PLAY PODCASTS
Daily Cyber Security News

Daily Cyber Security News

106 episodes — Page 2 of 3

Anthropic Claude AI Driven Phishing & RDP to TransUnion Breach

Cybercriminals weaponize Anthropic Claude for automated phishing, ransomware and real time data extortion. Google removes 77 malicious Play Store apps and patches a critical Chrome zero day. Microsoft RDP AD and Azure endpoints face new exploit waves. Telegram bots deliver spyware. A TransUnion breach exposes 4.4 M consumer records via a third party app flaw.

Sep 1, 202513 min

What is Reverse Engineering

An overview of cybersecurity Reverse engineering, focussing on reverse engineering overview

Aug 28, 20253 min

ImageIO Apple ImageIO Zero Click Zero Day Patched

Apple released emergency updates for a critical zero click zero day in its ImageIO framework exploited to siphon crypto. The episode also covers Google's AI driven scam lures, Microsoft s CVE 2025 29824 exploits, sweeping Linux kernel fixes and Telegram s new security shields.

Aug 25, 202511 min

What Is Extended Detection and Response XDR

An overview of cybersecurity Extended Detection and Response XDR , focussing on xdr overview

Aug 21, 20253 min

FortiSIEM Fortinet RCE & Global Cyber Updates

Unpack a pre auth FortiSIEM RCE in the wild, brute force SSL VPN sieges, Google and Microsoft s latest security wins and AI injection risks, a Telegram malware surge under Russian crackdowns, and an active WinRAR zero day backdoor campaign.

Aug 18, 202511 min

What are Living off the Land attacks

An overview of cybersecurity Living off the Land LotL attacks, focussing on overview

Aug 14, 20252 min

Gemini AI Calendar Promptware Attack in Google Calendar

A prompt injection bug in Google Calendar let attackers embed hidden commands in invites or emails to hijack Gemini AI agents and control smart home devices. Fully patched, it underscores the growing risk of AI promptware and the need to sanitize untrusted inputs.

Aug 11, 20257 min

What is Behavioral Fingerprinting

An overview of cybersecurity Behavioral Fingerprinting, focussing on introduction

Aug 7, 20252 min

Aeroflot IT Systems Aeroflot Breach, CISA Kit, Google & Telegram

Pro Ukraine hacktivists crippled Aeroflot servers, CISA released incident response and Zero Trust guidance, Google patched critical zero days and supply chain flaws, and Telegram rolled out new privacy defenses.

Aug 4, 202511 min

Container Security Fundamentals

An overview of cybersecurity container security, focussing on container security fundamentals

Jul 31, 20253 min

What are LLM jailbreak attacks

An overview of cybersecurity LLM jailbreak attacks, focussing on LLM jailbreak attacks overview

Jul 24, 20252 min

BigONE hot wallet Supply Chain Heist to Zero Days Weekly Brief

This CyberScene episode unpacks the 27M BigONE supply chain crypto hack, Elmo's X account hijack, Google's rapid zero day fixes, and Telegram's Android malware blitz underscoring the critical role of third party controls, strong authentication, and AI driven defenses.

Jul 21, 20259 min

What Is DNS Tunneling

An overview of cybersecurity DNS tunneling, focussing on dns tunneling overview

Jul 17, 20252 min

GMX V1 GMX 40M Arbitrum Exploit & Weekly Cyber Brief

Highlights include GMX s 40M V1 Arbitrum exploit and white hat bounty, a major Linux kernel patch spree for DoS and privilege bugs, an AI driven Rubio deepfake scam, Microsoft s Patch Tuesday blitz, and Telegram malware scam threats.

Jul 14, 202512 min

What is Ransomware as a Service

An overview of cybersecurity Ransomware as a Service RaaS , focussing on Ransomware as a Service RaaS overview

Jul 10, 20253 min

Cisco UCM Cisco UCM Backdoor, Qantas Breach & Telegram

Covers Cisco s emergency patch for a hard coded SSH root backdoor in UCM CVE 2025 20309 , Qantas s vendor platform breach impacting six million customers, and Telegram s new malware alerts and bot compromise fallout.

Jul 7, 20259 min

What are Side Channel Timing Attacks

An overview of cybersecurity Side Channel Timing Attack, focussing on side channel timing attacks

Jul 3, 20253 min

Gmail MFA Bypass Phishing Bypass Exposes Gmail Accounts

A sophisticated phishing campaign sidesteps Gmail s MFA and exploits a username recovery flaw to harvest user phone numbers. Also explores Google s AI defenses, Android 16 network protections, Kaspersky s SparkKitty spyware, Telegram data leaks, and critical Ubuntu kernel patches.

Jun 30, 202512 min

What Is Attack Surface Management

An overview of cybersecurity attack surface management, focussing on introduction to attack surface management

Jun 26, 20252 min

CVE 2025 2783 Chrome Zero Day & Cloud PC Safeguards

This episode dissects Google s Chrome zero day CVE 2025 2783 exploited by TaxOff, Scattered Spider phishing, historic 16B credential breach, Microsoft s Cloud PC security defaults and passkey mandate, Iran s Nobitex exchange hack, Telegram data leaks and malware campaigns, plus Ubuntu s critical privilege escalation and RCE patches.

Jun 23, 202511 min

Understanding Prompt Injection

An overview of cybersecurity Agentic AI vulnerabilities, focussing on prompt injection

Jun 19, 20253 min

Apple iMessage Apple iMessage Zero Click & OAuth Malware Tricks

Episode covers Apple s iMessage zero click exploit patch that exposed Secure Enclave keys, Google OAuth consent flow abuse for stealthy malware delivery, Microsoft s zero click AI hack fix, Interpol s massive info stealer takedown, and Telegram s new anti scam defenses.

Jun 16, 202513 min

What Is DNS over HTTPS DoH

An overview of cybersecurity DNS over HTTPS DoH , focussing on introduction to doh

Jun 12, 20252 min

Coinbase KYC Data Coinbase Breach, FBI Alerts, Google & More

Dissecting Coinbase s 70K user KYC data leak and 400M response, the FBI s latest phishing, botnet BADBOX 2.0 and ransomware Play warnings, Google s emergency Chrome zero day patches and email safeguards, Microsoft s threat tracking patches, and Telegram malware privacy issues.

Jun 9, 202515 min

What is SOAR

An overview of cybersecurity Security Orchestration, Automation, and Response SOAR , focussing on SOAR fundamentals

Jun 5, 20254 min

ASUS routers ViciousTrap, Debian Patches & Telegram Threats

This episode delves into the ViciousTrap backdoor compromise of over 9,000 ASUS routers, the latest Debian security advisories including kernel and app patches, and emerging threats and defenses in the Telegram ecosystem.

Jun 2, 20257 min

Cetus DEX Cetus DEX 230M Hack & Cyber Highlights

A packed episode covering the 230M Cetus DEX oracle exploit, CISA s new advisories and ICS alerts, Coinbase s insider driven breach of 69K users, and Microsoft s Lumma stealer takedown and critical patches plus the heated DeFi centralization debate on Sui.

May 26, 20250 min

What is a Zero Knowledge Proof

An overview of cybersecurity zero knowledge proof, focussing on zero knowledge proof basics

May 22, 20252 min

Insider Threats Insider breach, Android hardening & ransomware

Explore Coinbase s bribed insider breach and 20M extortion, Google s Android 16 security enhancements and emergency Chrome Gmail fixes, and the DragonForce ransomware attack on Marks & Spencer exposing customer data. We unpack attack vectors, mitigation strategies, and lessons for preventing insider threats, hardening mobile browser platforms, and defending retail networks.

May 19, 20257 min

What is Confidential Computing

An overview of cybersecurity confidential computing, focussing on confidential computing overview

May 15, 20252 min

Cisco SD WAN Manager Cisco Phishing, LockBit Leak, Telegram Defenses

Cisco s Q1 phishing surge and critical IOS SD WAN patches, LockBit s dark web breach exposing 60k Bitcoin wallets, and Telegram s new anti scam malware security controls.

May 12, 20259 min

Cisco IOS XE Cisco Patches, LockBit Leak & Telegram Scams

Covers Cisco s critical IOS XE and ASA patches, Talos AI threat research, the LockBit RaaS database leak exposing 60k BTC addresses and insider tools, and Telegram s malware scams and new defenses.

May 12, 20258 min

What Is an SBOM

An overview of cybersecurity SBOM, focussing on introduction to sbom

May 8, 20252 min

AirPlay Protocol AirBorne Apple s 23 AirPlay Vulnerabilities Exposed

Researchers at Oligo uncovered 23 flaws in Apple s AirPlay allowing unauthenticated code pushes to third party devices. While iOS 18.4 devices are patched, billions of accessories remain exposed. The episode also dives into Apple s mercenary spyware alerts, Telegram s new anti phishing suite, and the DragonForce ransomware breach at the UK Co op.

May 5, 20255 min

AirPlay Devices AirBorne AirPlay Flaws, Spyware & Ransomware

A technical deep dive into Apple s mercenary spyware alerts and the 23 AirBorne AirPlay flaws risking zero click code execution, Telegram s new anti phishing filters and crypto upgrades, and the Co op s showdown with DragonForce ransomware.

May 5, 20256 min

AirPlay AirBorne zero click RCE bugs

Oligo discovered 23 zero click, wormable remote code exec flaws in Apple s AirPlay protocol SDK. While iOS, macOS and first party devices are patched, millions of third party units remain vulnerable update firmware or disable AirPlay until fixes arrive.

May 5, 20257 min

AirPlay SDK AirBorne Wormable Zero Click RCE in AirPlay

Podcast covers Apple s Pegasus alerts, critical AirPlay AirBorne zero click RCE, Telegram anti spam and phishing defenses, TikTok s 530M GDPR fine, and the Co op s data breach plus key mitigation steps.

May 5, 20256 min

Introduction to Shift Left Security

An overview of cybersecurity Shift Left, focussing on shift left security overview

May 1, 20252 min

Multiple Products Weekly Cybersecurity Headlines Deep Dive

This episode covers the FBI s 10M Salt Typhoon hunt and a record breaking 16.6B in internet crime losses Google s MiraclePtr zero day defenses, Android auto reboot, and News plugin CSRF Telegram s encryption upgrades and urgent Ubuntu kernel and package patches.

Apr 28, 20259 min

What Is an Attack Graph

An overview of cybersecurity attack graphs, focussing on attack graphs overview

Apr 24, 20253 min

What is Prompt Injection

An overview of cybersecurity LLM vulnerabilities, focussing on prompt injection

Apr 24, 20253 min

KiloEx Oracle 7M KiloEx Cross Chain Oracle Exploit

A flawed access control in KiloEx s cross chain price oracle let attackers drain 7M across BNB Chain, Base and Taiko, forcing emergency patches and a 750K bounty to retrieve stolen funds.

Apr 21, 20259 min

KiloEx oracle KiloEx 7M cross chain hack & recovery

Dive into Android 16 s auto restart safeguard, sophisticated Google OAuth phishing, 4chan s record breach, KiloEx s 7M cross chain oracle exploit & full recovery, and MITRE s CVE funding lifeline.

Apr 21, 20257 min

What is Threat Research Automation

An overview of cybersecurity threat research automation, focussing on cybersecurity automation

Apr 17, 20254 min

iOS, Android, Windows Vulnerabilities in Big Tech Security Updates

Explore key security challenges facing tech giants like Apple, Google, Microsoft, Telegram, and WhatsApp. Delve into vulnerabilities in iOS, Android, and Windows, and learn about critical security updates, privacy issues, and regulatory tensions. Understand the role of AI in enhancing cybersecurity measures and the importance of staying vigilant against evolving threats.

Apr 14, 20258 min

Introduction to Lateral Movement Attacks

An overview of cybersecurity lateral movement attacks, focussing on lateral movement attacks

Apr 10, 20253 min

Google Chrome Tech Giants vs. Cyber Threats A Dynamic Battle

Today's podcast explores cybersecurity strategies from Google, Microsoft, Oracle, Ivanti, and Ubuntu. Google addresses North Korean infiltration and enhances Chrome with new security patches. Microsoft tackles phishing threats with AI and passwordless solutions. Oracle faces scrutiny over data breaches. Ivanti patches critical VPN vulnerabilities. Ubuntu releases crucial security updates for Linux systems.

Apr 7, 20258 min

Understanding Heap Based Overflow

An overview of cybersecurity heap based overflow vulnerability, focussing on heap based overflow vulnerability

Apr 3, 20253 min

Google Chrome Exploring Zero Day Vulnerabilities in Chrome

The episode delves into critical zero day vulnerabilities affecting Google's Chrome browser, with a focus on Russian organizations and journalists. It discusses Google's quick patching efforts and acquisition of Wiz to enhance security measures.

Mar 31, 20256 min

Introduction to Steganographic Malware

An overview of cybersecurity Steganographic malware, focussing on steganographic malware

Mar 27, 20254 min