Each week, our podcast delivers forward-focused headlines, practical tips, and fresh perspectives on the topics that matter most—artificial intelligence, business analysis, data protection, and more. This isn’t just news; it’s actionable advice that helps you turn knowledge into results.
…
continue reading
Ai Driven Malware Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
TechMagic with Cathy Hackl helps you navigate the future and make sense of today’s rapid technological change. Hear unique perspectives, explore new trends, and journey into the heart of technology. TechMagic is a must-listen for anyone passionate about the future of tech because Arthur C. Clarke said it best: “Any sufficiently advanced technology is indistinguishable from magic." Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
In 10 minutes daily, The Business of Tech delivers the latest IT services and MSP-focused news and commentary. Curated to stories that matter with commentary answering 'Why Do We Care?', channel veteran Dave Sobel brings you up to speed and provides resources to go deeper. With insights and analysis, this focused podcast focuses on the knowledge you need to be effective, profitable, and relevant.
…
continue reading
1
AI-Driven Cyber Threats Surge: SMBs Embrace MDR, Shadow AI, and Evolving Malware Tactics
14:56
14:56
Play later
Play later
Lists
Like
Liked
14:56The rise of artificial intelligence (AI) in cyber attacks is prompting small and medium-sized businesses (SMBs) to adopt managed detection and response (MDR) services and explore autonomous security operations centers (SOCs). Research from TechAisle indicates that awareness of MDR among SMBs increased from 39% in 2023 to 61% in 2025, with 89% of mi…
…
continue reading
1
Hacker Movies Then vs Now [Threat Vector]
47:06
47:06
Play later
Play later
Lists
Like
Liked
47:06We dive into a nostalgic yet revealing journey through classic hacker films, from WarGames to The Net and beyond, to assess what they got right, what they wildly imagined, and what those stories say about culture, fears, and cyber reality today. David Moulton, Senior Director of Thought Leadership for Unit 42 talks with Ben Hasskamp, Global Content…
…
continue reading
1
Identifying vulnerabilities in space with Bigbear.ai. [Deep Space]
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22Please enjoy this encore of T-Minus Deep Space. BigBear.ai is at the forefront of innovation for national security, and is committed to supporting the critical infrastructure driving America’s competitive edge. The company deploys cutting-edge Al, machine learning, and computer vision solutions to defend critical operations and win with decision ad…
…
continue reading
1
AI Transparency Regulations Impacting MSPs: German Court Ruling on OpenAI Training Data
19:34
19:34
Play later
Play later
Lists
Like
Liked
19:34A German court has ruled that OpenAI's training of its GPT-4 and GPT-4.0 models involved copyright infringement, requiring the company to disclose the frequency of usage of specific song lyrics in its training data. This ruling, initiated by GEMA, a German copyright collective, has significant implications for copyright holders, particularly in the…
…
continue reading
Report sheds light on cyber activity targeting space-related organizations during the Gaza War. Russian threat actor targets US civil engineering firm. FBI says $262 million has been stolen in account takeover scams this year. HashJack attack tricks AI browser assistants. London councils disrupted by cyberattacks. Russia’s Gamaredon and North Korea…
…
continue reading
1
Digital Presence, AI-Driven Noise, Content Repurposing, Real-World Experiences, and Brand Differentiation with Cathy Hackl, Lee Kebler, and David Cash
1:04:08
1:04:08
Play later
Play later
Lists
Like
Liked
1:04:08In this episode of TechMagic, hosts Cathy Hackl and Lee Kebler break down the biggest shifts shaping tech, entertainment, and personal branding. They explore emerging trends, from real-world experiences like Beastland, to the growing influence of spatial computing, and why authentic human content is becoming a premium as AI saturation rises. In the…
…
continue reading
1
MSP Cybersecurity: Governments Target Russian Cybercrime and New Offensive Strategies
13:50
13:50
Play later
Play later
Lists
Like
Liked
13:50The United States, United Kingdom, and Australia have imposed sanctions on the Russian hosting provider MediaLand due to its facilitation of ransomware operations. MediaLand has been linked to various cybercrime activities, including support for groups like LockBit and BlackSuit, and has been identified as a provider for cybercrime marketplaces. Th…
…
continue reading
CISA warns of spyware targeting messaging apps. CodeRED, this is not a test. Infostealer campaign spreads via malicious Blender files. Shai-Hulud’s second coming. Real estate finance firm SitusAMC investigates breach. Dartmouth College discloses Oracle EBS breach. Dave Bittner is joined by Tim Starks, Senior reporter from CyberScoop, to discuss the…
…
continue reading
1
A midseason takeaway. [CISO Perspectives]
46:37
46:37
Play later
Play later
Lists
Like
Liked
46:37In this mid-season episode, Kim takes a step back to reflect on the conversations he has had so far. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, diving into how new technologies are impacting longstanding challenges, both from a security standpoint and from an attacker's view. Whether you're catc…
…
continue reading
1
AI for MSPs: Bridging the Skills Gap and Enhancing Cloud Managed Services Profitability
14:16
14:16
Play later
Play later
Lists
Like
Liked
14:16Cloud managed services are experiencing rapid growth, with the market projected to expand from approximately $50.62 billion in 2025 to $120 billion by 2035, reflecting a compound annual growth rate of 8.16%. This growth is driven by organizations across various sectors, including finance and healthcare, seeking to enhance their cloud operations and…
…
continue reading
CrowdStrike fires an insider who allegedly shared screenshots with hackers. Google agrees, it wasn’t Salesforce. Cox Enterprises confirms Oracle EBS breach. Alleged Transport for London hackers plead not guilty. Hackers exploit new WSUS bug to deploy ShadowPad backdoor. Iberia discloses breach of customer data. Harvard discloses voice-phishing brea…
…
continue reading
1
How realistic is A House of Dynamite? [T-Minus Deep Space]
36:03
36:03
Play later
Play later
Lists
Like
Liked
36:03The new Netflix movie A House of Dynamite, chronicles what happens when the unthinkable unfolds. How realistic is it? We ask the movie’s advisor and expert, Lieutenant General Daniel Karbler (Ret.). Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. Want to hear your co…
…
continue reading
1
AI Governance: Balancing Power, Bias, and Transparency in Democracy and Business
20:33
20:33
Play later
Play later
Lists
Like
Liked
20:33The discussion centers on the book "Rewiring Democracy," authored by Bruce Schneier and Nathan E. Sanders, which explores the implications of artificial intelligence (AI) on governance, power distribution, and democratic principles. The authors highlight the risks associated with AI, particularly the concentration of power among a few corporations,…
…
continue reading
1
Satya Gupta: Rising to your contribution. [CTO] [Career Notes]
9:55
9:55
Play later
Play later
Lists
Like
Liked
9:55Please enjoy this encore of Career Notes. Co-founder and CTO of Virsec, Satya Gupta shares his story of how he has over 25 years of expertise in embedded systems, network security and systems architecture. He also talks about how a colleague of his told him something that resinated with him, he said " that was really a remarkable statement that I h…
…
continue reading
1
DataTribe's Cyber Innovation Day: Cyber: The Wake of Tech Innovation. [Special Edition]
47:53
47:53
Play later
Play later
Lists
Like
Liked
47:53On this Special Edition podcast, we share a panel from DataTribe's Cyber Innovation Day 2025, "Cyber: The Wake of Tech Innovation." The podcast tech host panel included Dave Bittner, host of CyberWire Daily podcast, Maria Varmazis, host of T-Minus Space Daily podcast, and Daniel Whitenack, co-host of Practical AI podcast, sharing a wide-ranging dis…
…
continue reading
1
Two RMMs walk into a phish… [Research Saturday]
24:00
24:00
Play later
Play later
Lists
Like
Liked
24:00Alex Berninger, Senior Manager of Intelligence at Red Canary, and Mike Wylie, Director, Threat Hunting at Zscaler, join to discuss four phishing lures in campaigns dropping RMM tools. Red Canary and Zscaler uncovered phishing campaigns delivering legitimate remote monitoring and management (RMM) tools—like ITarian, PDQ, SimpleHelp, and Atera—to gai…
…
continue reading
1
MSP Events Shift: From Mega Conferences to Micro Communities and the Rise of Cybersecurity Focus
44:02
44:02
Play later
Play later
Lists
Like
Liked
44:02MSP events are experiencing a notable shift, with a growing preference for smaller, localized gatherings over traditional mega-conferences. Jessica Davis, Principal Analyst at Omdia, highlights that this trend is driven by factors such as increased travel costs and a desire for more meaningful community interactions. Research indicates that MSPs ar…
…
continue reading
1
Cyberattacks Surge 85% During Shutdown; Telecom Security Regulations Weaken Amid AI Evolution
15:53
15:53
Play later
Play later
Lists
Like
Liked
15:53Cyberattacks against U.S. government employees surged by 85% during the recent government shutdown, with projections estimating over 555 million attacks by the end of November 2025. These attacks, characterized as targeted digital assaults rather than generic phishing attempts, exploit vulnerabilities during periods of financial stress, particularl…
…
continue reading
Cyber Command names a new head of AI. The UK introduces its long-delayed Cyber Security and Resilience Bill. Researchers highlight a critical Oracle Identity Manager flaw. Salesforce warns customers of a third-party data breach. Italy’s state-owned railway operator leaks sensitive information. SonicWall patches firewalls and email security devices.…
…
continue reading
1
Inside Jingle Thief Cloud Fraud Unwrapped [Threat Vector]
36:10
36:10
Play later
Play later
Lists
Like
Liked
36:10In this special episode of Threat Vector, host David Moulton, Senior Director of Thought Leadership for Unit 42, sits down with Stav Setty, Principal Researcher at Palo Alto Networks, to unpack Jingle Thief a cloud-only, identity-driven campaign that turned Microsoft 365 into a gift card printing press. Stav explains how the Morocco based group kno…
…
continue reading
1
AI Race Heats Up: Google Gemini 3, Intuit ChatGPT, OpenAI Codex MAX, and EU GDPR Changes
18:52
18:52
Play later
Play later
Lists
Like
Liked
18:52Google has launched its latest AI model, Gemini 3, which is designed to enhance multimodal processing capabilities by simultaneously handling text, images, and audio. This model, particularly the Gemini 3 Pro version, aims to improve the accuracy and reasoning capabilities of AI systems, positioning Google to compete more effectively with OpenAI in…
…
continue reading
The US and allies sanction Russian bulletproof hosting providers. The White House looks to sue states over AI regulations. The US Border Patrol flags citizens’ “suspicious” travel patterns. Lawmakers seek to strengthen the SEC’s cybersecurity posture. A new Android banking trojan captures content from end-to-end encrypted apps. A hidden browser API…
…
continue reading
1
Microsoft's AI Agent 365 Launch, Vendor Integrations, and Cybersecurity Media Consolidation
17:24
17:24
Play later
Play later
Lists
Like
Liked
17:24Microsoft has launched Agent 365, a management platform designed for overseeing AI agents within enterprise environments. This platform, now available in early access, includes features such as the Microsoft Entra Registry for managing agent identities, risk-based access policies, and performance measurement tools. The introduction of Agent 365 sig…
…
continue reading
1
The oversized file that stalled the internet.
29:46
29:46
Play later
Play later
Lists
Like
Liked
29:46Cloudflare’s outage is rooted in an internal configuration error. The Trump administration is preparing a new national cyber strategy. CISA gives federal agencies a week to secure a new Fortinet flaw. MI5 warns that China is using LinkedIn headhunters and covert operatives to target lawmakers. Experts question the national security risks of TP-Link…
…
continue reading
1
AI Hype Cycles, Coca-Cola’s 70K-Prompt Misstep, Spotify’s AI Slop Battle, VR’s Killer-App Problem, Pokémon GO’s Execution Edge & Digital Passports with Lee Kebler and Andrew Schwartz
49:45
49:45
Play later
Play later
Lists
Like
Liked
49:45AI is booming, VR is evolving, and AR is exploding into the real world—but most of it still feels underwhelming. On this week’s episode of TechMagic, host Lee Kebler welcomes Andrew Schwartz while host Cathy Hackl is away. Andrew is the Director of Metaverse Engineering at Nike, and together, they unpack the realities behind today’s AI hype cycle, …
…
continue reading
Cloudflare suffers a major outage. Google issues an emergency Chrome update. Logitech discloses a data breach. CISA plans a major hiring push. The House renews the State and Local Cybersecurity Grant Program. The GAO warns military personnel are oversharing online. Tech groups urge governments worldwide to reject proposals that weaken or bypass enc…
…
continue reading
Managing identity has been an evolving challenge as networks have only continued to grow and become more sophisticated. In this current landscape, these challenges have only become further exacerbated with new emerging technologies. In this episode of CISO Perspectives, host Kim Jones sits down with Richard Bird from Singular AI to discuss this e…
…
continue reading
1
IT Budgets Surge as AI Reshapes Roles; VMware Disruption Sparks Modernization Opportunities
17:55
17:55
Play later
Play later
Lists
Like
Liked
17:55The recent partnership between OpenAI and Search Kings, a digital marketing firm, aims to provide ChatGPT services to small and medium-sized businesses (SMBs), particularly in the home services sector. This collaboration is designed to facilitate the integration of artificial intelligence into SMB operations, addressing the challenges these busines…
…
continue reading
The Pentagon is spending millions on AI hacking. The New York Times investigates illicit crypto funds. Researchers uncover widespread remote code execution flaws in AI inference engines. Police in India arrest CCTV hackers. Payroll Pirates use Google Ads to steal credentials and redirect salaries. A large-scale brand impersonation campaign delivers…
…
continue reading
1
Chenxi Wang: Overcoming the obstacle of fear. [Venture Capital] [Career Notes]
9:52
9:52
Play later
Play later
Lists
Like
Liked
9:52Please enjoy this encore of Career Notes. Founder and general partner of Rain Capital, Chenxi shares her story and how she conquered and got over the obstacle of fear to reach her goals in life. " I realized a lot of times my obstacle is my own fear rather than a real obstacle" Wang states, she also shares her story of breaking glass ceilings as a …
…
continue reading
1
Building AI-First SaaS in a Weekend: Richardson Dackam's Rapid Prototyping Secrets
19:07
19:07
Play later
Play later
Lists
Like
Liked
19:07Richardson Dackam, a solo developer known for rapidly creating AI-first SaaS products, shared insights into his development process during a recent episode of the Business of Tech. Dackam emphasizes the importance of identifying manageable problems that can be solved quickly, which he refers to as "done for you ideas." His approach involves extensi…
…
continue reading
1
When clicks turn criminal. [Research Saturday]
24:25
24:25
Play later
Play later
Lists
Like
Liked
24:25Dr. Renée Burton, Vice President of Threat Intelligence from Infoblox, is sharing the team's work on "Deniability by Design: DNS-Driven Insights into a Malicious Ad Network." Infoblox returns with new threat actor research uncovering Vane Viper, a Cyprus-based holding company behind PropellerAds—one of the world’s largest advertising networks. The …
…
continue reading
1
AI Project Failures: Companies Struggle to Define Problems Amid Talent Gaps and Tech Consolidation
18:37
18:37
Play later
Play later
Lists
Like
Liked
18:37AI proof-of-concept projects are facing high failure rates, with a recent Omdia survey indicating that nearly one-third of companies report complete failures in these initiatives. Only 9% of firms successfully transition more than half of their AI projects into operational use, while 46% manage to move over 10% into production. The primary reason f…
…
continue reading
Anthropic reports China-linked hackers used Claude AI in an automated espionage campaign. Google reconsiders its upcoming “Developer Verification” policy for Android. AT&T customers affected by two data breaches in 2024 can now file claims. Nearly 10,000 Washington Post employees were affected by a data breach. ASUS and Imunify360 patch critical fl…
…
continue reading
1
AI Use Surges Beyond Guardrails: IT Leaders Face Challenges Amid Shadow AI and New Models
18:08
18:08
Play later
Play later
Lists
Like
Liked
18:08New research indicates that the use of artificial intelligence (AI) is expanding beyond established guidelines, with significant implications for IT leadership and security. A study from UpGuard reveals that over 80% of employees in sectors like finance and healthcare are utilizing unauthorized AI tools, often referred to as shadow AI. This trend r…
…
continue reading
Operation Endgame expands global takedowns. The U.S. is creating a Scam Center Strike Force. Microsoft rolls out its delayed “Prevent screen capture” feature for Teams. Proton Pass patches a clickjacking flaw. Researchers uncover previously undisclosed zero-day flaws in both Citrix and Cisco Identity Services Engine. Android-based digital picture f…
…
continue reading
1
U.S. Cyber Defense Weakens as CISA Faces Cuts; EU Eases GDPR for AI; UK Tightens Cybersecurity Laws
15:15
15:15
Play later
Play later
Lists
Like
Liked
15:15The expiration of the Cybersecurity Information Sharing Act (CISA) on September 30, 2025, has resulted in a notable decline in U.S. cyber defense capabilities, with a reported drop of over 70% in the sharing of threat indicators. This lapse has created a legal and operational vacuum, leading to increased delays in alert dissemination and a rise in …
…
continue reading
Patch Tuesday. Google sues a “phishing-as-a-service” network linked to global SMS scams, and launches “private ai compute.” Hyundai notifies vehicle owners of a data breach. Amazon launches a bug bounty program for its AI models. The Rhadamanthys infostealer operation has been disrupted. An initial access broker is set to plead guilty in U.S. feder…
…
continue reading
1
AI Does its Own Reputation Spin, Google’s AI Data Edge, The AI Slop Crisis, Self-Coding Malware, TED Next, Cathy Headlines Female Quotient’s AI Summit and interview on Cuffing Season 2.0 & Dating Tech ...
1:02:41
1:02:41
Play later
Play later
Lists
Like
Liked
1:02:41As AI systems start rewriting their own code and sanitising negative news about themselves, the line between control and autonomy is blurring. In this episode of TechMagic, hosts Cathy Hackl and Lee Kebler explore the unsettling rise of AI self-management, Google’s growing edge over OpenAI through real-world data, and the “AI slop spiral” threateni…
…
continue reading
1
AI Adoption Soars: ChatGPT & CoPilot Lead, Trust Issues Persist, and China's KimiK2 Emerges
16:00
16:00
Play later
Play later
Lists
Like
Liked
16:00ChatGPT and Microsoft CoPilot are leading the enterprise AI adoption race, with 67% and 58% of businesses utilizing these tools, respectively, according to a study by the Wharton Human AI Research Program. This trend highlights a significant gap between these dominant players and competitors like Claude, Perplexity, and DeepSeek, which have much lo…
…
continue reading
1
The changing face of fraud. [CISO Perspectives]
36:51
36:51
Play later
Play later
Lists
Like
Liked
36:51Fraud has always been a consistent challenge. As the world has continued to become increasingly interconnected and as new technologies have become widely available, threat actors have continued to evolve their tactics. In this episode of CISO Perspectives, host Kim Jones sits down with Mel Lanning from the Better Business Bureau to discuss fraud …
…
continue reading
1
Transitioning from service to civilian life. [T-Minus Deep Space]
30:05
30:05
Play later
Play later
Lists
Like
Liked
30:05Lieutenant Rob Sarver and Alex Gendzier are the authors of Warrior to Civilian: The Field Manual for the Hero's Journey, the definitive guide to transition to civilian life for veterans and their spouses and families. The book aims to provide actionable advice to veterans looking for work, while coaching those in hiring positions to give veterans t…
…
continue reading
1
Job Market Slows Amid Layoffs; Trust in AI Grows Despite Governance Gaps and SMBs Seek Performance
17:31
17:31
Play later
Play later
Lists
Like
Liked
17:31The U.S. job market is experiencing a gradual slowdown, with the unemployment rate rising to 4.36% in October 2025, according to estimates from the Chicago Federal Reserve. Despite an increase in layoff announcements, initial unemployment claims remain low at 229,000, indicating some stability. Major companies like Amazon, UPS, and Target have anno…
…
continue reading
1
Rebooting the government, one cyber law at a time.
29:54
29:54
Play later
Play later
Lists
Like
Liked
29:54Ending the government shutdown revives an expired cybersecurity law. The DoD finalizes a new model for building U.S. military cyber forces. A North Korean APT exploits Google accounts for full device control. The EU dials back AI protections in response to pressure from Big Tech companies and the U.S. government. Researchers discover a critical vul…
…
continue reading
1
Michael DeBolt: From acting to cyber. [Intelligence] [Career Notes]
7:38
7:38
Play later
Play later
Lists
Like
Liked
7:38Please enjoy this encore of Career Notes. Chief intelligence officer at Intel 471, Michael shares his story where he started as an actor and quickly changed over to intelligence and what the transition was like for him. Michael grew up wanting to be an actor and even was able to land some acting jobs, after going into the Marine Corps he decided to…
…
continue reading
1
Navigating MSP Growth: Compliance, Workflow Automation, and Co-Managed IT Insights with Brentley Pearce
22:06
22:06
Play later
Play later
Lists
Like
Liked
22:06Brantley Pearce, Chief Technology Officer at RJ Young, discussed the integration of IT services, workflow automation, and workplace technology within the managed services sector. RJ Young, a 70-year-old organization with approximately 700 employees, has been providing managed services since 2012 and has seen significant growth, now generating $12 b…
…
continue reading
1
A fine pearl gone rusty. [Research Saturday]
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59Tal Peleg, Senior Product Manager, and Coby Abrams, Cyber Security Researcher of Varonis, discussing their work and findings on Rusty Pearl - Remote Code Execution in Postgres Instances. The flaw could allow attackers to execute arbitrary commands on a database server’s operating system, leading to potential data theft, destruction, or lateral move…
…
continue reading
1
AI Adoption Grows, But SMBs Struggle with Readiness and ROI Amid Platform Inshittification
43:36
43:36
Play later
Play later
Lists
Like
Liked
43:36AI adoption is accelerating among small and mid-sized businesses (SMBs), with 87% of executives believing it will transform their operations within a year. However, only 29% feel their teams are prepared to implement AI effectively. This gap highlights a significant challenge for organizations that have invested in AI without seeing tangible return…
…
continue reading
1
ConnectWise Enhances ASIO, ESET Integrates AI, OpenAI Hits 1M Customers, Trust as a KPI?
16:15
16:15
Play later
Play later
Lists
Like
Liked
16:15ConnectWise has announced enhancements to its Ozzio platform, which now includes expanded third-party patching for over 7,000 applications, improvements to the professional services automation (PSA) user experience, and advanced robotic process automation (RPA) capabilities. These updates aim to address security vulnerabilities in widely exploited …
…
continue reading
The CBO was hacked by a suspected foreign actor. Experts worry Trump’s budget cuts weaken U.S. cyber defenses. Regulation shapes expectations. ClickFix evolves on macOS. Notorious cybercrime groups form a new “federated alliance.” Congressional leaders look to counter China’s influence in 6G networks. An EdTech firm pays $5.1 million to settle data…
…
continue reading