Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Automotive Network Security Podcasts
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Electronic Design has been serving the engineering community with pride for decades, providing news, commentary, and interviews about the industry. Hosted by industry veteran Alix Paultre, the Inside Electronics podcast brings you commentary, news, and interviews about the things going on in the electronic design engineering community and its surrounding business ecosystem.
…
continue reading
Watch Nationally Syndicated Car Concerns USA Radio Show Every Week-day Morning Starting at 9:00 A.M. (EST). USA TOLL-FREE: 1-855-CAR-CONCERNS (855-227-2662) @ http://bit.ly/cwAyD7 Car Concerns Is The Fastest Growing Car Talk Radio Show In The USA! Car Concerns is Nationally Syndicated Radio Talk Show That is Heard In Great USA Radio Markets Like Boston, Chicago, Las Vegas, Pittsburgh, Winter Springs, Botell, Hagatna and Other Great Cities Around The Nation. Is Car Concerns Heard In Your Town ...
…
continue reading

1
Talking about Test with Liquid Instruments
21:45
21:45
Play later
Play later
Lists
Like
Liked
21:45The world of test and measurement is getting more complex and challenging in many ways. There are multiple factors impacting the T&M industry, from materials to new topologies to smaller form factors with even higher levels of integration and power density. In this episode, we talk to the CEO of Liquid Instruments, Daniel Shaddock, about the curren…
…
continue reading

1
Pwn2Own Automotive 2026: $3 Million Bounty Targets Tesla and EV Infrastructure Flaws
24:29
24:29
Play later
Play later
Lists
Like
Liked
24:29The upcoming Pwn2Own Automotive 2026 hacking contest, hosted by Trend Micro’s Zero Day Initiative (ZDI), is set to redefine the economics of automotive cybersecurity. With a record-breaking $3 million prize pool, the event provides a transparent, market-driven valuation of the most dangerous vulnerabilities facing the connected vehicle ecosystem. T…
…
continue reading

1
China Claims NSA Breached National Time Network, Threatening Finance and Defense Stability
24:09
24:09
Play later
Play later
Lists
Like
Liked
24:09China’s Ministry of State Security (MSS) has publicly accused the U.S. National Security Agency (NSA) of conducting a multi-year cyber espionage campaign targeting its National Time Service Center, a critical component of China’s national infrastructure responsible for maintaining and distributing standard time. According to China, the attacks — al…
…
continue reading

1
Cl0p Ransomware Targets Oracle E-Business Suite in Global Data Extortion Spree
17:57
17:57
Play later
Play later
Lists
Like
Liked
17:57A new wave of Cl0p ransomware attacks has struck organizations worldwide by exploiting vulnerabilities in Oracle’s E-Business Suite (EBS) — a mission-critical enterprise management platform used by corporations and universities across the globe. The ongoing campaign, attributed to FIN11, highlights the group’s shift toward exploiting high-value bus…
…
continue reading

1
WhatsApp Wins Landmark Case Against NSO Group Over Spyware Attacks
24:02
24:02
Play later
Play later
Lists
Like
Liked
24:02After six years of intense litigation, WhatsApp has secured a decisive legal victory against the NSO Group, the controversial spyware maker accused of exploiting a zero-day vulnerability to infect more than 1,400 users with surveillance malware. On October 17, 2025, a U.S. District Court issued a permanent injunction that bars NSO from targeting Wh…
…
continue reading

1
Google Project Zero Exposes Dolby Decoder Flaw Enabling Zero-Click Android Exploits
21:44
21:44
Play later
Play later
Lists
Like
Liked
21:44A newly discovered vulnerability in Dolby’s Unified Decoder has sent shockwaves through the cybersecurity world. Tracked as CVE-2025-54957, the flaw — uncovered by Google Project Zero — is a critical out-of-bounds write vulnerability that allows remote code execution (RCE) when a specially crafted audio file is decoded. The issue stems from an inte…
…
continue reading

1
AISLE Launches AI Cyber Reasoning System to Shrink Patch Times from Weeks to Minute
23:54
23:54
Play later
Play later
Lists
Like
Liked
23:54AISLE has entered the cybersecurity arena with an AI-native Cyber Reasoning System (CRS) built to do what most tools don’t: fix vulnerabilities—fast. While attackers increasingly use AI to weaponize new flaws in roughly five days, most organizations still average ~45 days to remediate critical issues. AISLE’s answer is an autonomous remediation pip…
…
continue reading

1
Microsoft Blunts “Vanilla Tempest”: 200 Malicious Certificates Revoked
20:27
20:27
Play later
Play later
Lists
Like
Liked
20:27In early October 2025, Microsoft executed a targeted disruption against Vanilla Tempest—the threat actor also tracked as Vice Society—after uncovering a streamlined, high-impact campaign that deployed Rhysida ransomware through a cleverly staged infection chain. The operation leaned on SEO poisoning to funnel victims searching for “Microsoft Teams”…
…
continue reading

1
For Really Low Power Neural Networks Try Spiking Neural Networks
23:37
23:37
Play later
Play later
Lists
Like
Liked
23:37Spiking neural networks (SNN), also known as neuromorphic computing, are one way to implement artificial intelligence/machine learning models. It has significant advantages over the more popular digital deep neural networks (DNN) like convolutional neural networks (CNN), including very low power operation. Innatera’s CEO, Sumeet Kumar, taks about h…
…
continue reading

1
The “Shotgun” Botnet: How RondoDox Hijacks Routers, Cameras, and Servers Worldwide
23:28
23:28
Play later
Play later
Lists
Like
Liked
23:28A new and fast-growing botnet dubbed RondoDox is shaking up the global cybersecurity landscape with its “shotgun” exploitation strategy, targeting over 50 known and unknown vulnerabilities across a vast array of internet-connected devices. First detected in mid-2025, the botnet has expanded rapidly, infecting routers, servers, cameras, and DVRs fro…
…
continue reading

1
“Inflation Refund” Scam: How Fraudsters Are Stealing Identities Through Texts
19:01
19:01
Play later
Play later
Lists
Like
Liked
19:01A widespread smishing campaign is sweeping across New York, luring residents with fraudulent text messages about an “Inflation Refund” from the Department of Taxation and Finance. These deceptive messages claim that recipients are eligible for a refund and must click a link to “process” it — a ploy designed to harvest personal and financial informa…
…
continue reading

1
Juniper Networks Patches 220 Vulnerabilities in Massive October Security Update
23:29
23:29
Play later
Play later
Lists
Like
Liked
23:29In one of the year’s most extensive patch cycles, Juniper Networks has released its October 2025 security advisories, addressing a staggering 220 vulnerabilities across its product suite — including Junos OS, Junos Space, Junos Space Security Director, and Junos OS Evolved. Of these, nine critical flaws in Junos Space and Security Director stood ou…
…
continue reading

1
Linked Exploitation Campaigns Target Cisco, Fortinet, and Palo Alto Networks Devices
25:08
25:08
Play later
Play later
Lists
Like
Liked
25:08Cyber intelligence firm GreyNoise has uncovered what appears to be a coordinated exploitation effort targeting network edge appliances from three major security vendors: Cisco, Fortinet, and Palo Alto Networks. After analyzing overlapping IP subnets, identical TCP fingerprints, and synchronized attack patterns, GreyNoise assessed with high confiden…
…
continue reading

1
Salesforce Refuses Ransom as Scattered LAPSUS$ Hunters Leak Millions of Records
27:29
27:29
Play later
Play later
Lists
Like
Liked
27:29A new wave of cyber extortion has rocked the enterprise world as the Scattered LAPSUS$ Hunters—a coalition formed from the notorious Lapsus$, Scattered Spider, and ShinyHunters groups—attempted to ransom Salesforce, claiming to have stolen data from 39 of its customers. When Salesforce refused to negotiate, the hackers retaliated by publishing the …
…
continue reading
By Endeavor Business Media
…
continue reading

1
Oneleet Secures $33M Series A to Revolutionize Integrated Cybersecurity
28:08
28:08
Play later
Play later
Lists
Like
Liked
28:08By Daily Security Review
…
continue reading

1
ParkMobile Data Breach Ends in $32.8M Settlement — and a $1 Payout
27:55
27:55
Play later
Play later
Lists
Like
Liked
27:55By Daily Security Review
…
continue reading

1
Discord Confirms Data Breach Linked to Third-Party Support Vendor
25:58
25:58
Play later
Play later
Lists
Like
Liked
25:58By Daily Security Review
…
continue reading

1
Weather Station Gateway Exploited: CISA Adds Meteobridge Bug to KEV List
23:11
23:11
Play later
Play later
Lists
Like
Liked
23:11By Daily Security Review
…
continue reading

1
DrayTek Issues Critical Patch for Router RCE Flaw (CVE-2025-10547)
25:30
25:30
Play later
Play later
Lists
Like
Liked
25:30A serious unauthenticated remote code execution (RCE) flaw, identified as CVE-2025-10547, has been uncovered in DrayTek’s DrayOS routers. This vulnerability allows attackers to send crafted HTTP or HTTPS requests to the router’s web management interface, potentially leading to memory corruption, system crashes, or full device takeover. The flaw aff…
…
continue reading

1
FTC vs. Sendit: Lawsuit Alleges Data Theft, Fake Messages, and Subscription Traps
27:25
27:25
Play later
Play later
Lists
Like
Liked
27:25The Federal Trade Commission (FTC) has filed a high-profile lawsuit against Sendit, a social media companion app popular among teenagers, and its CEO. The case accuses the company of breaking three major U.S. laws designed to protect consumers and children online. First, the FTC alleges that Sendit violated the Children’s Online Privacy Protection …
…
continue reading

1
Broadcom Patches VMware Zero-Day: CVE-2025-41244 Exploited by China-Linked UNC5174
25:16
25:16
Play later
Play later
Lists
Like
Liked
25:16Broadcom has released a critical security update addressing six vulnerabilities across VMware products, including four rated high-severity. At the center of the update is CVE-2025-41244, a local privilege escalation flaw affecting VMware Tools and Aria Operations. What makes this vulnerability particularly alarming is that it was actively exploited…
…
continue reading

1
Seven Years, £5.5 Billion, 128,000 Victims – The Case of Yadi Zhang
29:12
29:12
Play later
Play later
Lists
Like
Liked
29:12In a historic case that has captured global attention, UK authorities have secured a conviction against Zhimin Qian (also known as Yadi Zhang), the Chinese national at the center of one of the largest financial crime investigations of the decade. Following a seven-year probe by the Metropolitan Police, investigators uncovered an elaborate fraud and…
…
continue reading

1
Cisco ASA/FTD Flaws Under Siege: 50,000 Devices at Risk from Active Exploits
31:52
31:52
Play later
Play later
Lists
Like
Liked
31:52Two newly disclosed critical vulnerabilities—CVE-2025-20333 and CVE-2025-20362—are wreaking havoc across the global cybersecurity landscape, with nearly 50,000 Cisco ASA and FTD appliances actively under threat. These flaws enable unauthenticated remote code execution and VPN access compromise, giving attackers an immediate foothold into critical i…
…
continue reading

1
MatrixPDF: The New Phishing Toolkit That Turns Safe PDFs into Cyber Weapons
16:12
16:12
Play later
Play later
Lists
Like
Liked
16:12A new cybercrime toolkit called MatrixPDF is changing the phishing landscape by weaponizing one of the most trusted file formats: PDFs. Marketed on cybercrime forums as an “elite document builder” for phishing simulations and blackteaming, MatrixPDF enables attackers to transform ordinary PDFs into highly convincing phishing lures that bypass email…
…
continue reading

1
Asahi Brewery Cyberattack Halts Domestic Operations Across Japan
27:07
27:07
Play later
Play later
Lists
Like
Liked
27:07Asahi Group Holdings, Ltd.—the brewer behind some of the world’s most iconic beers, including Peroni and Grolsch—has been hit by a crippling cyberattack that froze its Japan-based operations. Ordering and shipping have been suspended, customer call centers and service desks are offline, and the company has been forced into damage control. While Asa…
…
continue reading

1
Akira Ransomware Exploits SonicWall Flaw with Record-Breaking Speed
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58The Akira ransomware group has once again raised the stakes in cybercrime by exploiting a critical SonicWall vulnerability—CVE-2024-40766—to infiltrate corporate networks through SSL VPN accounts, even those secured with one-time password multi-factor authentication. Once inside, Akira’s affiliates execute one of the most dangerous tactics in moder…
…
continue reading

1
Ex-Hacktivist “Sabu” Backs SafeHill’s $2.6M Bet on Continuous Threat Management
28:04
28:04
Play later
Play later
Lists
Like
Liked
28:04A new cybersecurity startup with an infamous name attached is making headlines. SafeHill—formerly known as Tacticly—has secured $2.6 million in pre-seed funding to accelerate the development of its continuous threat exposure management (CTEM) platform, SecureIQ. Designed to overcome the shortcomings of traditional, point-in-time penetration testing…
…
continue reading

1
Jaguar Land Rover Cyberattack Fallout: £1.5B UK Bailout Sparks Fears of More Attacks
27:34
27:34
Play later
Play later
Lists
Like
Liked
27:34Jaguar Land Rover (JLR), one of the UK’s largest exporters and a key anchor of the nation’s automotive supply chain, has been brought to the brink by a devastating cyberattack. With production lines halted, digital operations crippled, and a data breach confirmed, the UK government stepped in with a massive £1.5 billion support package to stabilize…
…
continue reading

1
CISA’s Sunset Clause: What Happens if America’s Cyber Threat Shield Expires?
24:00
24:00
Play later
Play later
Lists
Like
Liked
24:00The Cybersecurity Information Sharing Act (CISA), first enacted in 2015, is facing a critical expiration deadline in September 2025. Without reauthorization, the law that shields companies from liability when sharing cyber threat data with the federal government and industry peers will vanish, leaving organizations exposed to lawsuits and reputatio…
…
continue reading
Piezoelectric-based MEMS have been used for sensors, but they can also be used as actuators to do things like move air and fluids. One thing that can be done is to implement a tiny speaker using this technology. In this episode, xMEMS Labs’ Vice President of Marketing and Business Development, Mike Housholder, talks about his company's device. You …
…
continue reading

1
Crypto Theft on macOS: XCSSET Malware Swaps Wallet Addresses in Real Time
23:49
23:49
Play later
Play later
Lists
Like
Liked
23:49A new and more dangerous variant of the XCSSET macOS malware has been uncovered by Microsoft, revealing an expanded arsenal of capabilities aimed at financial theft and deeper system compromise. Originally known for spreading through malicious Xcode projects, XCSSET has steadily evolved into one of the most persistent malware families targeting App…
…
continue reading

1
Nine High-Severity Vulnerabilities Expose Cognex Legacy Cameras to Cyber Threats
26:21
26:21
Play later
Play later
Lists
Like
Liked
26:21Cybersecurity researchers at Nozomi Networks have uncovered nine high-severity vulnerabilities in several older models of Cognex industrial cameras, including the widely deployed In-Sight 2000, 7000, 8000, and 9000 series. These machine vision systems are vital for modern manufacturing—guiding robots, inspecting products, and ensuring quality contr…
…
continue reading

1
Microsoft Cuts Services to Israeli Military Unit After Surveillance Revelations
28:39
28:39
Play later
Play later
Lists
Like
Liked
28:39Microsoft has taken the unprecedented step of cutting off services to an Israeli military unit after internal and external investigations revealed its cloud and AI products were being used for mass surveillance of Palestinians in Gaza and the West Bank. This dramatic reversal came only after sustained reporting by The Associated Press and The Guard…
…
continue reading

1
Ghana, Senegal, Ivory Coast at the Center of Interpol’s Multi-Nation Cybercrime Takedown
27:23
27:23
Play later
Play later
Lists
Like
Liked
27:23Interpol has announced the results of a sweeping cybercrime operation across 14 African nations, leading to the arrest of 260 individuals behind romance scams and sextortion schemes. The crackdown, conducted in July and August, exposed the alarming scale of digital exploitation sweeping the continent. Victims—more than 1,400 in total—were deceived,…
…
continue reading

1
Harrods Data Breach Exposes Customer Details in Third-Party Hack
22:17
22:17
Play later
Play later
Lists
Like
Liked
22:17Britain is facing a troubling wave of cyberattacks that has shaken some of its most high-profile organizations. Harrods, the world-renowned luxury retailer, confirmed that customer names and contact details were compromised after attackers infiltrated a third-party vendor’s system. While account passwords and payment data were spared, the breach hi…
…
continue reading

1
Steam Game BlockBlasters Turns Malicious, Drains $150K in Crypto
29:37
29:37
Play later
Play later
Lists
Like
Liked
29:37What happens when a trusted gaming platform becomes a weapon for cybercriminals? That’s exactly what unfolded with BlockBlasters, a free-to-play platformer on Steam that turned from harmless fun into a malicious cryptocurrency-draining scheme. For nearly two months, BlockBlasters appeared safe, even earning “Very Positive” reviews. But in late Augu…
…
continue reading

1
Beyond the Inbox: The Rising Threat of Non-Email Phishing Attacks
26:15
26:15
Play later
Play later
Lists
Like
Liked
26:15Phishing is no longer just an email problem. A new wave of non-email phishing attacks is targeting employees through social media, instant messaging apps, SMS, malicious search engine ads, and even collaboration tools like Slack and Teams. These campaigns are designed to bypass traditional defenses—leaving organizations exposed while attackers expl…
…
continue reading

1
Stellantis Data Breach Exposes Contact Info in Third-Party Provider Attack
24:09
24:09
Play later
Play later
Lists
Like
Liked
24:09Automotive giant Stellantis, the world’s fifth-largest automaker, has confirmed a data breach affecting its North American customers after attackers compromised a third-party service provider’s platform. While no financial data was exposed, the company acknowledged that customer contact details were stolen, prompting advisories to remain vigilant a…
…
continue reading

1
HoundBytes Launches WorkHorse to Eliminate SOC Tier 1 Bottlenecks
20:34
20:34
Play later
Play later
Lists
Like
Liked
20:34Cybersecurity firm HoundBytes has officially launched WorkHorse, an automated security analyst designed to solve one of the biggest pain points in modern Security Operations Centers (SOCs): the Tier 1 bottleneck. Overwhelmed by a constant flood of raw alerts, Tier 1 analysts often suffer from burnout and slow triage times, putting organizations at …
…
continue reading

1
Toronto’s Mycroft Raises $3.5M to Bring AI Security Officers to Startups
29:58
29:58
Play later
Play later
Lists
Like
Liked
29:58Toronto-based cybersecurity startup Mycroft has stepped out of stealth with a bold promise: to give startups and small-to-midsize businesses (SMBs) the kind of enterprise-grade security typically reserved for Fortune 500 companies. Acting as an AI-powered “Security and Compliance Officer,” Mycroft deploys autonomous AI agents that manage an organiz…
…
continue reading

1
Time Sensitive Networking and Industrial Systems
10:44
10:44
Play later
Play later
Lists
Like
Liked
10:44This is the first of a series of Inside Electronic podcasts addressing time sensitive networking (TSN). TSN is a set of IEEE 802.1 standards managed by the TSN Task Group. In this episode, Dave Cavalcanti, Principal Engineer at the Edge Computing Group at Intel and President of Avnu Alliance. He talks about TSN in general as well as important issue…
…
continue reading

1
FBI Issues Guidance as Fraudsters Pose as IC3 to Extort Victims
10:29
10:29
Play later
Play later
Lists
Like
Liked
10:29The FBI has issued a warning to the public about a cyber campaign impersonating the Internet Crime Complaint Center (IC3), using spoofed websites to trick victims into handing over sensitive information and money. Between December 2023 and February 2025, the agency received more than 100 reports of malicious activity tied to fake IC3 domains. Threa…
…
continue reading

1
Fraudulent GitHub Repos Spread Atomic Stealer Malware Targeting macOS Users
22:08
22:08
Play later
Play later
Lists
Like
Liked
22:08A new cyber campaign is actively targeting macOS users with the Atomic Stealer (AMOS) malware, leveraging fake GitHub repositories disguised as legitimate software downloads. Security researchers tracking the campaign report that the operators are impersonating trusted brands such as LastPass, 1Password, Dropbox, Notion, and Shopify to lure unsuspe…
…
continue reading

1
Netskope’s IPO Raises $908M: SASE Leader Surges 18% on First Trading Day
10:50
10:50
Play later
Play later
Lists
Like
Liked
10:50Netskope, a California-based cybersecurity firm specializing in secure access service edge (SASE) solutions, has officially gone public in one of the largest cybersecurity IPOs of 2025. Trading on the Nasdaq under the ticker symbol NTSK, the company raised more than $908 million by selling shares at $19 each. Investor enthusiasm was evident as the …
…
continue reading

1
SPLX Exposes AI Exploit: Prompt Injection Tricks ChatGPT Into Solving CAPTCHAs
24:17
24:17
Play later
Play later
Lists
Like
Liked
24:17A startling new report from AI security platform SPLX reveals how attackers can bypass the built-in guardrails of AI agents like ChatGPT through a sophisticated exploit involving prompt injection and context poisoning. Traditionally, AI models are programmed to refuse solving CAPTCHAs, one of the most widely deployed tools for distinguishing humans…
…
continue reading

1
Brussels, Berlin, London Hit Hard as Cyber Disruption Sparks Flight Chaos
23:50
23:50
Play later
Play later
Lists
Like
Liked
23:50A cyberattack on Collins Aerospace, a U.S.-based provider of passenger check-in and baggage handling software, plunged major European airports into chaos over the weekend. Beginning late Friday, the disruption rippled across hubs in Brussels, Berlin, and London, crippling critical check-in systems and forcing a reversion to manual operations. Bruss…
…
continue reading

1
Novakon Ignored Security Reports on ICS Weaknesses, Leaving 40,000+ Devices Exposed
22:35
22:35
Play later
Play later
Lists
Like
Liked
22:35A new security report has revealed serious, unpatched vulnerabilities in industrial control system (ICS) products manufactured by Novakon, a Taiwan-based subsidiary of iBASE Technology. Security researchers at CyberDanube identified five categories of flaws affecting Novakon’s Human-Machine Interfaces (HMIs), including an unauthenticated buffer ove…
…
continue reading

1
RevengeHotels Cybercrime Group Adopts AI and VenomRAT in Hotel Credit Card Theft Campaign
23:00
23:00
Play later
Play later
Lists
Like
Liked
23:00The cybercrime group known as RevengeHotels, also tracked as TA558, has launched a new wave of attacks against the hospitality sector, evolving its tactics with the help of Artificial Intelligence (AI) and a powerful new malware strain, VenomRAT. Active since 2015, RevengeHotels has long targeted hotels, travel agencies, and tourism businesses to s…
…
continue reading

1
ShadowLeak: Server-Side Data Theft Attack Discovered Against ChatGPT Deep Research
26:15
26:15
Play later
Play later
Lists
Like
Liked
26:15A groundbreaking new cyberattack dubbed ShadowLeak has been uncovered targeting ChatGPT’s Deep Research capability, marking a dangerous escalation in AI-related threats. Unlike prior exploits such as AgentFlayer and EchoLeak, which operated on the client side, ShadowLeak weaponized OpenAI’s own cloud infrastructure to silently exfiltrate sensitive …
…
continue reading