show episodes
 
FX in Focus explores the realm of international B2B payments and market trends. We celebrate the talent and ideas that contribute to the cross-border payments industry and discuss issues facing CFOs and global businesses big and small, so there's a lot to talk about.
  continue reading
 
Fintech is eating the world. Join Peter Renton, Co-Founder of Fintech Nexus, every week as he interviews the fintech leaders who are leading the transformation of financial services. If you want to understand what the future will look like for lending, payments, digital banking and more tune in to Fintech One•On•One (formerly the Lend Academy Podcast).
  continue reading
 
Artwork

1
The Nomics Update

Clay Collins

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This is the audio journal of Nomics.com CEO Clay Collins. The podcast tells stories from inside our cryptocurrency & bitcoin market data API company. Topics include Nomics’ product roadmap; new partnerships; company outlook; important new ideas shaping the future of Nomics.com and Nomics crypto market data API; as well as business strategy, philosophy, crypto investing & fundraising. Nomics.com launched in January of 2018 as an API-first company. The company was created in response to increa ...
  continue reading
 
Dive into the world of Supply Chain Finance, FinTech Innovation, and B2B Payments with Vayana Dialogue - a thought leadership podcast by Vayana. In each episode, we bring you candid conversations with domain experts in B2B Trade, exploring the trends and opportunities shaping the financial ecosystem, in India and beyond. From managing liquidity and navigating regulatory shifts to leveraging AI and digital identity, these podcasts offer expert insights and real-world stories that matter to de ...
  continue reading
 
This Podcast by MEDICI is hosted by Amit Goel (Founder of MEDICI). And focuses on the part of FinTech innovation that is invisible to the end-customers. The e-plumbing and financial rewiring that is rewriting how financial services are delivered and experienced. Fintech, banking and tech folks come here to learn about how financial firms (old and new) are leveraging the power of open banking and APIs.
  continue reading
 
Artwork

1
TreasuryCast

TMI - Treasury Management International

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to TreasuryCast, the podcast series brought to you by Treasury Management International, a well-respected and independent voice in the treasury world. TreasuryCast showcases topical, pragmatic solutions and strategic insights providing valuable material for all practitioners, from experienced treasurers and CFOs to those new to the profession.
  continue reading
 
Make better and faster decisions in response to far-reaching market shifts in business and technology. Featuring content from our 6Pages subscription service, a new kind of market intelligence for professional decision-makers. Learn more and sign up for free summaries of our deeply researched briefs on 6Pages.com.
  continue reading
 
How can Fintech contribute to building a better world? In Season 4 of Fintech Files, we’re turning our focus to where financial technology meets social impact. This season, we explore financial inclusion, sustainable investing, and decarbonization with some of the brightest minds in the industry. As financial services touch every aspect of our lives, the opportunity to drive positive change is enormous. About Fintech Files: Join us on Fintech Files from BCG Platinion as we explore the cuttin ...
  continue reading
 
Artwork

1
The Buzz

Bank Automation News

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Bank Automation News's podcast covers current trends and news in automation and and AI. Bank Automation News is at the forefront of tracking banking automation and AI. Automation is the next frontier of financial services technology. It transforms banking processes from customer experience to compliance, lending solutions and investment. This podcast charts that transformation.
  continue reading
 
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
  continue reading
 
Artwork

1
Fintech Beat

Chris Brummer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Fintech Beat, the intersection of finance, technology, policy and regulation. Each episode features the latest trends, movers and shakers, ideas and policies in financial technology. Host Chris Brummer, a Georgetown law professor and world-renowned fintech expert, partners with the CQ Roll Call newsroom — Washington's leader for nonpartisan legislative and regulatory analysis — to bring insights that make this a must listen for anyone interested in finance.
  continue reading
 
Loading …
show series
 
Phishing e-mail that hides malicious links from Outlook users Jan found a phishing email that hides the malicious link from Outlook users. The email uses specific HTML comment clauses Outlook interprets to render or not render specific parts of the email s HTML code. Jan suggests that the phishing email is intented to not expose users of https://is…
  continue reading
 
In this episode, we dive deep into three actively exploited zero-day vulnerabilities discovered in Google Chrome in 2025, each of which was patched in rapid succession following targeted attacks. At the center is CVE-2025-5419, a high-severity out-of-bounds read/write flaw in the V8 JavaScript engine that allows attackers to exploit heap corruption…
  continue reading
 
Australia just made cyber history. On May 30, 2025, the nation became the first in the world to enforce mandatory ransomware payment reporting under the newly enacted Cyber Security Act 2024. In this episode, we dissect what this means for businesses, law enforcement, and the global cybersecurity landscape. We break down the key aspects of the legi…
  continue reading
 
In this episode, we dive into Trustifi’s recent $25 million Series A funding round, led by growth equity firm Camber Partners. Specializing in AI-powered email security, Trustifi has now raised a total of $29 million to accelerate its product development, go-to-market strategy, and global marketing initiatives—especially in the MSP space. We unpack…
  continue reading
 
At the recent Treasury 360° Nordic 2025 conference in Stockholm, Eleanor Hill (TMI) sat down with Paulo Kubis (Electrolux Professional) to discuss how he built a treasury function from the ground up following the company’s spin-off. Paulo shares practical insights on simplifying processes, building a high-performance team, and delivering a standout…
  continue reading
 
vBulletin Exploits CVE-2025-48827, CVE-2025-48828 We do see exploit attempts for the vBulletin flaw disclosed about a week ago. The flaw is only exploitable if vBulltin is run on PHP 8.1, and was patched over a year ago. However, vBulltin never disclosed the type of vulnerability that was patched. https://isc.sans.edu/diary/vBulletin%20Exploits%20%…
  continue reading
 
In this episode, we dissect Google's recent and upcoming decisions to distrust several Certificate Authorities (CAs) within the Chrome Root Store, including Entrust, Chunghwa Telecom, and Netlock. These high-impact moves are rooted in Chrome's strict enforcement of compliance, transparency, and security standards for public trust. We explore the ro…
  continue reading
 
Send us a text Miguel Armaza interviews Eynat Guez, CEO and Founder of Papaya Global. She has built an HR and payroll platform that has transformed how companies manage and operate global teams across 180 countries. After having faced over 1,000 rejections from VCs, Papaya has now grown to process $34 billion in payments annually and they've raised…
  continue reading
 
Two critical, actively exploited vulnerabilities in vBulletin forum software—CVE-2025-48827 and CVE-2025-48828—have put thousands of websites at immediate risk of full system compromise. In this episode, we dissect how these flaws, triggered by insecure usage of PHP’s Reflection API and abuse of vBulletin’s template engine, allow unauthenticated at…
  continue reading
 
In this episode, we dissect the JINX-0132 cryptojacking campaign — a real-world example of how threat actors are exploiting cloud and DevOps environments to mine cryptocurrency at scale. We unpack how cybercriminals targeted misconfigured Docker APIs, publicly exposed HashiCorp Nomad and Consul servers, and vulnerable Gitea instances — turning ente…
  continue reading
 
Simple SSH Backdoor Xavier came across a simple SSH backdoor taking advantage of the ssh client preinstalled on recent Windows systems. The backdoor is implemented via an SSH configuration file that instructs the SSH client to connect to a remote system and forward a shell on a random port. This will make the shell accessible to anybody able to con…
  continue reading
 
In this episode, we unpack two newly disclosed Linux vulnerabilities—CVE-2025-5054 and CVE-2025-4598—discovered by the Qualys Threat Research Unit (TRU). These race condition flaws impact Ubuntu’s apport and Red Hat/Fedora’s systemd-coredump, exposing a little-known but critical attack vector: core dumps from crashed SUID programs. We dive into how…
  continue reading
 
After a decade of existence, Ethereum has gone a long way from its initial whitepaper, yet many efforts in scaling and finding product-market-fit have been severely criticized for falling short of their promise. However, despite numerous other ‘Ethereum killers’ being launched over the years, none has managed to attract so many developers and liqui…
  continue reading
 
Recent phishing campaigns have entered a new phase—one where trust is weaponized. In this episode, we break down how cybercriminals are exploiting legitimate services like Google Apps Script and Google Firebase Storage to host phishing pages, evade detection, and steal credentials. Using cleverly crafted lures such as fake DocuSign notifications, i…
  continue reading
 
In this episode, we unpack the international takedown of AVCheck, one of the largest counter antivirus (CAV) services used by cybercriminals to test and fine-tune malware before deployment. Led by Dutch authorities and supported by agencies from the U.S., Germany, France, and others, this operation marks a major win in Operation Endgame—a sweeping …
  continue reading
 
A PNG Image With an Embedded Gift Xavier shows how Python code attached to a PNG image can be used to implement a command and control channel or a complete remote admin kit. https://isc.sans.edu/diary/A+PNG+Image+With+an+Embedded+Gift/31998 Cisco IOS XE WLC Arbitrary File Upload Vulnerability (CVE-2025-20188) Analysis Horizon3 analyzed a recently p…
  continue reading
 
Hi everyone – welcome to your 3 Shifts Edition [AI-generated audio version]. First, California’s longtime leadership on climate regulation may be coming to an end. Congress just voted to revoke California’s emissions waivers, in a move set to nullify the state’s authority to enforce stricter-than-federal vehicle standards – a power it’s held since …
  continue reading
 
ConnectWise has confirmed a cyberattack targeting ScreenConnect, its remote access solution used by thousands of Managed Service Providers (MSPs). The breach is reportedly tied to a sophisticated nation-state actor and linked to CVE-2025-3935, a critical ViewState code injection vulnerability that could allow Remote Code Execution (RCE). In this ep…
  continue reading
 
In this episode, we dive into the graphical corruption saga triggered by Firefox version 139, released on May 27, 2025. Aimed at uncovering what went wrong, we review reports from across the web detailing how the update wreaked havoc for Windows users running NVIDIA graphics cards—particularly those with multi-monitor setups using mixed refresh rat…
  continue reading
 
In this episode, we break down the recent $4 million seed funding round for Unbound, a startup tackling one of the biggest unsolved problems in enterprise AI: how to stop employees from leaking sensitive data through ungoverned use of Generative AI tools. Unbound’s AI Gateway aims to be the missing link between rapid AI adoption and responsible usa…
  continue reading
 
Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adversary%20Defense%20Evasion%20and%20Detection%20%5BGuest%20Diary%5D/31990 Connectwise Breach Affects Scr…
  continue reading
 
Microsoft is taking direct aim at one of the biggest pain points in the Windows ecosystem: update fragmentation. In this episode, we dive deep into the details of Microsoft’s newly announced Windows-native update orchestration platform, currently in private preview. We explore how this unified infrastructure aims to centralize updates for all apps,…
  continue reading
 
Streamlining international B2B payments is a complex undertaking. TreviPay has been taking the complexity out of this process for several decades now. In my conversation with CEO Brandon Spear, we explore TreviPay's transformation from MSTS, its rebranding inspiration, and its global reach across 30 countries. Our discussion highlights TreviPay's v…
  continue reading
 
Linux systems are under siege—particularly in the world of IoT and internet-exposed servers. In this episode, we dissect PumaBot, a new GoLang-based botnet that's turning Linux IoT devices into cryptomining workhorses. We’ll break down how attackers brute-force SSH credentials, install malware disguised as legitimate services, and use systemd for s…
  continue reading
 
On December 25, 2024, while most businesses were offline, a serious data breach struck LexisNexis Risk Solutions—exposing the personal data of over 360,000 individuals. The twist? The attack vector wasn’t a direct hack, but an indirect compromise through a third-party GitHub repository. Even more concerning, the breach went undetected until April 1…
  continue reading
 
Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wilson took a weird string found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Exploring%20a%20Use%20Case%20of%20Artificial%20Intelligence%20Assistance%20with%20U…
  continue reading
 
On this episode, we dissect the ransomware attack that brought MathWorks—a cornerstone software provider for engineers, scientists, and educators—to a grinding halt. The attack, which began on May 18, 2025, and was officially confirmed on May 26, crippled a wide range of customer-facing and internal systems, from MATLAB Online and ThingSpeak to lic…
  continue reading
 
The cybersecurity market is booming, projected to triple in size from $215 billion in 2025 to $697 billion by 2035. This explosive growth is being fueled by rising cyber threats, the digital transformation of global businesses, and an urgent need for advanced security operations. One of the clearest signals of this momentum? Zscaler’s acquisition o…
  continue reading
 
In this episode, we unpack a critical supply chain breach that’s rattled the cybersecurity world: the exploitation of multiple zero-day vulnerabilities in SimpleHelp Remote Support Software — most notably CVE-2024-57726, a privilege escalation flaw scored 9.9 by the NVD. Threat actors linked to the DragonForce ransomware operation and the Scattered…
  continue reading
 
Recorded live at the recent Treasury 360° Nordic conference in Stockholm, Eleanor Hill (TMI) speaks with Wolt’s Group Treasurer, Annika Westerholm, about building a treasury function during rapid global expansion. Learn how the Helsinki-based delivery platform brought structure, policy, and tech-driven efficiency - including improved cash flow fore…
  continue reading
 
SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems. https://isc.sans.edu/diary/Securing%20Your%20SSH%20authorized_keys%20File/319…
  continue reading
 
This episode dives deep into Operation RapTor, one of the largest international crackdowns on dark web crime to date. We analyze how coordinated law enforcement actions across ten countries led to the arrest of 270 individuals, the seizure of $200 million in currency and digital assets, and the dismantling of major darknet marketplaces including In…
  continue reading
 
In this episode, we take a deep dive into the recent Marlboro-Chesterfield Pathology (MCP) ransomware attack—one of the most significant healthcare breaches of 2025. On January 16th, MCP detected unauthorized activity on its internal systems. Just days later, the SAFEPAY ransomware group claimed responsibility, posting stolen data—over 30GB of sens…
  continue reading
 
In this episode, we dive deep into the underground cybercrime ecosystem powering the surge of modern infostealers—Stealc, Vidar, and LummaC2. These malware strains aren't just code—they're full-service products sold as Malware-as-a-Service (MaaS), giving even low-skilled attackers access to powerful data theft tools. We break down how these stealer…
  continue reading
 
Send us a text Miguel Armaza interviews Chen Amit, CEO and Co-Founder of Tipalti, a global fintech platform processing billions in payments and serving over 4,000 mid-market companies worldwide. By focusing on the underserved mid-sized companies, Tipalti has achieved 99% gross revenue retention over 15 years and secured licenses across 50+ jurisdic…
  continue reading
 
SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon3.ai shows how it was able to find the vulnerability in Fortinet s products, and how to possibly exp…
  continue reading
 
We couldn’t miss the Avalanche Summit where we sat down with Emin Gün Sirer, co-founder & CEO of Ava Labs, to discuss the evolution of Avalanche’s ecosystem and how HyperSDK ushers in a scalable, interoperable, multi-chain future. Join us for a fascinating discussion on Avalanche’s approach to decentralisation, scalability & interoperability, and l…
  continue reading
 
In this episode, we dive deep into the growing tension between AI innovation and data privacy through the lens of a major controversy: Microsoft’s Windows 11 Recall feature. Designed to screenshot nearly everything a user does every few seconds, Recall creates a searchable visual archive of on-screen activity. But while Microsoft claims it enhances…
  continue reading
 
In this episode, we break down the resurgence of the Bumblebee malware loader and its latest distribution method: blackhat SEO campaigns and trojanized software installers. By mimicking legitimate download pages through typosquatted domains and poisoning Bing search results, attackers are tricking IT professionals into unknowingly infecting their o…
  continue reading
 
In this episode, we dive into the evolving tactics of the Silent Ransom Group (SRG)—also known as Luna Moth—a cybercriminal outfit that has shifted from traditional phishing to a new, more deceptive strategy: impersonating IT support over the phone. Their latest victims? U.S. law firms, targeted for the sensitive data they hold and the large financ…
  continue reading
 
Hi everyone – welcome to your 3 Shifts Edition [AI-generated audio version]. First, AI slop is spreading like kudzu and it’s more than just annoying spam – it’s a threat to online ecosystems as we know them. From YouTube channels to Pinterest recipes to Spotify playlists, slop farmers are exploiting AI’s ability to generate content cheaply and en m…
  continue reading
 
A growing cyber threat is targeting macOS users who rely on Ledger cold wallets to secure their cryptocurrency. In this episode, we dissect the anti-Ledger malware campaign—an increasingly sophisticated phishing operation that impersonates the trusted Ledger Live application to trick users into revealing their 24-word recovery phrases. Once entered…
  continue reading
 
In this episode, we break down the latest and most impactful phase of Operation Endgame, the international law enforcement campaign targeting the backbone of the ransomware ecosystem. Between May 19–22, authorities executed a sweeping takedown of 300 servers, neutralized 650 domains, and seized €3.5 million in cryptocurrency, adding to a total of €…
  continue reading
 
In this episode, we dive into the alarming surge of infostealer malware campaigns leveraging social media platforms, particularly TikTok, as their distribution vector. Threat actors are exploiting trending content—especially around AI tools like Sora, ChatGPT, and Google Gemini AI, and popular software like CapCut and MidJourney—to bait unsuspectin…
  continue reading
 
Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse. https://isc.sans.edu/diary/Resilient%20Secure%20Backup%20Connectivity%20for%20SMB%20Home%20Users/31972 BadSuccessor…
  continue reading
 
In this episode, Anthony Soohoo, CEO of MoneyGram, shares his vision for transforming one of the world's largest global payments networks through what he calls a "refounder mindset." Drawing from his experience leading digital transformations at major companies like Walmart and CBS, Soohoo discusses how MoneyGram is modernizing its platform while l…
  continue reading
 
Access to transactional data provides the richest insights for personalized banking experiences. “What are [consumers] paying, how are they paying, what kinds of life stages are they in the midst of?” Lindsay Soergel, chief executive at AI-powered digital banking solutions provider Fintilect, asks. She says this information delivers “the greatest v…
  continue reading
 
In this episode, we dive into the ransomware attack that struck Kettering Health, a major healthcare provider, and the evolving tactics of the Interlock ransomware group behind it. Interlock, active since late 2024, has adopted advanced techniques including double extortion, credential theft, and PowerShell-based backdoors to compromise healthcare …
  continue reading
 
As digital deception evolves, so must our defenses. In this episode, we dive deep into the escalating battle for trust in our increasingly connected world. From nation-state-level authentication models to real-time behavioral biometrics on your mobile device, the tools to verify identity are becoming more sophisticated—and more essential—than ever.…
  continue reading
 
In this episode, we dive into a growing cybersecurity crisis: the exposure of Industrial Control Systems (ICS) on the public internet. These systems power our electric grids, water supplies, and industrial automation—but thousands are reachable online, often unsecured. We explore how researchers are working to distinguish between real ICS devices a…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play