Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
…
continue reading
Server Patching Podcasts
Two guys that couldn’t cut it in the landscaping business bore you with talk about their imaginary lives as IT pros.
…
continue reading
We talk about what's happening in Data & AI every week (well, most weeks). No buzzword bingo or marketing fluff—just honest conversations about the tech that's changing everything. Sometimes we go off on weird tangents about programming languages, tech/startup life, or whatever shiny object caught our attention. Whether you're knee-deep in code or just curious about AI, come hang out with us!
…
continue reading
The ARKeologist's Podcast is a weekly show in which the crew is made up of players from Official PvP Servers on the PC platform. We cover the latest patch notes, threads, and tweets to keep you up-to-date on what is happening and how it effects the Official PvP Server scene for ARK: Survival Evolved. Redbubble Shop - https://www.redbubble.co Join our Discord Channel! - discord.gg/FKqPUc5 Follow me on Twitter - twitter.com/SeanDKnight Follow me on Facebook - https://www.facebook.com/seandknig ...
…
continue reading
Join oZoneprOduct, o_RustyTang_o, and Darth Streisand every Thursday with new episodes covering a range of topics from new operators/maps, patch notes, opinions on the meta game, and reader submitted questions!
…
continue reading
A podcast about all things data, brought to you by data scientist Hugo Bowne-Anderson. It's time for more critical conversations about the challenges in our industry in order to build better compasses for the solution space! To this end, this podcast will consist of long-format conversations between Hugo and other people who work broadly in the data science, machine learning, and AI spaces. We'll dive deep into all the moving parts of the data world, so if you're new to the space, you'll hav ...
…
continue reading
The Biscuit Brigade is a podcast hosted by Rainna SwiftSage that will cover the Survival Sandbox Game she is currently playing ! Currently that is Ark Survival Evolved and Outlaws of the Old West! Find the shownotes & Contact info here: www.RainnaPlays.com Like and Subscribe on YouTube Here: https://www.youtube.com/channel/UCy_K82yBMhOJZS39QkRipgA?view_as=subscriber
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading

1
OpenAI IMO Gold, AWS S3 Vectors, MCP Server Exposés, Sovereign Clouds & the Capex Surge
1:14:41
1:14:41
Play later
Play later
Lists
Like
Liked
1:14:41Thanks for listening—subscribe and leave a review! Announcing molab (marimo) Marimo debuts molab, a free, cloud‑hosted workspace for running and sharing reactive Python + SQL notebooks straight from the browser. https://marimo.io/blog/announcing-molab OpenAI LLM Claims IMO Gold Researcher Alexander Wei says an experimental OpenAI model solved 5 of …
…
continue reading

1
PyPI Cracks Down on Domain Expiration Attacks to Protect Python Packages
45:01
45:01
Play later
Play later
Lists
Like
Liked
45:01The Python Package Index (PyPI), the backbone of the global Python ecosystem, has rolled out new security safeguards aimed at stopping a dangerous form of supply-chain attack: domain resurrection attacks. These attacks exploit a subtle but devastating weakness—when a maintainer’s email domain expires, attackers can re-register it, hijack the email,…
…
continue reading

1
AI Joins the Fight Against Exploits: Google and Mozilla Patch Dangerous Vulnerabilities
59:42
59:42
Play later
Play later
Lists
Like
Liked
59:42Both Google and Mozilla have rolled out urgent security updates to patch multiple high-severity vulnerabilities in their flagship browsers—Google Chrome and Mozilla Firefox—underscoring the constant arms race between developers and cyber attackers. Google’s update addresses a critical out-of-bounds write vulnerability (CVE-2025-9132) within Chrome’…
…
continue reading

1
Britain Backs Down: UK Drops Encryption Backdoor Demand on Apple
20:29
20:29
Play later
Play later
Lists
Like
Liked
20:29A major international clash over encryption has come to a dramatic resolution. Earlier this year, the U.K. government, acting under its controversial Investigatory Powers Act of 2016 (IPA)—better known as the “Snoopers’ Charter”—issued a secret Technical Capacity Notice to Apple, demanding that the company weaken its Advanced Data Protection (ADP) …
…
continue reading

1
PipeMagic Backdoor: How Ransomware Actors Exploited a Windows Zero-Day
54:55
54:55
Play later
Play later
Lists
Like
Liked
54:55In early 2025, Microsoft and security researchers uncovered PipeMagic, a modular and memory-resident backdoor that has been quietly leveraged in ransomware campaigns worldwide. Disguised as a legitimate ChatGPT desktop application, this sophisticated malware granted persistent access, precise control, and stealthy communication channels to its oper…
…
continue reading

1
270,000 Intel Employee Records at Risk from Authentication Bypass and Hardcoded Credentials
36:28
36:28
Play later
Play later
Lists
Like
Liked
36:28In late 2024, Intel faced a major cybersecurity wake-up call when security researcher Eaton Zveare uncovered a series of vulnerabilities inside the company’s internal systems—flaws that exposed employee and supplier data at unprecedented scale. These vulnerabilities, later confirmed and patched by Intel, included authentication bypasses in web appl…
…
continue reading

1
How Social Engineering and Vendor Weaknesses Led to Allianz Life’s Massive Breach
41:45
41:45
Play later
Play later
Lists
Like
Liked
41:45In July 2025, Allianz Life Insurance Company of North America confirmed a data breach impacting over 1.1 million customers, financial professionals, and employees—a stark reminder of how vulnerable even the most established financial institutions remain to evolving cyber threats. The breach stemmed from a third-party vendor compromise, specifically…
…
continue reading

1
Cloud Computing Heist: $3.5 Million Fraud Leads to Prison for Fake Crypto Influencer
47:58
47:58
Play later
Play later
Lists
Like
Liked
47:58The U.S. Department of Justice has closed the chapter on one of the most audacious cloud fraud and cryptojacking schemes in recent years. Charles O. Parks III, known online as “CP3O” and the self-styled “MultiMillionaire,” has been sentenced for orchestrating a multimillion-dollar scam that defrauded leading cloud providers out of more than $3.5 mi…
…
continue reading

1
Embassy Espionage: Kimsuky and Suspected Chinese Partners Deploy XenoRAT in Seoul
1:04:58
1:04:58
Play later
Play later
Lists
Like
Liked
1:04:58A new wave of state-sponsored cyber espionage is sweeping across South Korea, targeting foreign embassies through highly tailored, multi-stage spearphishing campaigns. Security researchers at Trellix have uncovered that this operation—likely linked to North Korea’s Kimsuky (APT43) group but with indicators of Chinese involvement—has been active sin…
…
continue reading

1
GSMA Confirms Flaws: Researchers Unveil Dangerous 5G Sniffing and Injection Attack
51:18
51:18
Play later
Play later
Lists
Like
Liked
51:18A groundbreaking security study from the Singapore University of Technology and Design has revealed a major vulnerability in 5G networks that allows attackers to bypass traditional defenses—without even needing a rogue base station. The newly released Sni5Gect attack framework demonstrates how adversaries within range of a victim can intercept and …
…
continue reading

1
SAP NetWeaver Under Siege: New Exploit Chains Threaten Global Enterprises
44:53
44:53
Play later
Play later
Lists
Like
Liked
44:53SAP NetWeaver, one of the world’s most critical enterprise platforms, is under active attack from both ransomware groups and state-backed hackers. A newly released exploit combines two devastating vulnerabilities—CVE-2025-31324 and CVE-2025-42999—to bypass authentication and execute malicious code with full administrative privileges. With CVSS scor…
…
continue reading

1
GitHub CEO Exits, Claude 1M Tokens, Gemma 3 & GPT-5 Tweaks
55:28
55:28
Play later
Play later
Lists
Like
Liked
55:28Thanks again for listening! Follow us on YouTube or wherever you get your podcasts. Discussed news articles GitHub just got less independent at Microsoft after CEO resignation — The Verge (Aug 11, 2025) Thomas Dohmke steps down; GitHub leadership folds more tightly into Microsoft’s CoreAI org. https://www.theverge.com/news/757461/microsoft-github-t…
…
continue reading

1
Ransomware Gangs Deploy Kernel-Level EDR Killers to Evade Detection
34:36
34:36
Play later
Play later
Lists
Like
Liked
34:36Ransomware gangs are no longer just encrypting files and demanding payment—they are actively targeting the very defenses meant to stop them. Recent reports reveal a dramatic surge in the use of EDR killer tools, specialized malware designed to disable Endpoint Detection and Response (EDR) and antivirus systems at the kernel level. By silencing thes…
…
continue reading

1
Chinese APTs Target Taiwan: UAT-7237’s SoundBill Loader and Gelsemium’s FireWood Backdoor
25:50
25:50
Play later
Play later
Lists
Like
Liked
25:50Taiwan continues to face an unprecedented wave of cyberattacks, with new intelligence exposing two distinct but sophisticated campaigns linked to Chinese threat actors. Together, they underscore Beijing’s increasingly aggressive cyber posture against Taiwan’s digital and critical infrastructure. The first campaign, attributed to UAT-7237, a subgrou…
…
continue reading

1
Colt Cyberattack: Multi-Day Outages After WarLock Ransomware Exploited SharePoint Zero-Day
25:58
25:58
Play later
Play later
Lists
Like
Liked
25:58Colt Technology Services, a major UK-based telecommunications provider with operations in over 40 countries, has confirmed that the WarLock ransomware group is behind the cyberattack that struck its systems on August 12, 2025. The attack caused multi-day outages across Colt’s hosting, porting, Voice API, and customer support services, while sparing…
…
continue reading

1
Workday Breach Tied to Third-Party CRM Hack in ShinyHunters Campaign
33:43
33:43
Play later
Play later
Lists
Like
Liked
33:43Workday, one of the world’s leading providers of human resources and financial management software, has confirmed a data breach that exposed business contact information through a third-party CRM platform, not its core HR or financial systems. Discovered on August 6, 2025, the breach revealed names, email addresses, and phone numbers—data that, whi…
…
continue reading

1
DOJ Brings Down Zeppelin Ransomware Operator, Seizes Millions in Crypto
36:35
36:35
Play later
Play later
Lists
Like
Liked
36:35The U.S. Department of Justice has successfully dismantled a major operator behind the notorious Zeppelin ransomware, charging Russian national Ianis Aleksandrovich Antropenko with conspiracy to commit computer fraud, money laundering, and extortion. Antropenko, known online as “china.helper,” allegedly deployed Zeppelin ransomware in targeted camp…
…
continue reading

1
U.S. Sanctions Grinex, the Russian Crypto Exchange Born from Garantex’s Ashes
38:12
38:12
Play later
Play later
Lists
Like
Liked
38:12The U.S. Department of the Treasury has announced sweeping sanctions against Grinex, a Russian-linked cryptocurrency exchange identified as the direct successor to the previously sanctioned Garantex. Garantex, operational since 2019, was a major hub for laundering billions of dollars in criminal proceeds, including payments from some of the world’s…
…
continue reading

1
Canadian House of Commons Breach Tied to Microsoft SharePoint Zero-Day
10:49
10:49
Play later
Play later
Lists
Like
Liked
10:49On August 8th, 2025, hackers breached the Canadian House of Commons by exploiting a critical Microsoft SharePoint zero-day vulnerability—CVE-2025-53770—with a severity score of 9.8. The attack compromised a database containing sensitive employee information, including names, job titles, office locations, email addresses, and technical details about…
…
continue reading

1
Norwegian Authorities Blame Pro-Russian Hackers for Critical Infrastructure Breach
16:20
16:20
Play later
Play later
Lists
Like
Liked
16:20In April 2025, Norway experienced a chilling reminder of the risks facing its critical infrastructure when pro-Russian hackers took control of the Lake Risevatnet dam near Svelgen. For four hours, the attackers manipulated the dam’s outflow valves, releasing 500 liters of water per second into the surrounding river. While the incident caused no phy…
…
continue reading

1
MadeYouReset: New HTTP/2 Flaw Could Unleash Massive DDoS Storms
40:39
40:39
Play later
Play later
Lists
Like
Liked
40:39A newly disclosed HTTP/2 vulnerability—dubbed MadeYouReset (CVE-2025-8671)—is making waves across the cybersecurity community for its potential to power devastating Denial-of-Service attacks. Building on the 2023 “Rapid Reset” flaw, this attack vector exploits a design oversight where servers keep processing backend requests even after a stream is …
…
continue reading

1
Cybersecurity Budgets Hit Historic Slowdown as Global Tensions Mount
28:13
28:13
Play later
Play later
Lists
Like
Liked
28:13Global cybersecurity strategies are being tested like never before as organizations face the dual pressure of escalating cyber threats and shrinking budgets. Both IANS and Swimlane report that cybersecurity budget growth has slowed to its lowest point in five years—just 4%—driven by global economic instability, inflation, shifting interest rates, a…
…
continue reading

1
Episode 56: DeepMind Just Dropped Gemma 270M... And Here’s Why It Matters
45:40
45:40
Play later
Play later
Lists
Like
Liked
45:40While much of the AI world chases ever-larger models, Ravin Kumar (Google DeepMind) and his team build across the size spectrum, from billions of parameters down to this week’s release: Gemma 270M, the smallest member yet of the Gemma 3 open-weight family. At just 270 million parameters, a quarter the size of Gemma 1B, it’s designed for speed, effi…
…
continue reading

1
CVE-2025-53786: The Microsoft Exchange Hybrid Flaw That Could Take Down Your Domain
44:41
44:41
Play later
Play later
Lists
Like
Liked
44:41A critical security flaw, tracked as CVE-2025-53786, is putting tens of thousands of organizations at risk — and U.S. federal agencies are under orders to patch it immediately. This high-severity vulnerability affects Microsoft Exchange Server in hybrid configurations, where on-premises deployments are connected to Microsoft 365 cloud environments.…
…
continue reading

1
Allianz Life Breach: 2.8 Million Records Leaked in Salesforce Hack
48:19
48:19
Play later
Play later
Lists
Like
Liked
48:19On July 16, 2025, Allianz Life Insurance Company of North America confirmed a major data breach that exposed up to 2.8 million sensitive records belonging to customers, financial professionals, business partners, and even some employees. But the company’s internal systems weren’t the target — instead, attackers compromised a third-party, cloud-base…
…
continue reading

1
Charon Ransomware Targets Middle East Government and Aviation Sectors
25:27
25:27
Play later
Play later
Lists
Like
Liked
25:27A newly discovered ransomware family named Charon is making waves in the cybersecurity world — and not for good reasons. Targeting government agencies and the aviation industry in the Middle East, Charon blends the disruptive financial motives of ransomware with the stealth and persistence usually reserved for Advanced Persistent Threat (APT) opera…
…
continue reading

1
August 2025 Patch Tuesday: Microsoft and Adobe Fix Over 170 Security Flaws
33:00
33:00
Play later
Play later
Lists
Like
Liked
33:00August 2025’s Patch Tuesday brought major security updates from two of the biggest names in technology — Microsoft and Adobe — addressing a combined 170+ vulnerabilities across widely used products. The scale and severity of these updates make them critical for IT teams and security leaders to implement without delay. Microsoft’s security release f…
…
continue reading

1
RansomHub Hits Michigan’s Manpower — Data Breach Exposes 140,000 Individuals
16:54
16:54
Play later
Play later
Lists
Like
Liked
16:54Manpower, a major staffing company based in Lansing, Michigan, has confirmed a ransomware attack that exposed the personal data of approximately 140,000 individuals. The breach, attributed to the notorious RansomHub group, went undetected for weeks — from late December 2024 to mid-January 2025 — during which attackers maintained access to Manpower’…
…
continue reading

1
Episode 55: From Frittatas to Production LLMs: Breakfast at SciPy
38:08
38:08
Play later
Play later
Lists
Like
Liked
38:08Traditional software expects 100% passing tests. In LLM-powered systems, that’s not just unrealistic — it’s a feature, not a bug. Eric Ma leads research data science in Moderna’s data science and AI group, and over breakfast at SciPy we explored why AI products break the old rules, what skills different personas bring (and miss), and how to keep sy…
…
continue reading

1
Security Firms Warn GPT-5 Is Wide Open to Jailbreaks and Prompt Attacks
44:26
44:26
Play later
Play later
Lists
Like
Liked
44:26Two independent security assessments have revealed serious vulnerabilities in GPT-5, the latest large language model release. NeuralTrust’s red team demonstrated a “storytelling” jailbreak, a multi-turn conversational exploit that gradually steers the AI toward producing harmful instructions without triggering its single-prompt safeguards. By embed…
…
continue reading

1
Germany’s Top Court Limits Police Spyware to Serious Crimes Only
39:06
39:06
Play later
Play later
Lists
Like
Liked
39:06Germany’s Federal Constitutional Court has issued a landmark ruling sharply restricting the use of state spyware by law enforcement. The decision directly addresses 2017 regulations that allowed police to monitor encrypted communications with few limitations. Now, spyware may only be deployed in investigations of serious crimes punishable by at lea…
…
continue reading

1
BadCam: Lenovo Webcam Flaw Turns Everyday Cameras into Remote BadUSB Attack Tools
53:04
53:04
Play later
Play later
Lists
Like
Liked
53:04A new hardware security warning has emerged with the discovery of BadCam, a set of vulnerabilities in certain Lenovo webcams that could allow attackers to transform them into BadUSB devices. Uncovered by Eclypsium researchers, the flaw shows that attackers no longer need physical access to a USB peripheral to compromise it — they can now remotely r…
…
continue reading

1
Free Wi-Fi Loophole Lets Hackers Breach Smart Bus Control Systems
46:40
46:40
Play later
Play later
Lists
Like
Liked
46:40A new cybersecurity investigation has revealed that the same free passenger Wi-Fi offered on many smart buses is directly connected to critical onboard systems — creating a massive, exploitable security gap. Researchers demonstrated that, with no network segmentation in place, anyone on the free Wi-Fi could pivot into systems controlling driver ass…
…
continue reading

1
ReVault: Critical Dell Firmware Flaws Allow Windows Login Bypass and Persistent Implants
48:07
48:07
Play later
Play later
Lists
Like
Liked
48:07In a powerful reminder that hardware security is just as critical as software defense, Cisco Talos researchers have uncovered “ReVault,” a collection of five high-severity firmware vulnerabilities in Dell’s ControlVault3 subsystem. These flaws impact over 100 Dell laptop models, including the Latitude, Precision, and XPS series—devices used widely …
…
continue reading

1
Air France–KLM Data Breach Exposes Customer Info via Compromised Third-Party Platform
36:56
36:56
Play later
Play later
Lists
Like
Liked
36:56The aviation industry has suffered yet another major cybersecurity incident. Air France and KLM have confirmed a data breach impacting customer records via an external customer service platform. While no sensitive financial or identity documents were compromised, attackers successfully accessed unspecified customer data—prompting both airlines to n…
…
continue reading

1
Critical Flaws in CyberArk Conjur and HashiCorp Vault Put Enterprise Secrets at Risk
37:29
37:29
Play later
Play later
Lists
Like
Liked
37:29Enterprise secrets managers—long considered the most secure components in modern infrastructure—are now under fire. In a groundbreaking report, cybersecurity firm Cyata revealed 14 critical zero-day vulnerabilities across CyberArk Conjur and HashiCorp Vault, exposing flaws that allow unauthenticated attackers to achieve remote code execution (RCE),…
…
continue reading

1
Prompt Injection Nightmare: Critical AI Vulnerabilities in ChatGPT, Copilot, Gemini & More
56:52
56:52
Play later
Play later
Lists
Like
Liked
56:52Enterprise AI assistants are revolutionizing productivity—but they’re also opening new doors for cyberattacks. In this episode, we explore explosive research from Zenity Labs, which reveals that leading AI tools like ChatGPT, Microsoft Copilot, Google Gemini, Cursor, and Salesforce Einstein are vulnerable to prompt injection attacks—a class of expl…
…
continue reading

1
From Google to LVMH: ShinyHunters’ Salesforce Breaches Spark Global Ransom Crisis
46:37
46:37
Play later
Play later
Lists
Like
Liked
46:37A new wave of cyber extortion is sweeping across global enterprises, and the battlefield is Salesforce CRM. The notorious **ShinyHunters group—tracked internally by Google as UNC6040/UNC6240—**has launched a coordinated series of breaches using vishing (voice phishing) to compromise employee credentials, exfiltrate sensitive customer data, and dema…
…
continue reading

1
Cisco Hit by Vishing Attack: CRM Breach Exposes Millions of User Profiles
31:43
31:43
Play later
Play later
Lists
Like
Liked
31:43Cisco has confirmed a new data breach after a vishing (voice phishing) attack tricked a company representative into exposing access to a third-party CRM system. Detected on July 24, 2025, the breach compromised basic user details such as names, emails, and phone numbers of Cisco.com registrants. While the data was non-sensitive, the incident unders…
…
continue reading

1
Ox Security Unveils Agent Ox: AI Tool That Writes Tailored Fixes for Software Vulnerabilities
52:37
52:37
Play later
Play later
Lists
Like
Liked
52:37The world of application security is shifting dramatically as AI begins to move from simply flagging vulnerabilities to actively fixing them. Ox Security has launched Agent Ox, a groundbreaking AI-powered extension designed to automate secure, organization-specific code fixes. Unlike generic coding assistants that offer boilerplate advice, Agent Ox…
…
continue reading

1
Meta Deletes 6.8 Million Scam Accounts as AI-Powered Fraud Rings Exploit WhatsApp
34:45
34:45
Play later
Play later
Lists
Like
Liked
34:45Meta has removed 6.8 million accounts tied to criminal scam centers in the first half of 2025, marking one of the most aggressive crackdowns on digital fraud in the company’s history. The move comes amid an alarming surge in online scams that cost global victims $16.6 billion in 2024 alone, a 33% increase from the year before. Many of these scams a…
…
continue reading

1
Meta Found Liable: Jury Rules Against Tech Giant in Flo Health Privacy Case
30:59
30:59
Play later
Play later
Lists
Like
Liked
30:59In a landmark decision, a California jury has ruled Meta guilty of violating user privacy laws in a class-action lawsuit tied to the popular Flo Health period tracking app. Plaintiffs alleged that Meta, through embedded software tools and tracking pixels, collected deeply personal menstrual and fertility data — from period dates to pregnancy goals …
…
continue reading

1
TSMC Insider Threat: Six Arrested in Taiwan Over 2nm Chip Trade Secrets
1:06:45
1:06:45
Play later
Play later
Lists
Like
Liked
1:06:45In a stunning development, Taiwanese authorities have arrested six individuals suspected of stealing trade secrets from Taiwan Semiconductor Manufacturing Co. (TSMC), the world’s most advanced semiconductor producer. At the heart of the case is TSMC’s 2-nanometer (2nm) chip technology, a crown jewel in the global race for next-generation AI and hig…
…
continue reading

1
Approov Secures £5M to Fortify Mobile App and API Security Against AI-Driven Threats
55:37
55:37
Play later
Play later
Lists
Like
Liked
55:37In a major step for mobile and API cybersecurity, Approov, the Edinburgh-based security firm specializing in real-time mobile attestation and API protection, has raised £5 million (approximately $6.7 million) in Series A funding. The round, led by the Investment Fund for Scotland with support from Souter Investments, Lanza techVentures, and Scottis…
…
continue reading

1
Pwn2Own Ireland 2025: $1M WhatsApp Exploit Bounty Raises the Stakes
1:07:32
1:07:32
Play later
Play later
Lists
Like
Liked
1:07:32This October, Pwn2Own Ireland 2025 will take over Cork with one of the most ambitious cybersecurity competitions yet. Co-sponsored by Meta and organized by Trend Micro’s Zero Day Initiative (ZDI), the event is putting record-breaking payouts on the line — including up to $1 million for a zero-click WhatsApp exploit that can deliver remote code exec…
…
continue reading

1
Nvidia Triton Inference Server Vulnerabilities Expose AI Infrastructure to Attack
1:02:48
1:02:48
Play later
Play later
Lists
Like
Liked
1:02:48A major warning has hit the AI community: Nvidia’s Triton Inference Server — one of the most widely used open-source platforms for deploying and scaling AI models — has been found to contain critical vulnerabilities that could allow attackers to take complete remote control of affected systems. The discovery, made by cloud security firm Wiz, reveal…
…
continue reading

1
CISA & FEMA Release $100M in Cybersecurity Grants to Strengthen State, Local, and Tribal Defenses
43:50
43:50
Play later
Play later
Lists
Like
Liked
43:50The U.S. Department of Homeland Security, through CISA and FEMA, has announced over $100 million in new cybersecurity grant funding for Fiscal Year 2025 — a critical investment aimed at protecting America’s most vulnerable digital frontlines. The funding is split between the State and Local Cybersecurity Grant Program (SLCGP), allocating $91.7 mill…
…
continue reading

1
AI Jailbreaks on the Rise: How Hackers Are Extracting Training Data from LLMs
1:26:28
1:26:28
Play later
Play later
Lists
Like
Liked
1:26:28In this episode, we examine the rapidly growing threat of AI jailbreaks — a cybersecurity challenge reshaping the landscape of large language models (LLMs) and enterprise chatbots. According to the IBM 2025 Cost of a Data Breach Report, 13% of all data breaches now involve AI systems, with the vast majority stemming from jailbreak attacks that circ…
…
continue reading

1
350,000 Patient Records Exposed: Inside the Northwest Radiologists Data Breach
40:18
40:18
Play later
Play later
Lists
Like
Liked
40:18In this episode, we investigate the Northwest Radiologists data breach, a devastating cyberattack that compromised the personal and medical information of approximately 350,000 patients in Washington State between January 20 and January 25, 2025. What began as a so-called “network disruption” was later revealed to be a massive breach that exposed a…
…
continue reading

1
Critical Honeywell Experion PKS Vulnerabilities Threaten Global Industrial Control Systems
1:16:35
1:16:35
Play later
Play later
Lists
Like
Liked
1:16:35In this episode, we analyze the multiple vulnerabilities recently disclosed in Honeywell’s Experion Process Knowledge System (PKS), a widely deployed industrial control and automation solution that underpins operations in energy, chemical plants, manufacturing, healthcare, and transportation sectors worldwide. Reported by CISA and Positive Technolo…
…
continue reading