrushFTP warns of zero-day exploit seen in the wild (The Record) UK to lead crackdown on cyber criminals with ransomware measures (GOV.UK) Ransomware Group Uses AI Chatbot to Intensify Pressure on Victims (Infosecurity Magazine) Australian Regulator Alleges Financial Firm Exposed Clients to Unacceptable Cyber Risks (Infosecurity Magazine) WordPress spam campaign abuses Google Tag Manager scripts (SC Media) After website hack, Arizona election officials unload on Trump's CISA (CyberScoop) Hungarian police arrest suspect in cyberattacks on independent media (The Record) Serial spyware founder Scott Zuckerman wants the FTC to unban him from the surveillance industry (TechCrunch) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Silicon Curtain
Why Is Russia Planning to Cut Off the Internet?

Silicon Curtain

Play Episode Listen Later Jul 22, 2025 12:19


Edition No197 | 22-07-2025 - Putin is tightening the digital noose in Russia, as the crackdown on the internet intensifies. We explore What It Signals in this episode. The Kremlin isn't just at war with Ukraine — it's at war with its own population, and the internet itself. Connectivity blackouts are plaguing regions of Russia, and now spyware is being installed on every internet capable device. The Victory Day disconnections of internet coverage were just a foretaste of the censorship and control that is rapidly approaching. The edges are emerging of what promises to be a terrifying blueprint for new a “digital gulag.” But this isn't just about censorship. It's about what Russia might be preparing for next — why the regime has such a sense of urgency to gain control of the Russian internet, and what that means for Ukraine and for the rest of us.----------DESCRIPTION:Putin's Digital Gulag: Why Russia is Shutting Down its InternetIn this episode of Silicon Bites, we delve into Vladimir Putin's aggressive efforts to control and restrict internet access in Russia. We explore the Kremlin's increasing crackdown on digital freedom and what it means for Russia's population, the ongoing conflict with Ukraine, and potential geopolitical ramifications. Key points include the intensification of censorship, the spread of spyware on consumer devices, and the Kremlin's urgency to isolate the Russian internet by autumn 2025. We also discuss possible reasons behind this rapid digital suppression including further mobilization, preparing for war with NATO, economic collapse, or autocratic whims. Discover how these unprecedented moves might signify a strategy to escalate the war or manage looming internal and external crises.----------SUPPORT THE CHANNEL:https://www.buymeacoffee.com/siliconcurtainhttps://www.patreon.com/siliconcurtain----------CHAPTERS:00:00 Introduction: Putin's Attempt to Break the Internet00:30 The Digital Noose Tightens01:26 The Big Digital Squeeze03:00 Technical Details of the Crackdown04:24 Spyware and the Digital Gulag05:52 Hypotheses Behind the Crackdown10:10 The Autumn Trap: Why Now?11:39 Conclusion: The Global Implications----------SOURCES: https://www.youtube.com/watch?v=Cx3hF3Yk2rYhttps://jamestown.org/program/russia-ramps-up-internet-censorship/https://www.businessinsider.com/russia-cut-internet-access-victory-day-ukraine-drone-strikes-putin-2025-5https://www.thetimes.com/world/russia-ukraine-war/article/putin-moscow-whatsapp-ban-plan-max-app-launch-b789tt6tshttps://united24media.com/latest-news/putins-new-orders-could-reshape-russian-internet-heres-whats-next-10019https://www.independent.co.uk/news/world/europe/russia-kremlin-instagram-atms-ukraine-b2791385.htmlhttps://meduza.io/en/feature/2025/07/07/mapping-russia-s-internet-blackoutshttps://www.themoscowtimes.com/2025/07/01/russia-to-disconnect-foreigners-who-have-not-submitted-biometric-data-from-mobile-internet-a89635https://www.washingtonpost.com/world/2025/07/17/russia-internet-censorship/https://www.kyivpost.com/post/56473https://www.bloomberg.com/news/articles/2025-07-03/russian-internet-outages-soar-as-kremlin-boosts-wartime-controls----------TRUSTED CHARITIES ON THE GROUND:Save Ukrainehttps://www.saveukraineua.org/Superhumans - Hospital for war traumashttps://superhumans.com/en/UNBROKEN - Treatment. Prosthesis. Rehabilitation for Ukrainians in Ukrainehttps://unbroken.org.ua/Come Back Alivehttps://savelife.in.ua/en/Chefs For Ukraine - World Central Kitchenhttps://wck.org/relief/activation-chefs-for-ukraineUNITED24 - An initiative of President Zelenskyyhttps://u24.gov.ua/Serhiy Prytula Charity Foundationhttps://prytulafoundation.orgNGO “Herojam Slava”https://heroiamslava.org/kharpp - Reconstruction project supporting communities in Kharkiv and Przemyślhttps://kharpp.com/NOR DOG Animal Rescuehttps://www.nor-dog.org/home/----------

The Lockdown - Practical Privacy & Security
030 - Info Stealers, GrapheneOS Drama, and Why Video Games and Anti-Virus Are Spyware

The Lockdown - Practical Privacy & Security

Play Episode Listen Later Jul 18, 2025 52:42


In this episode, I address listener feedback and corrections regarding use of public Wi-Fi, MAC addresses, and aliases. I dive deep into the nuances of MAC address randomization on GrapheneOS versus Apple's private Wi-Fi addresses, explaining why GrapheneOS offers superior privacy protection. I discuss the real threats of public Wi-Fi in 2025 (hint: it's not hackers with Wireshark), and share my approach with aliases.I also cover the rising threat of infostealers like Atomic Info Stealer for macOS, the dangerous intersection of gaming cheats and malware, and why I avoid third-party antivirus software. Most importantly, I address the GrapheneOS controversy: the loss of a senior developer to military conscription, Google's strategic pivot that threatens custom ROMs, and why claims of GrapheneOS “dying” are misinformation spread by those with competing agendas.In this week's episode:Clarifications and Corrections: Public Wi-Fi, MAC addresses, and alias managementMAC address randomization: GrapheneOS vs Apple's implementationThe real threats of public Wi-Fi in 2025Info stealers and video games can be a privacy nightmareGrapheneOS controversy: Developer conscription, Google's lockdown, and the future of custom ROMsWhy antivirus software might be the malware you're trying to avoidMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-general:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-intro:matrix.orgShow Links:MAC Address Lookup - https://maclookup.app/OUI Lookup - https://oui.is/33mail - https://www.33mail.com/OpenSnitch - https://github.com/evilsocket/opensnitchPrivacy.com - https://privacy.comLithic - https://lithic.comKaspersky and Russian Government - https://en.wikipedia.org/wiki/Kaspersky_and_the_Russian_governmentGoogle Not Killing AOSP - https://www.androidauthority.com/google-not-killing-aosp-3566882/GrapheneOS on Developer Conscription - https://grapheneos.social/@GrapheneOS/114359660453627718GrapheneOS on OEM Partnerships (June 19) - https://grapheneos.social/@GrapheneOS/114671100848024807GrapheneOS Response to Misinformation - https://grapheneos.social/@GrapheneOS/114825492698412916GrapheneOS on iPhone Security - https://grapheneos.social/@GrapheneOS/114824816120139544“Social engineering bypasses all technologies, including firewalls.”- Kevin Mitnick ★ Support this podcast on Patreon ★

The Daily Crunch – Spoken Edition
Can an ‘ethical' spyware maker justify providing its tech to ICE?

The Daily Crunch – Spoken Edition

Play Episode Listen Later Jul 16, 2025 5:08


Analysis: In calling itself an ethical spyware vendor, Paragon has opened itself up to scrutiny of its government customers. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Cyber Security Headlines
Rubio Spoofed, RondoDox Botnet, Batavia Spyware

Cyber Security Headlines

Play Episode Listen Later Jul 9, 2025 8:43


Four members of President Trump's cabinet impersonated Is this some kind of a game? Batavia attacks Russian industrial companies Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines  

Cyber Security Headlines
Undetectable Android spyware is detectable, Hunters ransomware quits, Salt Typhoon dormant

Cyber Security Headlines

Play Episode Listen Later Jul 4, 2025 9:09


Undetectable Android spyware leaks user logins Hunters ransomware group shuts doors Medical device company Surmodics reports cyberattack Huge thanks to our sponsor, Palo Alto Networks You're moving fast in the cloud and so are attackers. But while SecOps and cloud security teams are working in silos, attackers are exploiting the gaps between them. Cortex Cloud by Palo Alto Networks bridges this divide, unifying teams and stopping attacks with real-time cloud security that includes AI-powered protection, detection and automated response capabilities. Threats are stopped in minutes instead of days, and teams can finally protect cloud environments at the speed and scale of modern attacks. To learn more about how Cortex Cloud stops cloud attacks before they become breaches, visit: paloaltonetworks.com/cortex/cloud-detection-and-response Find the stories behind the headlines at CISOseries.com.

Smashing Security
Surveillance, spyware, and self-driving snafus

Smashing Security

Play Episode Listen Later Jul 2, 2025 34:05


A Mexican drug cartel spies on the FBI using traffic cameras and spyware — because "ubiquitous technical surveillance” is no longer just for dystopian thrillers. Graham digs into a chilling new US Justice Department report that shows how surveillance tech was weaponised to deadly effect.Meanwhile, Carole checks the rear-view mirror on the driverless car industry. Whatever happened to those million Tesla robotaxis Elon Musk promised by 2020? Spoiler: they're here — sort of — but they sometimes drive into oncoming traffic.Plus: Leighton House, heatwave survival gadgets, and an unflushable toilet situation (not what you think).All this and more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault.Warning: This podcast may contain nuts, adult themes, and rude language.Episode links:Mexican drug cartel hacker spied on FBI official's phone to track and kill informants, report says - TechCrunch.Audit of the Federal Bureau of Investigation's Efforts to Mitigate the Effects of Ubiquitous Technical Surveillance - US Department of Justice Office of the Inspector General.Tesla driver tells police he was using 'self-drive' system when his car hit a parked police vehicle - AP News.‘Lidar is lame': why Elon Musk's vision for a self-driving Tesla taxi faltered - The Guardian.Tesla invited influencers to test its robotaxi. Here's what they had to say - USA Today Europe.Elon Musk Hails 'Successful' Tesla Robotaxis Launch in Austin Amid Reported Glitches - eWEEK.A Fatal Tesla Crash Shows the Limits of Full Self-Driving - Bloomberg.The Arab Hall at Leighton House.Spandau Ballet's “Gold” - shot at Leighton House!Shark FlexBreeze Fan With InstaCool Mist Attachment - Shark.Smashing Security merchandise (t-shirts, mugs, stickers and stuff)Sponsored by:Vanta– Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!Trelica by 1Password- Access Governance for every SaaS app.

Hertie School of Governance
S3 Episode 07: On unlawful digital surveillance and spyware with Elina Castillo Jiménez & Rebecca White

Hertie School of Governance

Play Episode Listen Later Jun 20, 2025 37:04


Are you interested in better understanding spyware and the digital surveillance industry? Berlin Security Beat host David Backovsky interviews two experts from Amnesty International's Security Lab, Elina Castillo Jiménez & Rebecca White. Together they discuss what unlawful digital surveillance entails, the great cost that its use has on its victims and what can be done about it. The episode also includes advice on how to better protect oneself from possible intrusions.

Risky Business News
Risky Bulletin: Predator spyware alive despite US sanctions

Risky Business News

Play Episode Listen Later Jun 13, 2025 7:47


Intellexa is alive and well despite US sanctions, Paragon spyware used a zero-click iMessage exploit, South Korea's largest online bookstore gets ransomwared, and law enforcement takes down several cybercrime operations. Show notes

Cyber Morning Call
804 - Spyware: Novos estudos revelam atividade recente do Graphite e do Predator

Cyber Morning Call

Play Episode Listen Later Jun 13, 2025 3:59


Referências do EpisódioTuring Day 2025 – 5º edição - 17/06Graphite Caught: First Forensic Confirmation of Paragon's iOS Mercenary Spyware Finds Journalists TargetedAbout the security content of iOS 15.8.4 and iPadOS 15.8.4Predator Still Active, with New Client and Corporate Links IdentifiedTrend Micro fixes critical bugs in Apex Central and TMEE PolicyServerRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia

Risky Business
Risky Business #795 -- How The Com is hacking Salesforce tenants

Risky Business

Play Episode Listen Later Jun 11, 2025 67:34


On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: New York Times gets a little stolen Russian FSB data as a treat iVerify spots possible evidence of iOS exploitation against the Harris-Walz campaign Researcher figures out a trick to get Google account holders' full names and phone numbers Major US food distributor gets ransomwared The Com's social engineering of Salesforce app authorisations is a harbinger of our future problems Australian Navy forgets New Zealand has computers, zaps Kiwis with their giant radar. This week's episode is sponsored by identity provider Okta. Long-time friend of the show Alex Tilley is Okta's Global Threat Research Coordinator, and he joins to discuss how organisations can use both human and technical signals to spot North Koreans in their midst. This episode is also available on Youtube. Show notes How The Times Obtained Secret Russian Intelligence Documents - The New York Times Ukraine's military intelligence claims cyberattack on Russian strategic bomber maker | The Record from Recorded Future News Harris-Walz campaign may have been targeted by iPhone hackers, cybersecurity firm says iVerify Uncovers Evidence of Zero-Click Mobile Exploitation in the U.S. Spyware maker cuts ties with Italy after government refused audit into hack of journalist's phone | The Record from Recorded Future News Italian lawmakers say Italy used spyware to target phones of immigration activists, but not against journalist | TechCrunch Android chipmaker Qualcomm fixes three zero-days exploited by hackers | TechCrunch Cellebrite to acquire mobile testing firm Corellium in $200 million deal | CyberScoop Apple Gave Governments Data on Thousands of Push Notifications A Researcher Figured Out How to Reveal Any Phone Number Linked to a Google Account Bruteforcing the phone number of any Google user Acreed infostealer poised to replace Lumma after global crackdown | The Record from Recorded Future News BidenCash darknet forum taken down by US, Dutch law enforcement | The Record from Recorded Future News NHS calls for 1 million blood donors as UK stocks remain low following cyberattack | The Record from Recorded Future News Major food wholesaler says cyberattack impacting distribution systems | The Record from Recorded Future News Kettering Health confirms attack by Interlock ransomware group as health record system is restored | The Record from Recorded Future News Hackers abuse malicious version of Salesforce tool for data theft, extortion | Cybersecurity Dive shubs on X: "IP whitelisting is fundamentally broken. At @assetnote, we've successfully bypassed network controls by routing traffic through a specific location (cloud provider, geo-location). Today, we're releasing Newtowner, to help test for this issue: https://t.co/X3dkMz9gwK" / X Ross Ulbricht Got a $31 Million Donation From a Dark Web Dealer, Crypto Tracers Suspect | WIRED Australian navy ship causes radio and internet outages to parts of New Zealand

The Daily Crunch – Spoken Edition
Paragon says it cancelled contracts with Italy over government's refusal to investigate spyware attack on journalist

The Daily Crunch – Spoken Edition

Play Episode Listen Later Jun 11, 2025 5:28


The Italian government claims that accepting Paragon's help would have compromised national security and classified information. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Risky Business News
Risky Bulletin: Syrian Army infected with spyware before regime collapse

Risky Business News

Play Episode Listen Later Jun 4, 2025 8:20


A spyware app infected the Syrian Army's soldiers before the regime collapsed, NSO appeals its WhatsApp verdict, Chrome and Qual-comm patch zero-days, and an emergency services information sharing group shuts down. Show notes

CSC Talk Radio
Chinese SPYWARE in Solar Panels?

CSC Talk Radio

Play Episode Listen Later May 20, 2025 53:57


3647 – May 20, 2025 – Chinese SPYWARE in Solar Panels? – Larry Behrens from Power the Future joins us today. SELLING MORE THAN FRENCH FRIES – Do you want fries with that?  GETTING MORE THAN SOLAR PANELS – Do you want “chips” with that? “Keep your eyes on your fries” – a famous marketing slogan by McDonald's … that ... The post Chinese SPYWARE in Solar Panels? appeared first on CSC Talk Radio.

Swisspreneur Show
EP #494 - Ieva Soblickaite: A Cybersecurity Bootcamp in 45 Minutes

Swisspreneur Show

Play Episode Listen Later May 14, 2025 46:58


Timestamps:4:00 - What's a data breach?10:21 - What's a phishing campaign?13:50 - How expensive is it to fix a data breach? 20:35 - How are startups being targeted?22:07 - Why strong passwords are not enoughThis episode was co-produced by NordPass. Use code “swisspreneur” at checkout to get 30% off Business and Teams plans.This episode was sponsored by Relai. Get started with Bitcoin by downloading the Relai app today, and profit from 10% less fees by entering code SWISSPRENEUR at checkout.(Disclaimer: Relai services are exclusively recommended for Swiss and Italian residents.)About Ieva Soblickaite:Ieva Soblickaite is the CPO of NordPass, a password management solution that is part of Nord Security, the world's leading cybersecurity company. She holds a Masters from HEC Paris and co-founded Medigo GmbH before joining NordPass in 2021.During her chat with Merle, Ieva broke down the topic of cybersecurity into easily digestible, actionable chunks:What's a data breach?A data breach occurs whenever confidential data is accessed and used in some way (disclosed, copied, altered, destroyed). Common malicious uses include trading the data on the darkweb, decrypting the data to demand a ransom payment, and identity theft. What's malware?Malware is any software developed with the express intent of causing harm. Examples include viruses, trojans, spyware, ransomware, etc. It can also completely take over a computer, putting the criminal in complete control.Common types of malware:Ransomware: type of malware that prevents users or organizations from accessing their files. Hackers demand payment to restore access.Adware: type of greyware (since it does not necessarily have to be malicious) that displays ads to certain users. These ads can be unwanted or malicious.Spyware: malware that secretly monitors and collects information about a user's activities or devices, usually as the first step before another type of attack.Another well-known type of cyberattack are phishing campaigns, in which a hacker pretends to be someone the user knows, or an entity that they trust, in order to get them to click on a malicious link, which can download malware or take the user to a fake website where sensitive information will be requested.On average, a cyberattack occurs every 14 seconds, and the cost of fixing it depends on how quickly the user notices it and how quickly they act. On average, users will take 204 days to notice a cyberattack and another 73 days to contain the breach.In order to prevent an attack, several components are necessary:Strong passwordsMultifactor authenticationLimiting access to accounts & regularly reviewing who has accessAnti-virus softwareRegular vulnerability assessmentsHackers target big and small companies alike, as well as both famous and anonymous people, so it's safest to start improving the cybersecurity of your professional and personal accounts now.The cover portrait was edited by ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠www.smartportrait.io⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.

Consumer Tech Update
Signs you have spyware or a keylogger

Consumer Tech Update

Play Episode Listen Later May 12, 2025 10:47


Is your phone suddenly running hot? That might not just be a glitch. It could be some creep spying in on your phone. Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
When spyware backfires.

The CyberWire

Play Episode Listen Later May 7, 2025 33:40


A jury orders NSO Group to pay $167 millions dollars to Meta over spyware allegations. CISA warns of hacktivists targeting U.S. ICS and SCADA systems. Researcher Micah Lee documents serious privacy risks in the TM SGNL app used by high level Trump officials. The NSA plans significant workforce cuts. Nations look for alternatives to U.S. cloud providers. A medical device provider discloses a cyberattack disrupting its ability to ship customer orders. The Panda Shop smishing kit impersonates trusted brands. Accenture's CFO thwarts a deepfake attempt. Our temporary intern Kevin Magee from Microsoft wraps up his reporting from the RSAC show floor.  Server room shenanigans, with romance, retaliation, and root access. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Wrapping up RSAC 2025, we're joined by our partner Kevin Magee, Global Director of Cybersecurity Startups at Microsoft for Startups. Kevin brings the energy with a high-octane medley of interviews directly from the show floor, featuring sharp insights and bold ideas from some of cybersecurity's most influential voices. It's the perfect, fast-paced finale to our RSAC coverage—check out the show notes for links to all the guests featured! In this segment, you'll hear from Eoin Wickens, Director of Threat Intelligence of HiddenLayer, Jordan Shaw-Young, Chief of Staff for Security Services at BlueVoyant, Gil Barak, co-founder and CEO of Blink Ops, and Paul St Vil, VP of Field Engineering at Zenity. You can also catch Kevin on our Microsoft for Startups⁠ Spotlight, brought to you by N2K CyberWire and Microsoft, where we shine a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. Kevin and Dave talk with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur, then speak with three Microsoft for Startups members: Matthew Chiodi⁠ of ⁠Cerby⁠, ⁠Travis Howerton⁠ of ⁠RegScale⁠, and ⁠Karl Mattson⁠ of ⁠Endor Labs⁠. Whether you are building your own startup or just love a good innovation story, listen and learn more here. Selected Reading Spyware-maker NSO ordered to pay $167 million for hacking WhatsApp (The Washington Post) CISA Warns of Hackers Attacking ICS/SCADA Systems in Oil and Natural Gas Companies (Cyber Security News) Despite misleading marketing, Israeli company TeleMessage, used by Trump officials, can access plaintext chat logs (Micha Flee) NSA to cut up to 2,000 civilian roles as part of intel community downsizing' (The Record) NIST loses key cyber experts in standards and research (Cybersecurity Dive) A coherent European/non-US cloud strategy: building railroads for the cloud economy (Bert Hubert) Medical device giant Masimo says cyberattack is limiting ability to fill customer orders (The Record) New Chinese Smishing Kit Dubbed 'Panda Shop' Steal Google, Apple Pay & Credit Card Details (Cyber Security News) Accenture: What we learned when our CEO got deepfaked (Computing) IT Worker from Computacenter Let Girlfriend Into Deutsche Bank's Restricted Areas (GB Hackers) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

As It Happens from CBC Radio
For Italian tech workers, the conclave meets fantasy sports

As It Happens from CBC Radio

Play Episode Listen Later May 7, 2025 60:19


Flight from fight response. After India attacks Pakistan and Pakistan authorizes "corresponding action", a journalist in Kashmir tells us the threat of escalation has people unsure what to do or where to go.Search me. American authorities in a Washington state border town inspect cars and question drivers heading toward Canada. A local lawyer says that might destroy whatever was left of the town's cross-border business. Spyware and tear. An Israeli cyber-intelligence firm is ordered to pay more than 2-hundred and 30 million Canadian in damages, for surveilling hundreds of WhatsApp users.Your chance to pontiff-icate. While the conclave is in session, Italians are guessing who the next Pope will be -- by playing a fantasy-league game called "Fantapapa". A true sensation about real sensations. A graduate student in Finland wins this year's "Dance Your PhD" contest with a powerful performance about the science behind sensations such as burning, cooling, and tingling.And...villain the blanks. A British woman is given tens of thousands in compensation, after her colleagues filled out a Star Wars-related personality test on her behalf -- and declared her a "Darth Vader".As It Happens, the Wednesday Edition. Radio that survives a near-Darth experience. 

Daily Tech Headlines
US v. Google: Eddy Cue says Apple is actively looking at reshaping Safari – DTH

Daily Tech Headlines

Play Episode Listen Later May 7, 2025


Netflix rolls out a redesign of its Apple tvOS app, Spyware maker NSO Group must pay WhatsApp $167M, Amazon unveils warehouse robot “Vulcan” MP3 Please SUBSCRIBE HERE for free or get DTNS Live ad-free. A special thanks to all our supporters–without you, none of this would be possible. If you enjoy what you see youContinue reading "US v. Google: Eddy Cue says Apple is actively looking at reshaping Safari – DTH"

Cyber Security Today
Cybersecurity News Roundup: Book Deals, Retail Attacks, Apple Spyware Alerts, and More

Cyber Security Today

Play Episode Listen Later May 2, 2025 11:32 Transcription Available


In this episode, host Jim Love discusses various cybersecurity topics including a book deal from CRC Press for those interested in cybersecurity, auditing, and leadership. Major cyber incidents involving two UK retailers, Co-op and Marks & Spencer's, are detailed, highlighting the challenges they face. Apple's notifications to users in 100 countries about targeted mercenary spyware attacks are covered, emphasizing the importance of taking these alerts seriously. Additionally, a malicious WordPress plugin has been discovered that grants attackers unauthorized access, and an open letter from cybersecurity professionals calls on President Donald Trump to cease investigations into former CISA Director Chris Krebs. The episode concludes by previewing an upcoming segment covering the B Side and RSA shows. 00:00 Introduction and Special Announcement 00:16 Cybersecurity Book Deals 01:37 Major Cyber Attacks on UK Retailers 03:48 Apple's Spyware Alerts 06:22 Malicious WordPress Plugin Discovered 08:19 Open Letter Supporting Chris Krebs 10:57 Conclusion and Upcoming Events

No Agenda
1760 - "Mercenary Spyware"

No Agenda

Play Episode Listen Later May 1, 2025 203:08 Transcription Available


No Agenda Episode 1760 - "Mercenary Spyware" "Mercenary Spyware" Executive Producers: Anonymous Black Sheep Scott Horton Abby Paulsons Commadore of the Human Resources Producers Sir Marcus Sir Milkman Zadoc Brown III SDG Brock Reinhold Jon Tucker Laurens De Ceuster Sir Dibs on Living Angel Dechter Wirt Fuller Rick W Cable Brandon Foster Associate Executive Producers: Rich Geisler Chad Finkbeiner Eli the coffee guy Linda Lu Duchess of jobs & writer of resumes Erin Parr Commodores: Commodore Anonymous Black Sheep Commodore Scott Horton Commodore of the Human Resources Producers Commodore Mark of Crow Wing County"? Commodore Sir Milkman of Evington Commodore Zadoc Brown III Commodore SDG Commodore Brock Reinhold Commodore Jon Tucker Become a member of the 1761 Club, support the show here Boost us with with Podcasting 2.0 Certified apps: Podverse - Podfriend - Breez - Sphinx - Podstation - Curiocaster - Fountain Knights & Dames Sir Tom > Baron Tom, Warden of the Frozen Tundra. Art By: Dennis Roebecker End of Show Mixes: Nautilis K - David Keckta Engineering, Stream Management & Wizardry Mark van Dijk - Systems Master Ryan Bemrose - Program Director Back Office Jae Dvorak Chapters: Dreb Scott Clip Custodian: Neal Jones Clip Collectors: Steve Jones & Dave Ackerman NEW: and soon on Netflix: Animated No Agenda Sign Up for the newsletter No Agenda Peerage ShowNotes Archive of links and Assets (clips etc) 1760.noagendanotes.com Directory Archive of Shownotes (includes all audio and video assets used) archive.noagendanotes.com RSS Podcast Feed Full Summaries in PDF No Agenda Lite in opus format Last Modified 05/01/2025 16:55:14This page created with the FreedomController Last Modified 05/01/2025 16:55:14 by Freedom Controller

Security This Week
Android Spyware!

Security This Week

Play Episode Listen Later Apr 26, 2025 39:56


Android Spyware Disguised as Alpine Quest App Targets Russian Military Devices

Risky Business News
Risky Bulletin: Russian military personnel targeted with Android spyware

Risky Business News

Play Episode Listen Later Apr 23, 2025 6:09


Russian military personnel targeted with Android spyware, Trump defends Hegseth after second Signalgate scandal, CISA's Secure by Design leaders depart the agency, and forced-labour cyber scam compounds expand globally. Show notes

Ideas from CBC Radio (Highlights)
How spyware abusers can easily hack your phone and surveil you

Ideas from CBC Radio (Highlights)

Play Episode Listen Later Apr 15, 2025 54:08


We are all vulnerable to digital surveillance, as there's little protection to prevent our phones from getting hacked. Mercenary spyware products like Pegasus are powerful and sophisticated, marketed to government clients around the world. Cybersecurity expert Ron Deibert tells IDEAS, "the latest versions can be implanted on anyone's device anywhere in the world and as we speak, there is literally no defence against it.” Deibert is the founder of the Citizen Lab at the University of Toronto, a group of tech-savvy researchers who dig into the internet, looking for the bad actors in the marketplace for high-tech surveillance and disinformation. In his new book, Chasing Shadows, he shares notorious cases he and his colleagues have worked on and reveals the dark underworld of digital espionage and subversion.

Hank Watson's Garage Hour podcast
03.14.25: Bolts & Fasteners, Ammo & Peppers, NASCAR & Electrics, Teslas & Politics, Crazies & Customers, Re-Gippers & Pinkos, Tools & Leverages, Spyware & Static, Clocks & Waves, + the Visceral Satisfaction of Thunderbo

Hank Watson's Garage Hour podcast

Play Episode Listen Later Apr 15, 2025 59:50


With the throwback gratification of Failure's "Fantastic Planet" rolling throughout, the gearhead goons at the Garage Hour start out gritty with the bucket (or well-sorted trays) of backup bolts that every good geek has in the garadtch.  Note: if that pile of bolts (and rags, and parts, and tools) is getting dusty, you're not making enough - time to build, boys and girls.  There's also a look at the trannie nutjobs who are blowing up cars and dealerships, the politics of production (with perspectives from pinko China and politicized capitalism), and why race fans have very little interest in electric race cars (and still line up for vintage Trans Am, Thunderboats and NASCAR). Want more?  Miniaturized spyware in your USB cables from Tom's Hardware (and a look at when Western civilization figured out that SMALLER is more G-resistant), a retreat from cashless society in Europe, and the importance of protecting your data from the crazies, because they are what they do.

Hank Watson's Garage Hour podcast
03.14.25 (MP3): Bolts & Fasteners, Ammo & Peppers, NASCAR & Electrics, Teslas & Politics, Crazies & Customers, Re-Gippers & Pinkos, Tools & Leverages, Spyware & Static, Clocks & Waves, + the Visceral Satisfaction of Thu

Hank Watson's Garage Hour podcast

Play Episode Listen Later Apr 15, 2025 59:50


With the throwback gratification of Failure's "Fantastic Planet" rolling throughout, the gearhead goons at the Garage Hour start out gritty with the bucket (or well-sorted trays) of backup bolts that every good geek has in the garadtch.  Note: if that pile of bolts (and rags, and parts, and tools) is getting dusty, you're not making enough - time to build, boys and girls.  There's also a look at the trannie nutjobs who are blowing up cars and dealerships, the politics of production (with perspectives from pinko China and politicized capitalism), and why race fans have very little interest in electric race cars (and still line up for vintage Trans Am, Thunderboats and NASCAR). Want more?  Miniaturized spyware in your USB cables from Tom's Hardware (and a look at when Western civilization figured out that SMALLER is more G-resistant), a retreat from cashless society in Europe, and the importance of protecting your data from the crazies, because they are what they do.

Consumer Tech Update
How to scan your phone for spyware

Consumer Tech Update

Play Episode Listen Later Apr 11, 2025 10:29


Feel like someone knows everything about you? You could have a lurker on your phone.

The Daily Crunch – Spoken Edition
Governments identify dozens of Android apps bundled with spyware

The Daily Crunch – Spoken Edition

Play Episode Listen Later Apr 11, 2025 3:08


The advisories say the spyware apps are used to target members of civil society who may oppose China's state interests. Learn more about your ad choices. Visit podcastchoices.com/adchoices

על המשמעות
#714 עינת מירון - מומחית הסייבר מזהירה: "ישראל לא באמת מוגנת! התוקפים צעד לפנינו!"

על המשמעות

Play Episode Listen Later Apr 10, 2025 38:24


בפרק זה של הפודקאסט "על המשמעות" עו"ד תמיר דורטל מארח את עינת מירון, מומחית סייבר המסייעת לארגונים בהתמודדות עם מתקפות סייבר, לשיחה מרתקת ומטרידה על המציאות שמאחורי הכותרות הנוצצות של "מעצמת הסייבר".השיחה נפתחת בפרשת מוריה אשרף במשרד ראש הממשלה, כמקרה בוחן לכשלים פיזיים שעלולים להפוך בקלות לאירועי סייבר הרסניים, וממשיכה לצלול לעומקם של אירועי סייבר גדולים שהתרחשו בישראל ובעולם. עינת מירון מפרטת את ההשלכות הקשות של מתקפת הסייבר על בית החולים הילל יפה – השבתה של 54 ימים ועלות מוערכת של עשרות מיליוני שקלים למשלם המיסים – ומדגימה כיצד גם ארגונים גדולים ומתוקצבים, כמו חברת הביטוח שירביט (שנסגרה ונמכרה בסכום זעום בעקבות מתקפה) או תאגיד הענק כלורוקס, אינם חסינים.האם ישראל באמת "מעצמת סייבר" או שמא מדובר במיתוג מוצלח שמסתיר פערים מדאיגים בהגנה האמיתית על תשתיות וארגונים? מירון טוענת שהתוקפים, בין אם מדינתיים ובין אם פליליים, תמיד נמצאים צעד אחד לפנינו, מונעים ממוטיבציה גבוהה ופועלים ללא מגבלות, בעוד שהארגונים המותקפים כבולים ברגולציה שלעיתים אינה יעילה (כמו תקן ISO שלא תמיד מיושם כראוי) ובמגבלות תקציב ונהלים. היא אף מותחת ביקורת על מערך הסייבר הלאומי, שלטענתה אינו מסוגל לתת מענה אמיתי לכלל הארגונים במשק.מירון מספקת גם שורה של המלצות מעשיות וצעדים שכל אדם וכל ארגון, קטן כגדול, יכולים וצריכים לנקוט כדי להקשות על התוקפים ולצמצם נזקים פוטנציאליים, כולל חשיבותם של גיבויים (גם פיזיים!), החלפת סיסמאות, שימוש באימות דו-שלבי (2FA) והיערכות לתרחיש שבו המערכות הדיגיטליות פשוט קורסות.00:00:00-00:03:34 הקדמה ופתיחה: מוריה אסרף והחדירה למשרד ראש הממשלה00:03:34-00:06:50 מתקפת הסייבר על בית חולים הלל יפה והשלכותיה00:06:50-00:11:16 כשל בתקינה הבינלאומית ודוגמת חברת Clorox00:11:16-00:14:46 לינקדין כפלטפורמת תקיפה ופרשת פגסוס00:14:46-00:17:57 קשר בין שבת למערך הסייבר ופעילות האקרים00:17:57-00:21:30 ישראל ומעצמות סייבר - מציאות לעומת פוטנציאל00:21:30-00:25:27 הפרצות של חברות הייטק ופינטק ומתקפות סייבר יומיומיות00:25:27-00:29:31 מקרה שירביט והשלכותיו על עובדי מדינה ואנשי ביטחון00:29:31-00:33:18 סיכוני סייבר נלווים - דוגמת הקייטרינג בבית חולים מעייני הישועה00:33:18-00:41:05 תפקיד מערך הסייבר, נהלים לא יעילים והצורך בגיבויים פיזיים00:41:05-00:48:50 המלצות מעשיות לאבטחת מידע00:48:50-00:51:08 סיכום והמלצות נוספות להתנהלות נכונה בעולם הסייבר#פודקאסט #על_המשמעותSupport the show◀️ פרסמו אצלנו - לקבלת הצעת מחיר: פנו לג'ו - 054-236-0136 - https://wa.me/972542360136▶️

Cyber Security Headlines
New WhatsApp vulnerability, Microsoft patches 125 Windows Vulns, Fake Microsoft Office add-in tools push malware

Cyber Security Headlines

Play Episode Listen Later Apr 9, 2025 7:09


WhatsApp vulnerability could facilitate remote code execution Spyware targeting Chinese diaspora Microsoft Patches 125 Windows Vulns, Including Exploited CLFS Zero-Day Thanks to our episode sponsor, Nudge Security Nudge Security provides advanced security posture management for Okta, Microsoft 365, Google Workspace, and other critical apps. With Nudge, you'll be alerted of risks like weak or missing MFA, inactive admin accounts, and risky integrations, plus you can automate remediation tasks and on-going identity governance. Start a free 14-day trial today  

Irish Tech News Audio Articles
Surveillance: Now with Training Wheels

Irish Tech News Audio Articles

Play Episode Listen Later Apr 7, 2025 10:26


Military-grade spyware, once the province of shadowy intelligence outfits, is now being handed over to local police forces. As an Ontario resident, I find this deeply unsettling. These tools are powerful, precise, and built for a level of strategic nuance that most municipal sometimes even provincial police simply aren't equipped to handle. It's like handing a ten-year-old a scalpel and asking them to perform surgery. The intentions might be sincere, but the training, context, and oversight just aren't there. And that gap between tool and user is where things start to slip where privacy erodes, rights get sidelined, and the line between public safety and state overreach gets dangerously blurry. What Is Spyware and How Does It Work? At its core, spyware is software designed to secretly infiltrate and monitor digital devices usually without the knowledge or consent of the person being targeted. Once installed, it can track online activity, harvest sensitive information, and even take control of device functions like cameras and microphones. Military-grade spyware, like NSO Group's Pegasus or Paragon's Graphite, takes this to another level. These advanced tools can penetrate even the most secure devices, including phones protected by encrypted messaging apps like WhatsApp, iMessage, and Signal. Some spyware even uses "zero-click" exploits meaning the target doesn't need to click a suspicious link for their device to be compromised. This isn't just like wiretapping a phone call. Spyware can reveal a person's entire digital life recording private conversations, tracking real-time locations, logging browsing histories, and accessing stored files. For police, it's revolutionary. But for the rest of us? It's a chilling reminder that nothing is truly private anymore. Why Are Local Police Using Spyware? So, why are local police turning to such extreme surveillance measures? The short answer: encryption. As more people use encrypted communication platforms, traditional surveillance methods like wiretapping are becoming less effective. Criminal organizations, human traffickers, and other bad actors know how to hide their tracks using secure apps, creating a major challenge for law enforcement. Spyware gives police a way around these barriers by directly accessing the suspect's device and collecting evidence that would otherwise be out of reach. And there's public pressure, too. With high-profile crimes making headlines, law enforcement is under intense pressure to deliver fast results. Spyware, with its ability to gather and analyze large amounts of information in real time, can speed up investigations and improve the odds of making an arrest. In Canada, local police forces are increasingly adopting advanced surveillance technologies to stay ahead of tech-savvy criminals. But as these tools become more common, there's a growing concern: Who's watching the watchers? Ontario Police and "Graphite" Spyware Controversy A recent example that's sparked public debate is Ontario police's use of Graphite spyware. This highly advanced tool can bypass encrypted communications and operate without leaving a trace, meaning police can monitor individuals without them ever knowing. Police officials claim they only use Graphite in the most serious cases. But here's the catch there's little public information about how often it's used or what safeguards are in place. Without transparency, it's impossible to know whether police are sticking to serious crimes or deploying these powerful tools for more routine investigations. Civil liberties advocates are especially worried that spyware could be turned against people who challenge authority - journalists, political activists, or marginalized communities. And it's not just happening in Ontario. Across the globe, police forces are quietly adopting military-grade spyware, often without public input or clear legal oversight. RCMP's Use of Spyware It's not just local police getting in on the action. In 2022, the...

Modern Divorce - The Do-Over For A Better You
Spyware, Stalking & Custody Battles: The Dark Side of Tech

Modern Divorce - The Do-Over For A Better You

Play Episode Listen Later Apr 3, 2025 28:44


Send us a textIn this episode of The Modern Arizona Podcast, attorney Billie Tarascio sits down with Steven Bradley, a retired federal law enforcement investigator and safety and technology expert, to uncover how digital tools are being used to harass, stalk, and manipulate in family law cases.Drawing from decades of frontline experience, Steven explains how spyware, fake evidence, GPS tracking, voice cloning, and even children's devices are being weaponized in custody battles and abusive relationships and what families, attorneys, and judges need to do about it.Whether you're navigating a high-conflict divorce, co-parenting with someone abusive, or simply want to protect yourself and your children, this episode delivers practical, real-world strategies to stay informed and stay safe.In this episode, you'll learn:1. How abusers use everyday tech like Apple AirTags, Ring cameras, and spyware to control their partners2. The signs your phone may be cloned or tracked—and what to do next3. The truth about AI-manipulated evidence and how to fight false claims in court4. How tools like OFW help protect families by locking down communication5. Tips for parents: how to talk to kids about digital safety when you don't trust the other parentThis episode is a must-listen for anyone who cares about digital safety in family law—and a wake-up call for legal professionals who haven't kept up with how abuse has evolved.Where to Find Steven BradleyWebsite: www.ourfamilywizard.comLinkedIn: Steven BradleyEmail: Sbradley@ourfamilywizard.com#TechAbuse #DigitalSafety #OnlineHarassment #Cyberstalking #Spyware #AIManipulation #VoiceCloning #GPSTracking #ModernArizonaPodcast #FamilyLaw #Divorce #CustodyBattle #CoParenting #legalpodcast #ProtectYourKids #DomesticAbuseAwareness #FamilyCourt #LegalTech #LawAndTechnology

The Agenda with Steve Paikin (Audio)
Geoffrey Hinton: Will AI Save the World or End it?

The Agenda with Steve Paikin (Audio)

Play Episode Listen Later Apr 3, 2025 21:51


Geoffrey Hinton also known as the godfather of AI was recently awarded the Nobel Prize in Physics for his pioneering work in artificial intelligence. He joins host Steve Paikin for a wide-ranging discussion on his Nobel win, his departure from Google, the promise and perils of AI, and why he recently got under Elon Musk's skin. See omnystudio.com/listener for privacy information.

Uncommon Sense with Ginny Robinson

Today, I'm sharing something deeply personal and serious—my stalker story. For over a year, Timothy C. (we can share his full name soon if need be) has been physically stalking me, and his digital harassment goes back even further. Law enforcement is now involved, but I wanted to update you all in case anything happens to me—so there's no question about who did it. This episode isn't just about my experience; it's also about the reality of stalking, the dangers of obsession, and the importance of taking threats seriously. Stay aware, stay safe, and let's talk about it all, shall we?—https://noblegoldinvestments.com

fear mental health law trauma crime revenge threats empowerment tracking red flags selfhelp cybersecurity true crime social justice self awareness obsessive compulsive disorder lawsuit domestic violence case study hacking law enforcement toxic relationships human trafficking surveillance martial arts gaslighting stalker criminal justice self defense stalking harassment public safety cybercrime identity theft intimidation malware missing person cyberbullying justice system community support defamation true crime podcasts personality disorders blackmail court cases encryption emotional abuse risk assessment taser data protection crime scene emotional resilience media coverage extortion social engineering narcissistic abuse private investigators criminal justice reform personal freedom trauma recovery emergency preparedness background checks healing from trauma situational awareness cyber threats emergency response spyware mental resilience peeping toms revenge porn forensic science criminal charges post traumatic stress legal action restraining orders security policies whistleblowing home security data breaches surveillance state it security federal laws mental health resources digital literacy security cameras forensic psychology security breach psychological warfare doxxing victim blaming criminal defense internet safety threat intelligence personal boundaries pepper spray digital footprint police accountability crime prevention personal safety self protection neighborhood watch witness protection digital security public records news coverage ethical hacking crisis hotline cyber defense legal protection cyberstalking emotional manipulation digital rights threat assessment security tips online harassment public awareness emotional distress internet privacy personal security mobile security protective services gps tracking email security online fraud identity fraud crime scene investigations identity protection criminal behavior forensic investigations onlinepredators behavioral analysis victim support emotional recovery local law enforcement privacy settings detective work legal advocacy criminal profiling security awareness training aggressive behavior criminal intent crime reporting digital evidence protective gear police reports personal rights home protection personal defense social media monitoring relationship abuse victim advocacy whistleblower protection private browsing technology safety cyber investigations
Security Conversations
China exposing Taiwan hacks, Paragon spyware and WhatsApp exploits, CISA budget cuts

Security Conversations

Play Episode Listen Later Mar 21, 2025 116:22


Three Buddy Problem - Episode 39: Luta Security CEO Katie Moussouris joins the buddies to parse news around a coordinated Chinese exposure of Taiwan APT actors, CitizenLab's report on Paragon spyware and WhatsApp exploits, an “official” Russian government exploit-buying operation shopping for Telegram exploits, the fragmentation of exploit markets and the future of CISA in the face of budget cuts and layoffs. Cast: Katie Moussouris (https://lutasecurity.com), Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).

Bitcoin, Blockchain, and the Technologies of Our Future
How To DE-GOOGLE Your Phone! (2025)

Bitcoin, Blockchain, and the Technologies of Our Future

Play Episode Listen Later Mar 21, 2025 25:57


https://youtu.be/Zo9qHqTDcgMhttps://odysee.com/@NaomiBrockwell:4/Graphene-Install:eYour phone is a tracking device. But it doesn't have to be.One of the best ways to reclaim your privacy is to ditch iOS and stock Android and install GrapheneOS instead.This guide is a step-by-step tutorial on converting a Pixel phone to GrapheneOS, tweaking key settings for maximum privacy, and installing apps—including how to handle Google Play Services after setup. If you want to eliminate as much of Google as possible from your device but still need certain apps that require Google Play Services, we'll show you how to use it in a more privacy-preserving way.I'll walk you through how I set up my GrapheneOS device so you can see what's possible. But this is just one way to do it—if you have your own setup, share your tips in the comments!00:00 Spyware is all over our smartphones01:47 Hardware03:03 Purchase05:13 Installation10:24 Setup13:33 App Stores19:32 Secondary Profiles23:46 Your Phone, Your RulesAs difficult as it may seem, it's actually not that difficult to enjoy all the benefits of a smartphone without compromising your privacy. Remember, privacy isn't about going off grid; it's about making informed choices; and with GrapheneOS, you're taking control of your device, your data, and your digital freedom.Our full phone privacy series:https://youtube.com/playlist?list=PLt3zZ-N423gXV-0pdxnRn-nw0WzVKh4NY&si=VZbMAB50C2-NAOAMNBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Brought to you by NBTV team members: Reuben Yap, Lee Rennie, Cube Boy, Will Sandoval and Naomi BrockwellVisit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show

The Daily Crunch – Spoken Edition
Researchers name several countries as potential Paragon spyware customers

The Daily Crunch – Spoken Edition

Play Episode Listen Later Mar 20, 2025 6:58


The Citizen Lab said it believes several governments may be customers of spyware maker Paragon Solutions. Learn more about your ad choices. Visit podcastchoices.com/adchoices

The Daily Crunch – Spoken Edition
North Korean government hackers snuck spyware on Android app store

The Daily Crunch – Spoken Edition

Play Episode Listen Later Mar 14, 2025 4:35


Cybersecurity firm Lookout found several samples of a North Korean spyware it calls KoSpy. Learn more about your ad choices. Visit podcastchoices.com/adchoices

PRI: Science, Tech & Environment
WhatsApp identifies dozens of users hacked by Paragon spyware company

PRI: Science, Tech & Environment

Play Episode Listen Later Feb 6, 2025


WhatsApp, used by millions of people around the world, says its users were hacked by the Paragon Solutions spyware company. The World's Host Marco Werman speaks with John Scott-Railton, a senior researcher at Citizen Lab, about the continuing threat of sophisticated spyware. The post WhatsApp identifies dozens of users hacked by Paragon spyware company appeared first on The World from PRX.

Placing You First Insurance Podcast by CRC Group
Cyber Insurance Remains Critical as Ransomware Attacks Rise

Placing You First Insurance Podcast by CRC Group

Play Episode Listen Later Feb 6, 2025 30:25 Transcription Available


Learn more about navigating cyber threats and insurance with insights from Hunter Maskell, a Director with the CRC / INSUREtrust Cyber Practice Group and Professional Lines Broker Chris Zepeda. Ransomware attacks are making a sophisticated resurgence, matching the concerning levels of 2020 and 2021. Despite strides in incident response, the financial strain from business interruptions and legal battles lingers. While current market conditions may seem buyer-friendly, the looming specter of increasing claims warns of impending premium adjustments. Listen as we dissect the delicate balance between competitive pricing and sustainable risk management, ensuring you're prepared for the challenges ahead. The landscape of cyber insurance is ever-shifting, and understanding coverage nuances with the help of specialists is crucial. This episode is your guide to staying ahead in an era where cyber risks and solutions constantly evolve. Visit REDYIndex.com for critical pricing analysis and a snapshot of the marketplace. Do you want to take your career to the next level? Join #TeamCRC to get access to best-in-class tools, data, exclusive programs, and more! Send your resume to resumes@crcgroup.com today!

Risky Business
Risky Business #778 -- Musk's child soldiers seize control of FedGov IT systems

Risky Business

Play Episode Listen Later Feb 5, 2025 56:28


On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: DeepSeek leaves an unauthed database on the internet Russia hacked UK prime minister's personal mail Australia sanctions a Telegram group… which is more sensible than it sounds Medical device backdoor turns out to be just poorly thought out upgrade feature Google abuses weak hashing to patch AMD CPU microcode And much, much more. This week's episode is sponsored by email security boffins Sublime. Their co-founder and CEO Josh Kamdjou joins to talk about how attackers' abuse of legitimate services like Docusign is a challenge for email security vendors. This episode is also available on Youtube. Show notes Exclusive: Musk aides lock workers out of OPM computer systems | Reuters Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information, Including Chat History | Wiz Blog Криптостилер SparkCat в магазинах Google Play и App Store | Securelist Russian hackers suspected of compromising British PM's personal email account | The Record from Recorded Future News PowerSchool hack: missed basic security step resulted in data breach Australia sanctions ‘Terrorgram' white supremacist online group | The Record from Recorded Future News ‘Paid actors' could be behind some antisemitic attacks, Albanese says | Australian security and counter-terrorism | The Guardian Interview with James Glenday, ABC News Breakfast | Australian Minister for Foreign Affairs WhatsApp says spyware company Paragon Solutions targeted journalists Spyware maker Paragon confirms US government is a customer | TechCrunch Former Polish justice minister arrested in sprawling spyware probe | The Record from Recorded Future News Sweden releases suspected ship, says cable break ‘clearly' not sabotage | The Record from Recorded Future News Backdoor found in two healthcare patient monitors, linked to IP in China Attackers exploit zero-day vulnerability in Zyxel CPE devices | Cybersecurity Dive AMD: Microcode Signature Verification Vulnerability · Advisory · google/security-research · GitHub 22-year-old math wiz indicted for alleged DeFI hack that stole $65M - Ars Technica A method to assess 'forgivable' vs 'unforgivable'... - NCSC.GOV.UK Living Off the Land: Credential Phishing via Docusign abuse Living Off the Land: Callback Phishing via Docusign comment B2B freight-forwarding scams on the rise to evade financial fraud crackdowns Callback phishing via invoice abuse and distribution list relays Enhanced message groups: Improving efficiency in email incident response

SpyTalk
A “Bonanza" of Spyware Abuses

SpyTalk

Play Episode Listen Later Jan 31, 2025 49:45


Ronald Deibert of Citizen Lab tells host Michael Isikoff how his research firm has uncovered the shocking abuse of commercial spyware by foreign governments and spy agencies around the world, resulting in a proliferation of "Watergate-like” scandals.Follow our guest:Ron Deiberthttps://x.com/RonDeibertChasing Shadowshttps://www.simonandschuster.ca/books/Chasing-Shadows/The Citizen Labhttps://citizenlab.ca/https://x.com/citizenlab Follow Jeff Stein on Twitter:https://twitter.com/SpyTalkerFollow Michael Isikoff on Twitter:https://twitter.com/isikoff Follow SpyTalk on Twitter:https://twitter.com/talk_spySubscribe to SpyTalk on Substackhttps://www.spytalk.co/Take our listener survey where you can give us feedback.http://survey.podtrac.com/start-survey.aspx?pubid=BffJOlI7qQcF&ver=short

Awakening
Art Boker Reveals Cyber Security Secrets to Protect Your Online Life

Awakening

Play Episode Listen Later Jan 12, 2025 60:10


Art is cybercrime expert with almost 40 years of experience in law enforcement and corrections. About my Guest Art Boker: Art is cybercrime expert with almost 40 years of experience in law enforcement and corrections. He has been recognized with top awards for his work in promoting cybercrime awareness and control tools within community corrections, including honors from the American Probation and Parole Association and the Federal Probation and Pretrial Officers Association. In 2016, he received the High Technology Crime Investigators Association (HTCIA) Lifetime Achievement Award, underscoring his contributions to the field. Art is a lifetime member of HTCIA and former International President. He is the author of The Cybercrime Handbook for Community Corrections: Managing Offender Risk in the 21st Century and coauthored with Todd Shipley Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace. His and Todd's second upcoming book Surviving a Cyberattack: Securing Social Media and Protecting Your Home Network, is set for release this fall. --- Help Support the show through my Business Partners :    Find Virtual Assistants at https://va.world/   Upgrade Your Brain    Unleash & Use Your Uniqueness   https://braingym.fitness/⁠    -------------------------- Awakening Podcast Social Media / Coaching My Other Podcasts    ⁠⁠⁠https://roycoughlan.com/⁠⁠   Health & Wellness Products   https://partnerco.world/   My Website https://partner.co/?custid=N6543249    ------------------ What we Discussed:   - How he got into Cyber Crime ( 2 mins) - The elderly are attacked more often ( 7 mins) - Criminal Organisations involved in the Scams (8:30 mins) - Using fake Voices (11:45 mins) - The danger of Ai and having a passphrase (14 mins) - Tech fraud scams (17 mins) - How I fell for a fraud and Remittle not worth using ( 21:45 mins) - How to Stop the Scammers (23:45 mins) - Should you have a password manager on the cloud (28:45 mins) - People threating you pretending they know what you are doing on your computer (32 mins) - Targetting Minors (33 mins) - How do we protect the kids (36 mins) - Fake news online ( 40 mins) - Getting your phone hacked ( 42 mins) - Spyware software are they dangerous (46 mins) - What happens to the scammers that are caught ( 49 mins) - Are VPN's traceable (51 mins) - How to protect your blockchain (54:45 mins) - Digital Assets will's (57 mins)   How to Contact Art Boker :   https://thecybersafetyguys.blog/   https://twitter.com/Computerpo https://www.instagram.com/computerpo/ https://www.facebook.com/groups/Cybersafetyguys https://www.linkedin.com/in/artbowker ------------------------------ More about the Awakening Podcast: All Episodes can be found at www.awakeningpodcast.org     Help Support the show through my Business Partners :   Upgrade Your Brain    Unleash & Use Your Uniqueness   https://braingym.fitness/⁠    -------------------------- Awakening Podcast Social Media / Coaching My Other Podcasts    ⁠⁠⁠https://roycoughlan.com/⁠⁠   Health & Wellness Products   https://partnerco.world/   My Website https://partner.co/?custid=N6543249   Our Facebook Group can be found at https://www.facebook.com/royawakening  

The Crypto Podcast
Art Boker Reveals Cyber Security Secrets to Protect Your Online Life

The Crypto Podcast

Play Episode Listen Later Jan 12, 2025 60:10


Art is cybercrime expert with almost 40 years of experience in law enforcement and corrections. About my Guest Art Boker: Art is cybercrime expert with almost 40 years of experience in law enforcement and corrections. He has been recognized with top awards for his work in promoting cybercrime awareness and control tools within community corrections, including honors from the American Probation and Parole Association and the Federal Probation and Pretrial Officers Association. In 2016, he received the High Technology Crime Investigators Association (HTCIA) Lifetime Achievement Award, underscoring his contributions to the field. Art is a lifetime member of HTCIA and former International President. He is the author of TheCybercrime Handbook for Community Corrections: Managing Offender Risk in the 21st Century and coauthored with Todd Shipley Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace. His and Todd's second upcoming book Surviving a Cyberattack: Securing Social Media and Protecting Your Home Network, is set for release this fall. ---Help Support the show through my Business Partners :  Find Virtual Assistants at https://va.world/ Upgrade Your Brain  Unleash & Use Your Uniqueness  https://braingym.fitness/⁠  --------------------------Awakening Podcast Social Media / Coaching My Other Podcasts  ⁠⁠⁠https://roycoughlan.com/⁠⁠ Health & Wellness Products https://partnerco.world/ My Website https://partner.co/?custid=N6543249  ------------------What we Discussed: - How he got into Cyber Crime ( 2 mins) - The elderly are attacked more often ( 7 mins) - Criminal Organisations involved in the Scams (8:30 mins) - Using fake Voices (11:45 mins) - The danger of Ai and having a passphrase (14 mins) - Tech fraud scams (17 mins) - How I fell for a fraud and Remittle not worth using ( 21:45 mins) - How to Stop the Scammers (23:45 mins) - Should you have a password manager on the cloud (28:45 mins) - People threating you pretending they know what you are doing on your computer (32 mins) - Targetting Minors (33 mins) - How do we protect the kids (36 mins) - Fake news online ( 40 mins) - Getting your phone hacked ( 42 mins) - Spyware software are they dangerous (46 mins) - What happens to the scammers that are caught ( 49 mins) - Are VPN's traceable (51 mins) - How to protect your blockchain (54:45 mins) - Digital Assets will's (57 mins) How to Contact Art Boker : https://thecybersafetyguys.blog/ https://twitter.com/Computerpo https://www.instagram.com/computerpo/ https://www.facebook.com/groups/Cybersafetyguys https://www.linkedin.com/in/artbowker ------------------------------More about the Awakening Podcast:All Episodes can be found at www.awakeningpodcast.org  Help Support the show through my Business Partners : Upgrade Your Brain  Unleash & Use Your Uniqueness  https://braingym.fitness/⁠  --------------------------Awakening Podcast Social Media / Coaching My Other Podcasts  ⁠⁠⁠https://roycoughlan.com/⁠⁠ Health & Wellness Products https://partnerco.world/ My Website https://partner.co/?custid=N6543249 Our Facebook Group can be found at https://www.facebook.com/royawakening

The CyberWire
Court puts the ‘spy' in spyware.

The CyberWire

Play Episode Listen Later Dec 23, 2024 36:28


A federal judge finds NSO Group liable for hacking WhatsApp. China accuses the U.S. government of cyberattacks. The UK's Operation Destabilise uncovers a vast criminal network. An alleged LockBit developer says he did it for the money. Apache releases a security update for their Tomcat web server. Siemens issues a security advisory for their User Management Component. Italy's data protection authority fines OpenAI $15.6 million. Researchers demonstrate a method to bypass the latest Wi-Fi security protocol. Apple sends potential spyware victims to a nonprofit for help. Our guest is Sven Krasser, CrowdStrike's Senior Vice President Data Science and Chief Scientist, talking about balancing AI and human intervention. Hackers supersize their McDonald's delivery orders.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today, our guest is Sven Krasser, CrowdStrike's Senior Vice President Data Science and Chief Scientist, talking about balancing AI and human intervention. Selected Reading Judge rules NSO Group is liable for spyware hacks targeting 1,400 WhatsApp user devices (Recorded Future) Chinese cyber center points finger at U.S. over alleged cyberattacks to steal trade secrets (CyberScoop) Inside Operation Destabilise: How a ransomware investigation linked Russian money laundering and street-level drug dealing (Recorded Future) Suspected LockBit dev faces extradition to the US (The Register) Apache fixes remote code execution bypass in Tomcat web server (Bleeping Computer) Siemens Warn of Critical Vulnerability in UMC (GovInfoSecurity) Italy's Privacy Watchdog Fines OpenAI for ChatGPT's Violations in Collecting Users Personal Data (SecurityWeek) WPA3 Network Password Bypassed via MITM Attack & Social Engineering (CyberSecurityNews.com) Apple Warns Users Of iPhone Spyware Attacks—What You Need To Know (Forbes) McDonald's Delivery App Vulnerability Let Anyone Place an Order for Just $0.01 (CyberSecurityNews.com) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Without A Country
256: Luigi Mangione & Spyware Hacking Our Phones!

Without A Country

Play Episode Listen Later Dec 13, 2024 147:38


Corinne Fisher talks about the new Max documentary "Surveilled" and how it pertains to this weeks enemy of the state, Pegasus, and their spyware efforts that hacked a ton of phones, the arrest of Luigi Mangione in connection with the assassination of Brian Thompson, Trump getting named Time's person of the year for the second time, a look at the viral documentary chronicling Lily Philips quest to sleep with 100 men in a day and her plans to eclipse that 10 fold, a look at the litany of new laws proposed to prevent puberty blockers for Trans teens and so much more!Original Air Date: 12/10/24You can watch Without A Country LIVE every Wednesday at 9PM on our YouTube Channel at https://www.youtube.com/channel/UCjP3oJVS_BEgGXOPcVzlpVw!**PLEASE SUBSCRIBE, RATE & REVIEW ON iTUNES & SUBSCRIBE TO OUR YOUTUBE CHANNEL**Link To The Brand New Patreon!https://patreon.com/WithoutACountry?utm_medium=unknown&utm_source=join_link&utm_campaign=creatorshare_creator&utm_content=copyLinkThis week Corinne takes a look at convictions being overturned for people who purchased crack that was manufactured by police in Florida to arrest drug users. WHERE YOU CAN ANNOY US:Corinne Fisher:Twitter: https://twitter.com/PhilanthropyGalInstagram: https://www.instagram.com/philanthropygalExecutive Producer: Mike HarringtonInstagram: https://www.instagram.com/themharrington/Twitter: https://twitter.com/TheMHarringtonTheme Song By Free VicesWebsite https://www.freevices.com/Apple Music https://music.apple.com/us/artist/free-vices/1475846774Spotify https://open.spotify.com/artist/3fUw9W8zIj6RbibZN2b3kP?si=N8KzuFkvQXSnaejeDqVpIg&nd=1&dlsi=533dddc8672f46f0SoundCloud https://on.soundcloud.com/5sceVeUFADVBJr4P7YouTube https://youtube.com/channel/UCOsgEoQ2-czvD8eWctnxAAw?si=SL1RULNWVuJb8AONInstagram http://instagram.com/free_vicesENEMY OF THE STATE: Pegasus-DOC REC: SURVEILLED (HBO)https://www.democracynow.org/2024/12/4/surveilled_documentaryPegasus Spyware: https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phonesGUUURLTime's Person of the Yearhttps://www.thedailybeast.com/time-hit-by-stunning-leak-as-report-outs-person-of-the-year-a-day-early/POLICE STATEhttps://www.motherjones.com/politics/2024/12/biden-trump-federal-power-police-state/[GIRL DAD CORNER]LILY PHILLIPShttps://nypost.com/2024/12/11/lifestyle/onlyfans-model-lily-phillips-cries-after-sleeping-with-101-men-in-a-day/Trans MinorsUK: https://www.nbcnews.com/nbc-out/out-politics-and-policy/britain-bans-puberty-blockers-transgender-minors-rcna183839USA: https://newsroom.ucla.edu/stories/does-constitution-allow-states-to-deny-care-to-transgender-youthhttps://www.sacbee.com/opinion/article296889354.htmlEric Adams & Solitary Confinement https://www.nytimes.com/2024/12/09/nyregion/solitary-confinement-nyc-adams.htmlCOULD BE WORSE: ASSADhttps://www.cnn.com/2024/12/10/middleeast/syria-saydnaya-prison-missing-intl-hnk/index.htmlMAIN STORY: Luigi MangioneBrian Thompson more info: https://www.dailymail.co.uk/news/article-14161297/brian-thompson-unitedhealthcare-ceo-marriage-secrets-revealed-wife.htmlWHY MANGIONE DID IT: https://www.nytimes.com/2024/12/11/nyregion/luigi-mangione-assassination-plan-notebook.html?campaign_id=190&emc=edit_ufn_20241211&instance_id=141940&nl=from-the-times®i_id=107728112&segment_id=185442&user_id=a266d281cc6f97833a8eaaec22a85914COULDN'T FUCKhttps://www.newsweek.com/luigi-mangione-friend-phycial-intimacy-back-pain-united-healthcare-shooting-brian-thompson-1999012BIPARTISAN APPROVAL, COULD WE HAVE JURY NULLIFICATION???https://en.wikipedia.org/wiki/Jury_nullificationSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.