A free podcast about cybersecurity, vulnerability management, and the CVE Program.
…
continue reading
CVE Program Podcasts
A daily news program covering the top stories in technology with a weekend in depth interview.
…
continue reading
At any moment around the world, cybercriminals and nation-state sponsored hackers are targeting businesses, government entities, and nonprofits for financial gain, cyber espionage, or geopolitical advantage. But behind every organization facing this nonstop barrage of cyberattack activity are dedicated cybersecurity professionals working to defend their organizations’ networks, systems, and sensitive information. Dark Reading Confidential brings you rare, firsthand stories from the cybersecu ...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
The Commission on Rehabilitation Counselor Certification presents "Inside Rehabilitation Counseling," a series of conversations with the professionals, educators, and thought-leaders working in the specialized field of rehabilitation counseling.
…
continue reading

1
Andrew Maloney: Never-ending thirst for knowledge. [COO] [Career Notes]
9:35
9:35
Play later
Play later
Lists
Like
Liked
9:35Please enjoy this encore of Career Notes. COO and Co-Founder of Query. AI, Andrew Maloney, shares how the building blocks he learned in the military helped him get where he is today. Coming from a blue collar family with a minimal knowledge of computers, Andrew went into computer operations in the Air Force. While deployed to Oman just after the st…
…
continue reading

1
Don’t trust that app! [Research Saturday]
20:41
20:41
Play later
Play later
Lists
Like
Liked
20:41Today we are joined by Selena Larson, co-host of Only Malware in the Building and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at Proofpoint, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth a…
…
continue reading

1
From CVE To Cyber Attack In 15 Minutes - Hashtag Trending Weekend
31:51
31:51
Play later
Play later
Lists
Like
Liked
31:51The Future of Cybersecurity: AI, Exploits, and the CVE Database In this special crossover episode of Cybersecurity Today and Hashtag Trending, the hosts explore the use of artificial intelligence (AI) in cybersecurity. The conversation begins with an overview of the ongoing 'arms race' to find and exploit software vulnerabilities, focusing on how A…
…
continue reading

1
Wheels left spinning after cyber incident.
29:42
29:42
Play later
Play later
Lists
Like
Liked
29:42A cyberattack disrupts Bridgestone’s manufacturing operations. CISA warns of critical vulnerabilities in products used across multiple sectors. Additional cybersecurity firms confirm data exposure in the recent Salesforce–Salesloft Drift attack. A configuration vulnerability in Sitecore products leads to remote code execution. HHS promises stricter…
…
continue reading

1
Amazon Kuiper Winning Key Clients Before Going Live
8:40
8:40
Play later
Play later
Lists
Like
Liked
8:40Amazon Kuper's Early Wins, Cohere's Bold Strategy & Tesco vs. Broadcom In this episode of #Trending, host Jim Love covers Amazon's early success with Project Kuiper, securing deals with JetBlue and the state of Wyoming before the satellite network is live. The Canadian AI company Cohere is highlighted for its contrarian approach and impressive valu…
…
continue reading
Salt Typhoon marks China’s most ambitious campaign yet. A major Google outage hit Southeastern Europe. A critical zero-day flaw in FreePBX gets patched. Scattered Lapsus$ Hunters claim the Jaguar Land Rover hack. Researchers uncover a major evolution in the XWorm backdoor campaign. GhostRedirector is a new China-aligned threat actor. CISA adds a pa…
…
continue reading

1
Vocational Services for Veterans with Monnie Rebecca Waltz, BS, MRC, VE, CRC, Christopher Briggman, MRC, CRC, CVE, LCMHC, LPC, and Keith Hosey
1:10:38
1:10:38
Play later
Play later
Lists
Like
Liked
1:10:38An increasing amount of research is exploring the connection between work and wellness. This includes mental wellness and physical health, both of which can be positively impacted by having employment, particularly for those navigating a disability. Simply put, work is more than just a means to earn a living or spend a significant portion of your w…
…
continue reading

1
2.1 Million Manufacturing Jobs Unfilled By 2030
10:43
10:43
Play later
Play later
Lists
Like
Liked
10:43HTT – Thu Sep 4, 2025 Welcome to Hashtag Trending! I’m your host, Jim Love. Today’s episode explores the shifting landscape of jobs in the age of AI, the global response to AI-generated content, and the financial realities of the ongoing AI boom. We raise more questions than answers, diving into the stories shaping our tech future. In this episode:…
…
continue reading
Jaguar Land Rover suffers a major cyberattack. ICE gains access to a powerful spyware tool. Researchers find Fancy Bear snuffling around a new Outlook backdoor. Cloudflare and Palo Alto Networks confirm compromised Salesforce data. A researcher discovers an unsecured Navy Federal Credit Union (NFCU) server. A new ClickFix scam spreads MetaStealer m…
…
continue reading

1
Have We Already Crossed Over Into Artificial General Intelligence?
12:28
12:28
Play later
Play later
Lists
Like
Liked
12:28Hashtag Trending – Wednesday, September 3, 2025 Host: Jim Love In This Episode: OpenAI promises new parental controls and crisis safeguards for ChatGPT after lawsuits and tragic incidents involving teens. Critics argue these measures are long overdue. Lawsuits against Character.AI and Google allege chatbots encouraged self-harm and manipulated youn…
…
continue reading

1
Blizzard warning: Amazon freezes midnight hack.
32:11
32:11
Play later
Play later
Lists
Like
Liked
32:11Researchers disrupt a cyber campaign by Russia’s Midnight Blizzard. The Salesloft Drift breach continues to ripple outward. WhatsApp patches a critical flaw in its iOS and Mac apps. A fake PDF editing tool delivers the TamperChef infostealer. A hacker finds crash data Tesla claimed not to have. Spain cancels a €10 million contract with Huawei. A fr…
…
continue reading

51
Hot sauce and hot takes: An Only Malware in the Building special. [OMITB]
36:37
36:37
Play later
Play later
Lists
Like
Liked
36:37Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss. For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join Selena Larson, Proofpoint intelligence analyst and host of their po…
…
continue reading

1
48% of Employees Secretly Use AI: Hashtag Trending For September 2, 2025
10:27
10:27
Play later
Play later
Lists
Like
Liked
10:27AI in the Workplace: Hidden Use, Bot Traffic, and Microsoft SSD Mystery In this episode, host Jim Love discusses several key technology topics including a study revealing nearly half of employees secretly use AI to avoid judgment. It also mentions the significant increase in bot traffic on the internet, primarily from AI systems, and Cloudflare's s…
…
continue reading

1
Live from Black Hat: Ransomware, Responsible Disclosure, and the Rise of AI [Microsoft Threat Intelligence Podcast]
43:56
43:56
Play later
Play later
Lists
Like
Liked
43:56While our team is observing the Labor Day holiday in the US, we hope you will enjoy this episode of The Microsoft Threat Intelligence Podcast . New episodes airs on the N2K CyberWIre network every other Wednesday. In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is live from Black Hat 2025 with a special lineup…
…
continue reading

1
The labor behind the labor. [Special Edition]
35:26
35:26
Play later
Play later
Lists
Like
Liked
35:26This Labor Day, we’re celebrating more than just a holiday. Join us in celebrating not just the work, but the people who make it possible — the labor behind the labor.We’re honoring the people who bring their creativity, dedication, and passion to every corner of N2K. The work you hear, read, and see from us doesn’t happen by accident. It’s the res…
…
continue reading

1
Marina Ciavatta: Going after the human error. [Social engineer] [Career Notes]
11:06
11:06
Play later
Play later
Lists
Like
Liked
11:06Please enjoy this encore of Career Notes. Social engineer and CEO of Hekate, Marina Ciavatta, shares her story of how people think her job is a la Mission Impossible coming from the ceiling with a rope and stealing stuff in the dead of the night. Marina does physical pentesting. Starting with an unused degree in journalism, Marina turned her talent…
…
continue reading

401
Exploring the Cutting-Edge AI Tools: A Deep Dive with Project Synapse
1:28:54
1:28:54
Play later
Play later
Lists
Like
Liked
1:28:54In this episode of Project Synapse, the team delves into a plethora of AI tools and technologies, rekindling their original playful approach to understanding AI's latest advancements. Marcel Gagner takes the lead, showcasing various tools like Google's Nano Banana, Gemini 2.5 Image Generator, and the emergent Genie 3, among others. The discussion h…
…
continue reading
This week, we are joined by Jamie Levy, Director of Adversary Tactics at Huntress, who is discussing their work on "Active Exploitation of SonicWall VPNs." Huntress has released an urgent threat advisory on active exploitation of SonicWall VPNs, with attackers bypassing MFA, pivoting to domain controllers, and ultimately deploying Akira ransomware.…
…
continue reading
A suspected ransomware attack disrupts hundreds of Swedish municipalities. Google warns Gmail users of emerging cyberattacks tied to the ShinyHunters group. A malicious supply chain attack hits the npm registry. Senators press AFLAC for answers following a data breach. Law enforcement takedowns splinter the ransomware ecosystem. The FBI and Dutch p…
…
continue reading

1
ChatGPT Has 52% Drop In Website Referrals: Hashtag Trending
10:38
10:38
Play later
Play later
Lists
Like
Liked
10:38Hashtag Trending: AI's Impact on Traffic, Employment, and Global Digital Policies In this episode, host Jim Love discusses the significant decline in website referrals by ChatGPT, which dropped 52% in a month. The shift favors platforms like Reddit and Wikipedia, affecting traditional marketing strategies. The episode also examines the controversia…
…
continue reading
Join us for a look around today's Dark Web, and find out how law enforcement, AI, nation-state activities, and more are reshaping the way cybercriminals conduct their dirty business online. Keith Jarvis, senior security researcher at Sophos' Counter Threat Unit joins Dark Reading's Alex Culafi for a conversation you don't want to miss.…
…
continue reading

1
ChatGPT Refuses To Execute A Prompt It Consider To Be A Waste Of Time And Resources: Hashtag Trending
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27AI Breakthroughs, Meta Talent Exodus, and ChatGPT Limits | Hashtag Trending In today's episode of Hashtag Trending, host Jim Love covers the latest in AI advancements, legal battles, and industry changes. Highlights include Anthropic's settlement of a major copyright lawsuit, potential new AI methodologies inspired by human brain function, and Meta…
…
continue reading
The FBI shares revelations on Salt Typhoon’s reach. Former NSA and FBI directors sound alarm on infrastructure cybersecurity gaps. Google is launching a new cyber “disruption unit”. A new report highlights cyber risks to the maritime industry. A Pennsylvania healthcare provider suffers a data breach affecting over six hundred thousand individuals. …
…
continue reading
A whistle-blower claims DOGE uploaded a sensitive Social Security database to a vulnerable cloud server. Allies push back against North Korean IT scams. ZipLine is a sophisticated phishing campaign targeting U.S.-based manufacturing. Researchers uncover a residential proxy network operating across at least 20 U.S. states. Flock Safety license plate…
…
continue reading

1
Anthropic's Claude Is "Distressed" By Abusive Comments: Hashtag Trending
10:31
10:31
Play later
Play later
Lists
Like
Liked
10:31Latest in Tech: AI Ethics, Apple's Siri Overhaul, US-China Mineral Tensions, and Remote Work Trends In this episode of 'Hashtag Trending,' host Jim Love discusses Anthropic's new feature allowing its AI chatbot Claude to disconnect from abusive conversations, Perplexity AI's revenue-sharing model with publishers, and Bloomberg's report on Apple's d…
…
continue reading
A cyberattack disrupts state systems in Nevada. A China-linked threat actor targets Southeast Asian diplomats. A new attack method hides malicious prompts inside images processed by AI systems.Experts ponder preventing AI agents from going rogue. A new study finds AI is hitting entry-level jobs hardest. Michigan’s Supreme Court upholds limits on ce…
…
continue reading

1
Grok 2.5 Open Source - Is It Really Open Source?
12:09
12:09
Play later
Play later
Lists
Like
Liked
12:09Elon Musk's Grok 2.5 License Controversy, Microsoft Copilot AI in Excel, and More Tech Updates In this episode of hashtag Trending, host Jim Love discusses the controversial release of Elon Musk's XAI Grok 2.5 model, which is marketed as open source but comes with several restrictive license terms. Microsoft's new Copilot AI integrated into Excel r…
…
continue reading
Farmers Insurance discloses a data breach affecting over a million people. Agentic AI tools fall for common scams. A new bill in Congress looks to revive letters of marque for the digital age. Cybercriminals target macOS users with the Shamos infostealer. New Android spyware masquerades as antivirus to target Russian business executives. CISA seeks…
…
continue reading

1
Elon Musk's AI Ambitions and Tech Industry Shifts: A Deep Dive
9:07
9:07
Play later
Play later
Lists
Like
Liked
9:07In this episode of Hashtag Trending, host Jim Love covers the latest in tech news. Key topics include Elon Musk's launch of Macro Hard, an AI-only software company aimed at challenging Microsoft's AI dominance, and Nvidia's halted H20 chip production due to China's tightening regulations. The episode also discusses vulnerabilities in Starlink's sat…
…
continue reading

1
Exploring AI with Zoho Canada's Head - Chandrashekar LSP
42:02
42:02
Play later
Play later
Lists
Like
Liked
42:02In today's special episode, Jim interviews Chandrashekar LSP, head of Zoho's Canadian operations. They delve into Zoho's AI breakthroughs, including their proprietary Zoho Intelligent Assistant (Zia). The conversation covers the development and application of Zoho's own large language models (LLMs), ranging from 1 billion to 7 billion parameters, a…
…
continue reading

1
Julian Waits: Find a way to help society. [Serial Entrepreneur] [Career Notes]
11:04
11:04
Play later
Play later
Lists
Like
Liked
11:04Please enjoy this encore of Career Notes. Senior Vice President and Executive in Residence with Rapid7 and Chairman for Cyversity, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. Julian always wanted to do something where he could find a way to help society to basically help others. Starting out as a Ba…
…
continue reading

1
Ai Scalability, Market Speculation and More: Project Synapse on Hashtag Trending Weekend
1:09:22
1:09:22
Play later
Play later
Lists
Like
Liked
1:09:22AI Scalability, Market Speculation, and The Future of Tech Integration In this episode of Project Synapse, the hosts delve into the recent discussions around AI consciousness, the limits of AI capabilities, and how businesses are grappling with AI adoption. They critique the MIT report that claims only 5% of AI projects yield financial benefits, at…
…
continue reading

1
Beyond the smoke screen. [Research Saturday]
22:22
22:22
Play later
Play later
Lists
Like
Liked
22:22This week, we are joined by Dr. Renée Burton, VP of Infoblox Threat Intel, who is discussing their work on VexTrio, a notorious traffic distribution system (TDS) involved in digital fraud. The VexTrio investigation uncovers a massive global ad fraud and scam operation powered by just 250 virtual machines, tying it directly to named individuals and …
…
continue reading
The FTC warns one country’s “online safety” may be another’s “censorship.” A new bipartisan bill aims to reduce barriers to federal cyber jobs. MURKY PANDA targets government, technology, academia, legal, and professional services in North America. MITRE updates their hardware weaknesses list. Customs and Border Protection conducts a record number …
…
continue reading

1
AI Market Turbulence, Google's Smart Speaker Launch, and Major AI Privacy Breaches
12:13
12:13
Play later
Play later
Lists
Like
Liked
12:13In this episode of Hashtag Trending, host Jim Love covers the recent downturn in tech stocks on Wall Street spurred by an MIT report indicating that 95% of corporate AI projects lack financial benefits. Google announces the launch of its Gemini smart speaker, aiming to enhance user interaction with advanced AI features. Significant privacy breaches…
…
continue reading
Zero-day clickjacking flaws affect major password managers. The FBI warns that Russian state-backed hackers are exploiting a long-known Cisco flaw. Apple releases emergency patches for a zero-day flaw in the Image I/O framework. Home Depot faces a proposed class action lawsuit accusing it of secretly using facial recognition at self-checkout kiosks…
…
continue reading

1
Meta's AI Overhaul, OpenAI's Open Source Shift, and Hugging Face Simplifies AI
11:53
11:53
Play later
Play later
Lists
Like
Liked
11:53In this episode of Hashtag Trending, hosted by Jim Love, key topics include Meta's significant changes to its AI division, leading to internal pay conflicts and potential slowdowns despite big investments. OpenAI's CEO, Sam Altman, explains their new open source models as a strategic move against Chinese competitors. Hugging Face introduces AI Shee…
…
continue reading
Microsoft releases emergency out-of-band (OOB) Windows updates. Trump targets NSA’s leading AI and cyber expert in clearance revocations. A breach may have compromised the privacy of Ohio medical marijuana patients. Cybercriminals exploit an AI website builder to rapidly create phishing sites. Warlock ransomware operators target Microsoft’s SharePo…
…
continue reading

1
China Pushes for AI Self-Reliance, AI Tools Face Trust Issues, MIT Report on AI Failures
10:04
10:04
Play later
Play later
Lists
Like
Liked
10:04In this episode of Hashtag Trending with Jim Love, we discuss China's directive for data centers to use 50% domestic AI chips, Adobe, Grammarly, and Otter AI's push to incorporate AI features, and the backlash and legal risks they face. We also highlight how a Windows 11 patch is causing issues with SSDs and HDDs, and an MIT report reveals that 95%…
…
continue reading
A researcher uncovers vulnerabilities across Intel’s internal websites that exposed sensitive employee and supplier data. The Kimsuky group (APT43) targets South Korean diplomatic missions. A new DDoS vulnerability bypasses the 2023 “Rapid Reset” fix. Drug development firm Inotiv reports a ransomware attack to the SEC. The UK drops their demand tha…
…
continue reading

1
AI's Impact on Privacy, Insurance, Age Verification, and QR Code Scams
11:46
11:46
Play later
Play later
Lists
Like
Liked
11:46In this episode of Hashtag Trending, host Jim Love discusses the increasing role of AI in various aspects of our lives. Topics covered include OpenAI's plans for encrypting temporary chats to protect user privacy, the use of AI to appeal denied insurance claims through Counterforce Health, YouTube's AI-based age verification system, and the legal c…
…
continue reading
HR software giant Workday discloses a data breach. Researchers uncover a zero-day in Elastic’s EDR software. Ghost-tapping is an emerging fraud technique where cybercriminals use NFC relay attacks to exploit stolen payment card data. Germany may be on a path to ban ad blockers. A security researcher documents multiple serious flaws in McDonald’s sy…
…
continue reading
AI Threats and Controversies: Google Gemini Flaws, Meta AI Policies, and More In this episode of 'Trending with Jim Love,' the discussion covers a variety of pressing issues in the AI landscape. The show begins with an alarming flaw in Google's Gemini AI that could turn AI email summaries into phishing tools. The conversation shifts to Sam Altman o…
…
continue reading

1
The CVE countdown clock. [Research Saturday]
29:58
29:58
Play later
Play later
Lists
Like
Liked
29:58Bob Rudis, VP Data Science from GreyNoise, is sharing some insights into their work on "Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities." New research reveals a striking trend: in 80% of cases, spikes in malicious activity against enterprise edge technologies like VPNs and firewalls occurred weeks before related CVEs were…
…
continue reading

1
Dr. Rois Ni Thuama: Get into the game. [Cyber governance] [Career Notes]
9:50
9:50
Play later
Play later
Lists
Like
Liked
9:50Please enjoy this encore of Career Notes. Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pa…
…
continue reading

1
GPT5, Grok and the Future of AI - Project Synapse for August 16, 2025
1:15:03
1:15:03
Play later
Play later
Lists
Like
Liked
1:15:03Debating AI Intelligence and Corporate Utilization on Project Synapse In this episode of Project Synapse, hosts Jim Love, Marcel Gagne, and John Pinard delve into the ongoing debate about AI intelligence and the advancements in AI technology. They discuss the reliability and accuracy of AI models like GPT-5 and Grok, questioning whether these model…
…
continue reading
Plex urges users to immediately update their Media Server due to an undisclosed security flaw. Cisco warns of a critical remote code execution flaw in their Secure Firewall Management Center software.Rockwell Automation discloses multiple critical and high-severity flaws. Hackers breached a Canadian House of Commons database. Active law enforcement…
…
continue reading

1
The Quiet Rise of Palantir and the Personalization of AI
12:46
12:46
Play later
Play later
Lists
Like
Liked
12:46In this episode, host Jim Love explores the growing influence of Palantir, a company that has rapidly risen to become the 19th largest public company in the US. He discusses Palantir's data management products and the concerns surrounding its capabilities in government surveillance. The episode also covers Google's new personal context feature for …
…
continue reading
A ransomware attack exposes personal medical records of VA patients. New joint guidance from CISA and the NSA emphasizes asset inventory and OT taxonomy. The UK government reportedly spent millions to cover up a data breach. Researchers identified two critical flaws in a widely used print orchestration platform. Phishing attacks increasingly rely o…
…
continue reading
Hashtag Trending: GPT-5 Controversy, Perplexity's Bold Bid for Chrome, and Fusion Power Milestones In this episode, host Jim Love covers several hot topics in the tech world. The controversial launch of GPT-5 is examined, highlighting glitches and questions about whether the new model is truly an improvement or just a cost-saving measure. Perplexit…
…
continue reading