The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Ransomware Attacks Podcasts
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
David Aaronovitch and a panel of experts and insiders present in-depth explainers on big issues in the news
…
continue reading
The Social-Engineer Podcast is about humans. Understanding how we interact, communicate and relay information can help us protect, mitigate and understand social engineering attacks
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
…
continue reading
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
…
continue reading
Twisted Money Podcast is a podcast on Fraud, Scams, and Deceptions to help the listeners become better informed on fraud and cyber-attacks methods so that listeners don't become a victim of fraud and cyber-attacks.
…
continue reading
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
Is the post-Cold War era over? In this brave new world, nothing is too small, or big, to be digitalised…including acts of war. Russian ransomware attacks almost doubled last year. At this very moment, cybercriminals are crippling schools, supermarkets, dentists, kindergartens, hospitals, oil pipelines - all in the name of money. Katie Puckrik wants to know who, and why. You can listen to the previous series of dot com on this same feed. Series 1 unveils the hidden army of volunteers behind t ...
…
continue reading
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
…
continue reading
HIPAA compliance is complicated, confusing and easy to get wrong. Violations, data breaches and ransomware attacks are everywhere in healthcare. HIPAA Critical brings interviews with leaders in cybersecurity, InfoSec, healthcare, and compliance straight to you. Each 30-minute episode is designed to keep you informed and entertained. A new episode is released on the first three Wednesdays of every month.
…
continue reading
Listen to articles handpicked by our editors, and stay updated on top technology news from TechCrunch.
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
Where timely and relevant security meets puns and witty banter. Our goal is to keep defenders apprised of pertinent news and trends in under forty-five minutes.
…
continue reading
Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
I'm fascinated by what happens in the dark parts of the Internet. Come with me and let's shine some light on it and see what's there.
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading
"Cyberside Chat" is your go-to source for daily cybersecurity news, providing listeners with a comprehensive rundown of the latest threats, vulnerabilities, and attacks in the digital world. Hosted by expert cybersecurity professionals, each episode of "Cyberside Chat" offers a concise and informative overview of the day's top headlines, covering everything from malware and ransomware attacks to data breaches and cyber espionage. Our team of experienced analysts and researchers keeps a close ...
…
continue reading
The cyber war is upon us. We are here to talk about how to keep your business from going bankrupt after a data breach, the legal obligations associated with cyber and privacy law, and all things in between! We welcome questions and comments - call us at 4109175189 or email [email protected]
…
continue reading
Podcasts focused on animal nutrition best practices, feed industry trends and offbeat agriculture news relevant to the global animal feed industry.
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for North America by the 2021, 2022, and 2023 Cybersecurity Excellence Awards and named 2023's Best Tech Podcast by TMCnet. Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. Joe will be speaking wit ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
…
continue reading
The Awareness Angle makes cybersecurity simple. Hosted by Anthony and Luke, we break down security awareness stories, from phishing scams to data breaches, and share practical tips to keep colleagues and employees safe online. We focus on tackling human risk, building a security culture, and making security easy to understand. Whether you’re new to security awareness or want fresh ideas, join us for relatable advice, real-world examples, and strategies to protect your data and stay ahead of ...
…
continue reading
Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Your Microsoft Cloud News from a couple of IT Pros
…
continue reading

1
Fasana’s Collapse: How One Ransomware Attack Crippled a German Manufacturer
41:37
41:37
Play later
Play later
Lists
Like
Liked
41:37Ransomware just bankrupted a 100-year-old manufacturer—and the world should take notice. In this episode, we dissect the cyberattack that brought down Fasana, a German paper napkin producer, and pushed it into insolvency. On May 19, 2025, employees arrived to find printers ejecting extortion notes. By the end of the week, systems were paralyzed, €2…
…
continue reading

1
Health giant Kettering still facing disruption weeks after ransomware attack
3:57
3:57
Play later
Play later
Lists
Like
Liked
3:57A healthcare giant with dozens of facilities across Ohio is still recovering after shutting down nearly all its operations following a ransomware attack. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
…
continue reading

1
SANS Stormcast Tuesday, June 24th, 2025: Ichano ATHome IP Camera Scans; Netscaler Vulnerability; WinRar Vulnerability
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04Scans for Ichano AtHome IP Cameras A couple days ago, a few sources started scanning for the username super_yg and the password 123. This is associated with Ichano IP Camera software. https://isc.sans.edu/diary/Scans%20for%20Ichano%20AtHome%20IP%20Cameras/32062 Critical Netscaler Security Update CVE-2025-5777 CVE 2025-5777 is a critical severity vu…
…
continue reading

1
From Malware to Court: Qilin Ransomware’s ‘Call a Lawyer’ Tactic
43:58
43:58
Play later
Play later
Lists
Like
Liked
43:58In this episode, we take a deep dive into the Qilin ransomware group — now regarded as the world’s leading ransomware-as-a-service (RaaS) operation — and explore how it’s reshaping the cybercrime landscape in 2025. Qilin, also known as Agenda, burst onto the scene in 2022 with a Go-based ransomware. It has since evolved into a highly evasive Rust-b…
…
continue reading

1
Between Two Nerds: The evil genius of Predatory Sparrow
28:37
28:37
Play later
Play later
Lists
Like
Liked
28:37In this edition of Between Two Nerds Tom Uren and The Grugq dive into the motivations and actions of Predatory Sparrow, a purported hacktivist group that has been attacking Iran for the last five years and has leapt into the Iran-Israel war. This episode is also available on Youtube. Show notes
…
continue reading

1
The Robinhood founder who might just revolutionize energy, if he succeeds
7:56
7:56
Play later
Play later
Lists
Like
Liked
7:56Baiju Bhatt is building something the space industry has largely dismissed, and it might be more groundbreaking than anyone realizes. When Baiju Bhatt stepped away from his role as Chief Creative Officer at Robinhood last year, only those close to him could have predicted his next move: launching a space company built around tech Learn more about y…
…
continue reading

1
Zero-Click, Zero-Warning: The FreeType Flaw Behind a Spyware Surge
57:15
57:15
Play later
Play later
Lists
Like
Liked
57:15In this episode, we dive deep into the story behind CVE-2025-27363, a critical zero-click vulnerability in the widely used FreeType font rendering library. Initially discovered by Facebook’s security team and patched by Google in May 2025, this flaw allowed attackers to execute arbitrary code on Android devices—without any user interaction—by explo…
…
continue reading

1
The Insurance Industry Under Fire: Anatomy of the Aflac Cyber Incident
53:58
53:58
Play later
Play later
Lists
Like
Liked
53:58In this episode, we take a deep dive into the June 2025 cyberattack on Aflac, one of the latest strikes in a growing wave of sophisticated, AI-driven cyber campaigns targeting the insurance industry. On June 12, Aflac detected suspicious activity within its U.S. network—a breach attributed to a highly organized cybercrime group and part of a larger…
…
continue reading

1
Beyond Traditional IAM: Are You Prepared for Identity Convergence and the Rise of Agentic AI?
15:47
15:47
Play later
Play later
Lists
Like
Liked
15:47"What we're seeing now is a lot of the vendors that were traditionally one of the identity pillars are kind of expanding into other pillars,” says Kevin Converse, Vice President, Identity and Access Management, GuidePoint Security. In this episode of The Security Strategist podcast, Richard Stiennon speaks with Converse, VP at GuidePoint Security. …
…
continue reading

1
The Nucor Cyberattack: How Ransomware Threatens American Steel
58:40
58:40
Play later
Play later
Lists
Like
Liked
58:40In May 2025, a ransomware attack forced Nucor — one of America’s largest steel producers — to halt its metal production operations. This wasn’t just a corporate IT incident: it disrupted a critical link in the nation’s industrial supply chain. In this episode, we take an in-depth look at the Nucor attack: how cybercriminals targeted operational tec…
…
continue reading

1
Insurance Industry Under Attack, $225 Million Crypto Recovery, US-Israel-Iran Cyber Tensions Escalates, China Targets Russian Assets
19:33
19:33
Play later
Play later
Lists
Like
Liked
19:33🎙️ Scattered Spider DESTROYS Insurance Industry | $225M Crypto Seizure | China vs Russia Cyber War 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 932: Today’s episode will discuss the latest news as Scattered Spider DESTROYS Insurance Industry and more other headlines: · Israel vs …
…
continue reading

1
Voi CEO says he’s open to acquiring Bolt’s micromobility business
4:02
4:02
Play later
Play later
Lists
Like
Liked
4:02Frederik Hjelm, CEO of shared micromobility startup Voi, said he sees a path to acquiring the scooter and bike operations of Bolt, the European mobility super-app best known for ride-hailing. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
…
continue reading

1
Cybersecurity Today: Chinese Hackers Target Canadian Telco, U.S. on Alert for Iranian Cyber Retaliation, and Sitecore XB Critical Vulnerability
16:03
16:03
Play later
Play later
Lists
Like
Liked
16:03In this episode of Cybersecurity Today, hosted by David Shipley, key cybersecurity incidents and threats are discussed. The Canadian Center for Cybersecurity revealed a breach by Chinese state-sponsored hackers of a Canadian telco, with further threats expected to continue targeting Canadian critical infrastructure. The U.S. braces for potential Ir…
…
continue reading

1
Is Your Security Awareness Program Just Ticking Boxes?
49:50
49:50
Play later
Play later
Lists
Like
Liked
49:50This week on The Awareness Angle, Anthony Davis and Luke Pettigrew explore a special episode on what it really takes to build meaningful cybersecurity awareness, as part of preparing for Cybersecurity Awareness Month. 📢 Beyond the Poster Campaign – Open communication channels and positive reinforcement are key to building trust and encouraging peop…
…
continue reading

1
Ep. 310 - The 4th Monday Series - Are You Ready for the Storm? with Lisa Miller
30:42
30:42
Play later
Play later
Lists
Like
Liked
30:42Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today Chris and Mike are joined by Lisa Miller, a former Deputy Insur…
…
continue reading

1
Risky Bulletin: White House rejects nominee for NSA & CyberCom leader
8:09
8:09
Play later
Play later
Lists
Like
Liked
8:09The White House rejects the Pentagon’s nominee for NSA & CyberCom leader, the FCC probes the US Cyber Trust Mark program, a cyberattack disrupts Russia’s animal products industry, and hackers leak data about everyone in Paraguay. Show notes
…
continue reading

1
SANS Stormcast Monday, June 23rd, 2025: ADS and Python; More Secure Cloud PCs; Zend.to Path Traversal; Parser Differentials
5:36
5:36
Play later
Play later
Lists
Like
Liked
5:36ADS & Python Tools Didier explains how to use his tools cut-bytes.py and filescanner to extract information from alternate data streams. https://isc.sans.edu/diary/ADS%20%26%20Python%20Tools/32058 Enhanced security defaults for Windows 365 Cloud PCs Microsoft announced more secure default configurations for its Windows 365 Cloud PC offerings. https…
…
continue reading
In this Risky Bulletin sponsor interview Fletcher Heisler, CEO of Authentik, talks to Tom Uren about the inflection points that make organisations consider rationalising their Identity Providers (IdPs). The pair also discuss sovereign tech stacks and how to earn the trust of customers. Show notes
…
continue reading

1
Inside the $225M Crypto Seizure: How Law Enforcement Traced Illicit Funds Across Borders
1:01:32
1:01:32
Play later
Play later
Lists
Like
Liked
1:01:32A staggering $225 million in illicit cryptocurrency was recently seized by U.S. authorities in what has become the largest digital asset recovery in Secret Service history. This episode unpacks the mechanics, methods, and forensics that made this possible—and how a sprawling network of scams, labor compounds, and fake identities in Southeast Asia u…
…
continue reading

1
Inside CVE-2025-23121: Veeam RCE Flaw Opens Door to Ransomware
47:43
47:43
Play later
Play later
Lists
Like
Liked
47:43Ransomware groups are no longer just encrypting data — they're going straight for the backups. And if those backups aren’t properly protected, recovery becomes impossible, and ransom payouts more likely. In this episode, we dive deep into how threat actors are exploiting critical vulnerabilities in widely used backup systems, focusing on the recent…
…
continue reading

1
Inside the 16 Billion Credential Leak: The Infostealer Engine Behind the Biggest Breach Yet
54:27
54:27
Play later
Play later
Lists
Like
Liked
54:27In this episode, we break down the true scale and mechanics behind the largest credential leak ever recorded—over 16 billion login credentials, most of them exfiltrated by infostealer malware. We dive into how this happened: from the malware-as-a-service (MaaS) model enabling even low-skill threat actors to deploy powerful stealers, to how credenti…
…
continue reading

1
AI Vulnerabilities and the Gentle Singularity: A Deep Dive with Project Synapse
1:00:59
1:00:59
Play later
Play later
Lists
Like
Liked
1:00:59In this thought-provoking episode of Project Synapse, host Jim and his friends Marcel Gagne and John Pinard delve into the complexities of artificial intelligence, especially in the context of cybersecurity. The discussion kicks off by revisiting a blog post by Sam Altman about reaching a 'Gentle Singularity' in AI development, where the progress t…
…
continue reading

1
‘Kid-pilled’ Sam Altman ‘constantly’ asked ChatGPT questions about his newborn
4:32
4:32
Play later
Play later
Lists
Like
Liked
4:32Across hundreds of thousands of years of human existence, an impossible question has befuddled our species: why is the baby crying?! Sam Altman, who is both the father of a three-month-old and CEO of OpenAI, hopped on OpenAI’s new podcast today to talk about how his company is impacting his experience with fatherhood. Learn more about your ad choic…
…
continue reading

1
Over 1,500 Minecraft Users Infected in Stargazers Ghost Malware Campaign
55:17
55:17
Play later
Play later
Lists
Like
Liked
55:17A malware distribution network hiding in plain sight — on GitHub. This episode unpacks the Stargazers Ghost Network, a massive Distribution-as-a-Service (DaaS) infrastructure run by a threat actor known as Stargazer Goblin. Using over 3,000 GitHub accounts, this operation pushes dangerous information-stealing malware disguised as legitimate game mo…
…
continue reading

1
Why Hackers Target YOU. Dark Web EXPOSED.
58:40
58:40
Play later
Play later
Lists
Like
Liked
58:40Host David Mauro interviews Jeremy Samide, CEO of Blackwired, about why hackers target you. We expose the latest dark web secrets, and the latest social engineering risks. Find more about Blackwired here: https://www.blackwired.com/ Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at…
…
continue reading

1
Chain IQ Breach Exposes UBS & Pictet Employee Data: A Supply Chain Failure
1:05:22
1:05:22
Play later
Play later
Lists
Like
Liked
1:05:22A single vendor was compromised — and suddenly, internal records from UBS, Pictet, Manor, and Implenia were leaked. The Chain IQ cyberattack is a textbook example of how fragile the digital supply chain has become. This episode dissects the breach that exposed names, roles, phone numbers, even CEO contact details of over 137,000 UBS employees, and …
…
continue reading

1
Weaponized GitHub Repositories: How Banana Squad and Water Curse Are Hitting Devs
45:59
45:59
Play later
Play later
Lists
Like
Liked
45:59Cybercriminals are increasingly turning GitHub into a malware distribution network. In this episode, we unpack two of the most alarming recent campaigns: Water Curse and Banana Squad — both targeting developers, red teams, and security professionals through poisoned open-source projects. Water Curse, a financially motivated group, used at least 76 …
…
continue reading
I’m always tempted to start out each episode by talking about a problem, and then setting up our guest as the solution to that problem. It’s formulaic and a bit redundant, but it’s also effective. So I’ll apologize in advance because I’m about to do that very thing again. The difference is that Howard Grimes, the CEO of the Cybersecurity Manufactur…
…
continue reading

1
Oxford City Council Breach Exposes 21 Years of Data
35:51
35:51
Play later
Play later
Lists
Like
Liked
35:51State and local governments are under cyber siege. In this episode, we break down how and why these public institutions have become top targets for attackers — and why the threats are getting worse. Digitization is expanding public access to services, but it's also opening new doors for threat actors. Many local authorities still rely on legacy IT …
…
continue reading

1
Episode 404: The Microsoft 365 Landing Page Shake-Up
37:52
37:52
Play later
Play later
Lists
Like
Liked
37:52Welcome to Episode 404 of the Microsoft Cloud IT Pro Podcast. In this episode, Ben and Scott discuss the latest change Microsoft has rolled out to the Microsoft 365 user experience, redirecting users from the familiar portal.office.com to a new Copilot-centric landing page. This shift has caught many IT professionals off guard, rendering existing t…
…
continue reading

1
Sam Altman says Meta tried and failed to poach OpenAI’s talent with $100M offers
4:16
4:16
Play later
Play later
Lists
Like
Liked
4:16Meta CEO Mark Zuckerberg has been on something of a hiring spree lately, trying to staff up Meta’s new superintelligence team with top-tier AI researchers from competing labs. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
…
continue reading

1
Mic Drop: Catching a tempest in a honeypot
15:21
15:21
Play later
Play later
Lists
Like
Liked
15:21A Chinese hacking group walked right into a trap. Not a firewall. Not a filter. A honeypot. This week, Amazon CSO Steve Schmidt explains how a digital decoy called MadPot helped expose Volt Typhoon—and why, in the age of AI, the real vulnerability isn’t software. It’s people. Learn about your ad choices: dovetail.prx.org/ad-choices…
…
continue reading

1
Exposing Cybersecurity Threats: Breaches, Vulnerabilities, and Evolving Malware
14:28
14:28
Play later
Play later
Lists
Like
Liked
14:28In this episode of 'Cybersecurity Today,' host Jim Love discusses several alarming cybersecurity developments. A recent Washington Post breach raises critical questions about Microsoft 365’s enterprise security as foreign government hackers compromised the email accounts of journalists. Additionally, a critical Linux flaw allows attackers to gain r…
…
continue reading

1
Risky Bulletin: Russian hackers abuse app-specific passwords to bypass MFA
7:46
7:46
Play later
Play later
Lists
Like
Liked
7:46Russian hackers abuse app-specific passwords to bypass multi-factor, the tenth Salt Typhoon victim is identified, Predatory Sparrow destroys $90 million from an Iranian crypto-exchange, and Argentina arrests a Russian disinfo gang. Show notes
…
continue reading

1
SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords
5:46
5:46
Play later
Play later
Lists
Like
Liked
5:46How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.sans.edu/diary/How%20Long%20Until%20the%20Phishing%20Starts%3F%20About%20Two%20Weeks/32052 Scammers hijack websites of Bank of America, N…
…
continue reading