DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Security Unlocked explores the technology and people powering Microsoft's Security solutions. In each episode, Microsoft Security evangelists Nic Fillingham and Natalia Godyla take a closer look at the latest innovations in threat intelligence, security research, and data science, with a special focus on demystifying artificial intelligence and machine learning. Be sure to listen in and follow us! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
CSIAC's Mission Mission Statement CSIAC is chartered to leverage the best practices and expertise from government, industry, and academia in order to promote technology domain awareness and solve the most critically challenging scientific and technical problems in the following areas: Cybersecurity and Information Assurance, Software Engineering, Modeling and Simulation, and Knowledge Management/Information Sharing.
…
continue reading

1
JINX-0132: How Cryptojackers Hijacked DevOps Infrastructure via Nomad and Docker
1:07:22
1:07:22
Play later
Play later
Lists
Like
Liked
1:07:22In this episode, we dissect the JINX-0132 cryptojacking campaign — a real-world example of how threat actors are exploiting cloud and DevOps environments to mine cryptocurrency at scale. We unpack how cybercriminals targeted misconfigured Docker APIs, publicly exposed HashiCorp Nomad and Consul servers, and vulnerable Gitea instances — turning ente…
…
continue reading

1
Chrome Under Fire: Three Zero-Days, One Month, and Nation-State Exploits
28:23
28:23
Play later
Play later
Lists
Like
Liked
28:23In this episode, we dive deep into three actively exploited zero-day vulnerabilities discovered in Google Chrome in 2025, each of which was patched in rapid succession following targeted attacks. At the center is CVE-2025-5419, a high-severity out-of-bounds read/write flaw in the V8 JavaScript engine that allows attackers to exploit heap corruption…
…
continue reading

1
Australia Forces Transparency: The World’s First Mandatory Ransomware Payment Reporting Law
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01Australia just made cyber history. On May 30, 2025, the nation became the first in the world to enforce mandatory ransomware payment reporting under the newly enacted Cyber Security Act 2024. In this episode, we dissect what this means for businesses, law enforcement, and the global cybersecurity landscape. We break down the key aspects of the legi…
…
continue reading

1
$25M for AI Email Security: Trustifi’s Big Bet on the MSP Market
32:00
32:00
Play later
Play later
Lists
Like
Liked
32:00In this episode, we dive into Trustifi’s recent $25 million Series A funding round, led by growth equity firm Camber Partners. Specializing in AI-powered email security, Trustifi has now raised a total of $29 million to accelerate its product development, go-to-market strategy, and global marketing initiatives—especially in the MSP space. We unpack…
…
continue reading

1
Google Chrome vs. Failing CAs: The Policy Behind the Distrust
55:25
55:25
Play later
Play later
Lists
Like
Liked
55:25In this episode, we dissect Google's recent and upcoming decisions to distrust several Certificate Authorities (CAs) within the Chrome Root Store, including Entrust, Chunghwa Telecom, and Netlock. These high-impact moves are rooted in Chrome's strict enforcement of compliance, transparency, and security standards for public trust. We explore the ro…
…
continue reading

1
CVE-2025-48827 & 48828: How vBulletin’s API and Template Engine Got Weaponized
1:35:55
1:35:55
Play later
Play later
Lists
Like
Liked
1:35:55Two critical, actively exploited vulnerabilities in vBulletin forum software—CVE-2025-48827 and CVE-2025-48828—have put thousands of websites at immediate risk of full system compromise. In this episode, we dissect how these flaws, triggered by insecure usage of PHP’s Reflection API and abuse of vBulletin’s template engine, allow unauthenticated at…
…
continue reading

1
Password Hashes Leaked via Linux Crash Handlers: The Truth Behind CVE-2025-5054 & 4598
16:11
16:11
Play later
Play later
Lists
Like
Liked
16:11In this episode, we unpack two newly disclosed Linux vulnerabilities—CVE-2025-5054 and CVE-2025-4598—discovered by the Qualys Threat Research Unit (TRU). These race condition flaws impact Ubuntu’s apport and Red Hat/Fedora’s systemd-coredump, exposing a little-known but critical attack vector: core dumps from crashed SUID programs. We dive into how…
…
continue reading

1
Multi-Stage Phishing Attacks Now Use Google Infrastructure—Here’s How
13:51
13:51
Play later
Play later
Lists
Like
Liked
13:51Recent phishing campaigns have entered a new phase—one where trust is weaponized. In this episode, we break down how cybercriminals are exploiting legitimate services like Google Apps Script and Google Firebase Storage to host phishing pages, evade detection, and steal credentials. Using cleverly crafted lures such as fake DocuSign notifications, i…
…
continue reading

1
Inside the AVCheck Takedown: How Law Enforcement Disrupted a Key Cybercrime Tool
17:34
17:34
Play later
Play later
Lists
Like
Liked
17:34In this episode, we unpack the international takedown of AVCheck, one of the largest counter antivirus (CAV) services used by cybercriminals to test and fine-tune malware before deployment. Led by Dutch authorities and supported by agencies from the U.S., Germany, France, and others, this operation marks a major win in Operation Endgame—a sweeping …
…
continue reading

1
ConnectWise Breach: Nation-State Exploits CVE-2025-3935 in ScreenConnect
15:06
15:06
Play later
Play later
Lists
Like
Liked
15:06ConnectWise has confirmed a cyberattack targeting ScreenConnect, its remote access solution used by thousands of Managed Service Providers (MSPs). The breach is reportedly tied to a sophisticated nation-state actor and linked to CVE-2025-3935, a critical ViewState code injection vulnerability that could allow Remote Code Execution (RCE). In this ep…
…
continue reading

1
Browser vs. GPU: Firefox 139 Collides with NVIDIA Drivers
14:10
14:10
Play later
Play later
Lists
Like
Liked
14:10In this episode, we dive into the graphical corruption saga triggered by Firefox version 139, released on May 27, 2025. Aimed at uncovering what went wrong, we review reports from across the web detailing how the update wreaked havoc for Windows users running NVIDIA graphics cards—particularly those with multi-monitor setups using mixed refresh rat…
…
continue reading

1
Unbound Raises $4M to Secure Generative AI in the Enterprise
20:08
20:08
Play later
Play later
Lists
Like
Liked
20:08In this episode, we break down the recent $4 million seed funding round for Unbound, a startup tackling one of the biggest unsolved problems in enterprise AI: how to stop employees from leaking sensitive data through ungoverned use of Generative AI tools. Unbound’s AI Gateway aims to be the missing link between rapid AI adoption and responsible usa…
…
continue reading

1
Windows Updates, Reimagined: Inside Microsoft’s Unified Orchestration Push
16:18
16:18
Play later
Play later
Lists
Like
Liked
16:18Microsoft is taking direct aim at one of the biggest pain points in the Windows ecosystem: update fragmentation. In this episode, we dive deep into the details of Microsoft’s newly announced Windows-native update orchestration platform, currently in private preview. We explore how this unified infrastructure aims to centralize updates for all apps,…
…
continue reading

1
Systemd as a Weapon: How PumaBot Exploits Linux Persistence
18:38
18:38
Play later
Play later
Lists
Like
Liked
18:38Linux systems are under siege—particularly in the world of IoT and internet-exposed servers. In this episode, we dissect PumaBot, a new GoLang-based botnet that's turning Linux IoT devices into cryptomining workhorses. We’ll break down how attackers brute-force SSH credentials, install malware disguised as legitimate services, and use systemd for s…
…
continue reading

1
The LexisNexis Breach: 364,000 Records Exposed via GitHub
17:22
17:22
Play later
Play later
Lists
Like
Liked
17:22On December 25, 2024, while most businesses were offline, a serious data breach struck LexisNexis Risk Solutions—exposing the personal data of over 360,000 individuals. The twist? The attack vector wasn’t a direct hack, but an indirect compromise through a third-party GitHub repository. Even more concerning, the breach went undetected until April 1…
…
continue reading

1
Ransomware Hits MathWorks: Week-Long Outage Disrupts Millions
12:30
12:30
Play later
Play later
Lists
Like
Liked
12:30On this episode, we dissect the ransomware attack that brought MathWorks—a cornerstone software provider for engineers, scientists, and educators—to a grinding halt. The attack, which began on May 18, 2025, and was officially confirmed on May 26, crippled a wide range of customer-facing and internal systems, from MATLAB Online and ThingSpeak to lic…
…
continue reading

1
Zscaler Acquires Red Canary: What It Means for AI-Powered Security Operations
14:27
14:27
Play later
Play later
Lists
Like
Liked
14:27The cybersecurity market is booming, projected to triple in size from $215 billion in 2025 to $697 billion by 2035. This explosive growth is being fueled by rising cyber threats, the digital transformation of global businesses, and an urgent need for advanced security operations. One of the clearest signals of this momentum? Zscaler’s acquisition o…
…
continue reading

1
DragonForce Breaches MSPs via SimpleHelp Flaws: Inside CVE-2024-57726
16:47
16:47
Play later
Play later
Lists
Like
Liked
16:47In this episode, we unpack a critical supply chain breach that’s rattled the cybersecurity world: the exploitation of multiple zero-day vulnerabilities in SimpleHelp Remote Support Software — most notably CVE-2024-57726, a privilege escalation flaw scored 9.9 by the NVD. Threat actors linked to the DragonForce ransomware operation and the Scattered…
…
continue reading

1
Protecting AI at the Edge with David Weston
38:36
38:36
Play later
Play later
Lists
Like
Liked
38:36In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share David Weston’s keynote from BlueHat India 2025. David explores the growing role of on-device AI in Windows, the security risks it introduces, and how Microsoft is rethinking architecture to defend against new threats like model tampering, data exfiltration, and AI-po…
…
continue reading

1
Fentanyl, Firearms, and $200M in Crypto: Dark Web Crime Meets Global Law Enforcement
13:50
13:50
Play later
Play later
Lists
Like
Liked
13:50This episode dives deep into Operation RapTor, one of the largest international crackdowns on dark web crime to date. We analyze how coordinated law enforcement actions across ten countries led to the arrest of 270 individuals, the seizure of $200 million in currency and digital assets, and the dismantling of major darknet marketplaces including In…
…
continue reading

1
Marlboro-Chesterfield Pathology Ransomware Breach: 235,000 Patients Affected
12:27
12:27
Play later
Play later
Lists
Like
Liked
12:27In this episode, we take a deep dive into the recent Marlboro-Chesterfield Pathology (MCP) ransomware attack—one of the most significant healthcare breaches of 2025. On January 16th, MCP detected unauthorized activity on its internal systems. Just days later, the SAFEPAY ransomware group claimed responsibility, posting stolen data—over 30GB of sens…
…
continue reading

1
How Infostealers Like Stealc Use TikTok Accounts to Exfiltrate Stolen Data
22:54
22:54
Play later
Play later
Lists
Like
Liked
22:54In this episode, we dive deep into the underground cybercrime ecosystem powering the surge of modern infostealers—Stealc, Vidar, and LummaC2. These malware strains aren't just code—they're full-service products sold as Malware-as-a-Service (MaaS), giving even low-skilled attackers access to powerful data theft tools. We break down how these stealer…
…
continue reading

1
The Great Screenshot Scandal: Microsoft Recall and Signal’s DRM Shield
28:34
28:34
Play later
Play later
Lists
Like
Liked
28:34In this episode, we dive deep into the growing tension between AI innovation and data privacy through the lens of a major controversy: Microsoft’s Windows 11 Recall feature. Designed to screenshot nearly everything a user does every few seconds, Recall creates a searchable visual archive of on-screen activity. But while Microsoft claims it enhances…
…
continue reading

1
Bumblebee Malware Returns: IT Pros Targeted Through SEO Poisoning and Typosquatting
28:48
28:48
Play later
Play later
Lists
Like
Liked
28:48In this episode, we break down the resurgence of the Bumblebee malware loader and its latest distribution method: blackhat SEO campaigns and trojanized software installers. By mimicking legitimate download pages through typosquatted domains and poisoning Bing search results, attackers are tricking IT professionals into unknowingly infecting their o…
…
continue reading

1
FBI Warns of Luna Moth Tactics: Inside the Silent Ransom Group’s Law Firm Attacks
14:45
14:45
Play later
Play later
Lists
Like
Liked
14:45In this episode, we dive into the evolving tactics of the Silent Ransom Group (SRG)—also known as Luna Moth—a cybercriminal outfit that has shifted from traditional phishing to a new, more deceptive strategy: impersonating IT support over the phone. Their latest victims? U.S. law firms, targeted for the sensitive data they hold and the large financ…
…
continue reading

1
Trust Exploited: Unpacking the macOS Malware Attacking Ledger Wallets
25:57
25:57
Play later
Play later
Lists
Like
Liked
25:57A growing cyber threat is targeting macOS users who rely on Ledger cold wallets to secure their cryptocurrency. In this episode, we dissect the anti-Ledger malware campaign—an increasingly sophisticated phishing operation that impersonates the trusted Ledger Live application to trick users into revealing their 24-word recovery phrases. Once entered…
…
continue reading

1
$21M Seized and DanaBot, Qakbot, and Bumblebee Disrupted in Operation Endgame Takedown
11:23
11:23
Play later
Play later
Lists
Like
Liked
11:23In this episode, we break down the latest and most impactful phase of Operation Endgame, the international law enforcement campaign targeting the backbone of the ransomware ecosystem. Between May 19–22, authorities executed a sweeping takedown of 300 servers, neutralized 650 domains, and seized €3.5 million in cryptocurrency, adding to a total of €…
…
continue reading

1
From TikTok to Total Compromise: The Rise of Social Media Infostealers
18:50
18:50
Play later
Play later
Lists
Like
Liked
18:50In this episode, we dive into the alarming surge of infostealer malware campaigns leveraging social media platforms, particularly TikTok, as their distribution vector. Threat actors are exploiting trending content—especially around AI tools like Sora, ChatGPT, and Google Gemini AI, and popular software like CapCut and MidJourney—to bait unsuspectin…
…
continue reading

1
Kettering Health Breached: What the Interlock Ransomware Group Did and Why It Matters
23:33
23:33
Play later
Play later
Lists
Like
Liked
23:33In this episode, we dive into the ransomware attack that struck Kettering Health, a major healthcare provider, and the evolving tactics of the Interlock ransomware group behind it. Interlock, active since late 2024, has adopted advanced techniques including double extortion, credential theft, and PowerShell-based backdoors to compromise healthcare …
…
continue reading

1
Deepfake Threats, Mobile Biometrics, and the Future of Trust
17:01
17:01
Play later
Play later
Lists
Like
Liked
17:01As digital deception evolves, so must our defenses. In this episode, we dive deep into the escalating battle for trust in our increasingly connected world. From nation-state-level authentication models to real-time behavioral biometrics on your mobile device, the tools to verify identity are becoming more sophisticated—and more essential—than ever.…
…
continue reading

1
119,000 ICS Devices Exposed: The Internet’s Hidden Infrastructure Risk
20:00
20:00
Play later
Play later
Lists
Like
Liked
20:00In this episode, we dive into a growing cybersecurity crisis: the exposure of Industrial Control Systems (ICS) on the public internet. These systems power our electric grids, water supplies, and industrial automation—but thousands are reachable online, often unsecured. We explore how researchers are working to distinguish between real ICS devices a…
…
continue reading

1
#75 - The Dark Side of AI: When will Autonomous AI Cyber Weapons Begin?
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02AI is changing security fast—hear how Deep Sentinel stops crime in real time and why AI scams are the next big threat. Must-listen for staying ahead! With DeepSentinel CEO and AI expert Dave Selinger.By Extra Something Media
…
continue reading

1
Arla Foods Upahl Site Hit by Cyberattack—What It Means for Food Supply Chains
17:58
17:58
Play later
Play later
Lists
Like
Liked
17:58In May 2025, a cyberattack disrupted operations at Arla Foods’ major dairy facility in Upahl, Germany—halting skyr production, impacting local IT systems, and forcing product delivery delays. This episode explores how a ransomware incident brought one of Europe’s leading food manufacturers to a standstill, revealing how vulnerable the food industry…
…
continue reading

1
Bypassing Antivirus: What Defendnot Reveals About the Weak Spots in Windows Security
19:52
19:52
Play later
Play later
Lists
Like
Liked
19:52In this episode, we dissect one of the most advanced Windows security evasion tools released in recent memory: Defendnot. Designed to exploit undocumented Windows Security Center APIs, this tool disables Windows Defender by impersonating a trusted antivirus and injecting its code into Microsoft-signed Task Manager. We explore how Defendnot bypasses…
…
continue reading

1
BreachRx Raises $15M to Automate the Chaos of Incident Response
11:46
11:46
Play later
Play later
Lists
Like
Liked
11:46In this episode, we dive into BreachRx’s $15 million Series A raise — and what it means for the future of enterprise cybersecurity incident response. The intelligent SaaS platform promises to replace outdated, reactive playbooks with automated, tailored response plans that span legal, security, IT, and executive teams. With participation from top c…
…
continue reading

1
110,000+ Records Compromised: The NRS Cybersecurity Failure
15:14
15:14
Play later
Play later
Lists
Like
Liked
15:14In this episode, we unpack the 2024 cybersecurity incident that rocked the debt collection and healthcare sectors: the massive data breach at Nationwide Recovery Services (NRS), a third-party collections agency and subsidiary of ACCSCIENT. Between July 5 and July 11, 2024, threat actors gained unauthorized access to NRS’s systems, exfiltrating sens…
…
continue reading

1
CISA Flags Chrome Vulnerability CVE-2025-4664: Patch Before June 5th
11:44
11:44
Play later
Play later
Lists
Like
Liked
11:44In this episode, we break down the recently discovered and actively exploited Chrome vulnerability CVE-2025-4664—a high-severity flaw stemming from insufficient policy enforcement in Chrome’s Loader component. This vulnerability allows attackers to leak cross-origin data, including sensitive query parameters and session information, via crafted HTM…
…
continue reading

1
483,000 Patients at Risk: Catholic Health Vendor Breach Exposes Critical Data
11:35
11:35
Play later
Play later
Lists
Like
Liked
11:35In this episode, we dive deep into a newly disclosed healthcare data breach affecting over 483,000 patients of Catholic Health, stemming from a misconfigured Elasticsearch database maintained by third-party vendor Serviceaide. From September 19 to November 5, 2024, the database was inadvertently exposed to the public internet, putting highly sensit…
…
continue reading

1
Chrome's New Vulnerability CVE-2025-4664: A Security Flaw That Can Lead to Account Takeover
9:19
9:19
Play later
Play later
Lists
Like
Liked
9:19In this episode, we take an in-depth look at the newly discovered CVE-2025-4664 vulnerability in Google Chrome’s Loader component. This high-severity security flaw is affecting not only Chrome but also other Chromium-based browsers, including Microsoft Edge, Brave, Opera, and Vivaldi. The issue lies in insufficient policy enforcement within the bro…
…
continue reading

1
Scattered Spider Targets UK and US Retailers: The Growing Threat to Major Brands
11:52
11:52
Play later
Play later
Lists
Like
Liked
11:52In this episode, we dive deep into the recent wave of cyberattacks plaguing major UK retailers such as Marks & Spencer, Co-op, and Harrods, with a special focus on the threat group behind them: Scattered Spider (also known as UNC3944, Muddled Libra, and several other aliases). We'll explore how this loosely coordinated cybercriminal group has expan…
…
continue reading

1
Proofpoint Acquires Hornetsecurity for $1B: A New Era in Microsoft 365 Security
10:18
10:18
Play later
Play later
Lists
Like
Liked
10:18In a major move within the cybersecurity space, Proofpoint has announced the acquisition of Hornetsecurity for over $1 billion. This deal significantly strengthens Proofpoint’s foothold in Microsoft 365 security, while expanding its reach into the small and mid-sized business (SMB) market through Hornetsecurity’s extensive network of managed servic…
…
continue reading

1
Exploited in the Wild: SAP NetWeaver Zero-Days Hit Fortune 500
22:55
22:55
Play later
Play later
Lists
Like
Liked
22:55In this episode, we dive into the active exploitation of two critical zero-day vulnerabilities in SAP NetWeaver—CVE-2025-31324 and CVE-2025-42999. Threat actors have been leveraging these flaws since January 2025 to gain unauthenticated access, upload malicious web shells, and ultimately achieve remote code execution by chaining an insecure deseria…
…
continue reading

1
Checkout Chaos: Inside the £3.5 Million-a-Day M&S Cyber-Shutdown
16:19
16:19
Play later
Play later
Lists
Like
Liked
16:19The recent ransomware attack on Marks & Spencer (M&S) is a sobering example of the evolving cyber threat landscape confronting the retail industry. In this episode, we unpack how one of the UK's most iconic retailers fell victim to a sophisticated cybercriminal group known as Scattered Spider. This group, recognized for its advanced social engineer…
…
continue reading

1
Targeted iOS Attacks: The Zero-Days Apple Had to Patch Fast
10:09
10:09
Play later
Play later
Lists
Like
Liked
10:09In this episode, we break down Apple’s massive May 2025 security update blitz—a sweeping patch release that spanned iOS, macOS, iPadOS, tvOS, visionOS, and watchOS. The urgency? Two zero-day vulnerabilities, CVE-2025-31200 (Core Audio) and CVE-2025-31201 (Core Media), were already under active exploitation in what experts are calling “extremely sop…
…
continue reading
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Felix Boulet fresh off his participation in Zero Day Quest. Felix talks about his unique journey from industrial maintenance to becoming a full-time vulnerability researcher, and how that background fuels his passion for hacking and bug bounty work. He explai…
…
continue reading

1
Texas vs Google: The $1.4 Billion Wake-Up Call for Data Privacy Violations
10:35
10:35
Play later
Play later
Lists
Like
Liked
10:35In this episode, we unpack the groundbreaking $1.4 billion privacy settlement between Google and the state of Texas—now the largest of its kind in U.S. history. This isn't just about numbers; it's about how data privacy enforcement is shifting dramatically at the state level in the absence of federal legislation. We dive deep into the Texas Capture…
…
continue reading

1
Marbled Dust's Zero-Day Exploit: Unveiling a Türkiye-linked Espionage Campaign Against Kurdish Forces
9:40
9:40
Play later
Play later
Lists
Like
Liked
9:40In April 2024, a sophisticated cyber espionage campaign orchestrated by the Türkiye-linked hacker group, Marbled Dust, began exploiting a previously unknown zero-day vulnerability in the Output Messenger platform—a self-hosted enterprise chat application. This vulnerability (CVE-2025-27920) resides in the Output Messenger Server Manager and allows …
…
continue reading

1
TeleMessage Exploit: Inside the Messaging Flaw That Hit Coinbase and CBP
14:14
14:14
Play later
Play later
Lists
Like
Liked
14:14In this episode, we dissect CVE-2025-47729, a critical vulnerability in TeleMessage, a message archiving app recently thrust into the spotlight due to its use by former National Security Advisor Mike Waltz. Following Waltz’s controversial tenure—marked by the "Signalgate" leak and the subsequent appearance of TeleMessage on his phone—researchers un…
…
continue reading

1
Backdoored by ‘Cheap’ AI: How Fake npm Packages Compromised Cursor IDE
25:18
25:18
Play later
Play later
Lists
Like
Liked
25:18A new supply chain attack has emerged—this time targeting macOS users of the Cursor AI code editor through rogue npm packages. In this episode, we break down how threat actors published malicious modules—sw-cur, sw-cur1, and aiide-cur—promising cheap access to Cursor's AI features. Once installed, these packages function as backdoors, stealing cred…
…
continue reading