A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
In this podcast, networking guru Mattias Fridström, Chief Evangelist at Arelion and industry experts discuss all things Internet, networks, cloud and connectivity.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Originally the “How to Cover Money” podcast series, ”We Mean Business” is produced by The Reynolds Center for Business Journalism, designed specifically for journalists who want to cover business better on their beats.
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading
#1 Place For Negotiators
…
continue reading
Tech Bytes are short sponsored audio segments that appear at the end of Network Break episodes. We also separate them into this standalone feed so it’s easy to stay in the loop on new vendor developments.
…
continue reading
From the construction of virtual realities to the internet of things to the watches on our wrists—technology's influence is everywhere. Its role in our lives is evolving fast, and we're faced with riveting questions and tough challenges that sit at the intersection of technology and humanity. Listen in every Friday, with host, journalist Sherrell Dorsey, as TED speakers explore the way tech shapes how we think about society, science, design, business, and more. Follow Sherrell on Instagram @ ...
…
continue reading
Here's where to find podcasts from The Nation. Political talk without the boring parts, featuring the writers, activists and artists who shape the news, from a progressive perspective.
…
continue reading
Over The Edge is a podcast about edge computing and those in the industry who are creating the future of the internet. On the show we talk to corporate leaders, open-source experts, technologists, journalists, analysts, and the community at large, to discuss technological innovations, trends, practical applications, business models, and the occasional far-flung theory. Over the Edge is brought to you by the generous sponsorship of Dell Technologies.
…
continue reading
The L.A. Report is a breakdown of the day's top news from Southern California, featuring the award-winning reporting of LAist 89.3 FM – L.A.'s number one NPR station. Hosted by Austin Cross in the morning and Julia Paskin in the afternoon, it's the smart way to start and end your day. This program is made possible in part by the Corporation for Public Broadcasting, a private corporation funded by the American people.
…
continue reading

1
SANS Stormcast Monday, June 16th, 2025: Katz Stealer in JPG; JavaScript Attacks; Reviving expired Discord Invites for Evil (#)
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45SANS Stormcast Monday, June 16th, 2025: Katz Stealer in JPG; JavaScript Attacks; Reviving expired Discord Invites for Evil Katz Stealer in JPG Xavier found some multistage malware that uses an Excel Spreadsheet and an HTA file to load an image that includes embeded a copy of Katz stealer. https://isc.sans.edu/diary/More+Steganography/32044 https://…
…
continue reading

1
Episode 141: A Human-Centered Take on Password Policies
43:18
43:18
Play later
Play later
Lists
Like
Liked
43:18In episode 141 of Cybersecurity Where You Are, Tony Sager is joined by Phyllis Lee, VP of SBP Content Development at the Center for Internet Security®(CIS®); and Julie Haney, Computer Scientist & Human-Centered Cybersecurity Researcher at the National Institute of Standards and Technology (NIST). Together, they use a human-centered understanding of…
…
continue reading

1
How E. Jean Carroll Beat Trump in Court—Plus, What Really Happened in the 2024 Election | Start Making Sense
36:45
36:45
Play later
Play later
Lists
Like
Liked
36:45Donald Trump, found guilty of sexual assault and defamation, owes E. Jean Carroll $88 million. She explains how she beat him in court, twice, proving that he attacked her in a Bergdorf dressing room and then lied about it. Her new book is Not My Type: One Woman vs. a President. Also, the leading autopsies on the 2024 defeat of Democrats are missing…
…
continue reading
How do you get more from GitHub in your work routine? Richard chats with April Yoho about how sysadmins can take advantage of more GitHub features to make better quality scripts and more! April discusses the capabilities of GitHub Copilot to assist administrators in comprehending the intricacies of source management, including branching and merging…
…
continue reading

1
Man allegedly linked to Palm Springs bombing dies, Senate's plan to sell public land hits roadblock, UBI for LA community college students — The P.M. Edition
4:32
4:32
Play later
Play later
Lists
Like
Liked
4:32A man accused of aiding in the Palm Springs fertility clinic bombing has died in custody. A plan to sell off millions of acres of California's public lands may be off the table. What a monthly stipend can mean for LA's community college students. Plus, more. Support The L.A. Report by donating at LAist.com/join and by visiting https://laist.com Vis…
…
continue reading

1
Patient Trust on the Line: The Fallout from McLaren Health Care’s 2024 Breach
44:50
44:50
Play later
Play later
Lists
Like
Liked
44:50In this episode, we dive into the 2024 McLaren Health Care data breach that compromised the sensitive information of over 743,000 individuals—just one year after a similar ransomware attack impacted 2.2 million. We’ll unpack the timeline of the attack: how cybercriminals gained unauthorized access between July 17 and August 3, exploiting vulnerabil…
…
continue reading

1
SANS Stormcast Tuesday, June 24th, 2025: Telnet/SSH Scan Evolution; Fake Sonicwall Software; File-Fix vs Click-Fix (#)
4:03
4:03
Play later
Play later
Lists
Like
Liked
4:03SANS Stormcast Tuesday, June 24th, 2025: Telnet/SSH Scan Evolution; Fake Sonicwall Software; File-Fix vs Click-Fix Quick Password Brute Forcing Evolution Statistics After collecting usernames and passwords from our ssh and telnet honeypots for about a decade, I took a look back at how scans changed. Attackers are attempting more passwords in each s…
…
continue reading

1
NeuralTrust’s Echo Chamber: The AI Jailbreak That Slipped Through the Cracks
56:30
56:30
Play later
Play later
Lists
Like
Liked
56:30This podcast dives deep into one of the most pressing vulnerabilities in modern AI — the rise of sophisticated "jailbreaking" attacks against large language models (LLMs). Our discussion unpacks a critical briefing on the evolving landscape of these attacks, with a spotlight on the novel “Echo Chamber” technique discovered by NeuralTrust. Echo Cham…
…
continue reading

1
Tech Bytes: New From HPE Discover—Networking, AI, and More (Sponsored)
20:59
20:59
Play later
Play later
Lists
Like
Liked
20:59Today on the Tech Bytes podcast, sponsored by HPE, we get a preview of HPE Discover. We talk about networking, security, and agentic AI announcements coming out of the event. We’ll also talk about how HPE is converging network and security in its product portfolio, and HPE’s approach to AI both as a tool being... Read more »…
…
continue reading

1
AT&T, Verizon, and Beyond: How Salt Typhoon Targets Global Telcos
44:06
44:06
Play later
Play later
Lists
Like
Liked
44:06In this episode, we dive deep into the alarming revelations about Salt Typhoon—a Chinese state-sponsored advanced persistent threat (APT) actor, also known as RedMike, Earth Estries, FamousSparrow, GhostEmperor, and UNC2286. Backed by China’s Ministry of State Security (MSS), this group has been running extensive cyber espionage operations since at…
…
continue reading

1
Iranian-Americans in LA call for regime change, LAPD Chief defends protest actions, CA's new extreme heat tracker— The A.M. Edition
4:46
4:46
Play later
Play later
Lists
Like
Liked
4:46Protesters in LA call for regime change in Iran. LA's police chief defends his officers in the face of anti-ICE protests. California's new tool that treats extreme heat like a hurricane or tornado. Plus more. Support The L.A. Report by donating at LAist.com/join and by visiting https://laist.com Visit www.preppi.com/LAist to receive a FREE Preppi E…
…
continue reading

1
Fake Microsoft, Netflix, & Apple Support: The Scam Lurking in Google Search
32:40
32:40
Play later
Play later
Lists
Like
Liked
32:40In this eye-opening episode, we break down a sophisticated new trend in tech support scams (TSS) that’s catching even the most cautious users off guard. Scammers are now hijacking Google Ads and manipulating search results to funnel users—who are simply looking for help—to malicious phone numbers injected directly into legitimate websites like Appl…
…
continue reading

1
Tracking Think Tanks w/ Ben Freeman and Nick Cleveland-Stout | American Prestige
54:33
54:33
Play later
Play later
Lists
Like
Liked
54:33Ben Freeman and Nick Cleveland-Stout from the Quincy Institute join the program to talk about their Think Tank Funding Tracker, a repository that tracks funding from foreign governments, the U.S. government, and Pentagon contractors to the top 50 think tanks in the United States over the past five years. The group discusses think tanks’ role in the…
…
continue reading

1
Legislature introduces "No Vigilantes Act", Tustin hangar cleanup nearly done, LAist's resource guide for immigrants — The P.M. Edition
4:55
4:55
Play later
Play later
Lists
Like
Liked
4:55A new bill would require law enforcement officers operating in California to identify themselves. The debris cleanup from 2023's Tustin hangar fire is almost finished. We have a guide to help connect immigrant communities with food, remote jobs, financial aid, and legal resources. Plus, more. Support The L.A. Report by donating at LAist.com/join an…
…
continue reading

1
From Malware to Court: Qilin Ransomware’s ‘Call a Lawyer’ Tactic
43:58
43:58
Play later
Play later
Lists
Like
Liked
43:58In this episode, we take a deep dive into the Qilin ransomware group — now regarded as the world’s leading ransomware-as-a-service (RaaS) operation — and explore how it’s reshaping the cybercrime landscape in 2025. Qilin, also known as Agenda, burst onto the scene in 2022 with a Go-based ransomware. It has since evolved into a highly evasive Rust-b…
…
continue reading

1
SANS Stormcast Tuesday, June 24th, 2025: Ichano ATHome IP Camera Scans; Netscaler Vulnerability; WinRar Vulnerability (#)
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04SANS Stormcast Tuesday, June 24th, 2025: Ichano ATHome IP Camera Scans; Netscaler Vulnerability; WinRar Vulnerability Scans for Ichano AtHome IP Cameras A couple days ago, a few sources started scanning for the username super_yg and the password 123. This is associated with Ichano IP Camera software. https://isc.sans.edu/diary/Scans%20for%20Ichano%…
…
continue reading

1
Zero-Click, Zero-Warning: The FreeType Flaw Behind a Spyware Surge
57:15
57:15
Play later
Play later
Lists
Like
Liked
57:15In this episode, we dive deep into the story behind CVE-2025-27363, a critical zero-click vulnerability in the widely used FreeType font rendering library. Initially discovered by Facebook’s security team and patched by Google in May 2025, this flaw allowed attackers to execute arbitrary code on Android devices—without any user interaction—by explo…
…
continue reading

1
The Insurance Industry Under Fire: Anatomy of the Aflac Cyber Incident
53:58
53:58
Play later
Play later
Lists
Like
Liked
53:58In this episode, we take a deep dive into the June 2025 cyberattack on Aflac, one of the latest strikes in a growing wave of sophisticated, AI-driven cyber campaigns targeting the insurance industry. On June 12, Aflac detected suspicious activity within its U.S. network—a breach attributed to a highly organized cybercrime group and part of a larger…
…
continue reading

1
Protesters rally against strikes in Iran, the 1870s law at the center of Newsom vs Trump hearing, LA City Council considers ICE-related lawsuit— The A.M. Edition
4:42
4:42
Play later
Play later
Lists
Like
Liked
4:42Demonstrators hit the streets of LA to protest the military strikes on Iran. The legal battle over who controls the National Guard in LA throws it back to the 70s... the 1870s. LA City Council is gearing up for its own legal fight over the ICE arrests. Plus more. Support The L.A. Report by donating at LAist.com/join and by visiting https://laist.co…
…
continue reading

1
The Nucor Cyberattack: How Ransomware Threatens American Steel
58:40
58:40
Play later
Play later
Lists
Like
Liked
58:40In May 2025, a ransomware attack forced Nucor — one of America’s largest steel producers — to halt its metal production operations. This wasn’t just a corporate IT incident: it disrupted a critical link in the nation’s industrial supply chain. In this episode, we take an in-depth look at the Nucor attack: how cybercriminals targeted operational tec…
…
continue reading

1
Greater America and the Victims of Its Ambition | The Nation Podcast
40:55
40:55
Play later
Play later
Lists
Like
Liked
40:55On a recent trip to El Salvador, writer Viet Thanh Nguyen noticed striking parallels between the small Central American nation and his own country of origin, Vietnam. Both endured the atrocities of war, each fueled by anti-communist U.S. intervention. And both conflicts—the Vietnam War and El Salvador’s civil war—triggered refugee and migrant crise…
…
continue reading

1
SANS Stormcast Monday, June 23rd, 2025: ADS and Python; More Secure Cloud PCs; Zend.to Path Traversal; Parser Differentials (#)
5:37
5:37
Play later
Play later
Lists
Like
Liked
5:37SANS Stormcast Monday, June 23rd, 2025: ADS and Python; More Secure Cloud PCs; Zend.to Path Traversal; Parser Differentials ADS & Python Tools Didier explains how to use his tools cut-bytes.py and filescanner to extract information from alternate data streams. https://isc.sans.edu/diary/ADS%20%26%20Python%20Tools/32058 Enhanced security defaults fo…
…
continue reading

1
Inside the $225M Crypto Seizure: How Law Enforcement Traced Illicit Funds Across Borders
1:01:32
1:01:32
Play later
Play later
Lists
Like
Liked
1:01:32A staggering $225 million in illicit cryptocurrency was recently seized by U.S. authorities in what has become the largest digital asset recovery in Secret Service history. This episode unpacks the mechanics, methods, and forensics that made this possible—and how a sprawling network of scams, labor compounds, and fake identities in Southeast Asia u…
…
continue reading

1
US enters Israel-Iran conflict, ICE and AAPI hubs, Two Trader Joe’s in Sherman Oaks? — Sunday Edition
9:25
9:25
Play later
Play later
Lists
Like
Liked
9:25State and local officials say they're monitoring security threats after the U.S. struck three Iran nuclear sites on Saturday. Foot traffic is down in popular Asian ethnic enclaves out of fear of immigration actions. Sherman Oaks residents react to a new neighborhood Trader Joe's. Plus, more. Support The L.A. Report by donating at LAist.com/join and…
…
continue reading

1
Inside CVE-2025-23121: Veeam RCE Flaw Opens Door to Ransomware
47:43
47:43
Play later
Play later
Lists
Like
Liked
47:43Ransomware groups are no longer just encrypting data — they're going straight for the backups. And if those backups aren’t properly protected, recovery becomes impossible, and ransom payouts more likely. In this episode, we dive deep into how threat actors are exploiting critical vulnerabilities in widely used backup systems, focusing on the recent…
…
continue reading

1
Democrats Need to Reclaim Anti-War Politics | The Time of Monsters with Jeet Heer
39:03
39:03
Play later
Play later
Lists
Like
Liked
39:03Donald Trump has betrayed his promise to be a pro-peace president. Prodded by Washington hawks and the Israeli government, he has green-lit Israel’s attack on Iran, which the Untied States might soon join directly. A new Middle Eastern war would be a catastrophe. In order to stop it, Democrats will need to recover the anti-war politics that they ad…
…
continue reading

1
Fasana’s Collapse: How One Ransomware Attack Crippled a German Manufacturer
41:37
41:37
Play later
Play later
Lists
Like
Liked
41:37Ransomware just bankrupted a 100-year-old manufacturer—and the world should take notice. In this episode, we dissect the cyberattack that brought down Fasana, a German paper napkin producer, and pushed it into insolvency. On May 19, 2025, employees arrived to find printers ejecting extortion notes. By the end of the week, systems were paralyzed, €2…
…
continue reading

1
CA v. Trump updates, Fire weather warning, A cola named 'Los Angeles' — Saturday Edition
11:32
11:32
Play later
Play later
Lists
Like
Liked
11:32The latest on California versus Trump over the deployment of military troops. Fire weather warning on tap for parts of L.A. County. L.A. Opera opens its fabulous closet for a once-in-a-decade costume sale. We went searching for the origins of a cola in Japan named "Los Angeles" -- and found a story about growing up in Osaka. Support The L.A. Report…
…
continue reading

1
Inside the 16 Billion Credential Leak: The Infostealer Engine Behind the Biggest Breach Yet
54:27
54:27
Play later
Play later
Lists
Like
Liked
54:27In this episode, we break down the true scale and mechanics behind the largest credential leak ever recorded—over 16 billion login credentials, most of them exfiltrated by infostealer malware. We dive into how this happened: from the malware-as-a-service (MaaS) model enabling even low-skill threat actors to deploy powerful stealers, to how credenti…
…
continue reading

1
Santa Ana's La Cuatro empties out, New lawsuit filed against DHS, Public lands in CA could be up for sale — The P.M. Edition
4:42
4:42
Play later
Play later
Lists
Like
Liked
4:42We check in on businesses in Santa Ana, as a commercial corridor in the mostly Latino city has turned into a ghost town. Journalists and protesters are suing the Department of Homeland Security. Huge parcels of public lands in SoCal could be up for sale under Trump's "Big Beautiful Bill." Plus, more. Support The L.A. Report by donating at LAist.com…
…
continue reading

1
Over 1,500 Minecraft Users Infected in Stargazers Ghost Malware Campaign
55:17
55:17
Play later
Play later
Lists
Like
Liked
55:17A malware distribution network hiding in plain sight — on GitHub. This episode unpacks the Stargazers Ghost Network, a massive Distribution-as-a-Service (DaaS) infrastructure run by a threat actor known as Stargazer Goblin. Using over 3,000 GitHub accounts, this operation pushes dangerous information-stealing malware disguised as legitimate game mo…
…
continue reading

1
Weaponized GitHub Repositories: How Banana Squad and Water Curse Are Hitting Devs
45:59
45:59
Play later
Play later
Lists
Like
Liked
45:59Cybercriminals are increasingly turning GitHub into a malware distribution network. In this episode, we unpack two of the most alarming recent campaigns: Water Curse and Banana Squad — both targeting developers, red teams, and security professionals through poisoned open-source projects. Water Curse, a financially motivated group, used at least 76 …
…
continue reading

1
Chain IQ Breach Exposes UBS & Pictet Employee Data: A Supply Chain Failure
1:05:22
1:05:22
Play later
Play later
Lists
Like
Liked
1:05:22A single vendor was compromised — and suddenly, internal records from UBS, Pictet, Manor, and Implenia were leaked. The Chain IQ cyberattack is a textbook example of how fragile the digital supply chain has become. This episode dissects the breach that exposed names, roles, phone numbers, even CEO contact details of over 137,000 UBS employees, and …
…
continue reading

1
Ruling keeps Trump in control of CA National Guard, Immigrant rent crisis, Pasadena PD investigates possible ICE action— The A.M. Edition
4:38
4:38
Play later
Play later
Lists
Like
Liked
4:38An appeals court lets President Trump stay in control of California's National Guard, for now. Families are struggling to make ends meet in the wake of recent ICE arrests. Pasadena's police want answers after this week's ICE action. Plus more. Support The L.A. Report by donating at LAist.com/join and by visiting https://laist.com Visit www.preppi.c…
…
continue reading

1
Israel-Iran War, Russia Strikes Kyiv, Trump Expands Travel Ban | American Prestige
47:37
47:37
Play later
Play later
Lists
Like
Liked
47:37No ChatGPT here—our em dashes are organic. This week: in the Iran-Israel war, an update on the casualties and targets (1:52), US involvement remains in question (7:45), Ayatollah Khamenei refuses to surrender (14:47), and US and Israeli intelligence agencies disagree over “evidence” of Iran pursuing a nuclear weapon (18:14); Trump quits the G7 summ…
…
continue reading

1
Oxford City Council Breach Exposes 21 Years of Data
35:51
35:51
Play later
Play later
Lists
Like
Liked
35:51State and local governments are under cyber siege. In this episode, we break down how and why these public institutions have become top targets for attackers — and why the threats are getting worse. Digitization is expanding public access to services, but it's also opening new doors for threat actors. Many local authorities still rely on legacy IT …
…
continue reading

1
Why are we sending critical metals to the dump? | Jeff More
8:35
8:35
Play later
Play later
Lists
Like
Liked
8:35The world is heading toward a massive copper shortage that could derail the clean energy transition, says mining expert Jeff More. He shows how advanced sensing technology could get us back on the right track, drastically cutting down on the wasted materials from traditional mining and helping meet the growing demand for essential metals. Want to h…
…
continue reading

1
Border Patrol agents at Dodger Stadium, DTLA businesses welcome curfew's end, Juneteenth events — The P.M. Edition
5:00
5:00
Play later
Play later
Lists
Like
Liked
5:00We bring you a report from Dodgers Stadium, where federal Homeland Security officials were present earlier today. Downtown L.A. businesses are welcoming the end of the city's curfew. We have some events you can check out to celebrate Juneteenth. Plus, more. Support The L.A. Report by donating at LAist.com/join and by visiting https://laist.com Visi…
…
continue reading

1
Citrix NetScaler Flaws Expose Enterprise Networks: CVE-2025-5349 & CVE-2025-5777
38:12
38:12
Play later
Play later
Lists
Like
Liked
38:12Two newly disclosed critical vulnerabilities—CVE-2025-5349 and CVE-2025-5777—have put Citrix NetScaler ADC and Gateway deployments at serious risk, exposing enterprise environments to potential data breaches and service disruptions. These flaws underscore the persistent challenges facing infrastructure teams, especially when balancing security patc…
…
continue reading

1
SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords (#)
5:47
5:47
Play later
Play later
Lists
Like
Liked
5:47SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.s…
…
continue reading

1
GerriScary: How CVE-2025-1568 Threatened Google’s Open-Source Supply Chain
35:21
35:21
Play later
Play later
Lists
Like
Liked
35:21CVE-2025-1568, dubbed "GerriScary", has shaken the open-source ecosystem by exposing a fundamental weakness in Google’s Gerrit code review system—one that could have enabled attackers to infiltrate 18 of Google’s most widely used open-source projects, including Chromium, ChromiumOS, Dart, and Bazel. This episode breaks down how the vulnerability wa…
…
continue reading

1
Cisco & Atlassian Under Fire: High-Severity Flaws and What’s at Risk
53:38
53:38
Play later
Play later
Lists
Like
Liked
53:38Cisco and Atlassian have both released urgent security advisories in response to newly discovered high-severity vulnerabilities—and the implications are serious. Cisco’s firmware flaws impact Meraki MX and Z Series devices running AnyConnect VPN. A bug in the SSL VPN process allows authenticated attackers to crash the VPN server, causing repeated d…
…
continue reading

1
Pasadena ICE protests, Andrew Do assets returned to taxpayers, LAUSD cell phone ban success— The A.M. Edition
4:27
4:27
Play later
Play later
Lists
Like
Liked
4:27Pasadena protesters hit the streets to denounce ICE arrests. There's justice for taxpayers in the aftermath of the Andrew Do scandal. And now that the school year is over, the verdict seems to be in on L-A Unified cell phone ban. Plus more. Support The L.A. Report by donating at LAist.com/join and by visiting https://laist.com Visit www.preppi.com/…
…
continue reading