
Daily Cyber Security News
106 episodes — Page 2 of 3
Anthropic Claude AI Driven Phishing & RDP to TransUnion Breach
Cybercriminals weaponize Anthropic Claude for automated phishing, ransomware and real time data extortion. Google removes 77 malicious Play Store apps and patches a critical Chrome zero day. Microsoft RDP AD and Azure endpoints face new exploit waves. Telegram bots deliver spyware. A TransUnion breach exposes 4.4 M consumer records via a third party app flaw.
What is Reverse Engineering
An overview of cybersecurity Reverse engineering, focussing on reverse engineering overview
ImageIO Apple ImageIO Zero Click Zero Day Patched
Apple released emergency updates for a critical zero click zero day in its ImageIO framework exploited to siphon crypto. The episode also covers Google's AI driven scam lures, Microsoft s CVE 2025 29824 exploits, sweeping Linux kernel fixes and Telegram s new security shields.
What Is Extended Detection and Response XDR
An overview of cybersecurity Extended Detection and Response XDR , focussing on xdr overview
FortiSIEM Fortinet RCE & Global Cyber Updates
Unpack a pre auth FortiSIEM RCE in the wild, brute force SSL VPN sieges, Google and Microsoft s latest security wins and AI injection risks, a Telegram malware surge under Russian crackdowns, and an active WinRAR zero day backdoor campaign.
What are Living off the Land attacks
An overview of cybersecurity Living off the Land LotL attacks, focussing on overview
Gemini AI Calendar Promptware Attack in Google Calendar
A prompt injection bug in Google Calendar let attackers embed hidden commands in invites or emails to hijack Gemini AI agents and control smart home devices. Fully patched, it underscores the growing risk of AI promptware and the need to sanitize untrusted inputs.
What is Behavioral Fingerprinting
An overview of cybersecurity Behavioral Fingerprinting, focussing on introduction
Aeroflot IT Systems Aeroflot Breach, CISA Kit, Google & Telegram
Pro Ukraine hacktivists crippled Aeroflot servers, CISA released incident response and Zero Trust guidance, Google patched critical zero days and supply chain flaws, and Telegram rolled out new privacy defenses.
Container Security Fundamentals
An overview of cybersecurity container security, focussing on container security fundamentals
What are LLM jailbreak attacks
An overview of cybersecurity LLM jailbreak attacks, focussing on LLM jailbreak attacks overview
BigONE hot wallet Supply Chain Heist to Zero Days Weekly Brief
This CyberScene episode unpacks the 27M BigONE supply chain crypto hack, Elmo's X account hijack, Google's rapid zero day fixes, and Telegram's Android malware blitz underscoring the critical role of third party controls, strong authentication, and AI driven defenses.
What Is DNS Tunneling
An overview of cybersecurity DNS tunneling, focussing on dns tunneling overview
GMX V1 GMX 40M Arbitrum Exploit & Weekly Cyber Brief
Highlights include GMX s 40M V1 Arbitrum exploit and white hat bounty, a major Linux kernel patch spree for DoS and privilege bugs, an AI driven Rubio deepfake scam, Microsoft s Patch Tuesday blitz, and Telegram malware scam threats.
What is Ransomware as a Service
An overview of cybersecurity Ransomware as a Service RaaS , focussing on Ransomware as a Service RaaS overview
Cisco UCM Cisco UCM Backdoor, Qantas Breach & Telegram
Covers Cisco s emergency patch for a hard coded SSH root backdoor in UCM CVE 2025 20309 , Qantas s vendor platform breach impacting six million customers, and Telegram s new malware alerts and bot compromise fallout.
What are Side Channel Timing Attacks
An overview of cybersecurity Side Channel Timing Attack, focussing on side channel timing attacks
Gmail MFA Bypass Phishing Bypass Exposes Gmail Accounts
A sophisticated phishing campaign sidesteps Gmail s MFA and exploits a username recovery flaw to harvest user phone numbers. Also explores Google s AI defenses, Android 16 network protections, Kaspersky s SparkKitty spyware, Telegram data leaks, and critical Ubuntu kernel patches.
What Is Attack Surface Management
An overview of cybersecurity attack surface management, focussing on introduction to attack surface management
CVE 2025 2783 Chrome Zero Day & Cloud PC Safeguards
This episode dissects Google s Chrome zero day CVE 2025 2783 exploited by TaxOff, Scattered Spider phishing, historic 16B credential breach, Microsoft s Cloud PC security defaults and passkey mandate, Iran s Nobitex exchange hack, Telegram data leaks and malware campaigns, plus Ubuntu s critical privilege escalation and RCE patches.
Understanding Prompt Injection
An overview of cybersecurity Agentic AI vulnerabilities, focussing on prompt injection
Apple iMessage Apple iMessage Zero Click & OAuth Malware Tricks
Episode covers Apple s iMessage zero click exploit patch that exposed Secure Enclave keys, Google OAuth consent flow abuse for stealthy malware delivery, Microsoft s zero click AI hack fix, Interpol s massive info stealer takedown, and Telegram s new anti scam defenses.
What Is DNS over HTTPS DoH
An overview of cybersecurity DNS over HTTPS DoH , focussing on introduction to doh
Coinbase KYC Data Coinbase Breach, FBI Alerts, Google & More
Dissecting Coinbase s 70K user KYC data leak and 400M response, the FBI s latest phishing, botnet BADBOX 2.0 and ransomware Play warnings, Google s emergency Chrome zero day patches and email safeguards, Microsoft s threat tracking patches, and Telegram malware privacy issues.
What is SOAR
An overview of cybersecurity Security Orchestration, Automation, and Response SOAR , focussing on SOAR fundamentals
ASUS routers ViciousTrap, Debian Patches & Telegram Threats
This episode delves into the ViciousTrap backdoor compromise of over 9,000 ASUS routers, the latest Debian security advisories including kernel and app patches, and emerging threats and defenses in the Telegram ecosystem.
Cetus DEX Cetus DEX 230M Hack & Cyber Highlights
A packed episode covering the 230M Cetus DEX oracle exploit, CISA s new advisories and ICS alerts, Coinbase s insider driven breach of 69K users, and Microsoft s Lumma stealer takedown and critical patches plus the heated DeFi centralization debate on Sui.
What is a Zero Knowledge Proof
An overview of cybersecurity zero knowledge proof, focussing on zero knowledge proof basics
Insider Threats Insider breach, Android hardening & ransomware
Explore Coinbase s bribed insider breach and 20M extortion, Google s Android 16 security enhancements and emergency Chrome Gmail fixes, and the DragonForce ransomware attack on Marks & Spencer exposing customer data. We unpack attack vectors, mitigation strategies, and lessons for preventing insider threats, hardening mobile browser platforms, and defending retail networks.
What is Confidential Computing
An overview of cybersecurity confidential computing, focussing on confidential computing overview
Cisco SD WAN Manager Cisco Phishing, LockBit Leak, Telegram Defenses
Cisco s Q1 phishing surge and critical IOS SD WAN patches, LockBit s dark web breach exposing 60k Bitcoin wallets, and Telegram s new anti scam malware security controls.
Cisco IOS XE Cisco Patches, LockBit Leak & Telegram Scams
Covers Cisco s critical IOS XE and ASA patches, Talos AI threat research, the LockBit RaaS database leak exposing 60k BTC addresses and insider tools, and Telegram s malware scams and new defenses.
What Is an SBOM
An overview of cybersecurity SBOM, focussing on introduction to sbom
AirPlay Protocol AirBorne Apple s 23 AirPlay Vulnerabilities Exposed
Researchers at Oligo uncovered 23 flaws in Apple s AirPlay allowing unauthenticated code pushes to third party devices. While iOS 18.4 devices are patched, billions of accessories remain exposed. The episode also dives into Apple s mercenary spyware alerts, Telegram s new anti phishing suite, and the DragonForce ransomware breach at the UK Co op.
AirPlay Devices AirBorne AirPlay Flaws, Spyware & Ransomware
A technical deep dive into Apple s mercenary spyware alerts and the 23 AirBorne AirPlay flaws risking zero click code execution, Telegram s new anti phishing filters and crypto upgrades, and the Co op s showdown with DragonForce ransomware.
AirPlay AirBorne zero click RCE bugs
Oligo discovered 23 zero click, wormable remote code exec flaws in Apple s AirPlay protocol SDK. While iOS, macOS and first party devices are patched, millions of third party units remain vulnerable update firmware or disable AirPlay until fixes arrive.
AirPlay SDK AirBorne Wormable Zero Click RCE in AirPlay
Podcast covers Apple s Pegasus alerts, critical AirPlay AirBorne zero click RCE, Telegram anti spam and phishing defenses, TikTok s 530M GDPR fine, and the Co op s data breach plus key mitigation steps.
Introduction to Shift Left Security
An overview of cybersecurity Shift Left, focussing on shift left security overview
Multiple Products Weekly Cybersecurity Headlines Deep Dive
This episode covers the FBI s 10M Salt Typhoon hunt and a record breaking 16.6B in internet crime losses Google s MiraclePtr zero day defenses, Android auto reboot, and News plugin CSRF Telegram s encryption upgrades and urgent Ubuntu kernel and package patches.
What Is an Attack Graph
An overview of cybersecurity attack graphs, focussing on attack graphs overview
What is Prompt Injection
An overview of cybersecurity LLM vulnerabilities, focussing on prompt injection
KiloEx Oracle 7M KiloEx Cross Chain Oracle Exploit
A flawed access control in KiloEx s cross chain price oracle let attackers drain 7M across BNB Chain, Base and Taiko, forcing emergency patches and a 750K bounty to retrieve stolen funds.
KiloEx oracle KiloEx 7M cross chain hack & recovery
Dive into Android 16 s auto restart safeguard, sophisticated Google OAuth phishing, 4chan s record breach, KiloEx s 7M cross chain oracle exploit & full recovery, and MITRE s CVE funding lifeline.
What is Threat Research Automation
An overview of cybersecurity threat research automation, focussing on cybersecurity automation
iOS, Android, Windows Vulnerabilities in Big Tech Security Updates
Explore key security challenges facing tech giants like Apple, Google, Microsoft, Telegram, and WhatsApp. Delve into vulnerabilities in iOS, Android, and Windows, and learn about critical security updates, privacy issues, and regulatory tensions. Understand the role of AI in enhancing cybersecurity measures and the importance of staying vigilant against evolving threats.
Introduction to Lateral Movement Attacks
An overview of cybersecurity lateral movement attacks, focussing on lateral movement attacks
Google Chrome Tech Giants vs. Cyber Threats A Dynamic Battle
Today's podcast explores cybersecurity strategies from Google, Microsoft, Oracle, Ivanti, and Ubuntu. Google addresses North Korean infiltration and enhances Chrome with new security patches. Microsoft tackles phishing threats with AI and passwordless solutions. Oracle faces scrutiny over data breaches. Ivanti patches critical VPN vulnerabilities. Ubuntu releases crucial security updates for Linux systems.
Understanding Heap Based Overflow
An overview of cybersecurity heap based overflow vulnerability, focussing on heap based overflow vulnerability
Google Chrome Exploring Zero Day Vulnerabilities in Chrome
The episode delves into critical zero day vulnerabilities affecting Google's Chrome browser, with a focus on Russian organizations and journalists. It discusses Google's quick patching efforts and acquisition of Wiz to enhance security measures.
Introduction to Steganographic Malware
An overview of cybersecurity Steganographic malware, focussing on steganographic malware