エピソード

  • Weekly Cyber News Rollup, November 28th, 2025
    2025/11/28

    This is your weekly cyber news roll-up for the week ending November 27th, 2025. This week revolves around quiet dependencies turning into loud problems, from abandoned calendar links that can be hijacked to analytics and customer platforms leaking sensitive context. You will hear about a breach at an OpenAI analytics vendor that exposes who is building on artificial intelligence, A I, projects and a ransomware hit on Asahi and Iberia that mixes large data leaks with operational disruption and reputational damage. Developers face a heavy supply chain week as poisoned npm packages, GitHub workflows, and a self spreading JavaScript worm target build systems and secrets. At the same time, flaws in logging agents, emergency alert platforms, and Ray powered A I clusters show how core infrastructure can be hijacked for stealth access, cryptomining, or simply going dark when people need it most.

    Across the full set of stories, the focus is on how attackers exploit trusted tools and identity layers that many teams treat as background plumbing. You will hear how spyware vendors are turning secure messaging users into targets, how years of pasting code into online tools has quietly exposed live credentials, and how flaws in Oracle identity, Azure Bastion, and Grafana can hand over powerful access with a few crafted requests. Website and endpoint risks also feature, from W three Total Cache and FortiWeb to seven zip, reminding teams that small utilities and plugins can still open big doors. The episode is designed for executives, security teams, builders, and students who need a fast weekly sweep of the real attack surface, stitched across cloud, identity, and software factories, available at DailyCyber.news. By the end, you will have a clear sense of where your own quiet dependencies might be hiding.

    続きを読む 一部表示
    19 分
  • Zero Trust Theater: We Put a Fancy Gate on a Cardboard Wall
    2025/11/26

    In this episode, we uncover the reality of “Zero Trust theater”—where organizations invest in flashy front gates like MFA prompts, dashboards, and vendor logos while leaving the walls behind them flimsy and unprotected. Listeners will learn how these illusions are built, where attackers push through the cardboard, and the specific tactics adversaries use to bypass props. From consent phishing and token replay to legacy carve-outs and SaaS trust chains, the episode paints a vivid picture of why optics without structure fail.

    You’ll also gain practical insight into the skills that strengthen real Zero Trust. By the end, you’ll understand how to operationalize least privilege, enforce identity at every hop, design microsegmentation that actually holds, and measure resilience through meaningful metrics rather than green lights. This is more than theory—it’s a guide to recognizing illusions, breaking free from stagecraft, and building durable frameworks that withstand pressure.

    Produced by BareMetalCyber.com.

    続きを読む 一部表示
    29 分
  • Weekly Update: Cyber News for the Week ending 21 November, 2025
    2025/11/21

    This is your weekly cyber news roll-up for the week ending November 21st, 2025. We track a crippling cyberattack on a major automaker that shut factories and erased hundreds of millions in profit. We also follow a suspected China aligned espionage group that turned an artificial intelligence, A I, coding agent into an automated intrusion assistant. Fresh consumer and supporter data breaches, including a social engineering hit on a food delivery platform and exposure of political affiliation records, show how one person or vendor mistake can unlock large data sets. Critical flaws in Fortinet FortiWeb web application firewalls and an actively exploited Windows kernel bug round out the list of urgent patches for the week.

    You will hear clear run downs of each of the week’s biggest stories, from industrial shutdowns and agent driven intrusions to social engineering breaches and vendor failures. We explain how third party services, software supply chain projects, law enforcement case systems, and cloud platforms like Azure are being probed and stressed, and what that means for executives, security teams, builders, and students trying to stay ahead. Along the way we call out who is most exposed, which signals in logs and dashboards deserve a second look, and which updates should move to the front of the queue. The episode is designed as a fast, practical briefing that you can replay or share with your teams, available at DailyCyber.news.

    続きを読む 一部表示
    30 分
  • Cyber Talks - Break Things Safely: A High-Value Cyber Exercise Program with Daniel Hammond
    2025/11/20

    Don’t wait to learn the fire drill while the building’s on fire. In this Cyber Talk developed by BareMetalCyber.com, Army veteran and cyber resilience strategist Daniel Hammond shows how to move past check-the-box drills and turn exercises into a core learning culture. He walks through goal-driven planning (so every exercise serves a sponsor’s real need), the HSEEP spectrum from seminars and workshops to tabletops, drills, and full-scale events, plus when to go operations-based, run no-notice tests, and invite regulators, comms, and third-party partners into the room.

    Daniel shares hard-won lessons from building programs at Fortune 500s: validating response playbooks, avoiding “single-layer defense” with purple teaming, closing gaps regulators spot across your industry, and using board briefings to turn findings into funding. If you lead incident response, risk, or compliance—and you want confident teams that discover blind spots before adversaries do—this talk is for you. Join us, bring questions, and leave with practical patterns you can run this quarter.

    続きを読む 一部表示
    48 分
  • XDR, EDR, NDR, MDR, WTF-DR?
    2025/11/19

    In this episode, we cut through the alphabet soup of cybersecurity—EDR, NDR, XDR, MDR, and even the tongue-in-cheek WTF-DR. You’ll learn what each of these acronyms really means, how they differ, and where they overlap. More importantly, you’ll gain clarity on how they fit together in practice, why no single tool is enough, and how to build a layered defense without wasting budget on hype. Through clear explanations and vivid scenarios, the episode brings order to the chaos of detection and response technologies.

    Listening will sharpen your ability to evaluate tools, vendors, and services with confidence. You’ll improve your skills in mapping security investments to real outcomes, spotting hidden gaps in coverage, and asking the right questions about integration, costs, and response workflows. Whether you’re a security leader, analyst, or simply navigating the jargon jungle, this episode equips you to separate buzzwords from business value.

    Produced by BareMetalCyber.com.

    続きを読む 一部表示
    29 分
  • Weekly Cyber News Rollup, November 14th, 2025
    2025/11/14

    This is your weekly cyber news roll-up for the week ending November 14th, 2025. This week centers on phones, clouds, and core identity systems under pressure from well funded attackers who prefer to move quietly. You will hear how new spyware campaigns abuse Samsung devices and WhatsApp features, while hotel and travel scams blend real booking details with fresh malware delivery. The episode also walks through developer and infrastructure risks, from poisoned code editor extensions to critical flaws in firewalls and container platforms that can turn one foothold into broad access. It all adds up to a week where leaders and defenders need to rethink how personal devices, travel workflows, and cloud control planes intersect in daily operations.

    Across these stories you will move from data exposure at an artificial intelligence company ecosystem to massive breach data feeds landing in tracking services, and from long running espionage inside a policy nonprofit to new tools that help small businesses fight review extortion. Executives will gain a faster sense of which threats can disrupt revenue and trust, while security teams hear where to focus monitoring, patching, and multi factor authentication, M F A, improvements right now. Builders and cloud operators get practical insight into container escape flaws, risky extensions, and identity platform weaknesses that change how they should think about shared environments. Students and early career defenders can use the narrative to map how scams, espionage, and infrastructure bugs all connect in real attacks. Listen in to get the full story arc in one pass, available at DailyCyber.news.

    続きを読む 一部表示
    12 分
  • Phishing ‘Hunger Games’: May the Odds Be Ever in Your Favor (They Aren’t)
    2025/11/12

    In this episode, we explore phishing as a rigged arena where attackers decide the rules and employees become the unwilling contestants. You’ll learn how phishing has evolved from clumsy spam into precision-engineered deception powered by AI, reverse proxies, and multi-channel choreography. We unpack the psychology that adversaries exploit—urgency, authority, and scarcity—and show how identity protections, layered defenses, and cultural shifts can flip the script. From role-specific vulnerabilities to the industrialization of phishing kits, this episode equips you with a clear view of the battlefield and the tools needed to navigate it.

    Listening also sharpens practical skills that directly improve resilience. You’ll gain insight into recognizing subtle red flags across devices and platforms, understanding the tactics that bypass traditional MFA, and adopting verification habits that make the safe path the easiest one. Beyond individual awareness, the episode builds leadership and organizational skills: how to embed verification into workflows, design effective simulations, and foster a culture where reporting is rewarded. By the end, you’ll see how to shift the odds, not by chance, but by readiness. Produced by BareMetalCyber.com.

    続きを読む 一部表示
    31 分
  • Weekly Cyber News Rollup, November 7th, 2025
    2025/11/08

    This is this week’s cyber news for November third through November seventh, twenty twenty-five. The week unfolded with relentless attacks on edge infrastructure, high-stakes data breaches, and fresh discoveries in global espionage campaigns. Cisco faced active exploitation of its Secure Firewalls and routers, SonicWall confirmed a state-backed backup theft, and Conduent revealed exposure of over ten million personal records. From telecom networks to government mail servers, the week showed how attackers are targeting both the perimeter and the core of modern systems.

    Listeners will hear twenty-five stories that define the shifting threat landscape — from router implants and cloud misconfigurations to insider indictments and major ransomware playbooks. Each segment stays focused on what happened, who was affected, and why it matters to defenders and decision-makers. The narrated version of this full report is available anytime at DailyCyber.news.

    続きを読む 一部表示
    16 分