Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Omitb Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
This is an unofficial fancast for the TV show - Only Murders in the Building. We will cover each episode - SPOILERS abound - reviewing the plot, theories of what is going on - and of course picking out continuity errors. Fan feedback will be included. Lestbert33
…
continue reading
Audio Insight on great tv Including Apple TV+'s Silo, Hulu's Only Murders in the Building and 3 Body Problem, Y: The Last Man, The Last Kingdom, Babylon Berlin, 1899, The Crown and Dark on Netflix, Severance, Magpie Murders, AMC's The Terror, Dublin Murders, The Rook and Emerald City!
…
continue reading
Time Crunched Critics is a podcast for busy TV fans, offering honest, straight-forward reviews to help you decide what's a worthwhile watch and what's a simple skip. Check out our Weekly Crunch episodes for quick reviews of all the shows we are watching and catch our Extra-Crunchy episodes for detailed deep-dives into specific shows.
…
continue reading
The Marvelous Mrs. Maisel is a sharp, colorful, hilariously funny and truly groundbreaking show. Written and directed by the incredible power couple Amy Sherman-Palladino and Daniel Palladino on Amazon Prime. We invite you to join in the discussion with Jade, Kara and Erica all about these vibrant, lovable characters and the history of New York and the comedy scene as it evolves from the 50's to present day. We cover all the behind the scenes magic that goes into making this show the masterp ...
…
continue reading

1
Let's Solve ONLY MURDERS IN THE BUILDING season 5 episode 6 'Flatbush' Recap Theory #omitb s5e06
19:28
19:28
Play later
Play later
Lists
Like
Liked
19:28Who says 'you can't go home again'? ONLY MURDERS IN THE BUILDING Season 5, Episode 6 "Flatbush" has Charles catfished, Loretta red-hot about losing her apartment, Oliver moving out, and a casino moving in??? + Sunny and Cloudy back together! 00:00 Intro 00:05 Lester at the Wedding 01:05 Let's Solve Only Murders in the Building 02:17 Credit Clue Eas…
…
continue reading

1
Weekly Crunch - English Teacher, Survivor 49, Wayward, Morning Show, & OMITB
21:12
21:12
Play later
Play later
Lists
Like
Liked
21:12This week, The Time Crunched Critics review English Teacher (Season 2), Survivor 49 (Ep. 1), Wayward (entire limited series) and the recent episodes of their weekly shows, The Morning Show and Only Murders in the Building. Are they worthwhile watches or safe skips?By Jennifer and Mike
…
continue reading
CISA furloughs most of its workforce due to the government shutdown. The U.S. Air Force confirms it is investigating a SharePoint related breach. Google warns of a large-scale extortion campaign targeting executives. Researchers uncover Android spyware campaigns disguised as popular messaging apps. An extortion group claims to have breached Red Hat…
…
continue reading

1
SLOW HORSES s5e02 'Incommunicado' | Slough House podcast Apple TV Plus review recap #slowhorses s5e2
50:59
50:59
Play later
Play later
Lists
Like
Liked
50:59SLOW HORSES: SLOUGH HOUSE podcast races into Episode 2. Roddy grabs an anime sword, Shirley grabs a needle, the villains grab an assassin's neck, and the Park's dogs grab our heroes! A fast funny Slow Horses s5 episode 2 'Incommunicado' breakdown on Apple TV Plus! 00:00 Intro 01:39 Catfish's rating 03:07 Bubba's rating 05:58 Call to Action 06:46 Wh…
…
continue reading
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are …
…
continue reading
Major federal cybersecurity programs expire amidst the government shutdown. Global leaders and experts convene in Riyadh for the Global Cybersecurity Forum. NIST tackles removable media. ICE buys vast troves of smartphone location data. Researchers claim a newly patched VMware vulnerability has been a zero-day for nearly a year. ClickFix-style atta…
…
continue reading
CISA issues an urgent warning about active exploitation of a critical vulnerability in the sudo utility. Broadcom patches two high-severity vulnerabilities in VMware NSX. South Korea raises its national cyber threat level after a datacenter fire. Formbricks patches a critical token validation flaw. Microsoft blocks a credential phishing campaign th…
…
continue reading
Please enjoy this encore of Word Notes. A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence. CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-kill-chain Audio reference link: "Cybersecurity Days: A Network Defender's Future," by Rick Howard, I…
…
continue reading
A Chinese state-sponsored group exploited enterprise devices in a global espionage effort. The UK Government guarantees £1.5 billion financing to help Jaguar Land Rover’s recovery efforts. A maximum-severity flaw in Fortra’s GoAnywhere Managed File Transfer product is under active exploitation. The AI boom faces sustainability questions. Akira rans…
…
continue reading

1
Joe Carrigan: Build your network. [Security engineer] [Career Notes]
10:39
10:39
Play later
Play later
Lists
Like
Liked
10:39Please enjoy this encore of Career Notes. Senior security engineer with the Johns Hopkins University Information Security Institute and the Institute for Assured Autonomy, Joe Carrigan, shares what he calls his life mistake and what spurred him to finally choose a career in technology. Throughout his life, Joe had interest in technology, he even wo…
…
continue reading

1
SLOW HORSES s5e01 'Bad Dates' | Slough House podcast Apple TV Plus review recap #slowhorses s5e1
45:55
45:55
Play later
Play later
Lists
Like
Liked
45:55Welcome back to SLOW HORSES: SLOUGH HOUSE podcast. In the first episode of Season 5, Roddy's Beats gets smashed, Jackson's peaceful breakfast gets dashed, and Shirley's coke snorting gets crashed by River! Good morning Slow Horses s5 episode 1 'Bad Dates' breakdown on Apple TV Plus! 00:00 Intro 01:27 Bubba's rating 02:46 Catfish's rating 04:50 Call…
…
continue reading
This week, we are joined by Martin Zugec, Technical Solutions Director from Bitdefender, sharing their work and findings on "EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company. A newly identified Chinese APT group has been observed deploying a sophisticated, fileless malware framework called EggStreme against a…
…
continue reading
CISA gives federal agencies 24 hours to patch a critical Cisco firewall bug. Researchers uncover the first known malicious MCP server used in a supply chain attack. The New York SIM card threat may have been overblown. Microsoft tags a new variant of the XCSSET macOS malware. An exposed auto insurance claims database puts PII at risk. Amazon will p…
…
continue reading
Fortra flags a critical flaw in its GoAnywhere Managed File Transfer (MFT) solution. Cisco patches a critical vulnerability in its IOS and IOS XE software. Cloudflare thwarts yet another record DDoS attack. Rhysida ransomware gang claims the Maryland Transit cyberattack. The new “Obscura” ransomware strain spreads via domain controllers. Retailers’…
…
continue reading
This week, while Dave Bittner is out, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and …
…
continue reading

1
Let's Solve ONLY MURDERS IN THE BUILDING season 5 episode 5 'Tongue Tied' Recap Theory #omitb s5e05
22:24
22:24
Play later
Play later
Lists
Like
Liked
22:24If money buys silence, who's silent? ONLY MURDERS IN THE BUILDING Season 5, Episode 5 "Tongue Tied" brings the upstairs residents and downstairs staff of the Arconia together for Arconiacon - the first-ever tenant/staff mingle for hard truths and no snacks - singing optional! Charles' test trial drug trip brings a steamy night with Sofia! 00:00 Int…
…
continue reading
British authorities arrest a man in connection with the Collins Aerospace ransomware attack. CISA says attackers breached a U.S. federal civilian executive branch agency last year. Researchers uncover two high-severity vulnerabilities in Supermicro server motherboards. A Las Vegas casino operator confirms a cyber attack. Analysts track multiple lar…
…
continue reading
The Secret Service dismantles an illegal network. Jaguar Land Rover (JLR) extends the shutdown production plants. The EU probes tech giants over online scams. Iranian APT Nimbus Manticore expands operations in Europe. North Korean Kimsuky deploys a shortcut-based espionage campaign. Github and Ruby Central roll out supply-chain security upgrades. L…
…
continue reading

1
The existing state of regulation. [CISO Perspectives]
39:30
39:30
Play later
Play later
Lists
Like
Liked
39:30Regulation is a double-edged sword. While it helps create structure, establish accountability, and set standards, it also creates unnecessary hurdles, slower response times, and overly rigid systems. With every administration, policy goals and subsequently regulatory stances change, which can have major impacts on business operations. In this episo…
…
continue reading
Please enjoy this encore of Word Notes. A subset of security orchestration, the management of identities across an organization's set of digital islands. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-orchestrationBy N2K Networks
…
continue reading

1
Weekly Crunch - The Girlfriend, Black Rabbit, The Morning Show, OMITB & Task
19:57
19:57
Play later
Play later
Lists
Like
Liked
19:57This week, The Time Crunched Critics review The Girlfriend, Black Rabbit, The Morning Show, Task and Only Murders in the Building. Are they worthwhile watches or safe skips?By Jennifer and Mike
…
continue reading
A major ransomware attack disrupts airport operations across Europe. Congress is on the verge of letting major cyber legislation expire. A critical flaw nearly allowed total compromise of every Entra ID tenant. Automaker Stellantis confirms a data breach. Fortra patches a critical flaw in its GoAnywhere MFT software. Europol leads a major operation…
…
continue reading

1
Roselle Safran: So much opportunity. [Entrepreneur] [Career Notes]
8:37
8:37
Play later
Play later
Lists
Like
Liked
8:37Please enjoy this encore of Career Notes. CEO and Founder of KeyCaliber, Roselle Safran, takes us on her circuitous career journey from startup to White House and back to startup again. With a degree in civil engineering, Roselle veered off into a more technical role at a startup and she says "caught the startup bug." After convincing a hiring mana…
…
continue reading

1
Browser attacks without downloads. [Research Saturday]
21:45
21:45
Play later
Play later
Lists
Like
Liked
21:45Today we are joined by Nati Tal, Head of Guardio Labs, discussing their work “CAPTCHAgeddon” or unmasking the viral evolution of the ClickFix browser-based threat. CAPTCHAgeddon — Shaked Chen’s deep dive into the ClickFix fake-captcha wave — reveals how a red-team trick morphed into a dominant, download-free browser threat that tricks users into pa…
…
continue reading
OpenAI patches a ChatGPT flaw that could have exposed Gmail data. CISA documents malware exploiting two Ivanti Endpoint Manager Mobile (EPMM) flaws. WatchGuard patches a critical flaw in its Firebox firewalls. MI6 launches a dark web snitch site. The DoD looks to cut its cybersecurity job hiring time just 25 days. Researchers trick ChatGPT agents i…
…
continue reading
SonicWall confirms a breach in its cloud backup platform. Google patches a high-severity zero-day in Chrome. Updates on the Shai-Hulud worm. Chinese phishing emails impersonate the chair of the House China Committee. The UK’s NCA takes the reins of the Five Eyes Law Enforcement Group. RevengeHotels uses AI to deliver VenomRAT to Windows systems. A …
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and…
…
continue reading
In this Extra Crunchy episode, the Time Crunched Critics dive into the 77th Primetime Emmy Awards — sharing their reviews, breaking down nominees and winners, discussing specific shows, calling out some surprising upsets, and curating a must-watch list. Plus, they’ll clue you in on the shows to keep an eye on this year.…
…
continue reading
A new self-replicating malware infects the NPM repository. Microsoft and Cloudflare disrupt a Phishing-as-a-Service platform. Researchers uncover a new Fancy Bear backdoor campaign. The VoidProxy phishing-as-a-service (PhaaS) platform targets Microsoft 365 and Google accounts. A British telecom says its ransomware recovery may stretch into November…
…
continue reading

1
Let's Solve ONLY MURDERS IN THE BUILDING season 5 episode 4 'Dirty Birds' Recap Theory #omitb s5e04
16:01
16:01
Play later
Play later
Lists
Like
Liked
16:01Is Jay the actual Jay? We go birding via Google to ask why Vince Fish thinks Jay is the Eurasian Jay in Lester's ledger! ONLY MURDERS IN THE BUILDING Season 5, Episode 4 "Dirty Birds" fly across the Arconia with lies, betrayal, and duck à l'orange! Mabel's eye lashes flutter either from Jay Pflug or the PBR! Howard hangs with LESTR so look at his h…
…
continue reading
A controversial Trump administration deal gives the U.A.E. access to cutting-edge U.S. AI chips. FlowiseAI warns of a critical account takeover vulnerability. A new social engineering campaign impersonates Meta account suspension notices. A macOS Spotlight 0-day flaw bypasses Apple’s Transparency, Consent, and Control (TCC) protections. Are cost sa…
…
continue reading

1
Weekly Crunch - The Paper, Task, & Only Murders in the Building
14:04
14:04
Play later
Play later
Lists
Like
Liked
14:04This week, The Time Crunched Critics review The Paper, Task and Only Murders in the Building. Are they worthwhile watches or safe skips?By Jennifer and Mike
…
continue reading
Please enjoy this encore of Word Notes. A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: http…
…
continue reading

1
The return of CISO Perspectives. [CISO Perspectives]
3:21
3:21
Play later
Play later
Lists
Like
Liked
3:21This season on CISO Perspectives—your host, Kim Jones is digging into the issues shaping the future of cybersecurity leadership. From the regulations every CISO needs to understand, to the unexpected places privacy risks are emerging, to the new ways fraud and identity are colliding—these conversations will sharpen your strategies and strengthen yo…
…
continue reading
FBI botnet disruption leaves cybercriminals scrambling to pick up the pieces. Notorious ransomware gangs announce their retirement, but don’t hold your breath. Hacktivists leak data tied to China’s Great Firewall. A new report says DHS mishandled a key program designed to retain cyber talent at CISA. GPUGate malware cleverly evades analysis. WhiteC…
…
continue reading

1
Let's Solve ONLY MURDERS IN THE BUILDING season 5 episode 3 'Rigor' Recap Theory #omitb s5e03 s5e3
15:43
15:43
Play later
Play later
Lists
Like
Liked
15:43It's weekend at the Arconia! Oliver stinks up the elevator, Charles takes experimental drugs & Mabel doomscrolls her Insta account: ONLY MURDERS IN THE BUILDING Season 5, Episode 3 "Rigor" rolls out a chatty corpse, a Wondify songstress and a young man with more billions than fingers! 00:00 Intro 00:02 Killer Intros 01:17 Let's Solve Only Murders i…
…
continue reading

1
Helen Patton: A platform to talk about security. [CISO] [Career Notes]
10:45
10:45
Play later
Play later
Lists
Like
Liked
10:45Please enjoy this encore of Career Notes. Advisory CISO at Cisco, Helen Patton, shares that a combination of dumb luck, hard work and serendipity that got her to where she is today. Growing up in the country in Australia, Helen notes that computers were not really a thing. She happened into technology after moving to the US, as she was the only per…
…
continue reading

1
Data leak without a click. [Research Saturday]
22:02
22:02
Play later
Play later
Lists
Like
Liked
22:02Today we are joined by Amanda Rousseau, Principal AI Security Researcher from Straiker, discussing their work on "The Silent Exfiltration: Zero‑Click Agentic AI Hack That Can Leak Your Google Drive with One Email." Straiker’s research found that enterprise AI agents can be silently manipulated to leak sensitive data, even without user clicks or ale…
…
continue reading
Samsung patches a critical Android zero-day vulnerability. Microsoft resolves a global Exchange Online outage. CISA reaffirms its commitment to the CVE program. California passes a bill requiring web browsers to let users automatically send opt-out signals. Apple issues spyware attack warnings. The FTC opens an investigation into AI chatbots on how…
…
continue reading

1
Let's Solve ONLY MURDERS IN THE BUILDING season 5 episode 2 'After You' Recap Theory #omitb s5e02
19:21
19:21
Play later
Play later
Lists
Like
Liked
19:21Sit back and enjoy 32 years of The Arconia's history as we see Lester's first day and last day as a Doorman! And he only has two ages: Too Young Lester and Final Lester. More questions arise as he makes the mistake of taking the cash! 00:00 Intro 00:02 Listen to the subtle show 01:10 Let's Solve Only Murders in the Building 01:59 Credit Clue Easter…
…
continue reading
The House passes a defense policy bill that includes new provisions on cybersecurity and artificial intelligence. Senator Wyden accuses Microsoft of “gross cybersecurity negligence” after a 2024 ransomware attack crippled healthcare giant Ascension. The White House shelves plans to split U.S. Cyber Command and the NSA. The Pentagon finalizes its lo…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal …
…
continue reading
Patch Tuesday. A data leak sheds light on North Korean APT Kimsuky. Apple introduces Memory Integrity Enforcement. Ransomware payments have dropped sharply in the education sector in 2025. A top NCS official warns ICS security lags behind, and a senator calls U.S. cybersecurity a “hellscape”. A Ukrainian national faces federal charges and an $11 mi…
…
continue reading