FX in Focus explores the realm of international B2B payments and market trends. We celebrate the talent and ideas that contribute to the cross-border payments industry and discuss issues facing CFOs and global businesses big and small, so there's a lot to talk about.
…
continue reading
Fintech is eating the world. Join Peter Renton, Co-Founder of Fintech Nexus, every week as he interviews the fintech leaders who are leading the transformation of financial services. If you want to understand what the future will look like for lending, payments, digital banking and more tune in to Fintech One•On•One (formerly the Lend Academy Podcast).
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Learn from today’s global leaders building the organizations that will dominate the 21st century in fintech, business, and beyond.
…
continue reading
This is the audio journal of Nomics.com CEO Clay Collins. The podcast tells stories from inside our cryptocurrency & bitcoin market data API company. Topics include Nomics’ product roadmap; new partnerships; company outlook; important new ideas shaping the future of Nomics.com and Nomics crypto market data API; as well as business strategy, philosophy, crypto investing & fundraising. Nomics.com launched in January of 2018 as an API-first company. The company was created in response to increa ...
…
continue reading
Dive into the world of Supply Chain Finance, FinTech Innovation, and B2B Payments with Vayana Dialogue - a thought leadership podcast by Vayana. In each episode, we bring you candid conversations with domain experts in B2B Trade, exploring the trends and opportunities shaping the financial ecosystem, in India and beyond. From managing liquidity and navigating regulatory shifts to leveraging AI and digital identity, these podcasts offer expert insights and real-world stories that matter to de ...
…
continue reading
This Podcast by MEDICI is hosted by Amit Goel (Founder of MEDICI). And focuses on the part of FinTech innovation that is invisible to the end-customers. The e-plumbing and financial rewiring that is rewriting how financial services are delivered and experienced. Fintech, banking and tech folks come here to learn about how financial firms (old and new) are leveraging the power of open banking and APIs.
…
continue reading
Conversations with the scientists and entrepreneurs who are building the future. Support this podcast: https://podcasters.spotify.com/pod/show/tomorrowscale/support
…
continue reading
Welcome to TreasuryCast, the podcast series brought to you by Treasury Management International, a well-respected and independent voice in the treasury world. TreasuryCast showcases topical, pragmatic solutions and strategic insights providing valuable material for all practitioners, from experienced treasurers and CFOs to those new to the profession.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Make better and faster decisions in response to far-reaching market shifts in business and technology. Featuring content from our 6Pages subscription service, a new kind of market intelligence for professional decision-makers. Learn more and sign up for free summaries of our deeply researched briefs on 6Pages.com.
…
continue reading
How can Fintech contribute to building a better world? In Season 4 of Fintech Files, we’re turning our focus to where financial technology meets social impact. This season, we explore financial inclusion, sustainable investing, and decarbonization with some of the brightest minds in the industry. As financial services touch every aspect of our lives, the opportunity to drive positive change is enormous. About Fintech Files: Join us on Fintech Files from BCG Platinion as we explore the cuttin ...
…
continue reading
Bank Automation News's podcast covers current trends and news in automation and and AI. Bank Automation News is at the forefront of tracking banking automation and AI. Automation is the next frontier of financial services technology. It transforms banking processes from customer experience to compliance, lending solutions and investment. This podcast charts that transformation.
…
continue reading

1
Epicenter - Learn about Crypto, Blockchain, Ethereum, Bitcoin and Distributed Technologies
Epicenter Media Ltd.
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
…
continue reading
Welcome to Fintech Beat, the intersection of finance, technology, policy and regulation. Each episode features the latest trends, movers and shakers, ideas and policies in financial technology. Host Chris Brummer, a Georgetown law professor and world-renowned fintech expert, partners with the CQ Roll Call newsroom — Washington's leader for nonpartisan legislative and regulatory analysis — to bring insights that make this a must listen for anyone interested in finance.
…
continue reading

1
SANS Stormcast Thursday, June 5th, 2025: Phishing Comment Trick; AWS default logging mode change; Cisco Backdoor Fixed; Infoblox Vulnerability Details Released
5:26
5:26
Play later
Play later
Lists
Like
Liked
5:26Phishing e-mail that hides malicious links from Outlook users Jan found a phishing email that hides the malicious link from Outlook users. The email uses specific HTML comment clauses Outlook interprets to render or not render specific parts of the email s HTML code. Jan suggests that the phishing email is intented to not expose users of https://is…
…
continue reading

1
Chrome Under Fire: Three Zero-Days, One Month, and Nation-State Exploits
28:23
28:23
Play later
Play later
Lists
Like
Liked
28:23In this episode, we dive deep into three actively exploited zero-day vulnerabilities discovered in Google Chrome in 2025, each of which was patched in rapid succession following targeted attacks. At the center is CVE-2025-5419, a high-severity out-of-bounds read/write flaw in the V8 JavaScript engine that allows attackers to exploit heap corruption…
…
continue reading

1
Australia Forces Transparency: The World’s First Mandatory Ransomware Payment Reporting Law
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01Australia just made cyber history. On May 30, 2025, the nation became the first in the world to enforce mandatory ransomware payment reporting under the newly enacted Cyber Security Act 2024. In this episode, we dissect what this means for businesses, law enforcement, and the global cybersecurity landscape. We break down the key aspects of the legi…
…
continue reading

1
$25M for AI Email Security: Trustifi’s Big Bet on the MSP Market
32:00
32:00
Play later
Play later
Lists
Like
Liked
32:00In this episode, we dive into Trustifi’s recent $25 million Series A funding round, led by growth equity firm Camber Partners. Specializing in AI-powered email security, Trustifi has now raised a total of $29 million to accelerate its product development, go-to-market strategy, and global marketing initiatives—especially in the MSP space. We unpack…
…
continue reading

1
From Start-Up Treasury to DCM Breakthrough
34:38
34:38
Play later
Play later
Lists
Like
Liked
34:38At the recent Treasury 360° Nordic 2025 conference in Stockholm, Eleanor Hill (TMI) sat down with Paulo Kubis (Electrolux Professional) to discuss how he built a treasury function from the ground up following the company’s spin-off. Paulo shares practical insights on simplifying processes, building a high-performance team, and delivering a standout…
…
continue reading

1
SANS Stormcast Wednesday, June 4th, 2025: vBulletin Exploited; Chrome 0-Day Patch; Roundcube RCE Patch; Multiple HP StoreOnce Vulns Patched
7:25
7:25
Play later
Play later
Lists
Like
Liked
7:25vBulletin Exploits CVE-2025-48827, CVE-2025-48828 We do see exploit attempts for the vBulletin flaw disclosed about a week ago. The flaw is only exploitable if vBulltin is run on PHP 8.1, and was patched over a year ago. However, vBulltin never disclosed the type of vulnerability that was patched. https://isc.sans.edu/diary/vBulletin%20Exploits%20%…
…
continue reading

1
Google Chrome vs. Failing CAs: The Policy Behind the Distrust
55:25
55:25
Play later
Play later
Lists
Like
Liked
55:25In this episode, we dissect Google's recent and upcoming decisions to distrust several Certificate Authorities (CAs) within the Chrome Root Store, including Entrust, Chunghwa Telecom, and Netlock. These high-impact moves are rooted in Chrome's strict enforcement of compliance, transparency, and security standards for public trust. We explore the ro…
…
continue reading

1
Eynat Guez, Papaya Global CEO - From 1,000 Rejections to $34 Billion in Annual Payments
41:31
41:31
Play later
Play later
Lists
Like
Liked
41:31Send us a text Miguel Armaza interviews Eynat Guez, CEO and Founder of Papaya Global. She has built an HR and payroll platform that has transformed how companies manage and operate global teams across 180 countries. After having faced over 1,000 rejections from VCs, Papaya has now grown to process $34 billion in payments annually and they've raised…
…
continue reading

1
CVE-2025-48827 & 48828: How vBulletin’s API and Template Engine Got Weaponized
1:35:55
1:35:55
Play later
Play later
Lists
Like
Liked
1:35:55Two critical, actively exploited vulnerabilities in vBulletin forum software—CVE-2025-48827 and CVE-2025-48828—have put thousands of websites at immediate risk of full system compromise. In this episode, we dissect how these flaws, triggered by insecure usage of PHP’s Reflection API and abuse of vBulletin’s template engine, allow unauthenticated at…
…
continue reading

1
JINX-0132: How Cryptojackers Hijacked DevOps Infrastructure via Nomad and Docker
1:07:22
1:07:22
Play later
Play later
Lists
Like
Liked
1:07:22In this episode, we dissect the JINX-0132 cryptojacking campaign — a real-world example of how threat actors are exploiting cloud and DevOps environments to mine cryptocurrency at scale. We unpack how cybercriminals targeted misconfigured Docker APIs, publicly exposed HashiCorp Nomad and Consul servers, and vulnerable Gitea instances — turning ente…
…
continue reading

1
SANS Stormcast Tuesday, June 3rd, 2025: Windows SSH C2; Google Removes CAs from trusted list; MSFT issues Emergency Patch to fix Crash issue; Qualcom Adreno GPU 0-day
6:06
6:06
Play later
Play later
Lists
Like
Liked
6:06Simple SSH Backdoor Xavier came across a simple SSH backdoor taking advantage of the ssh client preinstalled on recent Windows systems. The backdoor is implemented via an SSH configuration file that instructs the SSH client to connect to a remote system and forward a shell on a random port. This will make the shell accessible to anybody able to con…
…
continue reading

1
Password Hashes Leaked via Linux Crash Handlers: The Truth Behind CVE-2025-5054 & 4598
16:11
16:11
Play later
Play later
Lists
Like
Liked
16:11In this episode, we unpack two newly disclosed Linux vulnerabilities—CVE-2025-5054 and CVE-2025-4598—discovered by the Qualys Threat Research Unit (TRU). These race condition flaws impact Ubuntu’s apport and Red Hat/Fedora’s systemd-coredump, exposing a little-known but critical attack vector: core dumps from crashed SUID programs. We dive into how…
…
continue reading

1
ETHPrague: ETH Renaissance - Austin Griffith, Brenda Loya, Joseph Schweitzer, Marek Olszewski
1:00:25
1:00:25
Play later
Play later
Lists
Like
Liked
1:00:25After a decade of existence, Ethereum has gone a long way from its initial whitepaper, yet many efforts in scaling and finding product-market-fit have been severely criticized for falling short of their promise. However, despite numerous other ‘Ethereum killers’ being launched over the years, none has managed to attract so many developers and liqui…
…
continue reading

1
Multi-Stage Phishing Attacks Now Use Google Infrastructure—Here’s How
13:51
13:51
Play later
Play later
Lists
Like
Liked
13:51Recent phishing campaigns have entered a new phase—one where trust is weaponized. In this episode, we break down how cybercriminals are exploiting legitimate services like Google Apps Script and Google Firebase Storage to host phishing pages, evade detection, and steal credentials. Using cleverly crafted lures such as fake DocuSign notifications, i…
…
continue reading

1
Inside the AVCheck Takedown: How Law Enforcement Disrupted a Key Cybercrime Tool
17:34
17:34
Play later
Play later
Lists
Like
Liked
17:34In this episode, we unpack the international takedown of AVCheck, one of the largest counter antivirus (CAV) services used by cybercriminals to test and fine-tune malware before deployment. Led by Dutch authorities and supported by agencies from the U.S., Germany, France, and others, this operation marks a major win in Operation Endgame—a sweeping …
…
continue reading

1
SANS Stormcast Monday, June 2nd, 2025: PNG with RAT; Cisco IOS XE WLC Exploit; vBulletin Exploit
5:42
5:42
Play later
Play later
Lists
Like
Liked
5:42A PNG Image With an Embedded Gift Xavier shows how Python code attached to a PNG image can be used to implement a command and control channel or a complete remote admin kit. https://isc.sans.edu/diary/A+PNG+Image+With+an+Embedded+Gift/31998 Cisco IOS XE WLC Arbitrary File Upload Vulnerability (CVE-2025-20188) Analysis Horizon3 analyzed a recently p…
…
continue reading

1
3 Shifts Edition (May 30 2025): California may lose its emissions waivers, App stores will need to verify ages, “Vibe coding” and personal apps
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08Hi everyone – welcome to your 3 Shifts Edition [AI-generated audio version]. First, California’s longtime leadership on climate regulation may be coming to an end. Congress just voted to revoke California’s emissions waivers, in a move set to nullify the state’s authority to enforce stricter-than-federal vehicle standards – a power it’s held since …
…
continue reading

1
ConnectWise Breach: Nation-State Exploits CVE-2025-3935 in ScreenConnect
15:06
15:06
Play later
Play later
Lists
Like
Liked
15:06ConnectWise has confirmed a cyberattack targeting ScreenConnect, its remote access solution used by thousands of Managed Service Providers (MSPs). The breach is reportedly tied to a sophisticated nation-state actor and linked to CVE-2025-3935, a critical ViewState code injection vulnerability that could allow Remote Code Execution (RCE). In this ep…
…
continue reading

1
Browser vs. GPU: Firefox 139 Collides with NVIDIA Drivers
14:10
14:10
Play later
Play later
Lists
Like
Liked
14:10In this episode, we dive into the graphical corruption saga triggered by Firefox version 139, released on May 27, 2025. Aimed at uncovering what went wrong, we review reports from across the web detailing how the update wreaked havoc for Windows users running NVIDIA graphics cards—particularly those with multi-monitor setups using mixed refresh rat…
…
continue reading

1
Unbound Raises $4M to Secure Generative AI in the Enterprise
20:08
20:08
Play later
Play later
Lists
Like
Liked
20:08In this episode, we break down the recent $4 million seed funding round for Unbound, a startup tackling one of the biggest unsolved problems in enterprise AI: how to stop employees from leaking sensitive data through ungoverned use of Generative AI tools. Unbound’s AI Gateway aims to be the missing link between rapid AI adoption and responsible usa…
…
continue reading

1
SANS Stormcast Friday, May 30th 2025: Alternate Data Streams; Connectwise Breach; Google Calendar C2;
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adversary%20Defense%20Evasion%20and%20Detection%20%5BGuest%20Diary%5D/31990 Connectwise Breach Affects Scr…
…
continue reading

1
Windows Updates, Reimagined: Inside Microsoft’s Unified Orchestration Push
16:18
16:18
Play later
Play later
Lists
Like
Liked
16:18Microsoft is taking direct aim at one of the biggest pain points in the Windows ecosystem: update fragmentation. In this episode, we dive deep into the details of Microsoft’s newly announced Windows-native update orchestration platform, currently in private preview. We explore how this unified infrastructure aims to centralize updates for all apps,…
…
continue reading

1
Brandon Spear, CEO of TreviPay, on taking the complexity out of cross border B2B payments
37:14
37:14
Play later
Play later
Lists
Like
Liked
37:14Streamlining international B2B payments is a complex undertaking. TreviPay has been taking the complexity out of this process for several decades now. In my conversation with CEO Brandon Spear, we explore TreviPay's transformation from MSTS, its rebranding inspiration, and its global reach across 30 countries. Our discussion highlights TreviPay's v…
…
continue reading

1
Systemd as a Weapon: How PumaBot Exploits Linux Persistence
18:38
18:38
Play later
Play later
Lists
Like
Liked
18:38Linux systems are under siege—particularly in the world of IoT and internet-exposed servers. In this episode, we dissect PumaBot, a new GoLang-based botnet that's turning Linux IoT devices into cryptomining workhorses. We’ll break down how attackers brute-force SSH credentials, install malware disguised as legitimate services, and use systemd for s…
…
continue reading

1
The LexisNexis Breach: 364,000 Records Exposed via GitHub
17:22
17:22
Play later
Play later
Lists
Like
Liked
17:22On December 25, 2024, while most businesses were offline, a serious data breach struck LexisNexis Risk Solutions—exposing the personal data of over 360,000 individuals. The twist? The attack vector wasn’t a direct hack, but an indirect compromise through a third-party GitHub repository. Even more concerning, the breach went undetected until April 1…
…
continue reading

1
SANS Stormcast Thursday May 29th 2025: LLM Assisted Analysis; MSP Ransomware; Everetz Vulnerability
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wilson took a weird string found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Exploring%20a%20Use%20Case%20of%20Artificial%20Intelligence%20Assistance%20with%20U…
…
continue reading

1
Ransomware Hits MathWorks: Week-Long Outage Disrupts Millions
12:30
12:30
Play later
Play later
Lists
Like
Liked
12:30On this episode, we dissect the ransomware attack that brought MathWorks—a cornerstone software provider for engineers, scientists, and educators—to a grinding halt. The attack, which began on May 18, 2025, and was officially confirmed on May 26, crippled a wide range of customer-facing and internal systems, from MATLAB Online and ThingSpeak to lic…
…
continue reading

1
Zscaler Acquires Red Canary: What It Means for AI-Powered Security Operations
14:27
14:27
Play later
Play later
Lists
Like
Liked
14:27The cybersecurity market is booming, projected to triple in size from $215 billion in 2025 to $697 billion by 2035. This explosive growth is being fueled by rising cyber threats, the digital transformation of global businesses, and an urgent need for advanced security operations. One of the clearest signals of this momentum? Zscaler’s acquisition o…
…
continue reading

1
DragonForce Breaches MSPs via SimpleHelp Flaws: Inside CVE-2024-57726
16:47
16:47
Play later
Play later
Lists
Like
Liked
16:47In this episode, we unpack a critical supply chain breach that’s rattled the cybersecurity world: the exploitation of multiple zero-day vulnerabilities in SimpleHelp Remote Support Software — most notably CVE-2024-57726, a privilege escalation flaw scored 9.9 by the NVD. Threat actors linked to the DragonForce ransomware operation and the Scattered…
…
continue reading

1
From Local Deliveries to Global Liquidity: Inside Wolt’s Treasury Transformation
15:49
15:49
Play later
Play later
Lists
Like
Liked
15:49Recorded live at the recent Treasury 360° Nordic conference in Stockholm, Eleanor Hill (TMI) speaks with Wolt’s Group Treasurer, Annika Westerholm, about building a treasury function during rapid global expansion. Learn how the Helsinki-based delivery platform brought structure, policy, and tech-driven efficiency - including improved cash flow fore…
…
continue reading

1
SANS Stormcast Wednesday May 28th 2025: Securing authorized_keys; ADAuditPlus SQL Injection; Dero Miner vs Docker API
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems. https://isc.sans.edu/diary/Securing%20Your%20SSH%20authorized_keys%20File/319…
…
continue reading

1
Fentanyl, Firearms, and $200M in Crypto: Dark Web Crime Meets Global Law Enforcement
13:50
13:50
Play later
Play later
Lists
Like
Liked
13:50This episode dives deep into Operation RapTor, one of the largest international crackdowns on dark web crime to date. We analyze how coordinated law enforcement actions across ten countries led to the arrest of 270 individuals, the seizure of $200 million in currency and digital assets, and the dismantling of major darknet marketplaces including In…
…
continue reading

1
Marlboro-Chesterfield Pathology Ransomware Breach: 235,000 Patients Affected
12:27
12:27
Play later
Play later
Lists
Like
Liked
12:27In this episode, we take a deep dive into the recent Marlboro-Chesterfield Pathology (MCP) ransomware attack—one of the most significant healthcare breaches of 2025. On January 16th, MCP detected unauthorized activity on its internal systems. Just days later, the SAFEPAY ransomware group claimed responsibility, posting stolen data—over 30GB of sens…
…
continue reading

1
How Infostealers Like Stealc Use TikTok Accounts to Exfiltrate Stolen Data
22:54
22:54
Play later
Play later
Lists
Like
Liked
22:54In this episode, we dive deep into the underground cybercrime ecosystem powering the surge of modern infostealers—Stealc, Vidar, and LummaC2. These malware strains aren't just code—they're full-service products sold as Malware-as-a-Service (MaaS), giving even low-skilled attackers access to powerful data theft tools. We break down how these stealer…
…
continue reading

1
Chen Amit, Tipalti CEO - A $100 Billion Opportunity, Why 'Once-in-a-Decade' Crises Now Happen Every 6 Months, Achieving 99% Revenue Retention
45:19
45:19
Play later
Play later
Lists
Like
Liked
45:19Send us a text Miguel Armaza interviews Chen Amit, CEO and Co-Founder of Tipalti, a global fintech platform processing billions in payments and serving over 4,000 mid-market companies worldwide. By focusing on the underserved mid-sized companies, Tipalti has achieved 99% gross revenue retention over 15 years and secured licenses across 50+ jurisdic…
…
continue reading

1
SANS Stormcast Tuesday, May 27th 2025: SVG Steganography; Fortinet PoC; GitLab Duo Prompt Injection
7:13
7:13
Play later
Play later
Lists
Like
Liked
7:13SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon3.ai shows how it was able to find the vulnerability in Fortinet s products, and how to possibly exp…
…
continue reading

1
The Multi-Chain Avalanche - Emin Gün Sirer
31:52
31:52
Play later
Play later
Lists
Like
Liked
31:52We couldn’t miss the Avalanche Summit where we sat down with Emin Gün Sirer, co-founder & CEO of Ava Labs, to discuss the evolution of Avalanche’s ecosystem and how HyperSDK ushers in a scalable, interoperable, multi-chain future. Join us for a fascinating discussion on Avalanche’s approach to decentralisation, scalability & interoperability, and l…
…
continue reading

1
The Great Screenshot Scandal: Microsoft Recall and Signal’s DRM Shield
28:34
28:34
Play later
Play later
Lists
Like
Liked
28:34In this episode, we dive deep into the growing tension between AI innovation and data privacy through the lens of a major controversy: Microsoft’s Windows 11 Recall feature. Designed to screenshot nearly everything a user does every few seconds, Recall creates a searchable visual archive of on-screen activity. But while Microsoft claims it enhances…
…
continue reading

1
Bumblebee Malware Returns: IT Pros Targeted Through SEO Poisoning and Typosquatting
28:48
28:48
Play later
Play later
Lists
Like
Liked
28:48In this episode, we break down the resurgence of the Bumblebee malware loader and its latest distribution method: blackhat SEO campaigns and trojanized software installers. By mimicking legitimate download pages through typosquatted domains and poisoning Bing search results, attackers are tricking IT professionals into unknowingly infecting their o…
…
continue reading

1
FBI Warns of Luna Moth Tactics: Inside the Silent Ransom Group’s Law Firm Attacks
14:45
14:45
Play later
Play later
Lists
Like
Liked
14:45In this episode, we dive into the evolving tactics of the Silent Ransom Group (SRG)—also known as Luna Moth—a cybercriminal outfit that has shifted from traditional phishing to a new, more deceptive strategy: impersonating IT support over the phone. Their latest victims? U.S. law firms, targeted for the sensitive data they hold and the large financ…
…
continue reading

1
3 Shifts Edition (May 23 2025): AI slop and its farmers, CRISPR therapies for individuals, Xiaomi's 3nm mobile chip
26:22
26:22
Play later
Play later
Lists
Like
Liked
26:22Hi everyone – welcome to your 3 Shifts Edition [AI-generated audio version]. First, AI slop is spreading like kudzu and it’s more than just annoying spam – it’s a threat to online ecosystems as we know them. From YouTube channels to Pinterest recipes to Spotify playlists, slop farmers are exploiting AI’s ability to generate content cheaply and en m…
…
continue reading

1
Trust Exploited: Unpacking the macOS Malware Attacking Ledger Wallets
25:57
25:57
Play later
Play later
Lists
Like
Liked
25:57A growing cyber threat is targeting macOS users who rely on Ledger cold wallets to secure their cryptocurrency. In this episode, we dissect the anti-Ledger malware campaign—an increasingly sophisticated phishing operation that impersonates the trusted Ledger Live application to trick users into revealing their 24-word recovery phrases. Once entered…
…
continue reading

1
$21M Seized and DanaBot, Qakbot, and Bumblebee Disrupted in Operation Endgame Takedown
11:23
11:23
Play later
Play later
Lists
Like
Liked
11:23In this episode, we break down the latest and most impactful phase of Operation Endgame, the international law enforcement campaign targeting the backbone of the ransomware ecosystem. Between May 19–22, authorities executed a sweeping takedown of 300 servers, neutralized 650 domains, and seized €3.5 million in cryptocurrency, adding to a total of €…
…
continue reading

1
From TikTok to Total Compromise: The Rise of Social Media Infostealers
18:50
18:50
Play later
Play later
Lists
Like
Liked
18:50In this episode, we dive into the alarming surge of infostealer malware campaigns leveraging social media platforms, particularly TikTok, as their distribution vector. Threat actors are exploiting trending content—especially around AI tools like Sora, ChatGPT, and Google Gemini AI, and popular software like CapCut and MidJourney—to bait unsuspectin…
…
continue reading

1
SANS Stormcast Friday, May 23rd 2025: Backup Connectivity; Windows 2025 dMSA Abuse; Samlify Vulnerability
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse. https://isc.sans.edu/diary/Resilient%20Secure%20Backup%20Connectivity%20for%20SMB%20Home%20Users/31972 BadSuccessor…
…
continue reading

1
Anthony Soohoo, CEO of MoneyGram, on rethinking global remittances
31:21
31:21
Play later
Play later
Lists
Like
Liked
31:21In this episode, Anthony Soohoo, CEO of MoneyGram, shares his vision for transforming one of the world's largest global payments networks through what he calls a "refounder mindset." Drawing from his experience leading digital transformations at major companies like Walmart and CBS, Soohoo discusses how MoneyGram is modernizing its platform while l…
…
continue reading

1
New Fintilect CEO Soergel on the richness of transactional data
22:21
22:21
Play later
Play later
Lists
Like
Liked
22:21Access to transactional data provides the richest insights for personalized banking experiences. “What are [consumers] paying, how are they paying, what kinds of life stages are they in the midst of?” Lindsay Soergel, chief executive at AI-powered digital banking solutions provider Fintilect, asks. She says this information delivers “the greatest v…
…
continue reading

1
Kettering Health Breached: What the Interlock Ransomware Group Did and Why It Matters
23:33
23:33
Play later
Play later
Lists
Like
Liked
23:33In this episode, we dive into the ransomware attack that struck Kettering Health, a major healthcare provider, and the evolving tactics of the Interlock ransomware group behind it. Interlock, active since late 2024, has adopted advanced techniques including double extortion, credential theft, and PowerShell-based backdoors to compromise healthcare …
…
continue reading

1
Deepfake Threats, Mobile Biometrics, and the Future of Trust
17:01
17:01
Play later
Play later
Lists
Like
Liked
17:01As digital deception evolves, so must our defenses. In this episode, we dive deep into the escalating battle for trust in our increasingly connected world. From nation-state-level authentication models to real-time behavioral biometrics on your mobile device, the tools to verify identity are becoming more sophisticated—and more essential—than ever.…
…
continue reading

1
119,000 ICS Devices Exposed: The Internet’s Hidden Infrastructure Risk
20:00
20:00
Play later
Play later
Lists
Like
Liked
20:00In this episode, we dive into a growing cybersecurity crisis: the exposure of Industrial Control Systems (ICS) on the public internet. These systems power our electric grids, water supplies, and industrial automation—but thousands are reachable online, often unsecured. We explore how researchers are working to distinguish between real ICS devices a…
…
continue reading