Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cyber Security Week In Review Podcasts
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
If you work in online fraud prevention, chances are you've caught the "bug". The bug that makes you passionate about identifying & preventing cybercriminals from getting away with stealing from your company, or your client's companies. Most people who have made cyber-fraud their career have the perfect balance of analytical and social skills, a strong sense of justice and the curiosity that will drive you to go down every path of information until you "crack the case". Just like sociology is ...
…
continue reading

1
Week in Review: Velociraptor pushes LockBit, Hartman loses nomination, Sotheby’s cyberattack
36:07
36:07
Play later
Play later
Lists
Like
Liked
36:07Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guests Tom Hollingsworth, networking technology advisor, The Futurum Group, as well as on BlueSky, and Brett Conlon, CISO, American Century Investments Thanks to our show sponsor, Vanta What’s your 2 AM security worry? Is it “Do I have the …
…
continue reading

1
Veeam Acquires Securiti AI for $1.725 Billion to Unite Data Resilience, Security, and AI
28:44
28:44
Play later
Play later
Lists
Like
Liked
28:44In one of the largest cybersecurity acquisitions of 2025, Veeam Software has announced plans to acquire Securiti AI for $1.725 billion in cash and stock, signaling a fundamental shift in how enterprises will secure, manage, and govern their data in the age of artificial intelligence. The deal, expected to close in the fourth quarter, will bring tog…
…
continue reading

1
Defakto Raises $30.75 Million to Redefine Machine Identity Security
34:01
34:01
Play later
Play later
Lists
Like
Liked
34:01California-based cybersecurity firm Defakto has raised $30.75 million in Series B funding, led by XYZ Venture Capital, bringing its total investment to roughly $50 million. The new capital will power the company’s rapid expansion in product development and global market reach for its identity and access management (IAM) platform—one specifically de…
…
continue reading

1
Dr. Allan Friedman Joins NetRise: The Father of SBOMs Goes Private to Fuse AI and Supply Chain Security
24:24
24:24
Play later
Play later
Lists
Like
Liked
24:24In a landmark move for the cybersecurity industry, Dr. Allan Friedman — often called the Father of SBOMs — has joined supply chain security firm NetRise as a strategic advisor. Friedman’s transition from his influential role at CISA marks a pivotal moment where public policy meets private innovation. His mission: to push the Software Bill of Materi…
…
continue reading

1
Russian hackers replace malware with new tools, Windows updates cause login issues, campaign targets high-profile servers
8:03
8:03
Play later
Play later
Lists
Like
Liked
8:03Russian state hackers replace burned malware with new tools Recent Windows updates cause login issues on some PCs Sophisticated campaign targets servers of high-profile organizations Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That’s …
…
continue reading

1
AWS outage, NSA hacking accusations, High risk WhatsApp automation
8:19
8:19
Play later
Play later
Lists
Like
Liked
8:19DNS failure leads to AWS outage China accuses NSA of hacking national time center Chrome store flooded with high-risk WhatsApp automation Huge thanks to our sponsor, ThreatLocker Cybercriminals don’t knock — they sneak in through the cracks other tools miss. That’s why organizations are turning to ThreatLocker. As a zero-trust endpoint protection p…
…
continue reading

1
Pwn2Own Automotive 2026: $3 Million Bounty Targets Tesla and EV Infrastructure Flaws
24:29
24:29
Play later
Play later
Lists
Like
Liked
24:29The upcoming Pwn2Own Automotive 2026 hacking contest, hosted by Trend Micro’s Zero Day Initiative (ZDI), is set to redefine the economics of automotive cybersecurity. With a record-breaking $3 million prize pool, the event provides a transparent, market-driven valuation of the most dangerous vulnerabilities facing the connected vehicle ecosystem. T…
…
continue reading

1
China Claims NSA Breached National Time Network, Threatening Finance and Defense Stability
24:09
24:09
Play later
Play later
Lists
Like
Liked
24:09China’s Ministry of State Security (MSS) has publicly accused the U.S. National Security Agency (NSA) of conducting a multi-year cyber espionage campaign targeting its National Time Service Center, a critical component of China’s national infrastructure responsible for maintaining and distributing standard time. According to China, the attacks — al…
…
continue reading

1
Cl0p Ransomware Targets Oracle E-Business Suite in Global Data Extortion Spree
17:57
17:57
Play later
Play later
Lists
Like
Liked
17:57A new wave of Cl0p ransomware attacks has struck organizations worldwide by exploiting vulnerabilities in Oracle’s E-Business Suite (EBS) — a mission-critical enterprise management platform used by corporations and universities across the globe. The ongoing campaign, attributed to FIN11, highlights the group’s shift toward exploiting high-value bus…
…
continue reading

1
WhatsApp Wins Landmark Case Against NSO Group Over Spyware Attacks
24:02
24:02
Play later
Play later
Lists
Like
Liked
24:02After six years of intense litigation, WhatsApp has secured a decisive legal victory against the NSO Group, the controversial spyware maker accused of exploiting a zero-day vulnerability to infect more than 1,400 users with surveillance malware. On October 17, 2025, a U.S. District Court issued a permanent injunction that bars NSO from targeting Wh…
…
continue reading

1
Google Project Zero Exposes Dolby Decoder Flaw Enabling Zero-Click Android Exploits
21:44
21:44
Play later
Play later
Lists
Like
Liked
21:44A newly discovered vulnerability in Dolby’s Unified Decoder has sent shockwaves through the cybersecurity world. Tracked as CVE-2025-54957, the flaw — uncovered by Google Project Zero — is a critical out-of-bounds write vulnerability that allows remote code execution (RCE) when a specially crafted audio file is decoded. The issue stems from an inte…
…
continue reading

1
Europol dismantles SIM farm, Envoy Air compromised, Everest claims Collins hack
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34Europol dismantles 49 million fake account SIM farm Envoy Air confirms Oracle E-Business Suite compromise Cybercrime group Everest claims Collins Aerospace hack Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That’s what ThreatLocker deli…
…
continue reading

1
AISLE Launches AI Cyber Reasoning System to Shrink Patch Times from Weeks to Minute
23:54
23:54
Play later
Play later
Lists
Like
Liked
23:54AISLE has entered the cybersecurity arena with an AI-native Cyber Reasoning System (CRS) built to do what most tools don’t: fix vulnerabilities—fast. While attackers increasingly use AI to weaponize new flaws in roughly five days, most organizations still average ~45 days to remediate critical issues. AISLE’s answer is an autonomous remediation pip…
…
continue reading

1
Microsoft Blunts “Vanilla Tempest”: 200 Malicious Certificates Revoked
20:27
20:27
Play later
Play later
Lists
Like
Liked
20:27In early October 2025, Microsoft executed a targeted disruption against Vanilla Tempest—the threat actor also tracked as Vice Society—after uncovering a streamlined, high-impact campaign that deployed Rhysida ransomware through a cleverly staged infection chain. The operation leaned on SEO poisoning to funnel victims searching for “Microsoft Teams”…
…
continue reading

1
Sotheby’s suffers cyberattack, Cisco “Zero Disco’ attacks, Microsoft revokes ransomware certificates
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34Sotheby’s suffers cyberattack Hackers exploit Cisco SNMP flaw in “Zero Disco’ attacks Microsoft revokes more than 200 certificates to disrupt ransomware campaign Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out…
…
continue reading

1
MANGO discloses data breach, Jewelbug infiltrates Russian IT network, nation-state behind F5 attack?
8:50
8:50
Play later
Play later
Lists
Like
Liked
8:50MANGO discloses data breach Threat group 'Jewelbug' infiltrates Russian IT network F5 discloses breach tied to nation-state threat actor Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from under these old too…
…
continue reading

1
Legacy Windows protocols expose theft, Fortra admits GoAnywhere defect, Taiwan claims surge in Chinese attacks
7:43
7:43
Play later
Play later
Lists
Like
Liked
7:43Legacy Windows protocols still expose theft Fortra admits exploitation of GoAnywhere defect Taiwan claims surge in Chinese attack efforts Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from under these old to…
…
continue reading

1
The Deepfake Tipping Point with Frank McKenna
45:39
45:39
Play later
Play later
Lists
Like
Liked
45:39Fraudology is presented by Sardine. Get your tickets to Sardine[Con] and end the scamedmic In this episode of Fraudology In this must-listen episode of the Fraudology Podcast, host Karisse Hendrick welcomes back fraud prevention expert Frank McKenna, co-founder of Point Predictive. Together, they explore the explosive rise of deepfakes and AI-gener…
…
continue reading

1
Salesforce data leak, SimonMed breach, Chipmaker vs. Dutch government
8:38
8:38
Play later
Play later
Lists
Like
Liked
8:38Millions of records exposed in Salesforce data leak SimonMed breach grows from hundreds to over a million Dutch government freezes Chinese-owned chipmaker Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from u…
…
continue reading

1
The “Shotgun” Botnet: How RondoDox Hijacks Routers, Cameras, and Servers Worldwide
23:28
23:28
Play later
Play later
Lists
Like
Liked
23:28A new and fast-growing botnet dubbed RondoDox is shaking up the global cybersecurity landscape with its “shotgun” exploitation strategy, targeting over 50 known and unknown vulnerabilities across a vast array of internet-connected devices. First detected in mid-2025, the botnet has expanded rapidly, infecting routers, servers, cameras, and DVRs fro…
…
continue reading

1
“Inflation Refund” Scam: How Fraudsters Are Stealing Identities Through Texts
19:01
19:01
Play later
Play later
Lists
Like
Liked
19:01A widespread smishing campaign is sweeping across New York, luring residents with fraudulent text messages about an “Inflation Refund” from the Department of Taxation and Finance. These deceptive messages claim that recipients are eligible for a refund and must click a link to “process” it — a ploy designed to harvest personal and financial informa…
…
continue reading

1
Juniper Networks Patches 220 Vulnerabilities in Massive October Security Update
23:29
23:29
Play later
Play later
Lists
Like
Liked
23:29In one of the year’s most extensive patch cycles, Juniper Networks has released its October 2025 security advisories, addressing a staggering 220 vulnerabilities across its product suite — including Junos OS, Junos Space, Junos Space Security Director, and Junos OS Evolved. Of these, nine critical flaws in Junos Space and Security Director stood ou…
…
continue reading

1
Linked Exploitation Campaigns Target Cisco, Fortinet, and Palo Alto Networks Devices
25:08
25:08
Play later
Play later
Lists
Like
Liked
25:08Cyber intelligence firm GreyNoise has uncovered what appears to be a coordinated exploitation effort targeting network edge appliances from three major security vendors: Cisco, Fortinet, and Palo Alto Networks. After analyzing overlapping IP subnets, identical TCP fingerprints, and synchronized attack patterns, GreyNoise assessed with high confiden…
…
continue reading

1
Salesforce Refuses Ransom as Scattered LAPSUS$ Hunters Leak Millions of Records
27:29
27:29
Play later
Play later
Lists
Like
Liked
27:29A new wave of cyber extortion has rocked the enterprise world as the Scattered LAPSUS$ Hunters—a coalition formed from the notorious Lapsus$, Scattered Spider, and ShinyHunters groups—attempted to ransom Salesforce, claiming to have stolen data from 39 of its customers. When Salesforce refused to negotiate, the hackers retaliated by publishing the …
…
continue reading

1
Velociraptor pushes LockBit, Spain dismantles crime group, SonicWall SSL VPN breach
8:40
8:40
Play later
Play later
Lists
Like
Liked
8:40Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from under these old tools and manual processes? Enter Vanta. Vanta automates manual work, so you can stop sweating over spreadsheets, chasing audit evidence, an…
…
continue reading

1
Week in Review: Crowdsourced ransomware campaign, Windows 10 woes, California opts out
38:50
38:50
Play later
Play later
Lists
Like
Liked
38:50Link to episode page This week’s Cyber Security Headlines - Week in Review is hosted by Rich Stroffolino with guests Mike Lockhart, CISO Eagleview, and Dustin Sachs, chief technologist at CyberRisk collaborative, and author of Behavioral Insights in Cybersecurity Thanks to our show sponsor, ThreatLocker Cybercriminals don’t knock — they sneak in th…
…
continue reading

1
Microsoft Azure outage, law firm cyberattack, Russian hacktivists pwned
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34Azure outage blocks access to Microsoft 365 services and admin portals Major U.S. law firm suffers cyberattack Hacktivists aiming for critical infrastructure get pwned Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That’s what ThreatLock…
…
continue reading

1
DeepMind fixes vulnerabilities, California offers data opt-out, China-Nexus targets open-source tool
7:46
7:46
Play later
Play later
Lists
Like
Liked
7:46Google DeepMind’s AI agent finds and fixes vulnerabilities California law lets consumers universally opt out of data sharing China-Nexus actors weaponize 'Nezha' open source tool Huge thanks to our sponsor, ThreatLocker Cybercriminals don’t knock — they sneak in through the cracks other tools miss. That’s why organizations are turning to ThreatLock…
…
continue reading

1
North Korean attackers steal crypto. Who's sending UK phones to China? Avnet confirms data breach
7:35
7:35
Play later
Play later
Lists
Like
Liked
7:35
…
continue reading

1
Inside Meta’s Security Nightmare: Growth Over Safety?
42:22
42:22
Play later
Play later
Lists
Like
Liked
42:22
…
continue reading

1
Unity vulnerability, Oracle zero-day patched, Discord user info exposed
8:31
8:31
Play later
Play later
Lists
Like
Liked
8:31
…
continue reading

1
Oneleet Secures $33M Series A to Revolutionize Integrated Cybersecurity
28:08
28:08
Play later
Play later
Lists
Like
Liked
28:08By Daily Security Review
…
continue reading

1
ParkMobile Data Breach Ends in $32.8M Settlement — and a $1 Payout
27:55
27:55
Play later
Play later
Lists
Like
Liked
27:55By Daily Security Review
…
continue reading

1
Discord Confirms Data Breach Linked to Third-Party Support Vendor
25:58
25:58
Play later
Play later
Lists
Like
Liked
25:58By Daily Security Review
…
continue reading

1
Weather Station Gateway Exploited: CISA Adds Meteobridge Bug to KEV List
23:11
23:11
Play later
Play later
Lists
Like
Liked
23:11By Daily Security Review
…
continue reading

1
DrayTek Issues Critical Patch for Router RCE Flaw (CVE-2025-10547)
25:30
25:30
Play later
Play later
Lists
Like
Liked
25:30A serious unauthenticated remote code execution (RCE) flaw, identified as CVE-2025-10547, has been uncovered in DrayTek’s DrayOS routers. This vulnerability allows attackers to send crafted HTTP or HTTPS requests to the router’s web management interface, potentially leading to memory corruption, system crashes, or full device takeover. The flaw aff…
…
continue reading

1
ParkMobile breach settlement, UK schools vulnerable, Zimbra calendar attacks
8:03
8:03
Play later
Play later
Lists
Like
Liked
8:03ParkMobile 2021 data breach class action suit concludes UK government study suggests secondary schools larger target than businesses Zimbra Collaboration Suite flaw used in calendar attacks Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. …
…
continue reading

1
Week in Review: Shutdown furloughs CISA, DoD risk framework, Oracle extortion problem
30:25
30:25
Play later
Play later
Lists
Like
Liked
30:25Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Nick Espinosa, nationally syndicated host of The Deep Dive Radio Show, with guest Steve Zalewski, co-host, Defense in Depth Thanks to our show sponsor, Nudge Security Here’s the thing: your employees are signing up for new apps, sharing data, and connecting tool…
…
continue reading

1
Shutdown furloughs CISA, Defender BIOS bug, Motilily dealership cyberattack
7:42
7:42
Play later
Play later
Lists
Like
Liked
7:42Government shutdown furloughs most CISA staff Microsoft Defender bug triggers erroneous BIOS update alerts Motility RV software company suffers cyberattack Huge thanks to our sponsor, Nudge Security Here's the thing: your employees are signing up for new apps, sharing data, and connecting tools together, often without anyone knowing. And, AI adopti…
…
continue reading

1
You Can't Patch Burnout: When Cybersecurity Takes a Toll
47:21
47:21
Play later
Play later
Lists
Like
Liked
47:21Every October, Cybersecurity Awareness Month brings a wave of tips: update your software, enable MFA, use strong passwords. But what good is any of that if the people behind the defenses are feeling burned out? In this episode of Talos Takes, Hazel sits down with Joe Marshall for a candid, vulnerable conversation about the human cost of cybersecuri…
…
continue reading

1
Breaches set for North America, Outlook bug needs Microsoft support, Air Force admits SharePoint issue
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25Breach notification letters set to flood North America's mailboxes New bug in classic Outlook only fixed via Microsoft support Air Force admits SharePoint privacy issue over breach Huge thanks to our sponsor, Nudge Security AI notetakers like Otter AI spread fast. In fact, one Nudge Security customer discovered 800 new accounts created in only 90 d…
…
continue reading

1
FTC vs. Sendit: Lawsuit Alleges Data Theft, Fake Messages, and Subscription Traps
27:25
27:25
Play later
Play later
Lists
Like
Liked
27:25The Federal Trade Commission (FTC) has filed a high-profile lawsuit against Sendit, a social media companion app popular among teenagers, and its CEO. The case accuses the company of breaking three major U.S. laws designed to protect consumers and children online. First, the FTC alleges that Sendit violated the Children’s Online Privacy Protection …
…
continue reading

1
Broadcom Patches VMware Zero-Day: CVE-2025-41244 Exploited by China-Linked UNC5174
25:16
25:16
Play later
Play later
Lists
Like
Liked
25:16Broadcom has released a critical security update addressing six vulnerabilities across VMware products, including four rated high-severity. At the center of the update is CVE-2025-41244, a local privilege escalation flaw affecting VMware Tools and Aria Operations. What makes this vulnerability particularly alarming is that it was actively exploited…
…
continue reading

1
Seven Years, £5.5 Billion, 128,000 Victims – The Case of Yadi Zhang
29:12
29:12
Play later
Play later
Lists
Like
Liked
29:12In a historic case that has captured global attention, UK authorities have secured a conviction against Zhimin Qian (also known as Yadi Zhang), the Chinese national at the center of one of the largest financial crime investigations of the decade. Following a seven-year probe by the Metropolitan Police, investigators uncovered an elaborate fraud and…
…
continue reading

1
Cisco ASA/FTD Flaws Under Siege: 50,000 Devices at Risk from Active Exploits
31:52
31:52
Play later
Play later
Lists
Like
Liked
31:52Two newly disclosed critical vulnerabilities—CVE-2025-20333 and CVE-2025-20362—are wreaking havoc across the global cybersecurity landscape, with nearly 50,000 Cisco ASA and FTD appliances actively under threat. These flaws enable unauthenticated remote code execution and VPN access compromise, giving attackers an immediate foothold into critical i…
…
continue reading

1
MatrixPDF: The New Phishing Toolkit That Turns Safe PDFs into Cyber Weapons
16:12
16:12
Play later
Play later
Lists
Like
Liked
16:12A new cybercrime toolkit called MatrixPDF is changing the phishing landscape by weaponizing one of the most trusted file formats: PDFs. Marketed on cybercrime forums as an “elite document builder” for phishing simulations and blackteaming, MatrixPDF enables attackers to transform ordinary PDFs into highly convincing phishing lures that bypass email…
…
continue reading

1
China-linked group linked to new malware, 2024 VMware zero-day still exploited, iOS fixes a bevy of glitches
8:28
8:28
Play later
Play later
Lists
Like
Liked
8:28China-Linked Group Hits Governments With Stealth Malware Chinese hackers exploit VMware zero-day since October 2024 Apple's iOS fixes a bevy of glitches Huge thanks to our sponsor, Nudge Security The SaaS supply chain is a hot mesh. As your workforce introduces new SaaS apps and integrations, hidden pathways are created that attackers can exploit t…
…
continue reading

1
Asahi Brewery Cyberattack Halts Domestic Operations Across Japan
27:07
27:07
Play later
Play later
Lists
Like
Liked
27:07Asahi Group Holdings, Ltd.—the brewer behind some of the world’s most iconic beers, including Peroni and Grolsch—has been hit by a crippling cyberattack that froze its Japan-based operations. Ordering and shipping have been suspended, customer call centers and service desks are offline, and the company has been forced into damage control. While Asa…
…
continue reading

1
Akira Ransomware Exploits SonicWall Flaw with Record-Breaking Speed
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58The Akira ransomware group has once again raised the stakes in cybercrime by exploiting a critical SonicWall vulnerability—CVE-2024-40766—to infiltrate corporate networks through SSL VPN accounts, even those secured with one-time password multi-factor authentication. Once inside, Akira’s affiliates execute one of the most dangerous tactics in moder…
…
continue reading

1
Ex-Hacktivist “Sabu” Backs SafeHill’s $2.6M Bet on Continuous Threat Management
28:04
28:04
Play later
Play later
Lists
Like
Liked
28:04A new cybersecurity startup with an infamous name attached is making headlines. SafeHill—formerly known as Tacticly—has secured $2.6 million in pre-seed funding to accelerate the development of its continuous threat exposure management (CTEM) platform, SecureIQ. Designed to overcome the shortcomings of traditional, point-in-time penetration testing…
…
continue reading