In this season of Amidst the Ordinary, we talk about community and connection. This innately human urge to be a part of something – to feel seen, heard, and valued by those around us. With stories from small towns in Georgia to the heart of the UAE and countless places in between. We’re here to tell stories, real stories, from real people. We’ll reflect on these stories together, discuss how they inspired us, and discover practical ways to apply them to our lives. Whether you move to a new c ...
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
…
continue reading
Welcome to Chromatography Life, a podcast presented by Waters Corporation. Join us as we dive into the world of chromatography with leading scientists to examine today’s critical challenges. As a hub for the chromatography community, we share the lived experiences, passions, and visions of these scientific innovators as they shape the future of analytical chemistry. Hear from experts across a wide range of topics, spanning chromatographic methods, laboratory solutions, column chemistry, and ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
A podcast highlighting Women in STEM, especially Women of Color. The STEM Lab Podcast is hosted by Dr. Sabrina Walthall a scientist/professor whose love for STEM (science, technology, engineering, and math) eventually led to a STEM career in academia. Dr. Walthall is an Associate Professor of Science, a Community Engagement Scientist and an advocate for women in STEM.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Earth Body Mind Spirit is a podcast about the new world that we all need to create together to save our home the Earth and to help each one of us live a deeply fulfilling and rich life in the process.
…
continue reading

1
Phished and Exposed: What the Co-op Hack Reveals About Retail Cybersecurity
21:37
21:37
Play later
Play later
Lists
Like
Liked
21:37In April 2025, The Co-op—one of the UK’s largest retailers—confirmed a data breach that exposed the personal information of 6.5 million members. No financial data was taken, but the attack hit at the core of trust, with CEO Shirine Khoury-Haq calling it a “personal attack on our members and colleagues.” This wasn’t just a technical failure—it was a…
…
continue reading

1
FileFix Attacks Are Here: How Interlock’s Ransomware is Skipping Your Defenses
21:52
21:52
Play later
Play later
Lists
Like
Liked
21:52In this episode, we break down how Interlock, a fast-moving ransomware group launched in late 2024, has evolved from using web injectors and clipboard tricks (like ClickFix) to an even more covert social engineering technique that abuses Windows File Explorer’s address bar to execute malicious code without triggering security prompts or downloads. …
…
continue reading

1
Ontinue Uncovers SVG-Based Phishing: Why Your Browser Could Be the Weak Link
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58Ontinue has uncovered a stealthy new phishing campaign that’s flipping conventional defenses on their head—weaponizing SVG image files to silently redirect victims to malicious websites, without requiring file downloads, macros, or even user clicks. In this episode, we break down how attackers are exploiting the JavaScript-capable structure of Scal…
…
continue reading

1
Do You Really Need IOCs? Plus Zero-Day Exploits, AI Data Leaks, and Phishing for VIPs
23:53
23:53
Play later
Play later
Lists
Like
Liked
23:53Resources: https://linktr.ee/ReliaQuestShadowTalk Ever wondered if IOCs are still relevant in a world of polymorphic malware and zero-day exploits? Join host Kim along with intelligence analyst Joey and threat hunter Tristan as they discuss: North American APT Targets China (1:25) Chatbot Exposes Thousands of Job Applications (4:57) New Phishing Ca…
…
continue reading

1
Exein Raises €70M: Defending the IoT-AI Frontier with Embedded Security
17:35
17:35
Play later
Play later
Lists
Like
Liked
17:35Exein, the Italian cybersecurity company specializing in embedded IoT defense, has raised €70 million in Series C funding, marking a significant milestone in the race to secure AI-connected infrastructure. Backed by Balderton and a roster of prominent investors, this round pushes Exein’s total funding past $106 million and fuels its global expansio…
…
continue reading

1
Salt Typhoon Strikes Again: National Guard, Telecoms, and a Crisis in U.S. Cyber Defense
21:58
21:58
Play later
Play later
Lists
Like
Liked
21:58Salt Typhoon, a sophisticated Chinese state-sponsored cyber threat actor, is conducting one of the most aggressive and sustained espionage campaigns ever uncovered against U.S. critical infrastructure. This episode explores how the group—linked to China's Ministry of State Security—compromised a U.S. state’s Army National Guard, infiltrated telecom…
…
continue reading

1
DragonForce Ransomware Hits Belk: 150GB Data Leak and Operational Chaos
1:20:33
1:20:33
Play later
Play later
Lists
Like
Liked
1:20:33In this episode, we dive into the May 2025 ransomware attack on Belk, the iconic U.S. department store chain, orchestrated by the DragonForce ransomware group—a fast-rising player in the ransomware-as-a-service (RaaS) ecosystem. The cyberattack brought down Belk’s online and in-store operations for days, exfiltrated over 156GB of sensitive data, an…
…
continue reading

1
NVIDIA Issues Urgent Rowhammer Warning: Enable ECC or Risk AI Integrity
40:39
40:39
Play later
Play later
Lists
Like
Liked
40:39In this episode, we dissect a major hardware-level cybersecurity warning issued by NVIDIA, one that directly affects data center operators, AI researchers, and enterprise IT teams using GPU infrastructure. The threat: Rowhammer—a physical DRAM vulnerability that’s now been successfully exploited on GPUs through a new attack method known as GPUHamme…
…
continue reading

1
Zip Security Secures $13.5M to Simplify and Scale Cyber Defense
48:43
48:43
Play later
Play later
Lists
Like
Liked
48:43In this episode, we spotlight Zip Security, a rising New York-based cybersecurity startup that just closed a $13.5 million Series A funding round, led by Ballistic Ventures. This brings the company’s total raised to $21 million, underscoring growing investor confidence in Zip’s mission: to make enterprise-grade cybersecurity accessible, automated, …
…
continue reading

1
Century Support Services Breach: 160,000 Identities Compromised in Silent Cyberattack
32:03
32:03
Play later
Play later
Lists
Like
Liked
32:03In this episode, we examine the major data breach at Century Support Services—also operating under the name Next Level Finance Partners—that exposed the personal information of over 160,000 individuals. While the company discovered indicators of a cyberattack as early as November 2023, it wasn’t until May 2024 that investigators confirmed sensitive…
…
continue reading

1
PP070: News Roundup – Scattered Spider Bites MSPs, Microsoft Rethinks Kernel Access, North Koreans Seem Good at Their Illicit Jobs
44:03
44:03
Play later
Play later
Lists
Like
Liked
44:03There’s lots of juicy stories in our monthly security news roundup. The Scattered Spider hacking group makes effective use of social engineering to target MSPs, Microsoft pushes for better Windows resiliency by rethinking kernel access policies for third-party endpoint security software, and the US Justice Department files indictments against alleg…
…
continue reading

1
TikTok, China, and the EU: The Battle Over Data Sovereignty
58:06
58:06
Play later
Play later
Lists
Like
Liked
58:06In this episode, we explore the mounting scrutiny TikTok faces over its handling of European user data, with the EU’s Data Protection Commission (DPC) launching a fresh investigation into alleged transfers of data to China. TikTok, owned by Beijing-based ByteDance, is once again in the crosshairs for possible violations of the General Data Protecti…
…
continue reading

1
Booz Allen Invests in Corsha: Defending Machine-to-Machine Communication at Scale
33:00
33:00
Play later
Play later
Lists
Like
Liked
33:00As the cybersecurity landscape shifts toward hyperautomation and AI-driven autonomy, a new frontier has emerged: the identity and access security of machines. In this episode, we explore Booz Allen Ventures’ strategic investment in Corsha, a company at the forefront of Machine Identity Provider (mIDP) technology. Their collaboration marks a pivotal…
…
continue reading

1
WSUS Meltdown: Global Sync Failures and the Shift Toward Cloud Patch Management
27:45
27:45
Play later
Play later
Lists
Like
Liked
27:45Windows Server Update Services (WSUS) has long been a cornerstone of enterprise patch management—but recent global synchronization failures have raised serious questions about its future viability. In this episode, we dissect the widespread outage that left organizations unable to sync critical Windows updates, unpacking both the technical cause an…
…
continue reading

1
Cracking eSIM: Exposing the Hidden Threats in Next-Gen Mobile Security
16:43
16:43
Play later
Play later
Lists
Like
Liked
16:43eSIM technology has transformed the way we connect—but has it also introduced new vulnerabilities into the heart of modern telecommunications? In this deep-dive episode, we dissect the security architecture, remote provisioning systems, and critical attack surfaces of embedded SIM (eSIM) technology, now deployed in billions of mobile, consumer, and…
…
continue reading

1
Qantas Breach and Beyond: Cybersecurity Risks in Australia’s Digital Supply Chains
1:03:23
1:03:23
Play later
Play later
Lists
Like
Liked
1:03:23As Australia contends with a growing wave of cybersecurity incidents, this episode explores the intersection of national privacy laws, global supply chain vulnerabilities, and public trust in digital security. The recent Qantas data breach—affecting over 5 million customers—was the latest high-profile case to expose how fragile third-party service …
…
continue reading

1
SafePay Ransomware Rises, North Korea Adopts ClickFix
24:20
24:20
Play later
Play later
Lists
Like
Liked
24:20Resources: https://linktr.ee/ReliaQuestShadowTalk Have you heard of SafePay ransomware? Join host Kim along with intelligence analysts Hayden and John as they discuss: SafePay Targets Ingram Micro (1:16) Updates on Iran-Israel (5:43) North Korea Adopts ClickFix & Attacks Web3 (8:24) Insights from ReliaQuest Customer Incidents (13:14) Kim Bromley: S…
…
continue reading

1
Tools to Support Enhanced Method Development
10:30
10:30
Play later
Play later
Lists
Like
Liked
10:30Join host Neil Lander as he sits down with Margaret Maziarz, Principal Scientist at Waters Corporation, to discuss the latest tools and strategic approaches to optimizing method development. Margaret guides us through the advantages to various types of instrumentation, the importance of selecting the right column chemistry, and the powerful capabil…
…
continue reading

1
Taiwan Sounds the Alarm: TikTok, WeChat, and the Chinese Data Threat
1:06:28
1:06:28
Play later
Play later
Lists
Like
Liked
1:06:28In this episode, we examine Taiwan’s growing alarm over Chinese mobile applications, especially TikTok and WeChat, in light of rising global concern over data privacy and foreign surveillance. A recent inspection by Taiwan’s National Security Bureau (NSB) revealed that these apps aggressively collect personal data and transmit it to servers located…
…
continue reading

1
The Evolution of Atomic macOS Stealer: Backdoors, Keyloggers, and Persistent Threats
45:00
45:00
Play later
Play later
Lists
Like
Liked
45:00This episode exposes the growing menace of Atomic macOS Stealer (AMOS) — a rapidly evolving malware-as-a-service (MaaS) platform targeting macOS users worldwide. Once seen as a simple data stealer, AMOS has matured into a potent, long-term threat featuring keyloggers, a persistent backdoor, and system-level access, all designed to exfiltrate data a…
…
continue reading

1
CitrixBleed Returns: CVE-2025-5777 and the Exploitation of NetScaler Devices
1:02:21
1:02:21
Play later
Play later
Lists
Like
Liked
1:02:21In this episode, we dissect CitrixBleed 2—a newly disclosed and actively exploited vulnerability affecting Citrix NetScaler ADC and Gateway appliances. Tracked as CVE-2025-5777 (and possibly also CVE-2025-6543), this critical flaw mirrors the notorious original CitrixBleed by allowing attackers to extract sensitive memory content, including user se…
…
continue reading

1
SAP’s July 2025 Patch Day: Critical Flaws, CVE-2025-30012, and Ransomware Risk
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01In this episode, we break down SAP’s July 2025 Security Patch Day—a high-stakes moment for any enterprise relying on SAP’s core business applications. With 27 new and 4 updated security notes released, including seven rated as critical, this patch cycle directly targets some of the most serious vulnerabilities seen in SAP environments in recent mem…
…
continue reading

1
106GB Exposed? Telefónica, HellCat, and the Silent Data Breach
50:33
50:33
Play later
Play later
Lists
Like
Liked
50:33In this episode, we explore a shadowy and unconfirmed—but highly consequential—data breach at Spanish telecommunications giant Telefónica. Allegedly orchestrated by the HellCat ransomware group, the breach involves a staggering 106GB of exfiltrated data, including internal communications, customer records, and employee information. Telefónica has y…
…
continue reading

1
Ingram Micro’s SafePay Ransomware Breach: Human-Operated Threats and Supply Chain Fallout
59:56
59:56
Play later
Play later
Lists
Like
Liked
59:56The recent ransomware attack on Ingram Micro, a global technology distribution giant, reveals not only a sophisticated human-operated cyber assault—but also the fragile state of modern supply chain cybersecurity. In this episode, we break down how attackers, believed to be affiliated with the SafePay ransomware group, penetrated Ingram Micro’s infr…
…
continue reading

1
The Illusion of Shutdowns: What Hunters International's Closure Really Means
42:41
42:41
Play later
Play later
Lists
Like
Liked
42:41In a sudden and cryptic announcement, the notorious ransomware group Hunters International has declared its shutdown, citing “recent developments” and pledging to release decryption keys to victims. Active since late 2022 and suspected to be a rebrand of the earlier Hive ransomware gang, Hunters International has been responsible for attacks on nea…
…
continue reading

1
CISA Flags CVE-2025-6554: Patching Chrome’s Critical Flaw Before It’s Too Late
40:49
40:49
Play later
Play later
Lists
Like
Liked
40:49A newly discovered and actively exploited zero-day vulnerability in Google Chrome has sent ripples through the cybersecurity community. Known as CVE-2025-6554, this critical type confusion flaw in Chrome’s V8 JavaScript and WebAssembly engine enables remote attackers to perform arbitrary read/write operations or execute code via a single malicious …
…
continue reading

1
ANSSI vs. Houken: France Battles Advanced Chinese Hacking Threat
33:16
33:16
Play later
Play later
Lists
Like
Liked
33:16In this episode, we uncover a high-stakes cyber campaign targeting the heart of French digital infrastructure. ANSSI, France’s national cybersecurity agency, has exposed a Chinese-linked hacking group known as Houken (UNC5174 or Uteus) responsible for a widespread espionage operation since late 2024. This state-adjacent threat actor infiltrated cri…
…
continue reading

1
Psychological Manipulation and AI Fraud: How Spain Exposed a $12M Scam
17:21
17:21
Play later
Play later
Lists
Like
Liked
17:21In this episode, we examine a growing threat reshaping financial crime in Europe: sophisticated, technology-driven investment fraud. Spanish law enforcement has recently dismantled a fraud operation that spanned multiple years, deceived over 300 victims, and resulted in more than $11.8 million in losses. What made this case particularly notable was…
…
continue reading

1
CVE-2025-20309: Critical Cisco Root Access Flaw Threatens VoIP Security
41:32
41:32
Play later
Play later
Lists
Like
Liked
41:32A devastating vulnerability—CVE-2025-20309—has been discovered in Cisco’s Unified Communications Manager (Unified CM) and its Session Management Edition (SME), threatening the security of over a thousand internet-exposed VoIP systems globally. In this episode, we break down this critical flaw, which scores a perfect CVSS 10.0, and explore why it's …
…
continue reading

1
macOS Under Siege: NimDoor Malware Targets Telegram, Wallets, and Keychains
43:09
43:09
Play later
Play later
Lists
Like
Liked
43:09A new, highly advanced malware strain—NimDoor—has emerged as the latest cyber weapon in the arsenal of North Korean state-sponsored hackers, specifically targeting macOS systems used by cryptocurrency and Web3 organizations. This episode explores the complex tactics and alarming capabilities of NimDoor, a malware family showcasing a blend of C++ an…
…
continue reading

1
Cisco Unified CM Vulnerability: Root Access Risk for Enterprise VoIP Networks
56:02
56:02
Play later
Play later
Lists
Like
Liked
56:02A newly disclosed vulnerability—CVE-2025-20309—in Cisco's Unified Communications Manager (Unified CM) and Session Management Edition has sent shockwaves through enterprise VoIP and IT security teams. The flaw stems from hardcoded root SSH credentials that could allow unauthenticated remote attackers to gain full control of affected systems. In this…
…
continue reading

1
Forminator Flaw Exposes WordPress Sites to Takeover Attacks: Vulnerability Threatens 600,000+ Sites
50:32
50:32
Play later
Play later
Lists
Like
Liked
50:32A critical new WordPress vulnerability—CVE-2025-6463—has been discovered in the widely used Forminator plugin, affecting over 600,000 active installations and putting hundreds of thousands of websites at risk of full compromise. In this episode, we dive deep into the mechanics, risks, and remediation of this arbitrary file deletion flaw and explain…
…
continue reading

1
Kelly Benefits Breach: Over 550,000 Victims and the Rising Identity Theft Crisis
1:08:04
1:08:04
Play later
Play later
Lists
Like
Liked
1:08:04In one of the latest large-scale data breaches to hit the U.S. private sector, Kelly Benefits, a provider of payroll and benefits administration services, disclosed a significant cybersecurity incident impacting over 553,000 individuals. The breach, which occurred in December 2024 but was only revealed in April 2025, exposed sensitive personal info…
…
continue reading

1
FileFix, HTA, and MotW Bypass—The Alarming Evolution of HTML-Based Attacks
46:04
46:04
Play later
Play later
Lists
Like
Liked
46:04A newly disclosed exploit dubbed FileFix is redefining how attackers bypass Microsoft Windows' built-in security protections—specifically the Mark-of-the-Web (MotW) mechanism. Developed and detailed by security researcher mr.d0x, this attack takes advantage of how browsers save HTML files and how Windows handles HTA (HTML Application) files. The re…
…
continue reading

1
Sophisticated Cyberattack on the International Criminal Court: Justice in the Crosshairs
19:37
19:37
Play later
Play later
Lists
Like
Liked
19:37The International Criminal Court (ICC), the world’s foremost tribunal for prosecuting war crimes, genocide, and crimes against humanity, has confirmed yet another sophisticated cyberattack, highlighting the persistent threat facing high-profile global institutions. This marks the second targeted intrusion against the ICC in recent years, and althou…
…
continue reading

1
Critical Flaws in Microsens NMP Web+ Threaten Industrial Network Security
43:40
43:40
Play later
Play later
Lists
Like
Liked
43:40In a major red flag for the industrial cybersecurity community, three newly disclosed vulnerabilities in Microsens NMP Web+, a popular network management solution used across critical infrastructure, have revealed just how fragile many ICS environments remain. The flaws—two rated critical and one high—allow unauthenticated attackers to bypass authe…
…
continue reading

1
Citrix Bleed 2, Scattered Spider Hits Aviation
26:51
26:51
Play later
Play later
Lists
Like
Liked
26:51Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Ivan and John as they discuss: Citrix Bleed 2 Scattered Spider Hits Aviation From ClickFix to FileFix Ransomware Threats from Q2 Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June …
…
continue reading

1
Qantas Data Breach: Third-Party Hack Exposes Millions of Frequent Flyers
24:36
24:36
Play later
Play later
Lists
Like
Liked
24:36In a stark reminder of the aviation industry's growing exposure to cyber threats, Australian airline Qantas recently confirmed a serious data breach—this time not from its own systems, but from a third-party platform used by one of its customer contact centers. The breach exposed personal data for up to six million customers, including names, dates…
…
continue reading

1
Berlin Regulator Targets DeepSeek AI Over Data Transfers to China
43:41
43:41
Play later
Play later
Lists
Like
Liked
43:41Germany’s battle over digital sovereignty and data privacy has intensified, with the Berlin Commissioner for Data Protection formally requesting that Google and Apple remove the DeepSeek AI application from their app stores. The move stems from allegations that DeepSeek, a Chinese-developed generative AI platform, violates the EU’s General Data Pro…
…
continue reading

1
CISA Flags Citrix NetScaler Flaws: What CVE-2025-6543 Means for Federal and Private Networks
56:41
56:41
Play later
Play later
Lists
Like
Liked
56:41The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added multiple Citrix NetScaler vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog—an urgent signal for federal agencies and private enterprises alike. At the center of this update is CVE-2025-6543, a memory overflow flaw affecting NetScaler ADC and Gateway appli…
…
continue reading

1
PP069: A Quantum Primer: It’s More Than Cracking Crypto
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44Quantum computing is here, and it’s being used for more than cracking encryption. On today’s Packet Protector we get a primer on quantum, how it differs from classical computing, its applications for difficult computing problems, why quantum will be the death of blockchain, and how to think about quantum risks. Our guest, Johna Johnson, is... Read …
…
continue reading

1
Cato Networks Secures $359M to Fuel AI-Powered SASE Expansion
17:12
17:12
Play later
Play later
Lists
Like
Liked
17:12Cato Networks just raised $359 million in Series G funding, pushing its valuation past $4.8 billion and its total funding beyond the $1 billion mark—a milestone that cements its place as one of the most formidable players in the rapidly expanding Secure Access Service Edge (SASE) market. In this episode, we unpack what this massive investment means…
…
continue reading

1
Chrome’s Latest Zero-Day: CVE-2025-6554 and Remote Code Execution Risks
54:24
54:24
Play later
Play later
Lists
Like
Liked
54:24A new high-severity zero-day vulnerability in Google Chrome—CVE-2025-6554—has sent shockwaves across the cybersecurity landscape. This episode dives into the technical details, real-world impact, and broader implications of this actively exploited flaw. Tracked as a type confusion bug in Chrome’s V8 JavaScript engine, the vulnerability allows attac…
…
continue reading

1
Russia’s 16KB Curtain: Cloudflare Throttling and the Future of the RuNet
1:45:31
1:45:31
Play later
Play later
Lists
Like
Liked
1:45:31Russia has entered a new phase of digital authoritarianism. In a sweeping move, Russian Internet Service Providers (ISPs) have begun systematically throttling access to Cloudflare and other Western-backed services, including infrastructure giants Hetzner and DigitalOcean. This throttling is so severe that it restricts downloads to just 16 kilobytes…
…
continue reading

1
Ahold Delhaize Data Breach: 2.2 Million Employee Records Exposed
37:44
37:44
Play later
Play later
Lists
Like
Liked
37:44Ahold Delhaize, one of the world’s largest food retailers, is now the subject of one of the most significant ransomware breaches in recent U.S. history. Affecting over 2.2 million current and former employees, this incident—claimed by the cybercrime group INC Ransom—highlights the rising threat posed by ransomware-as-a-service operations targeting …
…
continue reading

1
Why Canada Banned Hikvision: National Security vs. Geopolitics
52:07
52:07
Play later
Play later
Lists
Like
Liked
52:07Canada has taken a definitive stance in the escalating global scrutiny of Chinese technology, ordering surveillance giant Hikvision to cease all operations within its borders. Citing national security concerns and acting on the advice of intelligence agencies, the Canadian government has banned the use of Hikvision products across its public sector…
…
continue reading

1
Scattered Spider Takes Flight: Inside the Cybercrime Group’s Move into Aviation
43:38
43:38
Play later
Play later
Lists
Like
Liked
43:38As the aviation industry becomes more digitally interconnected, its exposure to sophisticated cyber threats continues to grow. One of the most dangerous actors in this space—Scattered Spider, a financially motivated and technically skilled cybercrime group—has recently shifted its focus to target the aviation sector. With recent incidents involving…
…
continue reading

1
Fortnite and the FTC: How Epic Games Misled Players into Unwanted Purchases
54:56
54:56
Play later
Play later
Lists
Like
Liked
54:56In a landmark case that reshapes the conversation around digital ethics, the Federal Trade Commission’s $520 million settlement with Epic Games over its Fortnite monetization tactics highlights a critical issue facing the modern digital economy: the weaponization of interface design to manipulate users. Central to the case is the use of “dark patte…
…
continue reading

1
Microsoft 365 Direct Send Exploited: How Phishing Emails Masquerade as Internal Messages
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44Phishing has long been a favored weapon of cybercriminals, but a recent revelation about Microsoft 365’s Direct Send feature has elevated the threat to a new level—from inside the firewall. Designed for internal systems to send notifications without authentication, Direct Send can be abused by malicious actors to spoof emails that appear to origina…
…
continue reading

1
Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Risk
47:26
47:26
Play later
Play later
Lists
Like
Liked
47:26A critical flaw in the Open VSX Registry—an open-source alternative to the Visual Studio Code Marketplace—recently put over 8 million developers at risk of mass compromise. This vulnerability, discovered in the platform’s GitHub Actions workflow, exposed a super-admin publishing token that could have enabled malicious actors to overwrite or inject …
…
continue reading