Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Dr Jason Edwards and Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dr Jason Edwards and Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Daily Cyber News – October 30th, 2025

7:39
 
Share
 

Manage episode 516746102 series 3691420
Content provided by Dr Jason Edwards and Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dr Jason Edwards and Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

This is today’s cyber news for October 30th, 2025. A broad Microsoft cloud outage led our coverage, reminding teams how identity and Domain Name System dependencies can stall entire workflows. Critical infrastructure risk followed, with Canada warning that hacktivists changed setpoints on exposed industrial gear. We then moved to active exploitation in factory software, a remote-code-execution flaw in XWiki driving cryptomining, and a coordinated wave of malicious Node Package Manager look-alikes harvesting tokens. The middle of the brief covered a four-terabyte backup exposure tied to a global consultancy, Android tap-to-pay relays, and a new leakage route from trusted enclaves on double data rate five hardware. We closed with botnets, stealthy espionage, plugin risk, regional cloud latency, data poisoning, and human-like Android malware.

Listeners will hear concise, four-sentence rundowns that stick to what happened and why it matters. Leaders get signal on business continuity, vendor timelines, third-party exposure, and fraud risks; defenders hear the mechanisms that made each incident possible so they can tune detection and response. It’s a fast scan of operational realities across cloud control planes, software supply chains, industrial networks, and mobile threats—useful for morning stand-ups and afternoon triage. The narrated feed is available at DailyCyber.news.

  continue reading

41 episodes

Artwork
iconShare
 
Manage episode 516746102 series 3691420
Content provided by Dr Jason Edwards and Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dr Jason Edwards and Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

This is today’s cyber news for October 30th, 2025. A broad Microsoft cloud outage led our coverage, reminding teams how identity and Domain Name System dependencies can stall entire workflows. Critical infrastructure risk followed, with Canada warning that hacktivists changed setpoints on exposed industrial gear. We then moved to active exploitation in factory software, a remote-code-execution flaw in XWiki driving cryptomining, and a coordinated wave of malicious Node Package Manager look-alikes harvesting tokens. The middle of the brief covered a four-terabyte backup exposure tied to a global consultancy, Android tap-to-pay relays, and a new leakage route from trusted enclaves on double data rate five hardware. We closed with botnets, stealthy espionage, plugin risk, regional cloud latency, data poisoning, and human-like Android malware.

Listeners will hear concise, four-sentence rundowns that stick to what happened and why it matters. Leaders get signal on business continuity, vendor timelines, third-party exposure, and fraud risks; defenders hear the mechanisms that made each incident possible so they can tune detection and response. It’s a fast scan of operational realities across cloud control planes, software supply chains, industrial networks, and mobile threats—useful for morning stand-ups and afternoon triage. The narrated feed is available at DailyCyber.news.

  continue reading

41 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play