Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Daily Security Review

Technology News

Episodes

Showing 201-300 of 410

Salt Typhoon Strikes Again: National Guard, Telecoms, and a Crisis in U.S. Cyber Defense

16 Jul 2025

Contributed by Lukas

Salt Typhoon, a sophisticated Chinese state-sponsored cyber threat actor, is conducting one of the most aggressive and sustained espionage campaigns e...

DragonForce Ransomware Hits Belk: 150GB Data Leak and Operational Chaos

15 Jul 2025

Contributed by Lukas

In this episode, we dive into the May 2025 ransomware attack on Belk, the iconic U.S. department store chain, orchestrated by the DragonForce ransomwa...

NVIDIA Issues Urgent Rowhammer Warning: Enable ECC or Risk AI Integrity

15 Jul 2025

Contributed by Lukas

In this episode, we dissect a major hardware-level cybersecurity warning issued by NVIDIA, one that directly affects data center operators, AI researc...

Zip Security Secures $13.5M to Simplify and Scale Cyber Defense

15 Jul 2025

Contributed by Lukas

In this episode, we spotlight Zip Security, a rising New York-based cybersecurity startup that just closed a $13.5 million Series A funding round, led...

Century Support Services Breach: 160,000 Identities Compromised in Silent Cyberattack

15 Jul 2025

Contributed by Lukas

In this episode, we examine the major data breach at Century Support Services—also operating under the name Next Level Finance Partners—that expos...

TikTok, China, and the EU: The Battle Over Data Sovereignty

11 Jul 2025

Contributed by Lukas

In this episode, we explore the mounting scrutiny TikTok faces over its handling of European user data, with the EU’s Data Protection Commission (DP...

Booz Allen Invests in Corsha: Defending Machine-to-Machine Communication at Scale

11 Jul 2025

Contributed by Lukas

As the cybersecurity landscape shifts toward hyperautomation and AI-driven autonomy, a new frontier has emerged: the identity and access security of m...

WSUS Meltdown: Global Sync Failures and the Shift Toward Cloud Patch Management

11 Jul 2025

Contributed by Lukas

Windows Server Update Services (WSUS) has long been a cornerstone of enterprise patch management—but recent global synchronization failures have rai...

Cracking eSIM: Exposing the Hidden Threats in Next-Gen Mobile Security

11 Jul 2025

Contributed by Lukas

eSIM technology has transformed the way we connect—but has it also introduced new vulnerabilities into the heart of modern telecommunications?In thi...

Qantas Breach and Beyond: Cybersecurity Risks in Australia’s Digital Supply Chains

10 Jul 2025

Contributed by Lukas

As Australia contends with a growing wave of cybersecurity incidents, this episode explores the intersection of national privacy laws, global supply c...

Taiwan Sounds the Alarm: TikTok, WeChat, and the Chinese Data Threat

09 Jul 2025

Contributed by Lukas

In this episode, we examine Taiwan’s growing alarm over Chinese mobile applications, especially TikTok and WeChat, in light of rising global concern...

The Evolution of Atomic macOS Stealer: Backdoors, Keyloggers, and Persistent Threats

08 Jul 2025

Contributed by Lukas

This episode exposes the growing menace of Atomic macOS Stealer (AMOS) — a rapidly evolving malware-as-a-service (MaaS) platform targeting macOS use...

CitrixBleed Returns: CVE-2025-5777 and the Exploitation of NetScaler Devices

08 Jul 2025

Contributed by Lukas

In this episode, we dissect CitrixBleed 2—a newly disclosed and actively exploited vulnerability affecting Citrix NetScaler ADC and Gateway applianc...

SAP’s July 2025 Patch Day: Critical Flaws, CVE-2025-30012, and Ransomware Risk

08 Jul 2025

Contributed by Lukas

In this episode, we break down SAP’s July 2025 Security Patch Day—a high-stakes moment for any enterprise relying on SAP’s core business applica...

106GB Exposed? TelefĂłnica, HellCat, and the Silent Data Breach

07 Jul 2025

Contributed by Lukas

In this episode, we explore a shadowy and unconfirmed—but highly consequential—data breach at Spanish telecommunications giant Telefónica. Allege...

Ingram Micro’s SafePay Ransomware Breach: Human-Operated Threats and Supply Chain Fallout

07 Jul 2025

Contributed by Lukas

The recent ransomware attack on Ingram Micro, a global technology distribution giant, reveals not only a sophisticated human-operated cyber assault—...

The Illusion of Shutdowns: What Hunters International's Closure Really Means

07 Jul 2025

Contributed by Lukas

In a sudden and cryptic announcement, the notorious ransomware group Hunters International has declared its shutdown, citing “recent developments”...

CISA Flags CVE-2025-6554: Patching Chrome’s Critical Flaw Before It’s Too Late

07 Jul 2025

Contributed by Lukas

A newly discovered and actively exploited zero-day vulnerability in Google Chrome has sent ripples through the cybersecurity community. Known as CVE-2...

ANSSI vs. Houken: France Battles Advanced Chinese Hacking Threat

04 Jul 2025

Contributed by Lukas

In this episode, we uncover a high-stakes cyber campaign targeting the heart of French digital infrastructure. ANSSI, France’s national cybersecurit...

Psychological Manipulation and AI Fraud: How Spain Exposed a $12M Scam

04 Jul 2025

Contributed by Lukas

In this episode, we examine a growing threat reshaping financial crime in Europe: sophisticated, technology-driven investment fraud. Spanish law enfor...

CVE-2025-20309: Critical Cisco Root Access Flaw Threatens VoIP Security

04 Jul 2025

Contributed by Lukas

A devastating vulnerability—CVE-2025-20309—has been discovered in Cisco’s Unified Communications Manager (Unified CM) and its Session Management...

macOS Under Siege: NimDoor Malware Targets Telegram, Wallets, and Keychains

03 Jul 2025

Contributed by Lukas

A new, highly advanced malware strain—NimDoor—has emerged as the latest cyber weapon in the arsenal of North Korean state-sponsored hackers, speci...

Cisco Unified CM Vulnerability: Root Access Risk for Enterprise VoIP Networks

03 Jul 2025

Contributed by Lukas

A newly disclosed vulnerability—CVE-2025-20309—in Cisco's Unified Communications Manager (Unified CM) and Session Management Edition has sent shoc...

Forminator Flaw Exposes WordPress Sites to Takeover Attacks: Vulnerability Threatens 600,000+ Sites

03 Jul 2025

Contributed by Lukas

A critical new WordPress vulnerability—CVE-2025-6463—has been discovered in the widely used Forminator plugin, affecting over 600,000 active insta...

Kelly Benefits Breach: Over 550,000 Victims and the Rising Identity Theft Crisis

03 Jul 2025

Contributed by Lukas

In one of the latest large-scale data breaches to hit the U.S. private sector, Kelly Benefits, a provider of payroll and benefits administration servi...

FileFix, HTA, and MotW Bypass—The Alarming Evolution of HTML-Based Attacks

02 Jul 2025

Contributed by Lukas

A newly disclosed exploit dubbed FileFix is redefining how attackers bypass Microsoft Windows' built-in security protections—specifically the Mark-o...

Sophisticated Cyberattack on the International Criminal Court: Justice in the Crosshairs

02 Jul 2025

Contributed by Lukas

The International Criminal Court (ICC), the world’s foremost tribunal for prosecuting war crimes, genocide, and crimes against humanity, has confirm...

Critical Flaws in Microsens NMP Web+ Threaten Industrial Network Security

02 Jul 2025

Contributed by Lukas

In a major red flag for the industrial cybersecurity community, three newly disclosed vulnerabilities in Microsens NMP Web+, a popular network managem...

Qantas Data Breach: Third-Party Hack Exposes Millions of Frequent Flyers

02 Jul 2025

Contributed by Lukas

In a stark reminder of the aviation industry's growing exposure to cyber threats, Australian airline Qantas recently confirmed a serious data breach—...

Berlin Regulator Targets DeepSeek AI Over Data Transfers to China

01 Jul 2025

Contributed by Lukas

Germany’s battle over digital sovereignty and data privacy has intensified, with the Berlin Commissioner for Data Protection formally requesting tha...

CISA Flags Citrix NetScaler Flaws: What CVE-2025-6543 Means for Federal and Private Networks

01 Jul 2025

Contributed by Lukas

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added multiple Citrix NetScaler vulnerabilities to its Known Exploited Vulnerabil...

Cato Networks Secures $359M to Fuel AI-Powered SASE Expansion

01 Jul 2025

Contributed by Lukas

Cato Networks just raised $359 million in Series G funding, pushing its valuation past $4.8 billion and its total funding beyond the $1 billion mark—...

Chrome’s Latest Zero-Day: CVE-2025-6554 and Remote Code Execution Risks

01 Jul 2025

Contributed by Lukas

A new high-severity zero-day vulnerability in Google Chrome—CVE-2025-6554—has sent shockwaves across the cybersecurity landscape. This episode div...

Russia’s 16KB Curtain: Cloudflare Throttling and the Future of the RuNet

30 Jun 2025

Contributed by Lukas

Russia has entered a new phase of digital authoritarianism. In a sweeping move, Russian Internet Service Providers (ISPs) have begun systematically th...

Ahold Delhaize Data Breach: 2.2 Million Employee Records Exposed

30 Jun 2025

Contributed by Lukas

Ahold Delhaize, one of the world’s largest food retailers, is now the subject of one of the most significant ransomware breaches in recent U.S. hist...

Why Canada Banned Hikvision: National Security vs. Geopolitics

30 Jun 2025

Contributed by Lukas

Canada has taken a definitive stance in the escalating global scrutiny of Chinese technology, ordering surveillance giant Hikvision to cease all opera...

Scattered Spider Takes Flight: Inside the Cybercrime Group’s Move into Aviation

30 Jun 2025

Contributed by Lukas

As the aviation industry becomes more digitally interconnected, its exposure to sophisticated cyber threats continues to grow. One of the most dangero...

Fortnite and the FTC: How Epic Games Misled Players into Unwanted Purchases

27 Jun 2025

Contributed by Lukas

In a landmark case that reshapes the conversation around digital ethics, the Federal Trade Commission’s $520 million settlement with Epic Games over...

Microsoft 365 Direct Send Exploited: How Phishing Emails Masquerade as Internal Messages

27 Jun 2025

Contributed by Lukas

Phishing has long been a favored weapon of cybercriminals, but a recent revelation about Microsoft 365’s Direct Send feature has elevated the threat...

Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Risk

27 Jun 2025

Contributed by Lukas

A critical flaw in the Open VSX Registry—an open-source alternative to the Visual Studio Code Marketplace—recently put over 8 million developers a...

CitrixBleed 2: Critical NetScaler Vulnerability Enables Session Hijacking and MFA Bypass

27 Jun 2025

Contributed by Lukas

A new critical vulnerability in Citrix NetScaler ADC and Gateway systems, dubbed CitrixBleed 2 (CVE-2025-5777), has emerged as a serious threat to rem...

OneClik Cyberattack Campaign Targets Energy Sector Using Microsoft ClickOnce and AWS

26 Jun 2025

Contributed by Lukas

A sophisticated cyber-espionage campaign named OneClik is actively targeting energy, oil, and gas organizations using a combination of legitimate clou...

Central Kentucky Radiology’s 2024 Data Breach Affects 167,000

26 Jun 2025

Contributed by Lukas

In October 2024, Central Kentucky Radiology (CKR), a Lexington-based imaging provider, became the latest victim of a growing trend in healthcare cyber...

Bonfy.AI Launches $9.5M Adaptive Content Security Platform to Govern AI and Human Data

26 Jun 2025

Contributed by Lukas

In a major development at the intersection of cybersecurity and AI governance, Israeli startup Bonfy.AI has officially launched its adaptive content s...

Zero-Day Level Cisco ISE Flaws: Urgent Patch Required for Enterprise Security

26 Jun 2025

Contributed by Lukas

Cisco has disclosed two critical security vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) products,...

U.S. Government Pushes Back on Meta: WhatsApp Labeled a High-Risk App

25 Jun 2025

Contributed by Lukas

The U.S. House of Representatives has officially banned the use of WhatsApp on all House-managed devices, citing significant data security risks. This...

How Cyberattacks on Mainline Health and Select Medical Exposed Over 200,000 Patients

25 Jun 2025

Contributed by Lukas

The healthcare industry is facing a relentless wave of cyber threats, as demonstrated by two recent breaches impacting Mainline Health Systems and Sel...

Prometei Botnet’s Global Surge: A Threat to Linux and Windows Systems Alike

25 Jun 2025

Contributed by Lukas

Prometei is one of the most persistent and sophisticated botnet threats in circulation today. First identified in 2020—and active since at least 201...

The Siemens-Microsoft Antivirus Dilemma Threatening OT Security

25 Jun 2025

Contributed by Lukas

This episode examines a serious conflict between Siemens’ Simatic PCS industrial control systems and Microsoft Defender Antivirus. The absence of an...

Patient Trust on the Line: The Fallout from McLaren Health Care’s 2024 Breach

24 Jun 2025

Contributed by Lukas

In this episode, we dive into the 2024 McLaren Health Care data breach that compromised the sensitive information of over 743,000 individuals—just o...

NeuralTrust’s Echo Chamber: The AI Jailbreak That Slipped Through the Cracks

24 Jun 2025

Contributed by Lukas

This podcast dives deep into one of the most pressing vulnerabilities in modern AI — the rise of sophisticated "jailbreaking" attacks against large ...

AT&T, Verizon, and Beyond: How Salt Typhoon Targets Global Telcos

24 Jun 2025

Contributed by Lukas

In this episode, we dive deep into the alarming revelations about Salt Typhoon—a Chinese state-sponsored advanced persistent threat (APT) actor, als...

Fake Microsoft, Netflix, & Apple Support: The Scam Lurking in Google Search

24 Jun 2025

Contributed by Lukas

In this eye-opening episode, we break down a sophisticated new trend in tech support scams (TSS) that’s catching even the most cautious users off gu...

From Malware to Court: Qilin Ransomware’s ‘Call a Lawyer’ Tactic

23 Jun 2025

Contributed by Lukas

In this episode, we take a deep dive into the Qilin ransomware group — now regarded as the world’s leading ransomware-as-a-service (RaaS) operatio...

Zero-Click, Zero-Warning: The FreeType Flaw Behind a Spyware Surge

23 Jun 2025

Contributed by Lukas

In this episode, we dive deep into the story behind CVE-2025-27363, a critical zero-click vulnerability in the widely used FreeType font rendering lib...

The Insurance Industry Under Fire: Anatomy of the Aflac Cyber Incident

23 Jun 2025

Contributed by Lukas

In this episode, we take a deep dive into the June 2025 cyberattack on Aflac, one of the latest strikes in a growing wave of sophisticated, AI-driven ...

The Nucor Cyberattack: How Ransomware Threatens American Steel

23 Jun 2025

Contributed by Lukas

In May 2025, a ransomware attack forced Nucor — one of America’s largest steel producers — to halt its metal production operations. This wasn’...

Inside the $225M Crypto Seizure: How Law Enforcement Traced Illicit Funds Across Borders

22 Jun 2025

Contributed by Lukas

A staggering $225 million in illicit cryptocurrency was recently seized by U.S. authorities in what has become the largest digital asset recovery in S...

Inside CVE-2025-23121: Veeam RCE Flaw Opens Door to Ransomware

22 Jun 2025

Contributed by Lukas

Ransomware groups are no longer just encrypting data — they're going straight for the backups. And if those backups aren’t properly protected, rec...

Fasana’s Collapse: How One Ransomware Attack Crippled a German Manufacturer

21 Jun 2025

Contributed by Lukas

Ransomware just bankrupted a 100-year-old manufacturer—and the world should take notice.In this episode, we dissect the cyberattack that brought dow...

Inside the 16 Billion Credential Leak: The Infostealer Engine Behind the Biggest Breach Yet

21 Jun 2025

Contributed by Lukas

In this episode, we break down the true scale and mechanics behind the largest credential leak ever recorded—over 16 billion login credentials, most...

Over 1,500 Minecraft Users Infected in Stargazers Ghost Malware Campaign

20 Jun 2025

Contributed by Lukas

A malware distribution network hiding in plain sight — on GitHub.This episode unpacks the Stargazers Ghost Network, a massive Distribution-as-a-Serv...

Chain IQ Breach Exposes UBS & Pictet Employee Data: A Supply Chain Failure

20 Jun 2025

Contributed by Lukas

A single vendor was compromised — and suddenly, internal records from UBS, Pictet, Manor, and Implenia were leaked. The Chain IQ cyberattack is a te...

Weaponized GitHub Repositories: How Banana Squad and Water Curse Are Hitting Devs

20 Jun 2025

Contributed by Lukas

Cybercriminals are increasingly turning GitHub into a malware distribution network. In this episode, we unpack two of the most alarming recent campaig...

Oxford City Council Breach Exposes 21 Years of Data

20 Jun 2025

Contributed by Lukas

State and local governments are under cyber siege. In this episode, we break down how and why these public institutions have become top targets for at...

Citrix NetScaler Flaws Expose Enterprise Networks: CVE-2025-5349 & CVE-2025-5777

19 Jun 2025

Contributed by Lukas

Two newly disclosed critical vulnerabilities—CVE-2025-5349 and CVE-2025-5777—have put Citrix NetScaler ADC and Gateway deployments at serious risk...

GerriScary: How CVE-2025-1568 Threatened Google’s Open-Source Supply Chain

19 Jun 2025

Contributed by Lukas

CVE-2025-1568, dubbed "GerriScary", has shaken the open-source ecosystem by exposing a fundamental weakness in Google’s Gerrit code review system—...

Cisco & Atlassian Under Fire: High-Severity Flaws and What’s at Risk

19 Jun 2025

Contributed by Lukas

Cisco and Atlassian have both released urgent security advisories in response to newly discovered high-severity vulnerabilities—and the implications...

Double Extortion, Biometric Data, and Donuts: How Play Ransomware Hit Krispy Kreme

19 Jun 2025

Contributed by Lukas

A deep dive into one of the most aggressive ransomware groups operating today—Play—and their latest high-profile target: Krispy Kreme.Operating si...

Archetyp Market Seized: €250M Drug Empire Toppled by Operation Deep Sentinel

17 Jun 2025

Contributed by Lukas

In this episode, we unpack the dramatic takedown of Archetyp Market, a darknet marketplace that dominated the online drug trade since its launch in Ma...

KillSec Exploits Zero-Day to Breach Ocuco: 241K Patients Exposed

17 Jun 2025

Contributed by Lukas

In this episode, we break down one of 2025’s most significant healthcare cybersecurity incidents: the ransomware attack on Ocuco, a global eyecare s...

DragonForce Ransomware: The Evolving Threat to Healthcare Data

17 Jun 2025

Contributed by Lukas

In this episode, we dive deep into the current state of cybersecurity in healthcare, where the growing sophistication of cyber threats has led to incr...

Google’s $32B Bid for Wiz Faces DOJ Fire: A Cloud Security Power Play or Market Grab?

17 Jun 2025

Contributed by Lukas

In this episode, we break down the seismic implications of Google’s proposed $32 billion acquisition of Wiz, the world’s largest cybersecurity uni...

SimpleHelp Exploit Fallout: Ransomware Hits Utility Billing Platforms

16 Jun 2025

Contributed by Lukas

In this critical episode, we dive into the alarming exploitation of CVE-2024-57727, a vulnerability in SimpleHelp Remote Monitoring and Management (RM...

TeamFiltration and Token Theft: The Cyber Campaign Microsoft Never Saw Coming

16 Jun 2025

Contributed by Lukas

In this episode, we dissect UNK_SneakyStrike—a major account takeover campaign targeting Microsoft Entra ID users with precision and scale. Tracked ...

Three CVEs, One Risk: Arbitrary Code Execution in Nessus Agent for Windows

16 Jun 2025

Contributed by Lukas

In this episode, we dive deep into one of the most critical attack techniques in modern cyber warfare: privilege escalation—and how it recently hit ...

WestJet Cyberattack: Cracks in Aviation’s Digital Armor

16 Jun 2025

Contributed by Lukas

A major cyberattack has rocked Canada's second-largest airline, WestJet—crippling internal systems and prompting warnings for customers to monitor t...

Silent Surveillance: The Hidden Risks in 40,000+ Unsecured Cameras

15 Jun 2025

Contributed by Lukas

In this episode, we dig into a disturbing yet underreported national security threat: the exploitation of internet-connected surveillance cameras—es...

Paragon’s Promise vs. Reality: How Graphite Is Being Used Against Journalists and Activists

15 Jun 2025

Contributed by Lukas

In this episode, we dive deep into the alarming revelations surrounding Graphite, a powerful spyware tool developed by Israeli firm Paragon Solutions....

zeroRISC Secures $10M to Commercialize OpenTitan and Reinvent Supply Chain Security

14 Jun 2025

Contributed by Lukas

zeroRISC just raised $10 million to bring OpenTitan—the first open-source silicon Root of Trust—to market. In this episode, we break down what thi...

Fog, RedFox, and the Rise of Silent Intruders: Cyberattacks Surge Against Financial Institutions

14 Jun 2025

Contributed by Lukas

The financial services industry is under siege. In this episode, we unpack the latest findings from Radware’s 2025 Financial Threat Analysis and mul...

9.8 Severity and Counting: Inside Trend Micro’s Latest Security Emergency

13 Jun 2025

Contributed by Lukas

In this episode, we break down Trend Micro’s urgent June 10th security update that patched ten high- and critical-severity vulnerabilities—some wi...

Zero-Day in the Call Center: Mitel MiCollab Exploited in Active Attacks

13 Jun 2025

Contributed by Lukas

In this episode, we dissect the critical vulnerabilities plaguing Mitel MiCollab, a widely used unified communications platform, and explore how attac...

The Info-Stealer Sting: A Deep Dive into INTERPOL's Operation Secure

13 Jun 2025

Contributed by Lukas

Join us for a gripping discussion on "Operation Secure," a landmark international crackdown that reverberated through the dark corners of the cybercri...

Tomcat Manager Attacks: 400 IPs in Coordinated Brute-Force Attack

11 Jun 2025

Contributed by Lukas

On June 5, 2025, GreyNoise flagged a massive spike in coordinated brute-force login attempts targeting Apache Tomcat Manager interfaces. Nearly 400 un...

TxDOT Data Leak: 423,391 Texans Exposed

11 Jun 2025

Contributed by Lukas

On May 12, 2025, the Texas Department of Transportation (TxDOT) disclosed a significant data breach that compromised crash reports containing personal...

Ghost Students and AI Scams: How Identity Theft is Gutting Financial Aid

11 Jun 2025

Contributed by Lukas

What happens when hundreds of thousands of college applications are submitted—not by hopeful students, but by bots using stolen identities? In this ...

Inside the React Native NPM Supply Chain Breach: 16 Packages, 1 Million+ Downloads, and a RAT in the Code

10 Jun 2025

Contributed by Lukas

In this episode, we break down the massive supply chain attack that rocked the React Native ecosystem beginning on June 6, 2025. Over 16 NPM packages,...

Mirai Strikes Again: Spring4Shell, Wazuh, and TBK DVRs Exploited in Live Campaigns

10 Jun 2025

Contributed by Lukas

In this episode, we dive into the latest wave of active Mirai botnet campaigns exploiting high-severity remote code execution (RCE) vulnerabilities in...

UNFI Breach: How One Cyberattack Shook the North American Food Supply

10 Jun 2025

Contributed by Lukas

On June 5, 2025, United Natural Foods Inc. (UNFI)—North America's largest publicly traded wholesale food distributor and primary supplier for Whole ...

Malware-as-Code: The Rise of DaaS on GitHub and the Collapse of Open-Source Trust

07 Jun 2025

Contributed by Lukas

In this episode, we dissect one of the most sophisticated ongoing cybercrime trends—malware campaigns weaponizing GitHub repositories to compromise ...

ClickFix: How Fake Browser Errors Became the Internet’s Most Dangerous Trap

05 Jun 2025

Contributed by Lukas

In this episode, we dive deep into ClickFix, also tracked as ClearFix or ClearFake—a highly effective and deceptive malware delivery tactic that eme...

Exposed and Extorted: The ViLE Hackers and the Legal Gaps Enabling Doxing

05 Jun 2025

Contributed by Lukas

Cybercrime is rapidly evolving—and so are its tactics. In this episode, we dissect the findings of SoSafe’s Cybercrime Trends 2025 report and expl...

Chrome Under Fire: Three Zero-Days, One Month, and Nation-State Exploits

04 Jun 2025

Contributed by Lukas

In this episode, we dive deep into three actively exploited zero-day vulnerabilities discovered in Google Chrome in 2025, each of which was patched in...

Australia Forces Transparency: The World’s First Mandatory Ransomware Payment Reporting Law

04 Jun 2025

Contributed by Lukas

Australia just made cyber history. On May 30, 2025, the nation became the first in the world to enforce mandatory ransomware payment reporting under t...

$25M for AI Email Security: Trustifi’s Big Bet on the MSP Market

04 Jun 2025

Contributed by Lukas

In this episode, we dive into Trustifi’s recent $25 million Series A funding round, led by growth equity firm Camber Partners. Specializing in AI-po...

Google Chrome vs. Failing CAs: The Policy Behind the Distrust

03 Jun 2025

Contributed by Lukas

In this episode, we dissect Google's recent and upcoming decisions to distrust several Certificate Authorities (CAs) within the Chrome Root Store, inc...

CVE-2025-48827 & 48828: How vBulletin’s API and Template Engine Got Weaponized

03 Jun 2025

Contributed by Lukas

Two critical, actively exploited vulnerabilities in vBulletin forum software—CVE-2025-48827 and CVE-2025-48828—have put thousands of websites at i...

JINX-0132: How Cryptojackers Hijacked DevOps Infrastructure via Nomad and Docker

03 Jun 2025

Contributed by Lukas

In this episode, we dissect the JINX-0132 cryptojacking campaign — a real-world example of how threat actors are exploiting cloud and DevOps environ...

Password Hashes Leaked via Linux Crash Handlers: The Truth Behind CVE-2025-5054 & 4598

02 Jun 2025

Contributed by Lukas

In this episode, we unpack two newly disclosed Linux vulnerabilities—CVE-2025-5054 and CVE-2025-4598—discovered by the Qualys Threat Research Unit...