A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
In this podcast, networking guru Mattias Fridström, Chief Evangelist at Arelion and industry experts discuss all things Internet, networks, cloud and connectivity.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Originally the “How to Cover Money” podcast series, ”We Mean Business” is produced by The Reynolds Center for Business Journalism, designed specifically for journalists who want to cover business better on their beats.
…
continue reading
#1 Place For Negotiators
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
From the construction of virtual realities to the internet of things to the watches on our wrists—technology's influence is everywhere. Its role in our lives is evolving fast, and we're faced with riveting questions and tough challenges that sit at the intersection of technology and humanity. Listen in every Friday, with host, journalist Sherrell Dorsey, as TED speakers explore the way tech shapes how we think about society, science, design, business, and more. Follow Sherrell on Instagram @ ...
…
continue reading
Tech Bytes are short sponsored audio segments that appear at the end of Network Break episodes. We also separate them into this standalone feed so it’s easy to stay in the loop on new vendor developments.
…
continue reading
Here's where to find podcasts from The Nation. Political talk without the boring parts, featuring the writers, activists and artists who shape the news, from a progressive perspective.
…
continue reading
Over The Edge is a podcast about edge computing and those in the industry who are creating the future of the internet. On the show we talk to corporate leaders, open-source experts, technologists, journalists, analysts, and the community at large, to discuss technological innovations, trends, practical applications, business models, and the occasional far-flung theory. Over the Edge is brought to you by the generous sponsorship of Dell Technologies.
…
continue reading
The L.A. Report is a breakdown of the day's top news from Southern California, featuring the award-winning reporting of LAist 89.3 FM – L.A.'s number one NPR station. Hosted by Austin Cross in the morning and Julia Paskin in the afternoon, it's the smart way to start and end your day. This program is made possible in part by the Corporation for Public Broadcasting, a private corporation funded by the American people.
…
continue reading

1
SANS Stormcast Monday, June 16th, 2025: Katz Stealer in JPG; JavaScript Attacks; Reviving expired Discord Invites for Evil (#)
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45SANS Stormcast Monday, June 16th, 2025: Katz Stealer in JPG; JavaScript Attacks; Reviving expired Discord Invites for Evil Katz Stealer in JPG Xavier found some multistage malware that uses an Excel Spreadsheet and an HTA file to load an image that includes embeded a copy of Katz stealer. https://isc.sans.edu/diary/More+Steganography/32044 https://…
…
continue reading

1
1,600+ SoCal detainments in ICE sweeps, Justice Dept sues OC official, LA's first 3-star Michelin restaurants— The A.M. Edition
4:55
4:55
Play later
Play later
Lists
Like
Liked
4:55Homeland Security reveals exactly how many people have been caught up, so far, in SoCal immigration sweeps. The Justice Department sues an OC official, who's accused of protecting the identities of non-citizens. LA gets its first 3-Star Michelin restaurants. Plus more. Support The L.A. Report by donating at LAist.com/join and by visiting https://la…
…
continue reading

1
Zero-Day Level Cisco ISE Flaws: Urgent Patch Required for Enterprise Security
54:30
54:30
Play later
Play later
Lists
Like
Liked
54:30Cisco has disclosed two critical security vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) products, both earning a maximum CVSS severity score of 10.0. These flaws—CVE-2025-20281 and CVE-2025-20282—allow unauthenticated remote attackers to execute arbitrary commands on the underlying operating syst…
…
continue reading

1
Chatbots Are Repeating Social Media’s Harms | Tech Won't Save Us
53:48
53:48
Play later
Play later
Lists
Like
Liked
53:48On this episode of Tech Won't Save Us, Paris Marx is joined by Nitasha Tiku to discuss how AI companies are preying on users to drive engagement and how that’s repeating many of the problems we’re belatedly trying to address with social media companies at an accelerated pace. Nitasha Tiku is a technology reporter at the Washington Post. Advertising…
…
continue reading

1
FAIR Plan provision ruled illegal, Breaking down LAUSD's new budget, ICE arrest video details — The P.M. Edition
5:00
5:00
Play later
Play later
Lists
Like
Liked
5:00A judge has ruled the California FAIR Plan's smoke damage policy is illegal. LA Unified has approved its budget for its next fiscal year. We have details of a video showing a man being arrested at a routine immigration check-in. Plus, more. Support The L.A. Report by donating at LAist.com/join and by visiting https://laist.com Visit www.preppi.com/…
…
continue reading

1
U.S. Government Pushes Back on Meta: WhatsApp Labeled a High-Risk App
45:38
45:38
Play later
Play later
Lists
Like
Liked
45:38The U.S. House of Representatives has officially banned the use of WhatsApp on all House-managed devices, citing significant data security risks. This move places WhatsApp alongside other restricted applications like TikTok, ChatGPT, and Microsoft Copilot, reflecting an intensifying government focus on digital security and the reliability of consum…
…
continue reading

1
SANS Stormcast Thursday, June 26th, 2025: Another Netscaler Vuln; CentOS Web Panel Vuln; IP Based Certs (#)
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53SANS Stormcast Thursday, June 26th, 2025: Another Netscaler Vuln; CentOS Web Panel Vuln; IP Based Certs NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543 Citrix patched a memory overflow vulnerability leading to unintended control flow and denial of service. https://support.citrix.com/support-home/kbsearch/article?articleNumbe…
…
continue reading

1
How Cyberattacks on Mainline Health and Select Medical Exposed Over 200,000 Patients
45:10
45:10
Play later
Play later
Lists
Like
Liked
45:10The healthcare industry is facing a relentless wave of cyber threats, as demonstrated by two recent breaches impacting Mainline Health Systems and Select Medical Holdings. In April 2024, Mainline Health experienced a direct ransomware attack by the Inc Ransom group, compromising sensitive data for over 101,000 individuals. Select Medical’s breach, …
…
continue reading

1
Family of detained U.S. citizen demands answers, Cudahy Vice-Mayor faces backlash over social media post, Judge rules on LA homelessness funding— The A.M. Edition
4:55
4:55
Play later
Play later
Lists
Like
Liked
4:55A family demands answers after a US citizen is detained by federal agents in downtown LA. The Vice-Mayor of Cudahy appears to call on street gangs to take on the feds. A judge issues his long-awaited ruling over the future of LA homelessness funding. Plus more. Support The L.A. Report by donating at LAist.com/join and by visiting https://laist.com …
…
continue reading

1
Prometei Botnet’s Global Surge: A Threat to Linux and Windows Systems Alike
41:20
41:20
Play later
Play later
Lists
Like
Liked
41:20Prometei is one of the most persistent and sophisticated botnet threats in circulation today. First identified in 2020—and active since at least 2016—this modular malware continues to evolve rapidly, targeting both Windows and Linux systems across the globe. Originally designed for cryptocurrency mining, Prometei has expanded its capabilities to in…
…
continue reading

1
The Siemens-Microsoft Antivirus Dilemma Threatening OT Security
1:23:55
1:23:55
Play later
Play later
Lists
Like
Liked
1:23:55This episode examines a serious conflict between Siemens’ Simatic PCS industrial control systems and Microsoft Defender Antivirus. The absence of an "alert only" mode in Defender has created a significant operational risk for plants running Siemens’ systems. Without this functionality, operators must choose between ignoring potential malware detect…
…
continue reading

1
How E. Jean Carroll Beat Trump in Court—Plus, What Really Happened in the 2024 Election | Start Making Sense
36:45
36:45
Play later
Play later
Lists
Like
Liked
36:45Donald Trump, found guilty of sexual assault and defamation, owes E. Jean Carroll $88 million. She explains how she beat him in court, twice, proving that he attacked her in a Bergdorf dressing room and then lied about it. Her new book is Not My Type: One Woman vs. a President. Also, the leading autopsies on the 2024 defeat of Democrats are missing…
…
continue reading
How do you get more from GitHub in your work routine? Richard chats with April Yoho about how sysadmins can take advantage of more GitHub features to make better quality scripts and more! April discusses the capabilities of GitHub Copilot to assist administrators in comprehending the intricacies of source management, including branching and merging…
…
continue reading

1
Man allegedly linked to Palm Springs bombing dies, Senate's plan to sell public land hits roadblock, UBI for LA community college students — The P.M. Edition
4:32
4:32
Play later
Play later
Lists
Like
Liked
4:32A man accused of aiding in the Palm Springs fertility clinic bombing has died in custody. A plan to sell off millions of acres of California's public lands may be off the table. What a monthly stipend can mean for LA's community college students. Plus, more. Support The L.A. Report by donating at LAist.com/join and by visiting https://laist.com Vis…
…
continue reading

1
Patient Trust on the Line: The Fallout from McLaren Health Care’s 2024 Breach
44:50
44:50
Play later
Play later
Lists
Like
Liked
44:50In this episode, we dive into the 2024 McLaren Health Care data breach that compromised the sensitive information of over 743,000 individuals—just one year after a similar ransomware attack impacted 2.2 million. We’ll unpack the timeline of the attack: how cybercriminals gained unauthorized access between July 17 and August 3, exploiting vulnerabil…
…
continue reading

1
SANS Stormcast Tuesday, June 24th, 2025: Telnet/SSH Scan Evolution; Fake Sonicwall Software; File-Fix vs Click-Fix (#)
4:03
4:03
Play later
Play later
Lists
Like
Liked
4:03SANS Stormcast Tuesday, June 24th, 2025: Telnet/SSH Scan Evolution; Fake Sonicwall Software; File-Fix vs Click-Fix Quick Password Brute Forcing Evolution Statistics After collecting usernames and passwords from our ssh and telnet honeypots for about a decade, I took a look back at how scans changed. Attackers are attempting more passwords in each s…
…
continue reading

1
NeuralTrust’s Echo Chamber: The AI Jailbreak That Slipped Through the Cracks
56:30
56:30
Play later
Play later
Lists
Like
Liked
56:30This podcast dives deep into one of the most pressing vulnerabilities in modern AI — the rise of sophisticated "jailbreaking" attacks against large language models (LLMs). Our discussion unpacks a critical briefing on the evolving landscape of these attacks, with a spotlight on the novel “Echo Chamber” technique discovered by NeuralTrust. Echo Cham…
…
continue reading

1
Tech Bytes: New From HPE Discover—Networking, AI, and More (Sponsored)
20:59
20:59
Play later
Play later
Lists
Like
Liked
20:59Today on the Tech Bytes podcast, sponsored by HPE, we get a preview of HPE Discover. We talk about networking, security, and agentic AI announcements coming out of the event. We’ll also talk about how HPE is converging network and security in its product portfolio, and HPE’s approach to AI both as a tool being... Read more »…
…
continue reading

1
AT&T, Verizon, and Beyond: How Salt Typhoon Targets Global Telcos
44:06
44:06
Play later
Play later
Lists
Like
Liked
44:06In this episode, we dive deep into the alarming revelations about Salt Typhoon—a Chinese state-sponsored advanced persistent threat (APT) actor, also known as RedMike, Earth Estries, FamousSparrow, GhostEmperor, and UNC2286. Backed by China’s Ministry of State Security (MSS), this group has been running extensive cyber espionage operations since at…
…
continue reading

1
Iranian-Americans in LA call for regime change, LAPD Chief defends protest actions, CA's new extreme heat tracker— The A.M. Edition
4:46
4:46
Play later
Play later
Lists
Like
Liked
4:46Protesters in LA call for regime change in Iran. LA's police chief defends his officers in the face of anti-ICE protests. California's new tool that treats extreme heat like a hurricane or tornado. Plus more. Support The L.A. Report by donating at LAist.com/join and by visiting https://laist.com Visit www.preppi.com/LAist to receive a FREE Preppi E…
…
continue reading

1
Fake Microsoft, Netflix, & Apple Support: The Scam Lurking in Google Search
32:40
32:40
Play later
Play later
Lists
Like
Liked
32:40In this eye-opening episode, we break down a sophisticated new trend in tech support scams (TSS) that’s catching even the most cautious users off guard. Scammers are now hijacking Google Ads and manipulating search results to funnel users—who are simply looking for help—to malicious phone numbers injected directly into legitimate websites like Appl…
…
continue reading

1
Tracking Think Tanks w/ Ben Freeman and Nick Cleveland-Stout | American Prestige
54:33
54:33
Play later
Play later
Lists
Like
Liked
54:33Ben Freeman and Nick Cleveland-Stout from the Quincy Institute join the program to talk about their Think Tank Funding Tracker, a repository that tracks funding from foreign governments, the U.S. government, and Pentagon contractors to the top 50 think tanks in the United States over the past five years. The group discusses think tanks’ role in the…
…
continue reading

1
Legislature introduces "No Vigilantes Act", Tustin hangar cleanup nearly done, LAist's resource guide for immigrants — The P.M. Edition
4:55
4:55
Play later
Play later
Lists
Like
Liked
4:55A new bill would require law enforcement officers operating in California to identify themselves. The debris cleanup from 2023's Tustin hangar fire is almost finished. We have a guide to help connect immigrant communities with food, remote jobs, financial aid, and legal resources. Plus, more. Support The L.A. Report by donating at LAist.com/join an…
…
continue reading

1
From Malware to Court: Qilin Ransomware’s ‘Call a Lawyer’ Tactic
43:58
43:58
Play later
Play later
Lists
Like
Liked
43:58In this episode, we take a deep dive into the Qilin ransomware group — now regarded as the world’s leading ransomware-as-a-service (RaaS) operation — and explore how it’s reshaping the cybercrime landscape in 2025. Qilin, also known as Agenda, burst onto the scene in 2022 with a Go-based ransomware. It has since evolved into a highly evasive Rust-b…
…
continue reading

1
SANS Stormcast Tuesday, June 24th, 2025: Ichano ATHome IP Camera Scans; Netscaler Vulnerability; WinRar Vulnerability (#)
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04SANS Stormcast Tuesday, June 24th, 2025: Ichano ATHome IP Camera Scans; Netscaler Vulnerability; WinRar Vulnerability Scans for Ichano AtHome IP Cameras A couple days ago, a few sources started scanning for the username super_yg and the password 123. This is associated with Ichano IP Camera software. https://isc.sans.edu/diary/Scans%20for%20Ichano%…
…
continue reading

1
Zero-Click, Zero-Warning: The FreeType Flaw Behind a Spyware Surge
57:15
57:15
Play later
Play later
Lists
Like
Liked
57:15In this episode, we dive deep into the story behind CVE-2025-27363, a critical zero-click vulnerability in the widely used FreeType font rendering library. Initially discovered by Facebook’s security team and patched by Google in May 2025, this flaw allowed attackers to execute arbitrary code on Android devices—without any user interaction—by explo…
…
continue reading

1
The Insurance Industry Under Fire: Anatomy of the Aflac Cyber Incident
53:58
53:58
Play later
Play later
Lists
Like
Liked
53:58In this episode, we take a deep dive into the June 2025 cyberattack on Aflac, one of the latest strikes in a growing wave of sophisticated, AI-driven cyber campaigns targeting the insurance industry. On June 12, Aflac detected suspicious activity within its U.S. network—a breach attributed to a highly organized cybercrime group and part of a larger…
…
continue reading

1
Protesters rally against strikes in Iran, the 1870s law at the center of Newsom vs Trump hearing, LA City Council considers ICE-related lawsuit— The A.M. Edition
4:42
4:42
Play later
Play later
Lists
Like
Liked
4:42Demonstrators hit the streets of LA to protest the military strikes on Iran. The legal battle over who controls the National Guard in LA throws it back to the 70s... the 1870s. LA City Council is gearing up for its own legal fight over the ICE arrests. Plus more. Support The L.A. Report by donating at LAist.com/join and by visiting https://laist.co…
…
continue reading

1
The Nucor Cyberattack: How Ransomware Threatens American Steel
58:40
58:40
Play later
Play later
Lists
Like
Liked
58:40In May 2025, a ransomware attack forced Nucor — one of America’s largest steel producers — to halt its metal production operations. This wasn’t just a corporate IT incident: it disrupted a critical link in the nation’s industrial supply chain. In this episode, we take an in-depth look at the Nucor attack: how cybercriminals targeted operational tec…
…
continue reading

1
Greater America and the Victims of Its Ambition | The Nation Podcast
40:55
40:55
Play later
Play later
Lists
Like
Liked
40:55On a recent trip to El Salvador, writer Viet Thanh Nguyen noticed striking parallels between the small Central American nation and his own country of origin, Vietnam. Both endured the atrocities of war, each fueled by anti-communist U.S. intervention. And both conflicts—the Vietnam War and El Salvador’s civil war—triggered refugee and migrant crise…
…
continue reading

1
SANS Stormcast Monday, June 23rd, 2025: ADS and Python; More Secure Cloud PCs; Zend.to Path Traversal; Parser Differentials (#)
5:37
5:37
Play later
Play later
Lists
Like
Liked
5:37SANS Stormcast Monday, June 23rd, 2025: ADS and Python; More Secure Cloud PCs; Zend.to Path Traversal; Parser Differentials ADS & Python Tools Didier explains how to use his tools cut-bytes.py and filescanner to extract information from alternate data streams. https://isc.sans.edu/diary/ADS%20%26%20Python%20Tools/32058 Enhanced security defaults fo…
…
continue reading

1
Inside the $225M Crypto Seizure: How Law Enforcement Traced Illicit Funds Across Borders
1:01:32
1:01:32
Play later
Play later
Lists
Like
Liked
1:01:32A staggering $225 million in illicit cryptocurrency was recently seized by U.S. authorities in what has become the largest digital asset recovery in Secret Service history. This episode unpacks the mechanics, methods, and forensics that made this possible—and how a sprawling network of scams, labor compounds, and fake identities in Southeast Asia u…
…
continue reading

1
US enters Israel-Iran conflict, ICE and AAPI hubs, Two Trader Joe’s in Sherman Oaks? — Sunday Edition
9:25
9:25
Play later
Play later
Lists
Like
Liked
9:25State and local officials say they're monitoring security threats after the U.S. struck three Iran nuclear sites on Saturday. Foot traffic is down in popular Asian ethnic enclaves out of fear of immigration actions. Sherman Oaks residents react to a new neighborhood Trader Joe's. Plus, more. Support The L.A. Report by donating at LAist.com/join and…
…
continue reading

1
Inside CVE-2025-23121: Veeam RCE Flaw Opens Door to Ransomware
47:43
47:43
Play later
Play later
Lists
Like
Liked
47:43Ransomware groups are no longer just encrypting data — they're going straight for the backups. And if those backups aren’t properly protected, recovery becomes impossible, and ransom payouts more likely. In this episode, we dive deep into how threat actors are exploiting critical vulnerabilities in widely used backup systems, focusing on the recent…
…
continue reading

1
Democrats Need to Reclaim Anti-War Politics | The Time of Monsters with Jeet Heer
39:03
39:03
Play later
Play later
Lists
Like
Liked
39:03Donald Trump has betrayed his promise to be a pro-peace president. Prodded by Washington hawks and the Israeli government, he has green-lit Israel’s attack on Iran, which the Untied States might soon join directly. A new Middle Eastern war would be a catastrophe. In order to stop it, Democrats will need to recover the anti-war politics that they ad…
…
continue reading

1
Fasana’s Collapse: How One Ransomware Attack Crippled a German Manufacturer
41:37
41:37
Play later
Play later
Lists
Like
Liked
41:37Ransomware just bankrupted a 100-year-old manufacturer—and the world should take notice. In this episode, we dissect the cyberattack that brought down Fasana, a German paper napkin producer, and pushed it into insolvency. On May 19, 2025, employees arrived to find printers ejecting extortion notes. By the end of the week, systems were paralyzed, €2…
…
continue reading

1
CA v. Trump updates, Fire weather warning, A cola named 'Los Angeles' — Saturday Edition
11:32
11:32
Play later
Play later
Lists
Like
Liked
11:32The latest on California versus Trump over the deployment of military troops. Fire weather warning on tap for parts of L.A. County. L.A. Opera opens its fabulous closet for a once-in-a-decade costume sale. We went searching for the origins of a cola in Japan named "Los Angeles" -- and found a story about growing up in Osaka. Support The L.A. Report…
…
continue reading

1
Inside the 16 Billion Credential Leak: The Infostealer Engine Behind the Biggest Breach Yet
54:27
54:27
Play later
Play later
Lists
Like
Liked
54:27In this episode, we break down the true scale and mechanics behind the largest credential leak ever recorded—over 16 billion login credentials, most of them exfiltrated by infostealer malware. We dive into how this happened: from the malware-as-a-service (MaaS) model enabling even low-skill threat actors to deploy powerful stealers, to how credenti…
…
continue reading

1
Santa Ana's La Cuatro empties out, New lawsuit filed against DHS, Public lands in CA could be up for sale — The P.M. Edition
4:42
4:42
Play later
Play later
Lists
Like
Liked
4:42We check in on businesses in Santa Ana, as a commercial corridor in the mostly Latino city has turned into a ghost town. Journalists and protesters are suing the Department of Homeland Security. Huge parcels of public lands in SoCal could be up for sale under Trump's "Big Beautiful Bill." Plus, more. Support The L.A. Report by donating at LAist.com…
…
continue reading

1
Over 1,500 Minecraft Users Infected in Stargazers Ghost Malware Campaign
55:17
55:17
Play later
Play later
Lists
Like
Liked
55:17A malware distribution network hiding in plain sight — on GitHub. This episode unpacks the Stargazers Ghost Network, a massive Distribution-as-a-Service (DaaS) infrastructure run by a threat actor known as Stargazer Goblin. Using over 3,000 GitHub accounts, this operation pushes dangerous information-stealing malware disguised as legitimate game mo…
…
continue reading

1
Chain IQ Breach Exposes UBS & Pictet Employee Data: A Supply Chain Failure
1:05:22
1:05:22
Play later
Play later
Lists
Like
Liked
1:05:22A single vendor was compromised — and suddenly, internal records from UBS, Pictet, Manor, and Implenia were leaked. The Chain IQ cyberattack is a textbook example of how fragile the digital supply chain has become. This episode dissects the breach that exposed names, roles, phone numbers, even CEO contact details of over 137,000 UBS employees, and …
…
continue reading

1
Weaponized GitHub Repositories: How Banana Squad and Water Curse Are Hitting Devs
45:59
45:59
Play later
Play later
Lists
Like
Liked
45:59Cybercriminals are increasingly turning GitHub into a malware distribution network. In this episode, we unpack two of the most alarming recent campaigns: Water Curse and Banana Squad — both targeting developers, red teams, and security professionals through poisoned open-source projects. Water Curse, a financially motivated group, used at least 76 …
…
continue reading

1
Ruling keeps Trump in control of CA National Guard, Immigrant rent crisis, Pasadena PD investigates possible ICE action— The A.M. Edition
4:38
4:38
Play later
Play later
Lists
Like
Liked
4:38An appeals court lets President Trump stay in control of California's National Guard, for now. Families are struggling to make ends meet in the wake of recent ICE arrests. Pasadena's police want answers after this week's ICE action. Plus more. Support The L.A. Report by donating at LAist.com/join and by visiting https://laist.com Visit www.preppi.c…
…
continue reading