Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

CVE Program Podcasts

show episodes
 
Artwork
 
At any moment around the world, cybercriminals and nation-state sponsored hackers are targeting businesses, government entities, and nonprofits for financial gain, cyber espionage, or geopolitical advantage. But behind every organization facing this nonstop barrage of cyberattack activity are dedicated cybersecurity professionals working to defend their organizations’ networks, systems, and sensitive information. Dark Reading Confidential brings you rare, firsthand stories from the cybersecu ...
  continue reading
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
Inside Rehabilitation Counseling

Commission on Rehabilitation Counselor Certification

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Commission on Rehabilitation Counselor Certification presents "Inside Rehabilitation Counseling," a series of conversations with the professionals, educators, and thought-leaders working in the specialized field of rehabilitation counseling.
  continue reading
 
Loading …
show series
 
Please enjoy this encore of Career Notes. COO and Co-Founder of Query. AI, Andrew Maloney, shares how the building blocks he learned in the military helped him get where he is today. Coming from a blue collar family with a minimal knowledge of computers, Andrew went into computer operations in the Air Force. While deployed to Oman just after the st…
  continue reading
 
Today we are joined by Selena Larson, co-host of Only Malware in the Building and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at Proofpoint, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth a…
  continue reading
 
The Future of Cybersecurity: AI, Exploits, and the CVE Database In this special crossover episode of Cybersecurity Today and Hashtag Trending, the hosts explore the use of artificial intelligence (AI) in cybersecurity. The conversation begins with an overview of the ongoing 'arms race' to find and exploit software vulnerabilities, focusing on how A…
  continue reading
 
A cyberattack disrupts Bridgestone’s manufacturing operations. CISA warns of critical vulnerabilities in products used across multiple sectors. Additional cybersecurity firms confirm data exposure in the recent Salesforce–Salesloft Drift attack. A configuration vulnerability in Sitecore products leads to remote code execution. HHS promises stricter…
  continue reading
 
Amazon Kuper's Early Wins, Cohere's Bold Strategy & Tesco vs. Broadcom In this episode of #Trending, host Jim Love covers Amazon's early success with Project Kuiper, securing deals with JetBlue and the state of Wyoming before the satellite network is live. The Canadian AI company Cohere is highlighted for its contrarian approach and impressive valu…
  continue reading
 
Salt Typhoon marks China’s most ambitious campaign yet. A major Google outage hit Southeastern Europe. A critical zero-day flaw in FreePBX gets patched. Scattered Lapsus$ Hunters claim the Jaguar Land Rover hack. Researchers uncover a major evolution in the XWorm backdoor campaign. GhostRedirector is a new China-aligned threat actor. CISA adds a pa…
  continue reading
 
An increasing amount of research is exploring the connection between work and wellness. This includes mental wellness and physical health, both of which can be positively impacted by having employment, particularly for those navigating a disability. Simply put, work is more than just a means to earn a living or spend a significant portion of your w…
  continue reading
 
HTT – Thu Sep 4, 2025 Welcome to Hashtag Trending! I’m your host, Jim Love. Today’s episode explores the shifting landscape of jobs in the age of AI, the global response to AI-generated content, and the financial realities of the ongoing AI boom. We raise more questions than answers, diving into the stories shaping our tech future. In this episode:…
  continue reading
 
Jaguar Land Rover suffers a major cyberattack. ICE gains access to a powerful spyware tool. Researchers find Fancy Bear snuffling around a new Outlook backdoor. Cloudflare and Palo Alto Networks confirm compromised Salesforce data. A researcher discovers an unsecured Navy Federal Credit Union (NFCU) server. A new ClickFix scam spreads MetaStealer m…
  continue reading
 
Hashtag Trending – Wednesday, September 3, 2025 Host: Jim Love In This Episode: OpenAI promises new parental controls and crisis safeguards for ChatGPT after lawsuits and tragic incidents involving teens. Critics argue these measures are long overdue. Lawsuits against Character.AI and Google allege chatbots encouraged self-harm and manipulated youn…
  continue reading
 
Researchers disrupt a cyber campaign by Russia’s Midnight Blizzard. The Salesloft Drift breach continues to ripple outward. WhatsApp patches a critical flaw in its iOS and Mac apps. A fake PDF editing tool delivers the TamperChef infostealer. A hacker finds crash data Tesla claimed not to have. Spain cancels a €10 million contract with Huawei. A fr…
  continue reading
 
Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss. For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join ⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠ intelligence analyst and host of their po…
  continue reading
 
AI in the Workplace: Hidden Use, Bot Traffic, and Microsoft SSD Mystery In this episode, host Jim Love discusses several key technology topics including a study revealing nearly half of employees secretly use AI to avoid judgment. It also mentions the significant increase in bot traffic on the internet, primarily from AI systems, and Cloudflare's s…
  continue reading
 
While our team is observing the Labor Day holiday in the US, we hope you will enjoy this episode of The Microsoft Threat Intelligence Podcast . New episodes airs on the N2K CyberWIre network every other Wednesday. In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠Sherrod DeGrippo is live from Black Hat 2025 with a special lineup…
  continue reading
 
This Labor Day, we’re celebrating more than just a holiday. Join us in celebrating not just the work, but the people who make it possible — the labor behind the labor.We’re honoring the people who bring their creativity, dedication, and passion to every corner of N2K. The work you hear, read, and see from us doesn’t happen by accident. It’s the res…
  continue reading
 
Please enjoy this encore of Career Notes. Social engineer and CEO of Hekate, Marina Ciavatta, shares her story of how people think her job is a la Mission Impossible coming from the ceiling with a rope and stealing stuff in the dead of the night. Marina does physical pentesting. Starting with an unused degree in journalism, Marina turned her talent…
  continue reading
 
In this episode of Project Synapse, the team delves into a plethora of AI tools and technologies, rekindling their original playful approach to understanding AI's latest advancements. Marcel Gagner takes the lead, showcasing various tools like Google's Nano Banana, Gemini 2.5 Image Generator, and the emergent Genie 3, among others. The discussion h…
  continue reading
 
This week, we are joined by Jamie Levy, Director of Adversary Tactics at Huntress, who is discussing their work on "Active Exploitation of SonicWall VPNs." Huntress has released an urgent threat advisory on active exploitation of SonicWall VPNs, with attackers bypassing MFA, pivoting to domain controllers, and ultimately deploying Akira ransomware.…
  continue reading
 
A suspected ransomware attack disrupts hundreds of Swedish municipalities. Google warns Gmail users of emerging cyberattacks tied to the ShinyHunters group. A malicious supply chain attack hits the npm registry. Senators press AFLAC for answers following a data breach. Law enforcement takedowns splinter the ransomware ecosystem. The FBI and Dutch p…
  continue reading
 
Hashtag Trending: AI's Impact on Traffic, Employment, and Global Digital Policies In this episode, host Jim Love discusses the significant decline in website referrals by ChatGPT, which dropped 52% in a month. The shift favors platforms like Reddit and Wikipedia, affecting traditional marketing strategies. The episode also examines the controversia…
  continue reading
 
Join us for a look around today's Dark Web, and find out how law enforcement, AI, nation-state activities, and more are reshaping the way cybercriminals conduct their dirty business online. Keith Jarvis, senior security researcher at Sophos' Counter Threat Unit joins Dark Reading's Alex Culafi for a conversation you don't want to miss.…
  continue reading
 
AI Breakthroughs, Meta Talent Exodus, and ChatGPT Limits | Hashtag Trending In today's episode of Hashtag Trending, host Jim Love covers the latest in AI advancements, legal battles, and industry changes. Highlights include Anthropic's settlement of a major copyright lawsuit, potential new AI methodologies inspired by human brain function, and Meta…
  continue reading
 
The FBI shares revelations on Salt Typhoon’s reach. Former NSA and FBI directors sound alarm on infrastructure cybersecurity gaps. Google is launching a new cyber “disruption unit”. A new report highlights cyber risks to the maritime industry. A Pennsylvania healthcare provider suffers a data breach affecting over six hundred thousand individuals. …
  continue reading
 
A whistle-blower claims DOGE uploaded a sensitive Social Security database to a vulnerable cloud server. Allies push back against North Korean IT scams. ZipLine is a sophisticated phishing campaign targeting U.S.-based manufacturing. Researchers uncover a residential proxy network operating across at least 20 U.S. states. Flock Safety license plate…
  continue reading
 
Latest in Tech: AI Ethics, Apple's Siri Overhaul, US-China Mineral Tensions, and Remote Work Trends In this episode of 'Hashtag Trending,' host Jim Love discusses Anthropic's new feature allowing its AI chatbot Claude to disconnect from abusive conversations, Perplexity AI's revenue-sharing model with publishers, and Bloomberg's report on Apple's d…
  continue reading
 
A cyberattack disrupts state systems in Nevada. A China-linked threat actor targets Southeast Asian diplomats. A new attack method hides malicious prompts inside images processed by AI systems.Experts ponder preventing AI agents from going rogue. A new study finds AI is hitting entry-level jobs hardest. Michigan’s Supreme Court upholds limits on ce…
  continue reading
 
Elon Musk's Grok 2.5 License Controversy, Microsoft Copilot AI in Excel, and More Tech Updates In this episode of hashtag Trending, host Jim Love discusses the controversial release of Elon Musk's XAI Grok 2.5 model, which is marketed as open source but comes with several restrictive license terms. Microsoft's new Copilot AI integrated into Excel r…
  continue reading
 
Farmers Insurance discloses a data breach affecting over a million people. Agentic AI tools fall for common scams. A new bill in Congress looks to revive letters of marque for the digital age. Cybercriminals target macOS users with the Shamos infostealer. New Android spyware masquerades as antivirus to target Russian business executives. CISA seeks…
  continue reading
 
In this episode of Hashtag Trending, host Jim Love covers the latest in tech news. Key topics include Elon Musk's launch of Macro Hard, an AI-only software company aimed at challenging Microsoft's AI dominance, and Nvidia's halted H20 chip production due to China's tightening regulations. The episode also discusses vulnerabilities in Starlink's sat…
  continue reading
 
In today's special episode, Jim interviews Chandrashekar LSP, head of Zoho's Canadian operations. They delve into Zoho's AI breakthroughs, including their proprietary Zoho Intelligent Assistant (Zia). The conversation covers the development and application of Zoho's own large language models (LLMs), ranging from 1 billion to 7 billion parameters, a…
  continue reading
 
Please enjoy this encore of Career Notes. Senior Vice President and Executive in Residence with Rapid7 and Chairman for Cyversity, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. Julian always wanted to do something where he could find a way to help society to basically help others. Starting out as a Ba…
  continue reading
 
AI Scalability, Market Speculation, and The Future of Tech Integration In this episode of Project Synapse, the hosts delve into the recent discussions around AI consciousness, the limits of AI capabilities, and how businesses are grappling with AI adoption. They critique the MIT report that claims only 5% of AI projects yield financial benefits, at…
  continue reading
 
This week, we are joined by Dr. Renée Burton, VP of Infoblox Threat Intel, who is discussing their work on VexTrio, a notorious traffic distribution system (TDS) involved in digital fraud. The VexTrio investigation uncovers a massive global ad fraud and scam operation powered by just 250 virtual machines, tying it directly to named individuals and …
  continue reading
 
The FTC warns one country’s “online safety” may be another’s “censorship.” A new bipartisan bill aims to reduce barriers to federal cyber jobs. MURKY PANDA targets government, technology, academia, legal, and professional services in North America. MITRE updates their hardware weaknesses list. Customs and Border Protection conducts a record number …
  continue reading
 
In this episode of Hashtag Trending, host Jim Love covers the recent downturn in tech stocks on Wall Street spurred by an MIT report indicating that 95% of corporate AI projects lack financial benefits. Google announces the launch of its Gemini smart speaker, aiming to enhance user interaction with advanced AI features. Significant privacy breaches…
  continue reading
 
Zero-day clickjacking flaws affect major password managers. The FBI warns that Russian state-backed hackers are exploiting a long-known Cisco flaw. Apple releases emergency patches for a zero-day flaw in the Image I/O framework. Home Depot faces a proposed class action lawsuit accusing it of secretly using facial recognition at self-checkout kiosks…
  continue reading
 
In this episode of Hashtag Trending, hosted by Jim Love, key topics include Meta's significant changes to its AI division, leading to internal pay conflicts and potential slowdowns despite big investments. OpenAI's CEO, Sam Altman, explains their new open source models as a strategic move against Chinese competitors. Hugging Face introduces AI Shee…
  continue reading
 
Microsoft releases emergency out-of-band (OOB) Windows updates. Trump targets NSA’s leading AI and cyber expert in clearance revocations. A breach may have compromised the privacy of Ohio medical marijuana patients. Cybercriminals exploit an AI website builder to rapidly create phishing sites. Warlock ransomware operators target Microsoft’s SharePo…
  continue reading
 
In this episode of Hashtag Trending with Jim Love, we discuss China's directive for data centers to use 50% domestic AI chips, Adobe, Grammarly, and Otter AI's push to incorporate AI features, and the backlash and legal risks they face. We also highlight how a Windows 11 patch is causing issues with SSDs and HDDs, and an MIT report reveals that 95%…
  continue reading
 
A researcher uncovers vulnerabilities across Intel’s internal websites that exposed sensitive employee and supplier data. The Kimsuky group (APT43) targets South Korean diplomatic missions. A new DDoS vulnerability bypasses the 2023 “Rapid Reset” fix. Drug development firm Inotiv reports a ransomware attack to the SEC. The UK drops their demand tha…
  continue reading
 
In this episode of Hashtag Trending, host Jim Love discusses the increasing role of AI in various aspects of our lives. Topics covered include OpenAI's plans for encrypting temporary chats to protect user privacy, the use of AI to appeal denied insurance claims through Counterforce Health, YouTube's AI-based age verification system, and the legal c…
  continue reading
 
HR software giant Workday discloses a data breach. Researchers uncover a zero-day in Elastic’s EDR software. Ghost-tapping is an emerging fraud technique where cybercriminals use NFC relay attacks to exploit stolen payment card data. Germany may be on a path to ban ad blockers. A security researcher documents multiple serious flaws in McDonald’s sy…
  continue reading
 
AI Threats and Controversies: Google Gemini Flaws, Meta AI Policies, and More In this episode of 'Trending with Jim Love,' the discussion covers a variety of pressing issues in the AI landscape. The show begins with an alarming flaw in Google's Gemini AI that could turn AI email summaries into phishing tools. The conversation shifts to Sam Altman o…
  continue reading
 
Bob Rudis, VP Data Science from GreyNoise, is sharing some insights into their work on "Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities." New research reveals a striking trend: in 80% of cases, spikes in malicious activity against enterprise edge technologies like VPNs and firewalls occurred weeks before related CVEs were…
  continue reading
 
Please enjoy this encore of Career Notes. Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pa…
  continue reading
 
Debating AI Intelligence and Corporate Utilization on Project Synapse In this episode of Project Synapse, hosts Jim Love, Marcel Gagne, and John Pinard delve into the ongoing debate about AI intelligence and the advancements in AI technology. They discuss the reliability and accuracy of AI models like GPT-5 and Grok, questioning whether these model…
  continue reading
 
Plex urges users to immediately update their Media Server due to an undisclosed security flaw. Cisco warns of a critical remote code execution flaw in their Secure Firewall Management Center software.Rockwell Automation discloses multiple critical and high-severity flaws. Hackers breached a Canadian House of Commons database. Active law enforcement…
  continue reading
 
In this episode, host Jim Love explores the growing influence of Palantir, a company that has rapidly risen to become the 19th largest public company in the US. He discusses Palantir's data management products and the concerns surrounding its capabilities in government surveillance. The episode also covers Google's new personal context feature for …
  continue reading
 
A ransomware attack exposes personal medical records of VA patients. New joint guidance from CISA and the NSA emphasizes asset inventory and OT taxonomy. The UK government reportedly spent millions to cover up a data breach. Researchers identified two critical flaws in a widely used print orchestration platform. Phishing attacks increasingly rely o…
  continue reading
 
Hashtag Trending: GPT-5 Controversy, Perplexity's Bold Bid for Chrome, and Fusion Power Milestones In this episode, host Jim Love covers several hot topics in the tech world. The controversial launch of GPT-5 is examined, highlighting glitches and questions about whether the new model is truly an improvement or just a cost-saving measure. Perplexit…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play