Dive deep into the world of insurance claims with our podcast, newly rebranded as "The Art of Adjusting®"—a title echoing the revered book of the same name. This revamped podcast is not just a beacon for professionals navigating the adjuster landscape but also a wealth of insights for those curious about the intricacies of the industry. We're thrilled to announce that Bill Auten, owner of Auten Claims Management, will now share the mic with a stellar co-host, Chantal Roberts. Chantal isn’t j ...
…
continue reading
Third Party Claims Management Podcasts
Concierge Medicine Today's "DocPreneur Leadership Podcast" has become a trusted voice and is a recorded history of membership medicine in all it's various forms. From Concierge Medicine to Direct Primary Care (DPC) and everything in between it unpacks unique entrepreneurial insights in healthcare ranging from hospitality in healthcare from a patient perspective to interviewing healthcare leaders, Physicians, PAs, NPs, insurance and payor connections, attorneys, interior designers and more. T ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Learn more about the market and stock analysis through CAEE™. CAEE™ is in a unique analytical framework designed to help market participants, researchers, and learners better understand Index performance and long term valuation trends. Our publications and podcast episodes feature insights derived from CAEE™ , which are for use in our educational and analytical services. Email [email protected] to request a CAEE™ based performance report on the magnificent 7 index or to request a ...
…
continue reading
1
$1 Million WhatsApp Exploit Withdrawn—Researcher Silent, Meta Calls It “Low-Risk”
20:22
20:22
Play later
Play later
Lists
Like
Liked
20:22The Pwn2Own Ireland 2025 hacking competition was set to feature one of its most anticipated moments — a $1 million zero-click remote code execution exploit against WhatsApp — but the demonstration never happened. Scheduled to be showcased by researcher Eugene of Team Z3, the exploit’s abrupt withdrawal stunned attendees and quickly became the most …
…
continue reading
1
OpenAI Atlas Omnibox Jailbreak Exposes New AI Security Flaw
35:17
35:17
Play later
Play later
Lists
Like
Liked
35:17A serious vulnerability has been discovered in the OpenAI Atlas omnibox, a hybrid interface designed to handle both URLs and user prompts. Researchers at NeuralTrust revealed that attackers can disguise malicious instructions as URLs to jailbreak the omnibox, taking advantage of how Atlas interprets malformed input. Unlike traditional browsers, Atl…
…
continue reading
1
Microsoft Rushes Emergency Fix for WSUS Remote Code Execution Flaw (CVE-2025-59287)
19:34
19:34
Play later
Play later
Lists
Like
Liked
19:34A critical remote code execution (RCE) flaw, tracked as CVE-2025-59287, has put thousands of enterprise networks at risk by exposing the Windows Server Update Service (WSUS) to active exploitation. The vulnerability, rooted in unsafe object deserialization, allows unauthenticated remote attackers to execute arbitrary code with System-level privileg…
…
continue reading
1
Perplexity Comet AI Browser Launch Exploited in Coordinated Impersonation Scam
23:37
23:37
Play later
Play later
Lists
Like
Liked
23:37The launch of Perplexity’s Comet AI browser — a major step forward in AI-assisted browsing — was almost immediately hijacked by cybercriminals. Within weeks of its July debut, threat intelligence firm BforeAI uncovered a coordinated impersonation campaign designed to exploit public interest in the new product. The campaign involved a web of fraudul…
…
continue reading
1
Lazarus Group Targets European UAV Firms in North Korea’s Drone Espionage Push
27:23
27:23
Play later
Play later
Lists
Like
Liked
27:23A new wave of cyber-espionage attacks reveals North Korea’s deepening effort to steal critical defense technologies from Europe. In a sophisticated campaign dubbed Operation Dream Job, the Lazarus Group — also known as Diamond Sleet and Hidden Cobra — has launched targeted attacks on European defense contractors and UAV (unmanned aerial vehicle) de…
…
continue reading
1
Toys “R” Us Canada Confirms Customer Data Breach After Dark Web Leak
22:47
22:47
Play later
Play later
Lists
Like
Liked
22:47Toys “R” Us Canada has confirmed a customer data breach after records from its database appeared on the dark web on July 30, 2025, prompting a full-scale cybersecurity investigation and disclosure to privacy regulators. The company’s internal review, conducted in partnership with third-party experts, verified that an unauthorized party accessed and…
…
continue reading
1
Kyocera’s Motex Lanscope Hit by Active Attacks: Critical 9.8 Exploit Enables Remote Code Execution
18:05
18:05
Play later
Play later
Lists
Like
Liked
18:05A dangerous zero-day vulnerability in Kyocera Communications subsidiary Motex’s Lanscope Endpoint Manager has triggered a global cybersecurity alert after being actively exploited in real-world attacks. Tracked as CVE-2025-61932, this flaw carries a CVSS severity score of 9.8, allowing remote, unauthenticated attackers to execute arbitrary code sim…
…
continue reading
1
BIND 9 Emergency Patches: ISC Fixes High-Severity Cache Poisoning and DoS Flaws
20:19
20:19
Play later
Play later
Lists
Like
Liked
20:19The Internet Systems Consortium (ISC) has released a series of critical BIND 9 updates to fix multiple high-severity vulnerabilities affecting DNS resolver systems worldwide. The flaws—tracked as CVE-2025-40780, CVE-2025-40778, and CVE-2025-8677—pose serious threats ranging from cache poisoning to denial-of-service (DoS) attacks. These vulnerabilit…
…
continue reading
1
Adobe Confirms Active Exploitation of SessionReaper Vulnerability in Commerce Platforms
29:23
29:23
Play later
Play later
Lists
Like
Liked
29:23A critical new vulnerability is wreaking havoc across the global e-commerce ecosystem. Tracked as CVE-2025-54236 and dubbed SessionReaper, this flaw affects Adobe Commerce and Magento Open Source platforms, allowing attackers to bypass security features and seize control of customer accounts through the Commerce REST API. Despite Adobe releasing em…
…
continue reading
1
AI Sidebar Spoofing: How Malicious Extensions Hijack ChatGPT and Perplexity Interfaces
21:40
21:40
Play later
Play later
Lists
Like
Liked
21:40Cybersecurity firm SquareX has unveiled a new and alarming threat to users of AI-enabled browsers — a technique called AI Sidebar Spoofing. This sophisticated attack uses malicious browser extensions to create visually identical replicas of legitimate AI sidebars, tricking users into believing they are interacting with trusted AI assistants like Ch…
…
continue reading
1
Jewett-Cameron Reports Ransomware Breach Involving Encryption and Data Theft
22:53
22:53
Play later
Play later
Lists
Like
Liked
22:53Oregon-based Jewett-Cameron Company, a manufacturer of fencing, kennels, and specialty wood products, has confirmed that it was the victim of a double-extortion ransomware attack on October 15, 2025, in an incident that disrupted operations and exposed sensitive corporate data. The attackers infiltrated the company’s IT network, deploying encryptio…
…
continue reading
1
Star Blizzard’s Malware Makeover: From LostKeys to MaybeRobot
32:49
32:49
Play later
Play later
Lists
Like
Liked
32:49The Russian state-sponsored hacking group Star Blizzard — also tracked as ColdRiver, Seaborgium, and UNC4057 — has undergone a major transformation in its operations following public exposure earlier this year. After researchers at Google detailed its LostKeys malware and PowerShell-based infection chain in June 2025, the group swiftly abandoned th…
…
continue reading
1
Keycard Emerges from Stealth with $38M to Secure the Identity of AI Agents
19:17
19:17
Play later
Play later
Lists
Like
Liked
19:17San Francisco-based Keycard has officially emerged from stealth mode, announcing $38 million in funding across seed and Series A rounds to build what may become one of the most critical infrastructure layers of the AI era — identity and access management (IAM) for AI agents. Founded in 2025 by former senior executives from Snyk and Okta, Keycard is…
…
continue reading
1
Critical TP-Link Omada Vulnerabilities Expose Networks to Remote Takeover
22:07
22:07
Play later
Play later
Lists
Like
Liked
22:07Security researchers are urging immediate action after TP-Link disclosed multiple critical vulnerabilities in its Omada gateway line, affecting a wide range of ER, G, and FR series devices. The flaws—now patched by TP-Link—expose organizations to remote code execution, privilege escalation, and full network compromise, making them among the most se…
…
continue reading
1
TARmageddon: The Rust Library Flaw Exposing Supply Chains to Remote Code Execution
29:58
29:58
Play later
Play later
Lists
Like
Liked
29:58A critical new vulnerability known as TARmageddon (CVE-2025-62518) has sent shockwaves through the Rust developer community and the broader cybersecurity world. This high-severity desynchronization flaw, discovered in the Async-tar and Tokio-tar libraries, exposes millions of downstream applications to the risk of remote code execution and supply c…
…
continue reading
Send us a text This one’s for the adjusters who keep learning even when nobody’s paying for training anymore. Heather and Chantal talk about what real professional development looks like today — from learning policy language on your own to staying sharp as tech, AI, and consumer expectations change faster than your claim count. They dig into why mo…
…
continue reading
1
Vidar 2.0: The C-Rewritten Stealer Poised to Dominate the Cybercrime Market
31:42
31:42
Play later
Play later
Lists
Like
Liked
31:42A new evolution in information-stealing malware has arrived — and it’s already drawing serious attention from researchers and defenders alike. The release of Vidar 2.0 represents a complete transformation of the long-running Vidar infostealer, which has been rewritten entirely in C and equipped with multi-threading and advanced anti-analysis mechan…
…
continue reading
1
Dataminr Acquires ThreatConnect for $290M to Create the Next Generation of Tailored Threat Intelligence
23:01
23:01
Play later
Play later
Lists
Like
Liked
23:01Dataminr, the AI powerhouse known for its real-time risk and event detection platform, has announced plans to acquire ThreatConnect, a cybersecurity firm specializing in threat intelligence aggregation and response, for $290 million in cash and equity. This strategic move marks a major milestone in the ongoing consolidation of the threat intelligen…
…
continue reading
1
Veeam Acquires Securiti AI for $1.725 Billion to Unite Data Resilience, Security, and AI
28:44
28:44
Play later
Play later
Lists
Like
Liked
28:44In one of the largest cybersecurity acquisitions of 2025, Veeam Software has announced plans to acquire Securiti AI for $1.725 billion in cash and stock, signaling a fundamental shift in how enterprises will secure, manage, and govern their data in the age of artificial intelligence. The deal, expected to close in the fourth quarter, will bring tog…
…
continue reading
1
Defakto Raises $30.75 Million to Redefine Machine Identity Security
34:01
34:01
Play later
Play later
Lists
Like
Liked
34:01California-based cybersecurity firm Defakto has raised $30.75 million in Series B funding, led by XYZ Venture Capital, bringing its total investment to roughly $50 million. The new capital will power the company’s rapid expansion in product development and global market reach for its identity and access management (IAM) platform—one specifically de…
…
continue reading
1
Dr. Allan Friedman Joins NetRise: The Father of SBOMs Goes Private to Fuse AI and Supply Chain Security
24:24
24:24
Play later
Play later
Lists
Like
Liked
24:24In a landmark move for the cybersecurity industry, Dr. Allan Friedman — often called the Father of SBOMs — has joined supply chain security firm NetRise as a strategic advisor. Friedman’s transition from his influential role at CISA marks a pivotal moment where public policy meets private innovation. His mission: to push the Software Bill of Materi…
…
continue reading
1
Pwn2Own Automotive 2026: $3 Million Bounty Targets Tesla and EV Infrastructure Flaws
24:29
24:29
Play later
Play later
Lists
Like
Liked
24:29The upcoming Pwn2Own Automotive 2026 hacking contest, hosted by Trend Micro’s Zero Day Initiative (ZDI), is set to redefine the economics of automotive cybersecurity. With a record-breaking $3 million prize pool, the event provides a transparent, market-driven valuation of the most dangerous vulnerabilities facing the connected vehicle ecosystem. T…
…
continue reading
1
China Claims NSA Breached National Time Network, Threatening Finance and Defense Stability
24:09
24:09
Play later
Play later
Lists
Like
Liked
24:09China’s Ministry of State Security (MSS) has publicly accused the U.S. National Security Agency (NSA) of conducting a multi-year cyber espionage campaign targeting its National Time Service Center, a critical component of China’s national infrastructure responsible for maintaining and distributing standard time. According to China, the attacks — al…
…
continue reading
1
Cl0p Ransomware Targets Oracle E-Business Suite in Global Data Extortion Spree
17:57
17:57
Play later
Play later
Lists
Like
Liked
17:57A new wave of Cl0p ransomware attacks has struck organizations worldwide by exploiting vulnerabilities in Oracle’s E-Business Suite (EBS) — a mission-critical enterprise management platform used by corporations and universities across the globe. The ongoing campaign, attributed to FIN11, highlights the group’s shift toward exploiting high-value bus…
…
continue reading
1
WhatsApp Wins Landmark Case Against NSO Group Over Spyware Attacks
24:02
24:02
Play later
Play later
Lists
Like
Liked
24:02After six years of intense litigation, WhatsApp has secured a decisive legal victory against the NSO Group, the controversial spyware maker accused of exploiting a zero-day vulnerability to infect more than 1,400 users with surveillance malware. On October 17, 2025, a U.S. District Court issued a permanent injunction that bars NSO from targeting Wh…
…
continue reading
1
Google Project Zero Exposes Dolby Decoder Flaw Enabling Zero-Click Android Exploits
21:44
21:44
Play later
Play later
Lists
Like
Liked
21:44A newly discovered vulnerability in Dolby’s Unified Decoder has sent shockwaves through the cybersecurity world. Tracked as CVE-2025-54957, the flaw — uncovered by Google Project Zero — is a critical out-of-bounds write vulnerability that allows remote code execution (RCE) when a specially crafted audio file is decoded. The issue stems from an inte…
…
continue reading
1
SPOTLIGHT: MD For Patients -- Meet The Founder, Dr. Mark Halsted
1:08:35
1:08:35
Play later
Play later
Lists
Like
Liked
1:08:35"If you or your child has a serious diagnosis, you may feel like your life has just been turned upside-down. I founded MD For Patients to provide comprehensive, honest consultations tailored to the needs of patients – and to help patients understand how best to manage their own health going forward." Dr Mark Halsted, Triple-Boarded Pediatric NeuroR…
…
continue reading
1
AISLE Launches AI Cyber Reasoning System to Shrink Patch Times from Weeks to Minute
23:54
23:54
Play later
Play later
Lists
Like
Liked
23:54AISLE has entered the cybersecurity arena with an AI-native Cyber Reasoning System (CRS) built to do what most tools don’t: fix vulnerabilities—fast. While attackers increasingly use AI to weaponize new flaws in roughly five days, most organizations still average ~45 days to remediate critical issues. AISLE’s answer is an autonomous remediation pip…
…
continue reading
1
Microsoft Blunts “Vanilla Tempest”: 200 Malicious Certificates Revoked
20:27
20:27
Play later
Play later
Lists
Like
Liked
20:27In early October 2025, Microsoft executed a targeted disruption against Vanilla Tempest—the threat actor also tracked as Vice Society—after uncovering a streamlined, high-impact campaign that deployed Rhysida ransomware through a cleverly staged infection chain. The operation leaned on SEO poisoning to funnel victims searching for “Microsoft Teams”…
…
continue reading
1
The “Shotgun” Botnet: How RondoDox Hijacks Routers, Cameras, and Servers Worldwide
23:28
23:28
Play later
Play later
Lists
Like
Liked
23:28A new and fast-growing botnet dubbed RondoDox is shaking up the global cybersecurity landscape with its “shotgun” exploitation strategy, targeting over 50 known and unknown vulnerabilities across a vast array of internet-connected devices. First detected in mid-2025, the botnet has expanded rapidly, infecting routers, servers, cameras, and DVRs fro…
…
continue reading
1
“Inflation Refund” Scam: How Fraudsters Are Stealing Identities Through Texts
19:01
19:01
Play later
Play later
Lists
Like
Liked
19:01A widespread smishing campaign is sweeping across New York, luring residents with fraudulent text messages about an “Inflation Refund” from the Department of Taxation and Finance. These deceptive messages claim that recipients are eligible for a refund and must click a link to “process” it — a ploy designed to harvest personal and financial informa…
…
continue reading
1
Juniper Networks Patches 220 Vulnerabilities in Massive October Security Update
23:29
23:29
Play later
Play later
Lists
Like
Liked
23:29In one of the year’s most extensive patch cycles, Juniper Networks has released its October 2025 security advisories, addressing a staggering 220 vulnerabilities across its product suite — including Junos OS, Junos Space, Junos Space Security Director, and Junos OS Evolved. Of these, nine critical flaws in Junos Space and Security Director stood ou…
…
continue reading
1
Linked Exploitation Campaigns Target Cisco, Fortinet, and Palo Alto Networks Devices
25:08
25:08
Play later
Play later
Lists
Like
Liked
25:08Cyber intelligence firm GreyNoise has uncovered what appears to be a coordinated exploitation effort targeting network edge appliances from three major security vendors: Cisco, Fortinet, and Palo Alto Networks. After analyzing overlapping IP subnets, identical TCP fingerprints, and synchronized attack patterns, GreyNoise assessed with high confiden…
…
continue reading
1
Salesforce Refuses Ransom as Scattered LAPSUS$ Hunters Leak Millions of Records
27:29
27:29
Play later
Play later
Lists
Like
Liked
27:29A new wave of cyber extortion has rocked the enterprise world as the Scattered LAPSUS$ Hunters—a coalition formed from the notorious Lapsus$, Scattered Spider, and ShinyHunters groups—attempted to ransom Salesforce, claiming to have stolen data from 39 of its customers. When Salesforce refused to negotiate, the hackers retaliated by publishing the …
…
continue reading
1
Episode #79 - Experts in Claims — When & Why to Call Them
55:31
55:31
Play later
Play later
Lists
Like
Liked
55:31Send us a text 🏈 Adjusters can’t do it all — sometimes you need to call in the experts. Heather and Chantal dig into the world of experts in claims. From engineers and origin-and-cause investigators to claims handling experts, we explore: When adjusters should bring in specialized help (and when not to). Why “being an expert” takes more than Google…
…
continue reading
1
Oneleet Secures $33M Series A to Revolutionize Integrated Cybersecurity
28:08
28:08
Play later
Play later
Lists
Like
Liked
28:08By Daily Security Review
…
continue reading
1
ParkMobile Data Breach Ends in $32.8M Settlement — and a $1 Payout
27:55
27:55
Play later
Play later
Lists
Like
Liked
27:55By Daily Security Review
…
continue reading
1
Discord Confirms Data Breach Linked to Third-Party Support Vendor
25:58
25:58
Play later
Play later
Lists
Like
Liked
25:58By Daily Security Review
…
continue reading
1
Weather Station Gateway Exploited: CISA Adds Meteobridge Bug to KEV List
23:11
23:11
Play later
Play later
Lists
Like
Liked
23:11By Daily Security Review
…
continue reading
1
DrayTek Issues Critical Patch for Router RCE Flaw (CVE-2025-10547)
25:30
25:30
Play later
Play later
Lists
Like
Liked
25:30A serious unauthenticated remote code execution (RCE) flaw, identified as CVE-2025-10547, has been uncovered in DrayTek’s DrayOS routers. This vulnerability allows attackers to send crafted HTTP or HTTPS requests to the router’s web management interface, potentially leading to memory corruption, system crashes, or full device takeover. The flaw aff…
…
continue reading
1
FTC vs. Sendit: Lawsuit Alleges Data Theft, Fake Messages, and Subscription Traps
27:25
27:25
Play later
Play later
Lists
Like
Liked
27:25The Federal Trade Commission (FTC) has filed a high-profile lawsuit against Sendit, a social media companion app popular among teenagers, and its CEO. The case accuses the company of breaking three major U.S. laws designed to protect consumers and children online. First, the FTC alleges that Sendit violated the Children’s Online Privacy Protection …
…
continue reading
1
Broadcom Patches VMware Zero-Day: CVE-2025-41244 Exploited by China-Linked UNC5174
25:16
25:16
Play later
Play later
Lists
Like
Liked
25:16Broadcom has released a critical security update addressing six vulnerabilities across VMware products, including four rated high-severity. At the center of the update is CVE-2025-41244, a local privilege escalation flaw affecting VMware Tools and Aria Operations. What makes this vulnerability particularly alarming is that it was actively exploited…
…
continue reading
1
Seven Years, £5.5 Billion, 128,000 Victims – The Case of Yadi Zhang
29:12
29:12
Play later
Play later
Lists
Like
Liked
29:12In a historic case that has captured global attention, UK authorities have secured a conviction against Zhimin Qian (also known as Yadi Zhang), the Chinese national at the center of one of the largest financial crime investigations of the decade. Following a seven-year probe by the Metropolitan Police, investigators uncovered an elaborate fraud and…
…
continue reading
1
Cisco ASA/FTD Flaws Under Siege: 50,000 Devices at Risk from Active Exploits
31:52
31:52
Play later
Play later
Lists
Like
Liked
31:52Two newly disclosed critical vulnerabilities—CVE-2025-20333 and CVE-2025-20362—are wreaking havoc across the global cybersecurity landscape, with nearly 50,000 Cisco ASA and FTD appliances actively under threat. These flaws enable unauthenticated remote code execution and VPN access compromise, giving attackers an immediate foothold into critical i…
…
continue reading
1
MatrixPDF: The New Phishing Toolkit That Turns Safe PDFs into Cyber Weapons
16:12
16:12
Play later
Play later
Lists
Like
Liked
16:12A new cybercrime toolkit called MatrixPDF is changing the phishing landscape by weaponizing one of the most trusted file formats: PDFs. Marketed on cybercrime forums as an “elite document builder” for phishing simulations and blackteaming, MatrixPDF enables attackers to transform ordinary PDFs into highly convincing phishing lures that bypass email…
…
continue reading
1
Asahi Brewery Cyberattack Halts Domestic Operations Across Japan
27:07
27:07
Play later
Play later
Lists
Like
Liked
27:07Asahi Group Holdings, Ltd.—the brewer behind some of the world’s most iconic beers, including Peroni and Grolsch—has been hit by a crippling cyberattack that froze its Japan-based operations. Ordering and shipping have been suspended, customer call centers and service desks are offline, and the company has been forced into damage control. While Asa…
…
continue reading
1
Akira Ransomware Exploits SonicWall Flaw with Record-Breaking Speed
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58The Akira ransomware group has once again raised the stakes in cybercrime by exploiting a critical SonicWall vulnerability—CVE-2024-40766—to infiltrate corporate networks through SSL VPN accounts, even those secured with one-time password multi-factor authentication. Once inside, Akira’s affiliates execute one of the most dangerous tactics in moder…
…
continue reading
1
Ex-Hacktivist “Sabu” Backs SafeHill’s $2.6M Bet on Continuous Threat Management
28:04
28:04
Play later
Play later
Lists
Like
Liked
28:04A new cybersecurity startup with an infamous name attached is making headlines. SafeHill—formerly known as Tacticly—has secured $2.6 million in pre-seed funding to accelerate the development of its continuous threat exposure management (CTEM) platform, SecureIQ. Designed to overcome the shortcomings of traditional, point-in-time penetration testing…
…
continue reading
1
Jaguar Land Rover Cyberattack Fallout: £1.5B UK Bailout Sparks Fears of More Attacks
27:34
27:34
Play later
Play later
Lists
Like
Liked
27:34Jaguar Land Rover (JLR), one of the UK’s largest exporters and a key anchor of the nation’s automotive supply chain, has been brought to the brink by a devastating cyberattack. With production lines halted, digital operations crippled, and a data breach confirmed, the UK government stepped in with a massive £1.5 billion support package to stabilize…
…
continue reading
AND, UNDERSTANDING PRIVATE EQUITY OPTIONS AND PRACTICE VALUATIONS AS YOU PREPARE TO SELL OR EXIT YOUR Practice Preparing to sell your medical practice is a complex process that requires careful planning and foresight. Starting early and conducting a thorough internal review, including financial and legal documentation, sets the foundation for a suc…
…
continue reading