Cyber Daily عمومی
[search 0]
بیشتر
برنامه را دانلود کنید!
show episodes
 
Artwork

1
Daily Cyber Threat Brief

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
روزانه
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. Gain expert insights on what you need to takeaway from each story, and why. Learn and laugh at the same time with #TeamSC. Join us live at 8 AM Eastern every weekday morning at https://simplycyber.io/streams. I’m Gerald Auger, Ph.D., a cybersecurity professional, college professor, and content creator with over two decades of expertise in GRC cybersecurity. This field is collabor ...
  continue reading
 
Artwork

1
BMC Daily Cyber News

Jason Edwards

icon
Unsubscribe
icon
icon
Unsubscribe
icon
روزانه
 
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
  continue reading
 
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
  continue reading
 
Loading …
show series
 
This is this week’s cyber news for November third through November seventh, twenty twenty-five. The week unfolded with relentless attacks on edge infrastructure, high-stakes data breaches, and fresh discoveries in global espionage campaigns. Cisco faced active exploitation of its Secure Firewalls and routers, SonicWall confirmed a state-backed back…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary] Windows, with PowerShell, has a great scripting platform to match common Linux/Unix command line utilities. https://isc.sans.edu/diary/Binary%20Breadcrumbs%3A%20Correlating%20Malware%20Samples%20with%20Honeypot%20Logs%20Using%20PowerShell%20%5BGuest%20…
  continue reading
 
This is today’s cyber news for November 7th, 2025. We lead with a confirmed incident at the Congressional Budget Office, where compromised mailboxes and files could expose draft budget work and internal policy discussions. Nevada’s rare after-action report then maps a ransomware crew’s path from a trojanized admin tool to encrypting roughly sixty a…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
This is today’s cyber news for November 6th, 2025. We open with zero-click prompt issues that could make large language models leak prior chats, then move to Hyundai AutoEver’s exposure of sensitive identifiers in U.S. systems. A fresh cloud study underscores that most breaches still start with credentials and misconfiguration, while a Control Web …
  continue reading
 
Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing Vulnerabilities Checkpoint released details about recently patched spoofing and impersonation v…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
This is today’s cyber news for November fifth, twenty twenty-five. We open with trust problems inside everyday tools: researchers found Microsoft Teams flaws that enable impersonation and message edits, and Google Play’s defenses were skirted by dozens of malicious apps with tens of millions of installs. A separate disclosure from Nikkei highlights…
  continue reading
 
Apple Patches Everything, Again Apple released a minor OS upgrade across its lineup, fixing a number of security vulnerabilities. https://isc.sans.edu/diary/Apple%20Patches%20Everything%2C%20Again/32448 Remote Access Tools Used to Compromise Trucking and Logistics Attackers infect trucking and logistics companies with regular remote management tool…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
This is today’s cyber news for November 4th, 2025. The brief opens with rare criminal charges against security insiders allegedly aiding a ransomware crew, a major breach disclosure affecting more than ten million people, and a stealthy espionage campaign focused on defense networks. Together they highlight three pressure points for every organizat…
  continue reading
 
XWiki SolrSearch Exploit Attempts CVE-2025-24893 We have detected a number of exploit attempts against XWiki taking advantage of a vulnerability that was added to the KEV list on Friday. https://isc.sans.edu/diary/XWiki%20SolrSearch%20Exploit%20Attempts%20%28CVE-2025-24893%29%20with%20link%20to%20Chicago%20Gangs%20Rappers/32444 AMD Zen 5 Random Num…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
This is today’s cyber news for November 3rd, 2025. Today’s brief opens with a suspected breach at a telecom gear vendor, a claimed donor data exposure tied to a major university, and an extradition linked to a high-impact ransomware crew. We then cover an update-server hijack that turns patches into malware delivery, persistent router implants, and…
  continue reading
 
Scans for WSUS: Port 8530/8531 TCP, CVE-2025-59287 We did observe an increase in scans for TCP ports 8530 and 8531. These ports are associated with WSUS and the scans are likely looking for servers vulnerable to CVE-2025-59287 https://isc.sans.edu/diary/Scans%20for%20Port%208530%208531%20%28TCP%29.%20Likely%20related%20to%20WSUS%20Vulnerability%20C…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
This is this week’s cyber news for October 27th through October 31st, 2025. The week opens with trusted update lanes under attack and an emergency fix to protect enterprise patching. A zero day in Oracle E-Business Suite put finance and supply-chain records at risk, while a fresh B I N D issue threatened cache poisoning across hundreds of thousands…
  continue reading
 
This is today’s cyber news for October 31st, 2025. Today’s brief opens with a polished LinkedIn “board invite” lure stealing Microsoft logins from finance leaders, then shifts to a one-click Chromium crash that can stall kiosks and call floors. We cover hundreds of Android apps abusing near field communication relays, a C I S A deadline to patch a …
  continue reading
 
X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are supposed to identify the researcher conducting the scans https://isc.sans.edu/diary/X-Request-Purpose%3A%20…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
This is today’s cyber news for October 30th, 2025. A broad Microsoft cloud outage led our coverage, reminding teams how identity and Domain Name System dependencies can stall entire workflows. Critical infrastructure risk followed, with Canada warning that hacktivists changed setpoints on exposed industrial gear. We then moved to active exploitatio…
  continue reading
 
How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like dd do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems/32432 Microsoft Azure Front Door Outage Today, Microsoft s Azure Front Door servi…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
This is today’s cyber news for October 29th, 2025. Today’s brief tracks a hardware side-channel that weakens confidential computing on mainstream servers, real-world zero-day abuse in a major enterprise resource planning platform, and a trusted-update weakness that can turn patching into a malware pipeline. We also cover a ransomware twist that run…
  continue reading
 
Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
This is today’s cyber news for October 28th, 2025. We lead with a fix-now warning on Windows update servers after confirmed abuse, a reminder that whoever shapes your patches shapes your posture. Google knocked down rumors of a massive Gmail breach, underscoring how misinformation burns time even when core services are fine. X set a hard deadline t…
  continue reading
 
Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vulnerability Unifi fixed a critical vulnerability in it s Access product https://community.ui.com/releases/Secu…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
This is today’s cyber news for October 27th, 2025. We cover an emergency push by Microsoft to protect Windows Server Update Services from active attacks, Amazon’s explanation for a Domain Name System failure inside Amazon Web Services that rippled across major apps, and a cache-poisoning risk in BIND that threatens the trust behind logins and payme…
  continue reading
 
Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysis tool Kaitai Struct is now available in a web only version https://isc.sans.edu/dia…
  continue reading
 
In this AMA edition of DailyCyber, I explore the challenges and opportunities defining the next wave of cybersecurity leadership. From AI threats to emotional intelligence, this session breaks down what’s shaping 2025’s security landscape — and how to stay ahead. 🔥 What We’ll Cover: 1️⃣ AI-Driven Threats & Deepfakes – How attackers are using AI to …
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
This is the Friday Rollup for October twentieth through October twenty-fourth, twenty twenty-five. A turbulent week put resilience and identity under the microscope: a broad Amazon Web Services disruption rippled through logins and checkouts, while a Windows change broke authentication on cloned machines with duplicate S I Ds. We saw active exploit…
  continue reading
 
This is today’s cyber news for October 24th, 2025. We lead with an actively exploited flaw in a popular endpoint management tool that can hand attackers domain-level control if left unpatched. Retailers face session hijacking on Magento, while Microsoft is closing a quiet NTLM credential-leak path in File Explorer. An ill-timed agent update knocked…
  continue reading
 
Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu/diary/Infostealer%20Targeting%20Android%20Devices/32414 Attackers exploit recently patched Adobe Commerce Vulnerability CVE-2025-542…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
  continue reading
 
This is today’s cyber news for October 23rd, 2025. Attackers are raiding Magento stores, China-linked actors are revisiting SharePoint, and a Rust TAR parser flaw raises fresh supply-chain worries. We also cover why common AI agents can be tricked into running commands and how an MCP registry issue exposed thousands of servers and keys. The middle …
  continue reading
 
Loading …

راهنمای مرجع سریع

در حین کاوش به این نمایش گوش دهید
پخش