PLAY PODCASTS
Cybersecurity Headlines

Cybersecurity Headlines

1,736 episodes — Page 1 of 35

Foxconn confirms factory attacks, BitLocker zero-day accesses protected drives, MDASH patches Windows flaws

May 14, 20267 min

Instructure's agreement, Shai Hulud campaign, OpenAI's Daybreak

May 13, 20267 min

A.I. software flaw hackers, Forza Horizon 6 leak, Linux kernel hit again

May 12, 20267 min

New cPanel vulnerabilities, JDownloader delivers malware, Schumer pushes DHS

May 11, 20268 min

The Department of Know: AI "transformation paradox," Copy Fail chaos, hacked lawnmowers

May 8, 202638 min

PAN-OS RCE exploit , Poland water hacks, Ivanti EPMM flaw

May 8, 20269 min

Chrome installs AI model on devices, Daemon Tools disk app backdoored, crypto security exodus

May 7, 20267 min

Video game supply chain attack, Bleeding Llama, US gets early LLM access

May 6, 20267 min

Instructure discloses breach, DigiCert revokes certificates, Silver Fox targets Indian and Russian orgs

May 5, 20267 min

Telegram Mini Apps malware, cPanel is Sorry, patch wave warning

May 4, 20268 min

The Department of Know: GitHub drama, AI deletes production data, Claude Security Beta

May 1, 202639 min

Critical cPanel zero-day, Swiss Black Axe arrests, HHS data center questions

May 1, 20267 min

Roblox hackers arrested, Microsoft 0-day falls short, Dubai scam takedown

Apr 30, 20267 min

Agent payments, Russian phishing, LeRobot RCE flaw

Apr 29, 20267 min

PhantomRPC flaw, Checkmarx GitHub dark web data, PyPI package infostealer

Apr 28, 20267 min

ADT data breach, Toronto SMS blasting, pre-Stuxnet malware discovery

Apr 27, 20268 min

The Department of Know: Vercel breach, a "Contagious Interview," and ghost breaches

Apr 24, 202640 min

Rituals cosmetics breach, FBI iOS flaw fixed, Teams Helpdesk impersonation

Apr 24, 20268 min

New OpenAI cyber product, unauthorized Mythos access, insurers to cap LLMjacking payouts

Apr 23, 20267 min

CISA lacks Mythos, Lovable's leak by design, YouTube's deepfake detection

Apr 22, 20267 min

Vercel breach, ZionSiphon targets water infrastructure, Bluesky DDoS

Apr 21, 20267 min

London hospital ransomware legacy, PowerOFF takedown, Microsoft RedSun zero-day

Apr 20, 20268 min

The Department of Know: Mythos Mayhem, critical infrastructure targeted, NVD changes

Apr 17, 202638 min

Cisco Webex warning, Splunk's Enterprise fix, Git spoof tricks Claude

Apr 17, 20268 min

OpenAI's GPT-5.4-Cyber, McGraw Hill blames Salesforce for breach, signed adware disables antivirus

Apr 16, 20266 min

Ransomware drama, faked Ledger app, Treasury wants Mythos

Apr 15, 20267 min

Claude Mythos Preview's capabilities, Anodot breached companies face extortion, wolfSSL flaw enables forged certificates

Apr 14, 20267 min

The Department of Know is Moving to Fridays

Apr 13, 20261 min

Adobe patches zero-day, Marimo flaw exploited, Venice flood threat

Apr 13, 20267 min

Android API exposure, Acrobat Reader zero-day, Bitcoin Depot cyberattack

Apr 10, 20268 min

ChipSoft popped, APT28 updates, CIA cyber espionage elevation

Apr 9, 20267 min

Anthropic's Project Glasswing, CISA funding in doubt, routers hijacked for passwords

Apr 8, 20267 min

Drift blames exploit on North Korea, GitHub attacks target South Korea, Die Linke breach threatens data leak

Apr 7, 20267 min

Department of Know: Axios malware, TeamPCP campaign, New Storm infostealer

Apr 6, 202631 min

Malicious npm packages, CISA budget cuts, hackers exploit React2Shell

Apr 6, 20268 min

Texas hospital breach, CISA orders NetScaler patch, ISO file RAT warning

250,000 affected by data Breach at Texas hospital CISA says, "patch Citrix NetScaler bug by Thursday" Researchers uncover mining operation using ISO lures Get the show notes here: https://cisoseries.com/cybersecurity-news-texas-hospital-breach-cisa-orders-netscaler-patch-iso-file-rat-warning/ Huge thanks to our sponsor, ThreatLocker Security controls fail when they break the business. Successful teams phase in protections gradually — starting with visibility, then moving to enforcement. That approach allows organizations to reduce risk without overwhelming IT teams or disrupting critical workflows. Learn more at ThreatLocker.com

Apr 3, 20268 min

New iOS patches over DarkSword, FBI: surveillance hack is major incident, Cisco code stolen in Trivy-linked breach

Apple pushes new patches over DarkSword FBI: US surveillance hack is major incident Cisco code stolen in Trivy-linked breach Get the show notes here: https://cisoseries.com/cybersecurity-news-apple-pushes-new-patches-over-darksword-fbi-us-surveillance-hack-is-major-incident-cisco-code-stolen-in-trivy-linked-breach/ Huge thanks to our sponsor, ThreatLocker Detection-based security assumes you'll catch an attack in time. Control-based security assumes you won't. That mindset shift is driving more organizations to focus on preventative controls — stopping unknown execution and unauthorized privilege elevation instead of relying solely on alerts after the fact. Learn more at ThreatLocker.com

Apr 2, 20266 min

Axios poisoned, TeamPCP details, Claude Code leaked

HTTP client introduces malicious dependency TeamPCP testing the open source supply chain Claude source code leaked Get the show notes here: https://cisoseries.com/cybersecurity-news-axios-poisoned-teampcp-details-claude-code-leaked/ Huge thanks to our sponsor, ThreatLocker Least privilege isn't about distrusting users — it's about limiting blast radius. Many attacks succeed because malware inherits excessive permissions. Enforcing least privilege helps ensure that even if something goes wrong, attackers can't easily escalate access or move laterally across the environment. Learn more at ThreatLocker.com

Apr 1, 20268 min

macOS Terminal ClickFix attacks, Russian court sentences 'Flint', CareCloud probes data breach

macOS Terminal gets ClickFix attacks Russian court sentences 'Flint' over card fraud CareCloud probes data breach Get the show notes here: https://cisoseries.com/cybersecurity-news-macos-terminal-clickfix-attacks-russian-court-sentences-flint-carecloud-probes-data-breach/ Huge thanks to our sponsor, ThreatLocker Ransomware doesn't need to be sophisticated if it's allowed to execute. A growing number of security teams are shifting focus from detecting ransomware to preventing execution in the first place — controlling applications, scripts, and installers so unauthorized code never gets the chance to run. Learn more at ThreatLocker.com

Mar 31, 20268 min

Department of Know: Gemini scours dark web, NSA worries about cybersecurity, APIs run loose

Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Dennis Pickett, vp, CISO, RTI International, and Jacob Combs, CISO, Tandem Diabetes Care Thanks to our show sponsor, ThreatLocker Many security strategies still assume everything is allowed until proven malicious. Attackers understand that model well. That's why more organizations are rethinking endpoint security — shifting from detection-first tools to control-first approaches that reduce attack surface before an incident occurs. Learn more at ThreatLocker.com All links and the video of this episode can be found on CISO Series.com

Mar 30, 202635 min

FBI email theft, Lloyds Bank glitch, API keys running loose

FBI confirms theft of director's personal emails Lloyds customer data exposed in IT glitch Hundreds of valid API keys discovered on the Web Get the show notes here: https://cisoseries.com/cybersecurity-news-fbi-email-theft-lloyds-bank-glitch-api-keys-running-loose/ Huge thanks to our sponsor, ThreatLocker Most breaches don't start with a zero-day — they start because something unexpected was allowed to run. One way organizations reduce risk is by shrinking the attack surface: deciding what software should be allowed to execute and blocking everything else by default. Fewer unknowns means fewer opportunities for attackers. Learn more at ThreatLocker.com

Mar 30, 20268 min

Alleged RedLine dev extradited, Red Menshen spies with BPFDoor, is US cybersecurity slipping?

Alleged RedLine dev extradited to US Red Menshen uses BPFDoor to spy Former NSA chiefs worry US cybersecurity is slipping Check out our show notes for all story links: https://cisoseries.com/cybersecurity-news-alleged-redline-dev-extradited-red-menshen-spies-with-bpfdoor-is-us-cybersecurity-slipping/ Huge thanks to our sponsor, ThreatLocker Security controls fail when they break the business. Successful teams phase in protections gradually — starting with visibility, then moving to enforcement. That approach allows organizations to reduce risk without overwhelming IT teams or disrupting critical workflows. Learn more at ThreatLocker.com

Mar 27, 20267 min

Torg Grabber targets crypto, TeamPCP backdoors LiteLLM, GitHub AI bug detection

Torg Grabber targets crypto wallets TeamPCP backdoors LiteLLM GitHub adds AI security bug detection Check out our show notes for all story links: https://cisoseries.com/cybersecurity-news-torg-grabber-targets-crypto-teampcp-backdoors-litellm-github-ai-bug-detection/ Huge thanks to our sponsor, ThreatLocker Detection-based security assumes you'll catch an attack in time. Control-based security assumes you won't. That mindset shift is driving more organizations to focus on preventative controls — stopping unknown execution and unauthorized privilege elevation instead of relying solely on alerts after the fact. Learn more at ThreatLocker.com

Mar 26, 20267 min

FCC router ban, drone hit AWS, Crunchroll leak

FCC bans foreign routers Drone activity disrupts AWS region Crunchyroll confirmed data leak Check out our show notes for all story links: https://cisoseries.com/cybersecurity-news-fcc-router-ban-drone-hit-aws-crunchroll-leak/ Huge thanks to our sponsor, ThreatLocker Least privilege isn't about distrusting users — it's about limiting blast radius. Many attacks succeed because malware inherits excessive permissions. Enforcing least privilege helps ensure that even if something goes wrong, attackers can't easily escalate access or move laterally across the environment. Learn more at ThreatLocker.com

Mar 25, 20266 min

DarkSword exploit hits GitHub, Gemini AI agents scour dark web, Trivy supply chain attack expands

New DarkSword exploit hits GitHub Gemini AI agents scour the dark web Trivy supply chain attack expands Check out our show notes for all story links: https://cisoseries.com/cybersecurity-news-darksword-exploit-hits-github-gemini-ai-agents-scour-dark-web-trivy-supply-chain-attack-expands/ Huge thanks to our sponsor, ThreatLocker Ransomware doesn't need to be sophisticated if it's allowed to execute. A growing number of security teams are shifting focus from detecting ransomware to preventing execution in the first place — controlling applications, scripts, and installers so unauthorized code never gets the chance to run. Learn more at ThreatLocker.com

Mar 24, 20268 min

Department of Know: SaaS apps enable breaches, real-time cyber protection, IoT botnet takedown

Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Bil Harmer, CISO, Supabase, and Chris Ray, Field CTO, GigaOm Thanks to our show sponsor, ThreatLocker Many security strategies still assume everything is allowed until proven malicious. Attackers understand that model well. That's why more organizations are rethinking endpoint security — shifting from detection-first tools to control-first approaches that reduce attack surface before an incident occurs. Learn more at ThreatLocker.com All links and the video of this episode can be found on CISO Series.com

Mar 23, 202632 min

International botnet takedown, California city ransomed, Azure Monitor phishing

Law enforcement seizes botnet infrastructure California city and LA transit agency report cybersecurity issues Microsoft Azure Monitor alerts used for callback phishing attacks Check out our show notes for all story links: https://cisoseries.com/cybersecurity-news-cybersecurity-news-international-botnet-takedown-california-city-ransomed-azure-monitor-phishing/ Huge thanks to our sponsor, ThreatLocker Most breaches don't start with a zero-day — they start because something unexpected was allowed to run. One way organizations reduce risk is by shrinking the attack surface: deciding what software should be allowed to execute and blocking everything else by default. Fewer unknowns means fewer opportunities for attackers. Learn more at ThreatLocker.com

Mar 23, 20268 min

Critical SharePoint flaw, real-time cyberattack prevention, CISA's Intune warning

Critical Microsoft SharePoint flaw now exploited in attacks 1stProtect reveals endpoint security platform intended to prevent cyberattacks in real time CISA urges U.S. organizations to secure Microsoft Intune systems following Stryker breach Get links to all our stories in the show notes: https://cisoseries.com/cybersecurity-news-critical-sharepoint-flaw-real-time-cyberattack-prevention-cisas-intune-warning/ Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first security awareness platform built to stop AI-powered social engineering. Picture a "new hire" who interviews well… except they're synthetic: AI video, AI voice, AI backstory. Once they're in, they go after payroll, internal docs, and access. That's the new reality: the attack surface is trust itself. Adaptive fights back with realistic deepfake simulations and training that actually sticks. Learn more at adaptivesecurity.com.

Mar 20, 20268 min

DarkSword emerges, "ShieldGuard" dismantled, NK IT worker army rakes in money

DarkSword emerges from suspected Russian hackers "ShieldGuard" dismantled after malware discovery North Korea's fake IT worker army rakes in $500M/year Get links to all our stories in the show notes: https://cisoseries.com/cybersecurity-news-darksword-emerges-shieldguard-dismantled-nk-it-worker-army-rakes-in-money/ Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first security awareness platform built to stop AI-powered social engineering. Picture a "new hire" who interviews well… except they're synthetic: AI video, AI voice, AI backstory. Once they're in, they go after payroll, internal docs, and access. That's the new reality: the attack surface is trust itself. Adaptive fights back with realistic deepfake simulations and training that actually sticks. Learn more at adaptivesecurity.com.

Mar 19, 20266 min

Energy strategy, scammer accord, font-rendering attack

Energy Department to release first cyber strategy Tech giants sign on to fight scammers Font-rendering hides malicious commands from AI in plain sight Get links to all our stories in the show notes: https://cisoseries.com/cybersecurity-news-energy-strategy-scammer-accord-font-rendering-attack/ Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first security awareness platform built to stop AI-powered social engineering. Attackers don't need malware anymore; they need trust. Tip: set a simple passphrase for high-risk actions, like wire requests or "urgent" account recovery – especially within finance teams and families. If the caller can't answer it, pause and verify. Adaptive runs deepfake and vishing simulations so employees practice this before it's real. Learn more at adaptivesecurity.com.

Mar 18, 20267 min