This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Vulnerability Exploits Podcasts
A podcast that helps us understand human vulnerability and how we can defend against the attacks that exploit us.
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
…
continue reading
Personal finance nerd at heart! Making content to entertain and educate. Want to be on the show? Email us at [email protected] Sponsorship and business inquiries: [email protected] Get new episodes a week earlier on our YouTube channel!
…
continue reading
Cypher Tech Hacks is an electrifying deep dive into the world of cyber scams and digital deceptions, where host Alex Cipher unpacks intricate hacking techniques into simple, step-by-step explanations. Each episode dissects legendary cyber exploits and high-tech frauds, making complex digital heists accessible and engaging for tech enthusiasts. Beyond the captivating tales, the podcast empowers listeners with practical insights and preventive measures to fortify their digital defenses.
…
continue reading
We Cover the Cyberspace.
…
continue reading
Daily run down of top cyber and tech current events
…
continue reading
Think about all of the things you consider every day to help keep yourself, your loved ones, and your community happy, healthy, and hopeful. Now consider this: There is an ever-growing body of research demonstrating significant negative impacts, for yourself and the ones you love, in the consumption of pornography. It can change the way you think, harm your ability to connect with other people, and can contribute to changing the world in negative ways. Join us every other week as we consider ...
…
continue reading
This podcast is dedicated to the unsung heroes out there wishing to heal from the wounds of childhood they did not create. Adult children of alcoholics and children of narcissistic parents have been emotionally conditioned and neurologically wired to abandon the authentic self, for the sake of parental attachments. Emotional neglect manifests as codependency, a need for external validation, and approval. Unaware, those suffering from abandonment wounds, who exhibit codependency often attract ...
…
continue reading

1
Best of the Left - Leftist Perspectives on Progressive Politics, News, Culture, Economics and Democracy
BestOfTheLeft.com
Expertly-curated progressive politics, news, and culture produced by leftist humans, not algorithms or AI. This is an award-winning podcast that dives deeply into a wide range of national and international issues facing society and governments. We draw from hundreds of sources of progressive news and commentary. Est. 2006. Save time by listening to a range of perspectives on a focused topic in each episode and be introduced to new sources you will not have come across on your own!
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The Breach Report gives you a front-row seat to the latest cybersecurity news and insights, as Rense and Robert share practical takeaways from their day-to-day work in threat intelligence and incident response. Take theory into action!
…
continue reading
A comedy podcast about shame- because no one roasts you harder than yourself! Each week, psychotherapist-turned-comedian Ely Kreimendahl exploits her therapy skills to talk all-things-shame with a new special guest. Every guest shares a core story of something that once made them spiral HARD, answers both silly and emotionally complicated questions, and even if these conversations are ACCIDENTALLY therapeutic, it's not therapy.... Ely goes ALL IN on sharing her shame, too. Does coming togeth ...
…
continue reading
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders responsible for the security and protection of cyber-physical systems. Guests include cybersecurity researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.
…
continue reading
Podcast Channel ที่ว่าด้วยเรื่องของ Security
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Human trafficking is one of the greatest injustices in our world today. It’s the exploitation of vulnerable people for their bodies and labor. It’s modern-day slavery, and it’s generating billions of dollars each year. In this podcast, we will unpack the problem of human trafficking, share powerful stories from the frontlines, hear from thought leaders in the fight for freedom, and equip you to make a difference–right where you are. A21 is a global anti-human trafficking organization operati ...
…
continue reading
Eric Payne, a divorced dad and retired marriage & fatherhood blogger, tells the comedic tale of his "Chapter 2" — having to start life over brand new after a divorce he didn't want. What Does Starting Over Mean? Although "free” for the first time in 15 years, Eric has years of baggage and a stubborn desire to hold on to the past which initially keeps him stuck as he tries to move in a world way different than the one where he first met his ex-wife in the year 2000. From one-night stands to g ...
…
continue reading
“Don’t look to the bottle, the knife, or the gun… Look for the soul you’ll become! Welcome to “Beat The Mental Health Out Of It!”, where humor meets heart—and things get uncomfortably real! Join our fearless host, “The DEFECTIVE Schizoaffective,” a lovable goofball navigating life with Schizoaffective Disorder who boldly asked, “What the hell… why not turn my traumatic experiences into a podcast for the enjoyment of others?” He is often joined by his wise, “elderly” co-host, “IndyPocket,” an ...
…
continue reading
Welcome to the Partnership Podcast - The P Pod, from the Somerset Safeguarding Children Partnership! Meet the agencies who will help you to support children, young people and their families across Somerset. Explore local and national learning and how to improve your safeguarding practice. If you would like to take part in a future podcast or have any questions or comments arising from any episodes we'd love you to contact us at [email protected] www.somersetsafeguardingchildren.org.uk
…
continue reading
Youtube: https://www.youtube.com/@ProofOfPodcast
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
…
continue reading
This podcast features all things related to Information Security and Cyber Security
…
continue reading
Bringing you vital facts and perspectives on Islamist extremism and how to combat it directly from leading activists in the field. Clarion Podcast is brought to you by Clarion Project, dedicated to challenging Islamist extremism and promoting dialogue with Muslim human rights activists.
…
continue reading
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
…
continue reading
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
…
continue reading
A lively discussion of the threats affecting supply chain, specifically focused on firmware and low-level code that is a blind spot for many organizations. This podcast will feature guests from the cybersecurity industry discussing the problems surrounding supply chain-related issues and potential solutions.
…
continue reading
Ghost Stories Enter the realm where ghosts whisper ancient secrets and demons lurk in shadows that stretch beyond mortal comprehension. Ghost Stories delivers spine-chilling supernatural horror without advertisements interrupting your descent into paranormal activity and cosmic horror. All ads are strategically placed at the beginning to preserve the immersive experience of every exorcism, vampire encounter, and psychological horror that haunts our darkest nightmares. In the depths of supern ...
…
continue reading

1
M*lf Exploits Young Vulnerable Men | Financial Audit
1:33:09
1:33:09
Play later
Play later
Lists
Like
Liked
1:33:09Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Caleb Hammer
…
continue reading

1
SOLVED! #17 - How to Use the Bullsh*t Machine: A.I. LLMs’ insertion into childhood, school, work, and movements
20:57
20:57
Play later
Play later
Lists
Like
Liked
20:57Air Date: 8-1-25 Today, Jay!, Amanda, Deon, and Erin discuss: The impact of A.I. LLM “friend” bots on childhood development How using A.I. LLMs negatively impacts critical thinking and information retention The importance of understanding how A.I. LLM tools work before using them The ways in which A.I. LLM tools could and shouldn’t help movements o…
…
continue reading

1
She Came Here To Fight Me | Financial Audit
1:42:15
1:42:15
Play later
Play later
Lists
Like
Liked
1:42:15▶ *FREE BONUS EPISODES* - I am personally paying for your Hammer *ELITE* subscription for the first month https://www.youtube.com/channel/UCLe_q9axMaeTbjN0hy1Z9xA/join Sign up for *ELITE* and I'll send you a digital gift card covering the $10 cost. In today's post show, *I BRING IN THE BOYFRIEND* - and the confrontation gets heated as I expose how …
…
continue reading

1
SANS Stormcast Friday, August 1st, 2025: Scattered Spider Domains; Excel Blocking Dangerous Links; CISA Releasing Thorium Platform
5:41
5:41
Play later
Play later
Lists
Like
Liked
5:41Scattered Spider Related Domain Names A quick demo of our domain feeds and how they can be used to find Scattered Spider related domains https://isc.sans.edu/diary/Scattered+Spider+Related+Domain+Names/32162 Excel External Workbook Links to Blocked File Types Will Be Disabled by Default Excel will discontinue allowing links to dangerous file types …
…
continue reading

1
Critical Honeywell Experion PKS Vulnerabilities Threaten Global Industrial Control Systems
1:16:35
1:16:35
Play later
Play later
Lists
Like
Liked
1:16:35In this episode, we analyze the multiple vulnerabilities recently disclosed in Honeywell’s Experion Process Knowledge System (PKS), a widely deployed industrial control and automation solution that underpins operations in energy, chemical plants, manufacturing, healthcare, and transportation sectors worldwide. Reported by CISA and Positive Technolo…
…
continue reading

1
Auto-Color Linux Malware Exploits SAP Zero-Day CVE-2025-31324
36:36
36:36
Play later
Play later
Lists
Like
Liked
36:36In this episode, we uncover the Auto-Color Linux malware, a stealthy and highly persistent Remote Access Trojan (RAT) that is rapidly emerging as one of the most dangerous threats of 2025. First identified by Palo Alto Networks’ Unit 42 and later analyzed by Darktrace, Auto-Color has now been linked to active exploitation of CVE-2025-31324, a criti…
…
continue reading

1
Inside the July 2025 PyPI Phishing Scam: How Hackers Stole Developer Credentials
54:17
54:17
Play later
Play later
Lists
Like
Liked
54:17In this episode, we investigate the growing cybersecurity storm targeting the Python Package Index (PyPI) — the backbone of Python’s software distribution ecosystem. A recent phishing campaign in July 2025 has developers on high alert, as attackers impersonated PyPI using a deceptive domain (pypj.org) to trick maintainers into handing over their cr…
…
continue reading

1
IoT Security Crisis: Dahua Smart Camera Vulnerabilities Expose Surveillance Systems
1:02:05
1:02:05
Play later
Play later
Lists
Like
Liked
1:02:05In this episode, we examine the alarming discovery of critical security vulnerabilities in Dahua smart cameras, one of the world’s most widely deployed surveillance systems. Researchers at Bitdefender uncovered two zero-click flaws — CVE-2025-31700 and CVE-2025-31701 — that allow unauthenticated remote attackers to gain root access to Dahua devices…
…
continue reading

1
#1726 Epstein Forever: Trump flails as criticism finally comes from inside the MAGA house
3:29:05
3:29:05
Play later
Play later
Lists
Like
Liked
3:29:05Air Date: 7/31/2025 Who would have thought that a political movement built almost exclusively on conspiracy theories and a cult of personality would end up being threatened by the cult leader being implicated in the biggest and worst conspiracy coverup… even though it’s been well documented for decades? Content warning for detailed accusations leve…
…
continue reading

1
SANS Stormcast Thursday July 31st, 2025: Firebase Security; WebKit Vuln Exploited; Scattered Spider Update
6:40
6:40
Play later
Play later
Lists
Like
Liked
6:40Securing Firebase: Lessons Re-Learned from the Tea Breach Inspried by the breach of the Tea app, Brendon Evans recorded a video to inform of Firebase security issues https://isc.sans.edu/diary/Securing%20Firebase%3A%20Lessons%20Re-Learned%20from%20the%20Tea%20Breach/32158 WebKit Vulnerability Exploited before Apple Patch A WebKit vulnerablity patch…
…
continue reading

1
#80- Are you keeping up with Data Governance post-AI?
26:21
26:21
Play later
Play later
Lists
Like
Liked
26:21AI is reshaping data governance—and raising big compliance questions. David W. Schropfer and Anthony Woodward unpack risks, silos, and solutions on DIY Cyber Guy.By Extra Something Media
…
continue reading

1
Dropzone AI Secures $37M to Tackle Alert Fatigue with Autonomous SOC Analysts
17:11
17:11
Play later
Play later
Lists
Like
Liked
17:11In this episode, we dive into Dropzone AI’s landmark $37 million Series B funding round, bringing the company’s total raised to over $57 million. Backed by major investors, Dropzone AI is accelerating the development of its AI-powered SOC analysts — tools designed to autonomously investigate and resolve security alerts across critical threat catego…
…
continue reading

1
Axonius Buys Cynerio for $100M+: Closing Healthcare’s Biggest Cybersecurity Blind Spot
1:36:30
1:36:30
Play later
Play later
Lists
Like
Liked
1:36:30In this episode, we explore Axonius’s landmark acquisition of Cynerio, a healthcare cybersecurity company specializing in protecting vulnerable medical devices like MRI machines, infusion pumps, and ventilators. The deal — valued at over $100 million in cash and stock — marks Axonius’s first-ever acquisition and signals a major strategic expansion …
…
continue reading

1
Critical Lenovo Firmware Flaws Expose Millions to Persistent UEFI Attacks
42:00
42:00
Play later
Play later
Lists
Like
Liked
42:00In this episode, we examine a critical firmware security crisis shaking Lenovo devices worldwide. Security researchers at Binarly have uncovered six serious vulnerabilities in the Insyde BIOS firmware used in Lenovo’s IdeaCentre and Yoga product lines. Four of these flaws, rated high severity, reside in the System Management Mode (SMM) — a privileg…
…
continue reading

1
She Came Here To Cancel Me | Financial Audit
1:38:57
1:38:57
Play later
Play later
Lists
Like
Liked
1:38:57*FREE BONUS EPISODES* - I am personally paying for your Hammer *ELITE* subscription for the first month https://www.youtube.com/channel/UCLe_q9axMaeTbjN0hy1Z9xA/join Sign up for *ELITE* and I'll send you a digital gift card covering the $10 cost. In today's post show, SHE HAS A PAYDAY LOAN SHE HID FROM ME- I freak the F out and have to destroy her …
…
continue reading

1
Promptfoo Secures $18.4M to Combat AI Security Threats in Generative AI
36:50
36:50
Play later
Play later
Lists
Like
Liked
36:50In this episode, we dive into Promptfoo’s groundbreaking $18.4 million Series A funding round, led by Insight Partners and supported by Andreessen Horowitz, bringing the AI security startup’s total funding to $23.4 million. Founded in 2024, Promptfoo has quickly emerged as a leader in securing Large Language Models (LLMs) and generative AI applicat…
…
continue reading

1
He Survived Trafficking as a Boy and Now Advocates for Survivors Worldwide
1:09:09
1:09:09
Play later
Play later
Lists
Like
Liked
1:09:09*This episode contains a detailed discussion of child abuse, sexual violence, human trafficking, and trauma. Listener discretion is advised. Dr. Suamhirs Piraino-Guzman is a behavioral neurologist, clinical psychologist, human trafficking survivor, and international human rights advocate. In this powerful episode, he shares his story of surviving s…
…
continue reading

1
SANS Stormcast Wednesday July 30th, 2025: Apple Updates; Python Triage; Papercut Vuln Exploited
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44Apple Updates Everything: July 2025 Edition Apple released updates for all of its operating systems patching 89 different vulnerabilities. Many vulnerabilities apply to multiple operating systems. https://isc.sans.edu/diary/Apple%20Updates%20Everything%3A%20July%202025/32154 Python Triage A quick python script by Xavier to efficiently search throug…
…
continue reading

1
1.1 Million Private Messages Leaked: Inside the Tea App Privacy Disaster
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58A platform designed to protect women’s safety in dating has instead become a nightmare for its users. In this episode, we uncover the catastrophic Tea app data breach, which exposed more than 59 GB of highly sensitive user data due to a fundamental security failure: a completely public Firebase storage bucket with no authentication, no encryption, …
…
continue reading

1
Job Scams, Corporate Espionage, and Digital Deception: Inside the Deepfake Crisis
1:16:30
1:16:30
Play later
Play later
Lists
Like
Liked
1:16:30Deepfake technology has evolved from a fringe novelty into one of the most serious cybersecurity and national security threats of our time. In this episode, we examine how artificial intelligence–generated synthetic media is being weaponized to impersonate CEOs, manipulate elections, infiltrate corporate networks, and damage reputations worldwide. …
…
continue reading

1
Microsoft Exposes Major macOS Flaws in Transparency, Consent, and Control
1:23:13
1:23:13
Play later
Play later
Lists
Like
Liked
1:23:13In this episode, we dive deep into Microsoft Threat Intelligence’s latest findings on two critical macOS vulnerabilities that shook Apple’s privacy defenses. The flaws, identified as CVE-2025-31199 (Sploitlight) and CVE-2024-44133 (HM Surf), specifically targeted Apple’s Transparency, Consent, and Control (TCC) framework, the system designed to gua…
…
continue reading

1
Aeroflot in Chaos: How Hackers Crippled Russia’s Flagship Airline
24:25
24:25
Play later
Play later
Lists
Like
Liked
24:25On July 28, 2025, Aeroflot—Russia’s largest state-owned airline—was brought to its knees in one of the most severe cyberattacks since the country’s invasion of Ukraine in 2022. The sophisticated assault, carried out by Ukrainian hacktivist group Silent Crow and the Belarusian Cyber-Partisans, led to the cancellation of more than 100 flights, strand…
…
continue reading

1
SANS Stormcast Tuesday, July 29th, 2025:Parasitic Exploits; Cisco ISE Exploit; MyASUS Vuln
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35Parasitic SharePoint Exploits We are seeing attacks against SharePoint itself and attempts to exploit backdoors left behind by attackers. https://isc.sans.edu/diary/Parasitic%20Sharepoint%20Exploits/32148 Cisco ISE Vulnerability Exploited A recently patched vulnerability in Cisco ISE is now being exploited. The Zero Day Initiative has released a bl…
…
continue reading

1
Neferpitou Claims Cyberattack on French Naval Defense Giant
44:17
44:17
Play later
Play later
Lists
Like
Liked
44:17French defense contractor Naval Group, a cornerstone of Europe’s naval defense industry, is facing a high-stakes cybersecurity crisis. A threat actor known as “Neferpitou” claims to have exfiltrated 1TB of sensitive data, including combat management system (CMS) source code for submarines and frigates, technical documents, developer virtual machine…
…
continue reading

1
Root Evidence Launches With $12.5M to Redefine Vulnerability Management
36:51
36:51
Play later
Play later
Lists
Like
Liked
36:51In July 2025, a team of seasoned cybersecurity leaders launched Root Evidence, a Boise-based startup with a mission to revolutionize how organizations tackle vulnerability management. Armed with $12.5 million in seed funding led by Ballistic Ventures, founders Jeremiah Grossman, Robert Hansen, Heather Konold, and Lex Arquette are setting out to fix…
…
continue reading

1
NASCAR Hit by Medusa Ransomware: 1TB of Data Stolen in April 2025 Cyberattack
41:21
41:21
Play later
Play later
Lists
Like
Liked
41:21In April 2025, NASCAR became the latest victim of a major cyberattack, with hackers infiltrating its network between March 31 and April 3. During the breach, personal information—including names and Social Security numbers—was exfiltrated from NASCAR’s systems. In response, the organization has notified affected individuals, activated its incident …
…
continue reading
An Arizona woman was arrested for running a North Korean IT worker laptop farm out of her home, and this gave us a little look into the strange world of how these threat actors are able to infiltrate US organizations. Sources: https://pastebin.com/qvrWirYaBy Chloe Thonus
…
continue reading

1
Scattered Spider Strikes Again: Inside the VMware ESXi Ransomware Tactics
55:59
55:59
Play later
Play later
Lists
Like
Liked
55:59In this episode, we examine the sophisticated operations of Scattered Spider—also known as Muddled Libra, UNC3944, and Octo Tempest—a financially motivated cybercriminal group that has redefined the ransomware threat landscape. Recently highlighted by Google’s Threat Intelligence Group (GTIG), Scattered Spider has escalated its attacks by targeting…
…
continue reading

1
Scumbag Husband Destroys Marriage With Secret Debt | Financial Audit
1:35:38
1:35:38
Play later
Play later
Lists
Like
Liked
1:35:38▶ *FREE BONUS EPISODES* - I am personally paying for your Hammer *ELITE* subscription for the first month https://www.youtube.com/channel/UCLe_q9axMaeTbjN0hy1Z9xA/join Sign up for *ELITE* and I'll send you a digital gift card covering the $10 cost. In today's post show, *THIS IS INSANNEEE* - they did not want this discussed in the main episode, but…
…
continue reading

1
Why They Can’t Love You Fully: The Truth About Spouses With Childhood Trauma
16:19
16:19
Play later
Play later
Lists
Like
Liked
16:19Are you constantly hurt by a spouse who struggles to prioritize you? Do they avoid setting boundaries with their parents—even when it damages your marriage? If your partner was raised in a toxic or emotionally immature home, their nervous system may have been wired for survival—not connection. That early programming can lead to deep-rooted abandonm…
…
continue reading

1
Dan Berte on Solar Grid and IoT Vulnerabilities
32:21
32:21
Play later
Play later
Lists
Like
Liked
32:21Dan Berte, director of IoT security at Bitdefender, joins the Nexus Podcast to join his team's ongoing research into the security of solar grid inverters and three serious vulnerabilities uncovered in the popular Deye Solarman management platform. Dan discusses his team's research, the disclosure process, and the implications on green energy initia…
…
continue reading

1
Ep. 314 - The 4th Monday Series - What Can You Do If Your Accounts Are Hacked? with Congressman Darren Soto
31:27
31:27
Play later
Play later
Lists
Like
Liked
31:27Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today Chris and Mike are joined by Congressman Darren Soto. Darren So…
…
continue reading

1
SANS Stormcast Monday, July 28th, 2025: Linux Namespaces; UI Automation Abuse; Autoswagger
5:39
5:39
Play later
Play later
Lists
Like
Liked
5:39Linux Namespaces Linux namespaces can be used to control networking features on a process-by-process basis. This is useful when trying to present a different network environment to a process being analysed. https://isc.sans.edu/diary/Sinkholing%20Suspicious%20Scripts%20or%20Executables%20on%20Linux/32144 Coyote in the Wild: First-Ever Malware That …
…
continue reading

1
#1725 A Flood of Disinformation: A World of Climate Change and Conspiracies
2:58:47
2:58:47
Play later
Play later
Lists
Like
Liked
2:58:47Air Date: 7-27-2025 Back when I worked in the climate movement, just after the turn of the century, we knew that the extreme weather we were warning about would become ever-more clear to see in people's lived experiences and assumed that any doubts people had about the science of climate change would be wiped away with the evidence they could see w…
…
continue reading

1
Koske Malware Hides in Panda Images, Weaponizes AI to Target Linux
44:03
44:03
Play later
Play later
Lists
Like
Liked
44:03A new and highly sophisticated malware strain named Koske is redefining the threat landscape for Linux environments. Suspected to be partially developed using artificial intelligence, Koske introduces novel and highly evasive techniques, blending image files, rootkits, and adaptive cryptomining logic to create a stealthy and persistent backdoor int…
…
continue reading

1
Operation Checkmate: BlackSuit Ransomware’s Dark Web Sites Seized
39:19
39:19
Play later
Play later
Lists
Like
Liked
39:19BlackSuit, the ransomware strain known for crippling critical sectors and demanding multi-million dollar payouts, has just suffered a devastating blow. In a coordinated international law enforcement operation codenamed "Operation Checkmate," authorities—including the U.S. Department of Justice, Homeland Security Investigations, FBI, Europol, the UK…
…
continue reading

1
Coyote Malware Exploits Microsoft UI Automation in First-Ever Wild Attack
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14A new banking trojan called Coyote has emerged as a groundbreaking cyber threat, becoming the first known malware in the wild to exploit Microsoft’s User Interface Automation (UIA) framework—an accessibility tool originally designed to help users interact with Windows interfaces. But in the hands of attackers, UIA becomes a weapon of stealth and pr…
…
continue reading

1
"High-Value Woman" Is Actually For The Streets | Financial Audit
1:37:44
1:37:44
Play later
Play later
Lists
Like
Liked
1:37:44*FREE BONUS EPISODES* - I am personally paying for your Hammer *ELITE* subscription for the first month https://www.youtube.com/channel/UCLe_q9axMaeTbjN0hy1Z9xA/join Sign up for *ELITE* and I'll send you a digital gift card covering the $10 cost. In today's post show, I CALL HER DAD AND CONFRONT HIM- and it's literally DISGUSTING. You don't want to…
…
continue reading

1
No Fix Coming: Remote Code Execution Flaw in 1,300 LG Security Cameras
31:12
31:12
Play later
Play later
Lists
Like
Liked
31:12A newly disclosed critical vulnerability, CVE-2025-7742, is putting hundreds of LG Innotek LNV5110R security cameras at risk around the world—including within critical infrastructure. This high-severity authentication bypass flaw allows remote attackers to gain full administrative control without credentials, giving them access to live camera feeds…
…
continue reading

1
SANS Stormcast Friday, July 25th, 2025: ficheck.py; Mital and SonicWall Patches
5:20
5:20
Play later
Play later
Lists
Like
Liked
5:20New File Integrity Tool: ficheck.py Jim created a new tool, ficheck.py, that can be used to verify file integrity. It is a drop-in replacement for an older tool, fcheck, which was written in Perl and no longer functions well on modern Linux distributions. https://isc.sans.edu/diary/New%20Tool%3A%20ficheck.py/32136 Mitel Vulnerability Mitel released…
…
continue reading

1
ToolShell Exploited: China-Linked Hackers Breach NNSA and U.S. Government Networks
1:14:36
1:14:36
Play later
Play later
Lists
Like
Liked
1:14:36In one of the most concerning state-sponsored cyber incidents of the year, Chinese hackers exploited zero-day vulnerabilities in Microsoft SharePoint to breach the networks of the National Nuclear Security Administration (NNSA)—the U.S. agency responsible for managing the nation's nuclear arsenal. The attackers, part of a suspected Chinese state-sp…
…
continue reading

1
Massive NPM Breach: Malicious Packages Spread via Compromised Maintainer Accounts
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44In this episode, we expose the alarming supply chain attack that compromised millions of JavaScript projects across the globe. This sophisticated breach targeted the NPM ecosystem, infecting widely-used packages like eslint-config-prettier and is, through a coordinated phishing campaign and the exploitation of non-expiring legacy access tokens. Att…
…
continue reading

1
Clorox Sues Cognizant Over $356M Cyberattack: Who's Really to Blame?
44:38
44:38
Play later
Play later
Lists
Like
Liked
44:38In one of the most dramatic cybersecurity legal battles of the past year, Clorox has filed a lawsuit against IT services giant Cognizant, accusing the company of gross negligence that allegedly enabled a catastrophic 2023 cyberattack. The breach wreaked havoc on Clorox's operations—causing widespread product shortages, a multibillion-dollar hit to …
…
continue reading

1
HeroDevs Secures $125M to Extend Life of Critical Open Source Software
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36In this episode, we dive deep into HeroDevs' recent $125 million strategic growth investment, a move that signals a major expansion in the fight against the vulnerabilities of end-of-life (EOL) open source software. Based in Salt Lake City, HeroDevs has carved out a critical niche—providing "Never-Ending Support" (NES) to ensure security, complianc…
…
continue reading

1
SANS Stormcast Thursday, July 24th, 2025: Reversing SharePoint Exploit; NPM “is” Compromise;
6:53
6:53
Play later
Play later
Lists
Like
Liked
6:53Reversing SharePoint Toolshell Exploits CVE-2025-53770 and CVE-2025-53771 A quick walk-through showing how to decode the payload of recent SharePoint exploits https://isc.sans.edu/diary/Analyzing%20Sharepoint%20Exploits%20%28CVE-2025-53770%2C%20CVE-2025-53771%29/32138 Compromised JavaScript NPM is Package The popular npm package is was compromised …
…
continue reading

1
#79 - AI and CCTV: Yes, it’s here. No, it’s not Big Brother (yet)
35:52
35:52
Play later
Play later
Lists
Like
Liked
35:52Can AI spot threats without spying on you? Loretta AI’s Galvin Widjaja joins DIY Cyber Guy to reveal how smart surveillance protects privacy—no facial recognition required.By Extra Something Media
…
continue reading

1
UK Moves to Ban Ransomware Payments for Public Sector and Critical Infrastructure
48:22
48:22
Play later
Play later
Lists
Like
Liked
48:22In a landmark move to disrupt the financial engine powering ransomware attacks, the United Kingdom is pushing forward with legislation that would ban ransom payments across the public sector and critical national infrastructure (CNI). This sweeping proposal covers everything from local councils and schools to healthcare providers like the NHS, aimi…
…
continue reading

1
New SysAid Vulnerabilities Added to CISA’s KEV List: XXE Flaws Could Enable RCE
26:10
26:10
Play later
Play later
Lists
Like
Liked
26:10Two newly added vulnerabilities in SysAid’s On-Prem IT support software — CVE-2025-2775 and CVE-2025-2776 — have officially joined the Cybersecurity and Infrastructure Security Agency (CISA)’s Known Exploited Vulnerabilities (KEV) catalog, signaling increased concern around their potential abuse. While there are no confirmed reports of public explo…
…
continue reading